2020
DOI: 10.1109/access.2020.3015876
|View full text |Cite
|
Sign up to set email alerts
|

An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM

Abstract: ABSTRACRT Since convolutional neural network (CNN) can only extract local features, and long shortterm memory (LSTM) neural network model has a large number of learning calculations, a long processing time and an obvious degree of information loss as the length of speech increases. Utilizing the characteristics of autonomous feature extraction in deep learning, CNN and bidirectional long short-term memory (BiLSTM) network are combined to present an encrypted speech retrieval method based on deep perceptual has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 34 publications
(98 reference statements)
0
4
0
Order By: Relevance
“…(2) Bi-LSTM (Zou et al, 2021): Only the Bi-LSTM neural network is used for text feature learning. (3) CNN-BiLSTM (Zhang et al, 2020): The CNN and Bi-LSTM are input, respectively, for encoding; relevant features are extracted, and finally classified them by fusion in the full connection layer. (4) BiLSTM-CNN (Zhu et al, 2019): The vector is input into Bi-LSTM and then the result is input into the CNN for final classification.…”
Section: Word Vector Dimension 300 Wmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Bi-LSTM (Zou et al, 2021): Only the Bi-LSTM neural network is used for text feature learning. (3) CNN-BiLSTM (Zhang et al, 2020): The CNN and Bi-LSTM are input, respectively, for encoding; relevant features are extracted, and finally classified them by fusion in the full connection layer. (4) BiLSTM-CNN (Zhu et al, 2019): The vector is input into Bi-LSTM and then the result is input into the CNN for final classification.…”
Section: Word Vector Dimension 300 Wmentioning
confidence: 99%
“…CNN-BiLSTM ( Zhang et al, 2020 ): The CNN and Bi-LSTM are input, respectively, for encoding; relevant features are extracted, and finally classified them by fusion in the full connection layer.…”
Section: Experiments and Analysismentioning
confidence: 99%
“…model performance. Literature [45] proposes the DDoS attack detection method based on CNN-AttBiLSTM. Firstly, before the CNN-AttBiLSTM model, a combination of the Random Forest and Pearson correlation analysis algorithms is used to select important features to reduce redundant data.…”
Section: Introductionmentioning
confidence: 99%
“…Security of speech information is essential for many applications including smart devices, e-learning, and video conferencing [10], [11]. Speech includes a lot of confidential data, it is important to encrypt the speech data before uploading it to the cloud [12]. A number of schemes have been proposed in the literature for encrypting speech files [13]- [16].…”
Section: Introductionmentioning
confidence: 99%