Ò»¡¢¸öÈ˼ò½é
×ó¿ªÖУ¬ÄУ¬1974ÄêÉú£¬°²»ÕËÞÖÝÈË£¬²©Ê¿¡¢½ÌÊÚ¡¢Ë¶Ê¿Éúµ¼Ê¦£»1997Äê±¾¿Æ±ÏÒµÓڰ뵺Ӣ³¬ºÏ×÷ÔÞÖúÉ̼ÆËã»úϵ»ñ¹¤Ñ§Ñ§Ê¿Ñ§Î»£¬2004Äê˶ʿ±ÏÒµÓÚÎ÷±±¹¤Òµ´óѧ¼ÆËã»úѧԺ»ñ¹¤Ñ§Ë¶Ê¿Ñ§Î»£¬2011Ä격ʿ±ÏÒµÓÚÉϺ£´óѧ¼ÆËã»ú¹¤³ÌÓë¿ÆÑ§Ñ§Ôº»ñ¹¤Ñ§²©Ê¿Ñ§Î»£»2008Äê½úÉý¸±½ÌÊÚ£¬2013Äê½úÉý½ÌÊÚ¡£
¶þ¡¢ËùÊڿγÌ
£¨1£©±¾¿ÆÉú¿Î³Ì£ºÊý¾Ý½á¹¹¡¢²Ù×÷ϵͳ¡¢Èí¼þ¹¤³Ì¡¢Èí¼þÏîÄ¿¹ÜÀíµÈ£»
£¨2£©Ñо¿Éú¿Î³Ì£º¸ß¼¶Èí¼þ¹¤³Ì¡¢Èí¼þÉè¼Æ·½·¨Ñ§µÈ¡£
Èý¡¢Ñо¿·½Ïò
£¨1£©»ù´¡Ñо¿£ºÊý¾Ý°²È«ÓëÒþ˽±£»¤¡¢»úÆ÷ѧϰ¡¢ÈýÖµ¹âѧ¼ÆËã»úµÈ¡£
£¨2£©Ó¦ÓÃÑо¿£ºÈí¼þ¹¤³Ì¡¢´óÊý¾Ý¡¢ÔƼÆËã¡¢»úÆ÷ѧϰ¡¢Êý¾ÝÍÚ¾ò¡¢Çø¿éÁ´¡¢»¥ÁªÍø+µÈ¼¼ÊõÔÚÐÅÏ¢°²È«Óë±£ÃܹÜÀí¡¢Öǻ۽ÌÓý¡¢ÖÇ»ÛÑøÀÏ¡¢ÆóÒµÖÆÔìÖ´ÐÐϵͳ£¨MES£©¡¢ÆóÒµÖÊÁ¿¹ÜÀíϵͳ£¨QMS£©¡¢ÆóÒµÉú²úÐÅÏ¢¹ÜÀíϵͳ¡¢ÖÊÁ¿Ô¤²â·ÖÎö¡¢ÏúÁ¿Ô¤²â·ÖÎö¡¢Éú²úÄÜÁ¦Æ½ºâ·ÖÎö¡¢É豸½¡¿µ¹ÜÀíºÍÔ¤²âÐÔά»¤¡¢¶àÉú²úÏßÅŲú¹ÜÀíÓëÓÅ»¯¡¢Éú²úÅŰàµ÷¶ÈÓëÓÅ»¯µÈÁìÓòµÄϵͳ·ÖÎö¡¢Éè¼Æ¡¢¿ª·¢ºÍÏîÄ¿¹ÜÀíµÈ´´ÐÂÓ¦Óá£
Èý¡¢»ñ½±ºÍÈÙÓþ
»ñ°²»ÕÊ¡½Ìѧ³É¹û½±¶þµÈ½±ºÍÈýµÈ½±¸÷1Ïî¡¢°²»ÕÊ¡µÚÆß½ì×ÔÈ»¿ÆÑ§ÓÅÐãѧÊõÂÛÎĶþµÈ½±¡¢°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌÓÅÐã½ÌѧÈýµÈ½±µÈ£»ÈÙ»ñ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ¡°ÓÅÐã¹²²úµ³Ô±¡±¡¢¡°Ë¼ÏëÕþÖι¤×÷ÏȽø¸öÈË¡±¡¢´óѧÉúÊîÆÚÉç»áʵ¼ù»î¶¯¡°ÓÅÐãÖ¸µ¼½Ìʦ¡±µÈÈÙÓþ³ÆºÅ¡£
ËÄ¡¢¿ÆÑÐÏîÄ¿
Ö÷³Ö»ò²ÎÓë¹ú¼Ò×ÔÈ»¿ÆÑ§»ù½ð¡¢°²»ÕÊ¡×ÔÈ»¿ÆÑ§»ù½ð¡¢¹ú¼ÒÖØµãʵÑéÊÒ¿ª·Å»ù½ðÏîÄ¿¡¢°²»ÕÊ¡¸ßУʡ¼¶×ÔÈ»¿ÆÑ§Ñо¿ÏîÄ¿¡¢ÎߺþÊпƼ¼¼Æ»®ÏîÄ¿¡¢°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ´´Ð»ù½ðÏîÄ¿µÈ¸÷Àà¿ÆÑÐÏîÄ¿20ÓàÏî¡£
Î塢ѧÊõÂÛÎÄ
ÔÚ¹úÄÚÍâѧÊõÆÚ¿¯ºÍ»áÒéÉÏ·¢±íѧÊõÂÛÎÄ40ÓàÆª£¬½ü5Äê·¢±íµÄÖ÷ÒªÂÛÎÄ£º
[1] ×ó¿ªÖУ¬ÁõÈÕÔ¿¡£¬ÚÈÕÂÒ壬³Â¸¶Áú, ÈÚºÏÓïÒåÐÅÏ¢µÄʱ¿Õ¹ØÁªÎ»ÖÃÒþ˽±£»¤·½·¨[J]. Î÷°²µç×ӿƼ¼´óѧѧ±¨, 2022, 49(01): 68-78.
[2] Wang Y, Zuo K, Liu R, et al. Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road Network[J]. International Journal of Network Security, 2021, 23(4): 642-649.
[3] Liu R, Zuo K, Wang Y, et al. Location privacy-preserving method based on degree of semantic distribution similarity[C]// International Conference of Pioneering Computer Scientists, Engineers and Educators, 2020: 118-129.
[4] Ôøº£Ñà, ×ó¿ªÖÐ*, ÍõÓÀ¼, µÈ. Â·Íø»·¾³ÏµÄÓïÒå¶àÑùÐÔλÖÃÒþ˽±£»¤·½·¨[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ, 2020, 56(07): 102-108.
[5] ÍõÓÀ¼, ×ó¿ªÖÐ*, Ôøº£Ñà, µÈ. ÃæÏòÁ¬Ðø²éѯµÄÃô¸ÐÓïÒåλÖÃÒþ˽±£»¤·½°¸[J]. ¼ÆËã»ú¹¤³ÌÓëÓ¦ÓÃ, 2020, 56(14): 74-81.
[6] Wang Yonglu, Zuo Kaizhong, Liu Rui, Guo Liangmin. Semantic location privacy protection based on privacy preference for road network[C]// International Conference of 11th International Symposium on Cyberspace Safety and Security, Lecture Notes in Computer Science,2019: 330-342.
[7] ×ó¿ªÖÐ,ÌÕ½¡,Ôøº£Ñà,ËïÀöƼ.»ùÓÚÓïÒå¿Õ¼äÄäÃûµÄ¹ì¼£Òƶ¯Ä£Ê½ÍÚ¾òËã·¨[J] ÐÅÏ¢ÍøÂ簲ȫ, 2018,(08):34-42.
[8] ×ó¿ªÖÐ,ÉÐÄþ,ÌÕ½¡,ÍõÌδº.Á½²ã´«¸ÐÍøÒþ˽±£»¤µÄ²»ÍêÈ«Êý¾ÝSkyline²éѯÐÒé[J].¼ÆËã»úÓ¦ÓÃ,2017,37(6): 1599-1604.
Áù¡¢ÖªÊ¶²úȨ
ÊÚȨ·¢Ã÷רÀû¡¢ÊµÓÃÐÂÐÍרÀûºÍÈí¼þÖø×÷Ȩ30ÓàÏÆäÖÐÒÔµÚÒ»Éè¼ÆÈËÊÚȨ·¢Ã÷רÀû3Ïî¡£
[1] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ÍõÓÀ¼,ÁõÈï,¶¡ÐÂÌÎ,ÂÞÓÀÁú. 2019111409950£¬Á¬Ðø²éѯÓïÒåλÖÃÒþ˽±£»¤·½·¨¼°Á¬Ðø²éѯϵͳ£¬2021Äꣻ
[2] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ÍõÓÀ¼,ÁõÈï,ÂÞÓÀÁú. 2019103618210£¬Ò»ÖÖÂ·Íø»·¾³Ï»ùÓÚÒþ˽ƫºÃµÄÓïÒåλÖÃÒþ˽±£»¤·½·¨£¬2021Äꣻ
[3] ÊÚȨ·¢Ã÷רÀû£º×ó¿ªÖÐ,ºúÅô,ÂÞÓÀÁú,¹ùÁ¼Ãô,ÍõÌδº.2013107312809£¬Òþ˽±£»¤µÄÁ½²ã´«¸ÐÍøSkyline²éѯϵͳ£¬2017Äê¡£
Æß¡¢Ñо¿ÉúÖ¸µ¼
ÒѱÏҵ˶ʿÉú10ÈË£¬ÆäÖУº2È˼ÌÐø¹¥¶Á²©Ê¿£¬3È˱¾¿Æ¸ßУ¹¤×÷£¬4ÈËÔÚ¸ßְԺУ¹¤×÷£¬1ÈËÔÚÆóÒµ¹¤×÷¡£ÔÚ¶Á˶ʿÉú8ÈË£¬ÆäÖУºÑ§Ë¶3ÈË£¬×¨Ë¶5ÈË¡£
°Ë¡¢±¾¿ÆÉúÖ¸µ¼
½ü5ÄêÀ´£¬»ý¼«Ö¸µ¼±¾¿ÆÉú²Î¼Ó¸÷Ààѧ¿Æ¾ºÈü¡¢·¢±íѧÊõÂÛÎÄ¡¢ÉêÇë´óѧÉú´´Ð´´ÒµÑµÁ·¼Æ»®ÏîÄ¿ºÍ±¾¿ÆÉúÓÅÐã±ÏÒµÂÛÎÄ(Éè¼Æ)ÅàÓý¼Æ»®ÏîÄ¿¡¢ÉêÇëÈí¼þÖø×÷ȨµÈ£¬Á¬ÐøÈýÄê»ñ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ¡°ÓÅÐã±¾¿ÆÉúµ¼Ê¦¡±³ÆºÅ¡£Ö¸µ¼Ñ§ÉúÔÚÈ«¹ú´óѧÉúÊýѧ½¨Ä£¾ºÈü¡¢Öйú´óѧÉú¼ÆËã»úÉè¼Æ´óÈü¡¢À¶Çűȫ¹úÈí¼þºÍÐÅÏ¢¼¼ÊõרҵÈ˲ŴóÈü¡¢È«¹úÐÅÏ¢¼¼ÊõÓ¦ÓÃˮƽ´óÈü¡¢Öйú»úÆ÷ÈË´óÈüôßROBOCUP¹«¿ªÈüµÈѧ¿Æ¾ºÈüÖлñ¹ú¼ÒÒ»µÈ½±1Ïî¡¢¶þµÈ½±4Ïî¡¢ÈýµÈ½±2Ïʡ¼¶½±Ïî20ÓàÏ»ñÅú¹ú¼Ò¼¶ºÍÊ¡¼¶´óѧÉú´´Ð´´ÒµÑµÁ·¼Æ»®ÏîÄ¿20ÓàÏ»ñÅú±¾¿ÆÉúÓÅÐã±ÏÒµÂÛÎÄ(Éè¼Æ)ÅàÓý¼Æ»®ÏîÄ¿10ÓàÏ±¾¿ÆÉúÒÔµÚÒ»×÷Õß·¢±íѧÊõÂÛÎÄ3ƪ£¬±¾¿ÆÉúÒÔµÚÒ»Éè¼ÆÈËÊÚȨʵÓÃÐÂÐÍרÀûºÍÈí¼þÖø×÷Ȩ10ÓàÏî¡£
¾Å¡¢ÁªÏµ·½Ê½
£¨1£©°ì¹«ÊÒ£ºÑ§Ô·ÄÏÂ¥2ºÅÂ¥104ÊÒ
£¨2£©E-mail£ºzuokz@ahnu.edu.cn
£¨3£©Í¨ÐŵØÖ·£º°²»ÕÊ¡ÎߺþÊоŻªÄÏ·189ºÅ°ëµºÓ¢³¬ºÏ×÷ÔÞÖúÉÌ£¬ 241002