期刊文献+
共找到764篇文章
< 1 2 39 >
每页显示 20 50 100
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
1
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
在线阅读 下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
2
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
在线阅读 下载PDF
Dynamic Multi-Objective Gannet Optimization(DMGO):An Adaptive Algorithm for Efficient Data Replication in Cloud Systems
3
作者 P.William Ved Prakash Mishra +3 位作者 Osamah Ibrahim Khalaf Arvind Mukundan Yogeesh N Riya Karmakar 《Computers, Materials & Continua》 2025年第9期5133-5156,共24页
Cloud computing has become an essential technology for the management and processing of large datasets,offering scalability,high availability,and fault tolerance.However,optimizing data replication across multiple dat... Cloud computing has become an essential technology for the management and processing of large datasets,offering scalability,high availability,and fault tolerance.However,optimizing data replication across multiple data centers poses a significant challenge,especially when balancing opposing goals such as latency,storage costs,energy consumption,and network efficiency.This study introduces a novel Dynamic Optimization Algorithm called Dynamic Multi-Objective Gannet Optimization(DMGO),designed to enhance data replication efficiency in cloud environments.Unlike traditional static replication systems,DMGO adapts dynamically to variations in network conditions,system demand,and resource availability.The approach utilizes multi-objective optimization approaches to efficiently balance data access latency,storage efficiency,and operational costs.DMGO consistently evaluates data center performance and adjusts replication algorithms in real time to guarantee optimal system efficiency.Experimental evaluations conducted in a simulated cloud environment demonstrate that DMGO significantly outperforms conventional static algorithms,achieving faster data access,lower storage overhead,reduced energy consumption,and improved scalability.The proposed methodology offers a robust and adaptable solution for modern cloud systems,ensuring efficient resource consumption while maintaining high performance. 展开更多
关键词 Cloud computing data replication dynamic optimization multi-objective optimization gannet optimization algorithm adaptive algorithms resource efficiency SCALABILITY latency reduction energy-efficient computing
在线阅读 下载PDF
A Novel Malware Detection Framework for Internet of Things Applications
4
作者 Muhammad Adil Mona M.Jamjoom Zahid Ullah 《Computers, Materials & Continua》 2025年第9期4363-4380,共18页
In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer sever... In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer several advantages over conventional technologies in the near future.However,the potential growth of this technology also attracts attention from hackers,which introduces new challenges for the research community that range from hardware and software security to user privacy and authentication.Therefore,we focus on a particular security concern that is associated with malware detection.The literature presents many countermeasures,but inconsistent results on identical datasets and algorithms raise concerns about model biases,training quality,and complexity.This highlights the need for an adaptive,real-time learning framework that can effectively mitigate malware threats in IoT applications.To address these challenges,(i)we propose an intelligent framework based on Two-step Deep Reinforcement Learning(TwStDRL)that is capable of learning and adapting in real-time to counter malware threats in IoT applications.This framework uses exploration and exploitation phenomena during both the training and testing phases by storing results in a replay memory.The stored knowledge allows the model to effectively navigate the environment and maximize cumulative rewards.(ii)To demonstrate the superiority of the TwStDRL framework,we implement and evaluate several machine learning algorithms for comparative analysis that include Support Vector Machines(SVM),Multi-Layer Perceptron,Random Forests,and k-means Clustering.The selection of these algorithms is driven by the inconsistent results reported in the literature,which create doubt about their robustness and reliability in real-world IoT deployments.(iii)Finally,we provide a comprehensive evaluation to justify why the TwStDRL framework outperforms them in mitigating security threats.During analysis,we noted that our proposed TwStDRL scheme achieves an average performance of 99.45%across accuracy,precision,recall,and F1-score,which is an absolute improvement of roughly 3%over the existing malware-detection models. 展开更多
关键词 IoT applications security malware detection advanced machine learning algorithms data privacy challenges
在线阅读 下载PDF
A Survey of Bitmap Index Compression Algorithms for Big Data 被引量:5
5
作者 Zhen Chen Yuhao Wen +6 位作者 Junwei Cao Wenxun Zheng Jiahui Chang Yinjun Wu Ge Ma Mourad Hakmaoui Guodong Peng 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期100-115,共16页
With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for pac... With the growing popularity of Internet applications and the widespread use of mobile Internet, Internet traffic has maintained rapid growth over the past two decades. Internet Traffic Archival Systems(ITAS) for packets or flow records have become more and more widely used in network monitoring, network troubleshooting, and user behavior and experience analysis. Among the three key technologies in ITAS, we focus on bitmap index compression algorithm and give a detailed survey in this paper. The current state-of-the-art bitmap index encoding schemes include: BBC, WAH, PLWAH, EWAH, PWAH, CONCISE, COMPAX, VLC, DF-WAH, and VAL-WAH. Based on differences in segmentation, chunking, merge compress, and Near Identical(NI) features, we provide a thorough categorization of the state-of-the-art bitmap index compression algorithms. We also propose some new bitmap index encoding algorithms, such as SECOMPAX, ICX, MASC, and PLWAH+, and present the state diagrams for their encoding algorithms. We then evaluate their CPU and GPU implementations with a real Internet trace from CAIDA. Finally, we summarize and discuss the future direction of bitmap index compression algorithms. Beyond the application in network security and network forensic, bitmap index compression with faster bitwise-logical operations and reduced search space is widely used in analysis in genome data, geographical information system, graph databases, image retrieval, Internet of things, etc. It is expected that bitmap index compression will thrive and be prosperous again in Big Data era since 1980s. 展开更多
关键词 Internet traffic big data traffic archival network security bitmap index bitmap compression algorithm
原文传递
Security and Optimization Challenges of Green Data Centers
6
作者 Arif Sari Murat Akkaya 《International Journal of Communications, Network and System Sciences》 2015年第12期492-500,共9页
Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy... Energy consumption in data centers has grown out of proportion in regard to the state of energy that’s available in the universe. Technology has improved services and its application. The need for eco-friendly energy and increase in data centers performance brought about Green Computing into the energy consumption of data centers. Information technology has grown and eaten deep into the society that almost all the sectors if not all are dependent on information technology to move on. The consumption of power has increased greatly. In this research paper the techniques for optimizing energy in data centers for Green Computing would be discussed. This study intends to expose the limitations of existing security solutions for securing data centers by taking into consideration of limitations of existing security frameworks that cannot enhance the security of data centers. 展开更多
关键词 Green data CENTERS data CENTERS ENERGY efficiency Optimization security
在线阅读 下载PDF
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
7
作者 Mohammad Anwar Hossain Ahsan Ullah +1 位作者 Newaz Ibrahim Khan Md Feroz Alam 《Journal of Information Security》 2019年第4期199-236,共38页
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no... Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud. 展开更多
关键词 data security Cloud Computing Encryption DECRYPTION Secret Key SYMMETRIC ALGORITHM 192 BITS HASHING PERMUTATION SHA-512
在线阅读 下载PDF
Application of Web data mining technology in the information security management
8
作者 Wang Kun 《Journal of Zhouyi Research》 2014年第1期55-57,共3页
关键词 信息安全管理 应用模型 WEB挖掘技术 APRIORI算法 网络信息安全 数据挖掘技术 安全管理系统 关联分析
在线阅读 下载PDF
A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System 被引量:5
9
作者 GUO Fangfang HU Yibing +2 位作者 XIU Longting FENG Guangsheng WANG Shuaishuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期126-132,共7页
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po... A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively. 展开更多
关键词 distributed security behavior monitoring peer-to- peer (P2P) data fusion DS evidence theory PSO algorithm
原文传递
Dynamic Encryption and Secure Transmission of Terminal Data Files 被引量:1
10
作者 Ruchun Jia Yang Xin +1 位作者 Bo Liu Qin Qin 《Computers, Materials & Continua》 SCIE EI 2022年第4期1221-1232,共12页
Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encr... Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data,so as to prevent data leakage,take the data characteristics as the core,use transparent encryption and decryption technology as the leading,and According to the data element characteristics such as identity authentication,authority management,outgoing management,file audit and external device management,the terminal data is marked with attributes to form a data leakage prevention module with data function,so as to control the data in the whole life cycle from creation,storage,transmission,use to destruction,no matter whether the data is stored in the server,PC or mobile device,provide unified policy management,form ecological data chain with vital characteristics,and provide comprehensive protection system for file dynamic encryption transmission,such as prevention in advance,control in the event,and audit after the event,so as to ensure the security of dynamic encryption in the process of file transmission,ensure the core data of the file,and help the enterprise keep away from the risk of data leakage. 展开更多
关键词 Terminal data data anti disclosure dynamic symmetric key dncryption algorithm secure transmission
在线阅读 下载PDF
Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems 被引量:1
11
作者 Fadwa Alrowais Ahmed S.Almasoud +5 位作者 Radwa Marzouk Fahd N.Al-Wesabi Anwer Mustafa Hilal Mohammed Rizwanullah Abdelwahed Motwakel Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第8期2783-2795,共13页
Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction o... Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction of deep learning(DL)and hardware technologies paves amethod in detecting the current traffic status,data offloading,and cyberattacks in MEC.This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC(AIMDO-SMEC)systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy(ASCE)technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm(MSSA)with extreme gradient boosting(XGBoost)technique was implemented to identification and classification of cyberattack that exist in the MEC systems.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks(CTT)of 0.680. 展开更多
关键词 data offloading mobile edge computing security machine learning artificial intelligence XGBoost salp swarm algorithm
在线阅读 下载PDF
Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic
12
作者 Boris S. Verkhovsky Roberto D. Rubino 《International Journal of Communications, Network and System Sciences》 2012年第5期245-252,共8页
Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New tech... Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New techniques are required in order to classify packets based on user identity in addition to the traditional source and destination host addresses. This paper introduces Gaussian cryptographic techniques and protocols to assist network administrators in the complex task of identifying the originators of data packets on a network and more easily policing their behavior. The paper provides numerical examples that illustrate certain basic ideas. 展开更多
关键词 CORPORATE security Authorized Traffic data LEAKAGE CRYPTOGRAPHIC Token Authentication TRUSTED Authorities Toom-Cook Algorithm
在线阅读 下载PDF
Protecting Data Mobility in Cloud Networks Using Metadata Security
13
作者 R.Punithavathi M.Kowsigan +3 位作者 R.Shanthakumari Miodrag Zivkovic Nebojsa Bacanin Marko Sarac 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期105-120,共16页
At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorith... At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data.Sometimes,data may have highly sensitive information,lead-ing users to consider using big data and cloud processing regardless of whether they are secured are not.Threats to sensitive data in cloud systems produce high risks,and existing security methods do not provide enough security to sensitive user data in cloud and big data environments.At present,several security solu-tions support cloud systems.Some of them include Hadoop Distributed File Sys-tem(HDFS)baseline Kerberos security,socket layer-based HDFS security,and hybrid security systems,which have time complexity in providing security inter-actions.Thus,mobile data security algorithms are necessary in cloud environ-ments to avoid time risks in providing security.In our study,we propose a data mobility and security(DMoS)algorithm to provide security of data mobility in cloud environments.By analyzing metadata,data are classified as secured and open data based on their importance.Secured data are sensitive user data,whereas open data are open to the public.On the basis of data classification,secured data are applied to the DMoS algorithm to achieve high security in HDFS.The pro-posed approach is compared with the time complexity of three existing algo-rithms,and results are evaluated. 展开更多
关键词 data mobility data security cloud computing big data DMoS algorithm
在线阅读 下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
14
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
在线阅读 下载PDF
Protection of Basic Human Rights in the Application of Big Data to Counter Terrorism
15
作者 夏雨 齐延平 PAN Yingzhao(译) 《The Journal of Human Rights》 2019年第5期590-602,共13页
In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strate... In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strategy.The application of big data technology to counterterrorism efforts has become a powerful weapon for all countries.However,due to the uncertainty,difficulty of interpretation and potential risk of discrimination in big data technology and algorithm models,basic human rights,freedom and even ethics are likely to be impacted and challenged.As a result,there is an urgent need to prioritize basic human rights and regulate the application of big data for counter terrorism purposes.The legislation and law enforcement regarding the use of big data to counter terrorism must be subject to constitutional and other legal reviews,so as to strike a balance between safeguarding national security and protecting basic human rights. 展开更多
关键词 the application of BIG data to COUNTER TERRORISM algorithm DISCRIMINATION national security basic human RIGHTS the principle of BALANCE
原文传递
ML-SPAs:Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks
16
作者 Saad Awadh Alanazi 《Computers, Materials & Continua》 SCIE EI 2024年第12期4049-4080,共32页
Spear Phishing Attacks(SPAs)pose a significant threat to the healthcare sector,resulting in data breaches,financial losses,and compromised patient confidentiality.Traditional defenses,such as firewalls and antivirus s... Spear Phishing Attacks(SPAs)pose a significant threat to the healthcare sector,resulting in data breaches,financial losses,and compromised patient confidentiality.Traditional defenses,such as firewalls and antivirus software,often fail to counter these sophisticated attacks,which target human vulnerabilities.To strengthen defenses,healthcare organizations are increasingly adopting Machine Learning(ML)techniques.ML-based SPA defenses use advanced algorithms to analyze various features,including email content,sender behavior,and attachments,to detect potential threats.This capability enables proactive security measures that address risks in real-time.The interpretability of ML models fosters trust and allows security teams to continuously refine these algorithms as new attack methods emerge.Implementing ML techniques requires integrating diverse data sources,such as electronic health records,email logs,and incident reports,which enhance the algorithms’learning environment.Feedback from end-users further improves model performance.Among tested models,the hierarchical models,Convolutional Neural Network(CNN)achieved the highest accuracy at 99.99%,followed closely by the sequential Bidirectional Long Short-Term Memory(BiLSTM)model at 99.94%.In contrast,the traditional Multi-Layer Perceptron(MLP)model showed an accuracy of 98.46%.This difference underscores the superior performance of advanced sequential and hierarchical models in detecting SPAs compared to traditional approaches. 展开更多
关键词 Spear phishing attack CYBERsecurity healthcare security data privacy machine learning SEQUENTIAL hierarchal Algorithm
在线阅读 下载PDF
生成式AI大模型的风险问题与规制进路:以GPT-4为例 被引量:7
17
作者 王晓丽 严驰 《北京航空航天大学学报(社会科学版)》 2025年第2期17-27,共11页
生成式人工智能的发展为人类社会带来了深层次和颠覆性的挑战。GPT-4在技术更新的同时也引发了底层算法、训练数据、知识产权方面的风险。在底层算法上,尽管GPT-4中潜藏着算法歧视的风险,但算法公开殊无必要,应借鉴类脑研究思路,推动GP... 生成式人工智能的发展为人类社会带来了深层次和颠覆性的挑战。GPT-4在技术更新的同时也引发了底层算法、训练数据、知识产权方面的风险。在底层算法上,尽管GPT-4中潜藏着算法歧视的风险,但算法公开殊无必要,应借鉴类脑研究思路,推动GPT-4走向通用人工智能;在训练数据上,GPT-4背后的海量数据存在较大的合规风险,应设立数据销毁制度,维护意识形态安全,探索中国特色发展方案;在知识产权上,GPT-4带来了一系列侵权风险,引发了生成物的作品属性认定争议,但尚无法构成对人类的作者主体资格的挑战。为更好地应对生成式人工智能大模型技术发展风险,应及时制定合适的规制方案,在元规制理论下,借鉴欧盟《数字服务法》中的制度设计,结合已有算法治理实践,寻求数字时代的自主创新,助力人工智能产业安全发展。 展开更多
关键词 人工智能 GPT-4 大模型 算法歧视 数据安全 知识产权
在线阅读 下载PDF
生态环境大数据背景下环境治理的路径优化研究 被引量:2
18
作者 李祎恒 吴嘉慧 《大数据》 2025年第2期167-176,共10页
生态环境大数据作为新质生产力的重要组成部分,有助于推动环境治理高效化、科学化、精准化,实现环境治理向智能化转型。然而,将生态环境大数据应用于我国环境治理实践仍面临诸多现实问题:一是缺乏数据利用相关的法律规范,妨碍了数据利用... 生态环境大数据作为新质生产力的重要组成部分,有助于推动环境治理高效化、科学化、精准化,实现环境治理向智能化转型。然而,将生态环境大数据应用于我国环境治理实践仍面临诸多现实问题:一是缺乏数据利用相关的法律规范,妨碍了数据利用,导致数据调用困难;二是生态环境大数据安全技术保障不足,引发数据失真和数据泄露等安全风险;三是算法监管制度不完善带来算法歧视,破坏我国环境治理生态。为解决上述现实问题,提出加强立法、技术保障和监督管理三方面的优化措施,通过加强数据基本法律制度建设,加强隐私保护、区块链等数字安全保障技术的研究以及健全算法监管方式等措施,纾解生态环境大数据应用过程中面临的问题,为实现环境治理现代化打下坚实基础。 展开更多
关键词 生态环境大数据 环境治理 数据安全 区块链 算法监督
在线阅读 下载PDF
基于基因算法的数据中心冷源系统能耗建模与优化 被引量:1
19
作者 贺晓 刘湃 +4 位作者 周翰辰 许环宇 许俊 胡孝俊 高健 《暖通空调》 2025年第2期113-119,共7页
针对数据中心冷源系统,采用数据机理双驱动的方法对冷源系统中的冷水机组、水泵及冷却塔能耗进行建模,提出了基于基因算法的数据中心冷源系统能耗优化方法,并以重庆市某数据中心制冷系统为研究案例进行了分析。计算结果显示,通过使用该... 针对数据中心冷源系统,采用数据机理双驱动的方法对冷源系统中的冷水机组、水泵及冷却塔能耗进行建模,提出了基于基因算法的数据中心冷源系统能耗优化方法,并以重庆市某数据中心制冷系统为研究案例进行了分析。计算结果显示,通过使用该建模优化方法,相比优化前凭工人经验调节的运行方法,冷源系统的能耗平均减少约8.5%。 展开更多
关键词 数据中心 冷源系统 节能优化 数据机理双驱动 能耗模型 基因算法
在线阅读 下载PDF
算法垄断行为的刑法规制 被引量:2
20
作者 张勇 李泽远 《南京邮电大学学报(社会科学版)》 2025年第1期50-60,共11页
算法垄断行为是指利用算法排除、限制竞争及其他排他性滥用的行为,包括算法共谋和以算法为垄断工具的行为。相比传统垄断行为,算法垄断行为的覆盖面更广、稳定性与隐蔽性更强,会严重侵害竞争法益,因此,对其进行刑法规制具有必要性。在... 算法垄断行为是指利用算法排除、限制竞争及其他排他性滥用的行为,包括算法共谋和以算法为垄断工具的行为。相比传统垄断行为,算法垄断行为的覆盖面更广、稳定性与隐蔽性更强,会严重侵害竞争法益,因此,对其进行刑法规制具有必要性。在刑法中设立包括个人在内的刑事责任,具有提高实施垄断行为违法成本和增强威慑力的功能。刑法现有罪名只能对实施算法垄断行为过程中产生的危害行为进行规制,很难直接规制以算法共谋为代表的算法垄断行为。在刑法规制完善上,可以通过对既有罪名进行司法解释的方式,同时遵循刑法谦抑性原则、比例原则并注重刑行责任衔接。倘若设立垄断罪,应当涵盖算法共谋行为并确立前置行政程序规范对法条竞合予以排除,在法定刑设置上应在主刑设置自由刑,在附加刑设置罚金刑,在处罚对象上既处罚自然人也处罚单位,对单位犯罪实行双罚制。 展开更多
关键词 算法垄断 竞争法益 算法共谋 刑法规制 刑行衔接 数据安全
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部