{"id":"https://openalex.org/W3097108175","doi":"https://doi.org/10.1155/2020/8869688","title":"An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol","display_name":"An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3097108175","doi":"https://doi.org/10.1155/2020/8869688","mag":"3097108175"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8869688","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8869688","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8869688.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8869688.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066586188","display_name":"Yiliang Han","orcid":"https://orcid.org/0000-0002-2116-5408"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yi Liang Han","raw_affiliation_strings":["School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","institution_ids":[]},{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100345925","display_name":"Yu Li","orcid":"https://orcid.org/0000-0003-2557-6180"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu Li","raw_affiliation_strings":["School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","institution_ids":[]},{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100356603","display_name":"Zhe Li","orcid":"https://orcid.org/0000-0001-6402-9660"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhe Li","raw_affiliation_strings":["School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","institution_ids":[]},{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101525908","display_name":"Shuai Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuai Shuai Zhu","raw_affiliation_strings":["School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi\u2019an 710086, China","institution_ids":[]},{"raw_affiliation_string":"School of Cryptology Engineering, Engineering University of PAP, Xi'an 710086, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066586188"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.2268,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.51843695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10429","display_name":"EEG and Brain-Computer Interfaces","score":0.9596999883651733,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10429","display_name":"EEG and Brain-Computer Interfaces","score":0.9596999883651733,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13062","display_name":"Cognitive Computing and Networks","score":0.9521999955177307,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9376000165939331,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8702916502952576},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.8087925910949707},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6351671814918518},{"id":"https://openalex.org/keywords/data-synchronization","display_name":"Data synchronization","score":0.5685458779335022},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.564067542552948},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5578393936157227},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5326480865478516},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4883856177330017},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2899065911769867},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26549816131591797},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16667219996452332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14224082231521606},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.09938636422157288},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09497490525245667},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.06632456183433533}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8702916502952576},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.8087925910949707},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6351671814918518},{"id":"https://openalex.org/C108734733","wikidata":"https://www.wikidata.org/wiki/Q1172333","display_name":"Data synchronization","level":3,"score":0.5685458779335022},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.564067542552948},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5578393936157227},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5326480865478516},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4883856177330017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2899065911769867},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26549816131591797},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16667219996452332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14224082231521606},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.09938636422157288},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09497490525245667},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.06632456183433533},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8869688","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8869688","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8869688.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b3cad1518cf44b0cbf503249e69d2d35","is_oa":true,"landing_page_url":"https://doaj.org/article/b3cad1518cf44b0cbf503249e69d2d35","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8869688","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8869688","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8869688.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2071443865","display_name":null,"funder_award_id":"201805","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2999399847","display_name":null,"funder_award_id":"KYTD201805","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5100249072","display_name":null,"funder_award_id":"KYTD201805","funder_id":"https://openalex.org/F4320334999","funder_display_name":"People's Armed Police Force"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6041026603","display_name":null,"funder_award_id":"61572521","funder_id":"https://openalex.org/F4320334999","funder_display_name":"People's Armed Police Force"},{"id":"https://openalex.org/G7339142608","display_name":null,"funder_award_id":"6157252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8155079108","display_name":null,"funder_award_id":"61572521","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334999","display_name":"People's Armed Police Force","ror":"https://ror.org/05mg82t36"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3097108175.pdf","grobid_xml":"https://content.openalex.org/works/W3097108175.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W100882879","https://openalex.org/W1538218606","https://openalex.org/W1628066375","https://openalex.org/W1997083925","https://openalex.org/W2027811079","https://openalex.org/W2028374731","https://openalex.org/W2048434638","https://openalex.org/W2079543898","https://openalex.org/W2160127188","https://openalex.org/W2528415955","https://openalex.org/W2894876451","https://openalex.org/W2907490345","https://openalex.org/W2912739452","https://openalex.org/W2922323510","https://openalex.org/W2965588241","https://openalex.org/W2982066985","https://openalex.org/W2997851848","https://openalex.org/W2999263361","https://openalex.org/W3008265109","https://openalex.org/W3025810774","https://openalex.org/W3033555360","https://openalex.org/W3040215931","https://openalex.org/W3047589366","https://openalex.org/W3099887136","https://openalex.org/W3101334132","https://openalex.org/W3105997554","https://openalex.org/W3106450650","https://openalex.org/W4246493146","https://openalex.org/W6632115906","https://openalex.org/W6727845794","https://openalex.org/W6891833221"],"related_works":["https://openalex.org/W2027357437","https://openalex.org/W2014622309","https://openalex.org/W2123134332","https://openalex.org/W2548702785","https://openalex.org/W2157126534","https://openalex.org/W2118487515","https://openalex.org/W2368252421","https://openalex.org/W1592820837","https://openalex.org/W78899842","https://openalex.org/W2158673508"],"abstract_inverted_index":{"The":[0,19,119],"synchronization":[1,27,55,69,110,126,148],"between":[2,127],"two":[3,77,105,128,154],"neural":[4,15,48,57,185],"networks":[5,58,78,106,129],"by":[6,153],"mutual":[7],"learning":[8],"can":[9,122,149,179],"be":[10,150],"used":[11,87],"to":[12,24,101],"design":[13],"the":[14,26,40,44,47,53,68,73,76,80,90,96,104,113,124,135,139,146,159,168,176,181,184],"key":[16,49],"exchange":[17,186],"protocol.":[18,187],"critical":[20],"issue":[21],"is":[22,70,86,99,173],"how":[23],"evaluate":[25,52],"without":[28],"a":[29,36,116,166],"weight":[30,140],"vector.":[31,141],"All":[32],"existing":[33],"methods":[34],"have":[35,79,107],"delay":[37],"in":[38,83,162],"evaluating":[39,67],"synchronization,":[41],"which":[42,157],"affects":[43],"security":[45,182],"of":[46,56,92,138,171,183],"exchange.":[50],"To":[51],"full":[54,109,125,147],"more":[59],"timely":[60],"and":[61],"accurately,":[62],"an":[63],"improved":[64,120],"method":[65,121,160,178],"for":[66,88],"proposed.":[71],"First,":[72],"frequency":[74],"that":[75],"same":[81],"output":[82],"previous":[84],"steps":[85],"assessing":[89],"degree":[91,114],"them":[93],"roughly.":[94],"Second,":[95],"hash":[97,136],"function":[98],"utilized":[100],"judge":[102],"whether":[103],"achieved":[108],"precisely":[111],"when":[112],"exceeds":[115],"given":[117],"threshold.":[118],"find":[123],"with":[130,143],"no":[131],"information":[132],"other":[133,144],"than":[134],"value":[137],"Compared":[142],"methods,":[145],"detected":[151],"earlier":[152],"communication":[155],"partners":[156],"adopt":[158],"proposed":[161,177],"this":[163],"paper.":[164],"As":[165],"result,":[167],"successful":[169],"probability":[170],"geometric":[172],"reduced.":[174],"Therefore,":[175],"enhance":[180]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
