版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Sichuan Univ Coll Comp Sci Chengdu 610065 Peoples R China Chengdu Univ Coll Informat Sci & Engn Chengdu 610106 Peoples R China Chengdu Univ Informat Technol Sch Control Engn Chengdu 610225 Peoples R China Chengdu Univ Key Lab Pattern Recognit & Intelligent Informat P Inst Higher Educ Sichuan Prov Chengdu 610106 Peoples R China
出 版 物:《INTERNATIONAL JOURNAL OF MODERN PHYSICS C》 (国际现代物理学杂志,C: 计算物理学和物理计算)
年 卷 期:2020年第31卷第8期
核心收录:
学科分类:07[理学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 0702[理学-物理学]
基 金:State Key Program of National Natural Science Foundation of China National Natural Science Foundation of China [61772352, 61472050] Science and Technology Planning Project of Sichuan Province [2015GZ0103] Chengdu Science and Technology Huimin Technology Research and Development Project [2014-HM01-00326-SF] Open Research Subject of Key Laboratory of Pattern Recognition and Intelligent Information Processing, Institutions of Higher Education of Sichuan Province [MSSB-2020-07]
主 题:Personal information observer deployment location information source Naive Bayes
摘 要:The accurate positioning of the propagation and diffusion source points of personal information is of great practical significance for the protection of personal information security. Currently, a popular method is to locate the data diffusion source point by deploying a certain number of observers and collecting the data propagation information from observers. In view of the deployment of observers, it was found that there is an important correlation between the observer deployment location and the data propagation time delay by analyzing the relationship between the positioning accuracy of information sources and the deployment location of observers, and then an optimal deployment strategy based on Naive Bayes model (NBM) was proposed. At last, it was verified that the proposed deployment strategy can significantly improve the positioning accuracy of information source by comparing the model network with the actual network, which is of great significance for the security control of personal information propagation.