- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- Simulation and Modeling Applications
- Biometric Identification and Security
- Image Processing and 3D Reconstruction
- Robotic Path Planning Algorithms
- Data Management and Algorithms
- Text and Document Classification Technologies
- Data Quality and Management
- Chaos-based Image/Signal Encryption
- Spam and Phishing Detection
- Security in Wireless Sensor Networks
- Video Analysis and Summarization
- Rough Sets and Fuzzy Logic
- Advanced Authentication Protocols Security
- Software Testing and Debugging Techniques
- Advanced Steganography and Watermarking Techniques
- Industrial Technology and Control Systems
- Educational and Technological Research
- Advanced Image and Video Retrieval Techniques
- Software System Performance and Reliability
- Access Control and Trust
- Web Data Mining and Analysis
Nanjing University of Aeronautics and Astronautics
2016-2023
State Key Laboratory of Vehicle NVH and Safety Technology
2023
PLA Army Engineering University
2020-2023
The University of Tokyo
2023
Guilin University of Electronic Technology
2018
Shijiazhuang University
2018
Ordnance Engineering College
2011-2016
Beihang University
2006
Recently, Rahulamathavan et al. propose a privacy preserving scheme for outsourcing SVM classification. Their core contribution is secure protocol to attain the sign of numbers in encrypted form. In this paper, we observe that al.'s will suffer from some soundness and security problems. Then, new securely obtain numbers' sign. Theoretical analysis experiment results show our proposed can not only fix problems, but also achieve higher efficiency.
To take advantages of location-based services (LBS) while protecting user privacy against untrusted LBS providers, preserving have attracted increasing attention. Considering that users in an system are often equipped with resource-constrained mobile devices, most existing methods based on anonymization techniques. However, these schemes still some and efficiency limitations. In this paper, we propose a novel scheme, which simultaneously achieves protection high query efficiency....
Summary Securely performing nearest neighbor query over encrypted data in cloud is an important topic the area of computing, for which Wang et al recently put forward a scheme (ie, CloudBI‐II) to address challenging security problem: resisting collusion server and users. In this paper, we propose efficient attack method that indicates CloudBI‐II will reveal difference vectors under attack. Furthermore, show vector disclosure result serious privacy breach and, thus, attain break CloudBI‐II....
In the field of military research, manufacturing and management weapons equipment are very important. Due to continuous advancement science technology, many databases have a loose structure, which makes them difficult be utilized efficiently, resulting in low efficiency, chaotic management, other issues. order solve these problems, an entity-relation extraction method based on CRF syntactic analysis tree is proposed according latest text algorithm. Finally, knowledge graph construction...
NER (Named Entity Recognition) is of great significance for the construction a knowledge map. The purpose to guarantee recognition effect named entity method in application scenario vertical field, proposed based on BI-LSTM-CRF [BI(Bidirectional) LSTM (Long-Short Term Memory) CRF (Conditional Random Field)] equipment support which improves domain and provides technical subsequent First, Chinese characters are represented by word embedding input into model. Then, feature vector sequence...
Turbulence generated by random ups and downs in the refractive index of atmosphere produces varying degrees distortion blurring images camera. Traditional methods ignore effect strong turbulence on image. This paper proposes a deep neural network to enhance image clarity under handle this problem. is divided into two sub-networks, generator discriminator, whose functions are mitigate effects determine authenticity recovered After extensive experiments, it proven that present plays role...
Cloud can provide much convenience for big data storage and analysis. To enjoy the advantage of cloud service with privacy preservation, huge is increasingly outsourced to in encrypted form. Unfortunately, encryption may impede analysis computation over dataset. Naïve Bayesian classification an effective algorithm predict class label unlabeled samples. In this paper, we investigate naïve on large-scale dataset cloud, propose a practical secure scheme challenging problem. our scheme, all task...
Privacy-preserving distributed set intersection and union have been widely applied in many scenarios lots of work has paid attention to the problem. Existing solutions privacy-preserving are built on secure multiparty computation protocols, which can theoretically solve it, but result heavy communication overhead. Worse still, most existing schemes cannot once some participant fails. In this paper, we propose two differentially private approaches for union, respectively. our schemes, each...
Fault diagnosis model is the core of virtual simulation and hardware-in-loop training, which has become a hot spot in current research.Construction fault description training an important theoretical support for model.The XML as language, with S1000D reference standard, requirement cause was analyzed to establish computer sensible fault-cause that simulation.The can be used mechanical, electronic mechanical electrical equipment.This describe LRU tree, rationality validity are verified.
As the nucleus of driving fault diagnose' virtual simulation training and semiphysical training,Fault Diagnose Describing Model has been one hotpots nowadays.However, regarding different machine style diagnose, same diagnose even researchers set up various Fault Models separately describe them in ways.This text will face training,analysis essentials,levels components Model,describe how to choose use describing standards verify as well, this way,it provides model supports for building a...