{"id":"https://openalex.org/W1842428029","doi":"https://doi.org/10.1109/ijcnn.2004.1380988","title":"A combined genetic optimization and multilayer perceptron methodology for efficient digital fingerprint modeling and evaluation in secure communications","display_name":"A combined genetic optimization and multilayer perceptron methodology for efficient digital fingerprint modeling and evaluation in secure communications","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W1842428029","doi":"https://doi.org/10.1109/ijcnn.2004.1380988","mag":"1842428029"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2004.1380988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2004.1380988","pdf_url":null,"source":{"id":"https://openalex.org/S4363608206","display_name":"2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15523933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"435","issue":null,"first_page":"2319","last_page":"2324 vol.3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7422584295272827},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.629494845867157},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.49054330587387085},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.47505617141723633},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45827603340148926},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2992923855781555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7422584295272827},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.629494845867157},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.49054330587387085},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.47505617141723633},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45827603340148926},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2992923855781555}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2004.1380988","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2004.1380988","pdf_url":null,"source":{"id":"https://openalex.org/S4363608206","display_name":"2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1493969756","https://openalex.org/W1549228503","https://openalex.org/W1985623009","https://openalex.org/W2014830966","https://openalex.org/W2057746492","https://openalex.org/W2070561595","https://openalex.org/W2261333577","https://openalex.org/W4254472329"],"related_works":["https://openalex.org/W1988155854","https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W4362496757","https://openalex.org/W1621827506","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W4312797710","https://openalex.org/W2148654711","https://openalex.org/W2608025327"],"abstract_inverted_index":{"A":[0],"novel":[1,177],"procedure":[2],"based":[3],"on":[4],"genetic":[5,78,129,202],"algorithms":[6,79,203],"and":[7,19,69,80,137,142,204],"multilayer":[8],"perceptron":[9],"(MLP)":[10],"neural":[11,82,205],"networks":[12,206],"(NN)":[13],"is":[14,54,70,117,161],"presented":[15],"for":[16,112],"the":[17,25,37,49,62,86,94,103,128,134,138,165,168,173,181,189,198],"evaluation":[18],"production":[20],"of":[21,27,39,47,51,98,105,109,121,167,200],"digital":[22,32,107],"fingerprints":[23,33,108],"in":[24,61,93,114,119,188,207],"design":[26],"secure":[28],"communication":[29,115,208],"systems.":[30],"These":[31],"are":[34,97],"computed":[35],"using":[36],"methodology":[38],"un-keyed":[40],"one-way":[41],"functions":[42,53],"(hash":[43],"functions).":[44],"The":[45,192],"problem":[46,104],"evaluating":[48],"quality":[50,111,166],"such":[52],"formulated":[55,118],"as":[56,147,149],"a":[57,73,122,152],"global":[58],"optimization":[59],"one":[60,183],"space":[63],"spanned":[64],"by":[65,76,126,150,171],"all":[66],"possible":[67],"messages":[68],"approached":[71],"from":[72],"practical":[74],"viewpoint":[75],"involving":[77,127,151],"MLP":[81,155],"networks,":[83],"contrary":[84],"to":[85,163],"very":[87],"few":[88],"similar":[89],"research":[90],"efforts":[91],"existing":[92],"literature":[95],"that":[96],"only":[99],"theoretical":[100],"interest.":[101],"Moreover,":[102],"producing":[106],"good":[110],"use":[113],"systems":[116,209],"terms":[120],"hash":[123,185],"function":[124,186],"constructed":[125],"algorithm":[130],"procedure,":[131],"exclusively":[132],"utilizing":[133],"crossover":[135],"operator":[136],"steady-state":[139],"reproduction":[140],"method":[141],"omitting":[143],"its":[144],"random":[145],"components,":[146],"well":[148],"suitably":[153],"designed":[154],"NN.":[156],"An":[157],"extensive":[158],"experimental":[159],"study":[160],"conducted":[162],"assess":[164],"results":[169,194],"produced":[170],"applying":[172,201],"herein":[174,195],"suggested":[175],"two":[176],"approaches,":[178],"employing":[179],"SHA,":[180],"known":[182],"way":[184],"algorithm,":[187],"comparison":[190],"procedure.":[191],"promising":[193],"obtained":[196],"illustrate":[197],"importance":[199],"security":[210],"design.":[211]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
