共 10 条
[1]
[Anonymous], 2009, P SPIE INT SOC OPT E
[2]
[Anonymous], 2006, 2006 IEEE COMP SOC C
[3]
Broder A. Z., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P327, DOI 10.1145/276698.276781
[4]
Comparative Study on Dimensionality Reduction in Large-Scale Image Retrieval
[J].
2013 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM),
2013,
:445-450
[5]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[6]
He XF, 2004, ADV NEUR IN, V16, P153
[7]
SECURE IMAGE RETRIEVAL THROUGH FEATURE PROTECTION
[J].
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS,
2009,
:1533-1536
[8]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]
Inverted files versus signature files for text indexing
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1998, 23 (04)
:453-490