CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Learning binary codes with local and inner data structure 期刊论文
NEUROCOMPUTING, 2018, 卷号: 282, 页码: 32-41
作者:  He, Shiyuan;  Ye, Guo;  Hu, Mengqiu;  Yang, Yang;  Shen, Fumin
收藏  |  浏览/下载:35/0  |  提交时间:2018/12/11
Parametric local multiview hamming distance metric learning 期刊论文
PATTERN RECOGNITION, 2018, 卷号: 75, 页码: 250-262
作者:  Zhai, Deming;  Liu, Xianming;  Chang, Hong;  Zhen, Yi;  Chen, Xilin
收藏  |  浏览/下载:25/0  |  提交时间:2019/12/10
Traffic characteristic map-based intrusion detection model for industrial internet 期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:  Dong, Rui-Hong;  Wu, Dong-Fang;  Zhang, Qiu-Yu;  Zhang, Tao
收藏  |  浏览/下载:11/0  |  提交时间:2020/11/14
Image encryption algorithm based on multiple mixed hash functions and cyclic shift 期刊论文
OPTICS AND LASERS IN ENGINEERING, 2018, 卷号: 107, 页码: 370-379
作者:  Wang, Xingyuan;  Zhu, Xiaoqiang;  Wu, Xiangjun;  Zhang, Yingqian
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/02
In Defense of Locality-Sensitive Hashing 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 卷号: 29, 期号: 1, 页码: 87-103
作者:  Ding, Kun;  Huo, Chunlei;  Fan, Bin;  Xiang, Shiming;  Pan, Chunhong
收藏  |  浏览/下载:23/0  |  提交时间:2016/10/24
In Defense of Locality-Sensitive Hashing 期刊论文
IEEE Transactions on Neural Networks and Learning Systems, 2018, 卷号: 29, 期号: 1, 页码: 87-103
作者:  Kun Ding;  Chunlei Huo;  Bin Fan;  Shiming Xiang;  Chunhong Pan
收藏  |  浏览/下载:34/0  |  提交时间:2018/01/16
Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 卷号: 27, 期号: 1, 页码: 106-120
作者:  Lu, Xiaoqiang;  Chen, Yaxiong;  Li, Xuelong
收藏  |  浏览/下载:39/0  |  提交时间:2017/12/25
Hierarchical Recurrent Neural Hashing for Image Retrieval with Hierarchical Convolutional Features 期刊论文
IEEE Transactions on Image Processing, 2018, 卷号: 27, 期号: 1, 页码: 106-120
作者:  Lu, Xiaoqiang;  Chen, Yaxiong;  Li, Xuelong
收藏  |  浏览/下载:30/0  |  提交时间:2018/12/18
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2
作者:  Miao, Meixia;  Ma, Jianfeng;  Huang, Xinyi;  Wang, Qian
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Hardware-Based Protection for Data Security at Run-Time on Embedded Systems 会议论文
IOP Conference Series: Materials Science and Engineering
作者:  Wang, X.;  Zhang, X.;  Wang, W.;  Du, P.;  Zhang, Z.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace