Computer Science ›› 2022, Vol. 49 ›› Issue (3): 308-312.doi: 10.11896/jsjkx.210300231
• Information Security • Previous Articles Next Articles
LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min
CLC Number:
[1]FENG D G.Big data security and privacy preservation[M].Tsinghua University Press,2018. [2]ZANG H,BOLOT J.Anonymization of location data does notwork:A large-scale measurement study[C]//Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.New York:ACM,2011:145-156. [3]FREUDIGER J,SHOKRI R,HUBAUX J P.Evaluating the privacy risk of location-based services[C]//Proceedings of the 2011 International Conference on Financial Cryptography and Data Security.Berlin:Springer,2011:31-46. [4]LUO X,GAO Q,ZHOU F,et al.Identifying Human Mobilityvia Trajectory Embeddings[C]//IJCAI.2017:1689-1695. [5]WANG G,LIAO D,LI J.Complete User Mobility via User and Trajectory Embeddings[J].IEEE Access,2018,6:72125-72136. [6]ZHOU F,GAO Q,TRAJCEVSKI G,et al.Trajectory-UserLinking via Variational AutoEncoder[C]//IJCAI.2018:3212-3218. [7]YI B K,JAGADISH H V,FALOUTSOS C.Efficient Retrieval of Similar Time Sequences under Time Warping[C]//Fourteenth International Conference on Data Engineering.IEEE Computer Society,1998. [8]CHEN L,NG R.On the Marriage of Edit Distance and LpNorms[C]//Very Large Data Bases.2004. [9]WANG R,ZHANG M,FENG D,et al.A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal In-fluences[C]//Proceedings of the 2015 International Conference on Information and Communications Security.Cham:Springer,2015:478-484. [10]CHEN Z,FU Y,ZHANG M,et al.The De-anonymizationMethod Based on User Spatio-Temporal Mobility Trace[C]//Proceedings of the 2017 International Conference on Information and Communications Security.Cham:Springer,2017:459-471. [11]QUAN B,YANG B C,HU K Q,et al.Prediction Model of Ship Trajectory Based on LSTM[J].Computer Science,2018,45(z2):126-131. [12]MIKOLOV T,CHEN K,CORRADO G,et al.Efficient Estimation of Word Representations in Vector Space[C]//Internatio-nal Conference on Learning Representations:Workshops Track.Computer Science,2013. [13]GowallaData[EB/OL].[2020-01-29].http://snap.stanford.edu/data/loc-gowalla.html. [14]GeoLifeData[EB/OL].[2020-01-29].http://research.microsoft.com/enus/downloads/b16d359d-d164-469e-9fd4-daa38f2b2e13/default.asp. [15]LIU Q,WU S,WANG L,et al.Predicting the Next Location:A Recurrent Model with Spatial and Temporal Contexts[C]//Thirtieth AAAI Conference on Artificial Intelligence.AAAI Press,2016. [16]DAS G,GUNOPULOS D,MANNILA H.Finding Similar Time Series[C]//Proceedings of the First European Symposium on Principles of Data Mining and Knowledge Discovery.1997:88-100. [17]CORTES C,VAPNIK V.Support-Vector Networks[J].Ma-chine Learning,1995,20(3):273-297. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[4] | DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145. |
[5] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[6] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[7] | XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182. |
[8] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[9] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[10] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[11] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[12] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[13] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[14] | WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48. |
[15] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
|