Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2639-2644.DOI: 10.11772/j.issn.1001-9081.2014.09.2639
Previous Articles Next Articles
SU Yingbin1,2,DU Xuehui1,2,XIA Chuntao1,2,LI Haihua3
Received:
2014-04-09
Revised:
2014-05-28
Online:
2014-09-30
Published:
2014-09-01
Contact:
SU Yingbin
苏赢彬1,2,杜学绘1,2,夏春涛1,2,李海华3
通讯作者:
苏赢彬
作者简介:
基金资助:
国家863计划项目
CLC Number:
SU Yingbin DU Xuehui XIA Chuntao LI Haihua. Sensitive information detection approach for documents based on document smoothing and query expansion[J]. Journal of Computer Applications, 2014, 34(9): 2639-2644.
苏赢彬 杜学绘 夏春涛 李海华. 基于文档平滑和查询扩展的文档敏感信息检测方法[J]. 计算机应用, 2014, 34(9): 2639-2644.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2639
[1]LI W, SUN L, NUO M, et al.Sensitive information filtering based on kernel method[J]. Journal on Communications, 2008, 29(4): 57-62. (李文波,孙乐,诺明花,等.基于核方法的敏感信息过滤的研究[J].通信学报,2008, 29(4):57-62.)
[2]YU S. Design and implementation of sensitive military information search system [D]. Chengdu: University of Electronic Science and Technology of China, 2012. (喻世玺. 军事敏感信息搜索系统的设计与实现[D].成都:电子科技大学, 2012.)
[3]TAO T, ZHAI C. Regularized estimation of mixture models for robust pseudo-relevance feedback [C]// Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2006: 162-169.
[4]CHEN H, DU X, XIA C, et al.Query expansion model based on interest ontology [C]// ICIII 2012: Proceedings of the 2012 International Conference on Information Management, Innovation Management and Industrial Engineering. Piscataway: IEEE, 2012, 3: 474-478.
[5]CHAUHAN R, GOUDAR R, SHARMA R, et al.Domain ontology based semantic search for efficient information retrieval through automatic query expansion [C]// ISSP 2013: Proceedings of the 2013 International Conference on Intelligent Systems and Signal Processing. Piscataway: IEEE, 2013: 397-402.
[6]GOYAL P, BEHERA L, MCGINNITY T M. A novel neighborhood based document smoothing model for information retrieval [J]. Information Retrieval, 2013, 16(3): 391-425.
[7]DAMANI O P. Improving Pointwise Mutual Information (PMI) by incorporating significant co-occurrence [EB/OL]. [2014-03-01]. http://arxiv.org/pdf/1307.0596v1.pdf.
〖BP(〗【arXiv preprint arXiv:1307.0596, 2013.〖BP)〗
[8]LIANG S. VSM information retrieval data sparseness problem analysis and avoidance strategies [J]. Library and Information Service, 2013, 57(1): 142-146. (梁士金. VSM 信息检索中的数据稀疏问题分析与规避策略[J].图书情报工作, 2013, 57(1): 142-146.)
〖HJ1.85mm〗[9]BAI J, NIE J Y, CAO G, et al.Using query contexts in information retrieval [C]// Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2007: 15-22.
[10]YAN C, GAO K, LI M. Processing natural language based query and context sensitive spelling suggestion in information retrieval [C]// ICMIC 2013: Proceedings of the 2013 International Conference on Modeling, Identification & Control. Piscataway: IEEE, 2013: 269-274.
[11]LI W, ZHAO T, WANG X. Context-sensitive query expansion [J]. Journal of Computer Research and Development, 2010 (2): 300-304. (李卫疆, 赵铁军, 王宪刚. 基于上下文的查询扩展[J]. 计算机研究与发展, 2010 (2): 300-304.)
[12]GOYAL P, BEHERA L, MCGINNITY T M. A Context-based word indexing model for document summarization [J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(8): 1693-1705.
[13]PONTE J M, CROFT W B. A language modeling approach to information retrieval [C]// Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 1998: 275-281.
[14]ZHAI C, LAFFERTY J. A study of smoothing methods for language models applied to information retrieval [J]. ACM Transactions on Information Systems, 2004, 22(2): 179-214. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||