×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [5]
自动化研究所 [4]
清华大学 [3]
北京大学 [3]
山东师范大学 [3]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [19]
会议论文 [10]
其他 [2]
SCI/SSCI论文 [1]
会议 [1]
学位论文 [1]
更多...
发表日期
2022 [1]
2020 [2]
2019 [2]
2018 [3]
2017 [2]
2016 [3]
更多...
学科主题
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共34条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Multi-Level Correlation Adversarial Hashing for Cross-Modal Retrieval
期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 卷号: 22, 期号: 12, 页码: 3101-3114
作者:
Ma, Xinhong
;
Zhang, Tianzhu
;
Xu, Changsheng
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/03/01
Semantics
Correlation
Aircraft propulsion
Deep learning
Bridges
Aircraft
Task analysis
Cross-modal retrieval
adversarial hashing
multi-level correlation
Multi-format speech BioHashing based on spectrogram
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 33-34, 页码: 24889-24909
作者:
Huang, Yi-bo
;
Wang, Yong
;
Zhang, Qiu-yu
;
Zhang, Wei-zhao
;
Fan, Man-hong
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Authentication
Chaotic systems
Discrete cosine transforms
Eigenvalues and eigenfunctions
Factorization
Spectrographs
Authentication algorithm
Nonnegative matrix factorization
Real time performance
Security problems
Speech perception
Strong robustness
Two dimensional discrete cosine transform
Unidirectionality
Non-Cooperative Game of Throughput and Hash Length for Adaptive Merkle Tree in Mobile Wireless Networks
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 卷号: 68, 页码: 4625-4650
作者:
Sun, Zemin
;
Liu, Yanheng
;
Wang, Jian
;
Mei, Fang
;
Deng, Weiwen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Mobile wireless network
Merkle tree
throughput
hash length
Nash equilibrium
An efficient retrieval algorithm of encrypted speech based on inverse fast Fourier transform and measurement matrix
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 卷号: 27, 期号: 3, 页码: 1719-1736
作者:
Zhang, Qiuyu
;
Ge, Zixian
;
Zhou, Liang
;
Zhang, Yongbing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/15
Encrypted speech retrieval
perceptual hashing
inverse fast Fourier transform
measurement matrix
Henon chaotic scrambling
speech feature extraction
Reversible data hiding in encrypted image with separable capability and high embedding capacity
期刊论文
INFORMATION SCIENCES, 2018, 卷号: 465, 页码: 285-304
作者:
Qin, Chuan
;
He, Zhihong
;
Luo, Xiangyang
;
Dong, Jing
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2019/07/12
Reversible data hiding
Encrypted image
Embedding rate
Image quality
Hash length: a neglected element
期刊论文
Multimedia Tools and Applications, 2018, 页码: 1-20
作者:
Qi H.
;
Li J.
;
Wu Q.
;
Wan W.
;
Sun J.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Hash length
Optimal length
Probabilities of collision (PoC)
Hash length: a neglected element
期刊论文
2018, 页码: 1-20
作者:
Qi, Haifeng[1,2]
;
Li, Jing[1,3]
;
Wu, Qiang[3]
;
Wan, Wenbo[1,4]
;
Sun, Jiande[1,4]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
A Fast and Memory-Efficient Approach to NDN Name Lookup
期刊论文
CHINA COMMUNICATIONS, 2017, 卷号: 14, 期号: 10, 页码: 61-69
作者:
He, Dacheng
;
Zhang, Dafang
;
Xu, Ke
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/12
named data networking
binary search of hash table
bloom filter
Detecting Complex Indels with Wide Length-Spectrum from the Third Generation Sequencing Data
会议论文
作者:
Zhang, Xuanping
;
Chen, Hengwei
;
Zhang, Rong
;
Pei, Jingwen
;
Wang, Yixuan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
complex indel
the third generation sequencing data
detection method
Structural variation
hash-tabel based algorithm
©版权所有 ©2017 CSpace - Powered by
CSpace