top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part II
Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part II
Autore Tian Yuan
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (219 pages)
Altri autori (Persone) MaTinghuai
KhanMuhammad Khurram
Collana Communications in Computer and Information Science Series
ISBN 9789819743902
9789819743896
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Data Technology and Network Security -- SodStereo: An Effective Multi-task Learning Network for Stereo Matching and Salient Object Detection -- 1 Introduction -- 2 Related Work -- 2.1 Stereo Matching -- 2.2 Cost Volume Construction -- 2.3 Salient Object Detection -- 2.4 Multi-task Structure for Disparity Estimation Task -- 3 Method -- 3.1 Basic Network -- 3.2 Double Residual Attention -- 3.3 Disparity Regression and Loss -- 4 Experiments -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Attention Analysis -- 4.4 Ablation Study -- 4.5 Comparisons with Other Stereo Methods -- 5 Conclusion -- References -- Asymptotic Physics-Informed Neural Networks for Solving Singularly Perturbed Problems -- 1 Introduction -- 2 Related Work -- 2.1 Physics-Informed Neural Networks -- 2.2 PINNs for Singularly Perturbed Problems -- 3 Methodology -- 3.1 Preliminary Knowledge About PINNs -- 3.2 Preliminary Knowledge About Shishkin Meshes -- 3.3 Preliminary Knowledge About Domain Decomposition -- 3.4 Asymptotic Physics-Informed Neural Networks (A-PINNs) -- 4 Numerical Results -- 4.1 Test Case 1 -- 4.2 Test Case 2 -- 4.3 Test Case 3 -- 4.4 Test Case 4 -- 4.5 Test Case 5 -- 5 Conclusion -- References -- Development of U-net Neural Network for Biomedical Images with Big Data -- 1 Development of UNN -- 1.1 The Basic UNN -- 1.2 U-net++ NN -- 1.3 3D UNN -- 1.4 Res UNN -- 1.5 Attention UNN -- 2 Application of Approved UNN -- 2.1 CT and MRI Image Segmentation -- 2.2 Fundus Images Segmentation -- 2.3 Photoacoustic Image Segmentation -- 2.4 Optical Coherence Tomography Segmentation -- 2.5 Microscopic Imaging in Histological Slides -- 3 Conclusion -- References -- Research on Implementation of BADGE Active Learning to Increase Defect Detection Effectiveness -- 1 Introduction.
2 YOLO and BADGE Overview -- 2.1 You Only Look Once (YOLO) -- 2.2 Batch Active Learning by Diverse Gradient Embeddings (BADGE) -- 3 YOLOv5 and BADGE Integration -- 3.1 The Advantages of Integrating YOLO and BADGE Active Learning -- 3.2 Integrating YOLOv5 and BADGE -- 4 Experimentation, Challenges, and Proposed Solutions -- 4.1 Experiments -- 4.2 Challenges -- 4.3 Proposed Solutions -- 5 Future Works -- 6 Conclusion -- References -- Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection -- 1 Introduction -- 2 Related Work -- 2.1 Methods Based on Temporal Correlation -- 2.2 Methods Based on Spatial Correlation -- 2.3 Methods Based on Spatial-Temporal Correlation -- 3 Stationary Multi-scale Hierarchical Dilated Convolution -- 3.1 Problem Formulation -- 3.2 Proposed Framework -- 3.3 Sequence Normalization and De-Normalization -- 3.4 Graph Structure Learning -- 3.5 Graph Convolution -- 3.6 Hierarchical Dilated Convolution -- 3.7 BiLSTM Reconstruction -- 4 Experiment -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Experiment Setup -- 4.4 Experiment Results -- 4.5 Ablation Studies -- 4.6 Case Study -- 5 Conclusion -- References -- Design of Human Resource Optimal Allocation Model for Electric Power Construction Enterprises Based on Machine Learning -- 1 Introduction -- 2 Human Resource Optimal Allocation Theory and Machine Learning -- 2.1 The Concept of Human Resource Allocation -- 2.2 Electric Power Construction Enterprises -- 2.3 Machine Learning -- 2.4 The Model of Machine Learning in Human Resources -- 3 Data Processing and Results -- 4 Conclusions -- References -- Research on the Construction of Digital Education Cloud Resource Database Based on Ant Colony Algorithm -- 1 Introduction -- 2 Ant Colony Algorithm -- 2.1 Ant Colony Algorithm Definition -- 2.2 The Basic Principle of Ant Colony Algorithm.
2.3 Advantages and Disadvantages of Ant Colony Algorithm -- 3 The Construction of Education Resource Library Based on Cloud Computing -- 4 Conclusions -- References -- Simulation of Short-Term Prediction Model of Real Estate Price Index Based on Neural Network Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Concept and Data Source of Real Estate Price Index -- 2.2 Prediction Model of Real Estate Price Index -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- IoT Security and Privacy Protection -- PLMR: An Efficient Pre-trained Model for Aircraft Maneuver Recognition -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Masked Trajectory Modeling -- 3.2 PLMR Module -- 3.3 Fine-Tuning Stage -- 4 Experiments -- 4.1 Experimental Datasets and Parameter Setting -- 4.2 Results and Analysis -- 5 Conclusion -- References -- Blockchain-Based WeChat Small Program Platform: A New Type of Data Security and Management Solution -- 1 Introduction -- 2 Related Work -- 3 Blockchain-Based Volunteer Privacy Protection Scheme -- 3.1 Blockchain -- 3.2 WeChat Small Program and Big Data Security -- 3.3 WMP-BDPF Architecture Design -- 4 Comparison of WMP-BDPF with Existing Schemes -- 5 Conclusions -- 5.1 Major Contributions -- 5.2 Future Research Direction -- References -- A Survey of Edge Computing Resource Allocation and Task Scheduling Optimization -- 1 Introduction -- 2 Problems, Objectives and Constraints -- 2.1 Optimization Objectives -- 2.2 Optimization Constraints -- 3 Methods -- 3.1 Numerical Methods -- 3.2 Learning-Based Methods -- 4 Conclusion -- References -- An Algorithm for Analyzing Psychological Characteristics in Music Education Based on Markov Model -- 1 Introduction -- 2 Methodology -- 2.1 Related Technical Basis -- 2.2 Analysis Algorithm of Psychological Characteristics Based on Markov Model -- 3 Result Analysis and Discussion.
4 Conclusions -- References -- Enhancing Privacy Strategy in New Power Systems: Problem Assessment, Comparative Analysis and Suggestions -- 1 Introduction -- 2 Basic Concepts of Privacy Computing -- 3 Current Analysis of Privacy Computing Applications in New Power Systems -- 3.1 Applications Scenarios Based on Cryptographic Security -- 3.2 Applications Securely Based on Statistical Approaches -- 4 Technology-Related Issues in Privacy Computing -- 5 Solution Opinions for Problems Related to Privacy Computing in New Power Systems -- 6 Conclusion -- References -- Internet Public Opinion Evolution Model and Simulation Based on Big Data and Grey Clustering Algorithm Under New Media Environment -- 1 Introduction -- 2 Network Public Opinion on Emergencies -- 3 Research on the Evolution Model of Internet Public Opinion Under the Influence of Media -- 3.1 Construction and Improvement of Birch Model -- 4 Conclusion -- References -- Simulation of Regional Financial and Economic Development Decision Model Based on Decision Tree Algorithm -- 1 Introduction -- 2 Model Setting and Variable Selection -- 2.1 Model Settings -- 2.2 Variable Selection -- 3 Analysis of the Causes of Financial Constraints -- 3.1 Low Level of Economic Development and Insufficient Capacity to Absorb Funds -- 3.2 Estimation Method and Result Analysis -- 4 Conclusions -- References -- Simulation Research on Pre-alarm Model of Enterprise Shared Financial Crisis Based on Genetic Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Content of Enterprise Financial Risk Under Financial Sharing Mode -- 2.2 Pre-alarm Model of Enterprise Sharing Financial Crisis -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- Research on Accurate Poverty Alleviation Algorithm of Rural Industry Based on Association Rules Mining -- 1 Introduction.
2 Connotation of Rural E-commerce Precision Poverty Alleviation -- 3 Mining Poverty Features Based on Association Rule Algorithm -- 3.1 Pretreatment of Multi-dimensional Poverty Characteristics of Farmers -- 3.2 Study on Poverty Characteristics of Farmers Based on Apriori Algorithm -- 4 Algorithm Simulation Analysis -- 5 Conclusion -- References -- Compute First Networking Scheduling Strategy Based on Genetic Algorithm in Edge Computing Environment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Network Model -- 2.2 Scheduling Model -- 3 Network Model and Scheduling Model -- 3.1 Improved Genetic Algorithm Task Transfer -- 3.2 Generation of Initial Population -- 3.3 Fitness Function -- 3.4 Genetic Manipulation -- 4 Simulation Results -- 4.1 Performance Results -- 4.2 Results Analysis -- 5 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910874656403321
Tian Yuan  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part I
Big Data and Security : 5th International Conference, ICBDS 2023, Nanjing, China, December 22-24, 2023, Revised Selected Papers, Part I
Autore Tian Yuan
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (258 pages)
Altri autori (Persone) MaTinghuai
KhanMuhammad Khurram
Collana Communications in Computer and Information Science Series
ISBN 9789819743872
9789819743865
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Big Data and New Method -- Recurrent Age Recognition Based on Manifold Learning -- 1 Introduction -- 2 Related Work -- 3 The Proposed Methodology MLPAP -- 3.1 Improved Age Label Distribution -- 3.2 Personal Aging Pattern -- 3.3 MLPAP -- 4 Experiment -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Network Initialization and Training -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- References -- A Three Layer Chinese Sentiment Polarity Detection Framework with Case Study -- 1 Introduction -- 2 Related Work -- 3 A Specialized Framework -- 3.1 Module 1-3: Sentence Collector, Corpora Learner and Basic Lexicons -- 3.2 Module 4: Lexicon Producer -- 3.3 Module 5: Vector Transformer and New Corpora -- 4 Experimental Analysis -- 5 Conclusion -- References -- Big Data Intelligence Empowered Specialized Disciplines Development Pattern Recognition in Power Industry Universities -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Source -- 3.2 Research Design -- 4 Results -- 4.1 Characteristics of Disciplinary Development of NCEPU -- 4.2 Characteristics of Disciplinary Development of SUEP -- 4.3 Characteristics of Disciplinary Development of CSUST -- 4.4 Characteristics of Disciplinary Development of NJIT -- 5 Conclusion and Discussion -- 5.1 Highly Interdisciplinary Integration -- 5.2 Multidisciplinary Collaborative Innovation -- 5.3 Deepening Disciplinary Culture Construction -- References -- A Survey on Real-Time Semantic Segmentation Based on Deep Learning -- 1 Introduction -- 2 Real-Time Semantic Segmentation Network -- 2.1 Single-Branch Network -- 2.2 Double-Branch Network -- 2.3 Three-Branch Network -- 3 Feature Fusion Module -- 3.1 Serial Connection Structure -- 3.2 Parallel Multi-branch Structure -- 4 Model Performance Evaluation.
4.1 Datasets -- 4.2 Metrics -- 4.3 Model Comparison -- 5 Future Research Trends and Conclusions -- References -- A Clustering Method for Distribution Network Load Curve Based on Fast DDTW -- 1 Introduction -- 2 Dynamic Time Warping Algorithm -- 2.1 DTW Algorithm -- 2.2 The Necessity of Using DTW for Similarity Measurement -- 2.3 The "Singularity" Problem of Dynamic Time Planning -- 3 K-Medoids Clustering Method Based on Fast DDTW -- 3.1 Derivative Dynamic Time Warping -- 3.2 Fast DDTW Clustering Algorithm -- 3.3 Gaussian Filter -- 3.4 K-Medoids Clustering -- 4 Calculation Example Analysis -- 4.1 Data Preprocessing -- 4.2 Clustering Quality Evaluation Index -- 4.3 Algorithm Evaluation -- 5 Conclusion -- References -- Object Detection Model Based on Attention Mechanism -- 1 Introduction -- 2 Relevant Technology -- 2.1 Introduction to YOLO Series Models -- 2.2 Attention Mechanism -- 2.3 Data Set Introduction -- 3 The Object Detection Method Based on Attention Mechanism -- 3.1 YOLOv7 Network Structure -- 3.2 Network Architecture Design -- 4 Experimental Results and Analysis -- 4.1 Experimental Environment -- 4.2 Training Parameters -- 4.3 Experimental Dataset -- 4.4 Evaluation Metrics -- 4.5 Comparative Experiments -- 5 Conclusion -- References -- Gas Pressure Prediction and Application with Missing Data Imputation Techniques for Gas Regulator Data -- 1 Introduction -- 2 Methodology -- 2.1 Imputation -- 2.2 Prediction -- 3 Dataset Introduction and Processing -- 3.1 Dataset -- 3.2 Data Characteristics -- 3.3 Data Preprocessing -- 4 Result -- 4.1 Evaluation Method -- 4.2 Gas Pressure Imputation -- 4.3 Gas Pressure Prediction -- 4.4 Implementation of Gas Pressure Prediction Models -- 4.5 Result of Gas Pressure Prediction -- 5 Conclusion -- References.
Advances, Patterns and Future Potential of Big Data Technology Research for New Energy Sources and Energy Storage Systems -- 1 Introduction -- 2 Advancements in the Research of BD Technology for NEP and ESS -- 3 Research Trends of BD Application in NEP and ESS -- 3.1 Multidimensional Data Analysis -- 3.2 Provision of Historical Data Services -- 3.3 Expanded Usage Scenarios -- 3.4 Comprehensive Monitoring and Management -- 4 Future Research Directions in NEP and ESS Based on BD Technology -- 5 Conclusion -- References -- Construction of Enterprise Capital Allocation Efficiency Model Based on Fuzzy Clustering Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Theoretical Analysis of Enterprise Financial Management -- 2.2 Enterprise Capital Allocation Efficiency Model -- 3 Result Analysis and Discussion -- 4 Conclusions -- References -- Artificial Intelligence and Machine Learning -- Analysing Potential of ResNet for Transfer Learning with Stochastic Depth -- 1 Introduction -- 2 Related Work -- 2.1 Dropout -- 2.2 Transfer Learning -- 2.3 Deep Residual Network and Stochastic Depth -- 3 Methodology -- 4 Experiment and Results -- 4.1 CIFAR-10 -- 4.2 OXFORD-IIIT PET -- 5 Conclusion -- References -- A Survey of Research Progresses on Instance Segmentation Based on Deep Learning -- 1 Introduction -- 2 DL-BASED Instance Segmentation Methods -- 2.1 Fully Supervised Learning -- 2.2 Semi-supervised Learning Method -- 2.3 Unsupervised Learning Method -- 3 Datasets and Experimental Evaluation -- 3.1 MS COCO Dataset -- 3.2 Cityscapes Dataset -- 3.3 Other Special Scenario Datasets -- 4 Application -- 4.1 Intelligent Driving Field -- 4.2 Face Recognition Field -- 4.3 Medical Field -- 4.4 Industrial Manufacturing Field -- 4.5 Agricultural Field -- 5 Prospect and Conclusion -- References.
Charting the Landscape of Multi-view Stereo: An In-Depth Exploration of Deep Learning Techniques -- 1 Introduction -- 2 Background -- 3 Depth Map-Based Approaches -- 4 Volumetric Approaches -- 5 Semi-supervised and Unsupervised Approaches -- 6 MVS Benchmarks -- 7 Conclusion -- References -- A Survey of Federated Learning: Review, Attacks, Defenses -- 1 Introduction -- 2 Overview of FL -- 2.1 Federated Learning -- 2.2 Types of FL -- 3 Poisoning Attacks and Defenses of FL -- 3.1 Data Poisoning Attacks -- 3.2 Model Poisoning Attacks -- 3.3 Defenses -- 4 Summary -- References -- ROMA: Reverse Model-Based Data Augmentation for Offline Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Offline RL -- 2.2 Data Augmentation (DA) -- 3 Trajectory Augment by Reversed Model -- 3.1 Preliminaries -- 3.2 Constructing the Virtual Transition Dataset -- 3.3 Training the Reverse Model -- 3.4 Improving Trajectory Quality by Splicing -- 3.5 Combination with Model-Free Algorithms -- 4 Experiments -- 4.1 Simple Environment -- 4.2 Continuous Environment -- 5 Discussion -- 6 Conclusion -- References -- Application Research of Digital Intelligence Technology in Mining Electric Power Equipment Fault Cases: Taking Text Mining Technology as an Example -- 1 Introduction -- 2 Overview of Text Mining -- 2.1 Development Process of Text Mining -- 2.2 Difficulties in Text Mining -- 3 Text Mining Framework Construction for Typical Fault Cases of Power Equipment -- 4 Text Mining Application for Typical Fault Cases of Electric Power Equipment -- 4.1 Power Equipment Fault Name Entity Recognition -- 4.2 Power Equipment Fault Entity Relationship Extraction -- 4.3 Construction of Knowledge Graph for Fault Power Equipment -- 4.4 Automatic Evaluation of Power Equipment Health Status -- 5 Prospect of Text Mining for Typical Failure Cases of Electric Power Equipment -- 6 Conclusion.
References -- Deep Learning-Based Attribute Graph Clustering: An Overview -- 1 Introduction -- 2 Related Work -- 2.1 Notations -- 2.2 Data Augmentation -- 2.3 Pretraining -- 3 Overview of Recent Graph Clustering Methods -- 3.1 Generation Method -- 3.2 Adversarial Method -- 3.3 Contrastive Method -- 3.4 Network-Assisted Loss -- 4 Experiments -- 4.1 Experimental Result -- 4.2 Dataset -- 5 Conclusion -- References -- Construction of Demand Forecasting Model of Human Resources Professional Structure Based on Deep Learning -- 1 Introduction -- 2 Research Method -- 3 Result Analysis -- 4 Conclusions -- References -- Financial Management and Early Warning System of Non-profit Organizations Based on Artificial Neural Network -- 1 Introduction -- 2 Financial Management and Early Warning of Non-profit Organizations -- 2.1 Overview of Financial Management of Nonprofit Organizations -- 2.2 Procedures of Financial Risk Management -- 2.3 Research Background and Significance -- 3 Non-profit Organization Financial Management and Early Warning System Based on Artificial Neural Network -- 3.1 Problems Existing in Non-profit Financial Management -- 3.2 Countermeasures for Financial Risk Control of Non-profit Organizations -- 4 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910874681403321
Tian Yuan  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data and Security [[electronic resource] ] : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan
Big Data and Security [[electronic resource] ] : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan
Autore Tian Yuan
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (759 pages)
Disciplina 005.8
Altri autori (Persone) MaTinghuai
JiangQingshan
LiuQi
KhanMuhammad Khurram
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Data protection
Artificial intelligence
Computer systems
Computer Engineering and Networks
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computer System Implementation
Soggetto non controllato Mathematics
ISBN 981-9933-00-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data&New Method -- Data-driven energy efficiency evaluation and energy anomaly detection of multi-type enterprises based on en-ergy consumption big data mining -- Research on data-driven AGC instruction execution effect recognition method -- Research on day-ahead scheduling strategy of the power system includes wind power plants and photovoltaic power stations based on big data clustering and filling -- Day-ahead scenario generation method for renewable energy based on historical data analysis -- A High-Frequency Stock Price Prediction Method based on Mode Decomposition and Deep Learning -- A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning -- Research on Data Watermark Tracing System in Hadoop Environment -- Application of RFID tag in the Localization of Power Cable based on Big Data -- Research Hotspot and Evolution Trend Of Virtual Power Plant In China:an Empirical Analysis Based On BigData -- Influencing Factors Analysis and Prediction Model of Pavement Transverse Crack Based on Big Data -- Research on the evolution of new energy industry financing ecosystem under the background of big data -- A Survey of the State-of-the-Art and Possible Extensions of Recommender System Based on Big Data -- An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data -- Artificial Intelligence&Machine Learning Security -- Feature Fusion based IPSO-LSSVM fault diagnosis of on-load tap -- Graphlet Based Measure to Assess Institutional Research Teams -- Logical Relationship Extraction of Multimodal South China Sea Big Data Using BERT and Knowledge Graph -- Research on Application of Knowledge Graph in War Archive Based on Big Data -- Semi-supervised learning enabled fault analysis method for power distribution network based on LSTM autoen-coder and attention mechanism -- Fault detection method for power distribution network based on ensemble learning -- Factors Influencing Chinese Users’ Willingness to Pay for O2O Knowledge Products Based on Information Adoption Model -- A Survey of Integrating Federated Learning with Smart Grids Application Prospect, Privacy Preserving and Challenges Analysis -- Application of the fusion access technology of carrier and 5G in power communication -- Muscle fatigue classification based on GA optimization of BP neural network -- Data Technology&Network Security -- Research on typical scenario generation based on distribution network data mining and improved policy clustering -- A data-driven and deep learning-based economic evaluation method for new power system distribution grid -- Study on random generation of virtual avatars based on Big data -- Ordering, pricing, and coordination of a closed-loop supply chain with risk preference -- An explainable optimization method for assembly process parameter -- A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators -- Research on Attribute-Based Privacy-Preserving Computing technologies -- Research on BIM modeling Technology from the Perspective of Power Big Data Security -- Security risk management of the Internet of Things based on 5G technology -- Multi slice SLA collaboration and optimization of power 5G big data security business -- Virtualized Network Functions Placement Scheme in Cloud Network Collaborative Operation Platform -- Grounded Theory-Driven Knowledge Production Features Mining: one Empirical Study Based on Big Data Technology -- Research on Digital Twin Technology of Main Equipment for Power Transmission and Transformation based on Big Data -- Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control -- Cybersecurity & Privacy -- Privacy Measurement Based on Social Network Properties and Structure -- Research on 5G-based Zero Trust Network Security Platform -- A Mobile Data Leakage Prevention System Based on Encryption Algorithms -- Research on Data Security Access Control Mechanism in Cloud Computing Environment -- Research on Data Security Storage System Based on Distributed Database -- Design of an Active Data Watermark Detection System -- Research on Privacy Protection Methods for Data Mining -- A Cluster-based Facial Image Anonymization Method Using Variational Autoencoder -- IoT Security -- Research on the Security Diagnosis Platform for Partial Discharge of 10kV Cables in Urban Distribution Networks -- Research on the Electromagnetic Sensor-based Partial Discharge Security Monitoring System of Distribution Network -- Design of Ultrasonic-Based Remote Distribution Network Online Security Monitoring Device -- An Intelligent IoT Terminal Detection System based on Data Sniffing -- Intelligent IoT Terminal Software Identification System based on Behavior Features -- Research on the Identification Model of Power Terminal -- Research on Firmware Vulnerability Mining Model of Power Internet of Things -- How can social workers participate in big data governance? The third-party perspective on big data governance -- Power network scheduling strategy based on federated learning algorithm in edge computing environment.
Record Nr. UNISA-996546842303316
Tian Yuan  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Big Data and Security : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan
Big Data and Security : 4th International Conference, ICBDS 2022, Xiamen, China, December 8–12, 2022, Proceedings / / edited by Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan
Autore Tian Yuan
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (759 pages)
Disciplina 005.8
Altri autori (Persone) MaTinghuai
JiangQingshan
LiuQi
KhanMuhammad Khurram
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Data protection
Artificial intelligence
Computer systems
Computer Engineering and Networks
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computer System Implementation
Soggetto non controllato Mathematics
ISBN 981-9933-00-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data&New Method -- Data-driven energy efficiency evaluation and energy anomaly detection of multi-type enterprises based on en-ergy consumption big data mining -- Research on data-driven AGC instruction execution effect recognition method -- Research on day-ahead scheduling strategy of the power system includes wind power plants and photovoltaic power stations based on big data clustering and filling -- Day-ahead scenario generation method for renewable energy based on historical data analysis -- A High-Frequency Stock Price Prediction Method based on Mode Decomposition and Deep Learning -- A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning -- Research on Data Watermark Tracing System in Hadoop Environment -- Application of RFID tag in the Localization of Power Cable based on Big Data -- Research Hotspot and Evolution Trend Of Virtual Power Plant In China:an Empirical Analysis Based On BigData -- Influencing Factors Analysis and Prediction Model of Pavement Transverse Crack Based on Big Data -- Research on the evolution of new energy industry financing ecosystem under the background of big data -- A Survey of the State-of-the-Art and Possible Extensions of Recommender System Based on Big Data -- An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data -- Artificial Intelligence&Machine Learning Security -- Feature Fusion based IPSO-LSSVM fault diagnosis of on-load tap -- Graphlet Based Measure to Assess Institutional Research Teams -- Logical Relationship Extraction of Multimodal South China Sea Big Data Using BERT and Knowledge Graph -- Research on Application of Knowledge Graph in War Archive Based on Big Data -- Semi-supervised learning enabled fault analysis method for power distribution network based on LSTM autoen-coder and attention mechanism -- Fault detection method for power distribution network based on ensemble learning -- Factors Influencing Chinese Users’ Willingness to Pay for O2O Knowledge Products Based on Information Adoption Model -- A Survey of Integrating Federated Learning with Smart Grids Application Prospect, Privacy Preserving and Challenges Analysis -- Application of the fusion access technology of carrier and 5G in power communication -- Muscle fatigue classification based on GA optimization of BP neural network -- Data Technology&Network Security -- Research on typical scenario generation based on distribution network data mining and improved policy clustering -- A data-driven and deep learning-based economic evaluation method for new power system distribution grid -- Study on random generation of virtual avatars based on Big data -- Ordering, pricing, and coordination of a closed-loop supply chain with risk preference -- An explainable optimization method for assembly process parameter -- A Correlational Strategy for the Prediction of High-Dimensional Stock Data by Neural Networks and Technical Indicators -- Research on Attribute-Based Privacy-Preserving Computing technologies -- Research on BIM modeling Technology from the Perspective of Power Big Data Security -- Security risk management of the Internet of Things based on 5G technology -- Multi slice SLA collaboration and optimization of power 5G big data security business -- Virtualized Network Functions Placement Scheme in Cloud Network Collaborative Operation Platform -- Grounded Theory-Driven Knowledge Production Features Mining: one Empirical Study Based on Big Data Technology -- Research on Digital Twin Technology of Main Equipment for Power Transmission and Transformation based on Big Data -- Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control -- Cybersecurity & Privacy -- Privacy Measurement Based on Social Network Properties and Structure -- Research on 5G-based Zero Trust Network Security Platform -- A Mobile Data Leakage Prevention System Based on Encryption Algorithms -- Research on Data Security Access Control Mechanism in Cloud Computing Environment -- Research on Data Security Storage System Based on Distributed Database -- Design of an Active Data Watermark Detection System -- Research on Privacy Protection Methods for Data Mining -- A Cluster-based Facial Image Anonymization Method Using Variational Autoencoder -- IoT Security -- Research on the Security Diagnosis Platform for Partial Discharge of 10kV Cables in Urban Distribution Networks -- Research on the Electromagnetic Sensor-based Partial Discharge Security Monitoring System of Distribution Network -- Design of Ultrasonic-Based Remote Distribution Network Online Security Monitoring Device -- An Intelligent IoT Terminal Detection System based on Data Sniffing -- Intelligent IoT Terminal Software Identification System based on Behavior Features -- Research on the Identification Model of Power Terminal -- Research on Firmware Vulnerability Mining Model of Power Internet of Things -- How can social workers participate in big data governance? The third-party perspective on big data governance -- Power network scheduling strategy based on federated learning algorithm in edge computing environment.
Record Nr. UNINA-9910728930503321
Tian Yuan  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui