We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Parallel SHA-256 on SW26010 many-core processor for hashing of multiple messages

    To explore whether new parallelism techniques can provide additional performance improvements in cryptographic hash functions, we conducted our study...

    Ziheng Wang, **aoshe Dong, ... Heng Chen in The Journal of Supercomputing
    Article 13 August 2022
  2. Deep Discriminative Hashing for Cross-Modal Hashing Based Computer-Aided Diagnosis

    Massive medical data in multi-modalities emerges with the development of modern medicine, which facilitates the construction of computer-aided...
    ChongShen Yang, YuFeng Shi in Image and Graphics
    Conference paper 2023
  3. A review of hashing based image authentication techniques

    In the recent digitization era, image hashing is a key technology, including image recognition, authentication and manipulation detection, among many...

    Abdul Subhani Shaik, Ram Kumar Karsh, ... Rabul Hussain Laskar in Multimedia Tools and Applications
    Article 29 October 2021
  4. Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placement

    As is well known that the global optimization ability of the Fruit fly Optimization Algorithm (FOA)is weak because it is easy to fall into local...

    Qian Cao, Bo Liu, Ying ** in Journal of Cloud Computing
    Article Open access 30 August 2022
  5. Lock-Free Bucketized Cuckoo Hashing

    Concurrent hash tables are one of the fundamental building blocks for cloud computing. In this paper, we introduce lock-free modifications to...
    Wenhai Li, Zhiling Cheng, ... Lingfeng Deng in Euro-Par 2023: Parallel Processing
    Conference paper Open access 2023
  6. S3ACH: Semi-Supervised Semantic Adaptive Cross-Modal Hashing

    Hash learning has been a great success in large-scale data retrieval field because of its superior retrieval efficiency and storage consumption....
    Liu Yang, Kaiting Zhang, ... Zhan Yang in Neural Information Processing
    Conference paper 2024
  7. DASH: Data Aware Locality Sensitive Hashing

    Locality sensitive hashing (LSH) has been extensively employed to solve the problem of c-approximate nearest neighbor search (c-ANNS) in...
    Zongyuan Tan, Hongya Wang, ... Jie Zhang in Web and Big Data
    Conference paper 2023
  8. On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing

    We study the power of preprocessing adversaries in finding bounded-length collisions in the widely used Merkle-Damgård (MD) hashing in the random...

    Ashrujit Ghoshal, Ilan Komargodski in computational complexity
    Article 13 September 2023
  9. A comprehensive review of the security flaws of hashing algorithms

    The blockchain is an emerging technology. It is widely used because of its efficiency and functionality. The hash function, as a supporting aspect of...

    Alireza Sadeghi-Nasab, Vahid Rafe in Journal of Computer Virology and Hacking Techniques
    Article 19 October 2022
  10. Multi-head Hashing with Orthogonal Decomposition for Cross-modal Retrieval

    Recently, cross-modal hashing has become a promising line of research in cross-modal retrieval. It not only takes advantage of complementary multiple...
    Wei Liu, Jun Li, ... Bo Yang in MultiMedia Modeling
    Conference paper 2024
  11. Deep Consistency Preserving Network for Unsupervised Cross-Modal Hashing

    Given the proliferation of multimodal data in search engines and social networks, unsupervised cross-modal hashing has gained traction for its low...
    Mengluan Li, Yanqing Guo, ... Hong Su in Pattern Recognition and Computer Vision
    Conference paper 2024
  12. Deep fused two-step cross-modal hashing with multiple semantic supervision

    Existing cross-modal hashing methods ignore the informative multimodal joint information and cannot fully exploit the semantic labels. In this paper,...

    Peipei Kang, Zehang Lin, ... Wenyin Liu in Multimedia Tools and Applications
    Article 28 February 2022
  13. Using Perceptual Hashing for Targeted Content Scanning

    The Internet is increasingly used to disseminate unethical and illegal content. A grave concern is child sexual abuse material that is often...
    Leon Twenning, Harald Baier, Thomas Göbel in Advances in Digital Forensics XIX
    Chapter 2023
  14. Privacy protection and authentication of electronic patient information using hashing and multi watermarking technique

    The application of digital technology has brought a new transformation in the healthcare sector. Significantly, the operational efficiency between...

    Priyanka Priyadarshini, Kshiramani Naik in Multimedia Tools and Applications
    Article 03 April 2024
  15. Critical Separation Hashing for Cross-Modal Retrieval

    With the development of Internet technology, unimodal retrieval techniques are no longer suitable for the current environment, and mutual retrieval...
    Zening Wang, Yungong Sun, ... Ao Li in 6GN for Future Wireless Networks
    Conference paper 2023
  16. Hashing for Structure-Based Anomaly Detection

    We focus on the problem of identifying samples in a set that do not conform to structured patterns represented by low-dimensional manifolds. An...
    Filippo Leveni, Luca Magri, ... Giacomo Boracchi in Image Analysis and Processing – ICIAP 2023
    Conference paper 2023
  17. Deep Multi-Scale Hashing for Image Retrieval (DMSH)

    In recent years, with the great success of deep learning, deep networks-based hashing has become a leading approach for image retrieval. Most...
    Adil Redaoui, Kamel Belloulata, Amina Belalia in Artificial Intelligence: Theories and Applications
    Conference paper 2023
  18. Content-based encrypted speech retrieval scheme with deep hashing

    In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based...

    Qiu-yu Zhang, Xue-jiao Zhao, ... Yu-zhou Li in Multimedia Tools and Applications
    Article 14 February 2022
  19. A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing

    In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency...

    Qiu-yu Zhang, Jian Bai, Fu-jiu Xu in Multimedia Tools and Applications
    Article 27 February 2022
  20. Structure-Preserving Hashing for Tree-Structured Data

    Many kinds of data are tree-structured, e.g., XML documents. In this paper, a structure-preserving hashing method for rooted unordered trees is...

    Zhi Xu, Lushuai Niu, ... Qinlin Li in Signal, Image and Video Processing
    Article 13 March 2022
Did you find what you were looking for? Share feedback.