Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Random Forests Algorithm Based Duplicate Detection in On-Site Programming Big Data Environment

    Qianqian Li1, Meng Li2, Lei Guo3,*, Zhen Zhang4

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 199-205, 2020, DOI:10.32604/jihpp.2020.016299

    Abstract On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time, complexity and high-difficulty for processing. Therefore, data cleaning is essential for on-site programming big data. Duplicate data detection is an important step in data cleaning, which can save storage resources and enhance data consistency. Due to the insufficiency in traditional Sorted Neighborhood Method (SNM) and the difficulty of high-dimensional data detection, an optimized algorithm based on random forests with the dynamic and adaptive window size is proposed. The efficiency of the algorithm can be elevated by improving the method… More >

  • Open Access

    ARTICLE

    A Location Prediction Method Based on GA-LSTM Networks and Associated Movement Behavior Information

    Xingxing Cao1, Liming Jiang1,*, Xiaoliang Wang1, Frank Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 187-197, 2020, DOI:10.32604/jihpp.2020.016243

    Abstract Due to the lack of consideration of movement behavior information other than time and location perception in current location prediction methods, the movement characteristics of trajectory data cannot be well expressed, which in turn affects the accuracy of the prediction results. First, a new trajectory data expression method by associating the movement behavior information is given. The pre-association method is used to model the movement behavior information according to the individual movement behavior features and the group movement behavior features extracted from the trajectory sequence and the region. The movement behavior features based on pre-association may not always be the… More >

  • Open Access

    REVIEW

    A Survey on Recent Advances in Privacy Preserving Deep Learning

    Siran Yin1,2, Leiming Yan1,2,*, Yuanmin Shi1,2, Yaoyang Hou1,2, Yunhong Zhang1,2

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 175-185, 2020, DOI:10.32604/jihpp.2020.010780

    Abstract Deep learning based on neural networks has made new progress in a wide variety of domain, however, it is lack of protection for sensitive information. The large amount of data used for training is easy to cause leakage of private information, thus the attacker can easily restore input through the representation of latent natural language. The privacy preserving deep learning aims to solve the above problems. In this paper, first, we introduce how to reduce training samples in order to reduce the amount of sensitive information, and then describe how to unbiasedly represent the data with respect to specific attributes,… More >

  • Open Access

    REVIEW

    A Survey on Machine Learning in Chemical Spectral Analysis

    Dongfang Yu, Jinwei Wang*

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 165-174, 2020, DOI:10.32604/jihpp.2020.010466

    Abstract Chemical spectral analysis is contemporarily undergoing a revolution and drawing much attention of scientists owing to machine learning algorithms, in particular convolutional networks. Hence, this paper outlines the major machine learning and especially deep learning methods contributed to interpret chemical images, and overviews the current application, development and breakthrough in different spectral characterization. Brief categorization of reviewed literatures is provided for studies per application apparatus: X-Ray spectra, UV-Vis-IR spectra, Micro-scope, Raman spectra, Photoluminescence spectrum. End with the overview of existing circumstances in this research area, we provide unique insight and promising directions for the chemical imaging field to fully couple… More >

  • Open Access

    ARTICLE

    Image Denoising with GAN Based Model

    Peizhu Gong, Jin Liu*, Shiqi Lv

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 155-163, 2020, DOI:10.32604/jihpp.2020.010453

    Abstract Image denoising is often used as a preprocessing step in computer vision tasks, which can help improve the accuracy of image processing models. Due to the imperfection of imaging systems, transmission media and recording equipment, digital images are often contaminated with various noises during their formation, which troubles the visual effects and even hinders people’s normal recognition. The pollution of noise directly affects the processing of image edge detection, feature extraction, pattern recognition, etc., making it difficult for people to break through the bottleneck by modifying the model. Many traditional filtering methods have shown poor performance since they do not… More >

  • Open Access

    ARTICLE

    Research on the Optimization Design of Intersections for Safe Operation of Large Trucks

    Yujie Bao, Pincheng Wang*, Yuhang Li

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 143-154, 2020, DOI:10.32604/jihpp.2020.09759

    Abstract When big trucks are running at urban road intersections, they are easy to interfere with other motor vehicles, and the turning big trucks are easy to have conflicts with non-motor vehicles and pedestrians, which will affect the safety of intersections. This paper first studied the intersection of trucks to the running trajectory, on this basis, through the establishment of mathematical model analysis of large truck steering conditions inside the wheel, and the influence of blind area to the driver. In the research of intersection safety design, the safety design is divided into three parts: Entrance road, internal operation and signal… More >

  • Open Access

    ARTICLE

    A Clustering Method Based on Brain Storm Optimization Algorithm

    Tianyu Wang, Yu Xue, Yan Zhao, Yuxiang Wang*, Yan Zhang, Yuxiang He

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 135-142, 2020, DOI:10.32604/jihpp.2020.010362

    Abstract In the field of data mining and machine learning, clustering is a typical issue which has been widely studied by many researchers, and lots of effective algorithms have been proposed, including K-means, fuzzy c-means (FCM) and DBSCAN. However, the traditional clustering methods are easily trapped into local optimum. Thus, many evolutionary-based clustering methods have been investigated. Considering the effectiveness of brain storm optimization (BSO) in increasing the diversity while the diversity optimization is performed, in this paper, we propose a new clustering model based on BSO to use the global ability of BSO. In our experiment, we apply the novel… More >

  • Open Access

    ARTICLE

    Improving POI Recommendation via Non-Convex Regularized Tensor Completion

    Ming Zhao*, Tao Liu

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 125-134, 2020, DOI:10.32604/jihpp.2020.010211

    Abstract The problem of low accuracy of POI (Points of Interest) recommendation in LBSN (Location-Based Social Networks) has not been effectively solved. In this paper, a POI recommendation algorithm based on nonconvex regularized tensor completion is proposed. The fourth-order tensor is constructed by using the current location category, the next location category, time and season, the regularizer is added to the objective function of tensor completion to prevent over-fitting and reduce the error of the model. The proximal algorithm is used to solve the objective function, and the adaptive momentum is introduced to improve the efficiency of the solution. The experimental… More >

  • Open Access

    ARTICLE

    An Efficient Energy Routing Protocol Based on Gradient Descent Method in WSNs

    Ru Jin*, Xinlian Zhou, Yue Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 115-123, 2020, DOI:10.32604/jihpp.2020.010180

    Abstract In a wireless sensor network [1], the operation of a node depends on the battery power it carries. Because of the environmental reasons, the node cannot replace the battery. In order to improve the life cycle of the network, energy becomes one of the key problems in the design of the wireless sensor network (WSN) routing protocol [2]. This paper proposes a routing protocol ERGD based on the method of gradient descent that can minimizes the consumption of energy. Within the communication radius of the current node, the distance between the current node and the next hop node is assumed… More >

  • Open Access

    ARTICLE

    Design of a Mutual Authentication and Key Agreement Protocol for WBANs

    Xiangwei Meng, Jianbo Xu*, Xiaohe Wu, Zhechong Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 107-114, 2020, DOI:10.32604/jihpp.2020.09901

    Abstract Please WBANs are a sensor network for detection and collection of sensitive data to the human body, which is lightweight and mobile. WBANs transmit sensitive and significant messages through the public channel, which makes it easy for an attacker to eavesdrop and modify the messages, thus posing a severe threat to the security of the messages. Therefore, it is essential to put in place authentication and key agreement between different communication nodes in WBANs. In this paper, a lightweight and secure authenticated key agreement protocol in wireless body area networks is designed. It is capable to reduce the cost of… More >

Displaying 31-40 on page 4 of 65. Per Page