{"id":"https://openalex.org/W3157406137","doi":"https://doi.org/10.1007/s11042-021-10896-y","title":"A novel NMF-based authentication scheme for encrypted speech in cloud computing","display_name":"A novel NMF-based authentication scheme for encrypted speech in cloud computing","publication_year":2021,"publication_date":"2021-04-23","ids":{"openalex":"https://openalex.org/W3157406137","doi":"https://doi.org/10.1007/s11042-021-10896-y","mag":"3157406137"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-021-10896-y","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-021-10896-y","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080747549","display_name":"Canghong Shi","orcid":"https://orcid.org/0000-0002-5188-6230"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Canghong Shi","raw_affiliation_strings":["The School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 610031, People\u2019s Republic of China","The School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 610031, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"The School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 610031, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4800084"]},{"raw_affiliation_string":"The School of Information Science and Technology, Southwest Jiaotong University, Chengdu, 610031, People's Republic of China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373271","display_name":"Hongxia Wang","orcid":"https://orcid.org/0000-0002-1339-2504"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongxia Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu, 610041, People\u2019s Republic of China","School of Cyber Science and Engineering, Sichuan University, Chengdu, 610041, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, 610041, People\u2019s Republic of China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu, 610041, People's Republic of China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034163972","display_name":"Yi Hu","orcid":"https://orcid.org/0000-0002-3136-0522"},"institutions":[{"id":"https://openalex.org/I168416876","display_name":"Northern Kentucky University","ror":"https://ror.org/01k44g025","country_code":"US","type":"education","lineage":["https://openalex.org/I168416876"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Hu","raw_affiliation_strings":["Northern Kentucky University, Highland Heights, KY, USA"],"affiliations":[{"raw_affiliation_string":"Northern Kentucky University, Highland Heights, KY, USA","institution_ids":["https://openalex.org/I168416876"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100428845","display_name":"Xiaojie Li","orcid":"https://orcid.org/0000-0001-7429-3772"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojie Li","raw_affiliation_strings":["The College of Computer Science, Chengdu University of Information Technology, Chengdu, 610225, People\u2019s Republic of China","The College of Computer Science, Chengdu University of Information Technology, Chengdu, 610225, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science, Chengdu University of Information Technology, Chengdu, 610225, People\u2019s Republic of China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"The College of Computer Science, Chengdu University of Information Technology, Chengdu, 610225, People's Republic of China","institution_ids":["https://openalex.org/I24201400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100373271"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":0.9685,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.77025997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8463919758796692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8393716812133789},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6490755081176758},{"id":"https://openalex.org/keywords/non-negative-matrix-factorization","display_name":"Non-negative matrix factorization","score":0.6040821671485901},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5086949467658997},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.49268656969070435},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37962836027145386},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3730918765068054},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21675652265548706},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.1880292296409607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17563387751579285}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8463919758796692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8393716812133789},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6490755081176758},{"id":"https://openalex.org/C152671427","wikidata":"https://www.wikidata.org/wiki/Q10843505","display_name":"Non-negative matrix factorization","level":4,"score":0.6040821671485901},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5086949467658997},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.49268656969070435},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37962836027145386},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3730918765068054},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21675652265548706},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.1880292296409607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17563387751579285},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-021-10896-y","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11042-021-10896-y","pdf_url":null,"source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[{"id":"https://openalex.org/G2484149539","display_name":null,"funder_award_id":"YJ201881","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4060346039","display_name":null,"funder_award_id":"61972269","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2010380519","https://openalex.org/W2029438024","https://openalex.org/W2041875459","https://openalex.org/W2078974441","https://openalex.org/W2087582972","https://openalex.org/W2122739519","https://openalex.org/W2135029798","https://openalex.org/W2337678523","https://openalex.org/W2339254090","https://openalex.org/W2469486851","https://openalex.org/W2513712568","https://openalex.org/W2516477161","https://openalex.org/W2553201531","https://openalex.org/W2569782802","https://openalex.org/W2588903897","https://openalex.org/W2616646314","https://openalex.org/W2619579631","https://openalex.org/W2740114037","https://openalex.org/W2748251709","https://openalex.org/W2770306303","https://openalex.org/W2781513756","https://openalex.org/W2790867243","https://openalex.org/W2792454374","https://openalex.org/W2794372970","https://openalex.org/W2794742486","https://openalex.org/W2799501625","https://openalex.org/W2800723077","https://openalex.org/W2802292638","https://openalex.org/W2883163885","https://openalex.org/W2888368519","https://openalex.org/W2890433306","https://openalex.org/W2900637357","https://openalex.org/W2964063558","https://openalex.org/W2969359174","https://openalex.org/W2979715685","https://openalex.org/W2984104516","https://openalex.org/W3036857111","https://openalex.org/W3045429752","https://openalex.org/W3087814697","https://openalex.org/W3209866323","https://openalex.org/W4231153210","https://openalex.org/W4240732321","https://openalex.org/W6600168311","https://openalex.org/W6600213211"],"related_works":["https://openalex.org/W4297433825","https://openalex.org/W4318261659","https://openalex.org/W2122823937","https://openalex.org/W2536669487","https://openalex.org/W3215340255","https://openalex.org/W2048687561","https://openalex.org/W4312861905","https://openalex.org/W2101428145","https://openalex.org/W2048358126","https://openalex.org/W2022978200"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
