During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among t...
详细信息
ISBN:
(纸本)9781849196536
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among them, frequent itemset mining is one of main research branches of stream data mining with a fundamental and significant position. In order to further advance and develop the research of frequent itemset mining, this paper summarizes its main challenges and corresponding algorithm features. Based on them, current related results are divided into two categories: data-based algorithms and task-based algorithms. According to its taxonomy, the related methods belonging to the different categories and sub-categories are comprehensively introduced for better understanding. Finally, a brief conclusion is given.
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor net...
详细信息
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor network, and providing privacy without disrupting in-network data aggregation is a challenging problem. Although there have been extensive studies on privacy-preserving data aggregation for additive and multiplicative aggregation functions, nonlinear aggregation functions, such as maximum and minimum, have not been well addressed. In this paper, we present a privacy-preserving aggregation method specialized for MAX/MIN aggregation functions. To preserve privacy, encryption and the prefix membership verification scheme are employed, allowing an intermediate aggregator to correctly compare data without access to plaintext data, thus protect data privacy. Extensive simulations are conducted to evaluate the proposed schemes. The results show that our scheme provides privacy protection for both raw and aggregated data items, while achieving high efficiency in terms of energy consumption and time delay.
As cloud computing goes increasingly mature, searchable encryption schemes have been widely applied to the real world. Those not only provide high efficiency but also protect users' privacy well. However, the exis...
详细信息
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid...
详细信息
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid multi-watermarking rule is proposed, and is used to embed the watermark into DWT domain. Secondly, corresponding to the hybrid embedding rule, the novel optimum hybrid additive multi-watermarking decoder is proposed, which is based on the minimum Bayesian risk criterion, and simultaneously the performance of the hybrid decoder is theoretically analyzed. The DWT coefficients are modeled as the generalized Gaussian distribution. Finally, the theoretical and empirical experimental results prove the theoretical analysis validity.
Underwater sensor networks (UWSNs) are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. Because of the different environment under the ocean, the whole...
详细信息
A novel efficient verifiably encrypted signature (VES) which makes use of the Weil pairing is presented in this paper. VES can be used in optimistic contract signing protocols to enable fair exchange. Compared with th...
详细信息
Currently Supervisory Control And Data Acquisition (SCADA) system intends to be connected to the open operating environment. Thus, protecting SCADA systems from malicious attacks is getting more and more attention. A ...
详细信息
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum *** masking is the encoding of quantum information by composite quantum states in such a way ...
详细信息
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum *** masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite *** concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking *** question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction *** have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic *** masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.
Genetic Algorithm(GA)has been widely used to solve various optimization *** the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the c...
详细信息
Genetic Algorithm(GA)has been widely used to solve various optimization *** the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the cloud ***,the algorithm user would never want his data to be disclosed to cloud ***,it is necessary for the user to encrypt the data before transmitting them to the *** the user will encounter a new *** arithmetic operations we are familiar with cannot work directly in the ciphertext *** this paper,a privacy-preserving outsourced genetic algorithm is *** user’s data are protected by homomorphic encryption algorithm which can support the operations in the encrypted *** is elaborately adapted to search the optimal result over the encrypted *** security analysis and experiment results demonstrate the effectiveness of the proposed scheme.
As the network communications technology developing, a new type of networks has appeared in the daily life which is named underwater sensor networks (UWSNs). Routing protocols in UWSNs should ensure the reliability of...
详细信息
暂无评论