×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [102]
武汉大学 [54]
清华大学 [40]
湖南大学 [40]
西安理工大学 [34]
软件研究所 [33]
更多...
内容类型
期刊论文 [424]
会议论文 [119]
学位论文 [86]
其他 [6]
专利 [1]
会议 [1]
更多...
发表日期
2021 [6]
2020 [10]
2019 [26]
2018 [47]
2017 [29]
2016 [54]
更多...
学科主题
computer s... [2]
Computer S... [1]
Computer S... [1]
Computer S... [1]
Informatio... [1]
artificial... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共638条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Two-layer partitioned and deletable deep bloom filter for large-scale membership query
期刊论文
INFORMATION SYSTEMS, 2023, 卷号: 119, 页码: 13
作者:
Zeng, Meng
;
Zou, Beiji
;
Zhang, Wensheng
;
Yang, Xuebing
;
Kong, Guilan
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2023/11/16
Learned bloom filter
Membership query
Deep learning
K-means cluster
Perfect hash function
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:
Li Duan
;
Yangyang Sun
;
Wei Ni
;
Weiping Ding
;
Jiqiang Liu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2023/07/20
Blockchain
cross-chain
defense
distributed private key control
hash-locking
notary
security threats
sidechain/relay
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Unsupervised Balanced Hash Codes Learning With Multichannel Feature Fusion
期刊论文
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2022, 卷号: 15, 页码: 2816-2825
作者:
Chen, Yaxiong
;
Zhao, Dongjie
;
Lu, Xiongbo
;
Xiong, Shengwu
;
Wang, Huangting
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/05/07
Feature extraction
Codes
Data mining
Convolution
Linear programming
Approximation algorithms
Semantics
Deep hash codes
multichannel feature fusion
multiscale context information
unsupervised hashing learning
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Deep video code for efficient face video retrieval
期刊论文
PATTERN RECOGNITION, 2021, 卷号: 113, 页码: 11
作者:
Qiao, Shishi
;
Wang, Ruiping
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2021/12/01
Face video retrieval
Temporal feature pooling
Bounded triplet loss
Deep video code
Hash learning
A Stateful Bloom Filter for Per-Flow State Monitoring
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 卷号: 8, 期号: 2, 页码: 1399-1413
作者:
Xie, Kun
;
Pei, Shuyu
;
Wang, Xin
;
Shi, Wen
;
Xie, Gaogang
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/12/01
Monitoring
High-speed networks
Standards
IP networks
Indexes
Hash functions
Arrays
Bloom filter
per-flow state monitoring
Adversarial Binary Mutual Learning for Semi-Supervised Deep Hashing
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Wang, Guanan
;
Hu, Qinghao
;
Yang, Yang
;
Cheng, Jian
;
Hou, Zeng-Guang
收藏
  |  
浏览/下载:47/0
  |  
提交时间:2022/01/27
Data models
Semantics
Force
Computational modeling
Hash functions
Binary codes
Training data
Adversarial learning (AL)
deep learning
hashing
Deep Bayesian Hashing With Center Prior for Multi-Modal Neuroimage Retrieval
期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2021, 卷号: 40, 期号: 2, 页码: 503-513
作者:
Yang, Erkun
;
Liu, Mingxia
;
Yao, Dongren
;
Cao, Bing
;
Lian, Chunfeng
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2021/03/29
Semantics
Bayes methods
Hash functions
Image retrieval
Visualization
Correlation
Deep Bayesian hashing
retrieval
multi-modal neuroimage
MRI
PET
©版权所有 ©2017 CSpace - Powered by
CSpace