×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [43]
武汉大学 [34]
上海大学 [27]
北京大学 [20]
兰州理工大学 [19]
重庆大学 [15]
更多...
内容类型
期刊论文 [209]
会议论文 [64]
其他 [27]
学位论文 [7]
专利 [2]
会议 [1]
更多...
发表日期
2024 [1]
2022 [8]
2021 [8]
2020 [7]
2019 [18]
2018 [51]
更多...
学科主题
Channel es... [1]
Computer S... [1]
计算机应用 [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共310条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Quantum Fully Homomorphic Encryption by Integrating Pauli One-time Pad with Quaternions
期刊论文
QUANTUM, 2022, 卷号: 6, 页码: 45
作者:
Ma, Guangsheng
;
Li, Hongbo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/02/07
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
期刊论文
JOURNAL OF MATHEMATICS, 2022, 卷号: 2022
作者:
Liu, Lei
;
Liu, Xue
;
Wan, Jiahua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/12/23
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Encrypted speech retrieval based on long sequence Biohashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 9, 页码: 13065-13085
作者:
Huang, Yi-bo
;
Wang, Yong
;
Li, Hao
;
Zhang, Yuan
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/06/20
Biometrics
Cryptography
Efficiency
Search engines
Vectors
BioHashing
Biometric template
Content preservation operation
Encrypted speech
Encrypted speech retrieval
Features vector
Improved sha256
Long sequences
Sha-256
Speech retrieval
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 16
作者:
Zheng, Wenbo
;
Yan, Lan
;
Gou, Chao
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/01/27
Encryption
DNA
Color
Resists
Computational modeling
Image coding
Complex systems
Artificial image and parallel execution (ACP) method
color image encryption
computational experiment
image division block
parallel computing
©版权所有 ©2017 CSpace - Powered by
CSpace