{"id":"https://openalex.org/W3038981465","doi":"https://doi.org/10.3233/jifs-179936","title":"Encryption algorithm for network communication information based on binary logistic regression","display_name":"Encryption algorithm for network communication information based on binary logistic regression","publication_year":2020,"publication_date":"2020-06-29","ids":{"openalex":"https://openalex.org/W3038981465","doi":"https://doi.org/10.3233/jifs-179936","mag":"3038981465"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-179936","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179936","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106571401","display_name":"Bo Su","orcid":"https://orcid.org/0000-0002-6270-0489"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Su","raw_affiliation_strings":["School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078530113","display_name":"Qingyue Yang","orcid":"https://orcid.org/0000-0001-5890-9661"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210110458","display_name":"Institute of Electronics","ror":"https://ror.org/01z143507","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210110458"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyue Yang","raw_affiliation_strings":["Institute of Electronics, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Electronics, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210110458","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007738986","display_name":"Jinlong Yang","orcid":"https://orcid.org/0000-0001-9548-4236"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinlong Yang","raw_affiliation_strings":["School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Aerospace Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080170429","display_name":"Manjun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Manjun Zhang","raw_affiliation_strings":["Network Technology Research Institute, China United Network Communications Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Technology Research Institute, China United Network Communications Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5106571401"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.1542,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50599214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"39","issue":"2","first_page":"1627","last_page":"1637"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9502999782562256,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9337999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8202898502349854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7722514867782593},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.499042272567749},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4891393482685089},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4370126724243164},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.4165140986442566},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3005160093307495}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8202898502349854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7722514867782593},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.499042272567749},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4891393482685089},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4370126724243164},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.4165140986442566},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3005160093307495},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-179936","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-179936","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2202431353","https://openalex.org/W2269098187","https://openalex.org/W2309006973","https://openalex.org/W2320470009","https://openalex.org/W2335128678","https://openalex.org/W2462973448","https://openalex.org/W2474348401","https://openalex.org/W2528065566","https://openalex.org/W2566390621","https://openalex.org/W2568218703","https://openalex.org/W2593058899","https://openalex.org/W2604294854","https://openalex.org/W2766836967","https://openalex.org/W2805841208","https://openalex.org/W2883289181","https://openalex.org/W2950332948","https://openalex.org/W6753597933","https://openalex.org/W6891730417"],"related_works":["https://openalex.org/W3204184292","https://openalex.org/W3176564347","https://openalex.org/W1985458517","https://openalex.org/W2355833770","https://openalex.org/W3031039437","https://openalex.org/W3095877357","https://openalex.org/W183202219","https://openalex.org/W10861731","https://openalex.org/W2072565696","https://openalex.org/W2050451745"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,25],"overcome":[3],"the":[4,22,27,31,35,55,66,74,85,97,132,136,142,154,166],"problems":[5],"of":[6,37,57,69,77,135],"long":[7],"encrypting":[8,18],"time,":[9],"low":[10,13,17],"information":[11,14,29,46,70,75,92,105,110,133],"availability,":[12],"integrity":[15],"and":[16,72,96,123,141,153],"efficiency":[19,150],"when":[20],"using":[21],"current":[23],"method":[24],"encrypt":[26],"communication":[28,38,45,63,91,104,109],"in":[30],"network":[32,44,62,90,103,108],"without":[33],"constructing":[34],"sequence":[36,93],"information.":[39],"This":[40],"paper":[41],"proposes":[42],"a":[43,61],"encryption":[47,149,156,171],"algorithm":[48,138,168],"based":[49],"on":[50,84],"binary":[51,86],"logistic":[52],"regression,":[53],"analyses":[54],"development":[56],"computer":[58],"architecture,":[59],"builds":[60],"model,":[64,89],"layers":[65],"main":[67],"body":[68],"exchange,":[71],"realizes":[73],"synchronization":[76],"device":[78],"objects":[79],"at":[80],"all":[81],"levels.":[82],"Based":[83],"Logistic":[87],"regression":[88],"is":[94,100,111,139,151,158],"generated,":[95],"fusion":[98,121],"tree":[99],"constructed":[101],"by":[102],"sequence.":[106],"The":[107,127,148],"encrypted":[112],"through":[113],"system":[114],"initialization":[115],"stage,":[116,119],"data":[117,120,124],"preparation":[118],"stage":[122],"validation":[125],"stage.":[126],"experimental":[128],"results":[129],"show":[130],"that":[131,165],"availability":[134],"proposed":[137,167],"high,":[140,152],"maximum":[143],"usability":[144],"can":[145],"reach":[146],"97.7%.":[147],"shortest":[155],"time":[157],"only":[159],"1.9":[160],"s,":[161],"which":[162],"fully":[163],"shows":[164],"has":[169],"high":[170],"performance.":[172]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
