supported by the NationalNatural Science Foundation of China(No.61862041).
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third...
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...
supported by the National Key R&D Program of China under Grant 2022YFB3103500;the National Natural Science Foundation of China under Grants 62106258 and 62202459;the China Postdoctoral Science Foundation under Grant 2022M713348;Young Elite Scientists Sponsorship Program by BAST(BYESS2023304).
Asymmetric image retrieval methods have drawn much attention due to their effectiveness in resource-constrained scenarios.They try to learn two models in an asymmetric paradigm,i.e.,a small model for the query side an...
supported and funded by KAU Scientific Endowment,King Abdulaziz University,Jeddah,Saudi Arabia,grant number 077416-04.
The utilization of digital picture search and retrieval has grown substantially in numerous fields for different purposes during the last decade,owing to the continuing advances in image processing and computer vision...
supported by the National Key Research and Development Project(2021YFF0901700)。
How to protect cultural retics is of great significance to the transmission and dissemination of history and culture.Digital 3-dimensional(3D)modeling of cultural relics is an effective way to preserve them.The effici...
supported by the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDB44030200;the Beijing Natural Science Foundation-Haidian Joint Fund for Original Innovation under Grant No.L192038.
Persistent memory(PM)promises byte-addressability,large capacity,and durability.Main memory systems,such as key-value stores and in-memory databases,benefit from such features of PM.Due to the great popularity of hash...
The handy biometric data is a double-edged sword,paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern.To alleviate the concern,various biometric template prote...
This work was partially supported by Science and Technology Project of Chongqing Education Commission of China(KJZD-K202200513);National Natural Science Foundation of China(61370205);Chongqing Normal University Fund(22XLB003);Chongqing Education Science Planning Project(2021-GX-320).
In recent years,the development of deep learning has further improved hash retrieval technology.Most of the existing hashing methods currently use Convolutional Neural Networks(CNNs)and Recurrent Neural Networks(RNNs)...
supported by the NationalNatural Science Foundation of China(No.61862041).
Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech dat...