• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4611063)   Today's Articles (6629)   Subscriber (49381)
For: Ding Y, Tan F, Qin Z, Cao M, Choo KKR, Qin Z. DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption. IEEE Trans Neural Netw Learn Syst 2022;33:4915-4929. [PMID: 33729956 DOI: 10.1109/tnnls.2021.3062754] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Number Cited by Other Article(s)
1
Hagras EAA, Aldosary S, Khaled H, Hassan TM. Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application. SENSORS (BASEL, SWITZERLAND) 2023;23:6589. [PMID: 37514882 PMCID: PMC10383835 DOI: 10.3390/s23146589] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/11/2023] [Revised: 07/09/2023] [Accepted: 07/17/2023] [Indexed: 07/30/2023]
2
Abdellatef E, Naeem EA, El-Samie FEA. DeepEnc: deep learning-based CT image encryption approach. MULTIMEDIA TOOLS AND APPLICATIONS 2023. [DOI: 10.1007/s11042-023-15818-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 04/28/2023] [Accepted: 05/10/2023] [Indexed: 09/01/2023]
3
Wu J, Zhang J, Liu D, Wang X. A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding. ENTROPY (BASEL, SWITZERLAND) 2023;25:898. [PMID: 37372242 DOI: 10.3390/e25060898] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/29/2023] [Revised: 05/23/2023] [Accepted: 05/29/2023] [Indexed: 06/29/2023]
4
Alsafyani M, Alhomayani F, Alsuwat H, Alsuwat E. Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map. SENSORS (BASEL, SWITZERLAND) 2023;23:1415. [PMID: 36772454 PMCID: PMC9921757 DOI: 10.3390/s23031415] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/13/2022] [Revised: 01/19/2023] [Accepted: 01/20/2023] [Indexed: 06/18/2023]
5
Man Z, Li J, Di X, Zhang R, Li X, Sun X. Research on cloud data encryption algorithm based on bidirectional activation neural network. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
6
AI Makes Crypto Evolve. APPLIED SYSTEM INNOVATION 2022. [DOI: 10.3390/asi5040075] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/25/2023]
7
Hosny KM, Kamal ST, Darwish MM. Novel encryption for color images using fractional-order hyperchaotic system. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022;13:973-988. [PMID: 35018197 PMCID: PMC8734555 DOI: 10.1007/s12652-021-03675-y] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/20/2020] [Accepted: 12/15/2021] [Indexed: 06/14/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA