首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
《计算机工程》2018,(3):132-137
针对当前p-Sensitive k-匿名模型未考虑敏感属性语义相似性,不能抵制相似性攻击的问题,提出一种可抵制相似性攻击的(p,k,d)-匿名模型。根据语义层次树对敏感属性值进行语义分析,计算敏感属性值之间的语义相异值,使每个等价类在满足k匿名的基础上至少存在p个满足d-相异的敏感属性值来阻止相似性攻击。同时考虑到数据的可用性,模型采用基于距离的度量方法划分等价类以减少信息损失。实验结果表明,提出的(p,k,d)-匿名模型相对于p-Sensitive k-匿名模型不仅可以降低敏感属性泄露的概率,更能有效地保护个体隐私,还可以提高数据可用性。  相似文献   

2.
面向数值型敏感属性的分级l-多样性模型   总被引:1,自引:0,他引:1  
近年来,数据发布隐私保护问题受到了广泛关注,相继提出了多种隐私保护匿名模型.l-多样性模型是其中保护个体隐私的有效方法,但现有的l-多样性模型只适合处理分类型敏感属性,不适合处理数值型敏感属性.为此,提出面向数值型敏感属性的分级l-多样性模型,包括分级相异l-多样性、分级信息熵l-多样性和分级递归(c,l)-多样性.所提出的模型首先将数值型敏感属性域分级,再基于分级信息实现数值型敏感属性的l-多样性.设计了实现这些模型的l-Incognito算法.并且从匿名表的多样性角度进行了比较,实验表明分级l-多样性表比未分级的l-多样性表具有更高的多样度,因此具有更强的抵制同质性攻击和背景知识攻击的能力.  相似文献   

3.
目前多数隐私保护匿名模型不能满足面向敏感属性值的个性化保护需求,也未考虑敏感属性值的分布情况,易受相似性攻击.为此,提出基于敏感度的个性化(α,l)-匿名模型,通过为敏感属性值设置敏感度,并定义等敏感度组的概念,对等价类中各等敏感度组设置不同的出现频率,满足匿名隐私保护的个性化需求.通过限制等价类中同一敏感度的敏感属性值出现的总频率,控制敏感属性值的分布,防止相似性攻击.提出一种基于聚类的个性化(α,l)-匿名算法,实现匿名化处理.实验结果表明,该算法能以与其他l-多样性匿名模型近似的信息损失量和时间代价,提供更好的隐私保护.  相似文献   

4.
MDAV算法是一种高效的微聚集算法,但它未考虑等价类中敏感属性多样性问题,生成的匿名表不能抵制同质性攻击和背景知识攻击。针对该问题,提出一种能够实现(k,e)-匿名模型的MDAV算法,简称(k,e)-MDAV算法。该算法将距离类中心最近的至少k个不同敏感值的元组聚为一类,并要求每个类内敏感属性值最大差异至少为e。实验结果表明,该算法能够生成满足(k,e)-匿名模型的匿名表。  相似文献   

5.
基于聚类的高效(K,L)-匿名隐私保护   总被引:1,自引:0,他引:1  
为防止发布数据中敏感信息泄露,提出一种基于聚类的匿名保护算法.分析易被忽略的准标识符对敏感属性的影响,利用改进的K-means聚类算法对数据进行敏感属性聚类,使类内数据更相似.考虑等价类内敏感属性的多样性,对待发布表使用(K,L)-匿名算法进行聚类.实验结果表明,与传统K-匿名算法相比,该算法在实现隐私保护的同时,数据信息损失较少,执行时间较短.  相似文献   

6.
在区域医疗信息共享下,传统的匿名化隐私保护算法面对背景知识攻击时抵抗力较差。为此,提出一种敏感属性聚类匿名算法。利用敏感属性之间的关联进行微聚类,使等价组中敏感属性之间在相似性增大的同时存在差异性,从而较好地抵抗背景知识攻击,提高抗泄露风险能力。实验结果表明,该算法能减小数据信息表中的隐私泄露风险。  相似文献   

7.
针对当前p-sensitive k-匿名模型未考虑敏感属性的敏感程度,不能抵制对等性攻击的问题,提出一种可抵制对等性攻击的(p,θ)k-匿名模型.同时引入互信息量来度量属性间的关联度,为准标识属性的进一步泛化提供依据.实验结果表明,所提的(p,θ)k-匿名模型相对于p-sensitive k-匿名模型降低了敏感属性泄露的概率,更能有效地保护个体隐私.  相似文献   

8.
针对现有的多敏感属性数据发布方法中存在的隐私泄露问题,在分析多维桶分组方法的基础上,基于分解的思想,提出一种新的数据发布模型(l1,l2,…,ld)-uniqueness,同时给出相应的匿名算法。该算法考虑了等价组中敏感属性值的分布问题,对各个敏感属性单独处理,打破了敏感属性间一一对应的关系,可以抵御背景知识攻击和相似性攻击。理论分析和实验证明,该算法可以有效防止隐私泄露,增强数据发布的安全性。  相似文献   

9.
宋健  许国艳  夭荣朋 《计算机应用》2016,36(10):2753-2757
在保护数据隐私的匿名技术中,为解决匿名安全性不足的问题,即匿名过程中因计算等价类质心遭受同质性和背景知识攻击造成的隐私泄漏,提出了一种基于差分隐私的数据匿名化隐私保护方法,构建了基于差分隐私的数据匿名化隐私保护模型;在利用微聚集MDAV算法划分相似等价类并在匿名属性过程中引入SuLQ框架设计得到ε-MDAV算法,同时选用Laplace实现机制合理控制隐私保护预算。通过对比不同隐私保护预算下可用性和安全性的变化,验证了该方法可以在保证数据高可用性的前提下有效地提升数据的安全性能。  相似文献   

10.
针对轨迹匿名集中轨迹间的相似性过高导致的轨迹隐私泄露问题,提出抵制轨迹相似性攻击的轨迹(k,e)-匿名算法。该算法在预处理过程中,采用轨迹同步化处理方法减少信息损失;生成匿名集时,将轨迹斜率作为轨迹数据的敏感值,选择至少k条不同轨迹斜率的轨迹来满足轨迹k-匿名,并要求每个类中轨迹斜率差异值至少为e,以防止集合中轨迹的斜率相似性过高而导致隐私泄露。实验结果表明,该算法可以有效抵制轨迹相似性攻击,在减少信息损失的同时增强了轨迹数据可用性,更好地实现了轨迹隐私保护。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号