default search action
Yi-Bo Huang 0001
Person information
- affiliation: Northwest Normal University, Lanzhou, China
Other persons with the same name
- Yi-Bo Huang 0002 (aka: Yibo Huang 0002) — China University of Geosciences, Wuhan, China
- Yi-Bo Huang 0004 (aka: Yibo Huang 0004) — Zhejiang University, Hangzhou, China
- Yibo Huang 0003 — Sichuan University, Chengdu, China
- Yibo Huang 0005 (aka: Bobo Huang) — University of Michigan, USA (and 2 more)
- Yibo Huang 0006 — University of Texas at Austin, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Yibo Huang, Zhihuan Song, Wei Yu:
Stability analysis of discrete-time systems with arbitrary delay kernels based on kernel-related summation inequality and model transformation. Appl. Math. Comput. 476: 128740 (2024) - [j29]Yi-Bo Huang, De-Huai Chen, Bo-Run Hua, Qiu-Yu Zhang:
A high-performance speech BioHashing retrieval algorithm based on audio segmentation. Comput. Speech Lang. 83: 101551 (2024) - [j28]Hao Li, Xin Jing, Yao Zhang, Yibo Huang, Jinxiang Shen:
Efficient encrypted speech retrieval based on hadoop cluster under SW CPU. Multim. Tools Appl. 83(23): 63047-63073 (2024) - [j27]Qiu-yu Zhang, Yong-wang Wen, Yi-Bo Huang, Fang-peng Li:
Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption. Multim. Tools Appl. 83(26): 67469-67500 (2024) - [j26]Yibo Huang, Zhi-Ling Hu, Yuanlian Huo, Yongfeng Qi, Jie Liu, Zhiyong Li:
A quantized minimum kernel risk hyperbolic secant adaptive filtering algorithm. Signal Image Video Process. 18(5): 4291-4301 (2024) - [j25]Lingtao Meng, Qiuyu Zhang, Rui Yang, Yi-Bo Huang:
Unsupervised Deep Hashing with Dynamic Pseudo-Multi-Labels for Image Retrieval. IEEE Signal Process. Lett. 31: 909-913 (2024) - [j24]Lingtao Meng, Qiuyu Zhang, Rui Yang, Yi-Bo Huang:
Unsupervised Deep Triplet Hashing for Image Retrieval. IEEE Signal Process. Lett. 31: 1489-1493 (2024) - [j23]Yibo Huang, Bo Wang, Xiang-rong Pu, Yian Li, Qiuyu Zhang:
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain. J. Supercomput. 80(5): 6661-6698 (2024) - 2023
- [j22]Yi-Bo Huang, Peng-Wei Xie, Jun-Bin Gao, Qiu-Yu Zhang:
A Robust Chaotic Map and Its Application to Speech Encryption in Dual Frequency Domain. Int. J. Bifurc. Chaos 33(8): 2350096:1-2350096:18 (2023) - [j21]Qiuyu Zhang, Minrui Fu, Zhenyu Zhao, Yibo Huang:
Searchable encryption over encrypted speech retrieval scheme in cloud storage. J. Inf. Secur. Appl. 76: 103542 (2023) - [j20]Li An, Yi-Bo Huang, Qiu-yu Zhang:
Verifiable speech retrieval algorithm based on KNN secure hashing. Multim. Tools Appl. 82(5): 7803-7824 (2023) - [j19]Tengfei Chen, Yi-Bo Huang, Xiang-rong Pu, Shaohui Yan, Qiu-yu Zhang:
Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion. Multim. Tools Appl. 82(11): 16767-16792 (2023) - [j18]Yuan Zhang, Yi-Bo Huang, De-Huai Chen, Qiu-yu Zhang:
Verifiable speech retrieval algorithm based on diversity security template and biohashing. Multim. Tools Appl. 82(24): 36973-37002 (2023) - [c4]Bo-Run Hua, Yi-Bo Huang, Yi-An Li:
Speech Retrieval Algorithm Based on Chaotic Hashing with an Improved Shazam Approach. EITCE 2023: 434-438 - 2022
- [j17]Yibo Huang, Hexiang Hou, Tengfei Chen, Hao Li, Qiu-yu Zhang:
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values. Multim. Tools Appl. 81(2): 2873-2899 (2022) - [j16]Yibo Huang, Yong Wang, Hao Li, Yuan Zhang, Qiu-yu Zhang:
Encrypted speech retrieval based on long sequence Biohashing. Multim. Tools Appl. 81(9): 13065-13085 (2022) - [j15]Yibo Huang, Tengfei Chen, Qiu-yu Zhang, Yuan Zhang, Shaohui Yan:
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum. Multim. Tools Appl. 81(18): 25829-25852 (2022) - [j14]Yibo Huang, Yuan-Zhang, Tengfei Chen, Shaohui Yan, Qiu-yu Zhang:
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map. Multim. Tools Appl. 81(26): 37953-37979 (2022) - 2021
- [j13]Yong Wang, Yibo Huang, Ran Zhang, Qiu-yu Zhang:
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion. Multim. Tools Appl. 80(7): 10013-10036 (2021) - [j12]Yibo Huang, Hao Li, Yong Wang, Yi-rong Xie, Qiu-yu Zhang:
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion. Multim. Tools Appl. 80(25): 33615-33640 (2021) - 2020
- [j11]Yi-Bo Huang, Hexiang Hou, Yong Wang, Yuan Zhang, Manhong Fan:
A Long Sequence Speech Perceptual Hashing Authentication Algorithm Based on Constant Q Transform and Tensor Decomposition. IEEE Access 8: 34140-34152 (2020) - [j10]Qiu-yu Zhang, Zi-xian Ge, Yingjie Hu, Jian Bai, Yi-Bo Huang:
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction. Multim. Tools Appl. 79(9-10): 6337-6361 (2020) - [j9]Yi-Bo Huang, Yong Wang, Qiu-yu Zhang, Wei-zhao Zhang, Manhong Fan:
Multi-format speech BioHashing based on spectrogram. Multim. Tools Appl. 79(33-34): 24889-24909 (2020) - [j8]Qiu-yu Zhang, Gai-li Li, Yi-Bo Huang:
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multim. Tools Appl. 79(39-40): 29775-29798 (2020)
2010 – 2019
- 2018
- [j7]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string. Int. J. Inf. Commun. Technol. 12(1/2): 31-50 (2018) - [j6]Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu:
Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor. Int. J. Netw. Secur. 20(2): 206-216 (2018) - [j5]Qiu-yu Zhang, Wen-Jin Hu, Yi-Bo Huang, Si-Bin Qiao:
An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multim. Tools Appl. 77(2): 1555-1581 (2018) - [j4]Qiu-yu Zhang, Si-Bin Qiao, Yi-Bo Huang, Tao Zhang:
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multim. Tools Appl. 77(16): 21653-21669 (2018) - 2017
- [j3]Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, Yi-Bo Huang:
Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio. Int. J. Netw. Secur. 19(5): 752-760 (2017) - [c3]Qiu-Yu Zhang, Sibin Qiao, Tao Zhang, Yi-Bo Huang:
A fast speech feature extraction method based on perceptual hashing. ICNC-FSKD 2017: 1295-1300 - 2016
- [c2]Qiu-Yu Zhang, Wen-Jin Hu, Yi-Bo Huang, Si-Bin Qiao:
Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment. ICIC (1) 2016: 99-111 - 2015
- [j2]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition. J. Inf. Hiding Multim. Signal Process. 6(2): 311-322 (2015) - [j1]Qiu-Yu Zhang, Shuang Yu, Peng-Fei Xing, Yi-Bo Huang, Zhan-Wei Ren:
An Improved Phase Coding-Based Watermarking Algorithm for Speech Perceptual Hashing Authentication. J. Inf. Hiding Multim. Signal Process. 6(6): 1231-1241 (2015) - 2014
- [c1]Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform. 3PGCIC 2014: 622-627
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint