Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i...Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.展开更多
An adaptive narrowband two-phase Chan-Vese (ANBCV) model is proposed for improving the shadow regions detection performance of sonar images. In the first noise smoothing step, the anisotropic second-order neighborho...An adaptive narrowband two-phase Chan-Vese (ANBCV) model is proposed for improving the shadow regions detection performance of sonar images. In the first noise smoothing step, the anisotropic second-order neighborhood MRF (Markov Random Field, MRF) is used to describe the image texture feature parameters. Then, initial two-class segmentation is processed with the block mode k-means clustering algorithm, to estimate the approximate position of the shadow regions. On this basis, the zero level set function is adaptively initialized by the approximate position of shadow regions. ANBCV model is provided to complete local optimization for eliminating the image global interference and obtaining more accurate results. Experimental results show that the new algorithm can efficiently remove partial noise, increase detection speed and accuracy, and with less human intervention.展开更多
This paper provides a formalized definition of the application problem of compound condition query (CCQ) and a formal method of applying requirements elicitation based on trace information space derived from trace a...This paper provides a formalized definition of the application problem of compound condition query (CCQ) and a formal method of applying requirements elicitation based on trace information space derived from trace algebra. With the formalized process of solving the application problem of CCQ, formal requirements specification of application of CCQ is given, a formalized and automatic mapping of the results of requirements elicitation to the formal requirements specification is performed, the software system model and the application code are developed. Through a sample application of comprehensive query on housing information, the feasibility of formalized and automatic software development for the application problem of CCQ is proved. The result has important implications for the other problems regarding formalization and automatic software development.展开更多
基金Supported by the National Natural Science Foundation of China(61472097)Specialized Research Fund for the Doctoral Program of Higher Education of China(20132304110017)Natural Science Foundation of Heilongjiang Province of China(F2015022)
文摘Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks.
基金supported by the National Natural Science Foundation of China(41306086)Technology Innovation Talent Special Foundation of Harbin(2014RFQXJ105)the Fundamental Research Funds for the Central Universities(HEUCF100606)
文摘An adaptive narrowband two-phase Chan-Vese (ANBCV) model is proposed for improving the shadow regions detection performance of sonar images. In the first noise smoothing step, the anisotropic second-order neighborhood MRF (Markov Random Field, MRF) is used to describe the image texture feature parameters. Then, initial two-class segmentation is processed with the block mode k-means clustering algorithm, to estimate the approximate position of the shadow regions. On this basis, the zero level set function is adaptively initialized by the approximate position of shadow regions. ANBCV model is provided to complete local optimization for eliminating the image global interference and obtaining more accurate results. Experimental results show that the new algorithm can efficiently remove partial noise, increase detection speed and accuracy, and with less human intervention.
基金supported by the Open Fund for National Engineering Laboratory for E-Government Modeling and Emulation
文摘This paper provides a formalized definition of the application problem of compound condition query (CCQ) and a formal method of applying requirements elicitation based on trace information space derived from trace algebra. With the formalized process of solving the application problem of CCQ, formal requirements specification of application of CCQ is given, a formalized and automatic mapping of the results of requirements elicitation to the formal requirements specification is performed, the software system model and the application code are developed. Through a sample application of comprehensive query on housing information, the feasibility of formalized and automatic software development for the application problem of CCQ is proved. The result has important implications for the other problems regarding formalization and automatic software development.