Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
Network Security
Home
Current
Archives
Instructions for Authors
Submissions
Contact
Search
Home
Archives
Vol. 2024 No. 12: In Press
Published:
2025-04-08
ARTICLES
Research on Dynamic Security Monitoring Mechanism in the Software Development Process
Siwei Li, Mingfei Zeng
PDF
Exploring Secure Digital Platforms for Personalized Fitness Programs in Physical Education Environments
Honglei Zou, Liu Li
PDF
Integration of AI in Physical Education for Secure Student Health Monitoring and Cyber-Resilient Data Management
Yan Qiu
PDF
A Study of Deep Convolutional Generative Adversarial Networks for Style Transformation and Generation in Online Artwork Creation
Jie Zhou, Yu Zhou, Lu Yang
PDF
A Trigonometric Function-Based Big Data Model for Network Information Security Control Mechanisms
Bohan Zhang, Ruoyu Tan
PDF
Through Transformer Model to Enhance the Capability of Resolving Word Sense Ambiguity in English-Chinese Translation System
Weigang Wang
PDF
Research on Dynamic Monitoring and Defense Strategy of Illegal Access Risk of College Teaching Resources Based on Network Intrusion Detection System
Wenjing Song , Dongyan Li, Zebin Hu
PDF
Research on Data Leakage Detection System for Online Nursing Teaching Platform Based on Deep Learning
Yongqi Zheng, Fangfang Zhang, Xiuxiu Wu, Jingya Zhang
PDF
Exploring Cybersecurity Based on Educational Knowledge Graph Construction and Reasoning in Pre-trained Language Models
Yu Lu, Yin Ling
PDF
Application Research on Real-time Monitoring and Fault Early Warning System of Oilfield Production Equipment Based on Internet of Things Technology
Lijun Wang, Guowei Shi, Weifang Zhao, Shijie Fang, Di Bie
PDF
Application and Optimization of Large Language Model in the Construction of Electric Power Security Corpus
Siwu Yu, Yumin He, Guobang Ban, Teng Gui, Xiangquan Hu, Yang Mei, Jingjing Zhang
PDF
Industrial Systemic Risk Measurement and Network Security Forecast of Data Center under the Background of New Infrastructure
Wei Yu
PDF
Enterprise Credit Rating Method Based on Scalable SVM Decision Tree Algorithm
Miaoxi Gu, Kecai Fan
PDF
A Study of Digitized Semantic Transformation Based on Convolutional Neural Network in Jin Folk Culture Scenarios
Libin Wang
PDF
Application of Emotional Interaction Analysis Based on Deep Learning in Psychological Defense of Network Security in College Innovation and Entrepreneurship Education
Wei Qin
PDF
Performance Evaluation of Integrated Learning Algorithms for E-Commerce Product Classification and Prediction
Limei Mo, Zhaoxia Ma
PDF
Design of Enterprise Financial Information Sharing System Based on Zero-Knowledge Proofs
Su Zheng
PDF
Reinforcement Learning from Human Feedback in Power System Risk Point Identification
Siwu Yu, Yumin He, Guobang Ban, Jintong Ma, Guanghui Xi, Lingwen Meng, Shasha Luo, Siqi Guo
PDF
A Method for Analysing Intrinsic Safety in the Power Industry Based on Automatic Cue Learning
Siwu Yu, Yumin He, Guobang Ban, Jintong Ma, Guanghui Xi, Lingwen Meng, Shasha Luo, Siqi Guo
PDF
Discussion on the Integration of Civics and Law Teaching Based on Network Public Opinion Perspective
Ziqi Zhang
PDF
Research on the Construction and Optimization Path of Digital Marketing Systems Driven by Deep Learning Algorithms
Jun Feng
PDF
Optimizing the Efficacy of Intrusion Detection and Prevention Systems in Response to Man-in-the-Middle Attacks in the Internet of Things (IoT)
Yan Gong
PDF
AI-Powered Eye-Tracking Technology Revolutionizes Visual Environment Assessment in Urban Rail Transit Spaces and Establishes Cybersecurity Defense Frameworks
Leilei Zhai, Haishan Xia, Pohsun Wang, Liming Wu, Jianye Zhai, Yuqing Qu
PDF
Research on Optimization of Power Safety Intelligent Q&A System Based on Multi-source Knowledge Graph Enhanced Large Language Modeling
Siwu Yu, Yumin He, Guobang Ban, Xiangquan Hu, Yang Mei, Jingjing Zhang, Anjun Li, Siqi Guo
PDF
Discussion on the Advantages of Online Teaching of Nursing Specialties Based on Network Safety and Security and Construction of Quality Enhancement Mechanisms
Xiaohong Meng
PDF
The Legal Boundaries and Liability Determination of the Social Co-governance of Network Security under the Zero Trust Architecture
Feiju Su, Ran Qiao
PDF
Clustering Algorithms in Education Industry Customer Segmentation to Facilitate Business Model Innovation and Marketing Data Assurance Exploration
Xiaohua Yang, Yanzhen Luo
PDF
Application of intrinsic safety analysis in accident prevention in power systems
Siwu Yu, Yumin He, Guobang Ban, Xiangquan Hu, Yang Mei, Jingjing Zhang, Anjun Li, Jiangang Liu
PDF
Electricity security risk point identification method based on large language modeling and instruction fine-tuning
Siwu Yu, Yumin He, Guobang Ban, Xiangquan Hu, Yang Mei, Jingjing Zhang, Anjun Li, Bangming Zhang
PDF
Research on the Identification of Network Responsibility Boundaries Based on Cultural Identity in AI and Online Language Education
Yi Huang
PDF
Kernel function algorithm-based innovation of personal information protection mechanism of rural financial and technological service stations and its impact on the sustainable growth of rural economy
Menghan Huang, Qin Chen
PDF
Research on the Synergistic Development Mechanism of Emerging Technologies (VR/AR) and Cybersecurity in the Perspective of Art Education Psychology
ziqi yu
PDF
Construction of Ideological and Political Theory Intelligent Curriculum System based on the Collaboration of Digital Technology and Network Security
Chunfang Wang, Bin Zhang, Min Zhang
PDF
ConViT-Driven Pixel-Level Semantic Segmentation for Multi-Spectral Remote Sensing from a Cybersecurity Perspective: A Comparative Study of Advanced Models
Chunlai Li, Yifan Ru, Guoliang Tang
PDF
Augmented Reality and Virtual Reality Technology Construct the Privacy Protection of College English Smart Classroom Teaching Mode
Quanquan Zhu, Gu Feng, Jia Luo, Mei Yang
PDF
AntConc-Assisted Quantitative Study of the Translation Styles of Paik’s Crystal Boys and Howard Goldblatt’s English Translation of Crystal Boys with Embedded Data Privacy Protection Mechanisms
Shuying Feng
PDF
Research on multi-dimensional quantitative evaluation index system of software supply chain security
heng xia, Meng Liang
PDF
Network Protection Design and Research on GraphSAGE Algorithm forBuilding Enterprise Customer Profile and Precision Marketing Capability
Xiaohua Yang, yan zhen Luo
PDF
Design of Dynamic User Profile Updating and Accurate Recommendation System for E-commerce Platform Combined with Attention Mechanism.
Yuanyuan Wang
PDF
Improve network protection capability of Japanese language education system with security architecture
Xiaofeng Tian
PDF
Performance Evaluation of Safety Control Methods for Multi-motor Cooperative System Based on Adaptive Immune Algorithm and Network Security
Lichao Tang, Huilin Zhang
PDF
Construction of Artificial Intelligence-Driven Digital Preservation and Cybersecurity Protection System for Historical Ethnic Music
Shiyun Wang
PDF
Digital protection and inheritance system construction of folk art empowered by ai image restoration technology
Sainan Yang
PDF
Utilizing Deep Convolutional Neural Networks (DCNN) to Reconstruct Visual Narratives of Fuzhou Ancient Residences
Xiang Huang
PDF
Semantic Analysis and Translation Optimization of English Sentences Based on Long Short-Term Memory Network (LSTM)ng Short-Term Memory Network (LSTM)
Jinying Leng, Xiaoqing Lin
PDF
Data Privacy Protection of College English Platform Based on Edge Computing and Encryption Technology
Yumeng Wu
PDF
Security Risks of Internet Rumors from the Perspective of Communication and Accurate Interception Technology Based on Graphsage Algorithm
Zhen Chen
PDF
Optimization of Key-Driven Compressive Image Encryption Algorithm Based on Chaos-CNN Hybrid Network
Liping Liu
PDF
Research on APT Attack Threats and Attack Traceability Mechanisms of Embedded Financial Forecasting System
Wen Chen
PDF
Combination of Virtual Reality and Augmented Reality Technology in the Application of Higher Vocational English Teaching and Network Security Protection
Fengna Zhang, Xinxin Li
PDF
Study on the linkage between intelligent network connection network security mapping and power battery failure prediction for new energy vehicles based on digital twins
Yuyi Chen
PDF
From ‘factory labour’ to ‘digital labour’: a paradigm shift of the Marxist theory of labour emancipation in the field of cybersecurity
Liling Dai
PDF
Digital assisted analysis and data privacy protection of symbolic elements in Japanese literature
Yi Liu
PDF
Research on Real-Time Detection and Anti-Interference of Road Traffic Signs Based on YOLOv8 Algorithm in Automatic Driving Environment
Chunxia Qi
PDF
English Semantic Coherence Analysis and Translation Optimization Based on Tree-like Long and Short-term Memory Networks
Lili Wang, Na Zhao
PDF
Mechanisms of the role of machine learning system patches in optimizing the performance of financial time series models
Chenghang Dong
PDF
Research on Anomaly Detection and Prediction of Internet Medical Network Traffic Based on Graph Neural Networks and Temporal Convolution
Xiangkun Zou, Lei Wang, Jing Sun, Shengyu Guo, Ning Li
PDF
Research on Customer Experience Optimization Strategy Based on Data Mining Technology in Rural Tourism System in the Digital Age
Jiru Ren
PDF
Book Lending Prediction of Universities Based on Improved GA-BP Neural Network
Shenglin Xu, Yuqing Liang, Mingliang Zheng
PDF
Construction of Engineering Cost Data Transmission Security Management System Based on Secure File Transmission Protocol
Hangtian Liu
PDF
Construction and Application of Ambiguity Resolution Translation System for English Legal Text Based on BERT Model
Yuxiang Nan, Lili Liu
PDF
Security Risks and Governance of Cross-Border Flow of GAI Data
Kewen Ning
PDF
Reducing Data Interaction Risks in Power Engineering by Using Distribution DAS Technology
Yaohua Wang, Wei Su
PDF
Construction and Application of AES-256 Technology in Data Security Guarantee Mechanism in the Networked Development of Ethnic Traditional Sports
Chuang Yang, Feng Zhang, Gui Chai
PDF
Cybersecurity Risks and Coping Strategies in Ethnic Music Digital Storage
Gang DU
PDF
Convergence of medical big data and artificial intelligence: a new paradigm for disease prediction
Bingqian Yang , Weihong Wu, Yanmin Zhang, Lei Tong
PDF
Enterprise Network Abnormal Behavior Detection and Defense Strategy Based on LOF
Peng Wang, Yan Qi, Bin Pu
PDF
Anomaly Detection and Repair of Drop-out Fuses in Alpine Areas Using β-TCVAE and Dynamic Bayesian Networks
Shoujun Bao, Shuhong Li Li, Ziyong Pan, Fuxiang Liang, Shenghai Han
PDF
Learning Path Generation and Cyber Attack Risk Assessment of Online Education Platform Using Transfer Learning and Transformer Optimization Technology
Jing Zhang
PDF
Combining AHP and Decision Tree to Optimize Network Compliance Detection in Low-carbon Economy Financing Risk Assessment
Lin Lin, Xingcai Yao, Jingli Liang
PDF
Melody Structure Optimization and Data Security Mechanism in Multimodal Music Network Learning Platform
Danning Zhao
PDF
Integration of Intelligent Network System and Chinese Painting Creation: Network Security Strategy and Creation Protection Mechanism
Fan Enbo
PDF
Marketing Data Protection from the Perspective of Network Security: Improving Data Privacy and Security
Shihua Zuo
PDF
Fake Website Detection from the Perspective of Network Security: Preventing Counterfeit Brands in New Media Marketing
Shihua Zuo
PDF
Information Protection of Cross-Cultural English Translation Network Platform by Integrating Neural Network and Differential Privacy
Wang Pei, Chenxi Li
PDF
Signal Transmission Stability Optimization and Network Security Protection Mechanism of Power Communication Network Based on ResNeXt
Li'na Hu, Yi Tang, Lu Ye
PDF
Geographical Distribution Characteristics of Tourism Consumption Behavior and Network Security Strategies Based on Big Data Analysis
Yong Feng
PDF
Network Security Assessment and Improvement Strategies in English Online Teaching Platforms
Rui Zou
PDF
Network Security of Distributed Photovoltaic Power Generation Prediction System Based on BiLSTM and AES
Song Wan, Jing Tan, Tianlu Luo, Min Li, Yigang Tao
PDF
Improving Data Security of Online Learning Networks of Ideological and Political Courses in Colleges and Universities by Combining Blockchain Technology
Jingyuan Sun
PDF
Network Security of Ocean Data Sharing System Integrating Blockchain and Federated Learning
Xinchang Guo, Xincong Wu, Qian Cai, Xiao Lin
PDF
Secure Sharing and Access Control Mechanism of Library Information Resources Combined with Blockchain Technology
Chenhui Song
PDF
Network Scheduling Optimization of Distributed Photovoltaic Power Generation Platform Based on Intelligent Algorithm
Song Wan, Jing Tan, Juncheng Zhang, Xiaohong Tan, Rongyao Li
PDF
Infographic Design in Cybersecurity Incidents: Data Visualization and User Response
Yi Yuan, Yanyan Liu
PDF
Design of Financial Risk Intelligent Prediction and Network Security Threat Detection System Based on Self-Attention Mechanism
Xunlai Li, Donghui Chen, Yunfei Liu
PDF
Network Information Security Risks in English Translation Based on Corpus
Ximiao Han
PDF
Application of Abnormal Behavior Detection in Movie and Music Streaming Services
Shungong Chi, Haiyu Liang
PDF
Battery Status Monitoring System of Electric Vehicles Based on Improved Deep Convolutional Neural Network
Xiaowen Mao
PDF
Traffic Flow Anomaly Detection and Network Security Protection Strategy Based on Deep Traffic Analysis
jing sun, Yajuan Liu, Yanlei Dou, Minggang Wang
PDF
Combining Geographic Information System with Network Algorithm to Evaluate Accessibility of Urban Public Facilities Renewal
Can Chen
PDF
Effect Evaluation and Data Security Model of Cultural Tourism Integration Based on Big Data Analysis
Zhiguo Yang
PDF
Tourism Investment Risk Analysis Model Based on Dynamic Network Security Strategy
Boqi Wang
PDF
Smart Clothing Identity Authentication and Network Data Security Protection Based on Image Recognition
Na Xu
PDF
Information Security of Marketing Network Platforms in Big Data Era: Consumer Data Protection
Ting Lu
PDF
Privacy Protection and Security Vulnerability Defense of Online Movie and Music Copyright Based on Blockchain Technology
Junyan Yang, Wenxi Zhang
PDF
Network Security of AI-Assisted Teaching Data in Vocational Undergraduate English Education Based on Differential Privacy Protection
Huixian Li, Jianan Hu
PDF
Intelligent Design and Personalized Optimization of Interior Colors Based on AI and Network Technology
Shuo Liu
PDF
Automation and Safety Control of New Energy Power Dispatching Based on Multi-Agent Network System
Li Zhang, Wei Chen, Weibo Yuan
PDF
Encryption and Authentication of Works of Art Based on Network Security
Dapeng Li, Yawen Xiao
PDF
Dynamic Risk Assessment System for Classroom Teaching Process of Midwifery Major in Higher Vocational Colleges Based on Artificial Intelligence
Yuan Wang, Jian Wang
PDF
Optimization of Chassis Stability Network Control System of Substation Inspection Robot Based on Multimodal Sensor Fusion
Jian Duan, Yinghui Lu, Jianxun Zhao, Yongchao Zhu
PDF
Dynamic Firewall Configuration and Real-Time Security Policy Optimization of the College English Platform Using the DDPG Algorithm
Shaojing Xiang
PDF
Visual Communication of Ethnic Art Works on Social Networks Analyzed by Combining Deep Learning Models
Da Liu, Lichao Si
PDF
Empirical Study on Improving Economic Benefits of Internet of Things Technology in Agricultural Production Management
Qichao Zhao
PDF
Temperature Control and Life Extension Scheme for Energy Storage System with Enhanced Network Security Based on Deep Learning
Qiang Cheng, Xie Deng, Shiping Song, Jing Xiong, Jin Wang
PDF
Design of blockchain-based resource sharing and security management platform for innovation and entrepreneurship education in colleges and universities
Shiqi Feng, Ehsan Fansuree Surin
PDF
Application of Collaborative Filtering Algorithm in Entrepreneurial Information Security Assessment in School-Enterprise Collaborative Education Platform
Ming Guo
PDF
Data Leakage Assessment and Protection of News Network Platform Based on Deep Belief Network
Shaohua Wei, Yao Li, Tian Bao, Wei Gao
PDF
Optimization Method for Data Sharing and Privacy Protection Using Distributed Blockchain Technology
Sijia Zhao, Ting Yin
PDF
A Study of Changes in Tourism Consumption Behaviour and Its Cybersecurity Impact Based on Time Series Analysis
Xiaona Xie, Wenliang Zhang
PDF
Data Network Security Analysis of Vocational Undergraduate English Teaching AI Platform Based on Federated Learning
Huixian Li, Jianan Hu
PDF
Network Security and Risk Assessment of Medical Information Systems Based on Artificial Intelligence
Chen Gao, Qing Xia, RuiZhe Zhang, Xiang Ding, YanQing Qu, Yuan Ren
PDF
Industrial College Resource Sharing System and Network Security Strategy Based on Hyperledger Fabric to Promote Industry-Education Integration
Shaobin Zhang, Shuzhen Wang
PDF
Cultivation of Cybersecurity Awareness in Art Education and Its Impact on Entrepreneurship and Employment
Bo Xu
PDF
Data Access Security Protection Methods for Dance Movement Therapy Combined with Image Analysis
Anshuang Zhang, Wei Sun, Boyuan Song
PDF
Network Traffic Anomaly Detection Method Based on Deep Neural Network
Huiqin Li, Xingbo Zhang
PDF
Traffic Flow Anomaly Detection and Analysis Method Combining Convolutional Neural Network and Long Short-Term Memory Network
Lijun Chang, Dan Wei
PDF
Protecting Data Privacy in Art Therapy Applications through Secure Network Protocols
Kai Shi
PDF
Data Leakage Prediction Based on LSTM and Graph Convolutional Network: Dynamic Analysis of Sensitive Data Access Patterns
Jun Li
PDF
Hierarchical Combination Quantitative Analysis Method of Multi-Attribute Network for Smart Grid Oriented to Network Security Knowledge Graph
Hang Hu, Yu Guo, Xuming Ni, Zhexiang Wu, Kan Yu, Xu Jin
PDF
Design of Online Identity Authentication Interface Incorporating Ceramic Art Elements
Yimin Wang
PDF
Research on the Construction and Optimization of Enterprise Internal Audit Informatization System Based on Deep Learning Algorithm
Linna Mai, Heling Zhang
PDF
Integrating Cybersecurity into Information Measures for Indoor Design Education Quality Assessment
Yi Sun, Yue Zhang
PDF
Design of Intelligent Financial Risk Prediction System Based on Machine Learning
Yue Xiang
PDF
Innovative Approaches to Teaching Quality Evaluation in Higher Education with Cybersecurity Measures
Song Jian
PDF
The Use of an AI-Driven Threat Detection System to Strengthen the Network Security of the College English Education Platform
Yunhang Liu, Xiaoning Zhang
PDF
Cyber Risk Assessment and Mitigation Strategies for Ensuring Data Protection in Cross-Border E-Commerce Operations
Jiao Fen
PDF
Enterprise Operating Cash Flow Ranking Using Data Envelopment Analysis with Network Security-Driven Blockchain Model
Yifan Hu
PDF
Securing Online Transactions in Automobile Marketing Platforms with a Robust Network Security Model
Li Chen
PDF
Construction and Effectiveness Evaluation of Collaborative Learning Models Based on Social Media Technologies
Qing Dong
PDF
Research on Power Data Security Strategy of Internet of Things Smart Agricultural Pumping Station Based on RSA-AES Hybrid Encryption Algorithm
Yue Cao
PDF
Securing Voice Software Applications in English Vocabulary Learning Systems Using 5G Sensor Networks and AI-Based Privacy Protocols
Qin Tan
PDF
Application of Virtual Private Network Technology in Collaborative Trajectory Planning and Control System Vulnerability Protection of Dual-Arm Robots for Precision Assembly
Lan Xue, Shuai Yang
PDF
Research on Security Mechanisms of Distributed Information Systems Based on Blockchain Technology
Jinming Ge
PDF
Enhancing Physical Education Quality Evaluation with Probabilistic Simplified Neutrosophic Analysis and Network Security Frameworks
Wei Qiu
PDF
Mitigating Data Tampering in Smart Grids Through Community Blockchain-Driven Traceability Frameworks
Silong Wu, Junting Deng, Jiaojiao Zhang
PDF
Bluetooth encrypted communication optimisation strategy for multi-mode fusion smart gas detector ball with the assistance of hash function
Lijun Song
PDF
An Investigation of English Translation Optimization Strategies Based on the Self-Attention Mechanism of the Transformer Model
Lanxi Gao, Tao Dong, Minghan Yang
PDF
The Integration of Network Security Protocols into Corporate Governance and Risk Management Practices
Qinqing Weng, Haoheng Tian, Xia Sun, Lijia Huang
PDF
Secure Communication Architectures for Real-Time Psychophysiological Data Collection in Competitive Sports
Yiming Zhang, Yu Lei, Xinchuang Shi, Jingwei Cheng
PDF
Innovative Application of Generative Adversarial Networks in Creative Clothing Design System from the Perspective of Data Security
Xiaoyang Liu, Yang Xu
PDF
Research on Parametric Design of Traditional Patterns and Modern Product Innovation Based on Blockchain Technology: A Study of Digital Rights Management and Collaborative Development
Xianfei Liang, Hanying Jiang
PDF
Research on the Construction of Knowledge Graph and Trusted Sharing Mechanism of English Academic Literature Based on Blockchain and Cloud Computing
Ran Wang
PDF
Integration of Multimodal Discourse Analysis into College English Online Teaching: Identity Authentication Technology to Strengthen Network Security Protection Strategies
Jiao Jiao
PDF
Digital Governance of University Security: Improve the Political Transparency and Security of the University E-Government System
Yong Wang
PDF
The Integrated Monitoring System of the Internet of Things Improves the Safety of Steel Structure Residential Prefabricated Building Wall Installation
Lingling Wang, Xue Li, Yunfen Wu, Dong Wang
PDF
Research on the integration of digitization-assisted ethnomusicology cultural inheritance path and teaching in the perspective of ethnic community--Taking Bijie City as an example
Zhen Zhao
PDF
Construction and Optimization of Accurate Pushing System for English Literature Reading Resources Driven by Big Data Technology
Quanquan Zhu, Gu Feng, Jia Luo, Mei Yang
PDF
Research on Network Security Situation Prediction Method based on Deep Reinforcement Learning
Hongwei Jiang
PDF