{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:13Z","timestamp":1755780013368,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3660043.3660176","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T10:18:07Z","timestamp":1717064287000},"page":"744-749","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Online Education Big Data Encryption Algorithm System Based on Artificial Intelligence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4574-2435","authenticated-orcid":false,"given":"Qianwen","family":"Liu","sequence":"first","affiliation":[{"name":"Applied electronics Department, shandong institute commerce and technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"issue":"5","key":"e_1_3_2_1_1_1","first-page":"295","article-title":"Simulation of big data attribute authorized encryption algorithm based on link weight [J]","volume":"40","author":"Zhang Jia","year":"2023","unstructured":"Zhang Jia, Lu Xinghua. Simulation of big data attribute authorized encryption algorithm based on link weight [J]. Computer Simulation, 2023, 40(5):295-298.","journal-title":"Computer Simulation"},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"11","article-title":"Design of network information security system integrating big data algorithms [J]","volume":"45","author":"Wei Yinghuan","year":"2023","unstructured":"Wei Yinghuan. Design of network information security system integrating big data algorithms [J]. Electrical Automation, 2023, 45(2):11-14.","journal-title":"Electrical Automation"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.12677\/MOS.2023.123239"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"266","article-title":"Visual security image encryption algorithm based on new cosine chaos mapping [J]","volume":"32","author":"Li Kaihui","year":"2023","unstructured":"Li Kaihui, Kan Zhongliang, Jiang Donghua. Visual security image encryption algorithm based on new cosine chaos mapping [J]. Computer System Applications, 2023, 32(1):266-274.","journal-title":"Computer System Applications"},{"key":"e_1_3_2_1_5_1","volume-title":"A comprehensive simulation and experimental investigation[J].Energy conversion & management","author":"Raj R D A","year":"2022","unstructured":"Raj R D A , Naik K A .Optimal reconfiguration of PV array based on digital image encryption algorithm: A comprehensive simulation and experimental investigation[J].Energy conversion & management, 2022, 261(6):115666.1-115666.30."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i3.pp2203-2210"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Wang Z Yu N .Education Data-Driven Online Course Optimization Mechanism for College Student[J].Mobile Information Systems 2021 2021(1):5545621.1-5545621.8.","DOI":"10.1155\/2021\/5545621"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109779"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439320979953"},{"key":"e_1_3_2_1_10_1","volume-title":"possibility and potential at the intersection between artificial intelligence and education & training[J].Journal of defense modeling and simulatio: Applications,methodology,technology","author":"Cohn J","year":"2022","unstructured":"Cohn J , Vorm E , Baker E .The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training[J].Journal of defense modeling and simulatio: Applications,methodology,technology, 2022, 19(2):125-126."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2022.9695425"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X21501966"},{"issue":"6","key":"e_1_3_2_1_13_1","first-page":"183","article-title":"Data Transmission Scheme for Float Platform Based on Lightweight AES Encryption Algorithm [J]","volume":"31","author":"Zhang Xinfang","year":"2023","unstructured":"Zhang Xinfang, Zhou Jianghua. Data Transmission Scheme for Float Platform Based on Lightweight AES Encryption Algorithm [J]. Computer Measurement and Control, 2023, 31(6):183-190.","journal-title":"Computer Measurement and Control"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Bisht N Pandey B Budhani S K .Comparative performance analysis of AES encryption algorithm for various LVCMOS on different FPGAs[J].World journal of engineering 2023 20(4):669-680.","DOI":"10.1108\/WJE-05-2021-0281"}],"event":{"name":"ICIEAI 2023: 2023 International Conference on Information Education and Artificial Intelligence","acronym":"ICIEAI 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 International Conference on Information Education and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660176","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660043.3660176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:16:13Z","timestamp":1755778573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660043.3660176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":14,"alternative-id":["10.1145\/3660043.3660176","10.1145\/3660043"],"URL":"https:\/\/doi.org\/10.1145\/3660043.3660176","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}