CORC

浏览/检索结果: 共10条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing 期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:  Zhang, Qiu-yu;  Bai, Jian;  Xu, Fu-jiu
收藏  |  浏览/下载:31/0  |  提交时间:2022/06/20
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:  Li, Yuxing;  Pang, Liaojun;  Zhao, Heng;  Cao, Zhicheng;  Liu, Eryun
收藏  |  浏览/下载:43/0  |  提交时间:2022/03/17
Adversarial Binary Mutual Learning for Semi-Supervised Deep Hashing 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Wang, Guanan;  Hu, Qinghao;  Yang, Yang;  Cheng, Jian;  Hou, Zeng-Guang
收藏  |  浏览/下载:47/0  |  提交时间:2022/01/27
Deep Bayesian Hashing With Center Prior for Multi-Modal Neuroimage Retrieval 期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2021, 卷号: 40, 期号: 2, 页码: 503-513
作者:  Yang, Erkun;  Liu, Mingxia;  Yao, Dongren;  Cao, Bing;  Lian, Chunfeng
收藏  |  浏览/下载:44/0  |  提交时间:2021/03/29
Siamese Dilated Inception Hashing With Intra-Group Correlation Enhancement for Image Retrieval 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 卷号: 31, 期号: 8, 页码: 3032-3046
作者:  Lu, Xiaoqiang;  Chen, Yaxiong;  Li, Xuelong
收藏  |  浏览/下载:53/0  |  提交时间:2020/09/04
Deep High-order Supervised Hashing for Image Retrieval 会议论文
2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018-01-01
作者:  Cheng, Jingdong;  Sun, Qiule;  Zhang, Jianxin;  Wei, Xiaopeng;  Zhang, Qiang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/02
Unsupervised discriminative hashing 期刊论文
Journal of Visual Communication and Image Representation, 2016, 卷号: 40, 页码: 847-851
作者:  Zhan, Kun;  Guan, Junpeng;  Yang, Yi;  Wu, Qun
收藏  |  浏览/下载:7/0  |  提交时间:2017/01/16
Research on universal model of speech perceptual hashing authentication system in mobile environment 会议论文
Lanzhou, China, August 2, 2016 - August 5, 2016
作者:  Zhang, Qiu-Yu;  Hu, Wen-Jin;  Huang, Yi-Bo;  Qiao, Si-Bin
收藏  |  浏览/下载:15/0  |  提交时间:2020/11/15
Security authentication method of speech perceptual hashing based on fuzzy commitment scheme 期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 229-240
作者:  Zhang, Qiu-Yu;  Ren, Zhan-Wei;  Huang, Yi-Bo;  Shuang, Yu;  Hu, Wen-Jin
收藏  |  浏览/下载:17/0  |  提交时间:2020/11/14
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes 期刊论文
IET INFORMATION SECURITY, 2015, 卷号: 9, 页码: 277-283
作者:  Dong, Le;  Wang, Yanling;  Wu, Wenling;  Zou, Jian
收藏  |  浏览/下载:9/0  |  提交时间:2019/11/21


©版权所有 ©2017 CSpace - Powered by CSpace