×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [10]
沈阳自动化研究所 [4]
计算技术研究所 [3]
自动化研究所 [2]
重庆绿色智能技术研究... [1]
内容类型
期刊论文 [15]
会议论文 [4]
专利 [1]
发表日期
2020 [20]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
限定条件
发表日期:2020
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Biohashing encrypted speech retrieval based on chaotic measurement matrix
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 卷号: 48, 期号: 12, 页码: 32-37
作者:
Huang, Yibo
;
Wang, Yong
;
Zhang, Qiuyu
;
Chen, Tengfei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/02/17
Biometrics
Cryptography
Information retrieval
Privacy by design
Search engines
BioHashing
Biometric template
Chaotic measurements
Data leakage
Encrypted speech
Security and privacy
Speech features
Speech retrieval
LIGHTWEIGHT AUTHENTICATION METHOD SUPPORTING ANONYMOUS ACCESS OF HETEROGENEOUS TERMINAL IN EDGE COMPUTING SCENARIO
专利
申请日期: 2020-07-02,
作者:
Shang WL(尚文利)
;
Zeng P(曾鹏)
;
Chen CY(陈春雨)
;
Zhao JM(赵剑明)
;
Liu XD(刘贤达)
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/08/08
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:
Jiao, Zhenzhen
;
Zhang, Baoxian
;
Zhang, Li
;
Liu, Min
;
Gong, Wei
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2020/12/10
Blockchain
Ad hoc networks
Cloud computing
Smart contracts
Task analysis
Security
Computer architecture
EvoQ: Mixed Precision Quantization of DNNs via Sensitivity Guided Evolutionary Search
会议论文
Glasgow, United Kingdom, 19-24 July 2020
作者:
Yong Yuan
;
Chen Chen
;
Xiyuan Hu
;
Silong Peng
收藏
  |  
浏览/下载:66/0
  |  
提交时间:2020/10/27
evolutionary algorithm, mixed precision quantization, network compression, deep learning
An encrypted speech retrieval scheme based on long short-term memory neural network and deep hashing
期刊论文
KSII Transactions on Internet and Information Systems, 2020, 卷号: 14, 期号: 6, 页码: 2612-2633
作者:
Zhang, Qiu-Yu
;
Li, Yu-Zhou
;
Hu, Ying-Jie
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2020/11/14
Brain
Cryptography
Data privacy
Efficiency
Hamming distance
Speech
Distance algorithm
Hashing algorithms
High-level features
Hyper-chaotic systems
Privacy and security
Retrieval accuracy
Retrieval efficiency
Sensitive informations
Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
期刊论文
CHINA COMMUNICATIONS, 2020, 卷号: 17, 期号: 6, 页码: 153-163
作者:
Cao, Laicheng
;
Kang, Yifan
;
Wu, Qirui
;
Wu, Rong
;
Guo, Xian
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/03/01
cloud storage
dynamic update
keywords search
policy hidden
Data Security and Privacy Challenges of Computing Offloading in FINs
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 14-20
作者:
Wang, Fei
;
Diao, Boyu
;
Sun, Tao
;
Xu, Yongjun
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Task analysis
Cloud computing
Data privacy
Edge computing
Smart homes
Data security
AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 70604-70615
作者:
Yang, Caixia
;
Tan, Liang
;
Shi, Na
;
Xu, Bolei
;
Cao, Yang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/12/10
Cloud computing
Authorization
Privacy
Distributed databases
Cloud computing
cloud security
access control
blockchain
privacy protection
Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 6, 页码: 1511-1527
作者:
Haiyan Zhao
;
Jing Yan
;
Xiaoyuan Luo
;
Xinping Guan
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/03/11
Asynchronous clock
localization
privacy preservation
underwater sensor networks (USNs)
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
作者:
Bai, Yanan
;
Shi, Xiaoyu
;
Wu, Wenyuan
;
Chen, Jingwei
;
Feng, Yong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/08/24
Encryption
Data privacy
Cloud computing
Lattices
Machine learning
Computational efficiency
Homomorphic encryption
matrix computation
machine learning
GSW encryption scheme
big data
privacy protection
©版权所有 ©2017 CSpace - Powered by
CSpace