2020
DOI: 10.3390/sym12020228
|View full text |Cite
|
Sign up to set email alerts
|

Detection Method of Data Integrity in Network Storage Based on Symmetrical Difference

Abstract: In order to enhance the recall and the precision performance of data integrity detection, a method to detect the network storage data integrity based on symmetric difference was proposed. Through the complete automatic image annotation system, the crawler technology was used to capture the image and related text information. According to the automatic word segmentation, pos tagging and Chinese word segmentation, the feature analysis of text data was achieved. Based on the symmetrical difference algorithm and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
(7 reference statements)
0
2
0
Order By: Relevance
“…There have not been many studies on manipulating ML methods of energy consumption data, despite adversarial ML, and attacks on ML methods, being a developing research field. 5 Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system. 6 For instance, a random attack selects filler items at random for every fake user as well as rates filler items according to the normal distribution of all rating information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have not been many studies on manipulating ML methods of energy consumption data, despite adversarial ML, and attacks on ML methods, being a developing research field. 5 Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system. 6 For instance, a random attack selects filler items at random for every fake user as well as rates filler items according to the normal distribution of all rating information.…”
Section: Introductionmentioning
confidence: 99%
“…Many application domains, including worm signature generation, denial-of-service (DoS) attack detection, portable document format (PDF) malware classification, etc., have examined these types of attacks. There have not been many studies on manipulating ML methods of energy consumption data, despite adversarial ML, and attacks on ML methods, being a developing research field 5 . Early data poisoning research used manual methods to create fake users, who typically perform suboptimally in attacks even when they have access to input data as well as are aware of the recommendation system 6 .…”
Section: Introductionmentioning
confidence: 99%