Computer Science ›› 2020, Vol. 47 ›› Issue (7): 257-262.doi: 10.11896/jsjkx.190900107
Special Issue: Information Security
• Information Security • Previous Articles Next Articles
WANG Meng, DING Zhi-jun
CLC Number:
[1]BUJLOW T,CARELA-ESPANÑOL V,SOLEÉ-PARETA J,et al.Web tracking:Mechanisms,implications,and defenses[J].Proc.of the IEEE,2017,105(8):1476-1510. [2]LIU J W,HUO Y M,WAN Y L.Review of equipment fingerprint research [C]//Proceedings of the 33rd National Computer Security Academic Exchange.2018. [3]ECKERSLEY P.How Unique is Your Web Browser?[C]//Privacy Enhancing Technologies,10th International Symposium(PETS 2010).Berlin:DBLP,2010. [4]Mobile apps overtake PC Web usage in U.S.[EB/OL].ht-tps://www.mendeley.com/catalogue/mobile-apps-overtake-pc-web-usage/. [5]Percentage of all global web pages served to mobile phones from 2009 to 2018[EB/OL].https://www.statista.com/statistics/241462/global-mobile-phone-website-traffic-share/. [6]BOJINOV H,MICHALEVSKY Y,NAKIBLY G,et al.Mobile Device Identification via Sensor Fingerprinting[J].arXiv:1408.1416. [7]DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014. [8]BALDINI G,AMERINI I,GENTILE C.Microphone identification using convolutional neural networks[J].IEEE Sensors Lett.,2019,3(7):6001504. [9]BALDINI G,STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in compo nents[J].IEEE Commun.Surveys Tuts.,2017,19(3):1761-1789. [10]HUPPERICH T,MAIORCA D,MARC K,et al.On the Robustness of Mobile Device Fingerprinting:Can Mobile Users Escape Modern Web-Tracking Mechanisms?[C]//the 31st Annual Computer Security Applications Conference.ACM,2015. [11]CAI J,LUO J,WANG S,et al.Feature selection in machinelearning:a new perspective[J].Neurocomputing,2018,300:70-79. [12]KIRA K,RENDELL L A.The Feature Selection Problem:Traditional Methods and a New Algorithm[C]//Tenth National Conference on Artificial Intelligence.AAAI Press,1992. [13]KONONENKO I.Estimating attributes:analysis and extensionof relief[C]//European Conference on Machine Learning.Berlin:Springer,1994. [14]RESHEF D N,RESHEF Y A,FINUCANE H K,et al.Detecting Novel Associations in Large Data Sets[J].Science,2011,334 (6062):1518-1524. [15]WEN T,DONG D,CHEN Q,et al.Maximal Information Coeffi-cient-Based Two-Stage Feature Selection Method for Railway Condition Monitoring[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(7):2681-2690. [16]PRAMESTI H,TALOMPO H R A.Determination of CreditDecision Attributes Using Maximal Information Coefficient[C]//International Conference on Information Technology Systems and Innovation (ICITSI).2018. [17]PONTIVEROS B B F,NORVILL R,STATE R.Monitoring the transaction selection policy of Bitcoin mining pools[C]//NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.IEEE,2018. [18]TAN Y Q,ZHANG X,LI Z,et al.Construction of Information Push Model Based on Maximum Mutual Information Coefficient[J].Journal of Jilin University(Engineering Edition),2018,48(2):558-563. [19]Cryptographic hash funcation[EB/OL].https://en.wikipedia.org/wiki/cryptographic_hash_ funcation. [20]Pearson correlation coefficient[EB/OL].https://en.wikipedia.org/wiki/Pearson_correlation_coefficient. [21]COVER T M,THOMAS J A.Elements of Information Theory[M].Wiley,1991. |
[1] | WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220. |
[2] | CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75. |
[3] | ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91. |
[4] | LI Bin, WAN Yuan. Unsupervised Multi-view Feature Selection Based on Similarity Matrix Learning and Matrix Alignment [J]. Computer Science, 2022, 49(8): 86-96. |
[5] | YANG Wen-kun, YUAN Xiao-pei, CHEN Xiao-feng, GUO Rui. Spatial Multi-feature Segmentation of 3D Lidar Point Cloud [J]. Computer Science, 2022, 49(8): 143-149. |
[6] | WANG Can, LIU Yong-jian, XIE Qing, MA Yan-chun. Anchor Free Object Detection Algorithm Based on Soft Label and Sample Weight Optimization [J]. Computer Science, 2022, 49(8): 157-164. |
[7] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[8] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[9] | CAI Xiao-juan, TAN Wen-an. Improved Collaborative Filtering Algorithm Combining Similarity and Trust [J]. Computer Science, 2022, 49(6A): 238-241. |
[10] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[11] | HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362. |
[12] | HUANG Shao-bin, SUN Xue-wei, LI Rong-sheng. Relation Classification Method Based on Cross-sentence Contextual Information for Neural Network [J]. Computer Science, 2022, 49(6A): 119-124. |
[13] | KANG Yan, WANG Hai-ning, TAO Liu, YANG Hai-xiao, YANG Xue-kun, WANG Fei, LI Hao. Hybrid Improved Flower Pollination Algorithm and Gray Wolf Algorithm for Feature Selection [J]. Computer Science, 2022, 49(6A): 125-132. |
[14] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[15] | CAI Xin-yu, FENG Xiang, YU Hui-qun. Adaptive Weight Based Broad Learning Algorithm for Cascaded Enhanced Nodes [J]. Computer Science, 2022, 49(6): 134-141. |
|