{"id":"https://openalex.org/W6907164888","doi":"https://doi.org/10.21227/f546-1g71","title":"A New Method for Constructing Digital Signature With Generative Adversarial Neural Network","display_name":"A New Method for Constructing Digital Signature With Generative Adversarial Neural Network","publication_year":2020,"publication_date":"2020-04-27","ids":{"openalex":"https://openalex.org/W6907164888","doi":"https://doi.org/10.21227/f546-1g71"},"language":"en","primary_location":{"id":"doi:10.21227/f546-1g71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/f546-1g71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/f546-1g71","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xiong, Ruoting","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiong, Ruoting","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Hao, Xiaohan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao, Xiaohan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Ren, Wei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ren, Wei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Zhang, Chengzhuo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Chengzhuo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.7265999913215637},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7264000177383423},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5641999840736389},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5254999995231628},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48730000853538513},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.47679999470710754},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.39719998836517334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7688999772071838},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.7265999913215637},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7264000177383423},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5641999840736389},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5254999995231628},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5188000202178955},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.47679999470710754},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.328900009393692},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3160000145435333},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2816999852657318},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27950000762939453},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.26109999418258667}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/f546-1g71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/f546-1g71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/f546-1g71","is_oa":true,"landing_page_url":"https://doi.org/10.21227/f546-1g71","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Digital":[0],"signature":[1,32],"is":[2],"an":[3],"encryption":[4],"mechanism":[5],"used":[6],"to":[7,45,83,123,133],"verify":[8,47],"the":[9,26,53,60,85,111],"authenticity":[10],"and":[11,19,35,48,100,129,132],"integrity":[12],"of":[13,30,55,87,98,113,127],"message,":[14],"which":[15,77],"has":[16],"higher":[17],"complexity":[18],"security":[20,34,112],"than":[21],"traditional":[22],"handwritten":[23],"signature.":[24],"However,":[25],"two":[27],"main":[28],"challenges":[29],"digital":[31,50,70,88,102],"are":[33],"computing":[36],"speed.":[37],"It":[38],"then":[39],"imposes":[40],"a":[41,65],"problem":[42],"-":[43],"how":[44],"quickly":[46],"sign":[49],"signatures":[51,71,82,103],"under":[52],"premise":[54],"ensuring":[56],"security.":[57],"To":[58,109],"tackle":[59],"above":[61],"challenges,":[62],"we":[63,116],"propose":[64],"new":[66],"method":[67,93],"for":[68],"constructing":[69],"with":[72],"generative":[73],"adversarial":[74,106,118],"neural":[75,107],"network,":[76],"allows":[78],"fuzzy":[79],"or":[80],"fault-tolerant":[81],"improve":[84],"practicability":[86],"signatures.":[89],"In":[90],"addition,":[91],"our":[92,114],"can":[94],"reduce":[95],"time":[96],"consumption":[97],"signing":[99],"verifying":[101],"through":[104],"using":[105],"network.":[108],"strengthen":[110],"method,":[115],"use":[117],"neutral":[119],"networks":[120],"in":[121],"GAN":[122],"simulate":[124],"various":[125],"type":[126],"uncertain":[128],"unfixed":[130],"attacks":[131],"implement":[134],"adjusting":[135],"parameters":[136],"adaptively.":[137]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
