CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Replay attack detection based on distortion by loudspeaker for voice authentication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:  Ren, Yanzhen;  Fang, Zhong;  Liu, Dengkai;  Chen, Changwen
收藏  |  浏览/下载:43/0  |  提交时间:2019/08/16
Color image encryption algorithm based on customized globally coupled map lattices 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 6191-6209
作者:  Wang, Xingyuan;  Qin, Xiaomeng;  Liu, Chuanming
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/02
A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System 期刊论文
Multimedia Tools and Applications, 2019
作者:  Pan, Shuang;  Wei, Jianguo;  Hu, Shaobo
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Detection and Localization of Image Tamper with Scalable Granularity 其他
2019-01-01
作者:  Xie, Yi;  Ding, Wenjia;  Wang, Yulin
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
Space-domain dimming control scheme based on SCFDM for visible light communications 期刊论文
2019, 卷号: 433, 页码: 18
作者:  Zhang, Tiantian[1];  Zhou, Ji[2];  Zhang, Zhenshan[1];  Lu, Yueming[3];  Su, Fei[4]
收藏  |  浏览/下载:16/0  |  提交时间:2019/12/17
Supervised deep hashing for image content security 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 1, 页码: 661-676
作者:  Ma, Yanping;  Yang, Dongbao;  Xie, Hongtao;  Yin, Jian
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Person re-identification with multiple similarity probabilities using deep metric learning for efficient smart security applications 期刊论文
Journal of Parallel and Distributed Computing, 2019, 卷号: 132, 页码: 230-241
作者:  Xiong, Mingfu;  Chen, Dan*;  Chen, Jun*;  Chen, Jingying;  Shi, Benyun
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/23
Security analysis of a public key authenticated encryption with keyword search scheme 会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:  Wu, Tsu-Yang;  Chen, Chien-Ming;  Wang, King-Hang;  Wu, Jimmy Ming-Tai;  Pan, Jeng-Shyang
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/31
On the security of a three factor remote user authentication scheme using fuzzy extractor 会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:  Chen, Chien-Ming;  Huang, Yanyu;  Deng, Xiaoting;  Wu, Tsu-Yang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace