supported by the National Natural Science Foundationof China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
In various applications like personalized search and recommendation, full demographic information is a precondition for many applications' well performance,but such ideal dataset rarely exists in practical scenarios.W...
supported by the National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
Due to the popularity of mobile internet and location-aware devices,there is an explosion of location and tra jectory data of moving objects.A few proposals have been proposed for privacy preserving tra jectory data p...
supported by the National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317);the Fundamental Research Funds for the Central Universities(No.WK0110000041)
Similar time series searching plays an important role in applications such as time series classification and outlier detection. We observe that different segment of a time series may have different significance, thus ...
supported by National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
Recommendation has become increasingly important because of the information overload. Collaborative filtering(CF) technique, as the most popular recommendation method, utilizes the historical preferences of users to p...
supported by the National Natural Science Foundation of China(No.61232018,No.61572454,No.61272472,No.61472382)
Basic(t, n)-Secret sharing(SS) schemes share a secret among n shareholders by allocating each a share. The secret can be reconstructed only if at least t shares are available. An adversary without a valid share may ob...
supported by National Natural Science Foundation of China(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
Collaborative filtering can be classified into user-based or item-based methods according to different assumptions. Our experiment results show that both userbased and item-based methods can reach a certain degree of ...
supported by National Natural Science Foundation of China under Grant(No.61202404,No.61170233,No.61232018,No.61272472,No.61272317,No.61300170);the Fundamental Research Funds for the Central Universities(No.WK0110000036);University Provincial Natural Science Foundation of Anhui Province(No.KJ2013A040)
With the rapid development of Mobile ad hoc network(MANET), secure and practical authentication is becoming increasingly important. There still exist several unsolved problems. It may suffer from cheating problems and...