×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [9]
自动化研究所 [9]
北京大学 [8]
兰州理工大学 [8]
山东大学 [8]
华南理工大学 [7]
更多...
内容类型
期刊论文 [43]
会议论文 [35]
其他 [9]
学位论文 [9]
发表日期
2022 [4]
2021 [2]
2020 [2]
2019 [1]
2018 [5]
2017 [3]
更多...
学科主题
accidents ... [1]
computer a... [1]
computer t... [1]
data proce... [1]
photograph... [1]
space rese... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共96条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Pixel type classification based reversible data hiding for hyperspectral images
期刊论文
KNOWLEDGE-BASED SYSTEMS, 2022, 卷号: 254, 页码: 11
作者:
Fan, Guojun
;
Pan, Zhibin
;
Zhou, Quan
;
Dong, Jing
;
Zhang, Xiaoran
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/11/14
Hyperspectral images
Pixel classifying
Adaptive prediction
Three -components complexity
Reversible data hiding
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 25, 页码: 33615-33640
作者:
Huang, Yi-bo
;
Li, Hao
;
Wang, Yong
;
Xie, Yi-rong
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/10/14
Encrypted speech retrieval
Biometric template
BioHashing
K-means-KNN
Improved Marotto chaos measurement matrix
SPM chaotic map
Item Recommendation based on Multimedia Variational Autoencoder
会议论文
ELECTR NETWORK, OCT 10-11, 2020
作者:
Ran, Yu
;
Chen, Ziyu
;
Mu, Yilin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2021/12/17
Multimedia Variational Autoencoder
image compression
editor decoder
An encrypted speech retrieval scheme based on long short-term memory neural network and deep hashing
期刊论文
KSII Transactions on Internet and Information Systems, 2020, 卷号: 14, 期号: 6, 页码: 2612-2633
作者:
Zhang, Qiu-Yu
;
Li, Yu-Zhou
;
Hu, Ying-Jie
收藏
  |  
浏览/下载:74/0
  |  
提交时间:2020/11/14
Brain
Cryptography
Data privacy
Efficiency
Hamming distance
Speech
Distance algorithm
Hashing algorithms
High-level features
Hyper-chaotic systems
Privacy and security
Retrieval accuracy
Retrieval efficiency
Sensitive informations
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
Security analysis of a public key authenticated encryption with keyword search scheme
会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Wu, Jimmy Ming-Tai
;
Pan, Jeng-Shyang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/31
Constructing hierarchical spatiotemporal information for action recognition
会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:
Yao, Guangle
;
Zhong, Jiandan
;
Lei, Tao
;
Liu, Xianyuan
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2019/08/23
Big data
Convolution
Indexing (of information)
Network security
Neural networks
Optical flows
Security systems
Smart city
Trusted computing
©版权所有 ©2017 CSpace - Powered by
CSpace