[1]彭超, 靳黎忠, 李中文, 等.面向数据全生命周期的数据安全风险分析[J]. 数字通信世界, 2022 (2): 99101[2]Zhang B, Zhu J, Su H. Toward the third generation artificial intelligence[J]. Science China Information Sciences, 2023, 66(2): 119[3]Galassi A, Lippi M, Torroni P. Attention in natural language processing[J]. IEEE Trans on Neural Networks and Learning Systems, 2020, 32(10): 42914308[4]Abdul W, Subarna C, Stratos I. Deeplearning: Systems and responsibility[C] Proc of the Int Conf on Management of Data. New York: ACM, 2021: 28672875[5]何文竹, 彭长根, 王毛妮, 等.面向结构化数据集的敏感属性识别与分级算法[J]. 计算机应用研究, 2020, 37(10): 30773082[6]Hassan F, Sánchez D, DomingoFerrer D. Utilitypreserving privacy protection of textual documents via word embeddings[J]. IEEE Trans on Knowledge and Data Engineering, 2021, 35(1): 10581071[7]Chong Peng.Deep learning based sensitive data detection[C] Proc of the 19th Int Computer Conf on Wavelet Active Media Technology and Information Processing. Piscataway, NJ: IEEE, 2022: 16[8]Cai Fangbo, He Jingsha, Zardari Z A, et al. Distributed management of permission for access control model[J]. Journal of Intelligent & Fuzzy Systems, 2020, 38(2): 15391548[9]Lai Chunming, Chen Meihua, Kristiani E, et al. Fakenews classification based on content level features[J]. Applied Sciences, 2022, 12(3): 1116[10]Wang Chenyu, Wang Ding, Tu Yi, et al. Understanding node capture attacks in user authentication schemes for wireless sensor networks[J]. IEEE Trans on Dependable and Secure Computing, 2020, 19(1): 507523[11]Mehraj H, Jayadevappa D, Haleem SLA, et al. Protection motivation theory using multifactor authentication for providing security over social networking sites[J]. Pattern Recognition Letters, 2021, 152: 218224[12]Arshad K, Ali R F, Muneer A, et al. Deepreinforcement learning for anomaly detection: A systematic review[J]. IEEE Access, 2022, 10: 124017124035[13]魏国富, 石英村. 人工智能数据安全治理与技术发展概述[J]. 信息安全研究, 2021, 7(2): 110119[14]Zhang Gang, Qiu Xiaofeng, Gao Yang. Software defined security architecture with deep learningbased network anomaly detection module[C] Proc of the 11th IEEE Int Conf on Communication Software and Networks (ICCSN). Piscataway, NJ: IEEE, 2019: 784788[15]Wu Zhijun, Liang Cheng, Li Yuqi. Intrusion detection method based on deep learning[C] Proc of the IEEE Int Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking. Piscataway, NJ: IEEE, 2022: 445452[16]Wang Juan, Hao Shirong, Wen Ru, et al. IoTpraetor: Undesired behaviors detection for IoT devices[J]. IEEE Internet of Things Journal, 2020, 8(2): 927940[17]Le D C, ZincirHeywood N. Exploring anomalousbehavior detection and classification for insider threat identification[J]. International Journal of Network Management, 2021, 31(4): e2109[18]Garg S, Kaur K, Batra S, et al. EnABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment[J]. Journal of Parallel and Distributed Computing, 2020, 135: 219233[19]Ding Yi, Wu Guozheng, Chen Dajiang, et al. DeepEDN: A deeplearningbased image encryption and decryption network for Internet of medical things[J]. IEEE Internet of Things Journal, 2020, 8(3): 15041518[20]Indhumathi R, Devi S S. Sathiya. Healthcare Cramér generative adversarial network (HCGAN)[J]. Distributed and Parallel Databases, 2022, 40(4): 657673[21]Jiang Honglu, Pei Jian, Yu Dongxiao, et al. Applications of differential privacy in social network analysis: A survey[J]. IEEE Trans on Knowledge and Data Engineering, 2021, 35(1): 108127[22]Dwork C.Differential privacy[C] Proc of the 33rd Int Conf on Automata, Languages and Programming. Berlin: Springer, 2006: 112[23]Acar A, Aksu H, Uluagac A S, et al. Asurvey on homomorphic encryption schemes: Theory and implementation[J]. ACM Computing Surveys, 2018, 51(4): 135[24]Vu D H, Luong T D, Ho T B. An efficient approach for secure multiparty computation without authenticated channel[J]. Information Sciences, 2020, 527: 356368[25]Alferaidi A, Yadav K, Alharbi Y, et al. Federated learning algorithms to optimize the client and cost selections[J]. Mathematical Problems in Engineering, 2022, 2022: 8514562[26]Zou Feng, Chen Xingshu, Luo Yonggang, et al. Spray: Streaminglog parser for realtime analysis[J]. Security and Communication Networks, 2022, 2022: 1559270[27]Zhong Ming, Zhou Yajin, Chen Gang. A security log analysis scheme using deep learning algorithm for IDSs in social network[J]. Security and Communication Networks, 2021, 2021: 5542543[28]Van Ede T, Aghakhani H, Spahn N, et al. Deepcase: Semisupervised contextual analysis of security events[C] Proc of the IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2022: 522539[29]中国信息通信研究院. 人工智能数据安全白皮书[EBOL]. (20190809) [20230304]. http:www.caict.ac.cnkxyjqwfbbps201908P020190809481299621393.pdf |