+@PREAMBLE{\r
+ "\providecommand{\noopsort}[1]{}" \r
+ # "\providecommand{\singleletter}[1]{#1}%" \r
+}\r
+\r
+% Bibtexfile {\r
+%% author = "Michel Salomon",\r
+%% version = "1.0",\r
+%% date = "",\r
+%% filename = "adhoc.bib",\r
+%% address = "LIFC-AND, CNRS,\r
+%% Université de Franche-Comté,\r
+%% IUT de Belfort-Montbéliard,\r
+%% 90000 BELFORT",\r
+%% email = "salomon at iut-bm.univ-fcomte.fr" }\r
+\r
+@String{JPDC = {Journal of Parallel and Distributed Computing}}\r
+@String{EC = {Evolutionary Computation}}\r
+@String{PC = {Parallel Computing}}\r
+@String{IEEETPDS = {IEEE Trans. Parallel Distrib. Systems}}\r
+@String{IEEETPAMI = {IEEE Trans. Pattern Analysis Machine Intelligence}}\r
+@String{IEEETSMC = {IEEE Trans. on Systems, Man and Cybernetics}}\r
+\r
+%% 1989 - Cybenko\r
+\r
+@article{DBLP:journals/jpdc/Cybenko89,\r
+ author = {George Cybenko},\r
+ title = {Dynamic Load Balancing for Distributed Memory Multiprocessors},\r
+ journal = {J. Parallel Distrib. Comput.},\r
+ volume = {7},\r
+ number = {2},\r
+ year = {1989},\r
+ pages = {279-301},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+%% 1989 - Hornik\r
+\r
+@article{DBLP:journals/nn/HornikSW89,\r
+ author = {Kurt Hornik and\r
+ Maxwell B. Stinchcombe and\r
+ Halbert White},\r
+ title = {Multilayer feedforward networks are universal approximators},\r
+ journal = {Neural Networks},\r
+ volume = {2},\r
+ number = {5},\r
+ year = {1989},\r
+ pages = {359-366},\r
+ ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+%% 1990 - Aihara\r
+\r
+@article{Aihara1990333,\r
+title = "Chaotic neural networks",\r
+journal = "Physics Letters A",\r
+volume = "144",\r
+number = "6-7",\r
+pages = "333 - 340",\r
+year = "1990",\r
+note = "",\r
+issn = "0375-9601",\r
+author = "K. Aihara and T. Takabe and M. Toyoda"\r
+}\r
+\r
+%% 1998 - LeCun\r
+\r
+@inproceedings {lecun-98b,\r
+original = "orig/lecun-98b.ps.gz",\r
+author = "LeCun, Y. and Bottou, L. and Orr, G. and Muller, K.",\r
+title = "Efficient BackProp",\r
+booktitle = "Neural Networks: Tricks of the trade",\r
+editor = "Orr, G. and Muller K.",\r
+publisher = "Springer",\r
+year = 1998\r
+}\r
+\r
+%% 2001 - Crook\r
+\r
+@inproceedings{DBLP:conf/esann/CrookS01,\r
+ author = {Nigel Crook and\r
+ Tjeerd Olde Scheper},\r
+ title = {A novel chaotic neural network architecture},\r
+ booktitle = {ESANN},\r
+ year = {2001},\r
+ pages = {295-300},\r
+ ee = {http://www.dice.ucl.ac.be/Proceedings/esann/esannpdf/es2001-24.pdf},\r
+ crossref = {DBLP:conf/esann/2001},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+@proceedings{DBLP:conf/esann/2001,\r
+ title = {ESANN 2001, 9th European Symposium on Artificial Neural\r
+ Networks, Bruges, Belgium, April 25-27, 2001, Proceedings},\r
+ booktitle = {ESANN},\r
+ year = {2001},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+%% 2004 - Zhao\r
+\r
+@inproceedings{DBLP:conf/isnn/ZhaoZXPZ04,\r
+ author = {Jian Zhao and\r
+ Mingquan Zhou and\r
+ Hongmei Xie and\r
+ Jinye Peng and\r
+ Xin Zhou},\r
+ title = {A Novel Wavelet Image Watermarking Scheme Combined with\r
+ Chaos Sequence and Neural Network},\r
+ booktitle = {ISNN (2)},\r
+ year = {2004},\r
+ pages = {663-668},\r
+ ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663},\r
+ crossref = {DBLP:conf/isnn/2004-2},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+@proceedings{DBLP:conf/isnn/2004-2,\r
+ editor = {Fuliang Yin and\r
+ Jun Wang and\r
+ Chengan Guo},\r
+ title = {Advances in Neural Networks - ISNN 2004, International Symposium\r
+ on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,\r
+ Part II},\r
+ booktitle = {ISNN (2)},\r
+ publisher = {Springer},\r
+ series = {Lecture Notes in Computer Science},\r
+ volume = {3174},\r
+ year = {2004},\r
+ isbn = {3-540-22843-8},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+%% 2007 - Crook\r
+\r
+@article{Crook2007267,\r
+title = "Pattern recall in networks of chaotic neurons",\r
+journal = "Biosystems",\r
+volume = "87",\r
+number = "2-3",\r
+pages = "267 - 274",\r
+year = "2007",\r
+issn = "0303-2647",\r
+doi = "DOI: 10.1016/j.biosystems.2006.09.022",\r
+author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",\r
+keywords = "Chaos",\r
+keywords = "Spiking neural network"\r
+}\r
+\r
+%% 2008 - Aihara\r
+\r
+@article{DBLP:journals/scholarpedia/Aihara08,\r
+ author = {Kazuyuki Aihara},\r
+ title = {Chaos in neurons},\r
+ journal = {Scholarpedia},\r
+ volume = {3},\r
+ number = {5},\r
+ year = {2008},\r
+ pages = {1786},\r
+ ee = {http://www.scholarpedia.org/article/Chaos_in_neurons},\r
+ bibsource = {DBLP, http://dblp.uni-trier.de}\r
+}\r
+\r
+%% 2009 - Lian\r
+\r
+@article{Lian20091296,\r
+title = "A block cipher based on chaotic neural networks",\r
+journal = "Neurocomputing",\r
+volume = "72",\r
+number = "4-6",\r
+pages = "1296 - 1301",\r
+year = "2009",\r
+issn = "0925-2312",\r
+author = "Shiguo Lian",\r
+keywords = "Neural network",\r
+keywords = "Chaos",\r
+keywords = "Security",\r
+keywords = "Block cipher",\r
+keywords = "Image encryption"\r
+}\r
+\r
+\r
+%% 2010 - Yantao\r
+\r
+@article{springerlink:10.1007/s00521-010-0432-2,\r
+ author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},\r
+ affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},\r
+ title = {A novel Hash algorithm construction based on chaotic neural network},\r
+ journal = {Neural Computing and Applications},\r
+ publisher = {Springer London},\r
+ issn = {0941-0643},\r
+ keyword = {Computer Science},\r
+ pages = {1-9},\r
+ year = {2010}\r
+}\r
+\r
+%% 2010 - Dalkiran\r
+\r
+@article{dalkiran10,\r
+ author = {Ilker Dalkiran and Kenan Danisman},\r
+ affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},\r
+ title = {Artificial neural network based chaotic generator for cryptology},\r
+ journal = {Turk. J.Elec. Eng. \& Comp. Sci.},\r
+ volume = {18},\r
+ number = {2},\r
+ pages = {225-240},\r
+ year = {2010}\r
+}\r
+\r
+@inproceedings{Qiao:2009:SM:1704555.1704664,\r
+ author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},\r
+ title = {Steganalysis of MP3Stego},\r
+ booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},\r
+ series = {IJCNN'09},\r
+ year = {2009},\r
+ isbn = {978-1-4244-3549-4},\r
+ location = {Atlanta, Georgia, USA},\r
+ pages = {2723--2728},\r
+ numpages = {6},\r
+ url = {http://portal.acm.org/citation.cfm?id=1704555.1704664},\r
+ acmid = {1704664},\r
+ publisher = {IEEE Press},\r
+ address = {Piscataway, NJ, USA},\r
+} \r
+\r
+\r
+@ARTICLE{Sullivan06steganalysisfor,\r
+ author = {Kenneth Sullivan and Upamanyu Madhow and Shivkumar Ch and B. S. Manjunath},\r
+ title = {Steganalysis for Markov cover data with applications to images},\r
+ journal = {IEEE Trans. Inform. Forensics and Security},\r
+ year = {2006},\r
+ volume = {1},\r
+ pages = {275--287}\r
+}\r
+\r
+@ARTICLE{1309431,\r
+author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},\r
+journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},\r
+year={2004},\r
+month=may,\r
+volume={50},\r
+number={2},\r
+pages={ 587 - 590},\r
+keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},\r
+doi={10.1109/TCE.2004.1309431},\r
+ISSN={0098-3063},}\r
+\r
+@article{Zhang2005759,\r
+title = "An image encryption approach based on chaotic maps",\r
+journal = "Chaos, Solitons \& Fractals",\r
+volume = "24",\r
+number = "3",\r
+pages = "759 - 765",\r
+year = "2005",\r
+note = "",\r
+issn = "0960-0779",\r
+doi = "10.1016/j.chaos.2004.09.035",\r
+author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"\r
+}\r
+\r
+@misc{Gray47,\r
+year=1953, \r
+author = "F. Gray",\r
+title = "Pulse code communication",\r
+note = "US Patent 2,632,058, March 17 1953,(filed November 13 1947)"}\r
+\r
+\r
+\r
+@article{10.1109/CIMSiM.2010.36,\r
+author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},\r
+title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},\r
+journal ={Computational Intelligence, Modelling and Simulation, International Conference on},\r
+volume = {0},\r
+isbn = {978-0-7695-4262-1},\r
+year = {2010},\r
+pages = {15-20},\r
+doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},\r
+publisher = {IEEE Computer Society},\r
+address = {Los Alamitos, CA, USA},\r
+}\r
+\r
+@INPROCEEDINGS{4634274,\r
+author={Qingzhong Liu and Sung, A.H. and Ribeiro, B.M. and Ferreira, R.},\r
+booktitle={Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on}, title={Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting},\r
+year={2008},\r
+month=june,\r
+volume={},\r
+number={},\r
+pages={3352 -3357},\r
+keywords={Fisher linear discriminant;JPEG images;discrete cosine transforms;expanded Markov features;feature reduction;feature selection;polynomial fitting;principal component analysis;singular value decomposition;steganalysis;Markov processes;discrete cosine transforms;image coding;principal component analysis;singular value decomposition;steganography;},\r
+doi={10.1109/IJCNN.2008.4634274},\r
+ISSN={1098-7576},}\r
+\r
+@INPROCEEDINGS{guyeux10ter,\r
+ author = {Bahi, Jacques and Guyeux, Christophe},\r
+ title = {A new chaos-based watermarking algorithm},\r
+ booktitle = {SECRYPT'10, Int. conf. on security and cryptography},\r
+ year = {2010},\r
+ pages = {455--458},\r
+ address = {Athens, Greece},\r
+ month = jul,\r
+ publisher = {SciTePress},\r
+ classement = {ACTI},\r
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
+ equipe = {and},\r
+ inhal = {no}\r
+}\r
+\r
+@ARTICLE{Banks92,\r
+ author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},\r
+ title = {On Devaney's Definition of Chaos},\r
+ journal = {Amer. Math. Monthly},\r
+ year = {1992},\r
+ volume = {99},\r
+ pages = {332--334},\r
+ keywords = {(c+),},\r
+ owner = {guyeux},\r
+ timestamp = {27/01/2008}\r
+}\r
+\r
+@BOOK{devaney,\r
+ title = {An Introduction to Chaotic Dynamical Systems},\r
+ publisher = {Addison-Wesley},\r
+ year = {1989},\r
+ author = {Devaney, Robert L.},\r
+ address = {Redwood City, CA},\r
+ edition = {2nd}\r
+}\r
+\r
+@ARTICLE{guyeux09,\r
+ author = {Bahi, Jacques M. and Guyeux, Christophe},\r
+ title = {Hash Functions Using Chaotic Iterations},\r
+ journal = {Journal of Algorithms \& Computational Technology},\r
+ year = {2010},\r
+ volume = {4},\r
+ pages = {167--181},\r
+ number = {2},\r
+ classement = {ACLNI},\r
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
+ equipe = {and},\r
+ impact-factor = {#},\r
+ inhal = {no},\r
+ isi-acro = {#}\r
+}\r
+\r
+@PHDTHESIS{GuyeuxThese10,\r
+ author = {Christophe Guyeux},\r
+ title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}\r
+ en s\'{e}curit\'{e} informatique},\r
+ school = {Universit\'{e} de Franche-Comt\'{e}},\r
+ year = {2010},\r
+ owner = {christophe},\r
+ timestamp = {2010.12.21}\r
+}\r
+\r
+@INPROCEEDINGS{gfb10:ip,\r
+ author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},\r
+ title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},\r
+ booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and\r
+ Multimedia Signal Processing},\r
+ year = {2010},\r
+ pages = {208--211},\r
+ address = {Darmstadt, Germany},\r
+ month = oct,\r
+ classement = {ACTI},\r
+ domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
+ equipe = {and},\r
+ inhal = {no}\r
+}\r
+\r
+@ARTICLE{Adler65,\r
+ author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},\r
+ title = {Topological entropy},\r
+ journal = {Trans. Amer. Math. Soc.},\r
+ year = {1965},\r
+ volume = {114},\r
+ pages = {309-319},\r
+ owner = {guyeux},\r
+ timestamp = {2008.05.29}\r
+}\r
+\r
+@ARTICLE{Bowen,\r
+ author = {R. Bowen},\r
+ title = {Entropy for group endomorphisms and homogeneous spaces},\r
+ journal = {Trans. Amer. Math. Soc.},\r
+ year = {1971},\r
+ volume = {153},\r
+ pages = {401-414},\r
+ owner = {guyeux},\r
+ timestamp = {15/02/2008}\r
+}\r
+\r
+@ARTICLE{Xiao10,\r
+ author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},\r
+ title = {A novel Hash algorithm construction based on chaotic neural network},\r
+ journal = {Neural Computing and Applications},\r
+ year = {2010},\r
+ pages = {1-9},\r
+ affiliation = {Chongqing University College of Computer Science 400044 Chongqing\r
+ China},\r
+ issn = {0941-0643},\r
+ keyword = {Computer Science},\r
+ publisher = {Springer London}\r
+}\r
+\r
+@article{10.1109/ICME.2003.1221665,\r
+author = {Liu Shaohui and Yao Hongxun and Gao Wen},\r
+title = {Neural network based steganalysis in still images},\r
+journal ={Multimedia and Expo, IEEE International Conference on},\r
+volume = {2},\r
+isbn = {0-7803-7965-9},\r
+year = {2003},\r
+pages = {509-512},\r
+doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},\r
+publisher = {IEEE Computer Society},\r
+address = {Los Alamitos, CA, USA},\r
+}\r
+\r
+@inproceedings{bgs11:ip,\r
+inhal = {no},\r
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},\r
+equipe = {and},\r
+classement = {ACTI},\r
+author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},\r
+title = {Building a Chaotic Proven Neural Network},\r
+booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},\r
+pages = {***--***},\r
+address = {Maldives, Maldives},\r
+month = may,\r
+year = 2011,\r
+}
\ No newline at end of file