Resource Type

Journal Article 543

Year

2024 1

2023 63

2022 60

2021 48

2020 45

2019 42

2018 32

2017 42

2016 41

2015 29

2014 18

2013 13

2012 10

2011 9

2010 14

2009 4

2008 10

2007 11

2006 8

2005 4

open ︾

Keywords

food security 39

big data 20

energy security 19

data mining 12

Big data 9

China 9

Machine learning 7

sustainable development 7

cyberspace security 5

security 5

Artificial intelligence 4

Blockchain 4

Deep learning 4

Physical layer security 4

water security 4

Data mining 3

Industry 4.0 3

Network security 3

Security 3

open ︾

Search scope:

排序: Display mode:

Deep Learning and Industrial Internet Security: Application and Challenges

Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 95-103 doi: 10.15302/J-SSCAE-2021.02.013

Abstract:

Industrial Internet security is crucial for strengthening the manufacturingit is of great value to promote the integrated innovation of deep learning and industrial Internet securityIn this study, we analyze the development demand for industrial Internet security from the perspective, and data layers.The security challenges faced by deep learning application to industrial Internet security primarily

Keywords: industrial Internet security     Internet of Things security     deep learning     data security    

On the role of optimization algorithms in ownership-preserving data mining None

Muhammad KAMRAN, Ehsan Ullah MUNIR

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 151-164 doi: 10.1631/FITEE.1601479

Abstract: Knowledge extraction from sensitive data often needs collaborative work.Statistical databases are generated from such data and shared among various stakeholders.In this context, the ownership protection of shared data becomes important.Watermarking of such datasets may bring distortions in the data.Large bandwidth ensures robustness; however, it may degrade the quality of the data.

Keywords: Information security     Optimization     Digital rights     Watermarking    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract: to enhance WEP security.However, it is doubtful whether they can provide enough security as these solutions lack precisely securityIn this paper, concrete security analyses of various enhancing mechanisms are given.Results show that these mechanisms indeed increase security and bring significant, provable securityThe authors quantify the security as a function of the security of the primitives used, thereby enabling

Keywords: WLAN     encryption     WEP     rekey    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Theoretical Method and Practice of Giant System for Mineral Resource Security

Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 191-201 doi: 10.15302/J-SSCAE-2023.10.001

Abstract: text-align: justify;">The natural, economic, and social attributes of mineral resources determine that the securityThis study puts forward a concept of giant system for mineral resource security by introducing theOn this basis, a new research direction of system engineering of mineral resource security using a system thinking, constructing a simulation experiment system based on a big data platformThe research results have been applied to and effectively supported national resource security guarantee

Keywords: mineral resource security     giant system     system engineering     big data platform    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

One-Variable Attack on The Industrial Fault Classification System and Its Defense Article

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Engineering 2022, Volume 19, Issue 12,   Pages 240-251 doi: 10.1016/j.eng.2021.07.033

Abstract:

Recently developed fault classification methods for industrial processes are mainly data-driven.have significantly improved fault classification accuracy owing to the inclusion of a large number of dataHowever, these data-driven models are vulnerable to adversarial attacks; thus, small perturbations on

Keywords: Adversarial samples     Black-box attack     Industrial data security     Fault classification system    

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4,   Pages 467-477 doi: 10.15302/J-FASE-2020320

Abstract: Ecological security comprehensively reflects the heath and integrity of an ecosystem, and it is broadlydefined as the security state of a complex artificial ecosystem composed of natural, economic and socialEcological security determines the potential for sustainable development in Africa, especially with itsHowever, there is a lack of information on the ecological security state of the continent as a whole.In general, African countries showed relatively good ecological security.

Keywords: Africa     ecological security     evaluation system     PSR model    

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 787-793 doi: 10.1007/s11783-013-0526-z

Abstract: living standards and food consumption will require an integrated approach where food, water and energy securityIn this paper we examine water, energy and food security and their couplings.

Keywords: water security     energy security     food security     water-energy nexus     water conflicts    

A review of systematic evaluation and improvement in the big data environment

Feng YANG, Manman WANG

Frontiers of Engineering Management 2020, Volume 7, Issue 1,   Pages 27-46 doi: 10.1007/s42524-020-0092-6

Abstract: The era of big data brings unprecedented opportunities and challenges to management research.Exploring the applicable evaluation methods in the big data environment has become an important subjectpaper is to provide an overview and discussion of systematic evaluation and improvement in the big dataWe first review the evaluation methods based on the main analytic techniques of big data such as dataFocused on the characteristics of big data (association feature, data loss, data noise, and visualization

Keywords: big data     evaluation methods     systematic improvement     big data analytic techniques     data mining    

Data quality assessment for studies investigating microplastics and nanoplastics in food products: Arecurrent data reliable?

Frontiers of Environmental Science & Engineering 2023, Volume 17, Issue 8, doi: 10.1007/s11783-023-1694-0

Abstract:

Data quality assessment criteria for MP/NPs in food products were

Keywords: Microplastic     Nanoplastic     Food products     Data quality     Human health risk    

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Frontiers of Engineering Management 2020, Volume 7, Issue 4,   Pages 605-614 doi: 10.1007/s42524-020-0138-9

Abstract: To guarantee data privacy and data security as well as to harness the value of health data, the conceptof Health Data Bank (HDB) is proposed.In this study, HDB is defined as an integrated health data service institution, which bears no “ownership” of health data and operates health data under the principal–agent model.; (2) data rights; (3) health data supervision; (4) and willingness to share health data.

Keywords: Health Data Bank     blockchain     data assets     smart contract     incentive mechanism    

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5,   Pages 678-691 doi: 10.1007/s11783-012-0450-7

Abstract: Water environment security (WES) is defined in terms of three aspects: first, that it meets basic demandsLimitations associated with current water environment security indicators in China — including inefficiencyprocedures used to assess the risks associated with poor management practices relating to water environment securityas well as design an appropriate water environment security indicator system.

Keywords: water environment security     supervision and management     monitoring parameter     indicator system     Suzhou    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

Challenges to Engineering Management in the Big Data Era

Yong Shi

Frontiers of Engineering Management 2015, Volume 2, Issue 3,   Pages 293-303 doi: 10.15302/J-FEM-2015042

Abstract: as the Big Data applications.First, it outlines the definitions of big data, data science and intelligent knowledge and the historyof big data.Second, the paper reviews the academic activities about big data in China.and non-structured data into “structured format” and explores the relationship of data heterogeneity

Keywords: big data     data science     intelligent knowledge     engineering management     real-life applications    

Title Author Date Type Operation

Deep Learning and Industrial Internet Security: Application and Challenges

Yang Chen, Ma Ruicheng, Wang Yushi, Zhai Yanlong, Zhu Liehuang

Journal Article

On the role of optimization algorithms in ownership-preserving data mining

Muhammad KAMRAN, Ehsan Ullah MUNIR

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Soil security and global food security

Journal Article

Theoretical Method and Practice of Giant System for Mineral Resource Security

Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

One-Variable Attack on The Industrial Fault Classification System and Its Defense

Yue Zhuo, Yuri A.W. Shardt, Zhiqiang Ge

Journal Article

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Journal Article

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Journal Article

A review of systematic evaluation and improvement in the big data environment

Feng YANG, Manman WANG

Journal Article

Data quality assessment for studies investigating microplastics and nanoplastics in food products: Arecurrent data reliable?

Journal Article

Blockchain application in healthcare service mode based on Health Data Bank

Jianxia GONG, Lindu ZHAO

Journal Article

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Challenges to Engineering Management in the Big Data Era

Yong Shi

Journal Article