CN115022098B - Artificial intelligence safety target range content recommendation method, device and storage medium - Google Patents

Artificial intelligence safety target range content recommendation method, device and storage medium Download PDF

Info

Publication number
CN115022098B
CN115022098B CN202210949803.6A CN202210949803A CN115022098B CN 115022098 B CN115022098 B CN 115022098B CN 202210949803 A CN202210949803 A CN 202210949803A CN 115022098 B CN115022098 B CN 115022098B
Authority
CN
China
Prior art keywords
data
page
user
recommended
shooting range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210949803.6A
Other languages
Chinese (zh)
Other versions
CN115022098A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Real AI Technology Co Ltd
Original Assignee
Beijing Real AI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Real AI Technology Co Ltd filed Critical Beijing Real AI Technology Co Ltd
Priority to CN202210949803.6A priority Critical patent/CN115022098B/en
Publication of CN115022098A publication Critical patent/CN115022098A/en
Application granted granted Critical
Publication of CN115022098B publication Critical patent/CN115022098B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application relates to the field of artificial intelligence safety, and provides an artificial intelligence safety shooting range content recommendation method, an artificial intelligence safety shooting range content recommendation device and a storage medium. According to the scheme, when the user logs in the server, the server can determine the first recommended page data based on the user login information and send the first recommended page data to the user, so that uniform page data is prevented from being recommended to the user, and the recommended page data can be used for safety attack and defense drilling or basic knowledge learning of the artificial intelligent model.

Description

Artificial intelligence safety target range content recommendation method, device and storage medium
Technical Field
The application relates to the technical field of artificial intelligence safety, in particular to an artificial intelligence safety target range content recommendation method, an artificial intelligence safety target range content recommendation device and a storage medium.
Background
The network security shooting range system is an online deployment application which can provide actual attack and defense environments and can provide multifunctional and diversified network security actual combat scenes for users; the user then deepens the understanding to the network security through the safe attack and defense drilling shooting range environment of different levels, promotes the network security protection level. In the research and practice process of the prior art, the inventor of the embodiment of the application finds that the general system construction and the safe attack and defense drilling of the existing network safety shooting range system are all directed at the traditional system codes, so that a unified user page is pushed to a user, and the existing network safety shooting range system is not suitable for the safe attack and defense drilling or basic knowledge learning of an artificial intelligent model under an artificial intelligent safety scene.
Disclosure of Invention
The embodiment of the application provides an artificial intelligence safety shooting range content recommendation method, device and storage medium, which can rapidly log in an artificial intelligence safety shooting range platform and carry out AI safety shooting range learning or practice based on first recommendation page data, and the obtained use data can also be used as a data set basis for carrying out page content recommendation when a user logs in the number of the artificial intelligence safety shooting range platforms next time, so that the user can more easily carry out AI safety shooting range learning or practice based on the artificial intelligence safety shooting range platform.
In a first aspect, a method for recommending artificial intelligence safety shooting range content provided in an embodiment of the present application is introduced from a perspective of a server, where the method includes:
receiving user login information sent by a user side;
determining first recommended page data according to the received user login information, and sending the first recommended page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety targets;
acquiring service end use data corresponding to the first recommended page data; the service end use data comprises service end resource consumption data and service end bandwidth use data;
if the fact that the bandwidth using data of the server side in the using data of the server side is larger than a bandwidth threshold value is determined, an AI safety shooting range learning mode is determined, and first using data corresponding to the first recommended page data are obtained;
if the server resource consumption data in the server use data are larger than the resource consumption threshold, determining that the target is an AI safe shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
determining a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server for logging in the user next time.
In a second aspect, there is provided a function of implementing the artificial intelligence safety shooting range content recommendation method provided corresponding to the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware.
In one possible design, the apparatus includes:
the device comprises a receiving and sending module and a processing module;
the receiving and sending module is used for receiving user login information sent by a user side;
the processing module is used for determining first recommended page data according to the user login information received by the transceiving module and sending the first recommended page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety targets; acquiring service end use data corresponding to the first recommended page data; the server side use data comprises server side resource consumption data and server side bandwidth use data; if the bandwidth use data of the server in the service use data is larger than the bandwidth threshold, determining that the data is in an AI safety shooting range learning mode, and acquiring first use data corresponding to the first recommended page data; if the server resource consumption data in the server use data are larger than the resource consumption threshold, determining that the target is an AI safe shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
the processing module is further configured to determine a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user for a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server side for logging in the user side next time.
Yet another aspect of the embodiments of the present application provides an artificial intelligence security range content recommendation device, which includes at least one connected processor, a memory and a transceiver, wherein the memory is used for storing a computer program, and the processor is used for calling the computer program in the memory to execute the method provided in the first aspect.
A further aspect of embodiments of the present application provides a computer device comprising at least one connected processor, a memory and a transceiver, wherein the memory is used for storing a computer program, and the processor is used for calling the computer program in the memory to execute the method provided in the first aspect.
Yet another aspect of the embodiments of the present application provides a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the method provided in the first aspect.
According to an aspect of the application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and executes the computer instructions, so that the computer device performs the method provided in the first aspect.
Compared with the prior art, in the scheme provided by the embodiment of the application, on one hand, because the user login information has the characteristic that each user is different, when the user logs in the server of the artificial intelligence safety target range, the server can determine the first recommended page data which is targeted and matched with the user requirements for the user based on the user login information, so that the first recommended page data obtained by each user are different, the specific content of the artificial intelligence safety target range is recommended in a personalized manner, uniform page data can be prevented from being recommended to the user side, and the recommended page data can be used for safety attack and defense drilling or basic knowledge learning of an artificial intelligence model. On the other hand, determining whether the target shooting range learning mode or the target shooting range practicing mode is an AI safety shooting range learning mode or an AI safety shooting range practicing mode based on the service end use data corresponding to the first recommended page data, acquiring corresponding first use data or second use data, and finally determining the current tendency matrix according to the first use data or the second use data.
Drawings
Fig. 1 is a schematic view of an application scenario of an artificial intelligence safety shooting range content recommendation system according to an embodiment of the present application;
FIG. 2a is a schematic flow chart illustrating a method for recommending artificial intelligence safety shooting range content according to an embodiment of the present disclosure;
FIG. 2b is a schematic flow chart illustrating an artificial intelligence safety range content recommendation method according to an embodiment of the present application;
fig. 3a is a schematic diagram of first recommendation page data in the artificial intelligence safety shooting range content recommendation method provided in the embodiment of the present application;
fig. 3b is a schematic diagram of historical recommendation page data in the artificial intelligence safety shooting range content recommendation method provided in the embodiment of the present application;
FIG. 4 is a schematic diagram of an artificial intelligence safety range content recommendation device in an embodiment of the present application;
FIG. 5 is a schematic diagram of a server according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a service terminal in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a server in an embodiment of the present application.
Detailed Description
The terms "first," "second," and the like in the description and in the claims of the embodiments of the application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be implemented in other sequences than those illustrated or described herein. Furthermore, the terms "include" and "have", and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that includes a list of steps or modules is not necessarily limited to those explicitly listed, but may include other steps or modules not explicitly listed or inherent to such process, method, article, or apparatus, such that partitioning of the modules as presented in an embodiment of the present application is merely a logical partitioning, and may be implemented in practice in other ways, such that multiple modules may be combined or integrated into another system, or some features may be omitted, or not implemented, and such that shown or discussed couplings or direct couplings or communicative connections between modules may be through interfaces, and such that indirect couplings or communicative connections between modules may be electrical or other similar forms, none of which are limiting in the present embodiment. Moreover, the modules or sub-modules described as separate components may or may not be physically separated, may or may not be physical modules, or may be distributed in a plurality of circuit modules, and some or all of the modules may be selected according to actual needs to implement the purpose of the embodiments of the present application.
The embodiment of the application provides an artificial intelligence safety shooting range content recommendation method, an artificial intelligence safety shooting range content recommendation device and a storage medium, wherein the method, the device and the storage medium can be used for a server, when the server receives user login information sent by a user, first recommendation page data are determined according to the user login information and are sent to the user, then an AI safety shooting range learning mode or an AI safety shooting range exercise mode is determined based on service end use data corresponding to the first recommendation page data, corresponding first use data or second use data are obtained, and finally a current tendency matrix is determined according to the first use data or the second use data. In the embodiment of the present application, a server (i.e., a server) is taken as an example, and when the embodiment is applied to a server side, reference may be made to the embodiment of the server, which is not described in detail herein.
The scheme of the embodiment of the application can be realized based on an artificial intelligence technology, and particularly relates to the technical field of computer vision in the artificial intelligence technology and the fields of cloud computing, cloud storage, databases and the like in the cloud technology, which are respectively introduced below.
Artificial Intelligence (AI) is a theory, method, technique and application system that uses a digital computer or a machine controlled by a digital computer to simulate, extend and expand human Intelligence, perceive the environment, acquire knowledge and use the knowledge to obtain the best results. In other words, artificial intelligence is a comprehensive technique of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine that can react in a manner similar to human intelligence. Artificial intelligence is the research of the design principle and the realization method of various intelligent machines, so that the machines have the functions of perception, reasoning and decision making.
The artificial intelligence technology is a comprehensive subject and relates to the field of extensive technology, namely the technology of a hardware level and the technology of a software level. The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
Computer Vision technology (CV) Computer Vision is a science for researching how to make a machine "see", and further refers to that a camera and a Computer are used to replace human eyes to perform machine Vision such as identification, tracking and measurement on a target, and further image processing is performed, so that the Computer processing becomes an image more suitable for human eyes to observe or transmitted to an instrument to detect. As a scientific discipline, computer vision research-related theories and techniques attempt to build artificial intelligence systems that can capture information from images or multidimensional data. Computer vision technologies generally include image processing, face recognition, image semantic understanding, image retrieval, OCR, video processing, video semantic understanding, video content/behavior recognition, three-dimensional object reconstruction, 3D technologies, virtual reality, augmented reality, synchronous positioning, map construction, and other technologies, and also include common face recognition, fingerprint recognition, and other biometric technologies.
With the research and progress of artificial intelligence technology, the artificial intelligence technology is developed and applied in a plurality of fields, such as common smart homes, smart wearable devices, virtual assistants, smart speakers, smart marketing, unmanned driving, automatic driving, unmanned aerial vehicles, robots, smart medical care, smart customer service, and the like.
The scheme of the embodiment of the application can be realized based on a cloud technology, particularly relates to the technical fields of cloud computing, cloud storage, databases and the like in the cloud technology, and is respectively introduced below.
Cloud technology refers to a hosting technology for unifying serial resources such as hardware, software, network and the like in a wide area network or a local area network to realize calculation, storage, processing and sharing of data. Cloud technology (Cloud technology) is based on a general term of network technology, information technology, integration technology, management platform technology, application technology and the like applied in a Cloud computing business model, can form a resource pool, is used as required, and is flexible and convenient. Cloud computing technology will become an important support. Background services of the technical network system require a large amount of computing and storage resources, such as video websites, image-like websites and more portal websites. With the high development and application of the internet industry, each article may have its own identification mark and needs to be transmitted to a background system for logic processing, data in different levels are processed separately, and various industrial data need strong system background support and can only be realized through cloud computing. According to the embodiment of the application, the user login information and the current tendency matrix can be stored through a cloud technology.
A distributed cloud storage system (hereinafter, referred to as a storage system) refers to a storage system that integrates a large number of storage devices (storage devices are also referred to as storage nodes) of different types in a network through application software or application interfaces to cooperatively work by using functions such as cluster application, grid technology, and a distributed storage file system, and provides a data storage function and a service access function to the outside. In the embodiment of the application, information such as network configuration and the like can be stored in the storage system, so that the server can conveniently retrieve the information.
At present, a storage method of a storage system is as follows: logical volumes are created, and when created, each logical volume is allocated physical storage space, which may be the disk composition of a certain storage device or of several storage devices. The client stores data on a certain logical volume, that is, stores the data on a file system, the file system divides the data into a plurality of parts, each part is an object, the object includes not only the data but also additional information such as data identification (ID, ID entry), the file system writes each object into a physical storage space of the logical volume, and the file system records storage location information of each object, so that when the client requests to access the data, the file system can allow the client to access the data according to the storage location information of each object.
The process of allocating physical storage space for the logical volume by the storage system specifically includes: physical storage space is divided in advance into stripes according to a group of capacity measures of objects stored in a logical volume (the measures often have a large margin with respect to the capacity of the actual objects to be stored) and Redundant Array of Independent Disks (RAID), and one logical volume can be understood as one stripe, thereby allocating physical storage space to the logical volume.
The Database (Database), which can be regarded as an electronic file cabinet in short, is a place for storing electronic files, and a user can add, query, update, delete, etc. data in the files. A "database" is a collection of data that is stored together in a manner that can be shared by multiple users, has as little redundancy as possible, and is independent of the application.
A Database Management System (DBMS) is a computer software System designed for managing a Database, and generally has basic functions of storage, interception, security assurance, backup, and the like. The database management system can make classification according to the database model supported by it, such as relational expression, XML (Extensible Markup Language); or classified according to the type of computer supported, e.g., server cluster, mobile phone; regardless of which type of classification is used, some DBMSs can be cross-classified, e.g., supporting multiple Query languages simultaneously.
It should be noted that the service terminal according to the embodiments of the present application may be a device providing voice and/or data connectivity to the service terminal, a handheld device having a wireless connection function, or another processing device connected to a wireless modem. Such as mobile telephones (or "cellular" telephones) and computers with mobile terminals, such as portable, pocket, hand-held, computer-included, or vehicle-mounted mobile devices, that exchange voice and/or data with a radio access network. For example, personal Communication Service (PCS) phones, cordless phones, session Initiation Protocol (SIP) phones, wireless Local Loop (WLL) stations, personal Digital Assistants (PDA) and other devices.
When the service terminal generates the first recommended page data, the service terminal also needs to receive user login information sent by the user side. Specifically, the service terminal is used for receiving user login information sent by the user terminal, determining first recommended page data according to the user login information and sending the first recommended page data to the user terminal.
In some embodiments, the present embodiment can be applied to an artificial intelligence security shooting range content recommendation system 1 as shown in fig. 1, where the artificial intelligence security shooting range content recommendation system 1 includes a server 10 and at least one client 20, and data interaction can be performed between the server 10 and the client 20. When receiving user login information sent by the user terminal 20, the server 10 determines first recommended page data according to the user login information and sends the first recommended page data to the user terminal 20, then determines whether the AI safety shooting range learning mode or the AI safety shooting range practice mode is based on server usage data corresponding to the first recommended page data, acquires corresponding first usage data or second usage data, and finally determines a current tendency matrix according to the first usage data or the second usage data.
The server related to the present application may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, middleware service, a domain name service, a security service, a CDN, a big data and artificial intelligence platform.
The service terminal according to the embodiment of the present application may include: smart terminals carrying multimedia data processing functions (e.g., video data playing function, music data playing function), such as a smart phone, a tablet pc, a notebook pc, a desktop pc, a smart tv, a smart speaker, a Personal Digital Assistant (PDA), a desktop pc, and a smart watch, but are not limited thereto.
The embodiment of the application mainly provides the following technical scheme:
when the server receives user login information sent by the user side, determining first recommendation page data according to the user login information and sending the first recommendation page data to the user side, then determining whether the AI safety shooting range learning mode or the AI safety shooting range practice mode is based on service side usage data corresponding to the first recommendation page data, acquiring corresponding first usage data or second usage data, and finally determining a current tendency matrix according to the first usage data or the second usage data. And the obtained current tendency degree matrix is used for screening the recommended content set sent to the server for the next login of the user side.
The technical solution of the present application will be described in detail with reference to several embodiments.
Referring to fig. 2a, a method for recommending artificial intelligence safety shooting range content provided in the embodiment of the present application is described as follows, the embodiment of the present application includes:
201. the server receives user login information sent by the user side.
In the embodiment of the application, when a user needs to log in a server to enter an artificial intelligence security shooting range platform to perform learning or practicing such as attack and protection of an artificial intelligence algorithm model, user login information such as a login account and a login password needs to be input on the user. After the user terminal obtains the user login information, the user login information is sent to the server terminal to be verified, and after the user login information is verified in the server terminal, the user terminal can successfully enter the artificial intelligence safety shooting range platform provided by the server terminal.
202. And the server determines first recommended page data according to the received user login information and sends the first recommended page data to the user side.
The first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety targets.
In the embodiment of the application, after the user successfully logs in the artificial intelligence safety shooting range platform, the server side can determine the first recommendation page data based on the login information. In the detailed information included in the user login information, the server side can judge whether the user is initially registered and logs in the artificial intelligence safety shooting range platform. If the user is judged not to log in the artificial intelligence safety target range platform for the first time, the server side can generate first recommended page data for historical use data (which can be understood as historical artificial intelligence safety target range use data) in the user login information. If the user logs in the artificial intelligent safety shooting range platform for the first time, the first recommendation page data can be generated by the user login information and the user input information obtained based on the user answering platform push questions. Therefore, no matter whether the user logs in the artificial intelligent safety shooting range platform for the first time or not, the first recommended page data are generated in the server based on the user login information, and are pushed to the user side in time to display the page data.
Mode 1: under the scene of initial login of a user, first recommendation page data are generated based on login information of the user and user input information obtained based on push questions of a user response platform
In some embodiments, the determining, by the server, first recommended page data according to the received user login information includes:
if the accumulated login times corresponding to the user login information are determined to be zero, user interest information data are obtained;
acquiring a pre-stored push question set and sending the pre-stored push question set to a user side;
receiving a reply data set which is sent by the user side and corresponds to the push question set;
determining a first recommended content set according to the user interest information data and the reply data set; wherein the first recommended content set comprises one of AI safe shooting range course data and AI safe shooting range practice data;
and filling the first recommended content data into a preset page container to generate the first recommended page data.
In the embodiment of the application, the server side can obtain information such as a login account number and a password of a user for verification and also can obtain the accumulated login times based on the user login information, and if the accumulated login times corresponding to the user login information is determined to be zero, the server side indicates that the user is registered for the first time and logs in the artificial intelligent safety shooting range platform. Since the server does not recommend any content to the user before, in order to more accurately recommend the content of the AI security shooting range after the user logs in at this time, the server needs to obtain the user interest information data entered by the user at the user end, obtain the push question set pre-stored locally by the server, send the push question set to the user end to be answered by the user corresponding to the user end, and then determine the first recommended content set by the reply data set.
For example, the set of push questions includes at least the following push questions:
a1 Whether there is an algorithm base;
a2 Whether technical ethics is concerned;
a3 Whether it is heavily commercial;
a4 Whether to train the model on its own;
when the user answers the 4 push questions, one of yes or no is selected for each push question, and the 4 answers obtained after the answer is completed sequentially form a reply data set according to the sequence of the question numbers. Before the reply data set is obtained, the user also inputs user interest information data (such as interest keywords in multiple directions, such as image classification, target detection, human face, voice, text and the like) consisting of a plurality of interest keywords or user interest information data consisting of a whole description text. And extracting a plurality of interest keywords corresponding to the user based on the user interest information data in the server, and then determining a first recommended content set by the server according to the user interest information data and the reply data set. Therefore, the user interest information data and the reply data set which are input by the user can be used as basic input data for the server to quickly determine recommended content.
In some embodiments, the determining a first set of recommended content from the user interest information data and the reply data set includes:
acquiring a first semantic vector corresponding to the user interest information data;
acquiring a second semantic vector corresponding to the reply data set;
connecting the first semantic vector with the second semantic vector to obtain a comprehensive semantic vector;
and acquiring a first recommended content set in a content library based on the comprehensive semantic vector.
In this embodiment of the application, when a first recommended content set is determined according to the user interest information data and the reply data set, a first implementation manner is to convert the user interest information data into a first semantic vector (essentially, a text or keyword set is converted into a semantic vector), convert the reply data set into a second semantic vector (where, if answer data is "yes", the answer data is "no", the answer data is correspondingly converted into 0,4 answer data, and the answer data is sequentially connected and then converted into a second semantic vector), connect the first semantic vector and the second semantic vector based on a connection function (such as a concat connection function) to obtain a comprehensive semantic vector, and finally obtain, as the first recommended content set, a recommended content set having a maximum vector similarity with the comprehensive semantic vector from a content library of a server. Because the content semantic vector is pre-calculated and set for each recommended content set in the content library of the server, after the comprehensive semantic vector is known, the similarity between the comprehensive semantic vector and the content semantic vector of each recommended content set in the content library can be calculated, and when the comprehensive semantic vector has the maximum vector similarity with the content semantic vector of one recommended content set, the recommended content set is obtained as the first recommended content set.
In some embodiments, the determining a first set of recommended content from the user interest information data and the reply data set includes:
obtaining interest keywords in the user interest information data to form a first screening condition;
acquiring an initial recommended content set in a content library according to the first screening condition;
forming a second screening condition based on each reply question in the reply data set;
and acquiring a first recommended content set in the initial recommended content set according to the second screening condition.
In the embodiment of the present application, when a first recommended content set is determined according to the user interest information data and the reply data set, a second implementation manner is to first use a plurality of interest keywords extracted from the user interest information data as a first filtering condition (which is essentially a keyword set), and obtain a recommended content set meeting the first filtering condition in a content library of a server as an initial recommended content set. Since each of the initial recommended contents in the initial recommended content set also has a content tag corresponding to each of the reply questions in the reply data set, for example, the initial recommended content a has a tag of "not biased for business", each of the reply questions in the reply data set may constitute a second filtering condition (which is essentially a combination of a positive word or a negative word + a keyword, and if not biased for business ", has a negative word" not "or a keyword" biased for business "), and then a recommended content set satisfying the second filtering condition is acquired as the first recommended content set in the initial recommended content set. Because a plurality of interest keyword labels and at least four combined labels formed by positive words or negative words and the combination of the keywords are preset in each recommended content set in the content library of the server, when the first screening condition is known, the initial recommended content set can be screened out, and then the first recommended content set is screened out by the initial recommended content set based on the second screening condition.
After the first recommended content set is obtained based on the above manner, since the first recommended content set is still relatively dispersed content data, the server needs to concentrate the first recommended content set in a preset page container to generate the first recommended page data, which may specifically refer to fig. 3a. The total number of the first recommended contents in the first recommended content set can be obtained through statistics, then page sub-containers with the same number are created in the page container based on the total number, and each recommended content in the first recommended content set is correspondingly filled into one page sub-container, so that first recommended page data are obtained. Therefore, based on the user interest information data and the reply data set input by the user, the server can be assisted to quickly determine recommended content and fill the recommended content into the page container to form first recommended page data, and the first recommended page data is pushed to the user side for visual display,
Mode 2: under the condition that a user does not log in for the first time, first recommendation page data are generated based on user login information
In some embodiments, the determining first recommendation page data according to the received user login information includes:
if the accumulated login times corresponding to the user login information are larger than zero, acquiring historical use data;
determining a historical tendency matrix according to the historical use data; each row vector in the historical tendency degree matrix represents a preference value of a user to a corresponding page tag, and the preference value of each page tag is determined based on the access operation of the page tag and the page residence time;
determining target preference values of which the preference value descending sequence numbers do not exceed a preset sequencing threshold according to the historical tendency matrix, and forming a screening page tag set by page tags corresponding to all the target preference values;
determining a first recommended content set according to the screening page tag set; wherein the first recommended content set comprises one of AI safe shooting range course data and AI safe shooting range practice data;
and filling the first recommended content data into a preset page container to generate the first recommended page data.
In the embodiment of the application, the server can obtain the login account number, the password and other information of the user for verification and also can obtain the accumulated login times based on the login information of the user, and if the accumulated login times corresponding to the login information of the user is determined to be more than zero, the server indicates that the user does not register for the first time and logs in the artificial intelligence safety shooting range platform, but the user already has the historical login record and the historical use data. At the moment, when the server generates the first recommendation page data, the server does not refer to the user interest information data and the reply data set which are input by the user, but mainly refers to historical use data.
When determining the first recommended content set based on the historical usage data, the historical usage data is first converted into a historical tendency matrix, for example, when a user browses the historical recommended page data, specifically referring to fig. 3b, a page corresponding to the historical recommended page data includes a plurality of page sub-containers, each page sub-container contains corresponding recommended content (that is, each page sub-container corresponds to at least one page tag), and each page sub-container is provided with a buried point to make statistics on the number of clicks of the user on the page sub-container and the page residence time. After the user finishes checking or operating the historical recommended page data, the click times and the page residence time of each page sub-container can be counted by the buried points of each page sub-container, and therefore the click times and the page residence time of each page sub-container are converted into the preference values of each page sub-container based on a preset attention degree conversion strategy.
For example, the attention degree conversion policy is set as a first gear to which the counted click times belong, a second gear to which the page dwell time belongs is counted, and a preference value can be obtained by summing a first gear interval value corresponding to the first gear and a second gear interval value corresponding to the second gear. More specifically, the number of clicks may be divided into 5 steps, for example, if the number of clicks is [0,5), the first step interval of the number of clicks (corresponding to a first step interval value of 0.1 of the number of clicks) is defined as a second step interval of the number of clicks (corresponding to a second step interval value of 0.2 of the number of clicks), if the number of clicks is [10,15), the third step interval of the number of clicks (corresponding to a third step interval value of 0.3 of the number of clicks) is defined as a third step interval of the number of clicks (corresponding to a third step interval value of 0.3 of the number of clicks), if the number of clicks is [15,20 ], the fourth step interval of the number of clicks (corresponding to a fourth step interval value of 0.4 of the number of clicks), if the number of clicks is [20, +/-, the fifth step interval of clicks (corresponding to a first step interval recommended value of the number of clicks) is defined as a second step interval value of clicks, and if the actual number of clicks in the history page sub-container B is 8, the actual number of clicks is determined as an infinite number corresponding to the second step interval value of clicks, which is defined as 0.2. Certainly, the specific implementation is not limited to dividing the number of clicks into 5 steps, and the number of clicks may be divided into steps of other numbers according to actual requirements.
Similarly, the page residence time is divided into 5 steps, for example, if the page residence time is [0,30s ], the page residence time is a first step interval (corresponding to a first step interval value of 0.1) of the page residence time, if the page residence time is [30s,60s ], the page residence time is a second step interval (corresponding to a second step interval value of 0.2) of the page residence time, if the page residence time is [60s,90s ], the page residence time is a third step interval (corresponding to a third step interval value of 0.3) of the page residence time, if the page residence time is [90s, 120s), the page residence time is a fourth step interval (corresponding to a fourth step interval value of 0.4) of the page residence time), if the page residence time is [120s, + ∞ is a fifth step interval (corresponding to a first step interval value of the page residence time recommended to be 0.5), if the page container B in the historical page data is actually 200s, the page residence time belongs to a fifth step interval value of the page residence time, and the fifth step interval value of the page residence is determined as a fifth step interval corresponding to the fifth step interval value of the page residence time, and the fifth step interval value of the fifth step of the page residence time is 0.5. Of course, the specific implementation is not limited to dividing the page residence time into 5 steps, and the page residence time may be divided into steps of other values according to the actual requirement.
After the preference value corresponding to each page sub-container in the historical recommended page data is known, a row vector a is used user1,itemi To express the preference value of the user1 to the ith page sub-container itemi in the history recommended page data, if the value range of i in itemi is [1, n1 ]]Then the page data is represented as n1 page sub-containers in the history recommended page data, and the page data is represented by the row vector a user1,item1 To a row vector a user1,itemn1 And the historical tendency matrixes are sequentially arranged from top to bottom. Because each row in the historical tendency degree matrix only has one nonzero value as a preference value, after the preference values determined by each row vector in the historical tendency degree matrix are sorted in a descending order, target preference values which do not exceed a preset sorting threshold (for example, the preset sorting threshold is set to be 5) can be selected, and page labels of page sub-containers corresponding to the target preference values form a screening page label set. Therefore, the filtered page tag set of the user is determined based on the historical use data, and can be used as the basis for filling content into the initial page after the user enters the artificial intelligent safety shooting range platform next time, the artificial intelligent safety shooting range platform does not recommend the same page content to all users uniformly, and the fact that the same page content is recommended to all users uniformly is achievedPersonalized content recommendations based on user history tags are now available.
203. And the server side acquires server side use data corresponding to the first recommended page data.
The server side use data comprises server side resource consumption data and server side bandwidth use data.
In the embodiment of the application, after the user side receives the first recommendation page data, the user side can select recommendation data of at least one artificial intelligence safety range to carry out local learning or practice. In order to clearly understand the difference between the learning process of the artificial intelligence safety shooting range-related recommended data and the practice process of the artificial intelligence safety shooting range-related recommended data, the following description is provided for the learning process and the practice process respectively.
The learning of the relevant recommendation data of the artificial intelligence safety shooting range refers to the types of contents such as technical means, specific attack codes of the technical means, attack target AI algorithm models for the specific attack codes, specific use instructions of the technical means, teaching videos of the technical means and the like, which are expected by users to be more inclined to recommend AI safety shooting ranges, of artificial intelligence safety shooting range platforms. The content of the type is more focused on displaying the relevant basic learning data of the artificial intelligence safety target range to the user, and after the user side receives the first recommendation page data, the user mainly selects the content in the first recommendation page data to view the content. In the learning process, any retraining or reinforcement is not needed for the attack target AI algorithm model, so that the resource consumption of the server is low. And the user side watches or checks the relevant recommended data of the artificial intelligent safety shooting range on line in the learning process, and frequent data transmission is involved in the process, so that the bandwidth is occupied greatly.
The practice of the artificial intelligence safety shooting range related recommended data means that a user expects that an artificial intelligence safety shooting range platform is more prone to recommend an attack target AI algorithm model, then the user operates based on the specialty of the user to compile specific attack codes for the recommended attack target AI algorithm model, and after the specific attack codes are compiled, an attack result, an attack process score, a model attack report and the like of the recommended attack target AI algorithm model are obtained. In the training process, retraining or reinforcing aiming at the attack target AI algorithm model is involved, so that the resource consumption of the server is large. In the training process, the user end completes algorithm reinforcement on the attack target AI algorithm model and sends the reinforced attack target AI algorithm model to the server end for training or reinforcement, and frequent data transmission is not involved in the process, so that the bandwidth occupation is small.
Therefore, after the user specifically views or operates the first recommended page data, the server-side use data is accurately judged how the user specifically operates the first recommended page data, and an accurate operation type can be obtained.
204. And if the server determines that the server bandwidth usage data in the server usage data is larger than the bandwidth threshold, determining that the server bandwidth usage data is in an AI safety shooting range learning mode, and acquiring first usage data corresponding to the first recommended page data.
In the embodiment of the application, if it is determined that the use mode of the user for the artificial intelligent safety shooting range platform is the AI safety shooting range learning mode according to the service use data in the service side, it indicates that the service side needs to allocate more network bandwidth to perform data interaction with the user side so as to transmit specific page data corresponding to the first recommended page data in the AI safety shooting range learning mode.
In the AI safety shooting range learning mode, AI safety shooting range course data included in the first recommended page data is stored in each page sub-container in a data link address mode, when a user selects one of the page sub-containers in the first recommended page data and clicks to enter, the server side obtains a data link address corresponding to the page sub-container, original data content is obtained according to the data link address, and finally the server side transmits the original data content to the user side. For example, the original data content acquired by the data link address can be a teaching video of an AI safety shooting range, and the server transmits the teaching video of the AI safety shooting range to the user terminal in a streaming media data mode; and the original data content acquired by the data link address can be a teaching text of the AI safety shooting range, and the server transmits the teaching text of the AI safety shooting range to the user terminal in a hypertext transfer protocol mode.
It can be seen that, in the AI safe range learning mode, after the user views or operates the first recommended page data, the page sub-containers can detect data such as specific clicks of the page sub-containers and page residence time based on the embedded points, and then the data such as the specific clicks of the page sub-containers and the page residence time form first usage data of the user for the first recommended page data in the AI safe range learning mode. After the first usage data is acquired, the content viewing or usage preference of the beginner user can be further accurately analyzed to be used as a historical data basis for analyzing the recommended page data again in a follow-up mode. Moreover, under the AI safe shooting range learning mode, the effect of pushing the learning content to the beginner users with lower specialty is fully realized.
205. And if the server determines that the server resource consumption data in the server use data is larger than the resource consumption threshold, determining that the server use data is in the AI safe shooting range practice mode, and acquiring second use data corresponding to the first recommended page data.
In the embodiment of the application, if it is determined that the use mode of the user for the artificial intelligence security shooting range platform is the AI security shooting range practice mode according to the service use data in the service, it indicates that the service needs to allocate more local resources (such as CPU computing power, memory, and the like) for the user to call, thereby completing operations such as attack, defense, retraining, and the like on the AI algorithm model in the AI security shooting range practice mode.
In the AI safety shooting range practice mode, the AI safety shooting range practice data included in the first recommended page data stores the original data (such as original codes, model names, etc.) of the AI algorithm model in each page sub-container. For example, the original local code of the target detection model is stored in the page sub-container 1 (the original local code hides part of the model key parameters or the model code relative to the original complete code), the model name of the face recognition model is stored in the page sub-container 2 (only the model name is displayed, the model parameters and the model code of the complete face recognition model need to be supplemented by the user), after the user selects one of the page sub-containers, the original data in the page sub-container needs to be supplemented completely to obtain a complete AI algorithm model, and then the complete AI algorithm model is sent to the server, and after the server receives the complete AI algorithm model, the server calls the local server resource to perform operations such as retraining or reinforcing of the AI algorithm model, so as to achieve the effect of practice in the AI safe target range.
Therefore, in the AI safety shooting range practice mode, the user can analyze the original data of each AI algorithm model and then completely supplement the original data, and the supplemented and completely supplemented AI algorithm model is sent to the server side for verification, so that the effect of examining the user with higher specialty is fully realized. After the second use data is obtained, the AI algorithm model exercise preference of the professional user can be further accurately analyzed to be used as a historical data basis for analyzing the recommended page data again in the follow-up process.
206. And the server determines a current tendency matrix according to the first usage data or the second usage data.
Each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server for logging in the user next time.
In this embodiment of the present application, when a user browses first recommended page data, specifically referring to fig. 3a, a page corresponding to the first recommended page data includes a plurality of page sub-containers, each page sub-container contains corresponding recommended content (that is, each page sub-container corresponds to at least one page tag), and each page sub-container is provided with a buried point for making statistics on the number of clicks of the page sub-container and the page residence time of the user. After the user finishes viewing or operating the first recommended page data and obtains the first usage data or the second usage data, the click times and the page residence time of each page sub-container can be counted by the buried points of each page sub-container obtained from the first usage data or the second usage data, and therefore the click times and the page residence time of each page sub-container are converted into preference values of each page sub-container based on the attention degree conversion strategy.
After the preference value corresponding to each page sub-container in the first recommended page data is known, a row vector a is used userj,itemk To express the preference value of the user userj to the kth page sub-container itemk in the first recommended page data, if the value range of k in itemk is [1, n2 ]]It means that there are n2 page sub-containers in the first recommended page data, represented by the row vector a userj,item1 To a column vector a user1,itemn2 And sequentially arranging the current tendency matrixes from top to bottom.
In some embodiments, as shown in fig. 2a, as a first obtaining manner for obtaining a current tendency matrix to perform recommendation data after a user logs in next time, after determining the current tendency matrix according to the first usage data or the second usage data, the method further includes:
2071. and the server determines the current target preference values of which the preference value descending sequence numbers do not exceed the preset sequencing threshold value based on the current tendency degree matrix, and forms the page tags corresponding to the current target preference values into a current screening page tag set.
In the embodiment of the present application, because each row in the current tendency matrix has only one non-zero value as a preference value, after sorting the preference values determined by the vectors in each row in the current tendency matrix in a descending order, a current target preference value that does not exceed a preset sorting threshold (for example, the preset sorting threshold is set to 5) may be selected, and page tags of the page sub-container corresponding to each current target preference value are formed into a current filtering page tag set. Therefore, the screening page tag set of the user is determined based on the first usage data or the second usage data, the basis that recommended content is filled in a page after the user enters the artificial intelligence safety shooting range platform next time can be used, the artificial intelligence safety shooting range platform does not recommend the same page content to all users in a unified mode, and personalized content recommendation based on historical usage is achieved.
For example, a row vector of a first row in the current tendency matrix represents a preference value for a1 st page sub-container item1 in the first recommended page data, and learning content of attack/defense of an AI algorithm model is accommodated in the item 1; the row vector of the second row in the current tendency degree matrix represents the preference value of the sub-container item2 of the 2 nd page in the first recommended page data, and the item2 contains the learning content of the AI algorithm model safety problem; a row vector of a third row in the current tendency matrix represents a preference value of a3 rd page sub-container item3 in the first recommended page data, and learning contents of an AI algorithm model white box/black box problem are contained in the item 3; the row vector of the fourth row in the current tendency matrix represents the preference value of the 4 th page sub-container item4 in the first recommended page data, and the item4 contains the learning content of AI algorithm model components/non-component problems and the like. The row vector of the first row in the current tendency matrix determines the preference value of the user for the learning content of the attack/defense of the AI algorithm model, the row vector of the second row in the current tendency matrix determines the preference value of the user for the learning content of the safety problem of the AI algorithm model, the row vector of the third row in the current tendency matrix determines the preference value of the user for the learning content of the white box/black box problem of the AI algorithm model, and the row vector of the fourth row in the current tendency matrix determines the preference value of the user for the learning content of the component/non-component problem of the AI algorithm model.
2081. And the server determines a second recommended content set from a content library according to the current screening page tag set.
Wherein the second set of recommended content includes one of AI safety range tutorial data and AI safety range exercise data.
In the embodiment of the application, each piece of recommended content in a content library of a server is provided with a content tag, and when a plurality of page tags included in the current screening page tag set are combined to form a tag screening condition, the tag screening condition is used for retrieving and determining a second recommended content set in the content library, wherein the second recommended content set is the basis for filling the recommended content in the page after the user logs in the artificial intelligent safety shooting range platform next time. Specifically, the second recommended content data is filled into a preset page container to generate second recommended page data. Therefore, the user can obtain the recommended data obtained based on the historical use condition of the user when logging in the artificial intelligent safety target range platform every time, and the unified data pushed by the platform does not need to be received.
In some embodiments, as shown in fig. 2b, as a second obtaining manner for obtaining a current tendency matrix to recommend data after a user logs in next time, after determining the current tendency matrix according to the first usage data or the second usage data, the method further includes:
2072. the server determines a current tendency vector based on the current tendency matrix.
In the embodiment of the application, because each row in the current tendency degree matrix only has one non-zero value as a preference value, the current tendency degree vector with lower dimensionality can be obtained after summing up the vectors of the rows in the current tendency degree matrix, so that the preference value of the user to each page sub-container is represented by the current tendency degree vector. For example, a is used in the current tendency vector itemi To indicate the user's preference value for the ith page sub-container itemi in the first recommended page data.
2082. And the server acquires similar tendency vectors from the tendency vector set based on the current tendency vector to form a similar tendency vector set.
And the vector similarity of the similar tendency vector and the current tendency vector exceeds a preset vector similarity threshold.
In the embodiment of the application, the server further stores a tendency vector set formed by the tendency vectors of the users obtained after the other users log in the artificial intelligence security shooting range platform, wherein it needs to be stated that in order to ensure data security, the user tendency vectors (the user tendency vectors form the tendency vector set) obtained after the users belonging to the same organization (for example, belonging to the same company) log in the artificial intelligence security shooting range platform are generally obtained to analyze and obtain the similarity tendency vector of the current tendency vector.
At this time, the server may analyze and obtain a target user tendency vector (i.e., a similar tendency vector) in the tendency vector set, where the vector similarity between the tendency vector set and the current tendency vector exceeds the vector similarity threshold, to form a similar tendency vector set. And each target user tendency vector corresponds to a specific user, each user has a user tendency vector obtained by using an artificial intelligence safety shooting range platform, and after the similar user of the user corresponding to the current tendency vector is obtained, a second recommended content set can be further determined based on the comprehensive condition that the similar user views and uses the page sub-container.
2092. The server determines a second set of recommended content from the content library based on the set of similarity propensity vectors.
Wherein the second recommended content set comprises one of AI safety shooting range course data and AI safety shooting range practice data.
In the embodiment of the present application, each similarity vector of the similarity vector set can select a target vector value of K bits before vector value sorting, and the target vector values of K bits before vector value sorting respectively correspond to preference values of specific contents under page tags in one page sub-container. Therefore, after the page tags of the topks of the similar users are obtained based on the similarity tendency vector set, the page tags of the overall ranking topks after the page tags of the topks of the similar users are integrated can be counted and used as another screening page tag set. A second set of recommended content is then determined from the content repository based on the other set of filter page tags.
Because each recommended content in the content library of the server is provided with a content tag, when a plurality of page tags included in the other screening page tag set are combined into another tag screening condition, the other tag screening condition is used for retrieving and determining a second recommended content set in the content library, and the second recommended content set is the basis for filling the recommended content in the page after the user logs in the artificial intelligent safety target platform next time. Specifically, the second recommended content data is filled into a preset page container to generate second recommended page data. Therefore, the user can log in the artificial intelligent safety target range platform every time to obtain the recommended data obtained based on the historical use condition of the user, and the unified data pushed by the platform does not need to be received.
It can be seen that, according to the scheme, in the scenes such as the artificial intelligence safety shooting range and the like, when the server receives user login information sent by the user, first recommendation page data are determined according to the user login information and sent to the user, then an AI safety shooting range learning mode or an AI safety shooting range exercise mode is determined based on service use data corresponding to the first recommendation page data, corresponding first use data or second use data are obtained, and finally a current tendency matrix is determined according to the first use data or the second use data. The first recommended page data can be determined by the server side based on the user login information and sent to the user side when the user logs in the server side, so that uniform page data are prevented from being recommended to the user side, and the recommended page data can be used for safety attack and defense drilling or basic knowledge learning of the artificial intelligent model.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an artificial intelligence safety range content recommendation device in the embodiment of the present application. Fig. 4 is a schematic structural diagram of an artificial intelligence safety target range content recommendation device (the server 10 in fig. 1 can also be understood as an artificial intelligence safety target range content recommendation device), which can be applied to scenes such as an artificial intelligence safety target range. The server in the artificial intelligence safety shooting range content recommendation system in the embodiment of the application can implement the steps of the artificial intelligence safety shooting range content recommendation method executed by the server in the embodiment corresponding to the above-mentioned fig. 2a or fig. 2 b. The functions realized by the artificial intelligence safety shooting range content recommendation device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware. As shown in fig. 4, the artificial intelligence safety target range content recommendation apparatus specifically includes a transceiver module 11 and a processing module 12, and the transceiver module 11 and the processing module 12 may refer to operations executed in the embodiment corresponding to fig. 2a or fig. 2b for realizing functions, which are not described herein again.
In some embodiments, the artificial intelligence security target range content recommendation device (i.e., the server 10) includes a transceiver module 11 and a processing module 12;
the transceiver module 11 is configured to receive user login information sent by a user side;
the processing module 12 is configured to determine first recommendation page data according to the user login information received by the transceiver module 11, and send the first recommendation page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety target ranges; acquiring service end use data corresponding to the first recommended page data; the server side use data comprises server side resource consumption data and server side bandwidth use data; if the bandwidth use data of the server in the service use data is larger than the bandwidth threshold, determining that the data is in an AI safety shooting range learning mode, and acquiring first use data corresponding to the first recommended page data; if the server resource consumption data in the server use data are larger than the resource consumption threshold, determining that the target is an AI safe shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
the processing module 12 is further configured to determine a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server for logging in the user next time.
It can be seen that, according to the scheme, in the scenes such as the artificial intelligence safety shooting range and the like, when the server receives user login information sent by the user, first recommendation page data are determined according to the user login information and sent to the user, then an AI safety shooting range learning mode or an AI safety shooting range exercise mode is determined based on service use data corresponding to the first recommendation page data, corresponding first use data or second use data are obtained, and finally a current tendency matrix is determined according to the first use data or the second use data. The first recommended page data can be determined by the server side based on the user login information and sent to the user side when the user logs in the server side, so that uniform page data are prevented from being recommended to the user side, and the recommended page data can be used for safety attack and defense drilling or basic knowledge learning of the artificial intelligent model.
The artificial intelligence safety shooting range content recommendation device in the embodiment of the present application is described above from the perspective of the modular functional entity, and the artificial intelligence safety shooting range content recommendation device in the embodiment of the present application is described below from the perspective of hardware processing.
It should be noted that in the embodiments of the present application (including the embodiments shown in fig. 4), all entity devices corresponding to the transceiver modules may be transceivers, and all entity devices corresponding to the processing modules may be processors. When one of the devices has the structure shown in fig. 4, the processor, the transceiver and the memory implement the same or similar functions of the transceiver module and the processing module provided in the device embodiment corresponding to the device, and the memory in fig. 5 stores a computer program that needs to be called when the processor executes the artificial intelligence safety range content recommendation method.
When the device shown in fig. 4 has the structure shown in fig. 5, the processor in fig. 5 can implement the same or similar functions of the processing module provided in the device embodiment corresponding to the device, the transceiver in fig. 5 can implement the same or similar functions of the transceiver module provided in the device embodiment corresponding to the device, and the memory in fig. 5 stores a computer program that needs to be called when the processor executes the artificial intelligence safety range content recommendation method. In the embodiment shown in fig. 4 of this application, the entity device corresponding to the transceiver module may be an input/output interface, and the entity device corresponding to the processing module may be a processor.
As shown in fig. 6, for convenience of description, only the parts related to the embodiments of the present application are shown, and details of the specific technology are not disclosed, please refer to the method part of the embodiments of the present application. The terminal device may be any terminal device including a mobile phone, a tablet computer, a Personal Digital Assistant (PDA, for short, the whole english is: personal Digital Assistant), a Point of sale terminal (POS, for short, the whole english is: point of Sales), a vehicle-mounted computer, etc., taking the terminal as the mobile phone as an example:
fig. 6 is a block diagram illustrating a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present application. Referring to fig. 6, the handset includes: radio Frequency (RF) circuit 610, memory 620, input unit 630, display unit 640, sensor 650, audio circuit 660, wireless fidelity (WiFi) module 670, processor 680, and power supply 690. Those skilled in the art will appreciate that the handset configuration shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following specifically describes each constituent component of the mobile phone with reference to fig. 6:
RF circuit 610 may be used for receiving and transmitting signals during a message transmission or a call, and in particular, for receiving downlink information from a base station and processing the received downlink information to processor 680; in addition, data for designing uplink is transmitted to the base station. In general, RF circuit 610 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), general Packet Radio Service (GPRS), code Division Multiple Access (CDMA), wideband Code Division Multiple Access (WCDMA), long Term Evolution (LTE), e-mail, short Message Service (SMS), etc.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications of the mobile phone and data processing by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, can collect touch operations of a user (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger, a stylus, etc.) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The Display unit 640 may include a Display panel 641, and optionally, the Display panel 641 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 6, the touch panel 631 and the display panel 641 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 641 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 641 and/or the backlight when the mobile phone moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile phone, and other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor and the like which can be configured for the mobile phone are not described herein again.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and a cell phone. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signals into electrical signals, which are received by the audio circuit 660 and converted into audio data, which are processed by the audio data output processor 680 and then transmitted via the RF circuit 610 to, for example, another cellular phone, or output to the memory 620 for further processing.
Wi-Fi belongs to short-distance wireless transmission technology, and a mobile phone can help a user to receive and send emails, browse webpages, access streaming media and the like through a Wi-Fi module 670, and provides wireless broadband internet access for the user. Although fig. 6 shows a W-iFi module 670, it is understood that it does not belong to the essential components of a cellular phone and can be omitted as needed within the scope of not changing the essence of the application.
The processor 680 is a control center of the mobile phone, and connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby performing overall monitoring of the mobile phone. Optionally, processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The handset also includes a power supply 690 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 680 via a power management system, so as to manage charging, discharging, and power consumption via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In the embodiment of the present application, the processor 680 included in the mobile phone further has a flowchart for controlling the execution of the artificial intelligence security shooting range content recommendation method shown in fig. 2a or fig. 2 b.
Fig. 7 is a schematic structural diagram of a server 720 according to an embodiment of the present disclosure, where the server 720 may have a larger difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 722 (e.g., one or more processors) and a memory 732, and one or more storage media 730 (e.g., one or more mass storage devices) for storing applications 742 or data 744. Memory 732 and storage medium 730 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 730 may include one or more modules (not shown), each of which may include a series of instruction operations on a server. Further, the central processor 722 may be configured to communicate with the storage medium 730, and execute a series of instruction operations in the storage medium 730 on the server 720.
The Server 720 may also include one or more power supplies 726, one or more wired or wireless network interfaces 750, one or more input-output interfaces 758, and/or one or more operating systems 741, such as Windows Server, mac OS X, unix, linux, freeBSD, and so forth.
The steps performed by the server in the above embodiments may be based on the structure of the server 720 shown in fig. 7. The steps of the server shown in fig. 2 in the above-described embodiment, for example, may be based on the server structure shown in fig. 7. For example, the central processor 722 performs the following operations by calling instructions in the memory 732:
receiving user login information sent by a user side through an input/output interface 758;
determining first recommended page data according to the received user login information, and sending the first recommended page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety targets; acquiring service end use data corresponding to the first recommended page data; the server side use data comprises server side resource consumption data and server side bandwidth use data; if the fact that the bandwidth using data of the server side in the using data of the server side is larger than a bandwidth threshold value is determined, an AI safety shooting range learning mode is determined, and first using data corresponding to the first recommended page data are obtained; if the server-side resource consumption data in the server-side use data are larger than a resource consumption threshold value, determining that the practice mode is an AI safety shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
determining a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server for logging in the user next time.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the embodiments of the present application, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer-readable storage medium.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are generated in whole or in part when the computer program is loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
The technical solutions provided in the embodiments of the present application are described in detail above, and the embodiments of the present application use specific examples to explain the principles and implementations of the embodiments of the present application, and the descriptions of the embodiments are only used to help understand the methods and core ideas of the embodiments of the present application; meanwhile, for a person skilled in the art, according to the idea of the embodiment of the present application, there may be a change in the specific implementation and application scope, and in summary, the content of the present specification should not be construed as a limitation to the embodiment of the present application.

Claims (9)

1. An artificial intelligence safety shooting range content recommendation method is characterized by comprising the following steps:
receiving user login information sent by a user side;
determining first recommended page data according to the received user login information, and sending the first recommended page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety targets;
acquiring server use data corresponding to the first recommended page data; the server side use data comprises server side resource consumption data and server side bandwidth use data;
if the fact that the bandwidth using data of the server side in the using data of the server side is larger than a bandwidth threshold value is determined, an AI safety shooting range learning mode is determined, and first using data corresponding to the first recommended page data are obtained;
if the server-side resource consumption data in the server-side use data are larger than a resource consumption threshold value, determining that the practice mode is an AI safety shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
determining a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a user terminal for logging in a service terminal next time;
the page corresponding to the first recommended page data comprises a plurality of page sub-containers, and each page sub-container contains corresponding recommended content;
wherein the server usage data comprises the first usage data and the second usage data;
in the AI safe shooting range learning mode, AI safe shooting range course data included in the first recommended page data are stored in the page sub-containers in a data link address mode, after a user selects one of the page sub-containers and clicks to enter the page sub-container, the server side acquires a data link address corresponding to the page sub-container, acquires original data content according to the data link address, and transmits the original data content to the user side;
in the AI safe shooting range practice mode, the AI safe shooting range practice data included in the first recommended page data is firstly to store the original data of an AI algorithm model in the page sub-containers, after a user selects one of the page sub-containers, the original data in the page sub-container is completely supplemented to obtain a complete AI algorithm model, and then the complete AI algorithm model is sent to the server, and after the server receives the complete AI algorithm model, local server resources are called to retrain or reinforce the AI algorithm model;
wherein, after determining a current propensity matrix from the first usage data or the second usage data, the method further comprises:
determining current target preference values of which the preference value descending order sequence numbers do not exceed a preset ordering threshold value based on the current tendency degree matrix, and forming page tags corresponding to the current target preference values into a current screening page tag set;
determining a second recommended content set from a content library according to the current screening page tag set; wherein the second recommended content set comprises one of AI safety shooting range course data and AI safety shooting range practice data;
in the AI safety shooting range learning mode, the recommended data of the artificial intelligence safety shooting range comprise technical means of the AI safety shooting range, specific attack codes of the technical means, an attack target AI algorithm model for the specific attack codes, specific use instructions of the technical means and teaching videos of the technical means;
in the AI safety shooting range practice mode, the recommendation data of the artificial intelligence safety shooting range comprise an attack target AI algorithm model, and the user operates to compile specific attack codes for the attack target AI algorithm model, and obtains attack results, attack process scores and model attack reports for the attack target AI algorithm model after the specific attack codes are compiled.
2. The method of claim 1, wherein after determining a current propensity matrix from the first usage data or the second usage data, the method further comprises:
determining a current tendency vector based on the current tendency matrix;
acquiring similar tendency vectors from the tendency vector set based on the current tendency vector to form a similar tendency vector set; the vector similarity of the similar tendency vector and the current tendency vector exceeds a preset vector similarity threshold, and the tendency vector set is stored by a server and used for representing user tendency vectors corresponding to a plurality of users respectively;
determining a second recommended content set from a content library based on the similarity tendency vector set; wherein the second set of recommended content includes one of AI safety range tutorial data and AI safety range exercise data.
3. The method according to any one of claims 1-2, wherein the determining first recommended page data according to the received user login information comprises:
if the accumulated login times corresponding to the user login information are determined to be zero, user interest information data are obtained;
acquiring a pre-stored push question set and sending the pre-stored push question set to a user side;
receiving a reply data set which is sent by the user side and corresponds to the push question set;
determining a first recommended content set according to the user interest information data and the reply data set; wherein the first recommended content set comprises one of AI safe shooting range course data and AI safe shooting range practice data;
and filling the first recommended content data into a preset page container to generate the first recommended page data.
4. The method according to any one of claims 1-2, wherein the determining first recommendation page data according to the received user login information comprises:
if the accumulated login times corresponding to the user login information are larger than zero, acquiring historical use data;
determining a historical tendency matrix according to the historical use data; each row vector in the historical tendency degree matrix represents a preference value of a user to a corresponding page tag, and the preference value of each page tag is determined based on the access operation of the page tag and the page residence time;
determining target preference values of which the preference value descending sequence numbers do not exceed a preset sequencing threshold according to the historical tendency matrix, and forming a screening page tag set by page tags corresponding to all the target preference values;
determining a first recommended content set according to the screening page tag set; wherein the first recommended content set comprises one of AI safety shooting range course data and AI safety shooting range practice data;
and filling the first recommended content data into a preset page container to generate the first recommended page data.
5. The method of claim 3, wherein determining a first set of recommended content based on the user interest information data and the reply data set comprises:
acquiring a first semantic vector corresponding to the user interest information data;
acquiring a second semantic vector corresponding to the reply data set;
connecting the first semantic vector with the second semantic vector to obtain a comprehensive semantic vector;
and acquiring a first recommended content set in a content library based on the comprehensive semantic vector.
6. The method of claim 3, wherein determining a first set of recommended content based on the user interest information data and the reply data set comprises:
obtaining interest keywords in the user interest information data to form a first screening condition;
acquiring an initial recommended content set in a content library according to the first screening condition;
forming a second screening condition based on each reply question in the reply data set;
and acquiring a first recommended content set in the initial recommended content set according to the second screening condition.
7. An artificial intelligence safety target range content recommendation device is characterized by comprising a receiving and sending module and a processing module;
the receiving and sending module is used for receiving user login information sent by a user side;
the processing module is used for determining first recommended page data according to the user login information received by the transceiving module and sending the first recommended page data to a user side; the first recommendation page data comprises recommendation data of a plurality of artificial intelligence safety target ranges; acquiring service end use data corresponding to the first recommended page data; the server side use data comprises server side resource consumption data and server side bandwidth use data; if the bandwidth use data of the server in the service use data is larger than the bandwidth threshold, determining that the data is in an AI safety shooting range learning mode, and acquiring first use data corresponding to the first recommended page data; if the server-side resource consumption data in the server-side use data are larger than a resource consumption threshold value, determining that the practice mode is an AI safety shooting range practice mode, and acquiring second use data corresponding to the first recommended page data;
the processing module is further configured to determine a current tendency matrix according to the first usage data or the second usage data; each row vector in the current tendency degree matrix represents a preference value of a user to a corresponding page tag, the preference value of each page tag is determined based on the access operation of the page tag and the page residence time, and the current tendency degree matrix is used for screening a recommended content set sent to a server for logging in the user next time;
the page corresponding to the first recommended page data comprises a plurality of page sub-containers, and each page sub-container contains corresponding recommended content;
wherein the server usage data comprises the first usage data and the second usage data;
in the AI safety shooting range learning mode, AI safety shooting range course data included in the first recommended page data are stored in the page sub-containers in a data link address mode, after a user selects one of the page sub-containers and clicks to enter the page sub-container, the server side acquires a data link address corresponding to the page sub-container, acquires original data content according to the data link address, and transmits the original data content to the user side;
in the AI safe shooting range practice mode, the AI safe shooting range practice data included in the first recommended page data is firstly to store the original data of an AI algorithm model in the page sub-containers, after a user selects one of the page sub-containers, the original data in the page sub-container is completely supplemented to obtain a complete AI algorithm model, and then the complete AI algorithm model is sent to the server, and after the server receives the complete AI algorithm model, local server resources are called to retrain or reinforce the AI algorithm model;
wherein, after determining the current tendency matrix according to the first usage data or the second usage data, the method further comprises:
determining current target preference values of which the preference value descending sequence numbers do not exceed a preset sequencing threshold value based on the current tendency degree matrix, and forming page tags corresponding to all the current target preference values into a current screening page tag set;
determining a second recommended content set from a content library according to the current screening page tag set; wherein the second recommended content set comprises one of AI safe shooting range course data and AI safe shooting range practice data;
in the AI safety shooting range learning mode, the recommended data of the artificial intelligent safety shooting range comprise technical means of the AI safety shooting range, specific attack codes of the technical means, an attack target AI algorithm model for the specific attack codes, specific use instructions of the technical means and teaching videos of the technical means;
in the AI safety shooting range practice mode, the recommendation data of the artificial intelligence safety shooting range comprise an attack target AI algorithm model, and the user operates to compile specific attack codes for the attack target AI algorithm model, and obtains attack results, attack process scores and model attack reports for the attack target AI algorithm model after the specific attack codes are compiled.
8. An artificial intelligence safety shooting range content recommendation device, the device comprising:
at least one processor, memory, and transceiver;
wherein the memory is for storing a computer program and the processor is for calling the computer program stored in the memory to perform the method of any one of claims 1-6.
9. A computer-readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1-6.
CN202210949803.6A 2022-08-09 2022-08-09 Artificial intelligence safety target range content recommendation method, device and storage medium Active CN115022098B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210949803.6A CN115022098B (en) 2022-08-09 2022-08-09 Artificial intelligence safety target range content recommendation method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210949803.6A CN115022098B (en) 2022-08-09 2022-08-09 Artificial intelligence safety target range content recommendation method, device and storage medium

Publications (2)

Publication Number Publication Date
CN115022098A CN115022098A (en) 2022-09-06
CN115022098B true CN115022098B (en) 2022-11-18

Family

ID=83065808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210949803.6A Active CN115022098B (en) 2022-08-09 2022-08-09 Artificial intelligence safety target range content recommendation method, device and storage medium

Country Status (1)

Country Link
CN (1) CN115022098B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116522002B (en) * 2023-06-27 2023-09-08 交通运输部水运科学研究所 Container recommendation method and system of navigation service system based on machine learning
CN117688250B (en) * 2024-02-04 2024-04-16 国网湖北省电力有限公司信息通信公司 Unified data dynamic service management system and method suitable for electric power full scene

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279206A (en) * 2014-07-25 2016-01-27 北京龙源创新信息技术有限公司 Intelligent recommendation method and system
CN109712460A (en) * 2019-02-27 2019-05-03 浙江机电职业技术学院 Electronic Training cloud platform system
CN111209474A (en) * 2019-12-27 2020-05-29 广东德诚科教有限公司 Online course recommendation method and device, computer equipment and storage medium
CN113872960A (en) * 2021-09-24 2021-12-31 南方电网科学研究院有限责任公司 Network security target range for power industry and operation method thereof
CN114422201A (en) * 2021-12-28 2022-04-29 北京永信至诚科技股份有限公司 Network target range large-scale user remote access method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589905B (en) * 2014-12-26 2019-06-18 中国银联股份有限公司 The analysis of user interest data and collection system and its method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279206A (en) * 2014-07-25 2016-01-27 北京龙源创新信息技术有限公司 Intelligent recommendation method and system
CN109712460A (en) * 2019-02-27 2019-05-03 浙江机电职业技术学院 Electronic Training cloud platform system
CN111209474A (en) * 2019-12-27 2020-05-29 广东德诚科教有限公司 Online course recommendation method and device, computer equipment and storage medium
CN113872960A (en) * 2021-09-24 2021-12-31 南方电网科学研究院有限责任公司 Network security target range for power industry and operation method thereof
CN114422201A (en) * 2021-12-28 2022-04-29 北京永信至诚科技股份有限公司 Network target range large-scale user remote access method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向未来的网络靶场体系架构研究;刘智国等;《信息技术与网络安全》;20180610(第06期);第41-46页 *

Also Published As

Publication number Publication date
CN115022098A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN111310034B (en) Resource recommendation method and related equipment
CN115022098B (en) Artificial intelligence safety target range content recommendation method, device and storage medium
CN110704661B (en) Image classification method and device
CN104239535A (en) Method and system for matching pictures with characters, server and terminal
WO2015067122A1 (en) Method and device for pushing information
WO2021120875A1 (en) Search method and apparatus, terminal device and storage medium
US10621259B2 (en) URL error-correcting method, server, terminal and system
CN111914113A (en) Image retrieval method and related device
CN114595124B (en) Time sequence abnormity detection model evaluation method, related device and storage medium
CN111368171A (en) Keyword recommendation method, related device and storage medium
CN114357278A (en) Topic recommendation method, device and equipment
WO2021073434A1 (en) Object behavior recognition method and apparatus, and terminal device
CN113220848A (en) Automatic question answering method and device for man-machine interaction and intelligent equipment
CN116758362A (en) Image processing method, device, computer equipment and storage medium
CN114817742B (en) Knowledge distillation-based recommendation model configuration method, device, equipment and medium
CN110929882A (en) Feature vector calculation method based on artificial intelligence and related device
CN115546516A (en) Personnel gathering method and device, computer equipment and storage medium
CN115376192A (en) User abnormal behavior determination method and device, computer equipment and storage medium
CN115203194A (en) Metadata information generation method, related device, equipment and storage medium
CN111859240A (en) Picture exporting method, related device and storage medium
CN110781274A (en) Question-answer pair generation method and device
CN115525554B (en) Automatic test method, system and storage medium for model
CN115412726B (en) Video authenticity detection method, device and storage medium
CN115909186B (en) Image information identification method, device, computer equipment and storage medium
CN117373093A (en) Image recognition method, device, equipment and storage medium based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant