CORC

浏览/检索结果: 共24条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing 期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:  Zhang, Qiu-yu;  Bai, Jian;  Xu, Fu-jiu
收藏  |  浏览/下载:21/0  |  提交时间:2022/06/20
Verifiable speech retrieval algorithm based on KNN secure hashing 期刊论文
Multimedia Tools and Applications, 2022
作者:  An, Li;  Huang, Yi-bo;  Zhang, Qiu-yu
收藏  |  浏览/下载:21/0  |  提交时间:2022/09/22
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing 期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 1, 页码: 1201-1221
作者:  Zhang, Qiu-yu;  Li, Yu-zhou;  Hu, Ying-jie
收藏  |  浏览/下载:16/0  |  提交时间:2021/03/02
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:  Feng, Tao;  Wang, Shuaishuai;  Gong, Xiang;  Fang, Junli
收藏  |  浏览/下载:14/0  |  提交时间:2020/12/18
A classification retrieval method for encrypted speech based on deep neural network and deep hashing 期刊论文
IEEE Access, 2020, 卷号: 8, 页码: 202469-202482
作者:  Zhang, Qiuyu;  Zhao, Xuejiao;  Hu, Yingjie
收藏  |  浏览/下载:11/0  |  提交时间:2022/02/18
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding 期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:  Zhang, Qiuyu;  Han, Jitian;  Ye, Yutong
收藏  |  浏览/下载:4/0  |  提交时间:2020/06/16
Traffic characteristic map-based intrusion detection model for industrial internet 期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:  Dong, Rui-Hong;  Wu, Dong-Fang;  Zhang, Qiu-Yu;  Zhang, Tao
收藏  |  浏览/下载:12/0  |  提交时间:2020/11/14
Mutual information-based intrusion detection model for industrial Internet 期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 1, 页码: 131-140
作者:  Dong, Rui-Hong;  Wu, Dong-Fang;  Zhang, Qiu-Yu;  Duan, Hong-Xiang
收藏  |  浏览/下载:9/0  |  提交时间:2020/11/14
Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio 期刊论文
International Journal of Network Security, 2017, 卷号: 19, 期号: 5, 页码: 752-760
作者:  Zhang, Qiu-Yu;  Hu, Wen-Jin;  Qiao, Si-Bin;  Huang, Yi-Bo
收藏  |  浏览/下载:12/0  |  提交时间:2020/11/14
Research on universal model of speech perceptual hashing authentication system in mobile environment 会议论文
Lanzhou, China, August 2, 2016 - August 5, 2016
作者:  Zhang, Qiu-Yu;  Hu, Wen-Jin;  Huang, Yi-Bo;  Qiao, Si-Bin
收藏  |  浏览/下载:11/0  |  提交时间:2020/11/15


©版权所有 ©2017 CSpace - Powered by CSpace