{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:28:22Z","timestamp":1725668902644},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012592","name":"Innovation Program for Quantum Science and Technology","doi-asserted-by":"publisher","award":["2021ZD0303401"],"id":[{"id":"10.13039\/100012592","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Quantum Science Strategic Project of Guangdong Province","award":["GDZX2306004"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62375089","62471188"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"publisher","award":["2022A1515140139"],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3447242","type":"journal-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T23:18:03Z","timestamp":1724282283000},"page":"7879-7894","source":"Crossref","is-referenced-by-count":0,"title":["MA-DG: Learning Features of Sequences in Different Dimensions for Min-Entropy Evaluation via 2D-CNN and Multi-Head Self-Attention"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-3719-6972","authenticated-orcid":false,"given":"Yilong","family":"Huang","sequence":"first","affiliation":[{"name":"Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education), School of Physics, Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter, School of Physics, Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, and Guangdong-Hong Kong Joint Laboratory of Quantum Matter, South China Normal University, Guangzhou, China"}]},{"given":"Fan","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Chaofeng","family":"Huang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education), School of Physics, Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter, School of Physics, Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, and Guangdong-Hong Kong Joint Laboratory of Quantum Matter, South China Normal University, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5968-3518","authenticated-orcid":false,"given":"Haomiao","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering and the Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1537-1758","authenticated-orcid":false,"given":"Min","family":"Gu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education), School of Physics, Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter, School of Physics, Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, and Guangdong-Hong Kong Joint Laboratory of Quantum Matter, South China Normal University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250627"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/501672"},{"article-title":"A mathematical and physical analysis of circuit jitter with application to cryptographic random bit generation","year":"2005","author":"Coppock","key":"ref3"},{"key":"ref4","first-page":"768","article-title":"Various techniques used in connection with random digits","volume":"5","author":"Von Neumann","year":"1963","journal-title":"Appl. Math. Ser."},{"key":"ref5","first-page":"23","article-title":"True random number generators in configurable logic devices","author":"Fischer","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609966"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_18"},{"key":"ref9","first-page":"673","article-title":"Predicting, decrypting, and abusing WPA2\/802.11 group keys","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Security)","author":"Vanhoef"},{"volume-title":"Random Number CDROM Including the Diehard Battery of Tests of Randomness","year":"1995","author":"Marsaglia","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"volume-title":"NIST Special Publication 800-22","year":"2001","author":"Rukhin","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-90b"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0586-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3026724.3026730"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826448"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01704-0_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2947871"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850770"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/e22101134"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3240859"},{"volume-title":"An Introduction to Probability Theory and Its Applications: Volume","year":"1950","author":"Feller","key":"ref23"},{"key":"ref24","first-page":"3939","article-title":"Imaging time-series to improve classification and imputation","volume-title":"Proc. 24th Int. Conf. Artif. Intell.","author":"Wang"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.06.014"},{"article-title":"TimesNet: Temporal 2D-variation modeling for general time series analysis","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Wu","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC55942.2022.10004078"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref30","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"25","author":"Krizhevsky"},{"key":"ref31","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106437"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006788"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"ref37","first-page":"242","article-title":"Classification of time-series images using deep convolutional neural networks","volume-title":"Proc. 10th Int. Conf. Mach. Vis. (ICMV)","author":"Hatami"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.06.032"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003132"},{"volume-title":"RANDOM","year":"2023","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2023.3240087"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2023.3328060"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3226301"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.05.052"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109234"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10643187.pdf?arnumber=10643187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:09:05Z","timestamp":1725606545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10643187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3447242","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}