1. Li, F., Xiaojian, W.: Intelligent network communication terminal information security simulation method. Comput. Simul. 37(5), 86–90 (2020)
2. Liu, S., Wang, S., Liu, X., Gandomi, A.H., Daneshmand, M., Muhammad, K., De Albuquerque, V.H.C.: Human memory update strategy: a multi-layer template update mechanism for remote visual monitoring. IEEE Trans. Multimedia, 23, 2188–2198 (2021)
3. Qing, W., Tao, L., Lei, W.C., Baoxiang, D.: An improved Logistic mapping and random noise voice encryption method. J. Natl. Sci. Heilongjiang Univ. 37(02), 240-246 (2020)
4. Liyun, X., Tao, Y., Yuhua, Q.: Audio encryption algorithm in fractional domain based on cascaded chaotic system. J. Comput. Appl. 41(09), 2623–2630 (2021)
5. Tikui, Z., Sensen, L., Bin, Y.: Research on speech-like signal synchronization scheme of encrypted communication in cellular mobile networks. J. Electron. Measure. Instrum. 34(01), 163-170 (2020)