×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [11]
内容类型
期刊论文 [11]
发表日期
2022 [4]
2021 [1]
2020 [4]
2019 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:
Huang, Yi-bo
;
Chen, Teng-fei
;
Zhang, Qiu-yu
;
Zhang, Yuan
;
Yan, Shao-hui
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/04/21
Encrypted speech authentication
Perceptual hashing
Improved 2D-Henon
HPS
Matching accuracy
Security
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 1, 页码: 1201-1221
作者:
Zhang, Qiu-yu
;
Li, Yu-zhou
;
Hu, Ying-jie
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/02
Convolution
Data mining
Efficiency
Hamming distance
Hash functions
Semantics
Speech
Chaotic encryptions
Convolution neural network
Distance algorithm
Normalization algorithms
Retrieval accuracy
Retrieval algorithms
Retrieval efficiency
Semantic structures
Multi-format speech BioHashing based on spectrogram
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 33-34, 页码: 24889-24909
作者:
Huang, Yi-bo
;
Wang, Yong
;
Zhang, Qiu-yu
;
Zhang, Wei-zhao
;
Fan, Man-hong
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Authentication
Chaotic systems
Discrete cosine transforms
Eigenvalues and eigenfunctions
Factorization
Spectrographs
Authentication algorithm
Nonnegative matrix factorization
Real time performance
Security problems
Speech perception
Strong robustness
Two dimensional discrete cosine transform
Unidirectionality
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM
期刊论文
IEEE Access, 2020, 卷号: 8, 页码: 148556-148569
作者:
Zhang, Qiuyu
;
Li, Yuzhou
;
Hu, Yingjie
;
Zhao, Xuejiao
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Bismuth compounds
Brain
Convolutional neural networks
Cryptography
Deep learning
Hamming distance
Information retrieval
Learning systems
Speech
Distance algorithm
Hyper-chaotic systems
Neural network model
Perceptual feature
Perceptual hashing
Recall and precision
Retrieval accuracy
Retrieval efficiency
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 卷号: 28, 期号: 5, 页码: 2467-2482
作者:
Zhang, Qiuyu
;
Zhang, Denghai
;
Zhou, Liang
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/03/01
Encrypted speech authentication
perceptual hashing
uniform subband spectrum variance
feature extraction of encrypted speech
tamper location
A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 13, 页码: 17825-17846
作者:
Zhang, Qiu-yu
;
Zhou, Liang
;
Zhang, Tao
;
Zhang, Deng-hai
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
Encrypted speech retrieval
Short-term cross-correlation coefficient
Perceptual hashing
Scrambling encryption
Feature extraction of encrypted speech
©版权所有 ©2017 CSpace - Powered by
CSpace