Affiliation:
1. Institute of Automation, Beijing Information Science and Technology University, Beijing 100192, China
Abstract
For classified and sensitive electronic documents within the scope of enterprises and organizations, in order to standardize and strengthen the confidentiality management of enterprises and meet the actual needs of secret text classification, a document automatic classification optimization method based on keyword retrieval and the kNN classification algorithm is proposed. The method supports keyword classification management, provides users with keywords of multiple risk levels, and then combines a matching scanning algorithm to label keywords of different levels. The text with labels is used as the training set of the kNN algorithm to classify the target text and realize the classification protection of text data. Aimed at solving the shortcomings of large feature vector dimension, low classification efficiency, and low accuracy in existing kNN text classification methods, an optimization method is proposed using a feature selection algorithm and a kNN algorithm based on an AVX instruction set to realize real-time classification of massive texts. By constructing a keyword dictionary and an optimized feature vector, parallel calculation of the feature vector weight and distance vector is realized, and the accuracy and efficiency of text classification are improved. The experimental results show that the multi-classification effect of the feature selection algorithm used in this paper, tf-DE, is better than that of the traditional tf-idf algorithm, and the classification effect of kNN is comparable to that of the support vector machine (SVM) algorithm. With the increase in feature vector dimensions, the classification effect of the text classification algorithm is improved and the classification time also increases linearly. The AVX-256 acceleration method takes about 55% of the time of the original version, thus verifying the effect of multi-classification of massive texts for document confidentiality management.
Reference41 articles.
1. A new approach to designing firewall based on multidimensional matrix;Cheng;Concurr. Comput. Pr. Exp.,2013
2. Flow-based intrusion detection: Techniques and challenges—ScienceDirect;Umer;Comput. Secur.,2017
3. Modeling and analysis of the effects of antivirus software on an infected computer network;Shukla;Appl. Math. Comput.,2014
4. An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations—ScienceDirect;Wijn;Comput. Secur.,2020
5. Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format;Jiang;IEEE Trans. Serv. Comput.,2018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献