首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 71 毫秒
1.
在基于标签的推荐中,标签起着联系用户和信息资源的作用。但 由于存在语义特性,相较于评分数据,标签数据在一定程度上更能够直接反映用户喜好,隐私问题更为突出。推荐服务器收集用户的历史标签记录,一旦攻击者通过攻击推荐服务器而获得了用户信息,将造成严重的用户隐私泄露问题。对此,提出一种带有隐私保护的基于标签k-means聚类的资源推荐方法CDP k-meansRA,即利用Crowds网络进行用户发送方匿名保护,并且将ε-差分隐私保护融入改进的标签k-means聚类算法中。通过实验将提出的CDP k-meansRA与k-meansRA等算法进行比较,证明了CDP k-meansRA能够在保护用户隐私的前提下,保证一定的推荐质量。  相似文献   

2.
针对社交发现服务中的隐私保护问题,提出一种位置隐私保护社交模型。通过将用户数据分成索引消息和数据消息,使得地理坐标和位置数据解耦,引入多授权中心环境下的属性基加密方法(attribute based encryption,ABE)对索引消息进行加密,位置数据由对称加密后上传,两者分别保存在索引服务器和数据服务器的个人存储空间上。分析表明,模型支持陌生成员发现和群组管理功能,灵活性高,能够保护用户的社交隐私数据,可以很好地用于社交发现服务。  相似文献   

3.
针对验证数据完整性过程中被撤销用户与云服务器存在共谋的问题,提出基于虚拟用户的数据完整性校验方案。在管理群组用户的过程中,管理员让云服务器作为代理,通过重签名方法将被撤销用户的签名转换为虚拟用户签名,以防止攻击者获取群组用户身份隐私信息。另一方面,管理员在本地存储所有用户的身份隐私信息,用户在访问共享数据之前需要通过管理员的验证,这样既能保证校验者可以正确验证共享数据的完整性,又能保护群组用户的隐私和共享数据的安全。分析证明结果表明,所提方案在用户撤销时不仅能够验证共享数据的完整性,还能降低攻击者精确获取用户身份隐私信息和共享数据内容的概率。  相似文献   

4.
李卓  宋子晖  沈鑫  陈昕 《计算机应用》2021,41(9):2678-2686
针对移动群智感知(MCS)中在用户数据提交阶段的隐私保护困难和因隐私保护造成成本增加的问题,基于本地差分隐私(LDP)保护原理设计出用户提交数据属性联合隐私保护的CS-MVP算法和用户提交数据属性独立隐私保护的CS-MAP算法。首先,基于属性关系构建用户提交数据的隐私性模型和任务数据的可用性模型,利用CS-MVP和CS-MAP算法解决隐私性约束下的可用性最大化问题;并且在边缘计算支持的MCS场景中,构建用户提交数据隐私保护下的三层MCS架构。理论分析证明了两个算法分别在数据属性联合隐私约束下和数据属性独立隐私约束下的最优性。实验结果表明,在相同隐私预算和数据量下,相较于LoPub和PrivKV,基于CS-MVP和CS-MAP算法的用户提交数据恢复正确感知数据的准确率分别平均提高了26.94%、84.34%和66.24%、144.14%。  相似文献   

5.
网页搜索引擎(Web search engine, WSE)存储和分析用户的查询记录,从而建立用户资料来提供个性化的搜索服务。针对WSE中存在侵犯用户隐私的问题,提出一种基于P2P网络模型的WSE前端用户隐私保护方案。利用P2P网络架构来将用户根据他们的爱好进行分组,并构建多层隐私保护机制,通过节点转发来提交用户查询,WSE只能获得一组查询的简要特征并提供相应的服务。同时保护诚实用户不被WSE暴露,并将自私用户暴露给WSE。实验结果表明,该方案能够很好保护用户隐私,并提供良好的服务质量。  相似文献   

6.
利用推荐系统进行群组推荐时,群组成员之间的交互关系对推荐结果有很大影响,但传统的群组推荐算法较少考虑用户信任度的重要性,致使社交关系信息不能得到充分利用。在群组融合时考虑群组内用户间的交互关系,提出一种基于用户信任度和概率矩阵的群组推荐算法。在获取用户信任度数据后,使用概率矩阵分解(PMF)算法补全信任度矩阵并进行归一化处理,得到相似度矩阵,同时在后验概率计算过程中加入用户间的信任度因素,通过极大化后验概率获得预测评分。在此基础上,对群组中用户的权重进行归一化处理,使用基于用户交互关系的权重策略融合群组成员偏好,得到最终的推荐结果。在Epinions和FilmTrust数据集上的实验结果表明,该算法可使融合结果更具群组特性,同时提高推荐结果的可靠性和可解释性,且均方根误差和命中率均优于PMF、NeuMF、RippleNet等对比算法。  相似文献   

7.
针对群组推荐中组内成员存在偏好动态复杂性的问题,群组成员间的偏好会彼此影响,提出了一种融合上下信息与自注意力机制的群组推荐算法。首先,为了更好地捕捉群组成员间的动态关系,利用自注意力机制自动学习群组内用户的上下文信息与群组中其他成员间的关系权重;其次,根据自注意力机制学习到的组矩阵取其均值嵌入得到群组偏好表示;最后,根据群组偏好利用贝叶斯个性化排序方法进行群组推荐。将提出的方法在MovieLens-1M和CAMRa2011两个数据集上进行实验,并且与基准算法进行比较分析,该方法在推荐的命中率HR和NDCG两个指标上均有提升,实验结果证明该方法得到了更优的群组推荐结果。  相似文献   

8.
公钥可搜索加密技术不仅可以保护云存储中用户的数据隐私,还可以提供数据在不解密的条件下进行密态数据搜索的功能。针对群组内用户进行密文安全搜索的需求,本文以群组为单位使用基于身份的广播加密进行数据的加密与密钥封装,以基于身份的可搜索加密构造关键词密文及关键词陷门,提出了一种群组内的公钥可搜索加密方案,保证了只有群组内的授权用户才可以进行安全搜索并解密数据。此外,为保护用户的身份隐私,通过构造匿名身份,避免了因云服务器好奇行为而造成的用户身份泄露问题。同时,在按需付费的云环境中,为了防止云服务器向用户返回部分或不正确的搜索结果,文章结合区块链技术,使用区块链作为可信第三方,利用智能合约的可信性,在用户验证搜索结果正确后向云服务器支付搜索费用,解决了用户与云服务器之间的公平支付问题。并加入了违规名单机制,防止恶意用户对系统可用性造成影响。在安全性方面,通过基于判定性双线性Diffie-Hellman问题与判定性Diffie-Hellman问题进行安全性分析,证明了在随机谕言机模型与标准模型下方案满足关键词密文与关键词陷门的不可区分性。最后,通过功能对比表明本方案有较强的实用性,利用Charm-crypto密码库对方案进行效率对比,其结果表明本方案与其他相关方案相比具有较低的计算以及通信开销。  相似文献   

9.
马银方  张琳 《计算机科学》2017,44(Z6):336-341
针对当前基于位置服务(LBS)的群组最近邻查询中出现的隐私保护问题,提出了一种新的基于差分隐私保护的LBS群组最近邻查询方法,该方法满足了差分隐私性质并引入了“区域不可区分”这一新的理念。基于分类及聚类给出了LBS群组构建方法并提供了群组隐私预算分配机制。提出了LBS群组用户位置扰乱算法(GPOL),将群组最近邻查询转换为群组质心的最近邻查询,并将其应用到整个隐私保护框架中。实验结果表明该方法能够有效地抵御现有的交叉攻击和组合攻击。  相似文献   

10.
近年来,随着媒介技术的快速发展,人们成组活动的现象逐渐增多,群组推荐系统也逐渐受到关注。现有的群组推荐系统往往将不同的成员视为同质对象,忽视了成员专业背景和项目固有属性之间的关系,无法真正地解决融合过程中的偏好冲突问题。为此,提出一种基于非负矩阵分解的群组推荐算法,通过非负矩阵分解将群组评分信息分解为用户矩阵和项目矩阵,针对2个矩阵分别利用隶属度和专业度权值计算得到项目隶属度矩阵和成员专业度矩阵,并由此获得各成员在不同项目上的贡献度来构建群组偏好模型。实验结果表明,所提算法在不同群组规模和组内相似度的情况下依然具有较高的推荐准确度。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号