Qiuyu Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain.
J. Supercomput., March, 2024

An intelligent homomorphic audio signal encryption algorithm for secure interacting.
Multim. Tools Appl., March, 2024

A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches.
Multim. Syst., February, 2024

A high-performance speech BioHashing retrieval algorithm based on audio segmentation.
Comput. Speech Lang., January, 2024

Unsupervised Deep Hashing with Dynamic Pseudo-Multi-Labels for Image Retrieval.
IEEE Signal Process. Lett., 2024

2023
The Frequency-Variable Rotor-Blade-Based Two-Degree-of-Freedom Actuation Principle for Linear and Rotary Motion.
Sensors, October, 2023

Enhanced Near-Infrared Ultra-Narrow Absorber Based on a Dielectric Nano-Resonant Ring for Refractive Index Sensing.
Sensors, October, 2023

OS-DS tracker: Orientation-variant Siamese 3D tracking with Detection based Sampling.
Pattern Recognit. Lett., October, 2023

Verifiable speech retrieval algorithm based on diversity security template and biohashing.
Multim. Tools Appl., October, 2023

Research on robust inversion model of soil moisture content based on GF-1 satellite remote sensing.
Comput. Electron. Agric., October, 2023

Searchable encryption over encrypted speech retrieval scheme in cloud storage.
J. Inf. Secur. Appl., August, 2023

A Robust Chaotic Map and Its Application to Speech Encryption in Dual Frequency Domain.
Int. J. Bifurc. Chaos, June, 2023

Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion.
Multim. Tools Appl., May, 2023

Verifiable speech retrieval algorithm based on KNN secure hashing.
Multim. Tools Appl., February, 2023

Encrypted speech authentication and recovery scheme based on fragile watermarking.
Telecommun. Syst., January, 2023

Distributed storage scheme for encryption speech data based on blockchain and IPFS.
J. Supercomput., 2023

2022
Sea-Surface Target Visual Tracking with a Multi-Camera Cooperation Approach.
Sensors, 2022

A location privacy protection method based on cipher-text retrieval in cloud environment.
Secur. Priv., 2022

Content-based encrypted speech retrieval scheme with deep hashing.
Multim. Tools Appl., 2022

A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing.
Multim. Tools Appl., 2022

Speech BioHashing security authentication algorithm based on CNN hyperchaotic map.
Multim. Tools Appl., 2022

Encrypted speech retrieval based on long sequence Biohashing.
Multim. Tools Appl., 2022

Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values.
Multim. Tools Appl., 2022

Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum.
Multim. Tools Appl., 2022

Residual-Based a Posteriori Error Estimates for the Time-Dependent Ginzburg-Landau Equations of Superconductivity.
J. Sci. Comput., 2022

Product typicality attribute mining method based on a topic clustering ensemble.
Artif. Intell. Rev., 2022

2021
Connectivity probability analysis for freeway vehicle scenarios in vehicular networks.
Wirel. Networks, 2021

Connectivity Probability Analysis for VANET Freeway Traffic Using a Cell Transmission Model.
IEEE Syst. J., 2021

Recovery type a posteriori error estimates for the conduction convection problem.
Numer. Algorithms, 2021

An encrypted speech authentication and tampering recovery method based on perceptual hashing.
Multim. Tools Appl., 2021

A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing.
Multim. Tools Appl., 2021

A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding.
Multim. Tools Appl., 2021

Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion.
Multim. Tools Appl., 2021

A high security BioHashing encrypted speech retrieval algorithm based on feature fusion.
Multim. Tools Appl., 2021

Audio Fingerprint Retrieval Method Based on Feature Dimension Reduction and Feature Combination.
KSII Trans. Internet Inf. Syst., 2021

Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding.
IET Image Process., 2021

2020
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction.
Multim. Tools Appl., 2020

An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction.
Multim. Tools Appl., 2020

Multi-format speech BioHashing based on spectrogram.
Multim. Tools Appl., 2020

An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing.
KSII Trans. Internet Inf. Syst., 2020

Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing.
Int. J. Netw. Secur., 2020

An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm.
Int. J. Netw. Secur., 2020

Network intrusion detection model based on multivariate correlation analysis - long short-time memory network.
IET Inf. Secur., 2020

An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing.
Turkish J. Electr. Eng. Comput. Sci., 2020

Completion of multiview missing data based on multi-manifold regularised non-negative matrix factorisation.
Artif. Intell. Rev., 2020

A Classification Retrieval Method for Encrypted Speech Based on Deep Neural Network and Deep Hashing.
IEEE Access, 2020

An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM.
IEEE Access, 2020

Joint Uplink-Downlink Resource Allocation for OFDMA-URLLC MEC Systems.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Joint Clustering and Power Allocation for the Cross Roads Congestion Scenarios in Cooperative Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2019

A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing.
Multim. Tools Appl., 2019

Convolution Neural Network-Based Prediction of Protein Thermostability.
J. Chem. Inf. Model., 2019

Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification.
Int. J. Netw. Secur., 2019

A k-anonymous Location Privacy Protection Method of Dummy Based on Geographical Semantics.
Int. J. Netw. Secur., 2019

Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding.
IET Image Process., 2019

An efficient retrieval algorithm of encrypted speech based on inverse fast Fouriertransform and measurement matrix.
Turkish J. Electr. Eng. Comput. Sci., 2019

A Method to Automatic Measuring Riding Comfort of Autonomous Vehicles: Based on Passenger Subjective Rating and Vehicle Parameters.
Proceedings of the Design, User Experience, and Usability. Application Domains, 2019

2018
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix.
Multim. Tools Appl., 2018

An efficient perceptual hashing based on improved spectral entropy for speech authentication.
Multim. Tools Appl., 2018

A Game Theory based Feature Word Selection Model for Chinese Texts.
J. Inf. Sci. Eng., 2018

Self-Calibration Based View-Invariant Hand Gesture Trajectory Analysis.
J. Inf. Hiding Multim. Signal Process., 2018

An Efficient Retrieval Method of Encrypted Speech Based on Frequency Band Variance.
J. Inf. Hiding Multim. Signal Process., 2018

High Capacity Reversible Data Hiding Algorithm for Color Image Based on Bicubic Interpolation Extension.
J. Inf. Hiding Multim. Signal Process., 2018

Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor.
Int. J. Netw. Secur., 2018

Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet.
Int. J. Netw. Secur., 2018

Mutual Information-based Intrusion Detection Model for Industrial Internet.
Int. J. Netw. Secur., 2018

An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string.
Int. J. Inf. Commun. Technol., 2018

2017
View-Invariant Hand Gesture Planar Trajectory Recognition on Monocular Vision.
J. Inf. Hiding Multim. Signal Process., 2017

Robust Hashing for Color Image Authentication Using Non-Subsampled Contourlet Transform Features and Salient Features.
J. Inf. Hiding Multim. Signal Process., 2017

Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization.
J. Inf. Hiding Multim. Signal Process., 2017

Robust Reversible Data Hiding Algorithm for Color Image Based on 2D-DCT.
J. Inf. Hiding Multim. Signal Process., 2017

Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio.
Int. J. Netw. Secur., 2017

The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set.
Int. J. Netw. Secur., 2017

A fast speech feature extraction method based on perceptual hashing.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
An Improved Bipolar Quantization-Based High-Capacity Watermarking Algorithm for Speech Perceptual Hashing Authentication System.
J. Inf. Hiding Multim. Signal Process., 2016

An Information Hiding Algorithm for Speech Perceptual Hashing Authentication System in G.729 Bitstream.
J. Inf. Hiding Multim. Signal Process., 2016

Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment.
Proceedings of the Intelligent Computing Theories and Application, 2016

2015
An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication.
J. Inf. Hiding Multim. Signal Process., 2015

An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition.
J. Inf. Hiding Multim. Signal Process., 2015

2014
Research on Hand Gesture Recognition Based on Inner-Distance Contour Point Distribution Features and Histogram Matching.
J. Comput., 2014

An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Hand Gesture Target Model Updating and Result Forecasting Algorithm based on Mean Shift.
J. Multim., 2013

A Hand Model Updating Algorithm Based on Mean Shift.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

2012
Polar-Radius-Invariant-Moment Based on Key-Points for Hand Gesture Shape Recognition.
J. Softw., 2012

Applications of Text Clustering Based on Semantic Body for Chinese Spam Filtering.
J. Comput., 2012

2010
A hybrid particle swarm optimisation algorithm and fuzzy logic for process planning and production scheduling integration in holonic manufacturing systems.
Int. J. Comput. Integr. Manuf., 2010

Subsequence kernel-based Chinese recommender system.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Fuzzy Clustering Algorithm based on Factor Analysis and its Application to Mail Filtering.
J. Softw., 2009

Hand Gesture Contour Tracking Based on Skin Color Probability and State Estimation Model.
J. Multim., 2009

Application of Refined LSA and MD5 Algorithms in Spam Filtering.
J. Comput., 2009

Grid Resource Discovery Model Based on Improved Architecture and Multicast.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

A Cross-Layer Design-Based Power-Saving Mechanism for IEEE 802.16e.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Network Security Situation Assessment Based on Data Fusion.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Research of Spam Filtering System Based on LSA and SHA.
Proceedings of the Advances in Neural Networks, 2008

Calculation of Latent Semantic Weight Based on Fuzzy Membership.
Proceedings of the Advances in Neural Networks, 2008

Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background.
Proceedings of the International Conference on Embedded Software and Systems, 2008

A Junk Mail Filtering Method Based on LSA and FSVM.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

A consistency maintenance algorithm with cursor position maintenance in real-time cooperative editing systems based on GOT algorithm.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Construction of a Dynamic Trust Ontology Model.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensor.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Research and Realization of Transaction Concurrency Control in Grid Database.
Proceedings of the Grid and Cooperative Computing, 2007

Order Holon Modeling Method Based on Time Petri-Nets and its Solution with Particle Swarm Optimization.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Timed Petri-Net(TPN) Based Scheduling Holon and Its Solution with a Hybrid PSO-GA Based Evolutionary Algorithm(HPGA).
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

A Novel Task Allocation Problem Solution with PSO Algorithm for Holonic Manufacturing System.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A Scheduling Holon Modeling Method with Petri Net and its Optimization with a Novel PSO-GA Algorithm.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A Design Method of Distributed Workflow Engine.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Research on Application of Development Method of Knowledge Base in the Integrated System for ICAD.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Hybrid Algorithm Based on PSO and Simulated Annealing and Its Applications for Partner Selection in Virtual Enterprise.
Proceedings of the Advances in Intelligent Computing, 2005

Formal security model research based on Petri-net.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005


  Loading...