2 "\providecommand{\noopsort}[1]{}"
\r
3 # "\providecommand{\singleletter}[1]{#1}%"
\r
7 %% author = "Michel Salomon",
\r
10 %% filename = "adhoc.bib",
\r
11 %% address = "LIFC-AND, CNRS,
\r
12 %% Université de Franche-Comté,
\r
13 %% IUT de Belfort-Montbéliard,
\r
15 %% email = "salomon at iut-bm.univ-fcomte.fr" }
\r
17 @String{JPDC = {Journal of Parallel and Distributed Computing}}
\r
18 @String{EC = {Evolutionary Computation}}
\r
19 @String{PC = {Parallel Computing}}
\r
20 @String{IEEETPDS = {IEEE Trans. Parallel Distrib. Systems}}
\r
21 @String{IEEETPAMI = {IEEE Trans. Pattern Analysis Machine Intelligence}}
\r
22 @String{IEEETSMC = {IEEE Trans. on Systems, Man and Cybernetics}}
\r
26 @article{DBLP:journals/jpdc/Cybenko89,
\r
27 author = {George Cybenko},
\r
28 title = {Dynamic Load Balancing for Distributed Memory Multiprocessors},
\r
29 journal = {J. Parallel Distrib. Comput.},
\r
34 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
39 @article{DBLP:journals/nn/HornikSW89,
\r
40 author = {Kurt Hornik and
\r
41 Maxwell B. Stinchcombe and
\r
43 title = {Multilayer feedforward networks are universal approximators},
\r
44 journal = {Neural Networks},
\r
49 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
\r
50 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
55 @article{Aihara1990333,
\r
56 title = "Chaotic neural networks",
\r
57 journal = "Physics Letters A",
\r
60 pages = "333 - 340",
\r
64 author = "K. Aihara and T. Takabe and M. Toyoda"
\r
69 @inproceedings {lecun-98b,
\r
70 original = "orig/lecun-98b.ps.gz",
\r
71 author = "LeCun, Y. and Bottou, L. and Orr, G. and Muller, K.",
\r
72 title = "Efficient BackProp",
\r
73 booktitle = "Neural Networks: Tricks of the trade",
\r
74 editor = "Orr, G. and Muller K.",
\r
75 publisher = "Springer",
\r
81 @inproceedings{DBLP:conf/esann/CrookS01,
\r
82 author = {Nigel Crook and
\r
83 Tjeerd Olde Scheper},
\r
84 title = {A novel chaotic neural network architecture},
\r
85 booktitle = {ESANN},
\r
88 ee = {http://www.dice.ucl.ac.be/Proceedings/esann/esannpdf/es2001-24.pdf},
\r
89 crossref = {DBLP:conf/esann/2001},
\r
90 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
93 @proceedings{DBLP:conf/esann/2001,
\r
94 title = {ESANN 2001, 9th European Symposium on Artificial Neural
\r
95 Networks, Bruges, Belgium, April 25-27, 2001, Proceedings},
\r
96 booktitle = {ESANN},
\r
98 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
103 @inproceedings{DBLP:conf/isnn/ZhaoZXPZ04,
\r
104 author = {Jian Zhao and
\r
109 title = {A Novel Wavelet Image Watermarking Scheme Combined with
\r
110 Chaos Sequence and Neural Network},
\r
111 booktitle = {ISNN (2)},
\r
114 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663},
\r
115 crossref = {DBLP:conf/isnn/2004-2},
\r
116 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
119 @proceedings{DBLP:conf/isnn/2004-2,
\r
120 editor = {Fuliang Yin and
\r
123 title = {Advances in Neural Networks - ISNN 2004, International Symposium
\r
124 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
\r
126 booktitle = {ISNN (2)},
\r
127 publisher = {Springer},
\r
128 series = {Lecture Notes in Computer Science},
\r
131 isbn = {3-540-22843-8},
\r
132 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
137 @article{Crook2007267,
\r
138 title = "Pattern recall in networks of chaotic neurons",
\r
139 journal = "Biosystems",
\r
142 pages = "267 - 274",
\r
144 issn = "0303-2647",
\r
145 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
\r
146 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
\r
147 keywords = "Chaos",
\r
148 keywords = "Spiking neural network"
\r
153 @article{DBLP:journals/scholarpedia/Aihara08,
\r
154 author = {Kazuyuki Aihara},
\r
155 title = {Chaos in neurons},
\r
156 journal = {Scholarpedia},
\r
161 ee = {http://www.scholarpedia.org/article/Chaos_in_neurons},
\r
162 bibsource = {DBLP, http://dblp.uni-trier.de}
\r
167 @article{Lian20091296,
\r
168 title = "A block cipher based on chaotic neural networks",
\r
169 journal = "Neurocomputing",
\r
172 pages = "1296 - 1301",
\r
174 issn = "0925-2312",
\r
175 author = "Shiguo Lian",
\r
176 keywords = "Neural network",
\r
177 keywords = "Chaos",
\r
178 keywords = "Security",
\r
179 keywords = "Block cipher",
\r
180 keywords = "Image encryption"
\r
186 @article{springerlink:10.1007/s00521-010-0432-2,
\r
187 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
\r
188 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
\r
189 title = {A novel Hash algorithm construction based on chaotic neural network},
\r
190 journal = {Neural Computing and Applications},
\r
191 publisher = {Springer London},
\r
192 issn = {0941-0643},
\r
193 keyword = {Computer Science},
\r
200 @article{dalkiran10,
\r
201 author = {Ilker Dalkiran and Kenan Danisman},
\r
202 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
\r
203 title = {Artificial neural network based chaotic generator for cryptology},
\r
204 journal = {Turk. J.Elec. Eng. \& Comp. Sci.},
\r
211 @inproceedings{Qiao:2009:SM:1704555.1704664,
\r
212 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
\r
213 title = {Steganalysis of MP3Stego},
\r
214 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
\r
215 series = {IJCNN'09},
\r
217 isbn = {978-1-4244-3549-4},
\r
218 location = {Atlanta, Georgia, USA},
\r
219 pages = {2723--2728},
\r
221 url = {http://portal.acm.org/citation.cfm?id=1704555.1704664},
\r
223 publisher = {IEEE Press},
\r
224 address = {Piscataway, NJ, USA},
\r
228 @ARTICLE{Sullivan06steganalysisfor,
\r
229 author = {Kenneth Sullivan and Upamanyu Madhow and Shivkumar Ch and B. S. Manjunath},
\r
230 title = {Steganalysis for Markov cover data with applications to images},
\r
231 journal = {IEEE Trans. Inform. Forensics and Security},
\r
238 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
\r
239 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
\r
244 pages={ 587 - 590},
\r
245 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
\r
246 doi={10.1109/TCE.2004.1309431},
\r
249 @article{Zhang2005759,
\r
250 title = "An image encryption approach based on chaotic maps",
\r
251 journal = "Chaos, Solitons \& Fractals",
\r
254 pages = "759 - 765",
\r
257 issn = "0960-0779",
\r
258 doi = "10.1016/j.chaos.2004.09.035",
\r
259 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
\r
264 author = "F. Gray",
\r
265 title = "Pulse code communication",
\r
266 note = "US Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
\r
270 @article{10.1109/CIMSiM.2010.36,
\r
271 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
\r
272 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
\r
273 journal ={Computational Intelligence, Modelling and Simulation, International Conference on},
\r
275 isbn = {978-0-7695-4262-1},
\r
278 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
\r
279 publisher = {IEEE Computer Society},
\r
280 address = {Los Alamitos, CA, USA},
\r
283 @INPROCEEDINGS{4634274,
\r
284 author={Qingzhong Liu and Sung, A.H. and Ribeiro, B.M. and Ferreira, R.},
\r
285 booktitle={Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on}, title={Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting},
\r
290 pages={3352 -3357},
\r
291 keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;},
\r
292 doi={10.1109/IJCNN.2008.4634274},
\r
295 @INPROCEEDINGS{guyeux10ter,
\r
296 author = {Bahi, Jacques and Guyeux, Christophe},
\r
297 title = {A new chaos-based watermarking algorithm},
\r
298 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
\r
300 pages = {455--458},
\r
301 address = {Athens, Greece},
\r
303 publisher = {SciTePress},
\r
304 classement = {ACTI},
\r
305 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
\r
311 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
\r
312 title = {On Devaney's Definition of Chaos},
\r
313 journal = {Amer. Math. Monthly},
\r
316 pages = {332--334},
\r
317 keywords = {(c+),},
\r
319 timestamp = {27/01/2008}
\r
323 title = {An Introduction to Chaotic Dynamical Systems},
\r
324 publisher = {Addison-Wesley},
\r
326 author = {Devaney, Robert L.},
\r
327 address = {Redwood City, CA},
\r
332 author = {Bahi, Jacques M. and Guyeux, Christophe},
\r
333 title = {Hash Functions Using Chaotic Iterations},
\r
334 journal = {Journal of Algorithms \& Computational Technology},
\r
337 pages = {167--181},
\r
339 classement = {ACLNI},
\r
340 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
\r
342 impact-factor = {#},
\r
347 @PHDTHESIS{GuyeuxThese10,
\r
348 author = {Christophe Guyeux},
\r
349 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
\r
350 en s\'{e}curit\'{e} informatique},
\r
351 school = {Universit\'{e} de Franche-Comt\'{e}},
\r
353 owner = {christophe},
\r
354 timestamp = {2010.12.21}
\r
357 @INPROCEEDINGS{gfb10:ip,
\r
358 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
\r
359 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
\r
360 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
\r
361 Multimedia Signal Processing},
\r
363 pages = {208--211},
\r
364 address = {Darmstadt, Germany},
\r
366 classement = {ACTI},
\r
367 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
\r
373 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
\r
374 title = {Topological entropy},
\r
375 journal = {Trans. Amer. Math. Soc.},
\r
380 timestamp = {2008.05.29}
\r
384 author = {R. Bowen},
\r
385 title = {Entropy for group endomorphisms and homogeneous spaces},
\r
386 journal = {Trans. Amer. Math. Soc.},
\r
391 timestamp = {15/02/2008}
\r
395 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
\r
396 title = {A novel Hash algorithm construction based on chaotic neural network},
\r
397 journal = {Neural Computing and Applications},
\r
400 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
\r
402 issn = {0941-0643},
\r
403 keyword = {Computer Science},
\r
404 publisher = {Springer London}
\r
407 @article{10.1109/ICME.2003.1221665,
\r
408 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
\r
409 title = {Neural network based steganalysis in still images},
\r
410 journal ={Multimedia and Expo, IEEE International Conference on},
\r
412 isbn = {0-7803-7965-9},
\r
415 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
\r
416 publisher = {IEEE Computer Society},
\r
417 address = {Los Alamitos, CA, USA},
\r
420 @inproceedings{bgs11:ip,
\r
422 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
\r
424 classement = {ACTI},
\r
425 author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},
\r
426 title = {Building a Chaotic Proven Neural Network},
\r
427 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
\r
428 pages = {***--***},
\r
429 address = {Maldives, Maldives},
\r