Handbook of Computer Networks and Cyber Security 2020
DOI: 10.1007/978-3-030-22277-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 76 publications
(30 citation statements)
references
References 68 publications
1
25
0
Order By: Relevance
“…In the new economic era, college students need to pay attention to the environmental advantages of entrepreneurial capital in the process of entrepreneurship. at is to say, college students need to pay attention to environmental factors in the influencing factors of entrepreneurial performance and realize the implementation of entrepreneurial countermeasures through the assessment of environmental advantages [29][30][31][32][33]. Under the circumstances, college students need to pay attention to the use of new environments and new conditions in the entrepreneurial environment.…”
Section: Results Analysismentioning
confidence: 99%
“…In the new economic era, college students need to pay attention to the environmental advantages of entrepreneurial capital in the process of entrepreneurship. at is to say, college students need to pay attention to environmental factors in the influencing factors of entrepreneurial performance and realize the implementation of entrepreneurial countermeasures through the assessment of environmental advantages [29][30][31][32][33]. Under the circumstances, college students need to pay attention to the use of new environments and new conditions in the entrepreneurial environment.…”
Section: Results Analysismentioning
confidence: 99%
“…It aims to help website vendors and online video websites achieve professional and accurate placement and page-based website targeting. System software is for tasks such as delivery process management and website operation data statistics [2][3][4][5]. As a leading video sharing website, online websites have played more than tens of millions of times a day.…”
Section: Introductionmentioning
confidence: 99%
“…This implies that the security of RFID systems may not be fully guaranteed. In addition, RFID tags are limited in battery, hence may not be powered over a long time without incurring the cost of battery replacement [ 110 ].…”
Section: Technology-based Contact Tracing Methods Against Covid-19mentioning
confidence: 99%