These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

64 related articles for article (PubMed ID: 16605612)

  • 1. Genetic attack on neural cryptography.
    Ruttor A; Kinzel W; Naeh R; Kanter I
    Phys Rev E Stat Nonlin Soft Matter Phys; 2006 Mar; 73(3 Pt 2):036121. PubMed ID: 16605612
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Dynamics of neural cryptography.
    Ruttor A; Kinzel W; Kanter I
    Phys Rev E Stat Nonlin Soft Matter Phys; 2007 May; 75(5 Pt 2):056104. PubMed ID: 17677130
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Neural cryptography with feedback.
    Ruttor A; Kinzel W; Shacham L; Kanter I
    Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Apr; 69(4 Pt 2):046110. PubMed ID: 15169072
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Step to improve neural cryptography against flipping attacks.
    Zhou J; Xu Q; Pei W; He Z; Szu H
    Int J Neural Syst; 2004 Dec; 14(6):393-405. PubMed ID: 15714606
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cooperating attackers in neural cryptography.
    Shacham LN; Klein E; Mislovaty R; Kanter I; Kinzel W
    Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Jun; 69(6 Pt 2):066137. PubMed ID: 15244697
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A mathematical analysis of the effects of Hebbian learning rules on the dynamics and structure of discrete-time random recurrent neural networks.
    Siri B; Berry H; Cessac B; Delord B; Quoy M
    Neural Comput; 2008 Dec; 20(12):2937-66. PubMed ID: 18624656
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Neural Cryptography Based on Complex-Valued Neural Network.
    Dong T; Huang T
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4999-5004. PubMed ID: 31880562
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Public channel cryptography by synchronization of neural networks and chaotic maps.
    Mislovaty R; Klein E; Kanter I; Kinzel W
    Phys Rev Lett; 2003 Sep; 91(11):118701. PubMed ID: 14525461
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Approach to design neural cryptography: a generalized architecture and a heuristic rule.
    Mu N; Liao X; Huang T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Mathematical properties of neuronal TD-rules and differential Hebbian learning: a comparison.
    Kolodziejski C; Porr B; Wörgötter F
    Biol Cybern; 2008 Mar; 98(3):259-72. PubMed ID: 18196266
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure key-exchange protocol with an absence of injective functions.
    Mislovaty R; Perchenok Y; Kanter I; Kinzel W
    Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):066102. PubMed ID: 12513342
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Scaling properties of random walks on small-world networks.
    Almaas E; Kulkarni RV; Stroud D
    Phys Rev E Stat Nonlin Soft Matter Phys; 2003 Nov; 68(5 Pt 2):056105. PubMed ID: 14682844
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Effects of Hebbian learning on the dynamics and structure of random networks with inhibitory and excitatory neurons.
    Siri B; Quoy M; Delord B; Cessac B; Berry H
    J Physiol Paris; 2007; 101(1-3):136-48. PubMed ID: 18042357
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Local learning algorithm for optical neural networks.
    Qiao Y; Psaltis D
    Appl Opt; 1992 Jun; 31(17):3285-8. PubMed ID: 20725280
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Learning rule of homeostatic synaptic scaling: presynaptic dependent or not.
    Liu JK
    Neural Comput; 2011 Dec; 23(12):3145-61. PubMed ID: 21919784
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Successful attack on permutation-parity-machine-based neural cryptography.
    Seoane LF; Ruttor A
    Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Feb; 85(2 Pt 2):025101. PubMed ID: 22463268
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A numerical study of the critical line of Kauffman networks.
    Bastolla U; Parisi G
    J Theor Biol; 1997 Jul; 187(1):117-33. PubMed ID: 9236114
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Synchronization in a noise-driven developing neural network.
    Lin IH; Wu RK; Chen CM
    Phys Rev E Stat Nonlin Soft Matter Phys; 2011 Nov; 84(5 Pt 1):051923. PubMed ID: 22181460
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Combining Hebbian and reinforcement learning in a minibrain model.
    Bosman RJ; van Leeuwen WA; Wemmenhove B
    Neural Netw; 2004 Jan; 17(1):29-36. PubMed ID: 14690704
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Synaptic dynamics: linear model and adaptation algorithm.
    Yousefi A; Dibazar AA; Berger TW
    Neural Netw; 2014 Aug; 56():49-68. PubMed ID: 24867390
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 4.