• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于决策树的敏感信息识别与加密传输系统

Decision Tree-Based Sensitive Information Identification and Encrypted Transmission System.

作者信息

Liu Shuang, Yang Ziheng, Li Yi, Wang Shuiqing

机构信息

Electronic Engineering College, Heilongjiang University, Harbin 150080, China.

出版信息

Entropy (Basel). 2020 Feb 7;22(2):192. doi: 10.3390/e22020192.

DOI:10.3390/e22020192
PMID:33285967
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7516615/
Abstract

With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recognition and encryption transmission system based on a decision tree. By training sensitive data to build a decision tree, unknown data can be classified and identified. The identified sensitive information can be marked and encrypted to achieve intelligent recognition and protection of sensitive information. This lays the foundation for the development of an information recognition and encryption transmission system.

摘要

随着信息时代的到来,敏感信息的有效识别以及传输过程中敏感信息的泄露问题日益严峻。我们设计了一种基于决策树的敏感信息识别与加密传输系统。通过对敏感数据进行训练构建决策树,能够对未知数据进行分类和识别。识别出的敏感信息可进行标记和加密,以实现对敏感信息的智能识别与保护。这为信息识别与加密传输系统的发展奠定了基础。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/b0b1a4a67b9c/entropy-22-00192-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/68dd8b7b84ba/entropy-22-00192-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/0501cd063024/entropy-22-00192-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/254c358adc67/entropy-22-00192-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d14bd03f620d/entropy-22-00192-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d24ff4b24d0c/entropy-22-00192-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/4c47132915c0/entropy-22-00192-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/9f1f9e984d8c/entropy-22-00192-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/7990a7df4aef/entropy-22-00192-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/abc58f4baf98/entropy-22-00192-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/85ee17b4c66d/entropy-22-00192-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/375c7fc82545/entropy-22-00192-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d52cde2af9e3/entropy-22-00192-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/4bc1492e9762/entropy-22-00192-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/b0b1a4a67b9c/entropy-22-00192-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/68dd8b7b84ba/entropy-22-00192-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/0501cd063024/entropy-22-00192-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/254c358adc67/entropy-22-00192-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d14bd03f620d/entropy-22-00192-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d24ff4b24d0c/entropy-22-00192-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/4c47132915c0/entropy-22-00192-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/9f1f9e984d8c/entropy-22-00192-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/7990a7df4aef/entropy-22-00192-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/abc58f4baf98/entropy-22-00192-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/85ee17b4c66d/entropy-22-00192-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/375c7fc82545/entropy-22-00192-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/d52cde2af9e3/entropy-22-00192-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/4bc1492e9762/entropy-22-00192-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a678/7516615/b0b1a4a67b9c/entropy-22-00192-g014.jpg

相似文献

1
Decision Tree-Based Sensitive Information Identification and Encrypted Transmission System.基于决策树的敏感信息识别与加密传输系统
Entropy (Basel). 2020 Feb 7;22(2):192. doi: 10.3390/e22020192.
2
Private predictive analysis on encrypted medical data.对加密医疗数据的隐私预测分析。
J Biomed Inform. 2014 Aug;50:234-43. doi: 10.1016/j.jbi.2014.04.003. Epub 2014 May 14.
3
Simultaneous transmission for an encrypted image and a double random-phase encryption key.加密图像与双随机相位加密密钥的同时传输。
Appl Opt. 2007 Jun 20;46(18):3747-53. doi: 10.1364/ao.46.003747.
4
Logistic regression over encrypted data from fully homomorphic encryption.基于全同态加密的密文数据的逻辑回归。
BMC Med Genomics. 2018 Oct 11;11(Suppl 4):81. doi: 10.1186/s12920-018-0397-z.
5
Optical double-image encryption and authentication by sparse representation.基于稀疏表示的光学双图像加密与认证
Appl Opt. 2016 Dec 10;55(35):9939-9944. doi: 10.1364/AO.55.009939.
6
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.基于边缘的加密数据移动云存储高效搜索
Sensors (Basel). 2018 Apr 13;18(4):1189. doi: 10.3390/s18041189.
7
Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.隐私保护概率性记录链接(P3RL):一种链接现有健康相关数据并维护参与者隐私的新方法。
BMC Med Res Methodol. 2015 May 30;15:46. doi: 10.1186/s12874-015-0038-6.
8
Double-random-phase encryption with photon counting for image authentication using only the amplitude of the encrypted image.仅使用加密图像的幅度进行图像认证的基于光子计数的双随机相位加密。
J Opt Soc Am A Opt Image Sci Vis. 2016 Nov 1;33(11):2158-2165. doi: 10.1364/JOSAA.33.002158.
9
Information authentication using photon-counting double-random-phase encrypted images.基于光子计数双随机相位加密图像的信息认证。
Opt Lett. 2011 Jan 1;36(1):22-4. doi: 10.1364/OL.36.000022.
10
Invisible Inks for Secrecy and Anticounterfeiting: From Single to Double-encryption by Hydrochromic Molecules.用于保密和防伪的隐形墨水:从单重到由热致变色分子进行的双重加密
ACS Appl Mater Interfaces. 2020 Feb 19;12(7):8952-8960. doi: 10.1021/acsami.0c00462. Epub 2020 Feb 5.

引用本文的文献

1
Reliable Industry 4.0 Based on Machine Learning and IoT for Analyzing, Monitoring, and Securing Smart Meters.基于机器学习和物联网的可靠工业 4.0,用于分析、监控和保护智能电表。
Sensors (Basel). 2021 Jan 12;21(2):487. doi: 10.3390/s21020487.