Computer Science ›› 2020, Vol. 47 ›› Issue (7): 257-262.doi: 10.11896/jsjkx.190900107
• Information Security • Previous Articles Next Articles
WANG Meng, DING Zhi-jun
CLC Number:
[1] | BUJLOW T,CARELA-ESPANÑOL V,SOLEÉ-PARETA J,et al.Web tracking:Mechanisms,implications,and defenses[J].Proc.of the IEEE,2017,105(8):1476-1510. |
[2] | LIU J W,HUO Y M,WAN Y L.Review of equipment fingerprint research [C]//Proceedings of the 33rd National Computer Security Academic Exchange.2018. |
[3] | ECKERSLEY P.How Unique is Your Web Browser?[C]//Privacy Enhancing Technologies,10th International Symposium(PETS 2010).Berlin:DBLP,2010. |
[4] | Mobile apps overtake PC Web usage in U.S.[EB/OL].ht-tps://www.mendeley.com/catalogue/mobile-apps-overtake-pc-web-usage/. |
[5] | Percentage of all global web pages served to mobile phones from 2009 to 2018[EB/OL].https://www.statista.com/statistics/241462/global-mobile-phone-website-traffic-share/. |
[6] | BOJINOV H,MICHALEVSKY Y,NAKIBLY G,et al.Mobile Device Identification via Sensor Fingerprinting[J].arXiv:1408.1416. |
[7] | DEY S,ROY N,XU W,et al.AccelPrint:Imperfections of Accelerometers Make Smartphones Trackable[C]//Network and Distributed System Security Symposium.2014. |
[8] | BALDINI G,AMERINI I,GENTILE C.Microphone identification using convolutional neural networks[J].IEEE Sensors Lett.,2019,3(7):6001504. |
[9] | BALDINI G,STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in compo nents[J].IEEE Commun.Surveys Tuts.,2017,19(3):1761-1789. |
[10] | HUPPERICH T,MAIORCA D,MARC K,et al.On the Robustness of Mobile Device Fingerprinting:Can Mobile Users Escape Modern Web-Tracking Mechanisms?[C]//the 31st Annual Computer Security Applications Conference.ACM,2015. |
[11] | CAI J,LUO J,WANG S,et al.Feature selection in machinelearning:a new perspective[J].Neurocomputing,2018,300:70-79. |
[12] | KIRA K,RENDELL L A.The Feature Selection Problem:Traditional Methods and a New Algorithm[C]//Tenth National Conference on Artificial Intelligence.AAAI Press,1992. |
[13] | KONONENKO I.Estimating attributes:analysis and extensionof relief[C]//European Conference on Machine Learning.Berlin:Springer,1994. |
[14] | RESHEF D N,RESHEF Y A,FINUCANE H K,et al.Detecting Novel Associations in Large Data Sets[J].Science,2011,334 (6062):1518-1524. |
[15] | WEN T,DONG D,CHEN Q,et al.Maximal Information Coeffi-cient-Based Two-Stage Feature Selection Method for Railway Condition Monitoring[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(7):2681-2690. |
[16] | PRAMESTI H,TALOMPO H R A.Determination of CreditDecision Attributes Using Maximal Information Coefficient[C]//International Conference on Information Technology Systems and Innovation (ICITSI).2018. |
[17] | PONTIVEROS B B F,NORVILL R,STATE R.Monitoring the transaction selection policy of Bitcoin mining pools[C]//NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.IEEE,2018. |
[18] | TAN Y Q,ZHANG X,LI Z,et al.Construction of Information Push Model Based on Maximum Mutual Information Coefficient[J].Journal of Jilin University(Engineering Edition),2018,48(2):558-563. |
[19] | Cryptographic hash funcation[EB/OL].https://en.wikipedia.org/wiki/cryptographic_hash_ funcation. |
[20] | Pearson correlation coefficient[EB/OL].https://en.wikipedia.org/wiki/Pearson_correlation_coefficient. |
[21] | COVER T M,THOMAS J A.Elements of Information Theory[M].Wiley,1991. |
[1] | HU Ping, QIN Ke-yun. Similarity Construction Method for Pythagorean Fuzzy Set Based on Fuzzy Equivalence [J]. Computer Science, 2021, 48(1): 152-156. |
[2] | DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184. |
[3] | ZHU Zhen, HUANG Rui, ZANG Tie-gang, LU Shi-jun. Single Image Defogging Method Based on Weighted Near-InFrared Image Fusion [J]. Computer Science, 2020, 47(8): 241-244. |
[4] | SUN Yan-li, YE Jiong-yao. Convolutional Neural Networks Compression Based on Pruning and Quantization [J]. Computer Science, 2020, 47(8): 261-266. |
[5] | ZHANG Zhi-qiang, LU Xiao-feng, SUI Lian-sheng, LI Jun-huai. Salp Swarm Algorithm with Random Inertia Weight and Differential Mutation Operator [J]. Computer Science, 2020, 47(8): 297-301. |
[6] | LIU Jing, FANG Xian-wen. Mining Method of Business Process Change Based on Cost Alignment [J]. Computer Science, 2020, 47(7): 78-83. |
[7] | ZHANG Yan, QIN Liang-xi. Improved Salp Swarm Algorithm Based on Levy Flight Strategy [J]. Computer Science, 2020, 47(7): 154-160. |
[8] | LI Zhang-wei, XIAO Lu-qian, HAO Xiao-hu, ZHOU Xiao-gen, ZHANG Gui-jun. Multimodal Optimization Algorithm for Protein Conformation Space [J]. Computer Science, 2020, 47(7): 161-165. |
[9] | SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242. |
[10] | LUO Jia-lei and MENG Li-min. Signal Timing Scheme Recommendation Algorithm Based on Intersection Similarity [J]. Computer Science, 2020, 47(6A): 66-69. |
[11] | CHENG Zhong-Jian, ZHOU Shuang-e and LI Kang. Sparse Representation Target Tracking Algorithm Based on Multi-scale Adaptive Weight [J]. Computer Science, 2020, 47(6A): 181-186. |
[12] | PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331. |
[13] | LI Jin-xia, ZHAO Zhi-gang, LI Qiang, LV Hui-xian and LI Ming-sheng. Improved Locality and Similarity Preserving Feature Selection Algorithm [J]. Computer Science, 2020, 47(6A): 480-484. |
[14] | LI Jian-Jun, FU Jia, YANG Yu, HOU Yue, WANG Xiao-ling and RONG Xin. Research on Agricultural Products Recommendation Technology Based on User Interest [J]. Computer Science, 2020, 47(6A): 521-525. |
[15] | SHU Yun-feng and WANG Zhong-qing. Research on Chinese Patent Summarization Based on Patented Structure [J]. Computer Science, 2020, 47(6A): 45-48. |
|