Analysis of Computer Information Security and Protection Strategies in the Era of Artificial Intelligence

Authors

  • Xiaofei Sun Guangdong ATV Performing Arts Vocational College, Zhaoqing, Guangdong 526000
  • Xiaoliang Zhou Guangdong ATV Performing Arts Vocational College, Zhaoqing, Guangdong 526000

Keywords:

Era of artificial intelligence, Computer information security, Protection

Abstract

Currently, there are still some problems and shortcomings in the operation of computer systems, such as illegal attacks, malicious destruction, and information leakage, which affect the stability of computer system development.In response to this, industry related technical personnel need to investigate and analyze current information security issues, realize the importance of information security protection, and develop scientific and specific solutions to the exposed problems to ensure the stability of computer system operation.This article explores how to maintain computer information security, aiming to promote the development of science and technology.

References

Wang, Y., Yang, T., Liang, H., & Deng, M. (2022). Cell atlas of the immune microenvironment in gastrointestinal cancers: Dendritic cells and beyond. Frontiers in Immunology, 13, 1007823.

Wang, J. (2025). Predictive Modeling for Sortation and Delivery Optimization in E-Commerce Logistics.

Yuan, J. (2024). Exploiting gpt-4 for multimodal medical data processing in electronic health record systems. Preprints, December.

Song, X. (2024). Leveraging aigc and human-computer interaction design to enhance efficiency and quality in e-commerce content generation.

Chen, J. (2025). Data Quality Quantized Framework: Ensuring Large-Scale Data Integration in Gig Economy Platforms.

Chen, J. (2025). Geospatial Neural Networks: Enhancing Smart City through Location Intelligence.

Wang, H. (2024). The Restriction and Balance of Prior Rights on the Right of Enterprise Name.

Gong, C., Lin, Y., Cao, J., & Wang, J. (2024, October). Research on Enterprise Risk Decision Support System Optimization based on Ensemble Machine Learning. In Proceeding of the 2024 5th International Conference on Computer Science and Management Technology (pp. 1003-1007).

Bohang, L., Li, N., Yang, J. et al. Image steganalysis using active learning and hyperparameter optimization. Sci Rep 15, 7340 (2025). https://doi.org/10.1038/s41598-025-92082-w

Yao, T., Jian, X., He, J., & Meng, Q. (2025). Drone-3D Printing Linkage for Rapid Construction of Sustainable Post-Disaster Temporary Shelters.

Yang, W., Lin, Y., Xue, H., & Wang, J. (2025). Research on Stock Market Sentiment Analysis and Prediction Method Based on Convolutional Neural Network.

Ji, F., Zheng, X., Xue, H., & Wang, J. (2025). A Study on the Application of Artificial Intelligence in Personalized Go-to-Market Strategy in Retail Industry.

Yang, J., Tang, Y., Li, Y., Zhang, L., & Zhang, H. (2025). Cross-Asset Risk Management: Integrating LLMs for Real-Time Monitoring of Equity, Fixed Income, and Currency Markets. arXiv preprint arXiv:2504.04292.

Peng, Y., Zhang, G., & Pang, H. (2025). Exploring the effects of IoT-enhanced exercise and cognitive training on executive function in middle-aged adults. Alexandria Engineering Journal, 120, 106-115.

Yang, Jie, et al. "Dynamic Hedging Strategies in Derivatives Markets with LLM-Driven Sentiment and News Analytics." arXiv preprint arXiv:2504.04295 (2025).

Yuan, J. (2025). Self-Supervised Multimodal Learning for Tumor Classification in Chest Radiography. Authorea Preprints.

Wang, J., Yuan, J., Liu, J., & Evans, L. (2025). Simple Legal Compliance: Automating Regulatory Audits with Explainable LLMs.

Published

2025-05-08

How to Cite

Sun, X., & Zhou, X. (2025). Analysis of Computer Information Security and Protection Strategies in the Era of Artificial Intelligence. Journal of Artificial Intelligence and Information, 2, 166–170. Retrieved from https://woodyinternational.com/index.php/jaii/article/view/227