°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ

°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ: °ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ

ÁªÏµÎÒÃÇ Ê¦´óÊ×Ò³

°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ:

°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ:

°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ:×ó¿ªÖÐ

·¢²¼ÈÕÆÚ£º2018-03-05 ä¯ÀÀ´ÎÊý£º ×÷Õߣº×ó¿ªÖР ±à¼­£º³Â¸¶Áú     

Ò»¡¢¸öÈ˼ò½é  

×ó¿ªÖУ¬ÄУ¬1974ÄêÉú£¬°²»ÕËÞÖÝÈË£¬²©Ê¿¡¢½ÌÊÚ¡¢Ë¶Ê¿Éúµ¼Ê¦£»1997Äê±¾¿Æ±ÏÒµÓڰ뵺Ӣ³¬ºÏ×÷ÔÞÖúÉ̼ÆËã»úϵ»ñ¹¤Ñ§Ñ§Ê¿Ñ§Î»£¬2004Äê˶ʿ±ÏÒµÓÚÎ÷±±¹¤Òµ´óѧ¼ÆËã»úѧԺ»ñ¹¤Ñ§Ë¶Ê¿Ñ§Î»£¬2011Ä격ʿ±ÏÒµÓÚÉϺ£´óѧ¼ÆËã»ú¹¤³ÌÓë¿ÆÑ§Ñ§Ôº»ñ¹¤Ñ§²©Ê¿Ñ§Î»£»2008Äê½úÉý¸±½ÌÊÚ£¬2013Äê½úÉý½ÌÊÚ¡£

¶þ¡¢ËùÊÚ¿Î³Ì  

£¨1£©±¾¿ÆÉú¿Î³Ì£ºÊý¾Ý½á¹¹¡¢²Ù×÷ϵͳ¡¢Èí¼þ¹¤³Ì¡¢Èí¼þÏîÄ¿¹ÜÀíµÈ£»

£¨2£©Ñо¿Éú¿Î³Ì£º¸ß¼¶Èí¼þ¹¤³Ì¡¢Èí¼þÉè¼Æ·½·¨Ñ§µÈ¡£

Èý¡¢Ñо¿·½Ïò

£¨1£©»ù´¡Ñо¿£ºÊý¾Ý°²È«ÓëÒþ˽±£»¤¡¢»úÆ÷ѧϰ¡¢ÈýÖµ¹âѧ¼ÆËã»úµÈ¡£

£¨2£©Ó¦ÓÃÑо¿£ºÈí¼þ¹¤³Ì¡¢´óÊý¾Ý¡¢ÔƼÆËã¡¢»úÆ÷ѧϰ¡¢Êý¾ÝÍÚ¾ò¡¢Çø¿éÁ´¡¢»¥ÁªÍø+µÈ¼¼ÊõÔÚÐÅÏ¢°²È«Óë±£ÃܹÜÀí¡¢Öǻ۽ÌÓý¡¢ÖÇ»ÛÑøÀÏ¡¢ÆóÒµÖÆÔìÖ´ÐÐϵͳ£¨MES£©¡¢ÆóÒµÖÊÁ¿¹ÜÀíϵͳ£¨QMS£©¡¢ÆóÒµÉú²úÐÅÏ¢¹ÜÀíϵͳ¡¢ÖÊÁ¿Ô¤²â·ÖÎö¡¢ÏúÁ¿Ô¤²â·ÖÎö¡¢Éú²úÄÜÁ¦Æ½ºâ·ÖÎö¡¢É豸½¡¿µ¹ÜÀíºÍÔ¤²âÐÔά»¤¡¢¶àÉú²úÏßÅŲú¹ÜÀíÓëÓÅ»¯¡¢Éú²úÅŰàµ÷¶ÈÓëÓÅ»¯µÈÁìÓòµÄϵͳ·ÖÎö¡¢Éè¼Æ¡¢¿ª·¢ºÍÏîÄ¿¹ÜÀíµÈ´´ÐÂÓ¦Óá£

Èý¡¢»ñ½±ºÍÈÙÓþ  

»ñ°²»ÕÊ¡½Ìѧ³É¹û½±¶þµÈ½±ºÍÈýµÈ½±¸÷1Ïî¡¢°²»ÕÊ¡µÚÆß½ì×ÔÈ»¿ÆÑ§ÓÅÐãѧÊõÂÛÎĶþµÈ½±¡¢°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌÓÅÐã½ÌѧÈýµÈ½±µÈ£»ÈÙ»ñ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ¡°ÓÅÐã¹²²úµ³Ô±¡±¡¢¡°Ë¼ÏëÕþÖι¤×÷ÏȽø¸öÈË¡±¡¢´óѧÉúÊîÆÚÉç»áʵ¼ù»î¶¯¡°ÓÅÐãÖ¸µ¼½Ìʦ¡±µÈÈÙÓþ³ÆºÅ¡£

ËÄ¡¢¿ÆÑÐÏîÄ¿

Ö÷³Ö»ò²ÎÓë¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ð¡¢°²»ÕÊ¡×ÔÈ»¿ÆÑ§»ù½ð¡¢¹ú¼ÒÖØµãʵÑéÊÒ¿ª·Å»ù½ðÏîÄ¿¡¢°²»ÕÊ¡¸ßУʡ¼¶×ÔÈ»¿ÆÑ§Ñо¿ÏîÄ¿¡¢ÎߺþÊпƼ¼¼Æ»®ÏîÄ¿¡¢°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ´´Ð»ù½ðÏîÄ¿µÈ¸÷Àà¿ÆÑÐÏîÄ¿20ÓàÏî¡£

Î塢ѧÊõÂÛÎÄ

ÔÚ¹úÄÚÍâѧÊõÆÚ¿¯ºÍ»áÒéÉÏ·¢±íѧÊõÂÛÎÄ40ÓàÆª£¬½ü5Äê·¢±íµÄÖ÷ÒªÂÛÎÄ£º

[1] ×ó¿ªÖУ¬ÁõÈÕÔ¿¡£¬ÚÈÕÂÒ壬³Â¸¶Áú, ÈÚºÏÓïÒåÐÅÏ¢µÄʱ¿Õ¹ØÁªÎ»ÖÃÒþ˽±£»¤·½·¨[J]. Î÷°²µç×ӿƼ¼´óѧѧ±¨, 2022, 49(01): 68-78.

[2] Wang Y, Zuo K, Liu R, et al. Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road Network[J]. International Journal of Network Security, 2021, 23(4): 642-649.

[3] Liu R, Zuo K, Wang Y, et al. Location privacy-preserving method based on degree of semantic distribution similarity[C]// International Conference of Pioneering Computer Scientists, Engineers and Educators, 2020: 118-129.

[4] Ôøº£Ñà, ×ó¿ªÖÐ*, ÍõÓÀ¼, µÈ. Â·Íø»·¾³ÏµÄÓïÒå¶àÑùÐÔλÖÃÒþ˽±£»¤·½·¨[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ, 2020, 56(07): 102-108.

[5] ÍõÓÀ¼, ×ó¿ªÖÐ*, Ôøº£Ñà, µÈ. ÃæÏòÁ¬Ðø²éѯµÄÃô¸ÐÓïÒåλÖÃÒþ˽±£»¤·½°¸[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ, 2020, 56(14): 74-81.

[6] Wang Yonglu, Zuo Kaizhong, Liu Rui, Guo Liangmin. Semantic location privacy protection based on privacy preference for road network[C]// International Conference of 11th International Symposium on Cyberspace Safety and Security, Lecture Notes in Computer Science,2019: 330-342.

[7] ×ó¿ªÖÐ,ÌÕ½¡,Ôøº£Ñà,ËïÀöƼ.»ùÓÚÓïÒå¿Õ¼äÄäÃûµÄ¹ì¼£Òƶ¯Ä£Ê½ÍÚ¾òËã·¨[J] ÐÅÏ¢ÍøÂ簲ȫ, 2018,(08):34-42.

[8] ×ó¿ªÖÐ,ÉÐÄþ,ÌÕ½¡,ÍõÌδº.Á½²ã´«¸ÐÍøÒþ˽±£»¤µÄ²»ÍêÈ«Êý¾ÝSkyline²éѯЭÒé[J].¼ÆËã»úÓ¦ÓÃ,2017,37(6): 1599-1604.

Áù¡¢ÖªÊ¶²úȨ

ÊÚȨ·¢Ã÷רÀû¡¢ÊµÓÃÐÂÐÍרÀûºÍÈí¼þÖø×÷Ȩ30ÓàÏÆäÖÐÒÔµÚÒ»Éè¼ÆÈËÊÚȨ·¢Ã÷רÀû3Ïî¡£

[1] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ÍõÓÀ¼,ÁõÈï,¶¡ÐÂÌÎ,ÂÞÓÀÁú. 2019111409950£¬Á¬Ðø²éѯÓïÒåλÖÃÒþ˽±£»¤·½·¨¼°Á¬Ðø²éѯϵͳ£¬2021Äꣻ

[2] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ÍõÓÀ¼,ÁõÈï,ÂÞÓÀÁú. 2019103618210£¬Ò»ÖÖÂ·Íø»·¾³Ï»ùÓÚÒþ˽ƫºÃµÄÓïÒåλÖÃÒþ˽±£»¤·½·¨£¬2021Äꣻ

[3] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ºúÅô,ÂÞÓÀÁú,¹ùÁ¼Ãô,ÍõÌδº.2013107312809£¬Òþ˽±£»¤µÄÁ½²ã´«¸ÐÍøSkyline²éѯϵͳ£¬2017Äê¡£

Æß¡¢Ñо¿ÉúÖ¸µ¼

ÒѱÏҵ˶ʿÉú10ÈË£¬ÆäÖУº2È˼ÌÐø¹¥¶Á²©Ê¿£¬3È˱¾¿Æ¸ßУ¹¤×÷£¬4ÈËÔÚ¸ßְԺУ¹¤×÷£¬1ÈËÔÚÆóÒµ¹¤×÷¡£ÔÚ¶Á˶ʿÉú8ÈË£¬ÆäÖУºÑ§Ë¶3ÈË£¬×¨Ë¶5ÈË¡£

°Ë¡¢±¾¿ÆÉúÖ¸µ¼

½ü5ÄêÀ´£¬»ý¼«Ö¸µ¼±¾¿ÆÉú²Î¼Ó¸÷Ààѧ¿Æ¾ºÈü¡¢·¢±íѧÊõÂÛÎÄ¡¢ÉêÇë´óѧÉú´´Ð´´ÒµÑµÁ·¼Æ»®ÏîÄ¿ºÍ±¾¿ÆÉúÓÅÐã±ÏÒµÂÛÎÄ(Éè¼Æ)ÅàÓý¼Æ»®ÏîÄ¿¡¢ÉêÇëÈí¼þÖø×÷ȨµÈ£¬Á¬ÐøÈýÄê»ñ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ¡°ÓÅÐã±¾¿ÆÉúµ¼Ê¦¡±³ÆºÅ¡£Ö¸µ¼Ñ§ÉúÔÚÈ«¹ú´óѧÉúÊýѧ½¨Ä£¾ºÈü¡¢Öйú´óѧÉú¼ÆËã»úÉè¼Æ´óÈü¡¢À¶Çű­È«¹úÈí¼þºÍÐÅÏ¢¼¼ÊõרҵÈ˲ŴóÈü¡¢È«¹úÐÅÏ¢¼¼ÊõÓ¦ÓÃˮƽ´óÈü¡¢Öйú»úÆ÷ÈË´óÈüôßROBOCUP¹«¿ªÈüµÈѧ¿Æ¾ºÈüÖлñ¹ú¼ÒÒ»µÈ½±1Ïî¡¢¶þµÈ½±4Ïî¡¢ÈýµÈ½±2Ïʡ¼¶½±Ïî20ÓàÏ»ñÅú¹ú¼Ò¼¶ºÍÊ¡¼¶´óѧÉú´´Ð´´ÒµÑµÁ·¼Æ»®ÏîÄ¿20ÓàÏ»ñÅú±¾¿ÆÉúÓÅÐã±ÏÒµÂÛÎÄ(Éè¼Æ)ÅàÓý¼Æ»®ÏîÄ¿10ÓàÏ±¾¿ÆÉúÒÔµÚÒ»×÷Õß·¢±íѧÊõÂÛÎÄ3ƪ£¬±¾¿ÆÉúÒÔµÚÒ»Éè¼ÆÈËÊÚȨʵÓÃÐÂÐÍרÀûºÍÈí¼þÖø×÷Ȩ10ÓàÏî¡£

¾Å¡¢ÁªÏµ·½Ê½

£¨1£©°ì¹«ÊÒ£ºÑ§Ô·ÄÏÂ¥2ºÅÂ¥104ÊÒ

£¨2£©E-mail£ºzuokz@ahnu.edu.cn

£¨3£©Í¨ÐŵØÖ·£º°²»ÕÊ¡ÎߺþÊоŻªÄÏ·189ºÅ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ£¬ 241002


°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ¡¾µç×Ó¡¿ÓÐÏÞ¹«Ë¾