Search scope:
排序: Display mode:
Deep Learning and Industrial Internet Security: Application and Challenges
Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 95-103 doi: 10.15302/J-SSCAE-2021.02.013
Industrial Internet security is crucial for strengthening the manufacturingit is of great value to promote the integrated innovation of deep learning and industrial Internet securityIn this study, we analyze the development demand for industrial Internet security from the perspective, and data layers.The security challenges faced by deep learning application to industrial Internet security primarily
Keywords: industrial Internet security Internet of Things security deep learning data security
On the role of optimization algorithms in ownership-preserving data mining None
Muhammad KAMRAN, Ehsan Ullah MUNIR
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, Pages 151-164 doi: 10.1631/FITEE.1601479
Keywords: Information security Optimization Digital rights Watermarking
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
Keywords: WLAN encryption WEP rekey
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Theoretical Method and Practice of Giant System for Mineral Resource Security
Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 191-201 doi: 10.15302/J-SSCAE-2023.10.001
Keywords: mineral resource security giant system system engineering big data platform
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
One-Variable Attack on The Industrial Fault Classification System and Its Defense Article
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Engineering 2022, Volume 19, Issue 12, Pages 240-251 doi: 10.1016/j.eng.2021.07.033
Recently developed fault classification methods for industrial processes are mainly data-driven.have significantly improved fault classification accuracy owing to the inclusion of a large number of dataHowever, these data-driven models are vulnerable to adversarial attacks; thus, small perturbations on
Keywords: Adversarial samples Black-box attack Industrial data security Fault classification system
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4, Pages 467-477 doi: 10.15302/J-FASE-2020320
Keywords: Africa ecological security evaluation system PSR model
Water, energy and food interactions–Challenges and opportunities
Gustaf OLSSON
Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5, Pages 787-793 doi: 10.1007/s11783-013-0526-z
Keywords: water security energy security food security water-energy nexus water conflicts
A review of systematic evaluation and improvement in the big data environment
Feng YANG, Manman WANG
Frontiers of Engineering Management 2020, Volume 7, Issue 1, Pages 27-46 doi: 10.1007/s42524-020-0092-6
Keywords: big data evaluation methods systematic improvement big data analytic techniques data mining
Frontiers of Environmental Science & Engineering 2023, Volume 17, Issue 8, doi: 10.1007/s11783-023-1694-0
● Data quality assessment criteria for MP/NPs in food products were
Keywords: Microplastic Nanoplastic Food products Data quality Human health risk
Blockchain application in healthcare service mode based on Health Data Bank
Jianxia GONG, Lindu ZHAO
Frontiers of Engineering Management 2020, Volume 7, Issue 4, Pages 605-614 doi: 10.1007/s42524-020-0138-9
Keywords: Health Data Bank blockchain data assets smart contract incentive mechanism
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5, Pages 678-691 doi: 10.1007/s11783-012-0450-7
Keywords: water environment security supervision and management monitoring parameter indicator system Suzhou
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation
Challenges to Engineering Management in the Big Data Era
Yong Shi
Frontiers of Engineering Management 2015, Volume 2, Issue 3, Pages 293-303 doi: 10.15302/J-FEM-2015042
Keywords: big data data science intelligent knowledge engineering management real-life applications
Title Author Date Type Operation
Deep Learning and Industrial Internet Security: Application and Challenges
Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang
Journal Article
On the role of optimization algorithms in ownership-preserving data mining
Muhammad KAMRAN, Ehsan Ullah MUNIR
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Theoretical Method and Practice of Giant System for Mineral Resource Security
Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article
One-Variable Attack on The Industrial Fault Classification System and Its Defense
Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge
Journal Article
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Journal Article
A review of systematic evaluation and improvement in the big data environment
Feng YANG, Manman WANG
Journal Article
Data quality assessment for studies investigating microplastics and nanoplastics in food products: Arecurrent data reliable?
Journal Article
Blockchain application in healthcare service mode based on Health Data Bank
Jianxia GONG, Lindu ZHAO
Journal Article
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article