{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:40:06Z","timestamp":1755880806794,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T00:00:00Z","timestamp":1714089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Outstanding Youth Science and Technology Innovation Team Project of Colleges and Universities in Hubei Province","award":["T201923"],"award-info":[{"award-number":["T201923"]}]},{"name":"Major Science and technology innovation projects in Jingmen","award":["2022ZDYF019"],"award-info":[{"award-number":["2022ZDYF019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,26]]},"DOI":"10.1145\/3653644.3665198","type":"proceedings-article","created":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T18:24:49Z","timestamp":1726856689000},"page":"259-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on collaborative optimization of big data analysis and artificial intelligence based on deep learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2816-1231","authenticated-orcid":false,"given":"Xu","family":"Zhang","sequence":"first","affiliation":[{"name":"Jingchu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2816-2357","authenticated-orcid":false,"given":"Suruo","family":"Li","sequence":"additional","affiliation":[{"name":"Jingchu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2816-1020","authenticated-orcid":false,"given":"Huafeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Jingchu University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"45","article-title":"Research on multi-dimensional language use in the era of artificial intelligence and big data [J]","volume":"02","author":"Wei Zheng","year":"2024","unstructured":"Zheng Wei, Liu Jingjing. Research on multi-dimensional language use in the era of artificial intelligence and big data [J]. Contemporary Rhetoric, 2024, (02): 45-59","journal-title":"Contemporary Rhetoric"},{"key":"e_1_3_2_1_2_1","first-page":"36","article-title":"Research on photo archive management and utilization analysis of hydropower engineering construction projects based on big data and artificial intelligence [J]","volume":"01","author":"Weibing Wang","year":"2024","unstructured":"Wang Weibing, Chen Yiping, Liu Yunfeng. Research on photo archive management and utilization analysis of hydropower engineering construction projects based on big data and artificial intelligence [J]. Sichuan Archives, 2024, (01): 36-38","journal-title":"Sichuan Archives"},{"key":"e_1_3_2_1_3_1","first-page":"143","article-title":"Design analysis of computer network security defense system based on big data and artificial intelligence technology [J]","volume":"02","author":"Yu Sun","year":"2024","unstructured":"Sun Yu. Design analysis of computer network security defense system based on big data and artificial intelligence technology [J]. Network Security and Informatization, 2024, (02): 143-145","journal-title":"Network Security and Informatization"},{"key":"e_1_3_2_1_4_1","first-page":"54","article-title":"Data security risks and response strategies in the era of big data and artificial intelligence [J]","volume":"02","author":"Shufeng Liu","year":"2024","unstructured":"Liu Shufeng. Data security risks and response strategies in the era of big data and artificial intelligence [J]. Network Security Technology and Applications, 2024, (02): 54-56","journal-title":"Network Security Technology and Applications"},{"issue":"01","key":"e_1_3_2_1_5_1","first-page":"230","article-title":"Effective application of artificial intelligence technology in big data network security defense [J]","volume":"42","author":"Junyi Yang","year":"2024","unstructured":"Yang Junyi, Ma Long, Wang Xiaoti, Effective application of artificial intelligence technology in big data network security defense [J]. Digital Technology and Application, 2024, 42 (01): 230-232","journal-title":"Digital Technology and Application"},{"issue":"01","key":"e_1_3_2_1_6_1","first-page":"158","article-title":"Application of artificial intelligence in university campus network security technology in the big data era [J]","volume":"45","author":"Wei Zhao","year":"2024","unstructured":"Zhao Wei. Application of artificial intelligence in university campus network security technology in the big data era [J]. Software, 2024, 45 (01): 158-160","journal-title":"Software"},{"issue":"23","key":"e_1_3_2_1_7_1","first-page":"103","article-title":"Research on distribution network optimization measures based on big data technology and artificial intelligence technology [J]","volume":"20","author":"Wenwen Li","year":"2023","unstructured":"Li Wenwen. Research on distribution network optimization measures based on big data technology and artificial intelligence technology [J]. Wireless Internet Technology, 2023, 20 (23): 103-106+110","journal-title":"Wireless Internet Technology"},{"key":"e_1_3_2_1_8_1","first-page":"164","article-title":"Research on the application of artificial intelligence technology in big data network security defense [J]","volume":"12","author":"Qian Geng","year":"2023","unstructured":"Geng Qian. Research on the application of artificial intelligence technology in big data network security defense [J]. Network Security Technology and Application, 2023, (12): 164-166","journal-title":"Network Security Technology and Application"},{"key":"e_1_3_2_1_9_1","first-page":"167","article-title":"Analysis of the application of artificial intelligence in computer network technology in the big data era [J]","volume":"12","author":"Yi Liu","year":"2023","unstructured":"Liu Yi. Analysis of the application of artificial intelligence in computer network technology in the big data era [J]. Network Security Technology and Application, 2023, (12): 167-169","journal-title":"Network Security Technology and Application"},{"issue":"11","key":"e_1_3_2_1_10_1","first-page":"45","article-title":"The practice of artificial intelligence in computer network technology in the big data era [J]","volume":"41","author":"Yu Jiang","year":"2023","unstructured":"Jiang Yu, Huang Fang. The practice of artificial intelligence in computer network technology in the big data era [J]. Digital Technology and Application, 2023, 41 (11): 45-47","journal-title":"Digital Technology and Application"},{"key":"e_1_3_2_1_11_1","first-page":"133","article-title":"Research on collaborative innovation and commercialization prospects of blockchain and artificial intelligence technology [J]","volume":"22","author":"Tianyu Ma","year":"2023","unstructured":"Ma Tianyu. Research on collaborative innovation and commercialization prospects of blockchain and artificial intelligence technology [J]. Chinese Business Review, 2023, (22): 133-136","journal-title":"Chinese Business Review"},{"issue":"11","key":"e_1_3_2_1_12_1","first-page":"137","article-title":"Exploration on the application of artificial intelligence and big data analysis in IT computing security and privacy protection [J]","volume":"7","author":"Xiao Liao","year":"2023","unstructured":"Liao Xiao, Li Zhuohui. Exploration on the application of artificial intelligence and big data analysis in IT computing security and privacy protection [J]. Electronic Components and Information Technology, 2023, 7 (11): 137-140","journal-title":"Electronic Components and Information Technology"},{"key":"e_1_3_2_1_13_1","first-page":"50","article-title":"Application of artificial intelligence technology in big data network security defense [J]","volume":"21","author":"Hua Fan","year":"2023","unstructured":"Fan Hua. Application of artificial intelligence technology in big data network security defense [J]. China High-tech, 2023, (21): 50-52","journal-title":"China High-tech"},{"key":"e_1_3_2_1_14_1","unstructured":"Su Qiong Jin Xingyu. Research on collection and analysis of sports data based on artificial intelligence and big data technology [C]\/\/ Chinese Sports Science Society. Collection of abstracts of papers of the 13th National Sports Science Conference - Poster Exchange (Sports Engineering Branch). Harbin Institute of Physical Education; 2023: 3"},{"key":"e_1_3_2_1_15_1","first-page":"77","article-title":"The impact of artificial intelligence on geological survey data in the construction of big data centers and informatization development [J]","volume":"10","author":"Heng Liu","year":"2023","unstructured":"Liu Heng, Zhao Wei, Jin Wenhu, The impact of artificial intelligence on geological survey data in the construction of big data centers and informatization development [J]. China Informatization, 2023, (10): 77-79","journal-title":"China Informatization"},{"issue":"10","key":"e_1_3_2_1_16_1","first-page":"234","article-title":"Application of artificial intelligence technology in big data network security strategy [J]","volume":"52","author":"Huiyuan Yu","year":"2023","unstructured":"Yu Huiyuan. Application of artificial intelligence technology in big data network security strategy [J]. Electronic Technology, 2023, 52 (10): 234-235","journal-title":"Electronic Technology"},{"key":"e_1_3_2_1_17_1","first-page":"72","article-title":"Research on knowledge transformation and innovation process under intelligent collaboration mode [J]","volume":"04","author":"Xiaojing Liu","year":"2023","unstructured":"Liu Xiaojing, Nie Zijun, Yi Sihao. Research on knowledge transformation and innovation process under intelligent collaboration mode [J]. Creative Design Source, 2023, (04): 72-76","journal-title":"Creative Design Source"},{"key":"e_1_3_2_1_18_1","first-page":"6","article-title":"water source water quality early warning and water production process collaborative optimization control technology based on big data and artificial intelligence [J]","volume":"07","author":"Drinking","year":"2023","unstructured":"Drinking water source water quality early warning and water production process collaborative optimization control technology based on big data and artificial intelligence [J]. Jiangsu Water Conservancy, 2023, (07): 6","journal-title":"Jiangsu Water Conservancy"},{"issue":"02","key":"e_1_3_2_1_19_1","first-page":"15","article-title":"Design and implementation of smart employment recommendation system based on big data analysis and artificial intelligence [J]","volume":"25","author":"Xiuyan Cui","year":"2023","unstructured":"Cui Xiuyan. Design and implementation of smart employment recommendation system based on big data analysis and artificial intelligence [J]. Journal of Hebei Software Vocational and Technical College, 2023, 25 (02): 15-19","journal-title":"Journal of Hebei Software Vocational and Technical College"},{"issue":"03","key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Research on industrial Internet edge intelligent collaborative computing technology for smart factories [J]","volume":"47","author":"Yutao Zhu","year":"2021","unstructured":"Zhu Yutao, Xiao Lin, Chen Zeren, Research on industrial Internet edge intelligent collaborative computing technology for smart factories [J]. Information and Communication Technology and Policy, 2021, 47 (03): 1-5","journal-title":"Information and Communication Technology and Policy"}],"event":{"name":"FAIML 2024: 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning","acronym":"FAIML 2024","location":"Yichang China"},"container-title":["Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3665198","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3653644.3665198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:24:02Z","timestamp":1755879842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653644.3665198"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,26]]},"references-count":20,"alternative-id":["10.1145\/3653644.3665198","10.1145\/3653644"],"URL":"https:\/\/doi.org\/10.1145\/3653644.3665198","relation":{},"subject":[],"published":{"date-parts":[[2024,4,26]]},"assertion":[{"value":"2024-09-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}