{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T05:27:43Z","timestamp":1731734863384,"version":"3.28.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFE0135700"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2018209358"],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Intell. and Converged Netw."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.23919\/icn.2023.0026","type":"journal-article","created":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T20:11:13Z","timestamp":1704139873000},"page":"313-325","source":"Crossref","is-referenced-by-count":0,"title":["CNNs-Based End-to-End Asymmetric Encrypted Communication System"],"prefix":"10.23919","volume":"4","author":[{"given":"Yongli","family":"An","sequence":"first","affiliation":[{"name":"College of Artificial Intelligence, North China University of Science and Technology,Tangshan,China,063210"}]},{"given":"Zebing","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, North China University of Science and Technology,Tangshan,China,063210"}]},{"given":"Haoran","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, North China University of Science and Technology,Tangshan,China,063210"}]},{"given":"Zhanlin","family":"Ji","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, North China University of Science and Technology,Tangshan,China,063210"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s41870-018-0197-x"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1155\/2022\/3229294"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MWC.2019.1800601"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TWC.2020.3042074"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/INFOCOM42981.2021.9488834"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SPAWC.2019.8815483"},{"key":"ref7","article-title":"KO codes: Inventing nonlinear encoding and decoding for reliable wireless communication via deep-learning","author":"Makkuva","year":"2021","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2020.3002915"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TWC.2020.2970707"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2021.3101364"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TCCN.2021.3061464"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TCCN.2022.3161936"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ACCESS.2023.3245330"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TCCN.2017.2758370"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/JPROC.2017.2780172"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/DYSPAN.2010.5457897"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSAC.2013.130914"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/JSAC.2018.2825079"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ITW.2013.6691222"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ACCESS.2019.2909298"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/IJCNN.2006.246972"},{"key":"ref22","article-title":"Learning to protect communications with adversarial neural cryptography","author":"Abadi","year":"2016","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MWC.001.2000005"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.phycom.2021.101282"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.aeue.2022.154297"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/978-1-4419-1385-2_1"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ICCSEE.2012.373"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3549993.3550007"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/584091.584093"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/INMIC50486.2020.9318195"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ICCV48922.2021.00041"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3578938"}],"container-title":["Intelligent and Converged Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9195266\/10379046\/10379056.pdf?arnumber=10379056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T18:54:07Z","timestamp":1731696847000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10379056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.23919\/icn.2023.0026","relation":{},"ISSN":["2708-6240"],"issn-type":[{"type":"electronic","value":"2708-6240"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}