Memory-Dependent Event-Trigger Scheme for Secure Control of Memristive Neural Networks: Dealing With Deception Attacks.
Yingjie FanXia HuangZhen WangPublished in: IEEE Trans. Ind. Informatics (2024)
Keyphrases
- neural network
- chosen plaintext
- authentication scheme
- security flaws
- security protocols
- secure routing
- cryptographic protocols
- secure communication
- remote user authentication scheme
- security mechanisms
- event detection
- secret sharing
- key distribution
- control system
- stream cipher
- auto associative
- secret sharing scheme
- authentication protocol
- standard model
- security analysis
- key management
- public key encryption
- back propagation
- security requirements
- countermeasures
- security measures
- blind signature
- associative memory
- ad hoc networks
- smart card
- fuzzy logic