×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [22]
自动化研究所 [20]
兰州理工大学 [15]
西安光学精密机械研... [12]
华南理工大学 [9]
清华大学 [8]
更多...
内容类型
期刊论文 [84]
会议论文 [46]
学位论文 [7]
其他 [4]
发表日期
2022 [2]
2021 [5]
2020 [6]
2019 [5]
2018 [10]
2017 [8]
更多...
学科主题
Computer S... [1]
artificial... [1]
computer s... [1]
engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共141条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Deep Category-Level and Regularized Hashing With Global Semantic Similarity Learning
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 卷号: 51, 期号: 12, 页码: 6240-6252
作者:
Chen, Yaxiong
;
Lu, Xiaoqiang
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/01/26
Semantics
Binary codes
Image retrieval
Force
Machine learning
Cybernetics
Benchmark testing
Category-level semantics
deep feature similarity
deep hashing
image retrieval
A Stateful Bloom Filter for Per-Flow State Monitoring
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 卷号: 8, 期号: 2, 页码: 1399-1413
作者:
Xie, Kun
;
Pei, Shuyu
;
Wang, Xin
;
Shi, Wen
;
Xie, Gaogang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/01
Monitoring
High-speed networks
Standards
IP networks
Indexes
Hash functions
Arrays
Bloom filter
per-flow state monitoring
Adversarial Binary Mutual Learning for Semi-Supervised Deep Hashing
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Wang, Guanan
;
Hu, Qinghao
;
Yang, Yang
;
Cheng, Jian
;
Hou, Zeng-Guang
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2022/01/27
Data models
Semantics
Force
Computational modeling
Hash functions
Binary codes
Training data
Adversarial learning (AL)
deep learning
hashing
Deep Bayesian Hashing With Center Prior for Multi-Modal Neuroimage Retrieval
期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2021, 卷号: 40, 期号: 2, 页码: 503-513
作者:
Yang, Erkun
;
Liu, Mingxia
;
Yao, Dongren
;
Cao, Bing
;
Lian, Chunfeng
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2021/03/29
Semantics
Bayes methods
Hash functions
Image retrieval
Visualization
Correlation
Deep Bayesian hashing
retrieval
multi-modal neuroimage
MRI
PET
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 1, 页码: 1201-1221
作者:
Zhang, Qiu-yu
;
Li, Yu-zhou
;
Hu, Ying-jie
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/02
Convolution
Data mining
Efficiency
Hamming distance
Hash functions
Semantics
Speech
Chaotic encryptions
Convolution neural network
Distance algorithm
Normalization algorithms
Retrieval accuracy
Retrieval algorithms
Retrieval efficiency
Semantic structures
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
SF-Sketch: A Two-Stage Sketch for Data Streams
期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 卷号: 31, 期号: 10, 页码: 2263-2276
作者:
Liu, Lingtong
;
Shen, Yulong
;
Yan, Yibo
;
Yang, Tong
;
Shahzad, Muhammad
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2020/12/10
Distributed databases
Monitoring
Bars
Frequency measurement
Registers
Fats
Hash functions
Network measurements
sketch
distributed monitoring
multiset
frequent items
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
©版权所有 ©2017 CSpace - Powered by
CSpace