Verifiable speech retrieval algorithm based on KNN secure hashing
暂无分享,去创建一个
[1] Weisheng Li,et al. Multi-Manifold Deep Discriminative Cross-Modal Hashing for Medical Image Retrieval , 2022, IEEE Transactions on Image Processing.
[2] Hemant A. Patil,et al. Improving the potential of Enhanced Teager Energy Cepstral Coefficients (ETECC) for replay attack detection , 2022, Comput. Speech Lang..
[3] Hao Li,et al. Encrypted speech retrieval based on long sequence Biohashing , 2022, Multim. Tools Appl..
[4] Yushan Zheng,et al. Dermoscopic image retrieval based on rotation-invariance deep hashing , 2021, Medical Image Anal..
[5] Zi Huang,et al. Exploiting Subspace Relation in Semantic Labels for Cross-Modal Hashing , 2021, IEEE Transactions on Knowledge and Data Engineering.
[6] Wing W. Y. Ng,et al. Bit-wise attention deep complementary supervised hashing for image retrieval , 2021, Multim. Tools Appl..
[7] Li Liu,et al. Unsupervised Deep K-Means Hashing for Efficient Image Retrieval and Clustering , 2021, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Baoyuan Wu,et al. Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Ke Zhou,et al. Unsupervised deep hashing with node representation for image retrieval , 2021, Pattern Recognit..
[10] Yujie Li,et al. Deep Fuzzy Hashing Network for Efficient Image Retrieval , 2021, IEEE Transactions on Fuzzy Systems.
[11] Matthew C. Valenti,et al. Deep Hashing for Secure Multimodal Biometrics , 2020, IEEE Transactions on Information Forensics and Security.
[12] Genqing Bian,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited , 2020, Appl. Math. Comput..
[13] Tuomas Virtanen,et al. Zero-Shot Audio Classification Via Semantic Embeddings , 2020, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[14] Yong Wang,et al. Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion , 2020, Multimedia Tools and Applications.
[15] Zi Huang,et al. Inductive Structure Consistent Hashing via Flexible Semantic Calibration , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[16] Qiu-yu Zhang,et al. Multi-format speech BioHashing based on spectrogram , 2020, Multimedia Tools and Applications.
[17] Shuang Zhang,et al. Information security and storage of Internet of Things based on block chains , 2020, Future Gener. Comput. Syst..
[18] A. L. Sangal,et al. Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization , 2020, Eng. Appl. Artif. Intell..
[19] Xiaoshuai Sun,et al. Deep Saliency Hashing for Fine-Grained Retrieval , 2020, IEEE Transactions on Image Processing.
[20] Yue Gao,et al. Deep Multi-View Enhancement Hashing for Image Retrieval , 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Dafang Zhang,et al. Secure Data Storage and Recovery in Industrial Blockchain Network Environments , 2020, IEEE Transactions on Industrial Informatics.
[22] Qiu-yu Zhang,et al. An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction , 2019, Multimedia Tools and Applications.
[23] Yuesheng Zhu,et al. A fast online spherical hashing method based on data sampling for large scale image retrieval , 2019, Neurocomputing.
[24] Peisong Wang,et al. K-Nearest Neighbors Hashing , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Vijay Kumar,et al. Emperor penguin optimizer: A bio-inspired algorithm for engineering problems , 2018, Knowl. Based Syst..
[26] Ramachandra Raghavendra,et al. Multi-biometric template protection based on bloom filters , 2018, Inf. Fusion.
[27] Gaurav Dhiman,et al. Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications , 2017, Adv. Eng. Softw..
[28] Gregory Shakhnarovich,et al. Semantic Speech Retrieval With a Visually Grounded Model of Untranscribed Speech , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[29] Kong-Aik Lee,et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection , 2017, INTERSPEECH.
[30] Xuelong Li,et al. Graph PCA Hashing for Similarity Search , 2017, IEEE Transactions on Multimedia.
[31] M. Cecchini,et al. Ultrastructural Characterization of the Lower Motor System in a Mouse Model of Krabbe Disease , 2016, Scientific Reports.
[32] Masahide Sasaki,et al. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing , 2016, Scientific Reports.
[33] Shih-Fu Chang,et al. Spherical Hashing: Binary Code Embedding with Hyperspheres , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Wen Chen,et al. Optically secured information retrieval using two authenticated phase-only masks , 2015, Scientific Reports.
[35] Jian Sun,et al. K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[36] Yanmin Qian,et al. Audio-Visual Deep Neural Network for Robust Person Verification , 2021, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[37] Pong C. Yuen,et al. SecureFace: Face Template Protection , 2021, IEEE Transactions on Information Forensics and Security.
[38] Zhe Jin,et al. Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes , 2021, IEEE Transactions on Information Forensics and Security.
[39] R. Steinwandt,et al. Reducing the Cost of Implementing the Advanced Encryption Standard as a Quantum Circuit , 2020, IEEE Transactions on Quantum Engineering.