{"id":634,"date":"2022-04-06T06:31:43","date_gmt":"2022-04-06T06:31:43","guid":{"rendered":"http:\/\/aicybersecuritycenter.com\/?page_id=634"},"modified":"2022-12-12T12:53:51","modified_gmt":"2022-12-12T12:53:51","slug":"ongoing-projects","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/ongoing-projects\/","title":{"rendered":"Ongoing Projects"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"634\" class=\"elementor elementor-634\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f9da3b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f9da3b3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-151c43ed\" data-id=\"151c43ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5045340d elementor-widget elementor-widget-heading\" data-id=\"5045340d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Ongoing Projects (\u6b63\u5728\u9032\u884c\u7684\u9805\u76ee)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b77f2ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b77f2ef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-37e42727\" data-id=\"37e42727\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-28bc0fbc\" data-id=\"28bc0fbc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28b99ab elementor-widget elementor-widget-text-editor\" data-id=\"28b99ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>CCRI is continually exploring new opportunities for research in the field of Cyber security. The range of important and interrelated research areas include artificial intelligence, metaverse security, IoT security, Cloud security, fog security, IIoT security, medical IoT security, etc.<\/p><p>CCRI \u4e0d\u65b7\u63a2\u7d22\u7db2\u7d61\u5b89\u5168\u9818\u57df\u7684\u65b0\u7814\u7a76\u6a5f\u6703\u3002 \u91cd\u8981\u4e14\u76f8\u4e92\u95dc\u806f\u7684\u7814\u7a76\u9818\u57df\u5305\u62ec\u4eba\u5de5\u667a\u80fd\u3001\u865b\u64ec\u5b89\u5168\u3001\u7269\u806f\u7db2\u5b89\u5168\u3001\u96f2\u5b89\u5168\u3001\u9727\u5b89\u5168\u3001\u5de5\u696d\u7269\u806f\u7db2\u5b89\u5168\u3001\u91ab\u7642\u7269\u806f\u7db2\u5b89\u5168\u7b49\u3002<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38e6eb5 elementor-widget elementor-widget-heading\" data-id=\"38e6eb5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ongoing Projects (\u6b63\u5728\u9032\u884c\u7684\u9805\u76ee)<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab1f9e2 elementor-widget elementor-widget-text-editor\" data-id=\"ab1f9e2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li>Lightweight Authentication technique for Augmented Reality Applications<\/li><li>\u589e\u5f37\u73fe\u5be6\u61c9\u7528\u7684\u8f15\u91cf\u7d1a\u8a8d\u8b49\u6280\u8853<\/li><li>AI &amp; ML based attack detection techniques in cloud\/fog computing<\/li><li>\u96f2\/\u9727\u8a08\u7b97\u4e2d\u57fa\u65bc AI \u548c ML \u7684\u653b\u64ca\u6aa2\u6e2c\u6280\u8853<\/li><li>Blockchain-Based Security Framework for Fog Computing<\/li><li>\u57fa\u65bc\u5340\u584a\u93c8\u7684\u9727\u8a08\u7b97\u5b89\u5168\u6846\u67b6<\/li><li>A Security Mechanism for Protecting Users&#8217; Personal and Private Information Using Big Data Analytics<\/li><li>\u4f7f\u7528\u5927\u6578\u64da\u5206\u6790\u4fdd\u8b77\u7528\u6236\u500b\u4eba\u548c\u79c1\u4eba\u4fe1\u606f\u7684\u5b89\u5168\u6a5f\u5236<\/li><li>Blockchain-Based Technology to Improve Remote Patient Monitoring Mechanism in Health Care<\/li><li>\u57fa\u65bc\u5340\u584a\u93c8\u7684\u6280\u8853\u6539\u5584\u91ab\u7642\u4fdd\u5065\u4e2d\u7684\u9060\u7a0b\u60a3\u8005\u76e3\u63a7\u6a5f\u5236<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-369daf11\" data-id=\"369daf11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ongoing Projects (\u6b63\u5728\u9032\u884c\u7684\u9805\u76ee) CCRI is continually exploring new opportunities for research in the field of Cyber security. The range of important and interrelated research areas include artificial intelligence, metaverse security, IoT security, Cloud security, fog security, IIoT security, medical IoT security, etc. CCRI \u4e0d\u65b7\u63a2\u7d22\u7db2\u7d61\u5b89\u5168\u9818\u57df\u7684\u65b0\u7814\u7a76\u6a5f\u6703\u3002 \u91cd\u8981\u4e14\u76f8\u4e92\u95dc\u806f\u7684\u7814\u7a76\u9818\u57df\u5305\u62ec\u4eba\u5de5\u667a\u80fd\u3001\u865b\u64ec\u5b89\u5168\u3001\u7269\u806f\u7db2\u5b89\u5168\u3001\u96f2\u5b89\u5168\u3001\u9727\u5b89\u5168\u3001\u5de5\u696d\u7269\u806f\u7db2\u5b89\u5168\u3001\u91ab\u7642\u7269\u806f\u7db2\u5b89\u5168\u7b49\u3002 Ongoing Projects (\u6b63\u5728\u9032\u884c\u7684\u9805\u76ee) Lightweight Authentication technique for Augmented Reality Applications<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/ongoing-projects\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Ongoing Projects&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/634"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=634"}],"version-history":[{"count":13,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/634\/revisions"}],"predecessor-version":[{"id":1689,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/634\/revisions\/1689"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}