×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [11]
西安光学精密机械研究... [2]
兰州大学 [1]
上海电子信息职业技术... [1]
内容类型
期刊论文 [15]
发表日期
2022 [1]
2020 [2]
2019 [1]
2016 [4]
2015 [2]
2014 [3]
更多...
学科主题
artificial... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Unsupervised Balanced Hash Codes Learning With Multichannel Feature Fusion
期刊论文
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2022, 卷号: 15, 页码: 2816-2825
作者:
Chen, Yaxiong
;
Zhao, Dongjie
;
Lu, Xiongbo
;
Xiong, Shengwu
;
Wang, Huangting
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/05/07
Feature extraction
Codes
Data mining
Convolution
Linear programming
Approximation algorithms
Semantics
Deep hash codes
multichannel feature fusion
multiscale context information
unsupervised hashing learning
Siamese Dilated Inception Hashing With Intra-Group Correlation Enhancement for Image Retrieval
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 卷号: 31, 期号: 8, 页码: 3032-3046
作者:
Lu, Xiaoqiang
;
Chen, Yaxiong
;
Li, Xuelong
收藏
  |  
浏览/下载:51/0
  |  
提交时间:2020/09/04
Correlation
Hash functions
Semantics
Training
Approximation algorithms
Convolution
Image retrieval
Category-level semantics
deep hashing
image retrieval
multi-scale contextual information
An encrypted speech retrieval scheme based on long short-term memory neural network and deep hashing
期刊论文
KSII Transactions on Internet and Information Systems, 2020, 卷号: 14, 期号: 6, 页码: 2612-2633
作者:
Zhang, Qiu-Yu
;
Li, Yu-Zhou
;
Hu, Ying-Jie
收藏
  |  
浏览/下载:68/0
  |  
提交时间:2020/11/14
Brain
Cryptography
Data privacy
Efficiency
Hamming distance
Speech
Distance algorithm
Hashing algorithms
High-level features
Hyper-chaotic systems
Privacy and security
Retrieval accuracy
Retrieval efficiency
Sensitive informations
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/06/16
image coding
DNA
statistical analysis
cryptography
image processing
entropy
random sequences
chaos
chaotic communication
image encryption algorithm
image hashing
improved chaotic mapping
image features
fingerprint image
binary hash sequence
generated hash sequence
improved chaotic map
Chen's chaotic system
encryption algorithms
Unsupervised discriminative hashing
期刊论文
Journal of Visual Communication and Image Representation, 2016, 卷号: 40, 页码: 847-851
作者:
Zhan, Kun
;
Guan, Junpeng
;
Yang, Yi
;
Wu, Qun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/01/16
Hash functions
Artificial intelligence
Codes (symbols)
Image retrieval
Learning algorithms
Learning systems
Matrix algebra
Nearest neighbor search
Discriminant informations
Hashing algorithms
Learning methods
Manifold learning
Objective functions
Out-of-sample extension
Out-of-sample extrapolations
Unsupervised discriminative hashing
An improved bipolar quantization-based high-capacity watermarking algorithm for speech perceptual hashing authentication system
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2016, 卷号: 7, 期号: 5, 页码: 1126-1135
作者:
Zhang, Qiu-Yu
;
Yu, Shuang
;
Hu, Wen-Jin
;
Qiao, Si-Bin
;
Zhang, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Authentication
Digital watermarking
Embeddings
Speech
Authentication systems
Bipolar quantization
Embedding capacity
Perceptual hashing
Quantitative objectives
Quantization-based watermarking
Speech watermarking
Watermarking algorithms
Security authentication method of speech perceptual hashing based on fuzzy commitment scheme
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 229-240
作者:
Zhang, Qiu-Yu
;
Ren, Zhan-Wei
;
Huang, Yi-Bo
;
Shuang, Yu
;
Hu, Wen-Jin
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Algorithms
Authentication
Delta functions
Speech
Authentication algorithm
Fuzzy commitment
Multimedia security
Original algorithms
Perceptual hashing
Security
Security authentication
Speech information
Security analysis of speech perceptual hashing authentication algorithm
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 103-118
作者:
Zhang, Qiu-Yu
;
Ren, Zhan-Wei
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Shuang, Yu
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Cryptography
Security systems
Authentication algorithm
Content integrity
Encrypted algorithms
Identity authentication
Perceptual hashing
Secret key
Security analysis
Unicity distances
An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2015, 卷号: 6, 期号: 6, 页码: 1231-1241
作者:
Zhang, Qiu-Yu
;
Yu, Shuang
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Ren, Zhan-Wei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Audio watermarking
Authentication
Codes (symbols)
Embeddings
Mapping
Quantization (signal)
Speech
Speech transmission
Bipolar quantization
Blind watermarking scheme
Logistic mapping
Perceptual hashing
Phase coding
Quantitative identification
Speech watermarking
Watermarking algorithms
Research on algorithm of robust speech perceptual hashing for time-frequency domain based on hilbert transform
期刊论文
International Journal of Innovative Computing, Information and Control, 2015, 卷号: 11, 期号: 4, 页码: 1191-1204
作者:
Zhang, Qiuyu
;
Yang, Zhongping
;
Zhang, Qianyun
;
Huang, Yibo
;
Xing, Pengfei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Audio signal processing
Authentication
Discrete cosine transforms
Frequency domain analysis
Low pass filters
Speech
White noise
Hashing algorithms
Hilbert transform
Perceptual feature
Perceptual hashing
Speech content
Tamper localization
Time frequency domain
White Gaussian Noise
©版权所有 ©2017 CSpace - Powered by
CSpace