Pinned Repositories
-
基于混沌系统的图像可逆信息隐藏算法
-A-Secure-and-Dynamic-Multi-Keyword-Ranked-Search-Scheme-over-Encrypted-Cloud-Data
• Here, a secure multi-keyword ranked search scheme over encrypted cloud data is presented using JAVA as the frontend technology and backend as MySQL.• Specifically, the vector space model and the widely-used “term frequency (TF) × inverse document frequency(IDF)” model are combined in the index construction and query generation to provide multi-keyword ranked search.• We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. • The secure kNN algorithm is utilized to encrypt the index and query vectors, and to ensure accurate relevance score calculation between encrypted index and query vectors. • To resist different attacks in different threat models, we construct two secure search schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the known ciphertext model, and the enhanced dynamic multi-keyword ranked search (EDMRS) scheme in the known background model.
-R-P2-ML-GCN
Project codes of (Robust) Privacy-Preserving Multi-label Image Recognition with Graph Convolutional Network
2021-CV-Surveys
2021 年,计算机视觉相关综述。包括目标检测、跟踪........
A-Secure-and-Dynamic-Multi-keyword-Ranked-Search-Scheme-over-Encrypted-Cloud-Data-1
Code for paper “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”
abe-se_prototype
A prototype that shows the feasability of Attribute-Based Encryption and Searchable Deterministic Encryption
ABKS-demo
Searchable encryption with access control
accessorize-to-a-crime
Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition." In Proc. CCS, 2016.
ImageSearch-1
使用SURF+Kmeans建立的图像检索系统(CBIR)
VP-FinalProject
Implementation of the network RRU-NET of the paper "RRU-Net: The Ringed Residual U-Net for Image Splicing Forgery Detection" also modified with the FSM block.
tf369's Repositories
tf369/Aura
Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy
tf369/awesome-cbir-papers
📝Awesome and classical image retrieval papers
tf369/Classic-and-state-of-the-art-image-fusion-methods
CBF,CVT,DTCWT,GTF,LP,MSVD,RP,Wavelet,CNN,Deepfuse,DenseFuse,FusionGAN,IFCNN,MDlatLRR,DDcGAN,ResNetFusion,NestFuse,NVCE,FusionDN,HybridMSD,PMGI,IFEVIP,StructAware,U2Fusion,MEF-GAN,JSR,ConvSR,DCHWT,MEFGAN,MWFG,PMGI,PANGAN,ect
tf369/cnn-imageretrieval
Implement a CNN Model with Keras and Image Retrieval application with VGG-16 and ResNet-50
tf369/Cross-modal-retrieval-1
媒体计算实践作业:图像——文本跨模态搜索
tf369/Defense-against-Adversarial-Attacks-by-Low-level-Image-Transformations
This code is the implementation of the adversarial defense method introduced in the paper "Defense against Adversarial Attacks by Low-level Image Transformations".
tf369/FaVeST
Fast Vector Spherical Harmonic Transforms
tf369/Fuzzy-keyword-search-over-encrypted-data-in-cloud-computing
Fuzzy keyword search over encrypted data in cloud computing | PHP project
tf369/GEP_PAMI
Code for TPAMI 2020 paper "A Generalized Earley Parser for Human Activity Parsing and Prediction"
tf369/hedfq
Homomorphic encryption client-server demo
tf369/Homomorphic_PCA
Performing PCA on encrypted data
tf369/Huawei_DIGIX_ImageRetri_Top2
2020 DIGIX GLOBAL AI CHALLENGE - Digital Device Image Retrieval - Top2 WEARE队
tf369/image-classification-moment-invariants
Pattern recognition image classification using moment invariants.
tf369/image-to-recipe-transformers
Code for CVPR 2021 paper: Revamping Cross-Modal Recipe Retrieval with Hierarchical Transformers and Self-supervised Learning
tf369/Momenet
tf369/Objective-evaluation-for-image-fusion
image fusion : EI CrossEntropy SF EN Qabf SCD FMI_w FMI_dct SSIM MS-SSIM FMI-pixel Nabf MI VIF SD EN DF QSF QMI QS QY QC QNCIE Qabf AG MIabf QG CC VIFF QP QW QE QCV QCB
tf369/PMQ
Privacy-preserving Multi Dot-Product Query in Fog-enhanced IoT
tf369/RawSR
Exploiting raw images for image super-resolution, TPAMI 2021
tf369/RealNumberSecretSharing
Implementation of real number secret sharing scheme and privacy preserving recursive least squares.
tf369/searchable-encryption-database
An implementation of a Symmetric Searchable Encryption (SSE) database
tf369/Searchable_encryption_and_retrieval
tf369/searchableEncryption
tf369/SecureSGD
Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).
tf369/SGXSSE
The repository includes forward and backward private SSE schemes with trusted execution
tf369/Tampering-Detection-and-Localization
Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"
tf369/tirg
deep learning, image retrieval, vision and language
tf369/TJU-DHD
A newly built high-resolution dataset for object detection and pedestrian detection (IEEE TIP 2020)
tf369/Vehica
Vehica: Vehicle classification based on RetinaNet. 基于 RetinaNet 和 Stanford Car Dataset 的车辆型号检测识别
tf369/yolov3-vehicle-detection-paddle
vehicle-detection based on yolov3(基于paddle的YOLOv3车辆检测和类型识别)
tf369/Yolov5_DeepSort_Pytorch
yolov5 - deepsort 行人 车辆 跟踪 检测 计数