×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [63]
自动化研究所 [40]
厦门大学 [20]
清华大学 [17]
北京大学 [16]
软件研究所 [13]
更多...
内容类型
期刊论文 [171]
会议论文 [57]
学位论文 [39]
其他 [10]
专利 [3]
发表日期
2022 [3]
2021 [6]
2020 [8]
2019 [9]
2018 [10]
2017 [8]
更多...
学科主题
Computer S... [3]
mathematic... [1]
光学工程 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共280条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
FedFV: A Personalized Federated Learning Framework for Finger Vein Authentication
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 5, 页码: 683-696
作者:
Feng-Zhao Lian
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2023/09/25
Finger vein, personalized federated learning, privacy protection, biometric, authentication
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:
Huang, Yi-bo
;
Chen, Teng-fei
;
Zhang, Qiu-yu
;
Zhang, Yuan
;
Yan, Shao-hui
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/04/21
Encrypted speech authentication
Perceptual hashing
Improved 2D-Henon
HPS
Matching accuracy
Security
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 81, 期号: 2, 页码: 2873-2899
作者:
Huang, Yi-bo
;
Hou, Hexiang
;
Chen, Tengfei
;
Li, Hao
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/17
Speech content authentication
Biometric security template
2D-SIMM
CQCC cosine
Discrimination
Unidirectional
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion
期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 7, 页码: 10013-10036
作者:
Wang, Yong
;
Huang, Yi-bo
;
Zhang, Ran
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Authentication
Chaotic systems
Mean square error
Application range
Covariance method
Detection and localization
Linear prediction
Minimum mean square errors
Real time performance
Time-frequency parameter
Zero crossing rate
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
Semi-U-Net: A Lightweight Deep Neural Network for Subject-Sensitive Hashing of HRRS Images
期刊论文
IEEE ACCESS, 2021, 卷号: 9, 页码: 60280-60295
作者:
Ding, Kaimeng
;
Su, Shoubao
;
Xu, Nan
;
Jiang, Tingting
收藏
  |  
浏览/下载:64/0
  |  
提交时间:2021/06/10
Authentication
Feature extraction
Remote sensing
Neural networks
Data mining
Cryptography
Computational modeling
Subject-sensitive hashing
lightweight deep neural network
integrity authentication
HRRS image
U-net
Offline Signature Authentication Algorithm Based on the Fuzzy Set
期刊论文
Mathematical Problems in Engineering, 2021, 卷号: 2021
作者:
Qiu, Shi
;
Fei, Fengchang
;
Cui, Ying
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/04/21
An encrypted speech authentication and tampering recovery method based on perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 16, 页码: 24925-24948
作者:
Zhang, Qiu-yu
;
Zhang, Deng-hai
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2021/06/03
Encrypted speech authentication
Perceptual hashing
Least square curve fitting
Tampering location
Tampering recovery
©版权所有 ©2017 CSpace - Powered by
CSpace