{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:44:46Z","timestamp":1757450686287,"version":"3.41.2"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"vor","delay-in-days":235,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>With the improvement and growth of instructional informatisation, the contradiction between the open supply of academic resources, information expression, and mental property safety is turning into greater acute. Remedying the relationship between the two is very necessary for the overall performance of records expression of academic assets and the advent of true surroundings for mental property protection. The safety of mental property rights is to shield the rights and pursuits of know\u2010how owners, defend the strength of information producers to produce knowledge, and defend the supply of academic sources sharing. The data expression and protection of intellectual property education resources based on machine learning is a kind of protection tool for the intellectual property of education resources developed using the characteristics of automation, real\u2010time monitoring, and growth of machine learning. It can prevent web crawlers from harming e\u2010commerce websites, prevent them from stealing the intellectual property of e\u2010commerce websites, and analyse web crawlers that visit websites to prevent important website data from being stolen by them. From this point of view, based on the relationship between the fact expression of instructional sources and the safety of mental property rights, this paper advocates to promote the records expression and safety of mental property rights of academic sources from a couple of perspectives.<\/jats:p>","DOI":"10.1155\/2021\/5583389","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T20:35:10Z","timestamp":1629837310000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Data Expression and Protection of Intellectual Property Education Resources Based on Machine Learning"],"prefix":"10.1155","volume":"2021","author":[{"given":"Meng","family":"Mei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0680-3800","authenticated-orcid":false,"given":"Hui","family":"Tan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"key":"e_1_2_7_1_2","doi-asserted-by":"publisher","DOI":"10.1093\/jiplp\/jpx213"},{"key":"e_1_2_7_2_2","doi-asserted-by":"publisher","DOI":"10.1093\/jiplp\/jpy162"},{"key":"e_1_2_7_3_2","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipy002"},{"key":"e_1_2_7_4_2","first-page":"883","article-title":"Effective analysis on circular economy development based on entropy method and data envelopment analysis (DEA): case study of Liaoning province","volume":"86","author":"Li F.","year":"2014","journal-title":"Advanced Materials Research"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.5846\/stxb201306101566"},{"key":"e_1_2_7_6_2","doi-asserted-by":"publisher","DOI":"10.2478\/mape-2019-0054"},{"key":"e_1_2_7_7_2","article-title":"Statistical and machine-learning data mining: techniques for better predictive modelling and analysis of big data","volume":"60","author":"Kuldeep B.","year":"2019","journal-title":"Computing Reviews"},{"key":"e_1_2_7_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/widm.2015.5.issue-1"},{"key":"e_1_2_7_9_2","doi-asserted-by":"publisher","DOI":"10.1002\/minf.201400174"},{"key":"e_1_2_7_10_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijaip.2020.105838"},{"key":"e_1_2_7_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00415-019-09458-y"},{"key":"e_1_2_7_12_2","doi-asserted-by":"publisher","DOI":"10.7883\/yoken.JJID.2017.089"},{"key":"e_1_2_7_13_2","doi-asserted-by":"publisher","DOI":"10.3168\/jds.2015-10254"},{"key":"e_1_2_7_14_2","first-page":"1153","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buck A.","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_2_7_15_2","first-page":"1402","article-title":"Data mining and machine learning techniques for the identification of mutagenicity inducing substructures and structure activity relationships of no congeneric compounds","volume":"35","author":"Hilma C.","year":"2018","journal-title":"Journal of Chemical Information and Computer Sciences"},{"key":"e_1_2_7_16_2","first-page":"673","article-title":"Parallel data: from big data to data intelligence","volume":"30","author":"Liu X.","year":"2017","journal-title":"Pattern Recognition and Artificial Intelligence"},{"key":"e_1_2_7_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.141"},{"key":"e_1_2_7_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60435-0"},{"key":"e_1_2_7_19_2","doi-asserted-by":"publisher","DOI":"10.4236\/oalib.1106251"},{"key":"e_1_2_7_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104608"},{"key":"e_1_2_7_21_2","doi-asserted-by":"publisher","DOI":"10.1002\/pad.1776"},{"key":"e_1_2_7_22_2","first-page":"743","article-title":"Construction of financial auditing teaching mode based on artificial intelligence expert system","volume":"55","author":"Xinmin Z.","year":"2017","journal-title":"Bolotin Technicon"},{"key":"e_1_2_7_23_2","doi-asserted-by":"publisher","DOI":"10.1515\/9789048530687-004"},{"key":"e_1_2_7_24_2","doi-asserted-by":"publisher","DOI":"10.12738\/estp.2018.5.114"},{"key":"e_1_2_7_25_2","doi-asserted-by":"publisher","DOI":"10.2118\/150314-pa"},{"key":"e_1_2_7_26_2","first-page":"630","article-title":"A improved method for teaching system innovation design of physical education major in colleges based on flipped classroom","volume":"32","author":"Lina Z.","year":"2017","journal-title":"Revest de la Faulted de Ingenerate"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5583389.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5583389.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5583389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:43:39Z","timestamp":1723243419000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5583389"}},"subtitle":[],"editor":[{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5583389"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5583389","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-01-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5583389"}}