Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (3): 39-41    DOI:
Current Issue | Archive | Adv Search |
Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"
Guangzhou College of Technology and Business
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the in-depth application of big data and cloud computing technology, machine learning and in-depth learning in the era of artificial intelligence need more and more data, so data security and privacy protection become more urgent. This paper introduces the definition and characteristics of AI, explores the current status of data security and privacy protection, analyzes the problems faced by data security and privacy protection, and puts forward some measures to protect data security and privacy in the era of artificial intelligence.
Key wordsartificial intelligence      data security      privacy protection     
Published: 05 August 2019
ZTFLH:  TP309  

Cite this article:

ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+". Computer & Telecommunication, 2019, 1(3): 39-41.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2019/V1/I3/39

[1] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Research on Talents Training Scheme of Employment-oriented Artificial Intelligence Specialty[J]. 电脑与电信, 2021, 1(8): 37-.
[2] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Construction and Research on Data Mining Course Based on Jupyter[J]. 电脑与电信, 2021, 1(7): 12-16.
[3] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[4] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
[5] GE Shi-xin. Research on Intelligent Media Industry Reform and Management Mode Innovation in 5G Era[J]. 电脑与电信, 2020, 1(9): 53-55.
[6] HU Hui. Research on the Integration of Production and Education ofArtificial Intelligence Specialty in Higher Vocational Colleges under the Background of "Double High" Construction[J]. 电脑与电信, 2020, 1(8): 4-6.
[7] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[8] SUN Shu-tong. Research onArtificial Intelligence Method and System for Dynamic Scheduling of Cloud Resources Based on Business Prediction[J]. 电脑与电信, 2020, 1(5): 67-70.
[9] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[10] WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance[J]. 电脑与电信, 2020, 1(11): 60-64.
[11] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[12] SHA Xiao-mei. Promoting the Informatization of Preschool Education with “Internet+”[J]. 电脑与电信, 2019, 1(3): 26-28.
[13] JIANG Yu. A Review of the Research on "Robots’ Rights" in the Age of Artificial Intelligence[J]. 电脑与电信, 2019, 1(3): 45-47.
[14] WANG Yu-si, TIAN Ya-jun. Application of Artificial Intelligence Technology in Electrical Automation Control[J]. 电脑与电信, 2018, 1(4): 82-83.
[15] SUN Wei-te. The Regulatory Challenge and Path Construction of Artificial Intelligence[J]. 电脑与电信, 2018, 1(11): 81-85.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd