咨询与建议

限定检索结果

文献类型

  • 48 篇 期刊文献

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 10 篇 计算机科学与技术...
    • 3 篇 林业工程
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
    • 2 篇 软件工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 地质资源与地质工...
    • 1 篇 矿业工程
    • 1 篇 石油与天然气工程
    • 1 篇 网络空间安全
  • 11 篇 农学
    • 8 篇 园艺学
  • 6 篇 理学
    • 2 篇 物理学
    • 2 篇 大气科学
    • 2 篇 科学技术史(分学科...
    • 1 篇 地质学
  • 3 篇 医学
  • 2 篇 哲学
    • 2 篇 哲学
  • 2 篇 历史学
    • 2 篇 中国史
    • 2 篇 世界史
  • 2 篇 管理学
  • 2 篇 艺术学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 3 篇 steganography
  • 3 篇 西瓜
  • 2 篇 东昆仑
  • 2 篇 fld
  • 2 篇 融合媒体
  • 2 篇 伪造指纹检测
  • 2 篇 微胶囊
  • 2 篇 折射率结构常数
  • 2 篇 基因定位
  • 2 篇 普通西瓜
  • 2 篇 黏籽西瓜
  • 1 篇 乘性姿态误差
  • 1 篇 遗传分析
  • 1 篇 移动趋势
  • 1 篇 transient overex...
  • 1 篇 dct coefficients
  • 1 篇 性能表征
  • 1 篇 胶合板
  • 1 篇 凋亡
  • 1 篇 集中监控

机构

  • 5 篇 南京信息工程大学
  • 3 篇 浙江升华云峰新材...
  • 2 篇 nanjing universi...
  • 2 篇 中广电广播电影电...
  • 2 篇 中国科学院安徽光...
  • 2 篇 中国科学院自然科...
  • 2 篇 中国地质大学
  • 2 篇 中国农业科学院郑...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 青海省地质调查局
  • 2 篇 jiangsu engineer...
  • 1 篇 湖北广电长江新媒...
  • 1 篇 jiangsu engineer...
  • 1 篇 滴图科技有限公司
  • 1 篇 中国农业科学院植...
  • 1 篇 department of ch...
  • 1 篇 key laboratory o...
  • 1 篇 浙江省衢州市中医...
  • 1 篇 henan key labora...

作者

  • 9 篇 chengsheng yuan
  • 6 篇 xingming sun
  • 5 篇 龚成胜
  • 5 篇 路绪强
  • 5 篇 袁程胜
  • 5 篇 刘文革
  • 4 篇 朱红菊
  • 4 篇 袁平丽
  • 4 篇 赵胜杰
  • 4 篇 muhammad jawad u...
  • 4 篇 何楠
  • 3 篇 付章杰
  • 3 篇 桂成胜
  • 3 篇 杨东东
  • 3 篇 ruohan meng
  • 3 篇 刁卫楠
  • 3 篇 qi cui
  • 3 篇 hongju zhu
  • 3 篇 nan he
  • 3 篇 muhammad anees

语言

  • 35 篇 中文
  • 13 篇 英文
检索条件"作者=chengsheng Yuan"
48 条 记 录,以下是1-10 订阅
排序:
Fingerprint Liveness Detection Based on Multi-Scale LPQ and PCA
收藏 引用
China Communications 2016年 第7期13卷 60-65页
作者: chengsheng yuan Xingming Sun Rui Lv School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Survey of Image Information Hiding Algorithms Based on Deep Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2018年 第12期117卷 425-454页
作者: Ruohan Meng Qi Cui chengsheng yuan School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Electrical and computer Engineering University of Windsor401 Sunset AvenueWindsorONN9B 374Canada.
With the development of data science and technology,information security has been further *** order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
Computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou chengsheng yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 899-914页
作者: chengsheng yuan Baojie Cui Zhili Zhou Xinting Li Qingming Jonathan Wu Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of International Relations National University of Defense TechnologyNanjing210039China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable ***,recent studies have shown that these deep fake fingerprint detection(DFFD)mod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 719-733页
作者: Jie Chen chengsheng yuan Chen Cui Zhihua Xia Xingming Sun Thangarajah Akilan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310053China Jiangsu Yuchi Blockchain Research Institute Nanjing210044China Department of Software Engineering Lakehead UniversityThunder BayON P7B 5E1Canada
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address cha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Rasterized Lightning Disaster Risk Method for Imbalanced Sets Using Neural
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 563-574页
作者: Yan Zhang Jin Han chengsheng yuan Shuo Yang Chuanlong Li Xingming Sun Nanjing University of Information Science&Technology Nanjing210044China Engineering Research Center of Digital Forensics Ministry of EducationNanjing201144China Waterford Institute of Technology WaterfordX91K0EKIreland
Over the past 10 years,lightning disaster has caused a large number of casualties and considerable economic loss *** poses a huge threat to various *** an attempt to reduce the risk of lightning-caused disaster,many s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural Network and Principal Component Analysis
收藏 引用
Computers, Materials & Continua 2017年 第4期53卷 357-372页
作者: chengsheng yuan Xinting Li Q.M.Jonathan Wu Jin Li Xingming Sun School of Computer and Software Nanjing University of Information Science&TechnologyNing Liu RoadNo.219NanjingChina210044 Jiangsu Engineering Center of Network Monitoring Ning Liu RoadNo.219NanjingChina210044 Department of Electrical and Computer Engineering University of Windsor401 Sunset AvenueWindsorONCanada N9B 3P4 School of Computer Science Guangzhou UniversityYudongxi Road 36Tianhe DistrictGuangzhouChina510500
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints,which are made of common fingerprint materials,such as silicon,latex,***,to protect our privacy,many finge... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
OPPR:An Outsourcing Privacy-Preserving JPEG Image Retrieval Scheme with Local Histograms in Cloud Environment
收藏 引用
Journal on Big Data 2021年 第1期3卷 21-33页
作者: Jian Tang Zhihua Xia Lan Wang chengsheng yuan Xueli Zhao Nanjing University of Information Science&Technology Nanjing210044China
As the wide application of imaging technology,the number of big image data which may containing private information is growing *** to insufficient computing power and storage space for local server device,many people ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
基于差分隐私的深度伪造指纹检测模型版权保护算法
收藏 引用
通信学报 2022年 第9期43卷 181-193页
作者: 袁程胜 郭强 付章杰 南京信息工程大学计算机学院、软件学院、网络空间安全学院 江苏南京210044 南京信息工程大学数字取证教育部工程研究中心 江苏南京210044
提出了一种基于差分隐私的深度伪造指纹检测模型版权保护算法,在不削弱原始任务性能的同时,实现了深度伪造指纹检测模型版权的主动保护和被动验证。在原始任务训练时,通过添加噪声以引入随机性,利用差分隐私算法的期望稳定性进行分类决... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第1期1卷 43-48页
作者: Ruohan Meng Zhili Zhou Qi Cui Xingming Sun chengsheng yuan School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and computer Engineering University of WindsorWindsorONCanada N9B 3P4
At present,the coverless information hiding has been ***,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论