国外资料
-
A Deep Adaptation Network for Speech Enhancement: Combining a Relativistic Discriminator With Multi-Kernel Maximum Mean Discrepancy.
Cheng, J., Liang, R., Liang, Z., Zhao, L., Huang, Chengwei, & Schuller, B. (2020). IEEE/ACM Transactions on Audio, Speech, and Language Processing, 29, 41-53.
-
Sequence-to-Sequence Load Disaggregation Using Multi-Scale Residual Neural Network.
Zhou, G., Li, Z., Fu, M., Feng, Y., Wang, X., & Huang, Chengwei (2020).IEEE Transactions on Instrumentation and Measurement.
-
FENP: A Database of Neonatal Facial Expression for Pain Analysis.
Yan, J., Lu, G., Li, X., Zheng, W., Huang, Chengwei, Cui, Z., ... & Li, H. (2020). IEEE Transactions on Affective Computing.
-
Speech emotion classification using attention-based LSTM.
Xie, Y., Liang, R., Liang, Z., Huang, Chengwei, Zou, C., & Schuller, B. (2019). IEEE/ACM Transactions on Audio, Speech, and Language Processing, 27(11), 1675-1685.
-
Image indexing and content analysis in children’s picture books using a large-scale database. Multimedia Tools and Applications, 78(15), 20679-20695.
Huang, Chengwei, & Jiang, H. (2019).
-
SE-ORAM: A storage-efficient oblivious RAM for privacy-preserving access to cloud storage.
Ma, Q., Zhang, J., Peng, Y., Zhang, W., & Qiao, D. (2016, June).In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 20-25).
-
DF-ORAM: A practical dummy free oblivious RAM to protect outsourced data access pattern.
Ma, Q., Zhang, W., & Zhang, J. (2016, September). In International Conference on Network and System Security (pp. 415-432). Springer, Cham.
-
Data access pattern protection in cloud storage. (Doctoral dissertation).
Zhang, J. (2016).
-
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption.
Zhang, J., Ma, Q., Zhang, W., & Qiao, D. (2016). IACR Cryptol. ePrint Arch., 2016, 882.
-
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage.
Zhang, J., Ma, Q., Zhang, W., & Qiao, D. (2016, November). In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 527-532).
-
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services.
Zhang, J., Zhang, W., & Qiao, D. (2016). IACR Cryptol. ePrint Arch., 2016, 73.
-
TSKT-ORAM: A two-server k-ary tree oblivious RAM without homomorphic encryption.
Zhang, J., Ma, Q., Zhang, W., & Qiao, D. (2017). Future Internet, 9(4), 57.
-
GP-ORAM: A Generalized Partition ORAM.
Zhang, J., Zhang, W., & Qiao, D. (2015, November).In International Conference on Network and System Security (pp. 268-282). Springer, Cham.
国内资料
李顺东, 杜润萌, 杨颜璟, & 魏琼. (2020). 计算机学报, 43(8), 1448-1462.
杜润萌, 刘旭红, 李顺东, & 魏琼. (2018). 密码学报, 6(2), 205-218.
李顺东, 杜润萌, 杨颜璟, & 魏琼. 电子学报, 48(10), 1933-1937.
魏琼, 李顺东, 王文丽, & 杜润萌. (2020). 密码学报, 7(6), 774-788.