The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user...The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user behavior models to authenticate users.In this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed.This architecture is suitable for users using the mobile terminal APP in the daily life.The architecture includes data acquisition,data processing,feature extraction,and sub model training.We can use this architecture for continuous authentication when the user uses APP at the mobile terminal.展开更多
With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one o...With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one of common methods to retrieve and manage information. To get a more efficient classifier, this paper proposes a webpage classification method based on locality sensitive hash function. In which, three innovative modules including building feature dictionary, mapping feature vectors to fingerprints using Localitysensitive hashing, and extending webpage features are contained. The compare results show that the proposed algorithm has better performance in lower time than the naive bayes one.展开更多
It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including internet finance.This paper briefly describes the current big data situation and its significance,di...It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including internet finance.This paper briefly describes the current big data situation and its significance,discusses the big data resource service platform architecture that includes three levels:data resource identification and access,data resources storage and analysis,and network information service platform,and then introduces some work undertaken by our project team on big data analysis research and application of trusted transactions for internet finance.展开更多
With the rapid development of the Internet, general-purpose web crawlers have increasingly become unable to meet people's individual needs as they are no longer efficient enough to fetch deep web pages. The presence ...With the rapid development of the Internet, general-purpose web crawlers have increasingly become unable to meet people's individual needs as they are no longer efficient enough to fetch deep web pages. The presence of several deep web pages in the websites and the widespread use of Ajax make it difficult for generalpurpose web crawlers to fetch information quickly and efficiently. On the basis of the original Robots Exclusion Protocol(REP), a Robots Exclusion and Guidance Protocol(REGP) is proposed in this paper, by integrating the independent scattered expansions of the original Robots Protocol developed by major search engine companies.Our protocol expands the file format and command set of the REP as well as two labels of the Sitemap Protocol.Through our protocol, websites can express their aspects of requirements for restrictions and guidance to the visiting crawlers, and provide a general-purpose fast access of deep web pages and Ajax pages for the crawlers,and facilitates crawlers to easily obtain the open data on websites effectively with ease. Finally, this paper presents a specific application scenario, in which both a website and a crawler work with support from our protocol. A series of experiments are also conducted to demonstrate the efficiency of the proposed protocol.展开更多
A series of Petri net-based definitions were formulated for describing four types of structural errors in a rule-based system(RBS),including inconsistency,incompleteness,redundancy and circularity.A marked v-Petri net...A series of Petri net-based definitions were formulated for describing four types of structural errors in a rule-based system(RBS),including inconsistency,incompleteness,redundancy and circularity.A marked v-Petri net model of acyclic RBS was constructed.Then,its reachability tree was generated to record all reachable relations between propositions in RBS.Moreover,a backward reasoning forest of a reachable marking was generated for explicitly representing reachable paths in RBS.Finally,a set of theorems and algorithms were provided to analyze and check structural errors.The usability of the research results presented in this paper was illustrated by an example.展开更多
基金partially supported by the National Key Research and Development Program of China(2018YFB2100801)。
文摘The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user behavior models to authenticate users.In this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed.This architecture is suitable for users using the mobile terminal APP in the daily life.The architecture includes data acquisition,data processing,feature extraction,and sub model training.We can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
文摘With the explosive growth of Internet information, it is more and more important to fetch real-time and related information. And it puts forward higher requirement on the speed of webpage classification which is one of common methods to retrieve and manage information. To get a more efficient classifier, this paper proposes a webpage classification method based on locality sensitive hash function. In which, three innovative modules including building feature dictionary, mapping feature vectors to fingerprints using Localitysensitive hashing, and extending webpage features are contained. The compare results show that the proposed algorithm has better performance in lower time than the naive bayes one.
基金supported by the Major Research Plan of the National Natural Science Foundation of China(91218301)the Hong Kong and Macao Cooperation Fund(2013DFM10100)
文摘It is now the era of big data.Massive volumes of complex and dynamic data exist in a variety of industries,including internet finance.This paper briefly describes the current big data situation and its significance,discusses the big data resource service platform architecture that includes three levels:data resource identification and access,data resources storage and analysis,and network information service platform,and then introduces some work undertaken by our project team on big data analysis research and application of trusted transactions for internet finance.
基金partially supported by the National Natural Science Foundation of China(Nos.61672381 and90818023)
文摘With the rapid development of the Internet, general-purpose web crawlers have increasingly become unable to meet people's individual needs as they are no longer efficient enough to fetch deep web pages. The presence of several deep web pages in the websites and the widespread use of Ajax make it difficult for generalpurpose web crawlers to fetch information quickly and efficiently. On the basis of the original Robots Exclusion Protocol(REP), a Robots Exclusion and Guidance Protocol(REGP) is proposed in this paper, by integrating the independent scattered expansions of the original Robots Protocol developed by major search engine companies.Our protocol expands the file format and command set of the REP as well as two labels of the Sitemap Protocol.Through our protocol, websites can express their aspects of requirements for restrictions and guidance to the visiting crawlers, and provide a general-purpose fast access of deep web pages and Ajax pages for the crawlers,and facilitates crawlers to easily obtain the open data on websites effectively with ease. Finally, this paper presents a specific application scenario, in which both a website and a crawler work with support from our protocol. A series of experiments are also conducted to demonstrate the efficiency of the proposed protocol.
基金supported by the National Basic Research Program of China (Nos.2003CB317002 and 2007CB316502)the National Natural Science Foundation of China (Grant Nos.60534060 and 90718012).
文摘A series of Petri net-based definitions were formulated for describing four types of structural errors in a rule-based system(RBS),including inconsistency,incompleteness,redundancy and circularity.A marked v-Petri net model of acyclic RBS was constructed.Then,its reachability tree was generated to record all reachable relations between propositions in RBS.Moreover,a backward reasoning forest of a reachable marking was generated for explicitly representing reachable paths in RBS.Finally,a set of theorems and algorithms were provided to analyze and check structural errors.The usability of the research results presented in this paper was illustrated by an example.