期刊文献+
共找到1,424篇文章
< 1 2 72 >
每页显示 20 50 100
A Robust Framework for Multimodal Sentiment Analysis with Noisy Labels Generated from Distributed Data Annotation
1
作者 Kai Jiang Bin Cao Jing Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2965-2984,共20页
Multimodal sentiment analysis utilizes multimodal data such as text,facial expressions and voice to detect people’s attitudes.With the advent of distributed data collection and annotation,we can easily obtain and sha... Multimodal sentiment analysis utilizes multimodal data such as text,facial expressions and voice to detect people’s attitudes.With the advent of distributed data collection and annotation,we can easily obtain and share such multimodal data.However,due to professional discrepancies among annotators and lax quality control,noisy labels might be introduced.Recent research suggests that deep neural networks(DNNs)will overfit noisy labels,leading to the poor performance of the DNNs.To address this challenging problem,we present a Multimodal Robust Meta Learning framework(MRML)for multimodal sentiment analysis to resist noisy labels and correlate distinct modalities simultaneously.Specifically,we propose a two-layer fusion net to deeply fuse different modalities and improve the quality of the multimodal data features for label correction and network training.Besides,a multiple meta-learner(label corrector)strategy is proposed to enhance the label correction approach and prevent models from overfitting to noisy labels.We conducted experiments on three popular multimodal datasets to verify the superiority of ourmethod by comparing it with four baselines. 展开更多
关键词 Distributed data collection multimodal sentiment analysis meta learning learn with noisy labels
下载PDF
Joint UAV 3D deployment and sensor power allocation for energy-efficient and secure data collection
2
作者 王东 LI Guizhi +1 位作者 SUN Xiaojing WANG Changqing 《High Technology Letters》 EI CAS 2023年第3期223-230,共8页
Unmanned aerial vehicles(UAVs) are advantageous for data collection in wireless sensor networks(WSNs) due to its low cost of use,flexible deployment,controllable mobility,etc. However,how to cope with the inherent iss... Unmanned aerial vehicles(UAVs) are advantageous for data collection in wireless sensor networks(WSNs) due to its low cost of use,flexible deployment,controllable mobility,etc. However,how to cope with the inherent issues of energy limitation and data security in the WSNs is challenging in such an application paradigm. To this end,based on the framework of physical layer security,an optimization problem for maximizing secrecy energy efficiency(EE) of data collection is formulated,which focuses on optimizing the UAV’s positions and the sensors’ transmit power. To overcome the difficulties in solving the optimization problem,the methods of fractional programming and successive convex approximation are then adopted to gradually transform the original problem into a series of tractable subproblems which are solved in an iterative manner. As shown in simulation results,by the joint designs in the spatial domain of UAV and the power domain of sensors,the proposed algorithm achieves a significant improvement of secrecy EE and rate. 展开更多
关键词 physical layer security energy efficiency(EE) power allocation unmanned aerial vehicle(UAV) data collection wireless sensor network(WSN)
下载PDF
Data Envelopment Analysis Model for Assessment of Safety and Security of Intermodal Transportation Facilities
3
作者 Evangelos I.Kaisar Ramesh Teegavarapu Elisabeth Gundersen 《Journal of Traffic and Transportation Engineering》 2019年第5期191-205,共15页
Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the tran... Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the transportation infrastructure has historically been addressed as individual modes not as intermodal transportation. As a consequence of this inopportune allocation, it is now apparent that the transportation modes are disconnected and have unequal levels of security and efficiency. Improved intermodal connectivity has therefore been identified as one of the main challenges to achieve a safer, secure, and productive transportation network. Tools need to be refined for collaboration and consensus building to serve as catalysts for efficient transportation solutions. In this study, a mathematical model using data envelopment analysis (DEA) was developed and investigated to assess the safety and security of intermodal transportation facilities. The model identifies the best and worst performers by assessing several safety and security-related variables. The DEA model can assess the efficiency level of safety and security of intermodal facilities and identify potential solutions for improvement. The DEA methodology presented is general in its framework and can be applied to any network of intermodal transportation systems. Availability of credible data, complemented with DEA methodology will help in management decisions making concrete safety and security decisions for intermodal transportation facilities. 展开更多
关键词 Intermodal TRANSPORTATION security SAFETY data envelopment analysis (DEA).
下载PDF
A novel medical image data protection scheme for smart healthcare system
4
作者 Mujeeb Ur Rehman Arslan Shafique +6 位作者 Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第4期821-836,共16页
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ... The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks. 展开更多
关键词 data analysis medical image processing security
下载PDF
Novel Static Security and Stability Control of Power Systems Based on Artificial Emotional Lazy Q-Learning
5
作者 Tao Bao Xiyuan Ma +3 位作者 Zhuohuan Li Duotong Yang Pengyu Wang Changcheng Zhou 《Energy Engineering》 EI 2024年第6期1713-1737,共25页
The stability problem of power grids has become increasingly serious in recent years as the size of novel power systems increases.In order to improve and ensure the stable operation of the novel power system,this stud... The stability problem of power grids has become increasingly serious in recent years as the size of novel power systems increases.In order to improve and ensure the stable operation of the novel power system,this study proposes an artificial emotional lazy Q-learning method,which combines artificial emotion,lazy learning,and reinforcement learning for static security and stability analysis of power systems.Moreover,this study compares the analysis results of the proposed method with those of the small disturbance method for a stand-alone power system and verifies that the proposed lazy Q-learning method is able to effectively screen useful data for learning,and improve the static security stability of the new type of power system more effectively than the traditional proportional-integral-differential control and Q-learning methods. 展开更多
关键词 Artificial sentiment static secure stable analysis Q-LEARNING lazy learning data filtering
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
6
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security Network security Cyber Resilience Real-Time Threat analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
7
作者 Sina Ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud security Threat analysis Mitigation Strategies Emerging Trends Ethi-cal Considerations data analysis
下载PDF
Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN
8
作者 S.Ponnarasi T.Rajendran 《Computers, Materials & Continua》 SCIE EI 2023年第6期6039-6057,共19页
An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The metho... An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection.The method first discovers the routes between the data sensors and the sink node.Several factors are considered for each sensor node along the route,including energy,number of neighbours,previous transmissions,and energy depletion ratio.Considering all these variables,the Sink Reachable Support Measure and the Secure Communication Support Measure,the method evaluates two distinct measures.The method calculates the data carrier support value using these two metrics.A single route is chosen to collect data based on the value of data carrier support.It has contributed to the design of Secure Communication Support(SCS)Estimation.This has been measured according to the strategy of each hop of the route.The suggested method improves the security and efficacy of data collection in wireless sensor networks.The second stage uses the two-fish approach to build a trust model for secure data transfer.A sim-ulation exercise was conducted to evaluate the effectiveness of the suggested framework.Metrics,including PDR,end-to-end latency,and average residual energy,were assessed for the proposed model.The efficiency of the suggested route design serves as evidence for the average residual energy for the proposed framework. 展开更多
关键词 data carrier support data collection neighbor strategy secure routing wireless sensor network
下载PDF
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
9
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 security risk factor identification Heterogeneous data Grey relational analysis model Relational degree Information entropy Conditional entropy Small reservoir GUANGXI
下载PDF
A multiple sensitive attributes data publishing method with guaranteed information utility
10
作者 Haibin Zhu Tong Yi +3 位作者 Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期288-296,共9页
Data publishing methods can provide available information for analysis while preserving privacy.The multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep ... Data publishing methods can provide available information for analysis while preserving privacy.The multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many records from being grouped and bring in a high record suppression ratio.Another category of multiple sensitive attributes data publishing,which reduces the possibility of record suppression by breaking the relationship between sensitive attributes,cannot provide the sensitive attributes association for analysis.Hence,the existing multiple sensitive attributes data publishing fails to fully account for the comprehensive information utility.To acquire a guaranteed information utility,this article defines comprehensive information loss that considers both the suppression of records and the relationship between sensitive attributes.A heuristic method is leveraged to discover the optimal anonymity scheme that has the lowest comprehensive information loss.The experimental results verify the practice of the proposed data publishing method with multiple sensitive attributes.The proposed method can guarantee information utility when compared with previous ones. 展开更多
关键词 data analysis data privacy security of data
下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
11
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 Mobile IIoT networks data secure transmission Performance analysis Intelligent prediction Improved CNN
下载PDF
Research on Heterogeneous Data Sharing in Early Warning System for Grain Security
12
作者 GUO Heng-chuan,ZHAO Guo-zeng Department of Computer and Information Engineering,Luoyang Institute of Science and Technolog,Luoyang 471023 《Agricultural Science & Technology》 CAS 2010年第5期174-177,共4页
The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,... The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,the problem-solution approach of heterogeneous data sharing was discussed through middleware technologies. Based on this method,and according to the characteristics of early warning system for grain security,the technology of data sharing in this system were researched and explored to solve the issues of collection of heterogeneous data sharing. 展开更多
关键词 Middle ware Early Waming System Web XML dataset
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
13
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
A Collaborative Medical Diagnosis System Without Sharing Patient Data 被引量:1
14
作者 NAN Yucen FANG Minghao +2 位作者 ZOU Xiaojing DOU Yutao Albert Y.ZOMAYA 《ZTE Communications》 2022年第3期3-16,共14页
As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploi... As more medical data become digitalized,machine learning is regarded as a promising tool for constructing medical decision support systems.Even with vast medical data volumes,machine learning is still not fully exploiting its potential because the data usually sits in data silos,and privacy and security regulations restrict their access and use.To address these issues,we built a secured and explainable machine learning framework,called explainable federated XGBoost(EXPERTS),which can share valuable information among different medical institutions to improve the learning results without sharing the patients’ data.It also reveals how the machine makes a decision through eigenvalues to offer a more insightful answer to medical professionals.To study the performance,we evaluate our approach by real-world datasets,and our approach outperforms the benchmark algorithms under both federated learning and non-federated learning frameworks. 展开更多
关键词 explainable machine learning federated learning secured data analysis medical applications
下载PDF
DISTINIT:Data poISoning atTacks dectectIon usiNg optIized jaCcard disTance
15
作者 Maria Sameen Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第12期4559-4576,共18页
Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverag... Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverage this loophole and design data poisoning attacks against ML systems.Data poisoning attacks are a type of attack in which an adversary manipulates the training dataset to degrade the ML system’s performance.Data poisoning attacks are challenging to detect,and even more difficult to respond to,particularly in the Internet of Things(IoT)environment.To address this problem,we proposed DISTINIT,the first proactive data poisoning attack detection framework using distancemeasures.We found that Jaccard Distance(JD)can be used in the DISTINIT(among other distance measures)and we finally improved the JD to attain an Optimized JD(OJD)with lower time and space complexity.Our security analysis shows that the DISTINIT is secure against data poisoning attacks by considering key features of adversarial attacks.We conclude that the proposed OJD-based DISTINIT is effective and efficient against data poisoning attacks where in-time detection is critical for IoT applications with large volumes of streaming data. 展开更多
关键词 data poisoning attacks detection framework jaccard distance(JD) optimized jaccard distance(OJD) security analysis
下载PDF
Cyberspace Security Using Adversarial Learning and Conformal Prediction
16
作者 Harry Wechsler 《Intelligent Information Management》 2015年第4期195-222,共28页
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactic... This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted?self-managing defensive shield to detect, disrupt, and deny intrusive attacks, hostile and malicious behavior, and subterfuge. Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns and messages as friend or foe and to respond to them accordingly. The solutions proffered throughout are built around active learning, meta-reasoning, randomness, distributed semantics and stratification, and most important and above all around adaptive Oracles. The motivation for using conformal prediction and its immediate off-spring, those of semi-supervised learning and transduction, comes from them first and foremost supporting discriminative and non-parametric methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence indices that assist meta-reasoning and information fusion. 展开更多
关键词 Active LEARNING Adversarial LEARNING Anomaly DETECTION Change DETECTION CONFORMAL PREDICTION Cyber security data Mining DENIAL and Deception Human Factors INSIDER Threats Intrusion DETECTION Meta-Reasoning Moving Target Defense Performance Evaluation Randomness Semi-Supervised LEARNING Sequence analysis Statistical LEARNING Transduction
下载PDF
Human and Machine Vision Based Indian Race Classification Using Modified-Convolutional Neural Network
17
作者 Vani A.Hiremani Kishore Kumar Senapati 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2603-2618,共16页
The inter-class face classification problem is more reasonable than the intra-class classification problem.To address this issue,we have carried out empirical research on classifying Indian people to their geographica... The inter-class face classification problem is more reasonable than the intra-class classification problem.To address this issue,we have carried out empirical research on classifying Indian people to their geographical regions.This work aimed to construct a computational classification model for classifying Indian regional face images acquired from south and east regions of India,referring to human vision.We have created an Automated Human Intelligence System(AHIS)to evaluate human visual capabilities.Analysis of AHIS response showed that face shape is a discriminative feature among the other facial features.We have developed a modified convolutional neural network to characterize the human vision response to improve face classification accuracy.The proposed model achieved mean F1 and Matthew Correlation Coefficient(MCC)of 0.92 and 0.84,respectively,on the validation set,outperforming the traditional Convolutional Neural Network(CNN).The CNN-Contoured Face(CNN-FC)model is developed to train contoured face images to investigate the influence of face shape.Finally,to cross-validate the accuracy of these models,the traditional CNN model is trained on the same dataset.With an accuracy of 92.98%,the Modified-CNN(M-CNN)model has demonstrated that the proposed method could facilitate the tangible impact in intra-classification problems.A novel Indian regional face dataset is created for supporting this supervised classification work,and it will be available to the research community. 展开更多
关键词 data collection and preparation human vision analysis machine vision canny edge approximation method color local binary patterns convolutional neural network
下载PDF
政策工具和政策特性视角下《数据安全法》内容解析 被引量:1
18
作者 赵静 王林林 +1 位作者 杨梦翔 张倩 《郑州航空工业管理学院学报(社会科学版)》 2024年第2期96-103,共8页
数据安全是数据经济健康快速发展的重要保障。本研究以《中华人民共和国数据安全法》的政策文本为对象,运用内容分析法和共词分析法分别从政策工具和政策特性的视角进行分析。在政策工具视角下,环境型政策工具占比最大,供给型政策工具次... 数据安全是数据经济健康快速发展的重要保障。本研究以《中华人民共和国数据安全法》的政策文本为对象,运用内容分析法和共词分析法分别从政策工具和政策特性的视角进行分析。在政策工具视角下,环境型政策工具占比最大,供给型政策工具次之,而需求型政策工具则相对缺乏;从政策特性角度看,具有数据保护的义务性、数据获取的规范性、数据应用的需求性、数据责任的具体化四个特性。 展开更多
关键词 数据安全 政策工具 政策特性 内容分析 共词分析
下载PDF
消费行为数据采集平台的安全保障与预测模型研究
19
作者 李健俊 汪华文 +1 位作者 董惠良 陈翔 《信息安全研究》 CSCD 北大核心 2024年第7期649-657,共9页
依据用户浏览记录等信息进行兴趣爱好的预测并进行合理推荐,已成为诸多销售平台优化用户体验的常用手段,而用户信息安全问题自然也成了各大平台面临的一大挑战.提出一种基于内生安全的消费行为数据采集与分析平台,通过采集用户数据,使... 依据用户浏览记录等信息进行兴趣爱好的预测并进行合理推荐,已成为诸多销售平台优化用户体验的常用手段,而用户信息安全问题自然也成了各大平台面临的一大挑战.提出一种基于内生安全的消费行为数据采集与分析平台,通过采集用户数据,使用基于长短时记忆网络的预测模型,精准预测未来销售流量数据.在数据安全性方面,平台使用基于内生安全的拟态云WAF,通过动态选择算法、异构执行体和裁决算法3种核心技术为整个数据平台提供了自主可控的安全保障,并利用基于Sketch的网络测量技术对异常流量进行了检测.此外,平台融合了数据备份和恢复、加密存储、数据传输加密技术,并对重要的数据采取分类存储、访问控制等措施.多项对比实验验证表明,用于中烟销售流量的预测平台相较于目前提出的多种技术在预测准确度和数据安全方面都有显著提升,可为企业销量预测提供一种合理可行的解决方案. 展开更多
关键词 销量预测 长短时记忆网络 内生安全 拟态云 数据采集
下载PDF
AIGC对传播学定量研究的意义
20
作者 刘德寰 张涵 《新媒体与社会》 2024年第2期1-13,M0004,共14页
人工智能内容生产对于学术研究产生了巨大的影响力,从生产力的角度重塑了学术研究的范式。本文通过分析AIGC(人工智能生成内容)对传播学定量研究的影响,探寻其对于文献综述、数据收集处理和数据分析的意义。结果表明,AIGC在以上三个环... 人工智能内容生产对于学术研究产生了巨大的影响力,从生产力的角度重塑了学术研究的范式。本文通过分析AIGC(人工智能生成内容)对传播学定量研究的影响,探寻其对于文献综述、数据收集处理和数据分析的意义。结果表明,AIGC在以上三个环节当中都能起到不同程度的功能性作用,但仍然存在一定的机器局限性,主要表现为在功能性方面有待提升,在思辨性方面不尽如人意。研究强调了人类独有思辨思维的不可替代性,并针对基于机器固定算法的主观生成提出质疑,认为这种方式可能破坏社会科学研究的客观性质。 展开更多
关键词 AIGC 定量研究 传播学 数据收集处理 数据分析
下载PDF
上一页 1 2 72 下一页 到第
使用帮助 返回顶部