{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:31Z","timestamp":1750309471184,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:00:00Z","timestamp":1729814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,25]]},"DOI":"10.1145\/3701047.3701058","type":"proceedings-article","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T07:08:06Z","timestamp":1739948886000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on network security spatial data asset protection technology based on deep learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8590-998X","authenticated-orcid":false,"given":"Lina","family":"Chen","sequence":"first","affiliation":[{"name":"Information Communication Branch of Guangxi Power Grid Company, Nanning, Guangxi, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7787-5688","authenticated-orcid":false,"given":"Chunzhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Power Grid Company, Nanning, Guangxi, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9319-1041","authenticated-orcid":false,"given":"Liang","family":"Meng","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Power Grid Company, Nanning, Guangxi, China,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2051-8121","authenticated-orcid":false,"given":"Siwei","family":"Li","sequence":"additional","affiliation":[{"name":"Information Communication Branch of Guangxi Power Grid Company, Nanning, Guangxi, China,"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"issue":"5","key":"e_1_3_3_1_1_2","first-page":"149","volume":"42","author":"Yiyue He","year":"2021","unstructured":"He Yiyue, Wang Zhihai, Li Xiaofeng. Research on Network Security Data Asset Identification and Protection Technology Based on Deep Learning[J]. Journal on Communications, 2021, 42(5): 149-160.","journal-title":"Journal on Communications"},{"issue":"10","key":"e_1_3_3_1_2_2","first-page":"1","volume":"18","author":"Wei Zhang","year":"2018","unstructured":"Zhang Wei, Liu Zhihong, Wang Zhiwen. Application and Challenges of Deep Learning in the Field of Cybersecurity[J]. Netinfo Security, 2018, 18(10): 1-8.","journal-title":"Netinfo Security"},{"issue":"4","key":"e_1_3_3_1_3_2","first-page":"733","volume":"10","author":"Qiang Liu","year":"2020","unstructured":"Liu Qiang, Wang Yong, Chen Wei. Research on Spatial Data Asset Protection Technology for Network Security Based on Deep Learning[J]. Computer Science and Applications, 2020, 10(4): 733-742.","journal-title":"Computer Science and Applications"},{"key":"e_1_3_3_1_4_2","first-page":"98","volume":"6","author":"Wei Chen","year":"2021","unstructured":"Chen Wei, Wang Xiaoyang, Li Ruixuan. Research on Network Security Data Augmentation and Protection Technology Based on Generative Adversarial Network[J]. Information Security and Communication Confidentiality, 2021, (6): 98-106.","journal-title":"Information Security and Communication Confidentiality"},{"key":"e_1_3_3_1_5_2","first-page":"34056","volume":"9","author":"Wang","year":"2021","unstructured":"Wang L, Li P, Zhang L. Deep Learning for Network Security Asset Protection: A Survey[J]. IEEE Access, 2021, 9: 34056-34070.","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_6_2","DOI":"10.1007\/s11390-020-9956-9"},{"issue":"5","key":"e_1_3_3_1_7_2","first-page":"228","volume":"16","author":"He","year":"2021","unstructured":"He Y, Wang Z, Li X. Research on Deep Learning for Network Security Asset Identification and Protection[J]. Journal of Communications, 2021, 16(5): 228-240.","journal-title":"Journal of Communications"},{"issue":"4","key":"e_1_3_3_1_8_2","first-page":"3209","volume":"21","author":"Zhang","year":"2019","unstructured":"Zhang W, Liu Z, Wang Z. Applications and Challenges of Deep Learning in Network Security[J]. IEEE Communications Surveys & Tutorials, 2019, 21(4): 3209-3235.","journal-title":"IEEE Communications Surveys & Tutorials"}],"event":{"acronym":"CNML 2024","name":"CNML 2024: 2024 2nd International Conference on Communication Networks and Machine Learning","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 2nd International Conference on Communication Networks and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701047.3701058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701047.3701058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:16Z","timestamp":1750295836000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701047.3701058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,25]]},"references-count":8,"alternative-id":["10.1145\/3701047.3701058","10.1145\/3701047"],"URL":"https:\/\/doi.org\/10.1145\/3701047.3701058","relation":{},"subject":[],"published":{"date-parts":[[2024,10,25]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}