×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [7]
内容类型
期刊论文 [7]
发表日期
2022 [1]
2021 [1]
2015 [2]
2012 [1]
2011 [1]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Research on cyber-physical system control strategy under false data injection attack perception
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2022
作者:
Wang, Zhiwen
;
Zhang, Bin
;
Xu, Xiangnan
;
Usman
;
Li, Long
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/03/01
Cyber-physical system
false data injection attacks
model predictive switching control
binary attack detector
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding
期刊论文
IET Image Processing, 2021, 卷号: 15, 期号: 4, 页码: 885-896
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/06/03
Bioinformatics
Chaotic systems
Cryptography
DNA
Image enhancement
Transmissions
Bit plane decompositions
Content security
Differential attacks
Hyper-chaotic systems
Internet transmission
Large data volumes
Strong securities
Transmission rates
Research on Security Transmission of Perceptual Hash Values Based on ECC and Digital Watermarking
期刊论文
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 卷号: 9, 期号: 3, 页码: 255-266
作者:
Zhang Qiuyu
;
Xing Pengfei
;
Liu Yangwei
;
Zhang Qianyun
;
Huang Yibo
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/03/01
Audio perceptual hash
Digital watermarking
Error correcting code (ECC)
Perceptual hash values
Security analysis
Research on security transmission of perceptual hash values based on ECC and digital watermarking
期刊论文
International Journal of Security and its Applications, 2015, 卷号: 9, 期号: 3, 页码: 255-266
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yangwei, Liu
;
Qianyun, Zhang
;
Yibo, Huang
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Audition
Authentication
Digital watermarking
Error correction
Extraction
Mobile security
Audio authentication
Authentication data
Error correcting code
Extracted watermarking
Perceptual hash
Security analysis
Security transmission
Watermark extraction
A dither modulation audio watermarking algorithm based on HAS
期刊论文
Research Journal of Applied Sciences, Engineering and Technology, 2012, 卷号: 4, 期号: 21, 页码: 4206-4211
作者:
Huang, Yi-Bo
;
Zhang, Qiu-Yu
;
Liu, Zhao
;
Di, Yan-Jun
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Audition
Binary sequences
Discrete wavelet transforms
Image watermarking
Low pass filters
Modulation
Signal reconstruction
Adaptive
Blind extraction
Digital sequence
Dither modulation
Human auditory system
Low-pass filtering
Quantization step
Watermarking algorithms
A dither modulation with distortion compensation audio watermarking algorithm based on DWT
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 1, 页码: 106-113
作者:
Zhang, Qiuyu
;
Huang, Yibo
;
Deng, Jiabin
;
Zheng, Lanjun
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Algorithms
Digital watermarking
Discrete wavelet transforms
Modulation
Signal processing
Audio data
Audio signal
Audio watermarking
Compensation factor
Digital sequence
Distortion compensated-dither modulation
Distortion compensation
Dither modulation
Image Watermarking
Low frequency
Low-pass filtering
Noise addition
Original audio signal
Resampling
Robustness
Audio steganography algorithm using PCM quantization coding in the DWT domain
期刊论文
Tongxin Xuebao/Journal on Communications, 2010, 卷号: 31, 期号: 9 A, 页码: 245-250
作者:
Zhang, Qiu-Yu
;
Huang, Yi-Bo
;
Zheng, Lan-Jun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Binary sequences
Codes (symbols)
Discrete wavelet transforms
Embeddings
Low pass filters
Steganography
Audio steganography
Embedding capacity
Embedding efficiency
Information hiding
Quantization errors
Robustness against noise
Voiced frames
Wavelet coefficients
©版权所有 ©2017 CSpace - Powered by
CSpace