This work is licensed under the Creative Commons Attribution 4.0 International License.
Liu, X. B., Zhang, Y. J., Cui, W. K., Wang, L. T., & Zhu, J. M. (2021). Development assessment of higher education system based on topsis-entropy, hopfield neural network, and cobweb model. Complexity.Search in Google Scholar
Zhai, Z. (2021). A probe into the application of english euphemism in college classroom teaching under multimedia network technology. International Journal of Electrical Engineering Education, 002072092098351.Search in Google Scholar
Barmettler, G., Adnan, S., Malcolm, T. S. N., Terhune, K., & Joshi, A. R. T. (2021). Power of the collective: a review of multimodal internet-based surgical education resources in the 21st century. Journal of Surgical Oncology, 124.Search in Google Scholar
Meili, Ren, Tianping, Bi, Xuemei, & Yang. (2017). The design and implementation of smart campus system. Journal of Computers.Search in Google Scholar
Ye, L., Liu, T., Han, T., Ferdinando, H., & Alasaarela, E. (2021). Campus violence detection based on artificial intelligent interpretation of surveillance video sequences. Remote Sensing, 13(4), 628.Search in Google Scholar
Li, Y. (2021). Construction of intelligent campus tennis players’ body data monitoring and injury warning system based on data fusion. Revista Brasileira de Medicina do Esporte, 27(spe2), 46-49.Search in Google Scholar
Wang, Y., Liang, X., Hei, X., Ji, W., & Zhu, L. (2021). Deep learning data privacy protection based on homomorphic encryption in aiot. Mobile Information Systems, 2021(2), 1-11.Search in Google Scholar
Liu, Y., Wang, J., He, H., Huang, G., & Shi, W. (2021). Identifying important nodes affecting network security in complex networks:. International Journal of Distributed Sensor Networks, 17(2), 1560-1571.Search in Google Scholar
Wang, W., Wang, Y., Mu, C., Sun, Z., Tong, X., & Huang, Y., et al. (2022). Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing. Computer networks.Search in Google Scholar
Nisha, N., Natgunanathan, I., Gao, S., & Xiang, Y. (2022). A novel privacy protection scheme for location-based services using collaborative caching. Computer networks.Search in Google Scholar
Deng, H., Zhang, X., Jiang, J., Wang, J., & Huang, H. (2022). Privacy protection of personal education information on blockchain. International Journal of Performability Engineering(5), 18.Search in Google Scholar
Cerf, S., Robu, B., Marchand, N., & Bouchenak, S. (2023). Privacy protection control for mobile apps users. Control engineering practice.Search in Google Scholar
Zhang, Q., Zhang, X., Wang, M., & Li, X. (2021). Dplq: location‐based service privacy protection scheme based on differential privacy. IET information security(6), 15.Search in Google Scholar
Salim, S., Turnbull, B., & Moustafa, N. (2022). Data analytics of social media 3.0: privacy protection perspectives for integrating social media and internet of things (sm-iot) systems. Ad hoc networks(Apr.), 128.Search in Google Scholar
Honghao, G., & Zhiyuan, T. (2022). Special issue on adversarial ai to iot security and privacy protection: attacks and defenses. The Computer Journal(11), 11.Search in Google Scholar
Liu, J., & Zhou, S. (2021). Application research of data mining technology in personal privacy protection and material data analysis. Integrated Ferroelectrics, 216(1), 29-42.Search in Google Scholar
Liu, J. Z. J. (2021). Privacy protection for fog computing and the internet of things data based on blockchain. Cluster computing, 24(2).Search in Google Scholar
Sun, Z., Wang, Y., Cai, Z., Liu, T., Tong, X., & Jiang, N. (2021). A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing. International journal of intelligent systems(36-5).Search in Google Scholar
Henrique, L. F., Silva, W. N., Silva, C. C. A., Dias, B. H., Oliveira, L. W., & De Almeida, M. C. (2023). Optimal siting and sizing of distributed energy resources in a smart campus. Electric Power Systems Research, 217, 109095-.Search in Google Scholar
Li, W. (2021). Design of smart campus management system based on internet of things technology. Journal of Intelligent and Fuzzy Systems, 40(2), 3159-3168.Search in Google Scholar
Omotayo, T., Moghayedi, A., Awuzie, B., & Ajayi, S. (2021). Infrastructure elements for smart campuses: a bibliometric analysis. Sustainability, 13.Search in Google Scholar
Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8.Search in Google Scholar
Wang, Y., Ma, J., Sharma, A., Singh, P. K., Gaba, G. S., & Masud, M., et al. (2021). An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks. Journal of Sensors.Search in Google Scholar
Venkatesan, B., & Chitra, S. (2021). An enhance the data security performance using an optimal cloud network security for big data cloud framework. International Journal of Communication Systems.Search in Google Scholar
Ahire, P., & Abraham, J. (2022). Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques. Theoretical computer science, 922.Search in Google Scholar
Gan, W., Yan, M., Wen, J., Yao, W., & Zhang, J. (2022). A low-carbon planning method for joint regional-district multi-energy systems: from the perspective of privacy protection. Applied Energy, 311, 118595-.Search in Google Scholar
Ahmed, F., Wei, L., Niu, Y., Zhao, T., Zhang, W., & Zhang, D., et al. (2022). Toward fine‐grained access control and privacy protection for video sharing in media convergence environment. International journal of intelligent systems(5), 37.Search in Google Scholar