Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Leqi Jiang"'
Publikováno v:
Brain Sciences, Vol 14, Iss 3, p 216 (2024)
In recent years, the integration of brain–computer interface technology and neural networks in the field of music generation has garnered widespread attention. These studies aimed to extract individual-specific emotional and state information from
Externí odkaz:
https://doaj.org/article/281fedace7da4688be3519cc9c06410d
Publikováno v:
IEEE Access, Vol 7, Pp 26953-26966 (2019)
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting
Externí odkaz:
https://doaj.org/article/49400ddae9d34213adb0e3d4469f4a26
Publikováno v:
IEEE Transactions on Services Computing. 15:202-214
Content-based Image Retrieval (CBIR) techniques have been extensively studied with the rapid growth of digital images. Generally, CBIR service is quite expensive in computational and storage resources. Thus, it is a good choice to outsource CBIR serv
Publikováno v:
IEEE Transactions on Industrial Informatics. 16:629-638
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, and companies are highly motivated to store the data on cloud servers for cost saving and efficient application. However, the IIoT data are always of great value.
Autor:
Leqi Jiang, Zhangjie Fu
Publikováno v:
Journal of Cyber Security. 2:49-61
Publikováno v:
IEEE Access, Vol 7, Pp 26953-26966 (2019)
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting
Publikováno v:
Advances in Computers ISBN: 9780128211472
Data comparison is a crucial step in many operations, including data mining, data classification, image feature extraction, and image retrieval. With the existing data encryption technology, encrypted data computation and encrypted data comparison ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::103ab981aa6a1eccbde502dc74a6a90d
https://doi.org/10.1016/bs.adcom.2020.09.002
https://doi.org/10.1016/bs.adcom.2020.09.002
Publikováno v:
Journal of Information Security and Applications. 48:102367
Privacy-preserving is one of the most important concerns of cloud computing users. Encryption guarantees data security but makes data processing less convenient. Although many calculations in ciphertext domain are supported by some cryptosystems, the