Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Analysis of consistency between sensitive behavior and privacy policy of Android applications
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU
Journal of Computer Applications    2024, 44 (3): 788-796.   DOI: 10.11772/j.issn.1001-9081.2023030290
Abstract214)   HTML5)    PDF (1850KB)(107)       Save

The privacy policy document declares the privacy information that an application needs to obtain, but it cannot guarantee that it clearly and fully discloses the types of privacy information that the application obtains. Currently, there are still deficiencies in the analysis of the consistency between actual sensitive behaviors of applications and privacy policies. To address the above issues, a method for analyzing the consistency between sensitive behaviors and privacy policies of Android applications was proposed. In the privacy policy analysis stage, a Bi-GRU-CRF (Bi-directional Gated Recurrent Unit Conditional Random Field) neural network was used and the model was incrementally trained by adding a custom annotation library to extract key information from the privacy policy declaration. In the sensitive behavior analysis stage, IFDS (Interprocedural, Finite, Distributive, Subset) algorithm was optimized by classifying sensitive API (Application Programming Interface) calls, deleting already analyzed sensitive API calls from the input sensitive source list, and marking already extracted sensitive paths. It ensured that the analysis results of sensitive behaviors matched the language granularity of the privacy policy description, reduced the redundancy of the analysis results and improved the efficiency of analysis. In the consistency analysis stage, the semantic relationships between ontologies were classified into equivalence, subordination, and approximation relationships, and a formal model for consistency between sensitive behaviors and privacy policies was defined based on these relationships. The consistency situations between sensitive behaviors and privacy policies were classified into clear expression and ambiguous expression, and inconsistency situations were classified into omitted expression, incorrect expression, and ambiguous expression. Finally, based on the proposed semantic similarity-based consistency analysis algorithm, the consistency between sensitive behaviors and privacy policies was analyzed. Experimental results show that, by analyzing 928 applications, with the privacy policy analysis accuracy of 97.34%, 51.4% of Android applications are found to have inconsistencies between the actual sensitive behaviors and the privacy policy declaration.

Table and Figures | Reference | Related Articles | Metrics
Collaborative filtering algorithm based on collaborative training and Boosting
Xiaohan YANG, Guosheng HAO, Xiehua ZHANG, Zihao YANG
Journal of Computer Applications    2023, 43 (10): 3136-3141.   DOI: 10.11772/j.issn.1001-9081.2022101489
Abstract175)   HTML11)    PDF (1305KB)(113)       Save

Collaborative Filtering (CF) algorithm can realize personalized recommendation on the basis of the similarity between items or users. However, data sparsity has always been one of the challenges faced by CF algorithm. In order to improve the prediction accuracy, a CF algorithm based on Collaborative Training and Boosting (CFCTB) was proposed to solve the problem of sparse user-item scores. First, two CFs were integrated into a framework by using collaborative training, pseudo-labeled samples with high confidence were added to each other’s training set by the two CFs, and Boosting weighted training data were used to assist the collaborative training. Then, the weighted integration was used to predict the final user scores, and the accumulation of noise generated by pseudo-labeled samples was avoided effectively, thereby further improving the recommendation performance. Experimental results show that the accuracy of the proposed algorithm is better than that of the single models on four open datasets. On CiaoDVD dataset with the highest sparsity, compared with Global and Local Kernels for recommender systems (GLocal-K), the proposed algorithm has the Mean Absolute Error (MAE) reduced by 4.737%. Compared with ECoRec (Ensemble of Co-trained Recommenders) algorithm, the proposed algorithm has the Root Mean Squared Error (RMSE) decreased by 7.421%. The above rasults verify the effectiveness of the proposed algorithm.

Table and Figures | Reference | Related Articles | Metrics
Fake news detection method based on blockchain technology
Shengjia GONG, Linlin ZHANG, Kai ZHAO, Juntao LIU, Han YANG
Journal of Computer Applications    2022, 42 (11): 3458-3464.   DOI: 10.11772/j.issn.1001-9081.2021111885
Abstract409)   HTML13)    PDF (1557KB)(172)       Save

Fake news not only leads to misconceptions and damages people's right to know the truth, but also reduces the credibility of news websites. In view of the occurrence of fake news in news websites, a fake news detection method based on blockchain technology was proposed. Firstly, the smart contract was invoked to randomly assign reviewers for the news for determining the authenticity of the news. Then, the credibility of the review results was improved by adjusting the number of reviewers and ensuring the number of effective reviewers. At the same time, the incentive mechanism was designed with rewards distributed according to the reviewers' behaviors, and the reviewers' behaviors and rewards were analyzed by game theory. In order to gain the maximum benefit, the reviewers' behaviors should be honest. An auditing mechanism was designed to detect malicious reviewers to improve system security. Finally, a simple blockchain fake news detection system was implemented by using Ethereum smart contract and simulated for fake news detection, and the results show that the accuracy of news authenticity detection of the proposed method reaches 95%, indicating that the proposed method can effectively prevent the release of fake news.

Table and Figures | Reference | Related Articles | Metrics