Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    RuCo alloy nanoparticles embedded within N-doped porous two-dimensional carbon nanosheets: a high-performance hydrogen evolution reaction catalyst

    Develo** cost-effective electrocatalysts with high activity and stability especially at high current density is of great significance for the large-scale commercial application of electrochemical water split...

    **-Hui Wang, Shao-Wei Yang, Fu-Bin Ma, Yi-Ke Zhao, Shi-Nuo Zhao in Tungsten (2024)

  2. No Access

    Article

    Digital image copyright protection method based on blockchain and zero trust mechanism

    In order to make the image copyright protection system can resist network attacks, and to solve the problems of unknown copyright owner, difficulty in data integrity verification and unauthorized redistributio...

    Qiu-yu Zhang, Guo-rui Wu, Rui Yang, Jia-yan Chen in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption

    The development of deep learning technology makes speech retrieval and recognition more accurate and efficient. Meanwhile, the privacy leakage problem of speech data is becoming increasingly prominent, but the...

    Qiu-yu Zhang, Yong-wang Wen, Yi-bo Huang, Fang-peng Li in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    Verifiable speech retrieval algorithm based on diversity security template and biohashing

    In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template, this paper proposes a verifiable speech retrieval algorithm...

    Yuan Zhang, Yi-bo Huang, De-huai Chen, Qiu-yu Zhang in Multimedia Tools and Applications (2023)

  5. No Access

    Article

    Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion

    Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence ...

    Teng-fei Chen, Yi-bo Huang, **ang-rong Pu in Multimedia Tools and Applications (2023)

  6. No Access

    Article

    Verifiable speech retrieval algorithm based on KNN secure hashing

    With the rapid development of mobile Internet, the dimension of speech data is too high and the space is complex. The existing speech retrieval algorithms can not meet the efficient retrieval efficiency and pr...

    Li An, Yi-bo Huang, Qiu-yu Zhang in Multimedia Tools and Applications (2023)

  7. No Access

    Article

    Encrypted speech authentication and recovery scheme based on fragile watermarking

    In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery,...

    Qiu-yu Zhang, Fu-jiu Xu in Telecommunication Systems (2023)

  8. No Access

    Article

    Product typicality attribute mining method based on a topic clustering ensemble

    Despite the extensive application of topic models in natural language processing tasks in recent years, the Chinese texts of short comments characterised by large scale, high noise and small information points...

    **g-Tao Sun, Qiu-Yu Zhang in Artificial Intelligence Review (2022)

  9. No Access

    Article

    Speech BioHashing security authentication algorithm based on CNN hyperchaotic map

    The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is...

    Yi-bo Huang, Yuan-Zhang, Teng-Fei Chen, Shao-Hui Yan in Multimedia Tools and Applications (2022)

  10. No Access

    Article

    Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

    The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time...

    Yi-bo Huang, Teng-fei Chen, Qiu-yu Zhang, Yuan Zhang in Multimedia Tools and Applications (2022)

  11. No Access

    Article

    A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing

    In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency and retrieval accuracy, and protect the privacy of the cloud s...

    Qiu-yu Zhang, Jian Bai, Fu-jiu Xu in Multimedia Tools and Applications (2022)

  12. No Access

    Article

    Encrypted speech retrieval based on long sequence Biohashing

    This paper proposes a Encrypted speech retrieval based on long sequence Biohashing to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the efficiency and accurac...

    Yi-bo Huang, Yong Wang, Hao Li, Yuan Zhang in Multimedia Tools and Applications (2022)

  13. No Access

    Article

    Insight into the Excellent Tribological Performance of Highly Oriented Poly(phenylene sulfide)

    Achieving low friction and wear of poly(phenylene sulfide) (PPS) without using fillers or blending is a challenging task, but one of considerable practical importance. Here we describe how neat PPS with high t...

    Liang-Qing Zhang, Shu-Gui Yang, **g-Han Zhang in Chinese Journal of Polymer Science (2022)

  14. No Access

    Article

    Content-based encrypted speech retrieval scheme with deep hashing

    In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based encrypted speech retrieval methods, and as well as improve retrieva...

    Qiu-yu Zhang, Xue-jiao Zhao, Qi-wen Zhang, Yu-zhou Li in Multimedia Tools and Applications (2022)

  15. No Access

    Article

    Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values

    The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the uti...

    Yi-bo Huang, Hexiang Hou, Tengfei Chen, Hao Li in Multimedia Tools and Applications (2022)

  16. No Access

    Article

    A high security BioHashing encrypted speech retrieval algorithm based on feature fusion

    In order to solve the problem of plaintext data leakage, and to improve the diversity and security of biometric template, this paper proposes a high security BioHashing encrypted speech retrieval algorithm bas...

    Yi-bo Huang, Hao Li, Yong Wang, Yi-rong **e in Multimedia Tools and Applications (2021)

  17. No Access

    Article

    An encrypted speech authentication and tampering recovery method based on perceptual hashing

    With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech results from the speech retrieval system are faced with some se...

    Qiu-yu Zhang, Deng-hai Zhang, Fu-jiu Xu in Multimedia Tools and Applications (2021)

  18. No Access

    Article

    Synthesis of hollow spherical nickel oxide and its gas-sensing properties

    Semiconductor metal oxides have attracted wide attention in the area of gas sensor due to that they have unique advantages in the rapid and accurate detection of harmful gases. A simple strategy is to synthesi...

    Wang-Chang Geng, **n-Rou Cao, Shi-Lu Xu, Jiang-Hua Yang, Natasha Babar in Rare Metals (2021)

  19. No Access

    Article

    Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion

    In order to solve the problems of poor security and small application scope of speech content authentication, and to improve the robustness, discrimination and real-time performance of speech authentication, a...

    Yong Wang, Yi-bo Huang, Ran Zhang, Qiu-yu Zhang in Multimedia Tools and Applications (2021)

  20. No Access

    Article

    A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing

    In this paper, we propose a retrieval algorithm for encrypted speech based on the convolution neural network (CNN) and deep hashing. It is used to overcome the feature extraction defects of the existing conten...

    Qiu-yu Zhang, Yu-zhou Li, Ying-jie Hu in Multimedia Tools and Applications (2021)

previous disabled Page of 2