共 50 条
- [1] Data Integrity Mechanism Using Hashing Verification [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 94 - 98
- [3] IJTAG Integrity Checking with Chained Hashing [J]. 2018 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2018,
- [4] Practical Integrity Protection with Oblivious Hashing [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 40 - 52
- [5] Hashing for Distributed Data [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 37 : 1642 - 1650
- [6] Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques [J]. 2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 45 - 50
- [7] Multi-granularity feature learning network for deep hashing [J]. NEUROCOMPUTING, 2021, 423 : 274 - 283
- [10] Model Size Reduction Using Frequency Based Double Hashing for Recommender Systems [J]. RECSYS 2020: 14TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2020, : 521 - 526