Author:
Tang Zehui,Zeng Shengke,Li Tao,Cheng Shuai,Zheng Haoyu
Publisher
Springer Nature Switzerland
Reference20 articles.
1. Arefkhani, M., Soryani, M.: Malware clustering using image processing hashes. In: 2015 9th Iranian Conference on Machine Vision and Image Processing (MVIP), pp. 214–218. IEEE (2015)
2. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_18
3. Chen, L., Xiang, F., Sun, Z.: Image deduplication based on hashing and clustering in cloud storage. KSII Trans. Internet Inf. Syst. 15(4) (2021)
4. Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 617–624. IEEE (2002)
5. Fei, M., Zhaojie, J., Zhen, X., Li, J.: Real-time visual tracking based on improved perceptual hashing. Multim. Tools Appl. 76, 4617–4634 (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献