Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part II |
Autore | Tian Yuan |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (219 pages) |
Altri autori (Persone) |
MaTinghuai
KhanMuhammad Khurram |
Collana | Communications in Computer and Information Science Series |
ISBN |
9789819743902
9789819743896 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Data Technology and Network Security -- SodStereo: An Effective Multi-task Learning Network for Stereo Matching and Salient Object Detection -- 1 Introduction -- 2 Related Work -- 2.1 Stereo Matching -- 2.2 Cost Volume Construction -- 2.3 Salient Object Detection -- 2.4 Multi-task Structure for Disparity Estimation Task -- 3 Method -- 3.1 Basic Network -- 3.2 Double Residual Attention -- 3.3 Disparity Regression and Loss -- 4 Experiments -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Attention Analysis -- 4.4 Ablation Study -- 4.5 Comparisons with Other Stereo Methods -- 5 Conclusion -- References -- Asymptotic Physics-Informed Neural Networks for Solving Singularly Perturbed Problems -- 1 Introduction -- 2 Related Work -- 2.1 Physics-Informed Neural Networks -- 2.2 PINNs for Singularly Perturbed Problems -- 3 Methodology -- 3.1 Preliminary Knowledge About PINNs -- 3.2 Preliminary Knowledge About Shishkin Meshes -- 3.3 Preliminary Knowledge About Domain Decomposition -- 3.4 Asymptotic Physics-Informed Neural Networks (A-PINNs) -- 4 Numerical Results -- 4.1 Test Case 1 -- 4.2 Test Case 2 -- 4.3 Test Case 3 -- 4.4 Test Case 4 -- 4.5 Test Case 5 -- 5 Conclusion -- References -- Development of U-net Neural Network for Biomedical Images with Big Data -- 1 Development of UNN -- 1.1 The Basic UNN -- 1.2 U-net++ NN -- 1.3 3D UNN -- 1.4 Res UNN -- 1.5 Attention UNN -- 2 Application of Approved UNN -- 2.1 CT and MRI Image Segmentation -- 2.2 Fundus Images Segmentation -- 2.3 Photoacoustic Image Segmentation -- 2.4 Optical Coherence Tomography Segmentation -- 2.5 Microscopic Imaging in Histological Slides -- 3 Conclusion -- References -- Research on Implementation of BADGE Active Learning to Increase Defect Detection Effectiveness -- 1 Introduction.
2 YOLO and BADGE Overview -- 2.1 You Only Look Once (YOLO) -- 2.2 Batch Active Learning by Diverse Gradient Embeddings (BADGE) -- 3 YOLOv5 and BADGE Integration -- 3.1 The Advantages of Integrating YOLO and BADGE Active Learning -- 3.2 Integrating YOLOv5 and BADGE -- 4 Experimentation, Challenges, and Proposed Solutions -- 4.1 Experiments -- 4.2 Challenges -- 4.3 Proposed Solutions -- 5 Future Works -- 6 Conclusion -- References -- Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection -- 1 Introduction -- 2 Related Work -- 2.1 Methods Based on Temporal Correlation -- 2.2 Methods Based on Spatial Correlation -- 2.3 Methods Based on Spatial-Temporal Correlation -- 3 Stationary Multi-scale Hierarchical Dilated Convolution -- 3.1 Problem Formulation -- 3.2 Proposed Framework -- 3.3 Sequence Normalization and De-Normalization -- 3.4 Graph Structure Learning -- 3.5 Graph Convolution -- 3.6 Hierarchical Dilated Convolution -- 3.7 BiLSTM Reconstruction -- 4 Experiment -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Experiment Setup -- 4.4 Experiment Results -- 4.5 Ablation Studies -- 4.6 Case Study -- 5 Conclusion -- References -- Design of Human Resource Optimal Allocation Model for Electric Power Construction Enterprises Based on Machine Learning -- 1 Introduction -- 2 Human Resource Optimal Allocation Theory and Machine Learning -- 2.1 The Concept of Human Resource Allocation -- 2.2 Electric Power Construction Enterprises -- 2.3 Machine Learning -- 2.4 The Model of Machine Learning in Human Resources -- 3 Data Processing and Results -- 4 Conclusions -- References -- Research on the Construction of Digital Education Cloud Resource Database Based on Ant Colony Algorithm -- 1 Introduction -- 2 Ant Colony Algorithm -- 2.1 Ant Colony Algorithm Definition -- 2.2 The Basic Principle of Ant Colony Algorithm. 2.3 Advantages and Disadvantages of Ant Colony Algorithm -- 3 The Construction of Education Resource Library Based on Cloud Computing -- 4 Conclusions -- References -- Simulation of Short-Term Prediction Model of Real Estate Price Index Based on Neural Network Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Concept and Data Source of Real Estate Price Index -- 2.2 Prediction Model of Real Estate Price Index -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- IoT Security and Privacy Protection -- PLMR: An Efficient Pre-trained Model for Aircraft Maneuver Recognition -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Masked Trajectory Modeling -- 3.2 PLMR Module -- 3.3 Fine-Tuning Stage -- 4 Experiments -- 4.1 Experimental Datasets and Parameter Setting -- 4.2 Results and Analysis -- 5 Conclusion -- References -- Blockchain-Based WeChat Small Program Platform: A New Type of Data Security and Management Solution -- 1 Introduction -- 2 Related Work -- 3 Blockchain-Based Volunteer Privacy Protection Scheme -- 3.1 Blockchain -- 3.2 WeChat Small Program and Big Data Security -- 3.3 WMP-BDPF Architecture Design -- 4 Comparison of WMP-BDPF with Existing Schemes -- 5 Conclusions -- 5.1 Major Contributions -- 5.2 Future Research Direction -- References -- A Survey of Edge Computing Resource Allocation and Task Scheduling Optimization -- 1 Introduction -- 2 Problems, Objectives and Constraints -- 2.1 Optimization Objectives -- 2.2 Optimization Constraints -- 3 Methods -- 3.1 Numerical Methods -- 3.2 Learning-Based Methods -- 4 Conclusion -- References -- An Algorithm for Analyzing Psychological Characteristics in Music Education Based on Markov Model -- 1 Introduction -- 2 Methodology -- 2.1 Related Technical Basis -- 2.2 Analysis Algorithm of Psychological Characteristics Based on Markov Model -- 3 Result Analysis and Discussion. 4 Conclusions -- References -- Enhancing Privacy Strategy in New Power Systems: Problem Assessment, Comparative Analysis and Suggestions -- 1 Introduction -- 2 Basic Concepts of Privacy Computing -- 3 Current Analysis of Privacy Computing Applications in New Power Systems -- 3.1 Applications Scenarios Based on Cryptographic Security -- 3.2 Applications Securely Based on Statistical Approaches -- 4 Technology-Related Issues in Privacy Computing -- 5 Solution Opinions for Problems Related to Privacy Computing in New Power Systems -- 6 Conclusion -- References -- Internet Public Opinion Evolution Model and Simulation Based on Big Data and Grey Clustering Algorithm Under New Media Environment -- 1 Introduction -- 2 Network Public Opinion on Emergencies -- 3 Research on the Evolution Model of Internet Public Opinion Under the Influence of Media -- 3.1 Construction and Improvement of Birch Model -- 4 Conclusion -- References -- Simulation of Regional Financial and Economic Development Decision Model Based on Decision Tree Algorithm -- 1 Introduction -- 2 Model Setting and Variable Selection -- 2.1 Model Settings -- 2.2 Variable Selection -- 3 Analysis of the Causes of Financial Constraints -- 3.1 Low Level of Economic Development and Insufficient Capacity to Absorb Funds -- 3.2 Estimation Method and Result Analysis -- 4 Conclusions -- References -- Simulation Research on Pre-alarm Model of Enterprise Shared Financial Crisis Based on Genetic Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Content of Enterprise Financial Risk Under Financial Sharing Mode -- 2.2 Pre-alarm Model of Enterprise Sharing Financial Crisis -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- Research on Accurate Poverty Alleviation Algorithm of Rural Industry Based on Association Rules Mining -- 1 Introduction. 2 Connotation of Rural E-commerce Precision Poverty Alleviation -- 3 Mining Poverty Features Based on Association Rule Algorithm -- 3.1 Pretreatment of Multi-dimensional Poverty Characteristics of Farmers -- 3.2 Study on Poverty Characteristics of Farmers Based on Apriori Algorithm -- 4 Algorithm Simulation Analysis -- 5 Conclusion -- References -- Compute First Networking Scheduling Strategy Based on Genetic Algorithm in Edge Computing Environment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Network Model -- 2.2 Scheduling Model -- 3 Network Model and Scheduling Model -- 3.1 Improved Genetic Algorithm Task Transfer -- 3.2 Generation of Initial Population -- 3.3 Fitness Function -- 3.4 Genetic Manipulation -- 4 Simulation Results -- 4.1 Performance Results -- 4.2 Results Analysis -- 5 Conclusions -- References -- Author Index. |
Record Nr. | UNINA-9910874656403321 |
Tian Yuan | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part I |
Autore | Tian Yuan |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (258 pages) |
Altri autori (Persone) |
MaTinghuai
KhanMuhammad Khurram |
Collana | Communications in Computer and Information Science Series |
ISBN |
9789819743872
9789819743865 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Big Data and New Method -- Recurrent Age Recognition Based on Manifold Learning -- 1 Introduction -- 2 Related Work -- 3 The Proposed Methodology MLPAP -- 3.1 Improved Age Label Distribution -- 3.2 Personal Aging Pattern -- 3.3 MLPAP -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Network Initialization and Training -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- A Three Layer Chinese Sentiment Polarity Detection Framework with Case Study -- 1 Introduction -- 2 Related Work -- 3 A Specialized Framework -- 3.1 Module 1-3: Sentence Collector, Corpora Learner and Basic Lexicons -- 3.2 Module 4: Lexicon Producer -- 3.3 Module 5: Vector Transformer and New Corpora -- 4 Experimental Analysis -- 5 Conclusion -- References -- Big Data Intelligence Empowered Specialized Disciplines Development Pattern Recognition in Power Industry Universities -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Source -- 3.2 Research Design -- 4 Results -- 4.1 Characteristics of Disciplinary Development of NCEPU -- 4.2 Characteristics of Disciplinary Development of SUEP -- 4.3 Characteristics of Disciplinary Development of CSUST -- 4.4 Characteristics of Disciplinary Development of NJIT -- 5 Conclusion and Discussion -- 5.1 Highly Interdisciplinary Integration -- 5.2 Multidisciplinary Collaborative Innovation -- 5.3 Deepening Disciplinary Culture Construction -- References -- A Survey on Real-Time Semantic Segmentation Based on Deep Learning -- 1 Introduction -- 2 Real-Time Semantic Segmentation Network -- 2.1 Single-Branch Network -- 2.2 Double-Branch Network -- 2.3 Three-Branch Network -- 3 Feature Fusion Module -- 3.1 Serial Connection Structure -- 3.2 Parallel Multi-branch Structure -- 4 Model Performance Evaluation.
4.1 Datasets -- 4.2 Metrics -- 4.3 Model Comparison -- 5 Future Research Trends and Conclusions -- References -- A Clustering Method for Distribution Network Load Curve Based on Fast DDTW -- 1 Introduction -- 2 Dynamic Time Warping Algorithm -- 2.1 DTW Algorithm -- 2.2 The Necessity of Using DTW for Similarity Measurement -- 2.3 The "Singularity" Problem of Dynamic Time Planning -- 3 K-Medoids Clustering Method Based on Fast DDTW -- 3.1 Derivative Dynamic Time Warping -- 3.2 Fast DDTW Clustering Algorithm -- 3.3 Gaussian Filter -- 3.4 K-Medoids Clustering -- 4 Calculation Example Analysis -- 4.1 Data Preprocessing -- 4.2 Clustering Quality Evaluation Index -- 4.3 Algorithm Evaluation -- 5 Conclusion -- References -- Object Detection Model Based on Attention Mechanism -- 1 Introduction -- 2 Relevant Technology -- 2.1 Introduction to YOLO Series Models -- 2.2 Attention Mechanism -- 2.3 Data Set Introduction -- 3 The Object Detection Method Based on Attention Mechanism -- 3.1 YOLOv7 Network Structure -- 3.2 Network Architecture Design -- 4 Experimental Results and Analysis -- 4.1 Experimental Environment -- 4.2 Training Parameters -- 4.3 Experimental Dataset -- 4.4 Evaluation Metrics -- 4.5 Comparative Experiments -- 5 Conclusion -- References -- Gas Pressure Prediction and Application with Missing Data Imputation Techniques for Gas Regulator Data -- 1 Introduction -- 2 Methodology -- 2.1 Imputation -- 2.2 Prediction -- 3 Dataset Introduction and Processing -- 3.1 Dataset -- 3.2 Data Characteristics -- 3.3 Data Preprocessing -- 4 Result -- 4.1 Evaluation Method -- 4.2 Gas Pressure Imputation -- 4.3 Gas Pressure Prediction -- 4.4 Implementation of Gas Pressure Prediction Models -- 4.5 Result of Gas Pressure Prediction -- 5 Conclusion -- References. Advances, Patterns and Future Potential of Big Data Technology Research for New Energy Sources and Energy Storage Systems -- 1 Introduction -- 2 Advancements in the Research of BD Technology for NEP and ESS -- 3 Research Trends of BD Application in NEP and ESS -- 3.1 Multidimensional Data Analysis -- 3.2 Provision of Historical Data Services -- 3.3 Expanded Usage Scenarios -- 3.4 Comprehensive Monitoring and Management -- 4 Future Research Directions in NEP and ESS Based on BD Technology -- 5 Conclusion -- References -- Construction of Enterprise Capital Allocation Efficiency Model Based on Fuzzy Clustering Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Theoretical Analysis of Enterprise Financial Management -- 2.2 Enterprise Capital Allocation Efficiency Model -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- Artificial Intelligence and Machine Learning -- Analysing Potential of ResNet for Transfer Learning with Stochastic Depth -- 1 Introduction -- 2 Related Work -- 2.1 Dropout -- 2.2 Transfer Learning -- 2.3 Deep Residual Network and Stochastic Depth -- 3 Methodology -- 4 Experiment and Results -- 4.1 CIFAR-10 -- 4.2 OXFORD-IIIT PET -- 5 Conclusion -- References -- A Survey of Research Progresses on Instance Segmentation Based on Deep Learning -- 1 Introduction -- 2 DL-BASED Instance Segmentation Methods -- 2.1 Fully Supervised Learning -- 2.2 Semi-supervised Learning Method -- 2.3 Unsupervised Learning Method -- 3 Datasets and Experimental Evaluation -- 3.1 MS COCO Dataset -- 3.2 Cityscapes Dataset -- 3.3 Other Special Scenario Datasets -- 4 Application -- 4.1 Intelligent Driving Field -- 4.2 Face Recognition Field -- 4.3 Medical Field -- 4.4 Industrial Manufacturing Field -- 4.5 Agricultural Field -- 5 Prospect and Conclusion -- References. Charting the Landscape of Multi-view Stereo: An In-Depth Exploration of Deep Learning Techniques -- 1 Introduction -- 2 Background -- 3 Depth Map-Based Approaches -- 4 Volumetric Approaches -- 5 Semi-supervised and Unsupervised Approaches -- 6 MVS Benchmarks -- 7 Conclusion -- References -- A Survey of Federated Learning: Review, Attacks, Defenses -- 1 Introduction -- 2 Overview of FL -- 2.1 Federated Learning -- 2.2 Types of FL -- 3 Poisoning Attacks and Defenses of FL -- 3.1 Data Poisoning Attacks -- 3.2 Model Poisoning Attacks -- 3.3 Defenses -- 4 Summary -- References -- ROMA: Reverse Model-Based Data Augmentation for Offline Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Offline RL -- 2.2 Data Augmentation (DA) -- 3 Trajectory Augment by Reversed Model -- 3.1 Preliminaries -- 3.2 Constructing the Virtual Transition Dataset -- 3.3 Training the Reverse Model -- 3.4 Improving Trajectory Quality by Splicing -- 3.5 Combination with Model-Free Algorithms -- 4 Experiments -- 4.1 Simple Environment -- 4.2 Continuous Environment -- 5 Discussion -- 6 Conclusion -- References -- Application Research of Digital Intelligence Technology in Mining Electric Power Equipment Fault Cases: Taking Text Mining Technology as an Example -- 1 Introduction -- 2 Overview of Text Mining -- 2.1 Development Process of Text Mining -- 2.2 Difficulties in Text Mining -- 3 Text Mining Framework Construction for Typical Fault Cases of Power Equipment -- 4 Text Mining Application for Typical Fault Cases of Electric Power Equipment -- 4.1 Power Equipment Fault Name Entity Recognition -- 4.2 Power Equipment Fault Entity Relationship Extraction -- 4.3 Construction of Knowledge Graph for Fault Power Equipment -- 4.4 Automatic Evaluation of Power Equipment Health Status -- 5 Prospect of Text Mining for Typical Failure Cases of Electric Power Equipment -- 6 Conclusion. References -- Deep Learning-Based Attribute Graph Clustering: An Overview -- 1 Introduction -- 2 Related Work -- 2.1 Notations -- 2.2 Data Augmentation -- 2.3 Pretraining -- 3 Overview of Recent Graph Clustering Methods -- 3.1 Generation Method -- 3.2 Adversarial Method -- 3.3 Contrastive Method -- 3.4 Network-Assisted Loss -- 4 Experiments -- 4.1 Experimental Result -- 4.2 Dataset -- 5 Conclusion -- References -- Construction of Demand Forecasting Model of Human Resources Professional Structure Based on Deep Learning -- 1 Introduction -- 2 Research Method -- 3 Result Analysis -- 4 Conclusions -- References -- Financial Management and Early Warning System of Non-profit Organizations Based on Artificial Neural Network -- 1 Introduction -- 2 Financial Management and Early Warning of Non-profit Organizations -- 2.1 Overview of Financial Management of Nonprofit Organizations -- 2.2 Procedures of Financial Risk Management -- 2.3 Research Background and Significance -- 3 Non-profit Organization Financial Management and Early Warning System Based on Artificial Neural Network -- 3.1 Problems Existing in Non-profit Financial Management -- 3.2 Countermeasures for Financial Risk Control of Non-profit Organizations -- 4 Conclusions -- References -- Author Index. |
Record Nr. | UNINA-9910874681403321 |
Tian Yuan | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data and Security [[electronic resource] ] : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan |
Autore | Tian Yuan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (759 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
MaTinghuai
JiangQingshan LiuQi KhanMuhammad Khurram |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Data protection Artificial intelligence Computer systems Computer Engineering and Networks Data and Information Security Artificial Intelligence Computer Communication Networks Computer System Implementation |
Soggetto non controllato | Mathematics |
ISBN | 981-9933-00-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data&New Method -- Data-driven energy efficiency evaluation and energy anomaly detection of multi-type enterprises based on en-ergy consumption big data mining -- Research on data-driven AGC instruction execution effect recognition method -- Research on day-ahead scheduling strategy of the power system includes wind power plants and photovoltaic power stations based on big data clustering and filling -- Day-ahead scenario generation method for renewable energy based on historical data analysis -- A High-Frequency Stock Price Prediction Method based on Mode Decomposition and Deep Learning -- A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning -- Research on Data Watermark Tracing System in Hadoop Environment -- Application of RFID tag in the Localization of Power Cable based on Big Data -- Research Hotspot and Evolution Trend Of Virtual Power Plant In China:an Empirical Analysis Based On BigData -- Influencing Factors Analysis and Prediction Model of Pavement Transverse Crack Based on Big Data -- Research on the evolution of new energy industry financing ecosystem under the background of big data -- A Survey of the State-of-the-Art and Possible Extensions of Recommender System Based on Big Data -- An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data -- Artificial Intelligence&Machine Learning Security -- Feature Fusion based IPSO-LSSVM fault diagnosis of on-load tap -- Graphlet Based Measure to Assess Institutional Research Teams -- Logical Relationship Extraction of Multimodal South China Sea Big Data Using BERT and Knowledge Graph -- Research on Application of Knowledge Graph in War Archive Based on Big Data -- Semi-supervised learning enabled fault analysis method for power distribution network based on LSTM autoen-coder and attention mechanism -- Fault detection method for power distribution network based on ensemble learning -- Factors Influencing Chinese Users’ Willingness to Pay for O2O Knowledge Products Based on Information Adoption Model -- A Survey of Integrating Federated Learning with Smart Grids Application Prospect, Privacy Preserving and Challenges Analysis -- Application of the fusion access technology of carrier and 5G in power communication -- Muscle fatigue classification based on GA optimization of BP neural network -- Data Technology&Network Security -- Research on typical scenario generation based on distribution network data mining and improved policy clustering -- A data-driven and deep learning-based economic evaluation method for new power system distribution grid -- Study on random generation of virtual avatars based on Big data -- Ordering, pricing, and coordination of a closed-loop supply chain with risk preference -- An explainable optimization method for assembly process parameter -- A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators -- Research on Attribute-Based Privacy-Preserving Computing technologies -- Research on BIM modeling Technology from the Perspective of Power Big Data Security -- Security risk management of the Internet of Things based on 5G technology -- Multi slice SLA collaboration and optimization of power 5G big data security business -- Virtualized Network Functions Placement Scheme in Cloud Network Collaborative Operation Platform -- Grounded Theory-Driven Knowledge Production Features Mining: one Empirical Study Based on Big Data Technology -- Research on Digital Twin Technology of Main Equipment for Power Transmission and Transformation based on Big Data -- Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control -- Cybersecurity & Privacy -- Privacy Measurement Based on Social Network Properties and Structure -- Research on 5G-based Zero Trust Network Security Platform -- A Mobile Data Leakage Prevention System Based on Encryption Algorithms -- Research on Data Security Access Control Mechanism in Cloud Computing Environment -- Research on Data Security Storage System Based on Distributed Database -- Design of an Active Data Watermark Detection System -- Research on Privacy Protection Methods for Data Mining -- A Cluster-based Facial Image Anonymization Method Using Variational Autoencoder -- IoT Security -- Research on the Security Diagnosis Platform for Partial Discharge of 10kV Cables in Urban Distribution Networks -- Research on the Electromagnetic Sensor-based Partial Discharge Security Monitoring System of Distribution Network -- Design of Ultrasonic-Based Remote Distribution Network Online Security Monitoring Device -- An Intelligent IoT Terminal Detection System based on Data Sniffing -- Intelligent IoT Terminal Software Identification System based on Behavior Features -- Research on the Identification Model of Power Terminal -- Research on Firmware Vulnerability Mining Model of Power Internet of Things -- How can social workers participate in big data governance? The third-party perspective on big data governance -- Power network scheduling strategy based on federated learning algorithm in edge computing environment. |
Record Nr. | UNISA-996546842303316 |
Tian Yuan | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Big Data and Security : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan |
Autore | Tian Yuan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (759 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
MaTinghuai
JiangQingshan LiuQi KhanMuhammad Khurram |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Data protection Artificial intelligence Computer systems Computer Engineering and Networks Data and Information Security Artificial Intelligence Computer Communication Networks Computer System Implementation |
Soggetto non controllato | Mathematics |
ISBN | 981-9933-00-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Big Data&New Method -- Data-driven energy efficiency evaluation and energy anomaly detection of multi-type enterprises based on en-ergy consumption big data mining -- Research on data-driven AGC instruction execution effect recognition method -- Research on day-ahead scheduling strategy of the power system includes wind power plants and photovoltaic power stations based on big data clustering and filling -- Day-ahead scenario generation method for renewable energy based on historical data analysis -- A High-Frequency Stock Price Prediction Method based on Mode Decomposition and Deep Learning -- A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning -- Research on Data Watermark Tracing System in Hadoop Environment -- Application of RFID tag in the Localization of Power Cable based on Big Data -- Research Hotspot and Evolution Trend Of Virtual Power Plant In China:an Empirical Analysis Based On BigData -- Influencing Factors Analysis and Prediction Model of Pavement Transverse Crack Based on Big Data -- Research on the evolution of new energy industry financing ecosystem under the background of big data -- A Survey of the State-of-the-Art and Possible Extensions of Recommender System Based on Big Data -- An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data -- Artificial Intelligence&Machine Learning Security -- Feature Fusion based IPSO-LSSVM fault diagnosis of on-load tap -- Graphlet Based Measure to Assess Institutional Research Teams -- Logical Relationship Extraction of Multimodal South China Sea Big Data Using BERT and Knowledge Graph -- Research on Application of Knowledge Graph in War Archive Based on Big Data -- Semi-supervised learning enabled fault analysis method for power distribution network based on LSTM autoen-coder and attention mechanism -- Fault detection method for power distribution network based on ensemble learning -- Factors Influencing Chinese Users’ Willingness to Pay for O2O Knowledge Products Based on Information Adoption Model -- A Survey of Integrating Federated Learning with Smart Grids Application Prospect, Privacy Preserving and Challenges Analysis -- Application of the fusion access technology of carrier and 5G in power communication -- Muscle fatigue classification based on GA optimization of BP neural network -- Data Technology&Network Security -- Research on typical scenario generation based on distribution network data mining and improved policy clustering -- A data-driven and deep learning-based economic evaluation method for new power system distribution grid -- Study on random generation of virtual avatars based on Big data -- Ordering, pricing, and coordination of a closed-loop supply chain with risk preference -- An explainable optimization method for assembly process parameter -- A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators -- Research on Attribute-Based Privacy-Preserving Computing technologies -- Research on BIM modeling Technology from the Perspective of Power Big Data Security -- Security risk management of the Internet of Things based on 5G technology -- Multi slice SLA collaboration and optimization of power 5G big data security business -- Virtualized Network Functions Placement Scheme in Cloud Network Collaborative Operation Platform -- Grounded Theory-Driven Knowledge Production Features Mining: one Empirical Study Based on Big Data Technology -- Research on Digital Twin Technology of Main Equipment for Power Transmission and Transformation based on Big Data -- Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control -- Cybersecurity & Privacy -- Privacy Measurement Based on Social Network Properties and Structure -- Research on 5G-based Zero Trust Network Security Platform -- A Mobile Data Leakage Prevention System Based on Encryption Algorithms -- Research on Data Security Access Control Mechanism in Cloud Computing Environment -- Research on Data Security Storage System Based on Distributed Database -- Design of an Active Data Watermark Detection System -- Research on Privacy Protection Methods for Data Mining -- A Cluster-based Facial Image Anonymization Method Using Variational Autoencoder -- IoT Security -- Research on the Security Diagnosis Platform for Partial Discharge of 10kV Cables in Urban Distribution Networks -- Research on the Electromagnetic Sensor-based Partial Discharge Security Monitoring System of Distribution Network -- Design of Ultrasonic-Based Remote Distribution Network Online Security Monitoring Device -- An Intelligent IoT Terminal Detection System based on Data Sniffing -- Intelligent IoT Terminal Software Identification System based on Behavior Features -- Research on the Identification Model of Power Terminal -- Research on Firmware Vulnerability Mining Model of Power Internet of Things -- How can social workers participate in big data governance? The third-party perspective on big data governance -- Power network scheduling strategy based on federated learning algorithm in edge computing environment. |
Record Nr. | UNINA-9910728930503321 |
Tian Yuan | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|