1. L. Zhang, J. Xu, P. Vijayakumar, P.K. Sharma, U. Ghosh, Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare system. IEEE Trans. Network Sci. Eng. (Early Access Article), 1–1 (2022)
2. M. Stöttinger, S.A. Huss, S. Mühlbach, A. Koch, Side-channel resistance evaluation of a neural network based lightweight cryptography scheme, in Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China (2010)
3. C. Zhang, Y. Yu, Y. Wang, Z. Han, M. Zhou, Chaotic neural network-based hysteresis modeling with dynamic operator for magnetic shape memory alloy actuator. IEEE Trans. Magn. 57(6), 1–8 (2021)
4. J. Vandewalle, B. Preneel, M. Csapodi, Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata, in Proceedings of Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359), London, UK (1998)
5. P.P. Hadke, S.G. Kale, Use of neural networks in cryptography: a review, in Proceedings of World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave), Coimbatore, India (2016)