Solution and dynamics analysis of fractal-fractional multi-scroll Chen chaotic system based on Adomain decomposition method

T Zhang, Y Zhao, X Xu, S Wu, Y Gu - Chaos, Solitons & Fractals, 2024 - Elsevier
In recent years, newly proposed fractal-fractional calculus operators have been used to
predict the chaotic behavior of some attractors, and the new operators can capture self …

Construction method and circuit design of a high-dimensional conservative chaotic system with binary linear combinations

H Pan, G Li, Y Gu, S Wu - Nonlinear Dynamics, 2024 - Springer
The conservative chaotic system without attractor can not be reconstructed by the attractor
reconstruction, which has certain advantages in the field of computer network security …

Finite-time Nonfragile Synchronization Control of Time-Varying Delays TS Fuzzy Discrete Chaotic Network Systems with Deception Attacks

X Wu, H Liu, Y Lu - IEEE Access, 2024 - ieeexplore.ieee.org
This article addresses the finite-time nonfragile synchronization control of time-varying
delays TS fuzzy discrete chaotic network systems (TSFDCNSs) with random deception …

Analysis and application of a 3D chaotic system with an extremely extensive range of amplitudes and offset boosting

S Shi, H Lu, C Du, Z Zhang, L Liu - Physica Scripta, 2025 - iopscience.iop.org
The study of high-dimensional chaotic systems has been the subject of considerable
research interest, whereas the complex characteristics of low-dimensional chaotic systems …

Design of Pseudorandom Sequence Generator Based on Cross-Coupled Chebyshev Lattice

W Su, L Zhang, Y Wang, L Zhu… - 2024 Asia-Pacific …, 2024 - ieeexplore.ieee.org
With the widespread adoption of the internet, humanity has entered an irreversible era of
information. Highquality pseudorandom numbers play a crucial role in ensuring secure …

Research on Nonlinear Programming Problems Based on Random Forest Model and Genetic Algorithm

Y Li, Y Qing, W Huang, K Qi, K Du… - 2024 Asia-Pacific …, 2024 - ieeexplore.ieee.org
In the realm of daily life planning, the challenge of optimizing decisions is frequently
encountered, with traditional methods often failing to achieve desired outcomes. To address …

Research on Sensitive Frame Recognition Algorithm for Home Monitoring Video Based on Mixture of Gaussians Background Modeling

Y Yin, J Zhang, L Zhu, G Li - … of the 8th International Conference on …, 2023 - dl.acm.org
Surveillance videos have become ubiquitous in our daily lives, and to mitigate the risk of
information leakage during the upload process to the cloud, privacy protection is of utmost …

Design and Application of Chaos Algorithm based on the Sprott-B System

B Zheng, T Li, W Xu, L Zhu - … of the 8th International Conference on …, 2023 - dl.acm.org
This article studies high-dimensional memristor chaotic systems and applies encryption
algorithms to image encryption to improve the security of encryption. Based on the Sprott-B …

Design and application of pseudo-random sequence base on logistic map

Q Pan, X Chen, L Luo, W Xu - 2023 - IET
Digital image is an important information carrier. In order to prevent information from being
stolen and leading to information leakage, it's very important to protect the digital image. This …