Resource Type

Journal Article 689

Conference Videos 18

Year

2024 1

2023 77

2022 77

2021 74

2020 66

2019 43

2018 43

2017 47

2016 38

2015 35

2014 19

2013 20

2012 15

2011 8

2010 9

2009 10

2008 16

2007 18

2006 11

2005 16

open ︾

Keywords

food security 39

neural network 32

artificial neural network 21

energy security 19

Neural network 11

network 10

optimization 9

Artificial intelligence 7

China 7

convolutional neural network 7

genetic algorithm 7

sustainable development 7

Deep learning 6

artificial neural network (ANN) 6

cyberspace security 5

security 5

BP neural network 4

Physical layer security 4

water security 4

open ︾

Search scope:

排序: Display mode:

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 872-884 doi: 10.1631/FITEE.1800520

Abstract:

By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-sourceIt is difficult for traditional named entity recognition methods to identify mixed security entitiesin Chinese and English in the field of network security, and there are difficulties in accurately identifyingnetwork security entities because of insufficient features extracted.In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural

Keywords: Network security entity     Security knowledge graph (SKG)     Entity recognition     Feature template     Neural network    

Automatically building large-scale named entity recognition corpora from Chinese Wikipedia

Jie ZHOU,Bi-cheng LI,Gang CHEN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 11,   Pages 940-956 doi: 10.1631/FITEE.1500067

Abstract: Named entity recognition (NER) is a core component in many natural language processing applications.To reduce tagging errors caused by entity classification, we design four types of heuristic rules based

Keywords: NER corpora     Chinese Wikipedia     Entity classification     Domain adaptation     Corpus selection    

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Strategic Study of CAE 2004, Volume 6, Issue 1,   Pages 10-15

Abstract:

The content of computer network security is discussed in this article Firstly, the concept, systemand structure and model of computer network security are given.

Keywords: computer     network     system     security    

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017

Abstract:

Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assurancetraditional areas in order to improve current emergency technical measures becomes an important part of networksecurity.author proposes a multi-linkage elimination method that can mobilize system strength and protect against network

Keywords: network security     threat     information security     emergency response     emergency system    

A review on cyber security named entity recognition Review Article

Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9,   Pages 1153-1168 doi: 10.1631/FITEE.2000286

Abstract: These texts include not only security concepts, incidents, tools, guidelines, and policies, but alsoDue to the complexity and diversity of texts in the domain, it is difficult to identify security entities

Keywords: 命名实体识别(NER);信息抽取;网络空间安全;机器学习;深度学习    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought aboutbecome the double threats to the industry’s dedicated network and the traditional network architecturerestricts network security and reliability in the rail transit industry.security, (3) improving the operation and management of network security, and (4) enhancing talent cultivationfor network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Named entity recognition for Chinese construction documents based on conditional random field

Frontiers of Engineering Management 2023, Volume 10, Issue 2,   Pages 237-249 doi: 10.1007/s42524-021-0179-8

Abstract: Named entity recognition (NER) is essential in many natural language processing (NLP) tasks such as information

Keywords: NER     NLP     Chinese language     construction document    

Improving entity linking with two adaptive features Research Article

Hongbin ZHANG, Quan CHEN, Weiwen ZHANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 11,   Pages 1620-1630 doi: 10.1631/FITEE.2100495

Abstract:

(EL) is a fundamental task in natural language processing. Based on neural networks, existing systems pay more attention to the construction of the , but ignore latent semantic information in the and the acquisition of effective information. In this paper, we propose two , in which the first adaptive feature enables the local and s to capture latent information, and the second adaptive feature describes effective information for embeddings. These can work together naturally to handle some uncertain information for EL. Experimental results demonstrate that our EL system achieves the best performance on the AIDA-B and MSNBC datasets, and the best average performance on out-domain datasets. These results indicate that the proposed , which are based on their own diverse contexts, can capture information that is conducive for EL.

Keywords: Entity linking     Local model     Global model     Adaptive features     Entity type    

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011

Abstract: Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection forat the national level, a network security testing and certification system for the equipment shouldbe established, research on the network security architecture and engineering application of the equipmentshould be promoted, and the network security risk monitoring and perception of the equipment should

Keywords: industrial Internet equipment     network security     management     protection     certification    

Discussion on a new paradigm of endogenous security towards 6G networks Review

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1421-1450 doi: 10.1631/FITEE.2200060

Abstract:

The sixth-generation mobile communication (6G) networks will face more complex endogenous securityproblems, and it is urgent to propose new universal security theories and establish new practice normsto deal with the "unknown unknown" security threats in cyberspace.of 6G cyberspace security.of endogenous security and traditional security.

Keywords: 6G security     New paradigm of endogenous security     Core network     Wireless access network    

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 15-21 doi: 10.15302/J-SSCAE-2021.02.003

Abstract: for new businesses and the continuous development of the Internet economy have increasingly demanded networkstatus of new network fields in China and abroad, and summarize the development trend of new networkSubsequently, we summarize the gaps and development goals of China in the new network field.Finally we propose the key technologies for the new network development in China, including new network, network intelligence technology, and endogenous security structure.

Keywords: new network architecture,full-dimension definable,polymorphic addressing and routing,network intelligence, endogenous security structure    

Entity and relation extraction with rule-guided dictionary as domain knowledge

Frontiers of Engineering Management   Pages 610-622 doi: 10.1007/s42524-022-0226-0

Abstract: Entity and relation extraction is an indispensable part of domain knowledge graph construction, whichThe existing entity and relation extraction methods that depend on pretrained models have shown promisingSecond, domain rules were built to eliminate noise in entity relations and promote potential entity relationThe F1 value on laser industry entity, unmanned ship entity, laser industry relation, and unmannedentity pair and unmanned ship entity pair datasets, respectively.

Keywords: entity extraction     relation extraction     prior knowledge     domain rule    

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014

Abstract: Research on computing task scheduling and network interconnection are still inadequate.and summarizes the developmental trends of computing-network integration., storage, and computing, intelligent arrangement of service functions, and endogenous securitystructure, as well as demonstration applications in the smart park network, vertical industry network, and data center network scenarios.

Keywords: intelligent connection computing network technology     diversified protocol     integration of network     storage     and computing     intelligent arrangement of service functions     endogenous security    

A decision-making method about the design quality of component-based active load section entity model

Yuan Hui,Wang Fengshan,Xu Jiheng,Fu Chengqun

Strategic Study of CAE 2013, Volume 15, Issue 5,   Pages 106-112

Abstract: effectively support various topology operation and military damage applications, a component-based entityAccording to the design variety and validity confirmation in component-based protective engineering entitypositive and negative ideal project, the superiority degree model was established for the component-based entityCase showed that model effectively solved the decision-making problem about entity model design operations, which provided one theory and method for scientific decision-making practice in entity model design

Keywords: protective engineering     component     design quality     entity model     intuitionistic fuzzy sets     superiority    

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 56-64 doi: 10.15302/J-SSCAE-2021.02.008

Abstract:

 Industrial Internet security is crucial for strengthening the manufacturingand network sectors of China.high portability, can support the establishment of an intelligent and autonomous industrial Internet securityIn this study, we analyze the development demand for industrial Internet security from the perspectivestatus of deep learning to industrial Internet security in terms of device, control, network, application

Keywords: industrial Internet,supply chain,network security,development path    

Title Author Date Type Operation

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Journal Article

Automatically building large-scale named entity recognition corpora from Chinese Wikipedia

Jie ZHOU,Bi-cheng LI,Gang CHEN

Journal Article

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Journal Article

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Journal Article

A review on cyber security named entity recognition

Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Named entity recognition for Chinese construction documents based on conditional random field

Journal Article

Improving entity linking with two adaptive features

Hongbin ZHANG, Quan CHEN, Weiwen ZHANG

Journal Article

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Journal Article

Discussion on a new paradigm of endogenous security towards 6G networks

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Journal Article

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Journal Article

Entity and relation extraction with rule-guided dictionary as domain knowledge

Journal Article

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Journal Article

A decision-making method about the design quality of component-based active load section entity model

Yuan Hui,Wang Fengshan,Xu Jiheng,Fu Chengqun

Journal Article

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Journal Article