Movatterモバイル変換


[0]ホーム

URL:


CN112446038B - Access strategy intelligent generation method based on matrix decomposition - Google Patents

Access strategy intelligent generation method based on matrix decomposition
Download PDF

Info

Publication number
CN112446038B
CN112446038BCN202011238974.5ACN202011238974ACN112446038BCN 112446038 BCN112446038 BCN 112446038BCN 202011238974 ACN202011238974 ACN 202011238974ACN 112446038 BCN112446038 BCN 112446038B
Authority
CN
China
Prior art keywords
matrix
strategy
access
attribute
training
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011238974.5A
Other languages
Chinese (zh)
Other versions
CN112446038A (en
Inventor
王晶
黄位甲
王凌福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic TechnologyfiledCriticalGuilin University of Electronic Technology
Priority to CN202011238974.5ApriorityCriticalpatent/CN112446038B/en
Publication of CN112446038ApublicationCriticalpatent/CN112446038A/en
Application grantedgrantedCritical
Publication of CN112446038BpublicationCriticalpatent/CN112446038B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention discloses an access strategy intelligentized generation method based on matrix decomposition, which constructs a user-file access matrix through an authorized data set; randomly permuting rows and columns of the access matrix; randomly generating an attribute matrix and a strategy matrix and setting various parameters; training an attribute matrix and a strategy matrix by using a small-batch gradient descent method, calculating the absolute value of the difference between the objective functions after training before and after training, and judging whether to stop training by using a threshold method; calculating a prediction matrix according to the attribute matrix and the strategy matrix; calculating a safety threshold for each file vector of the prediction matrix; and finally, formulating a corresponding access strategy according to the strategy matrix and the security threshold value, and constructing an intelligent access strategy generation method through learning the existing authorized data set, thereby greatly reducing the labor cost required for formulating the access strategy and being beneficial to popularization and application of the ABE ciphertext access control mechanism in a large-scale network scene.

Description

Access strategy intelligent generation method based on matrix decomposition
Technical Field
The invention relates to the technical field of attribute encryption, in particular to an access strategy intelligent generation method based on matrix decomposition.
Background
An attribute-based encryption (ABE) mechanism is to associate a ciphertext and a user private key with an attribute as a public key. Ciphertext-policy ABE (CP-ABE) is a type of scheme commonly used in ABE. In the CP-ABE, the access authority can be flexibly represented by an access strategy, and fine-granularity access control can be realized. So the CP-ABE has wide application prospect in the field of fine granularity access control.
Existing ABE-based fine-grained access control mechanisms require the data owner to manually formulate a corresponding access policy for each data unit. However, in a mass data storage system such as cloud storage, making an access policy for each data unit can take a great amount of labor overhead, which is not beneficial to popularization and application of the ABE ciphertext access control mechanism in a large-scale network scene.
Disclosure of Invention
The invention aims to provide an access strategy intelligent generation method based on matrix decomposition, which is beneficial to popularization and application of an ABE ciphertext access control mechanism in a large-scale network scene.
In order to achieve the above purpose, the present invention provides an access policy intelligentized generation method based on matrix decomposition, comprising the following steps:
acquiring authorization data to construct a user file access matrix, and randomly replacing rows and columns in the access matrix;
decomposing the access matrix based on the decomposition dimension, and training the attribute matrix and the strategy matrix by utilizing a small batch gradient descent method;
judging the difference value of the objective function of the attribute matrix and the strategy matrix after training by using a threshold method;
and calculating a prediction matrix according to the trained attribute matrix and the trained strategy matrix, and obtaining a corresponding access strategy according to the obtained safety threshold.
The method for acquiring the authorization data to construct the user file access matrix and randomly replacing the rows and the columns in the access matrix comprises the following steps:
and constructing a user file access matrix according to the acquired authorization data, setting a corresponding matrix value, randomly replacing pi for columns in the access matrix, and randomly replacing pi for rows in the replaced matrix.
The method comprises the steps of decomposing the access matrix based on a decomposition dimension, training an attribute matrix and a strategy matrix by utilizing a small-batch gradient descent method, and comprises the following steps:
based on the decomposition dimension, randomly decomposing the access matrix after the rank replacement into an attribute matrix and a strategy matrix, constructing an objective function at the same time, and setting a missing value weight, a regular term coefficient, a learning rate, a gradient descent threshold value and a batch size.
The method comprises the steps of decomposing the access matrix based on a decomposition dimension, training the attribute matrix and the strategy matrix by utilizing a small-batch gradient descent method, and further comprises the following steps:
training the attribute matrix by using a small-batch gradient descent method, calculating the attribute matrix threshold value, and binarizing the attribute matrix according to the attribute threshold value.
The method for judging the objective function difference value of the attribute matrix and the strategy matrix after training by using a threshold method comprises the following steps:
and calculating the absolute value of the difference between the trained attribute matrix and the objective function of the strategy matrix, and if the absolute value is larger than a set threshold value, continuing to train the attribute matrix and the strategy matrix.
The method comprises the steps of calculating a prediction matrix according to the trained attribute matrix and the trained strategy matrix, and obtaining a corresponding access strategy according to an obtained safety threshold, wherein the method comprises the following steps:
and calculating a corresponding prediction matrix according to the trained attribute matrix and the trained strategy matrix, and after any column element of the prediction matrix is arranged in a descending order, calculating all potential thresholds of the corresponding column.
The method comprises the steps of calculating a prediction matrix according to the trained attribute matrix and the trained strategy matrix, obtaining a corresponding access strategy according to the obtained safety threshold, and further comprising:
and (3) binarizing the elements in the corresponding columns by utilizing the potential threshold value, and then calculating a corresponding mean square error value and a safety threshold value until all columns of the prediction matrix are calculated.
The invention relates to an access strategy intelligentized generation method based on matrix decomposition, which constructs a user-file access matrix through the existing authorized data set; randomly permuting rows and columns of the access matrix; randomly generating an attribute matrix and a strategy matrix; setting an objective function, a missing value weight, a regular term coefficient, a learning rate, a gradient descent threshold value and a batch size; training an attribute matrix by using a small-batch gradient descent method, calculating an attribute matrix threshold value and binarizing the attribute matrix, training a strategy matrix by using the small-batch gradient descent method, calculating the absolute value of the difference between the objective functions after training before and after twice, and if the absolute value is larger than a given threshold value, continuing training the attribute matrix, calculating the attribute matrix threshold value and training the strategy matrix, otherwise stopping training; calculating a prediction matrix according to the attribute matrix and the strategy matrix; calculating a threshold value for each file vector of the prediction matrix, wherein the threshold value is a safety threshold value; and finally, formulating a corresponding access strategy according to the strategy matrix and the safety threshold. According to the invention, through learning the existing authorized data set, an intelligent access strategy generation method is constructed, so that the labor cost required for formulating the access strategy is greatly reduced, and the popularization and application of the ABE ciphertext access control mechanism in a large-scale network scene are facilitated.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic step diagram of an access policy intelligentized generation method based on matrix decomposition.
Fig. 2 is a flow chart of an intelligent generation method of an access strategy based on matrix decomposition.
FIG. 3 is an exemplary diagram of a user-file matrix provided by the present invention.
FIG. 4 is a schematic diagram of the user-file access matrix broken down into an attribute matrix and a policy matrix provided by the present invention.
FIG. 5 is a flow chart of training an attribute matrix provided by the present invention.
FIG. 6 is a flow chart for calculating attribute matrix thresholds provided by the present invention.
Fig. 7 is a flow chart of a training strategy matrix provided by the present invention.
Fig. 8 is a flow chart of calculating a security threshold provided by the present invention.
FIG. 9 is an exemplary diagram of an access tree generated according to policy vectors and security thresholds provided by the present invention.
FIG. 10 is a line graph of recall as a function of learning rate provided by the present invention.
FIG. 11 is a line graph of recall provided by the present invention as a function of resolution dimensions.
Fig. 12 is a line graph of recall as a function of batch size provided by the present invention.
FIG. 13 is a line graph of recall provided by the present invention as a function of regularization term coefficients.
FIG. 14 is a line graph of training time as a function of decomposition dimension provided by the present invention.
Fig. 15 is a plot of mean square error as a function of training sample duty cycle provided by the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present invention and should not be construed as limiting the invention.
In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1 and 2, the invention provides an access policy intelligentized generation method based on matrix decomposition, which comprises the following steps:
s101, acquiring authorization data to construct a user file access matrix, and randomly replacing rows and columns in the access matrix.
Specifically, as shown in fig. 3, a user-file access matrix r= (R) is constructed from the authorization data setui )m×n The rows of matrix R represent users and the columns represent files. Then setting corresponding matrix values: if the user successfully accesses a certain file, the corresponding position of the matrix is 1; the user cannot access and is set to 0; the record is set to NULL if no access is made.
The random permutation accesses the rows and columns of matrix R.
1.1 random permutations of 1, …, n pi (1, 2, n) = (x1 ,x2 ,...,xn )。
1.2 let R' = (Rx1 ,Rx2 ,...,Rxn ) Wherein R isxi (1.ltoreq.i.ltoreq.n) is the x < th > of the matrix Ri Columns.
1.3 random permutations of 1, …, m pi (1, 2,..m) = (y1 ,y2 ...,ym )。
1.4 ream
Wherein R 'is'yi (1. Ltoreq.i.ltoreq.m) the y-th of the matrix Ri And (3) row.
1.5 let r=r%
S102, decomposing the access matrix based on the decomposition dimension, and training the attribute matrix and the strategy matrix by using a small-batch gradient descent method.
Specifically, as shown in fig. 4, the dimension f required for matrix decomposition is determined, and the attribute matrix p= (P) is randomly generateduj )m×f (0≤puj Less than or equal to 1) and a policy matrix q= (Q)ji )f×n (0≤qji And is less than or equal to 1). The rows of the attribute matrix P represent users, and the columns represent attributes; the rows of the policy matrix Q represent attributes and the columns represent files.
Setting an objective function:
wherein w isui R isui Lambda is the regularized term coefficient, rui To access the ith column element of the ith row, p, of matrix Ruj Is the jth column element, q of the ith row of the attribute matrix Pji For the j-th row and i-th column element of the policy matrix Q, f represents the decomposition dimension.
Setting a regularization term coefficient lambda, a learning rate gamma, a gradient descent threshold value theta, a batch size b and a missing value weight wui If rui =1 or rui Let w=0ui Otherwise, a smaller weight value is set.
Grouping the rows and columns of the access matrix:
setl ={i|i=l′modn,(l-1)b+1≤l′≤lb}
set′l ={i|i=l′modm,(l-1)b+1≤l′≤lb}
wherein set isl For grouping rows, set'l For column grouping, l is the iteration number, b is the batch size, and m and n are the number of rows and columns of the access matrix, respectively.
Let l=1.
As shown in fig. 5, an attribute matrix, a policy matrix, an access matrix, and a weight w are inputui Learning rate, regularization term coefficients, and line grouping, and initializing k=1, u=1.
Training an attribute matrix P:
wherein, gamma is learning rate, wui R isui Lambda is the regularized term coefficient, rui To access the ith column element of the ith row, p, of matrix Ruk Is the kth column element of the ith row, q of the attribute matrix Pki For the kth row and ith column element of the policy matrix Q, f represents the decomposition dimension.
If k is smaller than f, let k=k+1 and continue training attribute matrix P, otherwise go to the next step.
If u < m, u=u+1, k=k+1, and continuing training the attribute matrix P, otherwise, proceeding to the next step.
And outputting an attribute matrix P.
As shown in fig. 6, the training attribute matrix threshold v= (v)1 ,v2 ,...,vf ) Wherein v isi (1.ltoreq.i.ltoreq.f) represents the attribute threshold of the ith column of the attribute matrix P.
Let k=1.
Column k P of the attribute matrix Pk Obtaining a from the big to small arrangementk =(ak1 ,ak2 ,...,akm )。
Calculation of Pk All potential threshold vkt
According to different vkt (1. Ltoreq.t. Ltoreq.m-1) Pk Binarization to obtain
Wherein,
calculating an objective function value:
1≤t≤m-1
wherein v iskt Representing Pk T potential threshold, wui R isui Lambda is the regularized term coefficient, rui To access the ith column element of the ith row, p, of matrix Ruj Is the jth column element, q of the ith row of the attribute matrix Pji As the jth row and ith column elements of the policy matrix Q,representing Pk(t) F represents the decomposition dimension.
Selecting a threshold valueMake->
Let k=k+1 if k < f, and let k+1 column P of the attribute matrix Pk+1 Ranging from large to small; otherwise, the next step is carried out.
According to the threshold v= (v1 ,v2 ,...,vf ) Binarizing the attribute matrix P to obtain P '= (P'uj )m×f
Let p=p'
As shown in fig. 7, an attribute matrix, a policy matrix, an access matrix, and a weight w are inputui Learning rate, regularization term coefficients, and batch grouping, and initializing k=1, i=1.
Training a strategy matrix Q:
wherein, gamma is learning rate, wui R isui Lambda is the regularized term coefficient, rui To access the ith column element of the ith row, p, of matrix Ruk Is the kth column element of the ith row, q of the attribute matrix Pki For the kth row and ith column element of the policy matrix Q, f represents the decomposition dimension.
If k is less than f, let k=k+1 and continue training the strategy matrix Q, otherwise go to the next step.
If i < n, i=i+1, k=k+1, and continuing training the strategy matrix Q, otherwise, proceeding to the next step.
And outputting a matrix Q.
S103, judging the objective function difference value of the attribute matrix and the strategy matrix after training by using a threshold method.
Specifically, the objective function value L is calculated2 . If l=1, let L1 =L2 Continuing training the attribute matrix P; otherwise, the next step is carried out.
Wherein w isui R isui Lambda is the regularized term coefficient, rui To access the ith column element of the ith row, p, of matrix Ruj Is the jth column element, q of the ith row of the attribute matrix Pji For the j-th row and i-th column element of the policy matrix Q, f represents the decomposition dimension.
Calculating the absolute value of the difference between the trained attribute matrix and the objective function of the strategy matrix, and if the absolute value is larger than a set threshold value, continuing to train the attribute matrix and the strategy matrix; i.e. calculate |L1 -L2 I, if I L1 -L2 And if the I is more than theta, continuing training the attribute matrix P, otherwise stopping training.
S104, calculating a prediction matrix according to the trained attribute matrix and the trained strategy matrix, and obtaining a corresponding access strategy according to the obtained safety threshold.
Specifically, a prediction matrix is calculated according to the attribute matrix P and the strategy matrix Q
Wherein,r is the ith column element of the ith row of the prediction matrixui To access the ith column element of the ith row, p, of matrix Ruj Is the jth column element, q of the ith row of the attribute matrix Pji For the j-th row and i-th column element of the policy matrix Q, f represents the decomposition dimension.
As shown in fig. 8, a security parameter s=(s)1 ,s2 ,...,sn ) Wherein s is1 (1. Ltoreq.i.ltoreq.n) represents a prediction matrixThe threshold of column i, the security threshold of file i.
Let k=1.
Matrix is formedK < th >>Obtaining a from the big to small arrangementk =(ak1 ,ak2 ,...,akm )。
Calculation ofAll potential threshold skt
According to different skt (1.ltoreq.t.ltoreq.m-1) willBinarization to obtain
Calculating a mean square error value:
wherein s iskt Representation ofT potential threshold, wui R isui Weights of rui For accessing the ith column element of the ith row of matrix R +.>Representation->Is the u-th element of (2).
Selecting a safety thresholdMake->
If k < n, let k=k+1, then matrixK+1 column->Ranging from large to small; otherwise, the next step is carried out.
According to the policy matrix Q and the security threshold s=(s)1 ,s2 ,...,sn ) And (5) formulating an access strategy. An authorized access set is generated from the policy vector and the security threshold of the file, and further an access tree may be generated. For example, user u has an attribute vector pu The policy vector and the security threshold of the file i are q respectivelyi Sum si If pu qi >si User u may access file i, otherwise not.
The authorization attribute set and access tree of the file can be generated based on the attribute vector and security threshold of the file, as shown in fig. 9, assuming that the system has A, B, C three attributes, attribute vector p1 = (0, 1, 0) means that the attribute set of user 1 is { B }. Policy vector q according to File 11 = (0.3,0.7,0.5), safety threshold s1 =0.5, all authorized access sets for file 1 are available as { { B }, { a, C }, { a, B }, { B, C }, { a, B, C }, and further access trees can be generated.
As shown in fig. 10, the abscissa is the learning rate and the ordinate is the recall rate. When the learning rate is more than or equal to 0.007 and less than or equal to 0.009, the recall ratio of all three data sets exceeds 90%. The recall for dataset 2 reached a maximum of 96.5% at a learning rate of 0.007.
As shown in fig. 11, the abscissa is the matrix factorization dimension and the ordinate is the recall. The recall of all three data sets exceeds 90% when the decomposition dimension is 3, and the recall of data set 1 can reach a maximum of 95.8%.
As shown in FIG. 12, the abscissa is the batch size and the ordinate is the recall. When the batch size b is more than or equal to 5 and less than or equal to 25, the recall ratio of all three data sets can exceed 90 percent. The recall for dataset 1 reached a maximum of 97.3% at a batch size of 10.
As shown in fig. 13, the abscissa is the regular term coefficient, and the ordinate is the recall. When the regular term system is 0.01-0.02, the recall ratio of the three data sets is more than 90%. The data set 3 can reach a maximum of 96.8% when the regularization term coefficient is 0.01.
As shown in fig. 14, the abscissa is the decomposition dimension, and the ordinate is the training time. From the figure, training time increases as the dimension of decomposition increases.
As shown in fig. 15, the abscissa represents the proportion of training samples in the data set, and the ordinate represents the mean square error. From the figure, the mean square error decreases as the proportion of training samples in the data set increases. The mean square error of data set 1 reached a minimum of 0.017 when the duty cycle of the training samples in the data set was 95%.
The invention relates to an access strategy intelligentized generation method based on matrix decomposition, which constructs a user-file access matrix through the existing authorized data set; randomly permuting rows and columns of the access matrix; randomly generating an attribute matrix and a strategy matrix; setting an objective function, a missing value weight, a regular term coefficient, a learning rate, a gradient descent threshold value and a batch size; training an attribute matrix by using a small-batch gradient descent method, calculating an attribute matrix threshold value and binarizing the attribute matrix, training a strategy matrix by using the small-batch gradient descent method, calculating the absolute value of the difference between the objective functions after training before and after twice, and if the absolute value is larger than a given threshold value, continuing training the attribute matrix, calculating the attribute matrix threshold value and training the strategy matrix, otherwise stopping training; calculating a prediction matrix according to the attribute matrix and the strategy matrix; calculating a threshold value for each file vector of the prediction matrix, wherein the threshold value is a safety threshold value; and finally, formulating a corresponding access strategy according to the strategy matrix and the safety threshold. According to the invention, through learning the existing authorized data set, an intelligent access strategy generation method is constructed, so that the labor cost required for formulating the access strategy is greatly reduced, and the popularization and application of the ABE ciphertext access control mechanism in a large-scale network scene are facilitated.
The above disclosure is only a preferred embodiment of the present invention, and it should be understood that the scope of the invention is not limited thereto, and those skilled in the art will appreciate that all or part of the procedures described above can be performed according to the equivalent changes of the claims, and still fall within the scope of the present invention.

Claims (2)

CN202011238974.5A2020-11-092020-11-09Access strategy intelligent generation method based on matrix decompositionActiveCN112446038B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202011238974.5ACN112446038B (en)2020-11-092020-11-09Access strategy intelligent generation method based on matrix decomposition

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202011238974.5ACN112446038B (en)2020-11-092020-11-09Access strategy intelligent generation method based on matrix decomposition

Publications (2)

Publication NumberPublication Date
CN112446038A CN112446038A (en)2021-03-05
CN112446038Btrue CN112446038B (en)2024-04-02

Family

ID=74736277

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202011238974.5AActiveCN112446038B (en)2020-11-092020-11-09Access strategy intelligent generation method based on matrix decomposition

Country Status (1)

CountryLink
CN (1)CN112446038B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116360352B (en)*2022-12-022024-04-02山东和信智能科技有限公司Intelligent control method and system for power plant

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107181590A (en)*2017-04-142017-09-19南京邮电大学Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing
CN109617855A (en)*2018-10-252019-04-12深圳技术大学(筹) File sharing method, device, device and medium based on CP-ABE hierarchical access control

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9264451B2 (en)*2013-09-172016-02-16International Business Machines CorporationGeneration of attribute based access control policy from existing authorization system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107181590A (en)*2017-04-142017-09-19南京邮电大学Strategy hides the anti-leakage CP ABE methods under being decrypted with outsourcing
CN109617855A (en)*2018-10-252019-04-12深圳技术大学(筹) File sharing method, device, device and medium based on CP-ABE hierarchical access control

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于矩阵的隐藏访问结构的属性基加密方案;萧萍;;自动化与仪器仪表(03);全文*

Also Published As

Publication numberPublication date
CN112446038A (en)2021-03-05

Similar Documents

PublicationPublication DateTitle
Zhao et al.On controllability and stabilizability of probabilistic Boolean control networks
CN108846555B (en) An efficient and accurate imputation method for missing values of power load big data
Liu et al.Dynamic output‐feedback control for linear systems by using event‐triggered quantisation
Sahoo et al.New results on restricted static output feedback controller design with regional pole placement
CN106790248A (en)A kind of network inbreak detection method based on the online extreme learning machine of double adaptive regularization
CN107181600A (en)A kind of password login authentication method, system and user equipment and certificate server
CN112446038B (en)Access strategy intelligent generation method based on matrix decomposition
CN114531220A (en)Efficient fault-tolerant dynamic phrase searching method based on forward privacy and backward privacy
CN109635530A (en) An Intelligent Password Guessing Method Based on User Group Attributes
WO2020112580A1 (en)Data retrieval
CN113392919A (en)Federal attention DBN cooperative detection system based on client selection
Zhang et al.The optimal sub-packetization of linear capacity-achieving PIR schemes with colluding servers
CN109698823A (en)A kind of Cyberthreat discovery method
CN114003744A (en) Image retrieval method and system based on convolutional neural network and vector homomorphic encryption
Jiang et al.Urban Traffic Signals Timing at Four‐Phase Signalized Intersection Based on Optimized Two‐Stage Fuzzy Control Scheme
CN111950765B (en)Probabilistic transient stability prediction method based on stacked noise reduction self-encoder
CN118734210A (en) A dynamic weighted federated learning anomaly detection method based on graph neural network
CN119603410B (en)Image encryption method and device based on neural network chaotic system
CN109445749A (en)It is a kind of not repeat random sequence number generation method and terminal
Xu et al.Quantised kernel least mean square with desired signal smoothing
SeoExplicit Formulae for Characteristics of Finite‐Capacity M/D/1 Queues
CN111026087B (en)Weight-containing nonlinear industrial system fault detection method and device based on data
CN102082700B (en)Detection method of network intrusion
CN104104496B (en)A kind of one-way Hash function building method based on chaos dynamic Theory
CN116647391A (en)Network intrusion detection method and system based on parallel self-encoder and weight discarding

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp