Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (3): 39-41    DOI:
Current Issue | Archive | Adv Search |
Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"
Guangzhou College of Technology and Business
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the in-depth application of big data and cloud computing technology, machine learning and in-depth learning in the era of artificial intelligence need more and more data, so data security and privacy protection become more urgent. This paper introduces the definition and characteristics of AI, explores the current status of data security and privacy protection, analyzes the problems faced by data security and privacy protection, and puts forward some measures to protect data security and privacy in the era of artificial intelligence.
Key wordsartificial intelligence      data security      privacy protection     
Published: 05 August 2019
:  TP309  

Cite this article:

ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+". Computer & Telecommunication, 2019, 1(3): 39-41.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2019/V1/I3/39

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] MA Xiu-Li ZHAI Peng-xiang.
Research on Teaching Reform Practice of Ideological and Political Teaching in Fundamentals
and Application of Artificial Intelligence Based on Task-driven
[J]. 电脑与电信, 2023, 1(3): 65-68.
[3] LI Xin JIA Mei-juan LIU Chun MAO Kai-ji. Reform and Practice of Computer Public Basic Education Model for Training Applied Talents in the Era of Big Data and Artificial Intelligence[J]. 电脑与电信, 2023, 1(11): 19-22.
[4] SHEN Ya-ting HE Cheng CHEN Jia-yue HUA Xing-ke.
Exploration and Practice of Training Mode of Research-type Talents
in the Direction of Artificial Intelligence
[J]. 电脑与电信, 2022, 1(1-2): 7-12.
[5] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Research on Talents Training Scheme of Employment-oriented Artificial Intelligence Specialty[J]. 电脑与电信, 2021, 1(8): 37-.
[6] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Construction and Research on Data Mining Course Based on Jupyter[J]. 电脑与电信, 2021, 1(7): 12-16.
[7] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[8] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
[9] YANG Ye ZHANG Ting-dong JIANG Xue-jun.
The Application of Intelligent Chatbot in C Language Programming Teaching
[J]. 电脑与电信, 2021, 1(12): 14-20.
[10] WAN Chen.
Research on the Design and Application of "VR+AI" Education Service Platform
[J]. 电脑与电信, 2021, 1(12): 38-41.
[11] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[12] YE Hui-qing.
Discussion on Application of 5G Customized Private Network for Vertical Industry
[J]. 电脑与电信, 2021, 0(10): 64-66.
[13] GE Shi-xin. Research on Intelligent Media Industry Reform and Management Mode Innovation in 5G Era[J]. 电脑与电信, 2020, 1(9): 53-55.
[14] HU Hui. Research on the Integration of Production and Education ofArtificial Intelligence Specialty in Higher Vocational Colleges under the Background of "Double High" Construction[J]. 电脑与电信, 2020, 1(8): 4-6.
[15] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd