期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Information Privacy Protection in the New Chinese Civil Code:Priority or Replacement?
1
作者 李晓辉 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期313-338,共26页
The right to privacy has been developed through judicial practice and has evolved from"the protection of the right to reputation" to"privacy interest"then to"privacy right." The Civil Cod... The right to privacy has been developed through judicial practice and has evolved from"the protection of the right to reputation" to"privacy interest"then to"privacy right." The Civil Code of the People's Republic of China(2020)clarifies the right to information privacy and the right to personal information as two independent personality rights and establishes a privacy priority protection mechanism for private information in civil law.The comparative efficiency of the right to personal information may mean that the protection of the right to information privacy is weakened or even replaced by the right to personal information.The uncertainty and fragmentation of private information also creates a wide gray space for judicial decisions.The development from traditional privacy right to information privacy right and personal information right is generally positive and shows the active legal response to the protection of private information in multiple ways.However,clarifications and systematization are required to increase the effectiveness of such protections. 展开更多
关键词 information privacy right to personal information civil law
原文传递
Preliminary Analysis of the Protection of Privacy in the Information Network Age
2
作者 SI JINQUAN 《The Journal of Human Rights》 2013年第4期20-25,共6页
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a... The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks. 展开更多
关键词 Preliminary Analysis of the Protection of privacy in the information Network Age
下载PDF
OTT Messages Modeling and Classification Based on Recurrent Neural Networks 被引量:3
3
作者 Guangyong Yang Jianqiu Zeng +3 位作者 Mengke Yang Yifei Wei Xiangqing Wang Zulfiqar Hussain Pathan 《Computers, Materials & Continua》 SCIE EI 2020年第5期769-785,共17页
A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectivel... A vast amount of information has been produced in recent years,which brings a huge challenge to information management.The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages.In this paper,we propose a nine-rectangle-grid information model according to the information value and privacy,and then present information use policies based on the rough set theory.Recurrent neural networks were employed to classify OTT messages.The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages,ending with a reliable trained classification model.Experimental results showed that the proposed method yielded an accurate classification performance and hence can be used for effective distribution and control of OTT messages. 展开更多
关键词 OTT messages information privacy nine-rectangle-grid hierarchical classification recurrent neural networks
下载PDF
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic 被引量:1
4
作者 Mohammed Baz Sabita Khatri +3 位作者 Abdullah Baz Hosam Alhakami Alka Agrawal Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期691-702,共12页
The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020,provide critical research criteria to assess the vulnerabilities of our cur... The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020,provide critical research criteria to assess the vulnerabilities of our current health system.The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness,about public health and healthcare mechanisms.In view of this unprecedented health crisis,distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages,and with the higher efficacy.At the implementation level,blockchain integration,early detection and avoidance of an outbreak,identity protection and safety,and a secure drug supply chain can be realized.At the opposite end of the continuum,artificial intelligence methods are used to detect corona effects until they become too serious,avoiding costly drug processing.The paper explores the application of blockchain and artificial intelligence in order to fight with COVID-19 epidemic scenarios.This paper analyzes all possible newly emerging cases that are employing these two technologies for combating a pandemic like COVID-19 along with major challenges which cover all technological and motivational factors.This paper has also discusses the potential challenges and whether further production is required to establish a health monitoring system. 展开更多
关键词 Artificial intelligence information privacy machine learning coronavirus(COVID-19) SARS-CoV-2 EPIDEMIC
下载PDF
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking Technology
5
作者 WANG Chundong BAI Yi MO Xiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期505-511,共7页
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss. 展开更多
关键词 the Internet of Things(IoT) data security com pressed sensing(CS) digital watermarking information privacy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部