×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [9]
计算技术研究所 [4]
地理科学与资源研究所 [3]
沈阳自动化研究所 [2]
科技战略咨询研究院 [1]
重庆绿色智能技术研究... [1]
更多...
内容类型
期刊论文 [18]
专利 [1]
会议论文 [1]
发表日期
2020 [20]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
限定条件
发表日期:2020
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Biohashing encrypted speech retrieval based on chaotic measurement matrix
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 卷号: 48, 期号: 12, 页码: 32-37
作者:
Huang, Yibo
;
Wang, Yong
;
Zhang, Qiuyu
;
Chen, Tengfei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/02/17
Biometrics
Cryptography
Information retrieval
Privacy by design
Search engines
BioHashing
Biometric template
Chaotic measurements
Data leakage
Encrypted speech
Security and privacy
Speech features
Speech retrieval
An Approach to High-Resolution Rice Paddy Mapping Using Time-Series Sentinel-1 SAR Data in the Mun River Basin, Thailand
期刊论文
REMOTE SENSING, 2020, 卷号: 12, 期号: 23, 页码: 19
作者:
Li, He
;
Fu, Dongjie
;
Huang, Chong
;
Su, Fenzhen
;
Liu, Qingsheng
收藏
  |  
浏览/下载:62/0
  |  
提交时间:2021/03/15
rice paddy
time-series
Sentinel-1
Google Earth Engine
permanent water
phenological characteristics
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
LIGHTWEIGHT AUTHENTICATION METHOD SUPPORTING ANONYMOUS ACCESS OF HETEROGENEOUS TERMINAL IN EDGE COMPUTING SCENARIO
专利
申请日期: 2020-07-02,
作者:
Shang WL(尚文利)
;
Zeng P(曾鹏)
;
Chen CY(陈春雨)
;
Zhao JM(赵剑明)
;
Liu XD(刘贤达)
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/08/08
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:
Jiao, Zhenzhen
;
Zhang, Baoxian
;
Zhang, Li
;
Liu, Min
;
Gong, Wei
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2020/12/10
Blockchain
Ad hoc networks
Cloud computing
Smart contracts
Task analysis
Security
Computer architecture
An encrypted speech retrieval scheme based on long short-term memory neural network and deep hashing
期刊论文
KSII Transactions on Internet and Information Systems, 2020, 卷号: 14, 期号: 6, 页码: 2612-2633
作者:
Zhang, Qiu-Yu
;
Li, Yu-Zhou
;
Hu, Ying-Jie
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2020/11/14
Brain
Cryptography
Data privacy
Efficiency
Hamming distance
Speech
Distance algorithm
Hashing algorithms
High-level features
Hyper-chaotic systems
Privacy and security
Retrieval accuracy
Retrieval efficiency
Sensitive informations
Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
期刊论文
CHINA COMMUNICATIONS, 2020, 卷号: 17, 期号: 6, 页码: 153-163
作者:
Cao, Laicheng
;
Kang, Yifan
;
Wu, Qirui
;
Wu, Rong
;
Guo, Xian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/03/01
cloud storage
dynamic update
keywords search
policy hidden
Mapping cropping intensity in China using time series Landsat and Sentinel-2 images and Google Earth Engine
期刊论文
REMOTE SENSING OF ENVIRONMENT, 2020, 卷号: 239, 页码: 13
作者:
Liu, Luo
;
Xiao, Xiangming
;
Qin, Yuanwei
;
Wang, Jie
;
Xu, Xinliang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/05/19
Cropping intensity
GEE
Phenology
Sentinel-2
Vegetation indices
Data Security and Privacy Challenges of Computing Offloading in FINs
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 14-20
作者:
Wang, Fei
;
Diao, Boyu
;
Sun, Tao
;
Xu, Yongjun
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Task analysis
Cloud computing
Data privacy
Edge computing
Smart homes
Data security
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
©版权所有 ©2017 CSpace - Powered by
CSpace