期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
Exploration and Practice of Big Data Introductory Courses for Big Data Management and Application Majors
1
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2024年第2期131-137,共7页
As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by ... As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by everyone.To this end,we discuss some of our explorations and attempts in the construction and teaching process of big data courses for the major of big data management and application from the perspective of course planning,course implementation,and course summary.After interviews with students and feedback from questionnaires,students are highly satisfied with some of the teaching measures and programs currently adopted. 展开更多
关键词 Big data management and application “Introduction to Big Data” Teaching reform Curriculum exploration
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
2
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
Integrating Multiple Linear Regression and Infectious Disease Models for Predicting Information Dissemination in Social Networks
3
作者 Junchao Dong Tinghui Huang +1 位作者 Liang Min Wenyan Wang 《Journal of Electronic Research and Application》 2023年第2期20-27,共8页
Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model int... Social network is the mainstream medium of current information dissemination,and it is particularly important to accurately predict its propagation law.In this paper,we introduce a social network propagation model integrating multiple linear regression and infectious disease model.Firstly,we proposed the features that affect social network communication from three dimensions.Then,we predicted the node influence via multiple linear regression.Lastly,we used the node influence as the state transition of the infectious disease model to predict the trend of information dissemination in social networks.The experimental results on a real social network dataset showed that the prediction results of the model are consistent with the actual information dissemination trends. 展开更多
关键词 Social networks Epidemic model Linear regression model
下载PDF
Multi-manufacturer drug identification based on near infrared spectroscopy and deep transfer learning 被引量:4
4
作者 Lingqiao Li Xipeng Pan +5 位作者 Wenli Chen Manman Wei Yanchun Feng Lihui Yin Changqin Hu Huihua Yang 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2020年第4期39-50,共12页
Near infrared(NIR)spectrum analysis technology has outstanding advantages such as rapid,nondestructive,pollution-free,and is widely used in food,pharmaceutical,petrochemical,agricultural products production and testin... Near infrared(NIR)spectrum analysis technology has outstanding advantages such as rapid,nondestructive,pollution-free,and is widely used in food,pharmaceutical,petrochemical,agricultural products production and testing industries.Convolutional neural network(CNN)is one of the most successful methods in big data analysis because of its powerful feature ex-traction and abstraction ability,and it is especially suitable for solving multi-classification problems.CNN-based transfer learning is a machine learning technique,which migrates para-meters of trained model to the new one to improve the performance.The transfer learning strategy can speed up the learning efficiency of the model instead of learning from scratch.In view of the difficulty in acquisition of drug NIR spectral data and high labeling cost,this paper proposes three simple but very effective transfer learning methods for multi-manufacturer identification of drugs based on one-dimensional CNN.Compared with the original CNN,the transfer learning method can achieve better classification performance with fewer NIR spectral data,which greatly reduces the dependence on labeled NIR spectral data.At the same time,this paper also compares and discusses three different transfer learning methods,and selects the most suitable transfer learning model for drug NIR spectral data analysis.Compared with the current popular methods,such as SVM,BP,AE and ELM,the proposed method achieves higher classification accuracy and scalability in multi-variety and multi-manufacturer NIR spectrum classification experiments. 展开更多
关键词 Near-infrared spectroscopy transfer learning drug identification multi-manufacturer
下载PDF
SpectraTr:A novel deep learning model for qualitative analysis of drug spectroscopy based on transformer structure
5
作者 Pengyou Fu Yue Wen +4 位作者 Yuke Zhang Lingqiao Li Yanchun Feng Lihui Yin Huihua Yang 《Journal of Innovative Optical Health Sciences》 SCIE EI CAS 2022年第3期107-117,共11页
The drug supervision methods based on near-infrared spectroscopy analysis are heavily dependent on the chemometrics model which characterizes the relationship between spectral data and drug categories.The preliminary ... The drug supervision methods based on near-infrared spectroscopy analysis are heavily dependent on the chemometrics model which characterizes the relationship between spectral data and drug categories.The preliminary application of convolution neural network in spectral analysis demonstrates excellent end-to-end prediction ability,but it is sensitive to the hyper-parameters of the network.The transformer is a deep-learning model based on self-attention mechanism that compares convolutional neural networks(CNNs)in predictive performance and has an easy-todesign model structure.Hence,a novel calibration model named SpectraTr,based on the transformer structure,is proposed and used for the qualitative analysis of drug spectrum.The experimental results of seven classes of drug and 18 classes of drug show that the proposed SpectraTr model can automatically extract features from a huge number of spectra,is not dependent on pre-processing algorithms,and is insensitive to model hyperparameters.When the ratio of the training set to test set is 8:2,the prediction accuracy of the SpectraTr model reaches 100%and 99.52%,respectively,which outperforms PLS DA,SVM,SAE,and CNN.The model is also tested on a public drug data set,and achieved classification accuracy of 96.97%without preprocessing algorithm,which is 34.85%,28.28%,5.05%,and 2.73%higher than PLS DA,SVM,SAE,and CNN,respectively.The research shows that the SpectraTr model performs exceptionally well in spectral analysis and is expected to be a novel deep calibration model after Autoencoder networks(AEs)and CNN. 展开更多
关键词 Near-infrared spectroscopy analysis drug supervision transformer structure deep learning CHEMOMETRICS
下载PDF
Prediction of Online Consumers’Repeat Purchase Behavior via BERT-MLP Model
6
作者 Junchao Dong Tinghui Huang +1 位作者 Liang Min Wenyan Wang 《Journal of Electronic Research and Application》 2022年第3期12-19,共8页
It is an effective means for merchants to carry out precision marketing and improve ROI by using historical user behavior data obtained from promotional activities in order to build a model to predict the repeat purch... It is an effective means for merchants to carry out precision marketing and improve ROI by using historical user behavior data obtained from promotional activities in order to build a model to predict the repeat purchase behavior of users after promotional activities.Most of the existing prediction models are supervised learning,which does not work well with a small amount of labeled data.This paper proposes a BERT-MLP prediction model that uses“large-scale data unsupervised pre-training+small amount of labeled data fine-tuning.”The experimental results on Alibaba real dataset show that the accuracy of the BERT-MLP model is better than the baseline model. 展开更多
关键词 Data mining Business intelligence E-COMMERCE BERT Multilayer perceptron
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
7
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
Semi-Supervised Classification of Data Streams by BIRCH Ensemble and Local Structure Mapping 被引量:2
8
作者 Yi-Min Wen Shuai Liu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2020年第2期295-304,共10页
Many researchers have applied clustering to handle semi-supervised classification of data streams with concept drifts.However,the generalization ability for each specific concept cannot be steadily improved,and the co... Many researchers have applied clustering to handle semi-supervised classification of data streams with concept drifts.However,the generalization ability for each specific concept cannot be steadily improved,and the concept drift detection method without considering the local structural information of data cannot accurately detect concept drifts.This paper proposes to solve these problems by BIRCH(Balanced Iterative Reducing and Clustering Using Hierarchies)ensemble and local structure mapping.The local structure mapping strategy is utilized to compute local similarity around each sample and combined with semi-supervised Bayesian method to perform concept detection.If a recurrent concept is detected,a historical BIRCH ensemble classifier is selected to be incrementally updated;otherwise a new BIRCH ensemble classifier is constructed and added into the classifier pool.The extensive experiments on several synthetic and real datasets demonstrate the advantage of the proposed algorithm. 展开更多
关键词 SEMI-SUPERVISED classification clustering data STREAM concept DRIFT
原文传递
GRSA: Service-Aware Flow Scheduling for Cloud Storage Datacenter Networks 被引量:2
9
作者 Wenlong Ke Yong Wang Miao Ye 《China Communications》 SCIE CSCD 2020年第6期164-179,共16页
The proliferation of the global datasphere has forced cloud storage systems to evolve more complex architectures for different applications.The emergence of these application session requests and system daemon service... The proliferation of the global datasphere has forced cloud storage systems to evolve more complex architectures for different applications.The emergence of these application session requests and system daemon services has created large persistent flows with diverse performance requirements that need to coexist with other types of traffic.Current routing methods such as equal-cost multipath(ECMP)and Hedera do not take into consideration specific traffic characteristics nor performance requirements,which make these methods difficult to meet the quality of service(QoS)for high-priority flows.In this paper,we tailored the best routing for different kinds of cloud storage flows as an integer programming problem and utilized grey relational analysis(GRA)to solve this optimization problem.The resulting method is a GRAbased service-aware flow scheduling(GRSA)framework that considers requested flow types and network status to select appropriate routing paths for flows in cloud storage datacenter networks.The results from experiments carried out on a real traffic trace show that the proposed GRSA method can better balance traffic loads,conserve table space and reduce the average transmission delay for high-priority flows compared to ECMP and Hedera. 展开更多
关键词 cloud storage datacenter networks flow scheduling grey relational analysis QOS SDN
下载PDF
A Novel Analysis of Delay and Power Consumption for Polling Schemes in the IoT 被引量:3
10
作者 Li Feng Jiguo Yu +1 位作者 Feng Zhao Honglu Jiang 《Tsinghua Science and Technology》 EI CAS CSCD 2017年第4期368-378,共11页
In the Internet of Things(IoT), various battery-powered wireless devices are connected to collect and exchange data, and typical traffic is periodic and heterogeneous. Polling with power management is a very promisi... In the Internet of Things(IoT), various battery-powered wireless devices are connected to collect and exchange data, and typical traffic is periodic and heterogeneous. Polling with power management is a very promising technique that can be used for communication among these devices in the IoT. In this paper, we propose a novel and scalable model to study the delay and the power consumption performance for polling schemes with power management under heterogeneous settings(particularly the heterogeneous sleeping interval). In our model,by introducing the concept of virtual polling interval, we successfully convert the considered energy-efficient polling scheme into an equivalent purely-limited vacation system. Thus, we can easily evaluate the mean and variance of the delay and the power consumption by applying existing queueing formulae, without developing a new theoretical model as required in previous works. Extensive simulations show that our analytical results are very accurate for both homogeneous and heterogeneous settings. 展开更多
关键词 802.11 Point Coordination Function(PCF) power management queueing analysis
原文传递
Minimum Cost Multi-Path Parallel Transmission with Delay Constraint by Extending Openflow 被引量:1
11
作者 Kuangyu Qin Chuanhe Huang +2 位作者 N.Ganesan Kewei Liu Xi Chen 《China Communications》 SCIE CSCD 2018年第3期15-26,共12页
Sometimes user has the requirement to run a high bandwidth application over a low bandwidth network. But its implementation is not easy as the traditional network transmits data with only one path where its bandwidth ... Sometimes user has the requirement to run a high bandwidth application over a low bandwidth network. But its implementation is not easy as the traditional network transmits data with only one path where its bandwidth is lower than the demand. Although the current network technology like SDN has the ability to precisely control the data transmission in the network, but till now the standard openflow protocol does not support splitting one flow to multiple flows. In this paper, a flow splitting algorithm is proposed. The algorithm splits a data flow to multiple sub-flows by extending the openflow protocol. A multiple paths routing algorithm is also proposed to implement the multi-path parallel transmission in the paper. The algorithm selects multiple paths and minimizes the cost of transmission under the constraint of maximum delay and delay variance. The simulations show the algorithms can significantly improve the transmission performance. 展开更多
关键词 SDN OpenFlow multi-pathtransmission
下载PDF
WaveLines:towards effective visualization and analysis of stability in power grid simulation
12
作者 Tianye ZHANG Qi WANG +6 位作者 Liwen LIN Jiazhi XIA Xiwang XU Yanhao HUANG Xiaonan LUO Wenting ZHENG Wei CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第6期19-30,共12页
Closely related to the safety and stability of power grids,stability analysis has long been a core topic in the electric industry.Conventional approaches employ computational simulation to make the quantitative judgem... Closely related to the safety and stability of power grids,stability analysis has long been a core topic in the electric industry.Conventional approaches employ computational simulation to make the quantitative judgement of the grid stability under distinctive conditions.The lack of in-depth data analysis tools has led to the difficulty in analytical tasks such as situation-aware analysis,instability reasoning and pattern recognition.To facilitate visual exploration and reasoning on the simulation data,we introduce WaveLines,a visual analysis approach which supports the supervisory control of multivariate simulation time series of power grids.We design and implement an interactive system that supports a set of analytical tasks proposed by domain experts and experienced operators.Experiments have been conducted with domain experts to illustrate the usability and effectiveness of WaveLines. 展开更多
关键词 STABILITY visual analysis power grid simulation data
原文传递
Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm
13
作者 Zhao Chen Ning Xiong +6 位作者 Yujue Wang Yong Ding Hengkui Xiang Chenjun Tang Lingang Liu Xiuqing Zou Decun Luo 《国际计算机前沿大会会议论文集》 2019年第1期238-240,共3页
Existing interference protection systems lack automatic evaluation methods to provide scientific, objective and accurate assessment results. To address this issue, this paper develops a layout scheme by geometrically ... Existing interference protection systems lack automatic evaluation methods to provide scientific, objective and accurate assessment results. To address this issue, this paper develops a layout scheme by geometrically modeling the actual scene, so that the hand-held full-band spectrum analyzer would be able to collect signal field strength values for indoor complex scenes. An improved prediction algorithm based on the K-nearest neighbor non-parametric kernel regression was proposed to predict the signal field strengths for the whole plane before and after being shield. Then the highest accuracy set of data could be picked out by comparison. The experimental results show that the improved prediction algorithm based on the K-nearest neighbor non-parametric kernel regression can scientifically and objectively predict the indoor complex scenes’ signal strength and evaluate the interference protection with high accuracy. 展开更多
关键词 INTERFERENCE protection K-nearest NEIGHBOR algorithm NON-PARAMETRIC KERNEL regression SIGNAL field STRENGTH
下载PDF
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds
14
作者 Meng Zhao Yong Ding +3 位作者 Yujue Wang Huiyong Wang Bingyao Wang Lingang Liu 《国际计算机前沿大会会议论文集》 2019年第1期342-345,共4页
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ... The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest status of outsourced data. Integrity auditing requires user to take massive time-consuming computations, which would not be affordable by weak devices. In this paper, we propose a privacy-preserving TPA-aided remote data integrity auditing scheme based on Li et al.’s data integrity auditing scheme without bilinear pairings, where a third party auditor (TPA) is employed to perform integrity auditing on outsourced data for users. The privacy of outsourced data can be guaranteed against TPA in the sense that TPA could not infer its contents from the returned proofs in the integrity auditing phase. Our construction is as efficient as Li et al.’s scheme, that is, each procedure takes the same time-consuming operations in both schemes, and our solution does not increase the sizes of processed data, challenge and proof. 展开更多
关键词 Cloud STORAGE INTEGRITY AUDITING Provable Data POSSESSION PROOFS of STORAGE PROOFS of Retrievability
下载PDF
PCRTAM-Net:A Novel Pre-Activated Convolution Residual and Triple Attention Mechanism Network for Retinal Vessel Segmentation
15
作者 汪华登 李紫正 +5 位作者 保罗 黎兵兵 潘细朋 刘振丙 蓝如师 罗笑南 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第3期567-581,共15页
Retinal images play an essential role in the early diagnosis of ophthalmic diseases.Automatic segmentation of retinal vessels in color fundus images is challenging due to the morphological differences between the reti... Retinal images play an essential role in the early diagnosis of ophthalmic diseases.Automatic segmentation of retinal vessels in color fundus images is challenging due to the morphological differences between the retinal vessels and the low-contrast background.At the same time,automated models struggle to capture representative and discriminative retinal vascular features.To fully utilize the structural information of the retinal blood vessels,we propose a novel deep learning network called Pre-Activated Convolution Residual and Triple Attention Mechanism Network(PCRTAM-Net).PCRTAM-Net uses the pre-activated dropout convolution residual method to improve the feature learning ability of the network.In addition,the residual atrous convolution spatial pyramid is integrated into both ends of the network encoder to extract multiscale information and improve blood vessel information flow.A triple attention mechanism is proposed to extract the structural information between vessel contexts and to learn long-range feature dependencies.We evaluate the proposed PCRTAM-Net on four publicly available datasets,DRIVE,CHASE_DB1,STARE,and HRF.Our model achieves state-of-the-art performance of 97.10%,97.70%,97.68%,and 97.14%for ACC and 83.05%,82.26%,84.64%,and 81.16%for F1,respectively. 展开更多
关键词 retinal image segmentation triple attention mechanism atrous convolution residual network
原文传递
Consideration of the Local Correlation of Learning Behaviors to Predict Dropouts from MOOCs 被引量:4
16
作者 Yimin Wen Ye Tian +3 位作者 Boxi Wen Qing Zhou Guoyong Cai Shaozhong Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第3期336-347,共12页
Recently, Massive Open Online Courses(MOOCs) have become a major online learning methodology for millions of people worldwide. However, the dropout rates from several current MOOCs are high. Usually, dropout predictio... Recently, Massive Open Online Courses(MOOCs) have become a major online learning methodology for millions of people worldwide. However, the dropout rates from several current MOOCs are high. Usually, dropout prediction aims to predict whether a learner will exhibit learning behaviors during several consecutive days in the future. Therefore, the information related to the learning behaviors of a learner in several consecutive days should be considered. After in-depth analysis of the learning behavior patterns of the MOOC learners, this study reports that learners often exhibit similar learning behaviors on several consecutive days, i.e., the learning status of a learner for the subsequent day is likely to be similar to that for the previous day. Based on this characteristic of MOOC learning,this study proposes a new simple feature matrix for keeping information related to the local correlation of learning behaviors and a new Convolutional Neural Network(CNN) model for predicting the dropout. Extensive experimental validations illustrate that the local correlation of learning behaviors should not be neglected. The proposed CNN model considers this characteristic and improves the dropout prediction accuracy. Furthermore, the proposed model can be used to predict dropout temporally and early when sufficient data are collected. 展开更多
关键词 Massive Open Online Courses(MOOCs) dropout prediction local correlation of learning behaviors Convolutional Neural Network(CNN) educational data mining
原文传递
Study on the Intelligent Control Model of a Greenhouse Flower Growing Environment
17
作者 Jinyang Zhen Rui Xu +2 位作者 Jian Li Shiming Shen Jianhui Wen 《国际计算机前沿大会会议论文集》 2022年第2期127-145,共19页
Intelligent control of the greenhouse planting environment plays an important role in improving planting efficiency and guaranteeing the quality of precious flowers.Among them,how to adapt the air humidity,temperature... Intelligent control of the greenhouse planting environment plays an important role in improving planting efficiency and guaranteeing the quality of precious flowers.Among them,how to adapt the air humidity,temperature and light intensity in greenhouses to the different needs of the flower growth cycle is the key problem of intelligent control.Therefore,an intelligent flower planting environment monitoring and control system model(named)based on the Internet of Things and fuzzy-GRU network adaptive learning is proposed.The above three parameters in the greenhouse were used as model input parameters.The optimal growth humidity,temperature and illumination intensity of flowers are determined by the model,and the output temperature,humidity and illumination intensity act on the executing organ of the greenhouse room by the single-chip microcomputer.The model was evaluated using field greenhouse crops.The results show that the performance of this model is better than that of the PID model and fuzzy control model in simulation experiments and actual scene control.Compared with the flowers in the natural state,the plants of the flowers under systematic control were approximately 6 cm higher than those in the natural state on average,the blooming time of the flowers was approximately two days longer than that in the natural state,and the quality of the flowers was stable. 展开更多
关键词 Internet of Things Intelligent agriculture AI Greenhouse cultivation Real-time control
原文传递
K-Means Clustering with Local Distance Privacy
18
作者 Mengmeng Yang Longxia Huang Chenghua Tang 《Big Data Mining and Analytics》 EI CSCD 2023年第4期433-442,共10页
With the development of information technology,a mass of data are generated every day.Collecting and analysing these data help service providers improve their services and gain an advantage in the fierce market compet... With the development of information technology,a mass of data are generated every day.Collecting and analysing these data help service providers improve their services and gain an advantage in the fierce market competition.K-means clustering has been widely used for cluster analysis in real life.However,these analyses are based on users’data,which disclose users’privacy.Local differential privacy has attracted lots of attention recently due to its strong privacy guarantee and has been applied for clustering analysis.However,existing K-means clustering methods with local differential privacy protection cannot get an ideal clustering result due to the large amount of noise introduced to the whole dataset to ensure the privacy guarantee.To solve this problem,we propose a novel method that provides local distance privacy for users who participate in the clustering analysis.Instead of making the users’records in-distinguish from each other in high-dimensional space,we map the user’s record into a one-dimensional distance space and make the records in such a distance space not be distinguished from each other.To be specific,we generate a noisy distance first and then synthesize the high-dimensional data record.We propose a Bounded Laplace Method(BLM)and a Cluster Indistinguishable Method(CIM)to sample such a noisy distance,which satisfies the local differential privacy guarantee and local dE-privacy guarantee,respectively.Furthermore,we introduce a way to generate synthetic data records in high-dimensional space.Our experimental evaluation results show that our methods outperform the traditional methods significantly. 展开更多
关键词 K-means clustering local differential privacy data analysis
原文传递
Super-resolution compressive spectral imaging via two-tone adaptive coding 被引量:5
19
作者 CHANG XU TINGFA XU +5 位作者 GE YAN XU MA YUHAN ZHANG XI WANG FENG ZHAO GONZALO R.ARCE 《Photonics Research》 SCIE EI CSCD 2020年第3期395-411,共17页
Coded apertures with random patterns are extensively used in compressive spectral imagers to sample the incident scene in the image plane.Random samplings,however,are inadequate to capture the structural characteristi... Coded apertures with random patterns are extensively used in compressive spectral imagers to sample the incident scene in the image plane.Random samplings,however,are inadequate to capture the structural characteristics of the underlying signal due to the sparsity and structure nature of sensing matrices in spectral imagers.This paper proposes a new approach for super-resolution compressive spectral imaging via adaptive coding.In this method,coded apertures are optimally designed based on a two-tone adaptive compressive sensing(CS)framework to improve the reconstruction resolution and accuracy of the hyperspectral imager.A liquid crystal tunable filter(LCTF)is used to scan the incident scene in the spectral domain to successively select different spectral channels.The output of the LCTF is modulated by the adaptive coded aperture patterns and then projected onto a lowresolution detector array.The coded aperture patterns are implemented by a digital micromirror device(DMD)with higher resolution than that of the detector.Due to the strong correlation across the spectra,the recovered images from previous spectral channels can be used as a priori information to design the adaptive coded apertures for sensing subsequent spectral channels.In particular,the coded apertures are constructed from the a priori spectral images via a two-tone hard thresholding operation that respectively extracts the structural characteristics of bright and dark regions in the underlying scenes.Super-resolution image reconstruction within a spectral channel can be recovered from a few snapshots of low-resolution measurements.Since no additional side information of the spectral scene is needed,the proposed method does not increase the system complexity.Based on the mutual-coherence criterion,the proposed adaptive CS framework is proved theoretically to promote the sensing efficiency of the spectral images.Simulations and experiments are provided to demonstrate and assess the proposed adaptive coding method.Finally,the underlying concepts are extended to a multi-channel method to compress the hyperspectral data cube in the spatial and spectral domains simultaneously. 展开更多
关键词 RESOLUTION SPECTRAL IMAGE
原文传递
Laplacian sparse dictionary learning for image classification based on sparse representation 被引量:1
20
作者 Fang LI Jia SHENG San-yuan ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第11期1795-1805,共11页
Sparse representation is a mathematical model for data representation that has proved to be a powerful tool for solving problems in various fields such as pattern recognition, machine learning, and computer vision. As... Sparse representation is a mathematical model for data representation that has proved to be a powerful tool for solving problems in various fields such as pattern recognition, machine learning, and computer vision. As one of the building blocks of the sparse representation method, dictionary learning plays an important role in the minimization of the reconstruction error between the original signal and its sparse representation in the space of the learned dictionary. Although using training samples directly as dictionary bases can achieve good performance, the main drawback of this method is that it may result in a very large and inef- ficient dictionary due to noisy training instances. To obtain a smaller and more representative dictionary, in this paper, we propose an approach called Laplacian sparse dictionary (LSD) learning. Our method is based on manifold learning and double sparsity. We incorporate the Laplacian weighted graph in the sparse representation model and impose the 11-norm sparsity on the dictionary. An LSD is a sparse overcomplete dictionary that can preserve the intrinsic structure of the data and learn a smaller dictionary for each class. The learned LSD can be easily integrated into a classification framework based on sparse representation. We compare the proposed method with other methods using three benchmark-controlled face image databases, Extended Yale B, ORL, and AR, and one uncontrolled person image dataset, i-LIDS-MA. Results show the advantages of the proposed LSD algorithm over state-of-the-art sparse representation based classification methods. 展开更多
关键词 Sparse representation Laplacian regularizer Dictionary learning Double sparsity MANIFOLD
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部