×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [25]
北京航空航天大学 [14]
大连理工大学 [10]
自动化研究所 [9]
兰州理工大学 [8]
武汉大学 [7]
更多...
内容类型
期刊论文 [76]
会议论文 [22]
其他 [2]
发表日期
2018 [100]
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共100条,第1-10条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
基于稀疏自编码的无监督哈希算法
期刊论文
液晶与显示, 2018, 卷号: 33, 期号: 11, 页码: 950-957
作者:
张丽萍
;
孟卫平
;
谭家海
收藏
  |  
浏览/下载:68/0
  |  
提交时间:2019/01/03
图像哈希
稀疏自编码
Kl距离
量化误差
无监督算法
An efficient retrieval method of encrypted speech based on frequency band variance
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2018, 卷号: 9, 期号: 6, 页码: 1452-1463
作者:
Zhang, Qiu-Yu
;
Ge, Zi-Xian
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/11/14
Cryptography
Hamming distance
Information retrieval
Distance algorithm
Encrypted speech
Perceptual hashing
Retrieval accuracy
Retrieval efficiency
Retrieval methods
Retrieval performance
Speech features
Image hashing with color vector angle
期刊论文
NEUROCOMPUTING, 2018, 卷号: 308, 页码: 147-158
作者:
Tang, Zhenjun
;
Li, Xuelong
;
Zhang, Xianquan
;
Zhang, Shichao
;
Dai, Yumin
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2018/07/13
Image Hashing
Hashing Function
Color Vector Angle
Color Histogram
Deep Constrained Siamese Hash Coding Network and Load-Balanced Locality-Sensitive Hashing for Near Duplicate Image Detection
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 卷号: 27, 期号: 9, 页码: 4452-4464
作者:
Hu, Weiming
;
Fan, Yabo
;
Xing, Junliang
;
Sun, Liang
;
Cai, Zhaoquan
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2018/10/10
Near duplicate image detection
load-balanced locality-sensitive hashing
deep constrained siamese neural network
deep feature extraction
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 期号: 16, 页码: 21653-21669
作者:
Zhang, Qiu-yu
;
Qiao, Si-bin
;
Huang, Yi-bo
;
Zhang, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
Speech authentication
Perceptual hashing
Discrete wavelet transform (DWT)
Measurement matrix
Tampering detection
A fast speech feature extraction method based on perceptual hashing
会议论文
Guilin, Guangxi, China, July 29, 2017 - July 31, 2017
作者:
Zhang, Qiuyu
;
Qiao, Sibin
;
Zhang, Tao
;
Huang, Yibo
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/15
Discrete cosine transforms
Efficiency
Extraction
Feature extraction
Fuzzy systems
Speech
Compressive sensing
Existing problems
Feature extraction methods
MDCT coefficients
Measurement matrix
Modified discrete cosine transforms
Perceptual feature
Perceptual hashing
Strong robust speech authentication algorithm based on quasi-harmonic model
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 卷号: 46, 期号: 3, 页码: 58-64
作者:
Zhang, Qiuyu
;
Zhang, Tao
;
Wu, Dongfang
;
Ge, Zixian
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Authentication
Harmonic analysis
Robustness (control systems)
Speech
Amplitude information
Authentication algorithm
Correcting frequency
Harmonic model
Noise environments
Perceptual feature
Perceptual hashing
Reference frequency
Learning binary codes with local and inner data structure
期刊论文
NEUROCOMPUTING, 2018, 卷号: 282, 页码: 32-41
作者:
He, Shiyuan
;
Ye, Guo
;
Hu, Mengqiu
;
Yang, Yang
;
Shen, Fumin
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2018/12/11
Supervised Hashing
Anchor Graph
Nearest Neighbor Search
Supervised Discrete Hashing With Relaxation
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 卷号: 29, 期号: 3, 页码: 608-617
作者:
Gui, Jie
;
Liu, Tongliang
;
Sun, Zhenan
;
Tao, Dacheng
;
Tan, Tieniu
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2018/03/03
Data-dependent Hashing
Least Squares Regression
Supervised Discrete Hashing (Sdh)
Supervised Discrete Hashing With Relaxation (Sdhr)
Robust speech perception hashing authentication algorithm based on spectral subtraction and multi-feature tensor
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 206-216
作者:
Huang, Yi-Bo
;
Zhang, Qiu-Yu
;
Hu, Wen-Jin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Speech
Tensors
Wavelet decomposition
Background noise
Multi features
Perceptual hashing
Robust
Spectral subtractions
©版权所有 ©2017 CSpace - Powered by
CSpace