@String{TESC = {Turkish Journal of Electrical Engineering and Computer Sciences}}\r
%% 1989 - Cybenko\r
\r
-@article{DBLP:journals/jpdc/Cybenko89,\r
+@article{Cybenko89,\r
author = {George Cybenko},\r
- title = {Dynamic Load Balancing for Distributed Memory Multiprocessors},\r
- journal = {J. Parallel Distrib. Comput.},\r
- volume = {7},\r
- number = {2},\r
+ title = {Approximation by Superpositions of a Sigmoidal function},\r
+ journal = {Mathematics of Control, Signals and Systems},\r
+ volume = {2},\r
year = {1989},\r
- pages = {279-301},\r
- bibsource = {DBLP, http://dblp.uni-trier.de}\r
+ pages = {303-314}\r
}\r
\r
%% 1989 - Hornik\r
Xin Zhou},\r
title = {A Novel Wavelet Image Watermarking Scheme Combined with\r
Chaos Sequence and Neural Network},\r
- booktitle = {ISNN (2)},\r
year = {2004},\r
pages = {663-668},\r
ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663},\r
editor = {Fuliang Yin and\r
Jun Wang and\r
Chengan Guo},\r
- title = {Advances in Neural Networks - ISNN 2004, International Symposium\r
+ title = {Advances in Neural Networks - International Symposium\r
on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,\r
Part II},\r
- booktitle = {ISNN (2)},\r
publisher = {Springer},\r
series = {Lecture Notes in Computer Science},\r
volume = {3174},\r
year = {2004},\r
- isbn = {3-540-22843-8},\r
bibsource = {DBLP, http://dblp.uni-trier.de}\r
}\r
\r
booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},\r
series = {IJCNN'09},\r
year = {2009},\r
- isbn = {978-1-4244-3549-4},\r
location = {Atlanta, Georgia, USA},\r
pages = {2723--2728},\r
numpages = {6},\r
pages={ 587 - 590},\r
keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},\r
doi={10.1109/TCE.2004.1309431},\r
-ISSN={0098-3063},}\r
+}\r
\r
@article{Zhang2005759,\r
title = "An image encryption approach based on chaotic maps",\r
@article{10.1109/CIMSiM.2010.36,\r
author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},\r
title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},\r
-journal ={Computational Intelligence, Modelling and Simulation, International Conference on},\r
+journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},\r
volume = {0},\r
-isbn = {978-0-7695-4262-1},\r
year = {2010},\r
pages = {15-20},\r
doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},\r
number={},\r
pages={3352 -3357},\r
keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;},\r
-doi={10.1109/IJCNN.2008.4634274},\r
-ISSN={1098-7576},}\r
+doi={10.1109/IJCNN.2008.4634274}\r
+}\r
\r
@INPROCEEDINGS{guyeux10ter,\r
- author = {Bahi, Jacques and Guyeux, Christophe},\r
+ author = {Bahi, Jacques M. and Guyeux, Christophe},\r
title = {A new chaos-based watermarking algorithm},\r
booktitle = {SECRYPT'10, International Conference on Security \r
and Cryptography},\r
}\r
\r
@INPROCEEDINGS{gfb10:ip,\r
- author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},\r
+ author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},\r
title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},\r
booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and\r
Multimedia Signal Processing},\r
title = {Neural network based steganalysis in still images},\r
journal ={Multimedia and Expo, IEEE International Conference on},\r
volume = {2},\r
-isbn = {0-7803-7965-9},\r
year = {2003},\r
pages = {509-512},\r
doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},\r
domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
equipe = {and},\r
classement = {ACTI},\r
-author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},\r
+author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},\r
title = {Building a Chaotic Proven Neural Network},\r
booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},\r
-pages = {***--***},\r
address = {Maldives, Maldives},\r
month = may,\r
year = 2011,\r