期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
1
作者 Dongxiang Chen zhijun ding +1 位作者 Chungang Yan Mimi Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1528-1541,共14页
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user... The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user behavior models to authenticate users.In this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed.This architecture is suitable for users using the mobile terminal APP in the daily life.The architecture includes data acquisition,data processing,feature extraction,and sub model training.We can use this architecture for continuous authentication when the user uses APP at the mobile terminal. 展开更多
关键词 Behavioral authentication browsing behaviors mobile device multiple factors
下载PDF
An Efficient Webpage Classification Algorithm Based on LSH
2
作者 Junjun Liu Haichun Sun zhijun ding 《国际计算机前沿大会会议论文集》 2015年第1期73-75,共3页
With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one o... With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one of common methods to retrieve and manage information. To get a more efficient classifier, this paper proposes a webpage classification method based on locality sensitive hash function. In which, three innovative modules including building feature dictionary, mapping feature vectors to fingerprints using Localitysensitive hashing, and extending webpage features are contained. The compare results show that the proposed algorithm has better performance in lower time than the naive bayes one. 展开更多
关键词 EXPLOSIVE growth Webpage classification Locality-sensitive HASHING FINGERPRINT EXTENDING webpage features
下载PDF
方舱计算 被引量:1
3
作者 蒋昌俊 丁志军 +4 位作者 喻剑 章昭辉 闫春钢 张亚英 王鹏伟 《中国科学:信息科学》 CSCD 北大核心 2021年第8期1233-1254,共22页
随着信息技术创新日新月异,数字化、网络化、智能化深入发展,新应用层出不穷、新业态蓬勃发展,对业务系统的敏捷构造和持续运维提出了更高的要求.为此,本文提出了一种新的计算模式:方舱计算.所谓方舱计算,是通过网络访问的,面向IT任务... 随着信息技术创新日新月异,数字化、网络化、智能化深入发展,新应用层出不穷、新业态蓬勃发展,对业务系统的敏捷构造和持续运维提出了更高的要求.为此,本文提出了一种新的计算模式:方舱计算.所谓方舱计算,是通过网络访问的,面向IT任务全生命周期的跨域资源配置和协同的计算集成环境.其核心是"方舱专用机动、资源跨域伸缩、系统运维自治".本文给出了方舱计算系统结构及其工作原理,方舱计算系统主要由方舱生成与管理系统、跨域资源管理系统、虚拟数据中心系统和若干网关(方舱网关、虚拟数据中心网关、跨域资源网关等)组成.进而,给出了适于方舱计算的资源分配最优化问题定义,在兼顾数据资源、计算资源和存储资源等的基础上,实现最小化资源成本.通过规划求解器与近似优化算法仿真实验,表明本文的方法能够兼顾数据资源和物理资源的分布,实现方舱资源的优化配置. 展开更多
关键词 方舱 虚拟数据中心 跨域资源管理 资源分配 资源分布图 资源目录
原文传递
Big data resource service platform for the internet financial industry 被引量:8
4
作者 Changjun Jiang zhijun ding +1 位作者 Junli Wang Chungang Yan 《Chinese Science Bulletin》 SCIE EI CAS 2014年第35期5051-5058,共8页
It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including internet finance.This paper briefly describes the current big data situation and its significance,di... It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including internet finance.This paper briefly describes the current big data situation and its significance,discusses the big data resource service platform architecture that includes three levels:data resource identification and access,data resources storage and analysis,and network information service platform,and then introduces some work undertaken by our project team on big data analysis research and application of trusted transactions for internet finance. 展开更多
关键词 信息服务平台 金融行业 数据资源 互联网 体系结构 项目团队 数据分析 源识别
原文传递
Robots Exclusion and Guidance Protocol
5
作者 Dajie Ge zhijun ding 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第6期643-659,共17页
With the rapid development of the Internet, general-purpose web crawlers have increasingly become unable to meet people's individual needs as they are no longer efficient enough to fetch deep web pages. The presence ... With the rapid development of the Internet, general-purpose web crawlers have increasingly become unable to meet people's individual needs as they are no longer efficient enough to fetch deep web pages. The presence of several deep web pages in the websites and the widespread use of Ajax make it difficult for generalpurpose web crawlers to fetch information quickly and efficiently. On the basis of the original Robots Exclusion Protocol(REP), a Robots Exclusion and Guidance Protocol(REGP) is proposed in this paper, by integrating the independent scattered expansions of the original Robots Protocol developed by major search engine companies.Our protocol expands the file format and command set of the REP as well as two labels of the Sitemap Protocol.Through our protocol, websites can express their aspects of requirements for restrictions and guidance to the visiting crawlers, and provide a general-purpose fast access of deep web pages and Ajax pages for the crawlers,and facilitates crawlers to easily obtain the open data on websites effectively with ease. Finally, this paper presents a specific application scenario, in which both a website and a crawler work with support from our protocol. A series of experiments are also conducted to demonstrate the efficiency of the proposed protocol. 展开更多
关键词 deep web AJAX CRAWLER PROTOCOL
原文传递
Using Petri nets to verify acyclic rule-based system
6
作者 zhijun ding Meiqin PAN +1 位作者 Changjun JIANG Yaojun HAN 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第2期155-161,共7页
A series of Petri net-based definitions were formulated for describing four types of structural errors in a rule-based system(RBS),including inconsistency,incompleteness,redundancy and circularity.A marked v-Petri net... A series of Petri net-based definitions were formulated for describing four types of structural errors in a rule-based system(RBS),including inconsistency,incompleteness,redundancy and circularity.A marked v-Petri net model of acyclic RBS was constructed.Then,its reachability tree was generated to record all reachable relations between propositions in RBS.Moreover,a backward reasoning forest of a reachable marking was generated for explicitly representing reachable paths in RBS.Finally,a set of theorems and algorithms were provided to analyze and check structural errors.The usability of the research results presented in this paper was illustrated by an example. 展开更多
关键词 rule-based system(RBS) horn clause Petri net VERIFICATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部