When an attacker meets a cipher-image in 2018: A year in review
C Li, Y Zhang, EY **e - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …
New fixed-time stability lemmas and applications to the discontinuous fuzzy inertial neural networks
This article aims to analyze the fixed-time synchronization of a class of discontinuous fuzzy
inertial neural networks with time-varying delays based on the new improved fixed-time …
inertial neural networks with time-varying delays based on the new improved fixed-time …
Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy
This article presents a secure communication scheme based on the quantized
synchronization of master-slave neural networks under an event-triggered strategy. First, a …
synchronization of master-slave neural networks under an event-triggered strategy. First, a …
Event-triggered output feedback synchronization of master–slave neural networks under deception attacks
The problem of event-triggered synchronization of master–slave neural networks is
investigated in this article. It is assumed that both communication channels from the sensor …
investigated in this article. It is assumed that both communication channels from the sensor …
Finite-time and fixed-time synchronization of a class of inertial neural networks with multi-proportional delays and its application to secure communication
Proportional delay, which is different from time-varying delays and distributed delay, is a
kind of unbounded delay. The proportional delay system as an important mathematical …
kind of unbounded delay. The proportional delay system as an important mathematical …
Synchronization of delayed fuzzy neural networks with probabilistic communication delay and its application to image encryption
In this article, we study the design of fuzzy synchronization controller of Takagi–Sugeno (T–
S) fuzzy neural networks with distributed time-varying delay and probabilistic network …
S) fuzzy neural networks with distributed time-varying delay and probabilistic network …
Impulsive synchronization of unbounded delayed inertial neural networks with actuator saturation and sampled-data control and its application to image encryption
The article considers the impulsive synchronization for inertial neural networks with
unbounded delay and actuator saturation via sampled-data control. Based on an impulsive …
unbounded delay and actuator saturation via sampled-data control. Based on an impulsive …
Neural cryptography based on complex-valued neural network
T Dong, T Huang - IEEE transactions on neural networks and …, 2019 - ieeexplore.ieee.org
Neural cryptography is a public key exchange algorithm based on the principle of neural
network synchronization. By using the learning algorithm of a neural network, the two neural …
network synchronization. By using the learning algorithm of a neural network, the two neural …
Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption
The main concern of this paper is to address the synchronization problem of chaotic
fractional-order fuzzy cellular neural networks (FOFCNNs) through designing the novel …
fractional-order fuzzy cellular neural networks (FOFCNNs) through designing the novel …
Finite-time synchronization for fuzzy inertial neural networks by maximum value approach
Z Zhang, J Cao - IEEE Transactions on Fuzzy Systems, 2021 - ieeexplore.ieee.org
In this article, the finite-time synchronization of drive-response fuzzy inertial neural networks
with delays is considered. Without applying the finite-time stability theorems and integral …
with delays is considered. Without applying the finite-time stability theorems and integral …