国家自然科学基金(61272472)

作品数:8被引量:20H指数:3
导出分析报告
相关作者:杨风暴王肖霞更多>>
相关机构:中北大学更多>>
相关期刊:《光子学报》《Chinese Journal of Electronics》更多>>
相关主题:PRIVACY-PRESERVINGTRAPRESERVINGPERSONALIZEDPERSONALIZATION更多>>
相关领域:自动化与计算机技术电子电信理学机械工程更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-8
视图:
排序:
基于多散斑图组合-调制的鬼成像优化方法被引量:1
《光子学报》2020年第12期226-236,共11页王肖霞 陶勇 杨风暴 习江涛 
国家自然科学基金(Nos.61503345,61272472,61972363);山西省应用基础研究计划青年科技研究基金(No.201901D211233)。
利用多个散斑图组合的方式提出了一种新的鬼成像优化方法.利用桶探测器值的大小对照射到目标物体上的多个散斑图进行排序,使相邻散斑图间差异性减小;通过对相邻散斑图间的叠加以及对应桶探测器值的调制,有效降低待关联数据间冗余和数量...
关键词:鬼成像 多散斑图 组合-调制 优化 重构 
Time-Dependent Demographic Prediction Based on Time-Back-Propagation Method
《Chinese Journal of Electronics》2018年第1期35-40,共6页KE Yuyang XIONG Yan HU Yiqing LIU Shichen 
supported by the National Natural Science Foundationof China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
In various applications like personalized search and recommendation, full demographic information is a precondition for many applications' well performance,but such ideal dataset rarely exists in practical scenarios.W...
关键词:Time-back-propagation(TBP) Time series Time-dependent demographic prediction 
Personalized Privacy-Preserving Trajectory Data Publishing被引量:6
《Chinese Journal of Electronics》2017年第2期285-291,共7页LU Qiwei WANG Caimei XIONG Yan XIA Huihua HUANG Wenchao GONG Xudong 
supported by the National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
Due to the popularity of mobile internet and location-aware devices,there is an explosion of location and tra jectory data of moving objects.A few proposals have been proposed for privacy preserving tra jectory data p...
关键词:Personalization Tra jectory data Privacy-preserving data publishing 
Similar Time Series Retrieval Using Only Important Segments被引量:3
《Chinese Journal of Electronics》2017年第1期22-26,共5页GONG Xudong WANG Caimei XIONG Yan HUANG Wenchao 
supported by the National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
Similar time series searching plays an important role in applications such as time series classification and outlier detection. We observe that different segment of a time series may have different significance, thus ...
关键词:Similarity search Time series Algorithm 
Privacy-Preserving Collaborative Filtering Based on Time-Drifting Characteristic被引量:3
《Chinese Journal of Electronics》2016年第1期20-25,共6页ZHAO Feng XIONG Yan LIANG Xiao GONG Xudong LU Qiwei 
supported by National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
Recommendation has become increasingly important because of the information overload. Collaborative filtering(CF) technique, as the most popular recommendation method, utilizes the historical preferences of users to p...
关键词:Collaborative filtering (CF) Random-ization PRIVACY Varying Weight Time-drifting character-istic. 
A(t, m, n)-Group Oriented Secret Sharing Scheme被引量:2
《Chinese Journal of Electronics》2016年第1期174-178,共5页MIAO Fuyou FAN Yuanyuan WANG Xingfu XIONG Yan Moaman Badawy 
supported by the National Natural Science Foundation of China(No.61232018,No.61572454,No.61272472,No.61472382)
Basic(t, n)-Secret sharing(SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may ob...
关键词:Threshold secret sharing Group ori-ented Randomized components Share protection Chineseremainder theorem. 
Combining User-Based and Item-Based Models for Collaborative Filtering Using Stacked Regression被引量:5
《Chinese Journal of Electronics》2014年第4期712-717,共6页LIU Qingwen XIONG Yan HUANG Wenchao 
supported by National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
Collaborative filtering can be classified into user-based or item-based methods according to different assumptions. Our experiment results show that both userbased and item-based methods can reach a certain degree of ...
关键词:Recommender systems Collaborative filtering User-based Item-based Model combination 
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
《Chinese Journal of Electronics》2014年第2期284-290,共7页WANG Xingfu LU Qiwei XIONG Yan MIAO Fuyou HUANG Wenchao LIU Tao WU Xuangou 
supported by National Natural Science Foundation of China under Grant(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
With the rapid development of Mobile ad hoc network(MANET), secure and practical authentication is becoming increasingly important. There still exist several unsolved problems. It may suffer from cheating problems and...
关键词:Secret sharing Trusted computing Au- thentication Chinese remainder theorem. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部