咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 核科学与技术
  • 6 篇 理学
    • 4 篇 系统科学
    • 1 篇 物理学
    • 1 篇 大气科学
  • 2 篇 管理学
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 1 篇 历史学
    • 1 篇 中国史
  • 1 篇 农学
    • 1 篇 园艺学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 1 篇 support vector m...
  • 1 篇 juglans sigillat...
  • 1 篇 nuisance attribu...
  • 1 篇 speaker verifica...
  • 1 篇 modification rat...
  • 1 篇 涂层导体
  • 1 篇 gan量子计算
  • 1 篇 尊重档案结构原则
  • 1 篇 gan功率器件
  • 1 篇 ni/cu双金属基带
  • 1 篇 mlsb (multiple l...
  • 1 篇 nist 06 speaker ...
  • 1 篇 multimedia encry...
  • 1 篇 台湾矿产
  • 1 篇 steganalysis
  • 1 篇 model
  • 1 篇 opti- mum and lc...
  • 1 篇 southwest china
  • 1 篇 基隆煤矿
  • 1 篇 hybrid decoder

机构

  • 1 篇 college of physi...
  • 1 篇 国家电网有限公司...
  • 1 篇 institute of mol...
  • 1 篇 department of ph...
  • 1 篇 上海城投集团有限...
  • 1 篇 school of chemic...
  • 1 篇 1. zhengzhou inf...
  • 1 篇 center for excel...
  • 1 篇 中国电信集团有限...
  • 1 篇 cas key laborato...
  • 1 篇 school of school...
  • 1 篇 军委装备发展部某...
  • 1 篇 中国人民解放军海...
  • 1 篇 university of th...
  • 1 篇 莆田学院
  • 1 篇 西北有色金属研究...
  • 1 篇 the key laborato...
  • 1 篇 neel institute c...
  • 1 篇 北京大学
  • 1 篇 中国人民大学

作者

  • 1 篇 zuo-ying xiahou
  • 1 篇 luo xiangyang 1 ...
  • 1 篇 shou yang hu
  • 1 篇 china 210044shig...
  • 1 篇 赖凡
  • 1 篇 hector mirallas
  • 1 篇 yong yang
  • 1 篇 龙禹
  • 1 篇 郭海强
  • 1 篇 damien neyret
  • 1 篇 卞梁
  • 1 篇 odier p
  • 1 篇 yu-peng yan
  • 1 篇 bo shi
  • 1 篇 maofa ge
  • 1 篇 ya-huang luo
  • 1 篇 neill raper
  • 1 篇 连潞文
  • 1 篇 eric berthoumieu...
  • 1 篇 esther ferrer-ri...

语言

  • 11 篇 英文
  • 7 篇 中文
检索条件"作者=china 210044Shiguo Lian France Telecom research and Development Beijing Beijing"
18 条 记 录,以下是1-10 订阅
排序:
Hybrid Multiplicative Watermarking and Its Decoders
Hybrid Multiplicative Watermarking and Its Decoders
收藏 引用
第三届多媒体信息网络与安全国际会议
作者: Jinwei Wang Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing china 210044shiguo lian france telecom research and development (Orange Labs) beijing beijing china 10080 Leiming Yan and Yuxiang Wang School of Computer and Software Nanjing University of Information Science and Technology Nanjing china 210044
With the rapid development and the richer content of the Internet, the copyright protection of the works should be further developed. The watermarking has become a possible solution. In this paper, firstly, a novel hy... 详细信息
来源: cnki会议 评论
Modification ratio estimation for a category of adaptive steganography
收藏 引用
Science china(Information Sciences) 2010年 第12期53卷 2472-2484页
作者: LUO XiangYang 1 , LIU FenLin 1 , YANG ChunFang 1 & lian shiguo 2 1 Zhengzhou Information Science and Technology Institute, Zhengzhou 450002, china 2 france telecom R&D beijing, beijing 100080, china 1. Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China2. France Telecom R&D Beijing Beijing 100080 China
This paper investigates the detection of adaptive image steganography. Firstly, the sample pair analysis model of multiple least-significant bits (MLSB) replacement is analyzed, and the conditions under which the adap... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Novel encryption model for multimedia data
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第5期20卷 1081-1085页
作者: Ye Dengpan~(1,2) & lian shiguo~3 1.The Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan 430072,P.R.china 2.School of Computer Science,Wuhan Univ.,Wuhan 430072,P.R.china 3.france telecom R&D beijing,beijing 100080,P.R.china The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan 430072 P. R. China School of Computer Science Wuhan Univ. Wuhan 430072 P. R. China france telecom R&D beijing Beijing 100080 P. R. China
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Using SVM for Text-Independent Speaker Verification
Using SVM for Text-Independent Speaker Verification
收藏 引用
第八届全国人机语音通讯学术会议
作者: Hao Yang, Yuan Dong, Xianyu Zhao, Xuefeng Zhang, Haila Wang beijing University of Posts and telecommunications france telecom research & development Center, beijing, china, 100083
Most of the state-of-the-art Text Independent Speaker Verification(SV) systems are based on Gaussian Mixture Models(GMM). Some literatures present that Support Vector Machines(SVM) could also give dramatic performance...
来源: cnki会议 评论
INSIGHT INTO THE ROLE OF PITCH INFORMATION IN TEXT-INDEPENDENT SPEAKER RECOGNITION
INSIGHT INTO THE ROLE OF PITCH INFORMATION IN TEXT-INDEPENDE...
收藏 引用
第八届全国人机语音通讯学术会议
作者: Xuefeng Zhang, Yuan Dong, Xianyu Zhao, Hao Yang, Haila Wang france telecom research & development Center, beijing, china, 100083 beijing University of Posts and telecommunications
This paper provides explanation and insight regarding the role of pitch information in text-independent speaker verification by experiments. The paper first brief a robust fundamental frequency extraction method. Then...
来源: cnki会议 评论
THE france telecom SYSTEM FOR THE TEXT-INDEPENDENT SPEAKER VERIFICATION
THE FRANCE TELECOM SYSTEM FOR THE TEXT-INDEPENDENT SPEAKER V...
收藏 引用
第八届全国人机语音通讯学术会议
作者: Yuan Dong, Xianyu Zhao, Xuefeng Zhang, Hao Yang, Haila Wang france telecom research & development Center, beijing, china, 100083 beijing University of Posts and telecommunications
This paper presents an overview of the architecture and algorithms implemented in france telecom’s text-independent speaker verification system. We describe individual components including the front-end processing, s...
来源: cnki会议 评论
SPORTS AUDIO CLASSIFICATION BASED ON MFCC AND GMM
SPORTS AUDIO CLASSIFICATION BASED ON MFCC AND GMM
收藏 引用
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology(IC-BNMT2009)
作者: Liu Jiqing 1 Dong Yuan 1 Huang Jun 1 Zhao Xianyu 2 Wang Haila 2 1 beijing University of Posts and telecommunications beijing 2 france telecom research & development Center beijing
Audio segmentation and classification can provide useful information for multimedia content *** this paper,we present a approach to segment and categorize the sports audio into speech,music and other environmental sou... 详细信息
来源: cnki会议 评论
Combination of the two dominant systems of SVM and GMM-UBM in text-independent speaker verification:SVM-based system using GMM super vector
Combination of the two dominant systems of SVM and GMM-UBM i...
收藏 引用
第九届全国人机语音通讯学术会议
作者: ZHAO Jian2, DONG Yuan1,2, ZHAO Xianyu1, YANG Hao2, LU liang2, WANG Haila1 (1. france telecom research & development Center, beijing 100080, china 2. beijing University of Posts and telecommunications, beijing 100876, china)
In the text-independent speaker verification field, Gaussian mixture model - universal background model strategy and support vector machines are the two most dominant methodologies. Just recently, a newly SVM-based sp... 详细信息
来源: cnki会议 评论
欧美人工智能监管模式及政策启示
收藏 引用
中国行政管理 2024年 第1期40卷 77-88页
作者: 陈凤仙 连雨璐 王娜 中国电信研究院战略发展研究所 北京102209 北京大学政府管理学院 北京100871
伴随以ChatGPT为代表的生成式人工智能的多场景应用,技术迭代升级背后的潜在异化风险带来全新的监管挑战。本文系统梳理当前主要经济体人工智能监管实践动态,分析典型监管模式路径及其现实困境,尝试在此基础上提出应对举措。研究发现,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
物联网安全防御体系分析及5G mMTC场景安全问题研究
收藏 引用
通信与信息技术 2024年 第2期 36-41页
作者: 李博 沈潋 中国电信集团有限公司 北京100032 国家电网有限公司大数据中心 北京100052
随着智能家居、智慧医疗、车联网等技术的发展,物联网应用越发普及,在5G的牵引下,物联网有了新的发展动能,连接总数持续稳步增长,同时物联网安全攻击数量也空前增长,因此网络安全问题也引发了众多研究者的关注。首先介绍了物联网安全态... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 博看期刊 评论