[1] |
STATISTA. Volume of Data Information Created, Captured, Copied, and Consumed Worldwide from 2010 to 2025[EB/OL]. (2021-06-07)[2022-06-10]. https://www.statista.com/statistics/871513/worldwide-data-created/.
|
[2] |
ITRC. ITRC’s 2021 Q3 Data Breach Analysis and Key Takeaways[EB/OL]. (2021-10-06)[2022-06-10]. https://www.idtheftcenter.org/publication/2021-q3-data-breach-analysis/.
|
[3] |
HONG Wei, REN Jianhong, XU Lina, et al. Classification of Educational Data Under the Background of Data Security Law[J]. Chinese Journal of ICT in Education, 2022, 28(3): 41-50.
|
|
洪伟, 任剑洪, 徐丽娜, 等. 数据安全法实施背景下的教育数据分类分级研究[J]. 中国教育信息化, 2022, 28(3): 41-50.
|
[4] |
WANG Zhen. Research on Data Classification and Grading-Proceed from Article 19 (1) of the Data Security Law of the People’s Republic of China (Draft)[D]. Beijing: Beijing Foreign Studies University, 2021.
|
|
王真. 数据分级分类研究——从《中华人民共和国数据安全法(草案)》第19条第1款出发[D]. 北京:北京外国语大学, 2021.
|
[5] |
BI Yunshan. Research of Chinese Text Classification Based on Deep Learning[D]. Hangzhou: Zhejiang University of Science and Technology, 2021.
|
|
毕云杉. 基于深度学习的中文文本分类研究[D]. 杭州: 浙江科技学院, 2021.
|
[6] |
WU Hongping, LIU Yuling, WANG Jingwen. Review of Text Classification Methods on Deep Learning[J]. Computers, Materials and Continua, 2020, 63(3): 1309-1321.
doi: 10.32604/cmc.2020.010172
URL
|
[7] |
MIKOLOV T, CHEN K, CORRADO G, et al. Efficient Estimation of Word Representations in Vector Space[J]. Computer Science, 2013, 40(1): 1-10.
|
[8] |
PENNINGTON J, SOCHER R, MANNING C. GloVe: Global Vectors for Word Representation[C]// ACL. 2014 Conference on Empirical Methods in Natural Language Processing(EMNLP). New York: The Association for Computational Linguistics, 2014: 1532-1543.
|
[9] |
DEVLIN J, CHANG Mingwei, LEE K, et al. BERT: Pre-Training of Deep Bidirectional Transformers for Language Understanding[C]// ACL. Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. New York: The Association for Computational Linguistics, 2019: 4171-4186.
|
[10] |
HOCHREITER S, SCHMIDHUBER J. Long Short-Term Memory[J]. Neural Computation, 1997, 9(8): 1735-1780.
doi: 10.1162/neco.1997.9.8.1735
pmid: 9377276
|
[11] |
SCHUSTER M, PALIWAL K K. Bidirectional Recurrent Neural Networks[J]. IEEE Transactions on Signal Processing, 1997, 45(11): 2673-2681.
doi: 10.1109/78.650093
URL
|
[12] |
GB/T 35273-2020 Information Security Technology-Personal Information Security Specification[S]. Beijing: Standards Press of China, 2020.
|
|
GB/T 35273-2020 信息安全技术个人信息安全规范[S]. 北京: 中国标准出版社, 2020.
|
[13] |
SUN Junyi. Jieba[EB/OL]. (2020-01-20)[2022-06-10]. https://github.com/fxsjy/jieba.
|
[14] |
ZHANG Mohan. CNN-LSTM for Short Text Classification Based on Hybrid Word-Char Embeddings[J]. Information Technology and Informatization, 2019(1): 77-80.
|
|
张默涵. 基于字词混合向量的CNN-LSTM短文本分类[J]. 信息技术与信息化, 2019(1): 77-80.
|
[15] |
YANG Min, CHEN Xingshu, LUO Yonggang, et al. An Android Malware Detection Model Based on DT-SVM[J]. Security and Communication Networks, 2020, 1: 1-11.
doi: 10.1002/(ISSN)1939-0122
URL
|
[16] |
YOON K. Convolutional Neural Networks for Sentence Classification[C]// ACL. 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). New York: The Association for Computational Linguistics, 2014: 1746-1751.
|