×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [120]
重庆大学 [86]
北京大学 [82]
软件研究所 [81]
兰州理工大学 [79]
武汉大学 [72]
更多...
内容类型
期刊论文 [771]
会议论文 [242]
学位论文 [149]
其他 [45]
专利 [6]
会议 [2]
更多...
发表日期
2022 [10]
2021 [15]
2020 [26]
2019 [43]
2018 [78]
2017 [64]
更多...
学科主题
Computer S... [3]
computer s... [3]
计算机应用 [3]
Computer S... [2]
Computer S... [2]
computer s... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共1217条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Accurate Implicit Neural Mapping With More Compact Representation in Large-Scale Scenes Using Ranging Data
期刊论文
IEEE ROBOTICS AND AUTOMATION LETTERS, 2023, 卷号: 8, 期号: 10, 页码: 6683-6690
作者:
Shi, Chenhui
;
Tang, Fulin
;
Wu, Yihong
;
Jin, Xin
;
Ma, Gang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/16
Implicit neural mapping
large-scale scenes
ranging data
Two-layer partitioned and deletable deep bloom filter for large-scale membership query
期刊论文
INFORMATION SYSTEMS, 2023, 卷号: 119, 页码: 13
作者:
Zeng, Meng
;
Zou, Beiji
;
Zhang, Wensheng
;
Yang, Xuebing
;
Kong, Guilan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/16
Learned bloom filter
Membership query
Deep learning
K-means cluster
Perfect hash function
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:
Li Duan
;
Yangyang Sun
;
Wei Ni
;
Weiping Ding
;
Jiqiang Liu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/20
Blockchain
cross-chain
defense
distributed private key control
hash-locking
notary
security threats
sidechain/relay
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
期刊论文
SENSORS, 2022, 卷号: 22, 期号: 17
作者:
Wu, Yi
;
Feng, Tao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/09/22
smart lighting control
EnOcean protocol
colored Petri net
Dolev-Yao attacker model
Self-Training Based Semi-Supervised and Semi-Paired Hashing Cross-Modal Retrieval
会议论文
Padua, Italy, 2022-07
作者:
Rongrong Jing
;
Hu Tian
;
Xingwei Zhang
;
Gang Zhou
;
Xiaolong Zheng
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/06/17
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
高效抗合谋攻击分布式机器学习隐私保护方案
期刊论文
华中科技大学学报(自然科学版), 2022, 卷号: 50, 期号: 5, 页码: 1-7
作者:
曹来成
;
吴琪瑞
;
吴蓉
;
郭显
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/04/21
机器学习
分布式系统
抗合谋攻击
云存储
差分隐私
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Unsupervised Balanced Hash Codes Learning With Multichannel Feature Fusion
期刊论文
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2022, 卷号: 15, 页码: 2816-2825
作者:
Chen, Yaxiong
;
Zhao, Dongjie
;
Lu, Xiongbo
;
Xiong, Shengwu
;
Wang, Huangting
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/05/07
Feature extraction
Codes
Data mining
Convolution
Linear programming
Approximation algorithms
Semantics
Deep hash codes
multichannel feature fusion
multiscale context information
unsupervised hashing learning
©版权所有 ©2017 CSpace - Powered by
CSpace