期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于改进差别矩阵的增量式属性约简算法 被引量:4
1
作者 冯少荣 张东站 《深圳大学学报(理工版)》 EI CAS 北大核心 2012年第5期405-411,共7页
研究目前粗糙集中求属性核和属性约简存在的效率低下问题,提出基于改进差别矩阵的核增量式更新算法,用于解决对象动态增加情况下核的更新问题.为降低现有增量式属性约简算法的时间和空间复杂度,提出一种不存储差别矩阵的高效属性约简算... 研究目前粗糙集中求属性核和属性约简存在的效率低下问题,提出基于改进差别矩阵的核增量式更新算法,用于解决对象动态增加情况下核的更新问题.为降低现有增量式属性约简算法的时间和空间复杂度,提出一种不存储差别矩阵的高效属性约简算法,用于处理对象动态增加情况下属性约简的更新问题.理论及实验结果表明,该算法可明显降低时间和空间的复杂度. 展开更多
关键词 粗糙集理论 属性约简 差别矩阵 属性核 决策表 动态更新 增量式算法 知识约简 时间复杂性 空间复杂性
下载PDF
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
2
作者 Xingxin LI Youwen ZHU +2 位作者 Rui XU Jian WANG Yushu ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期187-198,共12页
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s... Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,such as privacy-preservingmachine elearning gand secure biometric identification.Several solutions have been put forward to solve this challenging problem.However,the existing schemes still suffer from various limitations in terms of efficiency and flexibility.In this paper,we propose a new encrypt-then-index strategy for the secure k-NN query,which can simultaneously achieve sub-linear search complexity(efficiency)and support dynamical update over the encrypted database(flexibility).Specifically,we propose a novel algorithm to transform the encrypted database and encrypted query points in the cloud.By indexing the transformed database using spatial data structures such as the R-tree index,our strategy enables sub-linear complexity for secure k-NN queries and allows users to dynamically update the encrypted database.To the best of our knowledge,the proposed strategy is the first to simultaneously provide these two properties.Through theoretical analysis and extensive experiments,we formally prove the security and demonstrate the efficiency of our scheme. 展开更多
关键词 cloud computing secure k-NN query sub-linear complexity dynamicupdate
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部