×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [10]
厦门大学 [9]
北京大学 [5]
兰州理工大学 [4]
沈阳自动化研究所 [4]
自动化研究所 [3]
更多...
内容类型
期刊论文 [30]
学位论文 [9]
其他 [6]
专利 [3]
会议论文 [3]
发表日期
2022 [2]
2019 [2]
2018 [4]
2017 [3]
2016 [10]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共51条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 13, 页码: 17825-17846
作者:
Zhang, Qiu-yu
;
Zhou, Liang
;
Zhang, Tao
;
Zhang, Deng-hai
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
Encrypted speech retrieval
Short-term cross-correlation coefficient
Perceptual hashing
Scrambling encryption
Feature extraction of encrypted speech
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 卷号: 15, 期号: 12, 页码: 6500-6509
作者:
Li, JQ (Li, Jianqiang)[ 1 ]
;
Wang, SL (Wang, Shulan)[ 2 ]
;
Li, Y (Li, Yuan)[ 1 ]
;
Wang, HY (Wang, Haiyan)[ 1 ]
;
Wang, HW (Wang, Huiwen)[ 1 ]
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2020/01/10
Encryption
Cloud computing
Outsourcing
Informatics
Computational efficiency
Attribute-based encryption (ABE)
ciphertext policy (CP)
Cloud computing
file update
policy update
Multiuser access control searchable privacy-preserving scheme in cloud storage
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 卷号: 31, 期号: 9
作者:
Cao, Laicheng
;
Wang, Yafei
;
Dong, Xiaoye
;
Liu, Yufei
;
Zhang, Yangyang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
attribute-based encryption
cloud storage
multiuser
privacy preserving
searchable encryption
Improving file locality in multi-keyword top-k search based on clustering
期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 期号: 9
作者:
Chen, Lanxiang
;
Zhang, Nan
;
Li, Kuan-Ching
;
He, Shuibing
;
Qiu, Linbing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Searchable symmetric encryption
CAK-means clustering
File locality
Multi-keyword
Ranked search
Efficient and secure searchable encryption protocol for cloud-based Internet of Things
期刊论文
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 卷号: 111
作者:
Wu, Libing
;
Chen, Biwen
;
Choo, Kim-Kwang Raymond
;
He, Debiao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Internet of Things
Cloud-of-Things
Searchable encryption
Forward privacy
File-injection attack resilience
Insider keyword guessing attack resilience
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 期号: 23
作者:
Wu, Libing
;
Chen, Biwen
;
Zeadally, Sherali
;
He, Debiao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Privacy
Insider keyword guessing attack
File-injection attack
Searchable public key encryption
Secure cloud storage
Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication
期刊论文
INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2017, 卷号: 45, 期号: 11, 页码: 1849-1872
作者:
Gan, Qiuye
;
Yu, Simin
;
Li, Chengqing
;
Lue, Jinhu
;
Lin, Zhuosheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2018/07/25
ARM-embedded implementation
multicast-multiuser
chaotic map
secure communication
speech
Wi-Fi
The Application of Information Security Encryption Technology in Military Data System Management
期刊论文
Man–Machine–Environment System Engineering, 2017, 卷号: Vol.456, 页码: 423-428
作者:
Xiaoli Zheng
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/24
Military
electronic
file
File
management
Information
security
©版权所有 ©2017 CSpace - Powered by
CSpace