Information Security in Cloud Computing

Information Security in Cloud Computing

Authors

  • Aiyun Dong Wave cloud information technology stock company, Jinan 250101, Shandong

DOI:

https://doi.org/10.53469/ijomsr.2025.08(06).08

Keywords:

Cloud computing network, Computer technology, Information security, Research

Abstract

With the rapid development of economy and society, our society has gradually transformed into an information society, and the gradual maturity of computer network technology has promoted the development of information security research. With the widespread concern of cloud computing in the community, the study of information security in cloud computing is becoming more and more comprehensive. Due to the efficiency and instantaneity of cloud computing, information security in cloud computing has gradually become the key issue of social security. In order to improve the information security level of cloud computing, the study of information security has become the most important.

References

Yang, Jing, et al. "A generative adversarial network-based extractive text summarization using transductive and reinforcement learning." IEEE Access (2025).

Xie, Minhui, and Shujian Chen. "CoreViz: Context-Aware Reasoning and Visualization Engine for Business Intelligence Dashboards." Authorea Preprints (2025).

Zhu, Bingxin. "TraceLM: Temporal Root-Cause Analysis with Contextual Embedding Language Models." (2025).

Zhang, Yuhan. "CrossPlatformStack: Enabling High Availability and Safe Deployment for Products Across Meta Services." (2025).

Hu, Xiao. "GenPlayAds: Procedural Playable 3D Ad Creation via Generative Model." (2025).

Zheng, Ce, et al. "Diffmesh: A motion-aware diffusion framework for human mesh recovery from videos." 2025 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). IEEE, 2025.

Peng, Qucheng, et al. "Exploiting Aggregation and Segregation of Representations for Domain Adaptive Human Pose Estimation." arXiv preprint arXiv:2412.20538 (2024).

Zhang, Shengyuan, et al. "Research on machine learning-based anomaly detection techniques in biomechanical big data environments." Molecular & Cellular Biomechanics 22.3 (2025): 669-669.

Chen, Yinda, et al. "Bimcv-r: A landmark dataset for 3d ct text-image retrieval." International Conference on Medical Image Computing and Computer-Assisted Intervention. Cham: Springer Nature Switzerland, 2024.

Yu, Z., Sun, N., Wu, S., & Wang, Y. (2025, March). Research on Automatic Text Summarization Using Transformer and Pointer-Generator Networks. In 2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT) (pp. 1601-1604). IEEE.

Bi, Shuochen, and Yufan Lian. "Research on the Export Trade Path Mechanism of Digital Finance and High-tech Industries under AI Technology." (2025).

Pal, P. et al. 2025. AI-Based Credit Risk Assessment and Intelligent Matching Mechanism in Supply Chain Finance. Journal of Theory and Practice in Economics and Management. 2, 3 (May 2025), 1–9.

Chen, Yinda, et al. "Self-supervised neuron segmentation with multi-agent reinforcement learning." arXiv preprint arXiv:2310.04148 (2023).

Downloads

Published

2025-06-30

Issue

Section

Articles
Loading...