期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
北京房山岩体附近随采矿活动增强的背景地震活动和动态触发事件研究
1
作者 weijun wang xiaofeng meng +5 位作者 zhigang peng qi-fu chen ning liu 刘宁(译) 王伟君(校) 王宝善(复校) 《世界地震译丛》 2016年第5期413-430,共18页
北京西部房山岩体多次发现动态触发事件,但之前的研究都受限于台站分布稀疏的影响。本文系统地分析了2011年3月11日日本东北近海MW9.1地震和2012年4月14日印度洋MW8.6地震之前和之后各40天内固定台站和流动台站记录的连续波形。首先,本... 北京西部房山岩体多次发现动态触发事件,但之前的研究都受限于台站分布稀疏的影响。本文系统地分析了2011年3月11日日本东北近海MW9.1地震和2012年4月14日印度洋MW8.6地震之前和之后各40天内固定台站和流动台站记录的连续波形。首先,本文采用短时平均比长时平均的检测方法构建模板数据库;其次,本文运用波形模板匹配滤波技术对连续波形进行互相关来检测地震事件。最后,本文分别检测得到日本东北近海地震主震后和印度洋地震主震后1 956个和950个地震事件。多数检测到的地震属于浅源(<5km)地震并群集出现在北京西部房山岩体北岭向斜构造,这个地区邻近一个正在运行的煤矿。从两次主震的强振幅面波中分别检测出7个和10个地震事件,但对应的强前震和余震波形中则没有检测到类似的多事件爆发模式。多种统计检验表明两次主震后短时爆发事件是动态触发事件。本文认为采矿相关的活动可能扰动了地下应力环境,从而使该地区比其他地区更容易被动态应力触发。 展开更多
关键词 房山岩体 动态触发 采矿 模板匹配滤波技术
下载PDF
社会计算与社会智能:机遇与挑战 被引量:2
2
作者 孟小峰 黄匡时 +12 位作者 梁玉成 齐佳音 吕欣 张辉 张江 周涛 周晓林 余艳 马友忠 王硕 李勇 杨列勋 吴刚 《中国科学基金》 CSSCI CSCD 北大核心 2023年第3期439-450,共12页
本文梳理了社会计算与社会智能诞生的时代背景,对社会计算、社会智能、计算社会科学等概念进行了辨析,提出了当前社会计算中的八大挑战问题,分别是数据伦理与数据治理、开源平台建设与管理、人与社会的重构、基于认知科学的人工智能、... 本文梳理了社会计算与社会智能诞生的时代背景,对社会计算、社会智能、计算社会科学等概念进行了辨析,提出了当前社会计算中的八大挑战问题,分别是数据伦理与数据治理、开源平台建设与管理、人与社会的重构、基于认知科学的人工智能、复杂系统建模和分析、仿真系统建设与研究、因果推理与因果发现、全球公共危机管理。在此基础上进一步提出了社会计算研究范式的转变,认为,社会计算研究范式是继实验科学、理论科学、计算科学、数据密集型的探索科学后的新研究范式,即社会科学和计算科学高度交叉融合的研究范式。 展开更多
关键词 社会计算 社会智能 研究范式 计算社会科学 人工智能
原文传递
空间数据智能技术发展及应用分析 被引量:1
3
作者 宋轩 孟小峰 刘克 《中国科学基金》 CSSCI CSCD 北大核心 2023年第6期1039-1046,共8页
作为一门空间数据驱动的多学科交叉研究领域,空间数据智能正随着技术发展和空间数据的增长变得越来越重要。本文首先介绍了空间数据智能的概念与最新趋势,并讨论了其面临的包括数据感知与存储、数据挖掘、高精度地图、数据安全与数据隐... 作为一门空间数据驱动的多学科交叉研究领域,空间数据智能正随着技术发展和空间数据的增长变得越来越重要。本文首先介绍了空间数据智能的概念与最新趋势,并讨论了其面临的包括数据感知与存储、数据挖掘、高精度地图、数据安全与数据隐私四个方面的技术挑战,以及空间数据智能所涉及的空间感知、时空数据库、时空数据挖掘、时空数据安全与隐私、边缘计算与雾计算、时空数据可视化等六类关键技术。其次,本文从科学研究、城市建设和产业发展三个方面讨论了我国在空间数据智能领域的发展现状。最后,本文对空间数据智能的具体应用场景进行了详细介绍。 展开更多
关键词 空间数据智能 时空数据存储 时空数据分析 数据安全 技术应用
原文传递
基于权限的移动应用程序隐私风险量化 被引量:4
4
作者 朱敏杰 叶青青 +1 位作者 孟小峰 杨鑫 《中国科学:信息科学》 CSCD 北大核心 2021年第7期1100-1115,共16页
移动设备的普及带来了移动应用程序市场的蓬勃发展,各类服务提供商通过移动应用程序的权限大量收集用户数据,而数据收集过程往往不为用户所知,因此给用户带来极大的隐私风险.对移动应用程序进行隐私风险评估,不仅有助于规范第三方移动... 移动设备的普及带来了移动应用程序市场的蓬勃发展,各类服务提供商通过移动应用程序的权限大量收集用户数据,而数据收集过程往往不为用户所知,因此给用户带来极大的隐私风险.对移动应用程序进行隐私风险评估,不仅有助于规范第三方移动应用市场,而且可帮助用户规避潜在的隐私风险,而如何评估移动应用程序可能带来的最大隐私风险则是当前面临的重大挑战.本文通过研究移动应用程序最大化的数据泄露场景,基于权限请求特征和权限分析原则构建隐私风险最大值量化模型.该模型基于权限敏感度、权限类别异常度、权限使用率和权限调用者数量4个参数,对移动应用程序的潜在隐私风险进行评估.在隐私风险量化和恶意应用检测中,对比当前同类型方法,该模型在真实数据集上效果均较优,说明模型的有效性.实验结果进一步表明,该模型可用于改善现有第三方移动应用市场的隐私风险预警机制,进而保护移动用户的隐私. 展开更多
关键词 隐私保护 移动应用程序 隐私风险量化 权限分析方法
原文传递
Preserving location privacy without exact locations in mobile services 被引量:6
5
作者 Xiao PAN xiaofeng meng 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第3期317-340,共24页
Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile us... Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking approaches assume that mobile users are trusted. And exact locations are required to protect location privacy, which is exactly the information mobile users want to hide. In this paper, we propose a p-anti-conspiration privacy model to anonymize over semi-honest users. Further- more, two k*NNG-based cloaking algorithms, vk*NNCA and ek*NNCA, are proposed to protect location privacy without exact locations. The efficiency and effectiveness of the pro- posed algorithms are validated by a series of carefully designed experiments. The experimental results show that the price paid for location privacy protection without exact locations is small. 展开更多
关键词 location privacy semi-honest users privacy preservation location-based services
原文传递
Discovering top-k patterns with differential privacy-an accurate approach 被引量:3
6
作者 Xiaojian ZHANG xiaofeng meng 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第5期816-827,共12页
Frequent pattern mining discovers sets of items that frequently appear together in a transactional database; these can serve valuable economic and research purposes. However, if the database contains sensitive data (... Frequent pattern mining discovers sets of items that frequently appear together in a transactional database; these can serve valuable economic and research purposes. However, if the database contains sensitive data (e.g., user behavior records, electronic health records), directly releas- ing the discovered frequent patterns with support counts will carry significant risk to the privacy of individuals. In this pa- per, we study the problem of how to accurately find the top-k frequent patterns with noisy support counts on transactional databases while satisfying differential privacy. We propose an algorithm, called differentially private frequent pattern (DFP- Growth), that integrates a Laplace mechanism and an expo- nential mechanism to avoid privacy leakage. We theoretically prove that the proposed method is (λ, δ)-useful and differ- entially private. To boost the accuracy of the returned noisy support counts, we take consistency constraints into account to conduct constrained inference in the post-processing step. Extensive experiments, using several real datasets, confirm that our algorithm generates highly accurate noisy support counts and top-k frequent patterns. 展开更多
关键词 frequent pattern mining differential privacy constrained inference.
原文传递
Vertical nanowires enhanced X-ray radiation damage of cells
7
作者 Liyuan Zheng Qingxuan Li +3 位作者 Shandong Xu xiaofeng meng Xinqi Chen Ming Su 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2023年第14期7-13,共7页
Cell behavior is affected by nanostructured surface,but it remains unknown how ionizing radiation af-fects cells on nanostructured surface.This paper reports an experimental investigation of X-ray radiation induced da... Cell behavior is affected by nanostructured surface,but it remains unknown how ionizing radiation af-fects cells on nanostructured surface.This paper reports an experimental investigation of X-ray radiation induced damage of cells placed on an array of vertically aligned silicon nanowires.X-ray photoelectrons and secondary electrons produced from nanowire array are measured and compared to those from flat silicon substrate.The cell functions including morphology,viability,adhesion and proliferation have been examined and found to be drastically affected when cells are exposed to X-ray radiation,compared to those sitting on flat substrate and those only exposed to X-ray.The enhanced cell damage on nanowires upon X-ray exposure is attributed to nanowire enhanced production of photoelectrons including Auger electrons and secondary electrons,which have high escaping probability from sharp tips of nanowires.The escaped photoelectrons ionize water molecules and generate hydroxyl free radicals that can damage DNAs of cells.An inference of this work is that the contrast in scanning electron microscopy is useful in assessing the effects of nanomaterials for enhanced X-ray radiation therapy. 展开更多
关键词 Edge enhancement Silicon nanowire array X-ray radiation PHOTOELECTRON Cell damage
原文传递
An efficient approach for continuous density queries
8
作者 Jie WEN xiaofeng meng +1 位作者 Xing HAO Jianliang XU 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第5期581-595,共15页
In location-based services, a density query re- turns the regions with high concentrations of moving objects (MOs). The use of density queries can help users identify crowded regions so as to avoid congestion. Most ... In location-based services, a density query re- turns the regions with high concentrations of moving objects (MOs). The use of density queries can help users identify crowded regions so as to avoid congestion. Most of the exist- ing methods try very hard to improve the accuracy of query results, but ignore query efficiency. However, response time is also an important concern in query processing and may have an impact on user experience. In order to address this issue, we present a new definition of continuous density queries. Our approach for processing continuous density queries is based on the new notion of a safe interval, using which the states of both dense and sparse regions are dynamically main- tained. Two indexing structures are also used to index candi- date regions for accelerating query processing and improving the quality of results. The efficiency and accuracy of our approach are shown through an experimental comparison with snapshot density queries. 展开更多
关键词 continuous density queries safe interval query efficiency
原文传递
Large-scale App privacy governance
9
作者 Zitong LI Zhuoya FAN +2 位作者 Junxu LIU Leixia WANG xiaofeng meng 《Frontiers of Engineering Management》 2022年第4期640-652,共13页
Recently,the problem of mobile applications(Apps)leaking users’private information has aroused wide concern.As the number of Apps continuously increases,effective large-scale App governance is a major challenge.Curre... Recently,the problem of mobile applications(Apps)leaking users’private information has aroused wide concern.As the number of Apps continuously increases,effective large-scale App governance is a major challenge.Currently,the government mainly filters out Apps with potential privacy problems manually.Such approach is inefficient with limited searching scope.In this regard,we propose a quantitative method to filter out problematic Apps on a large scale.We introduce Privacy Level(P-Level)to measure an App’s probability of leaking privacy.P-Level is calculated on the basis of Permission-based Privacy Value(P-Privacy)and Usage-based Privacy Value(U-Privacy).The former considers App permission setting,whereas the latter considers App usage.We first illustrate the privacy value model and computation results of both values based on real-world dataset.Subsequently,we introduce the P-Level computing model.We also define the P-Level computed on our dataset as the PL standard.We analyze the distribution of average usage and number of Apps under the levels given in the PL standard,which may provoke insights into the large-scale App governance.Through P-Privacy,U-Privacy,and P-Level,potentially problematic Apps can be filtered out efficiently,thereby making up for the shortcoming of being manual. 展开更多
关键词 privacy risk Privacy Level quantification large-scale App governance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部