Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
PageRank-based talent mining algorithm based on Web of Science
LI Chong, WANG Yuchen, DU Weijing, HE Xiaotao, LIU Xuemin, ZHANG Shibo, LI Shuren
Journal of Computer Applications    2021, 41 (5): 1356-1360.   DOI: 10.11772/j.issn.1001-9081.2020081206
Abstract300)      PDF (775KB)(444)       Save
The high-level paper is one of the symbolic achievements of excellent scientific talents. Focusing on the "Web of Science (WOS)" hot research disciplines, on the basis of constructing the Neo4j semantic network graph of academic papers and mining active scientific research communities, the PageRank-based talent mining algorithm was used to realize the mining of outstanding scientific research talents in the scientific research communities. Firstly, the existing talent mining algorithms were studied and analyzed in detail. Secondly, combined with the WOS data, the PageRank-based talent mining algorithm was optimized and implemented by adding consideration factors such as the paper publication time factor, the author's order descending model, the influence of surrounding author nodes on this node, the number of citations of the paper. Finally, experiments and verifications were carried out based on the paper data of the communities of the hot discipline computer science in the past five years. The results show that community-based mining is more targeted, and can quickly find representative excellent and potential talents in various disciplines, and the improved algorithm is more effective and objective.
Reference | Related Articles | Metrics
Security analysis and improvement of certificateless signature scheme without bilinear pairing
WANG Yi DU Weizhang
Journal of Computer Applications    2013, 33 (08): 2250-2252.  
Abstract859)      PDF (467KB)(460)       Save
By analyzing the security of a certificateless signature scheme without bilinear pairing proposed by Wang Shengbao, 〖WTBX〗et al.〖WTBZ〗 (WANG S B, LIU W H, XIE Q. Certificateless signature scheme without bilinear pairings. Journal on Communications, 2012, 33(4): 93-98), it indicated that the scheme could not resist malicious attack of positive dishonest Key Generation Center (KGC). For this kind of attack, detailed attack method was given, and an improved scheme was proposed. Finally, the security of the improved scheme was analyzed. The result shows that the proved scheme can resist the malicious KGC attack, maintain efficiency of the original scheme and has higher security. Meanwhile, the communication complexity is reduced due to the elimination of the security channel.
Reference | Related Articles | Metrics
Adaptively-chosen ciphertext secure and publicly verifiable encryption scheme
DU Weidong YANG Xiaoyuan ZHANG Xianghuo WANG Xu'an
Journal of Computer Applications    2013, 33 (04): 1051-1054.   DOI: 10.3724/SP.J.1087.2013.01051
Abstract637)      PDF (648KB)(558)       Save
There is a great demand for publicly verifiable encryption in key escrow, optimistic fair exchange, publicly verifiable secret sharing and secure multiparty computation, but the current schemes are either chosen plaintext secure or chosen ciphertext secure in the random oracle model, which obviously are not secure enough to be applied in the complicated circumstances. Based on the analysis of the current schemes and application of the reality, this paper proposed a new publicly verifiable encryption scheme by combining the CS encryption scheme with the non-interactive zero knowledge proof protocol. The new scheme enabled any third party other than the sender and receiver to verify the validity of the ciphertext, but leaked no information about the message. Finally, without using the random oracle, the adaptively chosen ciphertext security of the scheme is proved in the standard model.
Reference | Related Articles | Metrics
Security analysis and improvement of a certificateless signature scheme
HUANG Mingjun DU Weizhang
Journal of Computer Applications    2011, 31 (06): 1536-1538.   DOI: 10.3724/SP.J.1087.2011.01536
Abstract1291)      PDF (466KB)(511)       Save
Nowadays, many centificateless signature schemes depend on the honesty of Key Generation Center (KGC) excessively, so they also lose security guarantees when the KGC is dishonest. By analyzing the security of the certificateless signature scheme proposed by Liang Hongmei et. al. in security analysis and improvement of efficient certificateless signature scheme publicated by Journal fo Computer Applications, 2010,30(3):685-687, where the authors pointed out that the scheme could not resist public key replacement attack under negative dishonest KGC and positive dishonest KGCs attacks. Aiming at these problems, the scheme was improved by the means that KGC generated the users public key and made it public. The analysis of security shows that the improved scheme is able to resist public key replacement attack under negative dishonest KGC, thus successfully distinguishing the positive dishonesty of KGC,and resisting existential forgery on adaptively chosen message attack under the random oracle model.
Related Articles | Metrics