2020
DOI: 10.3233/jifs-179543
|View full text |Cite
|
Sign up to set email alerts
|

Two-stage data encryption using chaotic neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 40 publications
0
10
0
Order By: Relevance
“…The authors of [26] proposed a machine learning algorithm to identify malicious uniform resource locators by combining URL lexical selections, payload size, and python supply parameters. A Chaotic Hopfield Neural Network combined with an adaptive encoding approach may provide a more secure model for keeping private information; the proposed approach enhances the safety of a shared key among any number of nodes [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [26] proposed a machine learning algorithm to identify malicious uniform resource locators by combining URL lexical selections, payload size, and python supply parameters. A Chaotic Hopfield Neural Network combined with an adaptive encoding approach may provide a more secure model for keeping private information; the proposed approach enhances the safety of a shared key among any number of nodes [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…Srivastava et al [15] in 2020 presented a novel algorithm to control data security using a hybrid model that used an adaptive encoding technique alongside Chaotic Hopfield Neural Network. The proposed computation upgraded the security of a key shared between any nodes.…”
Section: Previous Researchesmentioning
confidence: 99%
“…Following the impressive results of deep learning on the task of image classification [34] and other research fields [35,36], many efforts have been made to train deep networks for the task of action recognition. Fernando et al [3] proposed a temporal pooling function, which uses the evolution of video temporal structure to represent the videos.…”
Section: Related Workmentioning
confidence: 99%