×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [18]
内容类型
期刊论文 [10]
会议论文 [8]
发表日期
2014 [1]
2013 [1]
2012 [1]
2011 [3]
2010 [1]
2009 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共18条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Speech perception hash authentication algorithm based on immittance spectral Pairs
会议论文
Changsha, China, April 18, 2014 - April 20, 2014
作者:
Huang, Yi Bo
;
Zhang, Qiu Yu
;
Yuan, Zhan Ting
;
Xing, Peng Fei
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2020/11/15
Authentication
Factorization
Intelligent systems
Robustness (control systems)
Speech
Authentication algorithm
CMVN
ISP
Mean and variance normalizations
NMF
Nonnegative matrix factorization
Perceptual hashing
Real time requirement
Algorithm for evaluating speech perceptual hash similarity after slight tampering occurs
期刊论文
Information Technology Journal, 2013, 卷号: 12, 期号: 16, 页码: 3591-3595
作者:
Huang, Yi-Bo
;
Zhang, Qiu-Yu
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Hash functions
Speech
Speech recognition
Correlation coefficient
Evaluating
Perceptual hash
Quality change
Real-time properties
Similarity
Similarity evaluation
Slight tampering occurs
A dither modulation audio watermarking algorithm based on HAS
期刊论文
Research Journal of Applied Sciences, Engineering and Technology, 2012, 卷号: 4, 期号: 21, 页码: 4206-4211
作者:
Huang, Yi-Bo
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Audition
Binary sequences
Discrete wavelet transforms
Image watermarking
Low pass filters
Modulation
Signal reconstruction
Adaptive
Blind extraction
Digital sequence
Dither modulation
Human auditory system
Low-pass filtering
Quantization step
Watermarking algorithms
A Hybrid Model Of Cross-domain Authentication For Password Synchronization
会议论文
作者:
Zhang Qiu-yu
;
Cai Zhi-peng
;
Yuan Zhan-ting
;
Miao Feng-man
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/11/15
cross-domain authentication
password synchronization
HCTP
hybrid model of cross-domain
A hybrid model of cross-domain authentication for password synchronization
会议论文
作者:
Zhang, Qiu-Yu
;
Cai, Zhi-Peng
;
Yuan, Zhan-Ting
;
Miao, Feng-Man
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Distributed computer systems
Scalability
Synchronization
Cross-domain
Cross-domain authentication
HCTP
Hybrid model
Kerberos
Key technologies
Transport protocols
Application of game theory for email feature selection
期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 1, 页码: 95-99
作者:
Sun, Jing-Tao
;
Zhang, Qiu-Yu
;
Yuan, Zhan-Ting
;
Dong, Jian-She
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Blending
Electronic mail
Fuzzy clustering
Game theory
Information filtering
Mail handling
Membership functions
Category discrimination
Chinese spam
Feature selection methods
Fuzzy membership
Fuzzy membership function
Handling capacity
Practical problems
Selection model
Studies on the semantic body-based spam filtering
会议论文
作者:
Zhang, Qiu-Yu
;
Yang, Hui-Juan
;
Yuan, Zhan-Ting
;
Sun, Jing-Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/15
Electronic mail
Email filtering
ITS applications
Semantic bodies
Semantic element
Semantic units
Sentence similarity
Similarity analysis
Spam filtering
Detection algorithm of LSB hidden messages based local image stability
期刊论文
Tongxin Xuebao/Journal on Communications, 2009, 卷号: 30, 期号: 11 A, 页码: 37-43
作者:
Zhang, Qiu-Yu
;
Liu, Hong-Guo
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/11/14
Digital watermarking
Embeddings
Steganography
Water pollution
Detection algorithm
Embedding rates
Image stability
Information transmission
LSB embedding
Secret information
Steganalysis
Theoretic analysis
Identity-base group key management scheme in ad-hoc
期刊论文
Tongxin Xuebao/Journal on Communications, 2009, 卷号: 30, 期号: 10 A, 页码: 85-92
作者:
Zhang, Qiu-Yu
;
Miao, Feng-Man
;
Yuan, Zhan-Ting
;
Wang, Rui-Fang
;
Zhang, Qi-Kun
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Public key cryptography
Expandability
Grid
Group key management
High connectivity
Key management
Logical structure
Server nodes
Weil pairing
Research of anti-spam application architecture based on semantic grid
会议论文
Kumamoto, Japan, September 5, 2007 - September 7, 2007
作者:
Yuan, Zhan-Ting
;
Zhang, Qiu-Yu
;
Li, Dan
;
Liu, Ye
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Network architecture
Problem solving
Semantic Web
Spamming
Anti-spam application architecture
Network structure
Nuclear technology
Semantic grid
©版权所有 ©2017 CSpace - Powered by
CSpace