×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [24]
内容类型
期刊论文 [16]
会议论文 [7]
学位论文 [1]
发表日期
2022 [2]
2021 [1]
2020 [2]
2019 [1]
2018 [2]
2017 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共24条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 1, 页码: 1201-1221
作者:
Zhang, Qiu-yu
;
Li, Yu-zhou
;
Hu, Ying-jie
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/03/02
Convolution
Data mining
Efficiency
Hamming distance
Hash functions
Semantics
Speech
Chaotic encryptions
Convolution neural network
Distance algorithm
Normalization algorithms
Retrieval accuracy
Retrieval algorithms
Retrieval efficiency
Semantic structures
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
A classification retrieval method for encrypted speech based on deep neural network and deep hashing
期刊论文
IEEE Access, 2020, 卷号: 8, 页码: 202469-202482
作者:
Zhang, Qiuyu
;
Zhao, Xuejiao
;
Hu, Yingjie
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2022/02/18
Binary codes
Chaotic systems
Classification (of information)
Convolution
Convolutional neural networks
Deep neural networks
Efficiency
Hamming distance
Hash functions
Information retrieval
Learning systems
Semantics
Speech
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/06/16
image coding
DNA
statistical analysis
cryptography
image processing
entropy
random sequences
chaos
chaotic communication
image encryption algorithm
image hashing
improved chaotic mapping
image features
fingerprint image
binary hash sequence
generated hash sequence
improved chaotic map
Chen's chaotic system
encryption algorithms
Traffic characteristic map-based intrusion detection model for industrial internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Zhang, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Discrete cosine transforms
Hash functions
Singular value decomposition
Discrete Cosine Transform(DCT)
Hash digest
Industrial controls
Information entropy method
Intrusion detection models
Network traffic
Rule set
Singular value decomposition method
Mutual information-based intrusion detection model for industrial Internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 1, 页码: 131-140
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Duan, Hong-Xiang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Classification (of information)
Discrete cosine transforms
Factorization
Feature extraction
Matrix algebra
Classification accuracy
Internet intrusion detection
Intrusion detection models
Mutual informations
Nonnegative matrix factorization
NSL-KDD data
Perceptual hash
Traffic characteristics
Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio
期刊论文
International Journal of Network Security, 2017, 卷号: 19, 期号: 5, 页码: 752-760
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Qiao, Si-Bin
;
Huang, Yi-Bo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Authentication
Entropy
Speech
Speech communication
Speech recognition
Authentication algorithm
Efficient authentication
Energy-to-entropy ratio
Perceptual hash
Perceptual hashing
Spectral subtraction methods
Spectral subtractions
Tamper detection
Research on universal model of speech perceptual hashing authentication system in mobile environment
会议论文
Lanzhou, China, August 2, 2016 - August 5, 2016
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Huang, Yi-Bo
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Audio signal processing
Authentication
Computation theory
Feature extraction
Hash functions
Intelligent computing
Mobile computing
Speech
Speech communication
Authentication algorithm
Authentication systems
Mobile computing environment
Multimedia information
Perceptual hashing
Speech signal processing
Tamper detection
Theoretical foundations
©版权所有 ©2017 CSpace - Powered by
CSpace