Author of the publication

基于半监督聚类的文档敏感信息推导方法 (Sensitive Information Inference Method Based on Semi-supervised Document Clustering).

, , , , and . 计算机科学, 42 (10): 132-137 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trust Holding Based Secure Seamless Handover in Space Information Network., , , and . SINC, volume 688 of Communications in Computer and Information Science, page 137-150. (2016)基于半监督聚类的文档敏感信息推导方法 (Sensitive Information Inference Method Based on Semi-supervised Document Clustering)., , , , and . 计算机科学, 42 (10): 132-137 (2015)FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy., , , , , , , and . SP, page 2114-2129. IEEE, (2022)A DTN Routing Protocol Based on Hierarchy Forwarding and Cluster Control., , , and . CIS (2), page 397-401. IEEE Computer Society, (2009)978-0-7695-3931-7.PRADroid: Privacy Risk Assessment for Android Applications., , and . CSP, page 90-95. IEEE, (2021)Business-Oriented Dynamic Reconfiguration Model of Cloud Computing Network., , , and . ICPCSEE (2), volume 1059 of Communications in Computer and Information Science, page 225-245. Springer, (2019)可验证授权计算研究综述 (Survey on Verifiable Delegation of Computation)., , , and . 计算机科学, 42 (11): 1-7 (2015)HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony., , , , and . IJDSN, (2020)Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing., , , and . IEEE Access, (2018)Cross-chain data traceability mechanism for cross-domain access., , , and . J. Supercomput., 79 (5): 4944-4961 (March 2023)