中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [12]
自动化研究所 [3]
长春光学精密机械与物... [2]
深圳先进技术研究院 [1]
西安光学精密机械研究... [1]
采集方式
OAI收割 [19]
内容类型
会议论文 [19]
发表日期
2020 [2]
2017 [1]
2015 [1]
2013 [1]
2012 [5]
2011 [1]
更多
学科主题
筛选
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
内容类型:会议论文
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
发表日期升序
发表日期降序
An Infringement Detection System for Videos based on Audio Fingerprint Technology
会议论文
OAI收割
Beijing, China, October 30-31, 2020
作者:
Yang Zheng
;
Jie Liu
;
Shuwu Zhang
  |  
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/04/08
Unsupervised variational auto-encoder hash algorithm based on multi-channel feature fusion
会议论文
OAI收割
Osaka, Japan, 2020-05-19
作者:
Wang, Huanting
;
Qu, Bo
;
Lu, Xiaoqiang
;
Chen, Yaxiong
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/08/21
Multi-channel feature fusion
Unsupervised hashing algorithm
VAE
Image retrieval
Deep Supervised Discrete Hashing
会议论文
OAI收割
Long Beach, America, 2017-12
作者:
Qi Li
;
Zhenan Sun
;
Ran He
;
Tieniu Tan
  |  
收藏
  |  
浏览/下载:73/0
  |  
提交时间:2018/01/03
Supervised Topology Preserving Hashing
会议论文
OAI收割
Kuala Lumpur, Malaysia, 2015年11月3-6日
作者:
Shu Zhang
;
Man Zhang
;
Qi Li
;
Tieniu Tan
;
Ran He
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2016/06/22
Topology
Hash
boomerang and slide-rotational analysis of the sm3 hash function
会议论文
OAI收割
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar
;
Shen Yanzhao
;
Wang Gaoli
;
Youssef Amr M.
  |  
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2013/09/22
Artificial intelligence
The design problems of one kind of chaotic one-way hash function (EI CONFERENCE)
会议论文
OAI收割
2012 4th International Conference on Multimedia and Security, MINES 2012, November 2, 2012 - November 4, 2012, Nanjing, Jiangsu, China
Li P.
;
Zhang M.
;
Shi J.
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2013/03/25
The construction method of one kind of one-way hash function based on 1-D Logistic map is analyzed. The design problem and some collision problems are pointed out. By using the dictionary attack
the collision probability of the arithmetic realized with signal floating point numbers is 2-23
and the collision probability of the arithmetic realized with double floating point numbers is 2-55. The reasons for these design problems are discussed
and some key problems are pointed out which should be taken care of while constructing one-way hash function based on a digital chaotic map. 2012 IEEE.
(pseudo) preimage attack on round-reduced grstl hash function and others
会议论文
OAI收割
19th International Workshop on Fast Software Encryption, FSE 2012, Washington, DC, United states, March 19, 2012 - March 21, 2012
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
;
Guo Jian
;
Dong Le
;
Zou Jian
  |  
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/09/22
Artificial intelligence
integral distinguishers of jh and gr?stl-512
会议论文
OAI收割
Journal of Electronics (China)
Li Yanjun
;
Wu Wenling
;
Dong Le
  |  
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/09/22
Key wordsHash function –
SHA
3 candidates –
Integral distinguisher –
JH –
Gr?stl
preimage attacks on step-reduced sm3 hash function
会议论文
OAI收割
14th International Conference on Information Security and Cryptology, ICISC 2011, Seoul, Korea, Republic of, November 30, 2011 - December 2, 2011
Zou Jian
;
Wu Wenling
;
Wu Shuang
;
Su Bozhan
;
Dong Le
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Security of data
investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
会议论文
OAI收割
18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, Beijing, China, December 2, 2012 - December 6, 2012
Sasaki Yu
;
Wang Lei
;
Wu Shuang
;
Wu Wenling
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2013/09/22
Security of data