Verifiable speech retrieval algorithm based on KNN secure hashing

[1]  Weisheng Li,et al.  Multi-Manifold Deep Discriminative Cross-Modal Hashing for Medical Image Retrieval , 2022, IEEE Transactions on Image Processing.

[2]  Hemant A. Patil,et al.  Improving the potential of Enhanced Teager Energy Cepstral Coefficients (ETECC) for replay attack detection , 2022, Comput. Speech Lang..

[3]  Hao Li,et al.  Encrypted speech retrieval based on long sequence Biohashing , 2022, Multim. Tools Appl..

[4]  Yushan Zheng,et al.  Dermoscopic image retrieval based on rotation-invariance deep hashing , 2021, Medical Image Anal..

[5]  Zi Huang,et al.  Exploiting Subspace Relation in Semantic Labels for Cross-Modal Hashing , 2021, IEEE Transactions on Knowledge and Data Engineering.

[6]  Wing W. Y. Ng,et al.  Bit-wise attention deep complementary supervised hashing for image retrieval , 2021, Multim. Tools Appl..

[7]  Li Liu,et al.  Unsupervised Deep K-Means Hashing for Efficient Image Retrieval and Clustering , 2021, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Baoyuan Wu,et al.  Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[9]  Ke Zhou,et al.  Unsupervised deep hashing with node representation for image retrieval , 2021, Pattern Recognit..

[10]  Yujie Li,et al.  Deep Fuzzy Hashing Network for Efficient Image Retrieval , 2021, IEEE Transactions on Fuzzy Systems.

[11]  Matthew C. Valenti,et al.  Deep Hashing for Secure Multimodal Biometrics , 2020, IEEE Transactions on Information Forensics and Security.

[12]  Genqing Bian,et al.  Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited , 2020, Appl. Math. Comput..

[13]  Tuomas Virtanen,et al.  Zero-Shot Audio Classification Via Semantic Embeddings , 2020, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[14]  Yong Wang,et al.  Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion , 2020, Multimedia Tools and Applications.

[15]  Zi Huang,et al.  Inductive Structure Consistent Hashing via Flexible Semantic Calibration , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[16]  Qiu-yu Zhang,et al.  Multi-format speech BioHashing based on spectrogram , 2020, Multimedia Tools and Applications.

[17]  Shuang Zhang,et al.  Information security and storage of Internet of Things based on block chains , 2020, Future Gener. Comput. Syst..

[18]  A. L. Sangal,et al.  Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization , 2020, Eng. Appl. Artif. Intell..

[19]  Xiaoshuai Sun,et al.  Deep Saliency Hashing for Fine-Grained Retrieval , 2020, IEEE Transactions on Image Processing.

[20]  Yue Gao,et al.  Deep Multi-View Enhancement Hashing for Image Retrieval , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Dafang Zhang,et al.  Secure Data Storage and Recovery in Industrial Blockchain Network Environments , 2020, IEEE Transactions on Industrial Informatics.

[22]  Qiu-yu Zhang,et al.  An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction , 2019, Multimedia Tools and Applications.

[23]  Yuesheng Zhu,et al.  A fast online spherical hashing method based on data sampling for large scale image retrieval , 2019, Neurocomputing.

[24]  Peisong Wang,et al.  K-Nearest Neighbors Hashing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[25]  Vijay Kumar,et al.  Emperor penguin optimizer: A bio-inspired algorithm for engineering problems , 2018, Knowl. Based Syst..

[26]  Ramachandra Raghavendra,et al.  Multi-biometric template protection based on bloom filters , 2018, Inf. Fusion.

[27]  Gaurav Dhiman,et al.  Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications , 2017, Adv. Eng. Softw..

[28]  Gregory Shakhnarovich,et al.  Semantic Speech Retrieval With a Visually Grounded Model of Untranscribed Speech , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[29]  Kong-Aik Lee,et al.  The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection , 2017, INTERSPEECH.

[30]  Xuelong Li,et al.  Graph PCA Hashing for Similarity Search , 2017, IEEE Transactions on Multimedia.

[31]  M. Cecchini,et al.  Ultrastructural Characterization of the Lower Motor System in a Mouse Model of Krabbe Disease , 2016, Scientific Reports.

[32]  Masahide Sasaki,et al.  Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing , 2016, Scientific Reports.

[33]  Shih-Fu Chang,et al.  Spherical Hashing: Binary Code Embedding with Hyperspheres , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Wen Chen,et al.  Optically secured information retrieval using two authenticated phase-only masks , 2015, Scientific Reports.

[35]  Jian Sun,et al.  K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[36]  Yanmin Qian,et al.  Audio-Visual Deep Neural Network for Robust Person Verification , 2021, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[37]  Pong C. Yuen,et al.  SecureFace: Face Template Protection , 2021, IEEE Transactions on Information Forensics and Security.

[38]  Zhe Jin,et al.  Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes , 2021, IEEE Transactions on Information Forensics and Security.

[39]  R. Steinwandt,et al.  Reducing the Cost of Implementing the Advanced Encryption Standard as a Quantum Circuit , 2020, IEEE Transactions on Quantum Engineering.