{"id":"https://openalex.org/W4399156436","doi":"https://doi.org/10.1145/3660043.3660176","title":"Online Education Big Data Encryption Algorithm System Based on Artificial Intelligence","display_name":"Online Education Big Data Encryption Algorithm System Based on Artificial Intelligence","publication_year":2023,"publication_date":"2023-12-22","ids":{"openalex":"https://openalex.org/W4399156436","doi":"https://doi.org/10.1145/3660043.3660176"},"language":"en","primary_location":{"id":"doi:10.1145/3660043.3660176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660043.3660176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005370731","display_name":"Qianwen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210154121","display_name":"Shandong Institute of Commerce & Technology","ror":"https://ror.org/03xk2yz39","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154121"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianwen Liu","raw_affiliation_strings":["Applied electronics Department, shandong institute commerce and technology, China"],"affiliations":[{"raw_affiliation_string":"Applied electronics Department, shandong institute commerce and technology, China","institution_ids":["https://openalex.org/I4210154121"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5005370731"],"corresponding_institution_ids":["https://openalex.org/I4210154121"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38699947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"744","last_page":"749"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13647","display_name":"AI and Big Data Applications","score":0.9348999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13647","display_name":"AI and Big Data Applications","score":0.9348999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8654063940048218},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7803941965103149},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6746341586112976},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.48613688349723816},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.43372660875320435},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42477312684059143},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40133488178253174},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39454811811447144},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38503023982048035},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38246574997901917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22108057141304016}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8654063940048218},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7803941965103149},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6746341586112976},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.48613688349723816},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.43372660875320435},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42477312684059143},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40133488178253174},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39454811811447144},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38503023982048035},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38246574997901917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22108057141304016},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3660043.3660176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3660043.3660176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W3118099700","https://openalex.org/W3127886054","https://openalex.org/W3136332643","https://openalex.org/W3180318119","https://openalex.org/W4210639390","https://openalex.org/W4211227081","https://openalex.org/W4308363176","https://openalex.org/W4378473573"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W4394895745","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W2385743990","https://openalex.org/W2910064364","https://openalex.org/W4200136508"],"abstract_inverted_index":{"With":[0],"the":[1,18,34,55,93,110,119,136],"rapid":[2],"development":[3],"of":[4,10,36,57,95,109,113,131],"online":[5,67,89,164],"education,":[6],"a":[7],"large":[8],"amount":[9],"educational":[11],"data":[12,21,38,70,154],"is":[13,126,129,139],"transmitted":[14],"and":[15,29,86,92,135],"stored":[16],"on":[17,74,80,145],"network.":[19],"This":[20,147],"includes":[22],"sensitive":[23],"information":[24,28],"about":[25,142],"students\u2019":[26],"personal":[27],"learning":[30,165],"records,":[31],"so":[32],"protecting":[33],"security":[35],"this":[37,63],"becomes":[39],"critical.":[40],"The":[41,107],"traditional":[42,100],"AES":[43],"encryption":[44,71,105,137],"algorithm":[45,72],"has":[46],"been":[47],"widely":[48],"used,":[49],"but":[50],"as":[51,117],"computing":[52],"power":[53],"increases,":[54],"risk":[56],"cracking":[58,121],"it":[59],"also":[60],"increases.":[61],"Therefore,":[62],"article":[64],"studies":[65],"an":[66],"education":[68,90],"big":[69],"based":[73],"artificial":[75],"intelligence":[76],"(AI)-assisted":[77],"optimization,":[78,134],"focusing":[79],"AI":[81,96],"technology":[82,97],"to":[83,98,159],"help":[84],"analyze":[85],"process":[87],"large-scale":[88],"data,":[91],"use":[94],"optimize":[99],"Advanced":[101],"Encryption":[102],"Standard":[103],"(AES)":[104],"algorithm.":[106],"results":[108],"two":[111],"sets":[112],"simulation":[114],"experiments":[115],"are":[116],"follows:":[118],"average":[120],"success":[122],"rate":[123],"after":[124],"optimization":[125],"0.028%,":[127],"which":[128],"one-fifth":[130],"that":[132],"before":[133],"time":[138],"reduced":[140],"by":[141],"37":[143],"seconds":[144],"average.":[146],"research":[148],"can":[149],"enhance":[150],"users'":[151],"trust":[152],"in":[153,163],"privacy,":[155],"thereby":[156],"promoting":[157],"users":[158],"participate":[160],"more":[161],"actively":[162],"activities.":[166]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
