×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [16]
华南理工大学 [11]
兰州理工大学 [10]
北京大学 [9]
西安交通大学 [7]
重庆大学 [7]
更多...
内容类型
期刊论文 [54]
会议论文 [31]
学位论文 [13]
其他 [9]
专利 [2]
发表日期
2022 [4]
2021 [3]
2020 [5]
2019 [3]
2018 [3]
2017 [3]
更多...
学科主题
engines; t... [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共109条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Design of Embedded Ai Engine Based on the Microkernel Operating System
期刊论文
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 卷号: 2022, 页码: 9
作者:
Wang, Tun
;
Tian, Yu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2023/02/07
A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 15, 页码: 21975-21994
作者:
Gui, Xiangquan
;
Huang, Jun
;
Li, Li
;
Li, Shouliang
;
Cao, Jie
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/04/21
Hyperchaotic map
Image encryption
Simultaneous shuffling and diffusion
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:
Huang, Yi-bo
;
Chen, Teng-fei
;
Zhang, Qiu-yu
;
Zhang, Yuan
;
Yan, Shao-hui
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/04/21
Encrypted speech authentication
Perceptual hashing
Improved 2D-Henon
HPS
Matching accuracy
Security
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
NeuroAED: Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 923-936
作者:
Chen, Guang
;
Liu, Peigen
;
Liu, Zhengfa
;
Tang, Huajin
;
Hong, Lin
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/01/07
Neuromorphics
Vision sensors
Event detection
Cameras
Feature extraction
Legged locomotion
Signal processing algorithms
Abnormal event detection
video surveillance
optical flow
event based descriptors
neuromorphic vision sensor
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
期刊论文
Multimedia Tools and Applications, 2021, 卷号: 80, 期号: 1, 页码: 1201-1221
作者:
Zhang, Qiu-yu
;
Li, Yu-zhou
;
Hu, Ying-jie
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/03/02
Convolution
Data mining
Efficiency
Hamming distance
Hash functions
Semantics
Speech
Chaotic encryptions
Convolution neural network
Distance algorithm
Normalization algorithms
Retrieval accuracy
Retrieval algorithms
Retrieval efficiency
Semantic structures
Mode transition in a memristive dynamical system and its application in image encryption
期刊论文
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 卷号: 34, 期号: 27
作者:
Zhang, Yin
;
Ren, Guodong
;
Hobiny, Aatef
;
Ahmad, Bashir
;
Ma, Jun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/03/01
Memristor
chaos
bifurcation
image encryption
initials effect
An encrypted speech retrieval scheme based on long short-term memory neural network and deep hashing
期刊论文
KSII Transactions on Internet and Information Systems, 2020, 卷号: 14, 期号: 6, 页码: 2612-2633
作者:
Zhang, Qiu-Yu
;
Li, Yu-Zhou
;
Hu, Ying-Jie
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2020/11/14
Brain
Cryptography
Data privacy
Efficiency
Hamming distance
Speech
Distance algorithm
Hashing algorithms
High-level features
Hyper-chaotic systems
Privacy and security
Retrieval accuracy
Retrieval efficiency
Sensitive informations
SECURITY PROCESSING UNIT OF PLC AND BUS ARBITRATION METHOD THEREOF
专利
申请日期: 2020-02-06, 公开日期: 2021-09-28
作者:
Yu HB(于海斌)
;
Zeng P(曾鹏)
;
Shang WL(尚文利)
;
Liu XD(刘贤达)
;
Zhao JM(赵剑明)
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2020/07/04
©版权所有 ©2017 CSpace - Powered by
CSpace