Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200047-8.doi: 10.11896/jsjkx.241200047
• Information Security • Previous Articles Next Articles
LI Jinhui1, CAO Lifeng2, WANG Xiaoqin2, BAI Jinlong2, CHEN Yang2
CLC Number:
| [1]WENBO Z,XIAOTONG H,ZHENSHAN B.A secure and efficient multi-domain data sharing model on consortium chain[J].The Journal of Supercomputing,2022,79(8):8538-8582. [2]SALEHI A S,RUDOLPH C,GROBLERM.A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application[C]//2019 IFIP/IEEE Symposium on Integrated Network and Service Management.2019:643-638. [3]POLTAVTSEV A A,KHABAROV R A,SELYANKINO A.Inference Attacks and Information Security in Databases[J].Automatic Control and Computer Sciences,2021,54(8):829-833. [4]POLTAVTSEV A A,KHABAROV R A,SELYANKINO A.Comparative Analysis of Methods for Protection against Logical Inference[J].Automatic Control and Computer Sciences,2022,55(8):984-990. [5]CAO L F,CHEN X Y,DU X H,et al.A Level Inference Method for Aggregated Information of Objects Based on Associated Attributes[J].ACTA Electronica Sinca,2013,41(7):1442-1447. [6]CAO L F,CHEN X Y,DU X H,et al.A Level Inference Method for Aggregated Information of Objects Based on Clustering Analysis[J].Journal of Electronics & Information Technology,2012,34(6):1432-1437. [7]LIU T,WANG Z J,LIU Y,et al.Data inference:data leakage paradigms and defense methods in cyber-physical systems[J].Scientia SincaInformationis,2023,53(11):2152-2179. [8]HAO L,WANG T,GUO C.Research on parallel associationrule mining of big data based on an improved K-means clustering algorithm[J].International Journal of Autonomous and Adaptive Communications Systems,2023,16(3):233-247. [9]LIU X,ZHANG Z,ZHANG G.Using improved feature extraction combined with RF-KNN classifier to predict coal and gas outburst[J].Journal of Intelligent & Fuzzy Systems,2023,44(1):237-250. [10]LU B,FAN Q,ZHOU X L,et al.A multimodal multi-label classification method based on hypergraph[J].Computer Enginee-ring & Science,2024,46(9):1667-1674. [11]GAO Y,ZHANG Z,LIN H,et al.Hypergraph learning:Methods and practices[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,44(5):2548-2566. [12]WANG Y,ZHAO E,WANG W.A Knowledge Graph Completion Method Based on Fusing Association Information[J].IEEE Access,2022,10:50500-50507. [13]HU X C,LI Y,CHEN Z J,et al.Review of research of granular fuzzy rule-based modeling[J].CAAI Transactions on Intelligent Systems,2024,19(1):22-35. [14]LIN A J,ZHANG M T.Differential privacy protection based on multi-granularity data[J].Journal of Soochow University(Philosophy and Social Sciences),2024,45(2):182-192. [15]CAO L,LU X,GAO Z,et al.An Information Sensitivity Infe-rence Method for Big Data Aggregation Based on Granular Analysis[C]//2019 Big Data.2019. |
| [1] | ZHAO Yining, WANG Xiaoning, NIU Tie, ZHAO Yi, XIAO Haili. Node Failure and Anomaly Prediction Method for Supercomputing Systems [J]. Computer Science, 2025, 52(9): 128-136. |
| [2] | LI Ruiyang, LI Shuyi, YANG Yuexi, PENG Chuhan, XING Jingyu, QIAO Gaoxiu. Research on Portfolio Construction Based on Topological Structure Features [J]. Computer Science, 2025, 52(10): 13-21. |
| [3] | MAO Xin, LEI Zhanyao, QI Zhengwei. Automated Kaomoji Extraction Based on Large-scale Danmaku Texts [J]. Computer Science, 2024, 51(1): 284-294. |
| [4] | YANG Heng, ZHU Yan. Analysis of Academic Network Based on Graph OLAP [J]. Computer Science, 2023, 50(6A): 220100237-5. |
| [5] | XU Xia, ZHANG Hui, YANG Chunming, LI Bo, ZHAO Xujian. Fair Method for Spectral Clustering to Improve Intra-cluster Fairness [J]. Computer Science, 2023, 50(2): 158-165. |
| [6] | SHA Yuji, WANG Xin, HE Yanxiao, ZHONG Xueyan, FANG Yu. Mining and Application of Frequent Patterns with Counting Quantifiers [J]. Computer Science, 2023, 50(11A): 230100041-12. |
| [7] | XU Ming-yue. Study on Information Sharing and Channel Strategy of Platform in Consideration ofInformation Leakage and Information Investing Cost [J]. Computer Science, 2022, 49(6A): 744-752. |
| [8] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
| [9] | CONG Ying-nan, WANG Zhao-yu, ZHU Jin-qing. Insights into Dataset and Algorithm Related Problems in Artificial Intelligence for Law [J]. Computer Science, 2022, 49(4): 74-79. |
| [10] | DONG Yun-xin, LIN Geng, ZHANG Qing-wei, CHEN Ying-ting. Recommendation Algorithm Based on Apriori Algorithm and Improved Similarity [J]. Computer Science, 2022, 49(11A): 211000005-5. |
| [11] | JIANG Hao-chen, WEI Zi-qi, LIU Lin, CHEN Jun. Imbalanced Data Classification:A Survey and Experiments in Medical Domain [J]. Computer Science, 2022, 49(1): 80-88. |
| [12] | YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117. |
| [13] | WU Guang-zhi, GUO Bin, DING Ya-san, CHENG Jia-hui, YU Zhi-wen. Cognitive Mechanisms of Fake News [J]. Computer Science, 2021, 48(6): 306-314. |
| [14] | XU Hui-hui, YAN Hua. Relative Risk Degree Based Risk Factor Analysis Algorithm for Congenital Heart Disease in Children [J]. Computer Science, 2021, 48(6): 210-214. |
| [15] | SHEN Xia-jiong, YANG Ji-yong, ZHANG Lei. Attribute Exploration Algorithm Based on Unrelated Attribute Set [J]. Computer Science, 2021, 48(4): 54-62. |
|
||