工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 >>> 数据安全与计算机安全 >>>
搜索结果: 31-45 共查到知识库 数据安全与计算机安全相关记录2473条 . 查询时间(3.823 秒)
提出一种针对Spam相册的检测方案。首先分析了Photo Spam的攻击特点以及与传统Spam的差异,在此基础上构造了12个提取及时且计算高效的特征。利用这些特征提出了有监督学习的检测模型,通过2 356个相册的训练形成Spam相册分类器,实验表明能够正确检测到测试集中100%的Spam相册和98.2%的正常相册。最后将训练后的模型应用到包含315 115个相册的真实数据集中,检测到89 163个...
应对多组合复杂攻击及前景知识攻击,提出一种新的基于差分隐私保护机制的位置大数据发布模型,创新设计可用性评估反馈机制模块,引入时间变量动态地针对敏感属性以及身份识别等分析模型的服务质量,能在位置大数据与非位置大数据相结合、用户背景知识不确定等情况下保护用户的位置隐私。仿真实验基于多种空间索引技术验证了新发布模型能够在指定的私密性条件下,为位置查询服务发布具有更高准确率的匿名数据。
针对Android智能终端安全问题,构建Android智能终端安全分层体系。首先从远程防盗、生物身份验证和硬件安全模块方面阐述了Android设备安全的安全威胁及保护措施,然后从无线安全网络、病毒传播查杀和防钓鱼攻击说明了Android网络安全的隐患及防范,之后从内核安全、本地库运行时环境安全和应用框架安全角度介绍了Android操作系统安全的研究内容,接着从静态检测和应用行为动态检测、应用加固和...
Digital content is for copying: quotation, revision, plagiarism, and file sharing all create copies. Document fingerprinting is concerned with accurately identifying copying, including small partial c...
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may take pointer argumen...
Changing the color of an object is a basic image editing operation, but a high quality result must also preserve natural shading. A common approach is to first compute reflectance and illumination i...
We present a method for automatically identifying and validating predictive relationships between the visual appearance of a city and its non-visual attributes (e.g. crime statistics, housing prices,...
We present a system that lets analysts use paid crowd workers to explore data sets and helps analysts interactively examine and build upon workers’ insights. We take advantage of the fact that, for m...
为解决空间数据检索效率低、准确性差的问题,本文提出由空间对象形状描述模型、空间关系描述模型、场景相似性自适应计算模型构成的场景相似性检索方法.空间对象形状描述模型精准检索满足样例对象形状约束的数据库对象,提高空间对象形状的识别精度.空间关系描述模型检索满足样例场景关系约束的数据库场景,提高空间关系的描述精度.场景相似性自适应计算模型对满足形状及关系约束的完全匹配、局部匹配场景进行打分、排序,增加检...
In the Authoritative Topographic Cartographic Information System (ATKIS®), which is the main public topographic data base in Germany, the heights and the 2D positions of objects such as roads a...
We study several stochastic combinatorial problems, includ-ing the expected utility maximization problem, the stochas-tic knapsack problem and the stochastic bin packing prob-lem. A common technical c...
The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating ci-ph...
When digital signature is applied on low-power de-vices, like smart cards, wireless sensors and RFID tags, some spe-cific properties, e.g., better offline storage, more modular and flex-ible deploymen...
A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD)protocol is immune to all these...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...