[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3687488.3687556acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccirConference Proceedingsconference-collections
research-article

Optimal design of data processing and data encryption detection and identification algorithm for engineering risk points based on machine learning

Published: 18 November 2024 Publication History

Abstract

With the increasing scale and complexity of engineering projects, engineering audit is facing increasingly severe challenges in data processing and data encryption detection and identification of risk points. The purpose of this paper is to improve the data processing efficiency and data security of risk points in engineering audit by applying machine learning(ML) technology. In data processing, by introducing ML algorithm, intelligent cleaning, quality inspection and characteristic engineering of engineering audit data are realized, thus improving the accuracy and efficiency of audit. In the aspect of data encryption detection and identification, this paper discusses the advantages of ML algorithm in the face of the limitations of traditional encryption methods, and improves the security of data through intelligent detection and identification mechanism. In order to optimize the design of related algorithms, special attention is paid to the key steps such as algorithm selection, feature engineering and parameter tuning. Through the comparative empirical research in the improved Stacking and Bayesian Network(BN) models, this paper verifies the significant advantages of the optimization design algorithm in improving the accuracy, recall, F1 value and AUC index. This not only provides a more flexible and efficient data processing tool for engineering audit, but also provides a new idea for the security guarantee in the field of data encryption.

References

[1]
Mao Jinfeng, Shi Hongxia, Cui Xinchen, Cai Yuchang, & Song Mei. (2022). Research on Audit Risk Assessment Based on stacking Integrated Machine Learning Algorithm. Computer Knowledge and Technology: Academic Exchange (018-004).
[2]
He Yimin. (2023). Analysis of Banking Based on Big Data Technology. Modern Commerce (10), 128-131.
[3]
Zhao Qinghua, Zhang Lin, Cao Qing, & Wang Shengyu. (2022). Audit Risk Analysis of National Major Projects Based on Text Mining. China Collective Economy (23), 30-32.
[4]
Chen Yuling. (2019). Risk analysis of financial audit based on information environment. Financial economy (6), 3.
[5]
Liao Zhigang, Xu Hui, Zhang Qi, & Wang Ning. (2019). Research on risk analysis of audit management of design change of small infrastructure projects based on information platform. China Management Informatization, 22(14), 2.
[6]
Su Qiang, Hou Xiaoli,&Zou Ni. (2021). Study on the prediction model of postoperative infection based on machine learning combinatorial optimization method. Data Analysis and Knowledge Discovery, 5(8), 11.
[7]
Yang Roujian, Yang Li,&Su Yanyang. (2020). Research on policy tracking audit method based on big data-taking employment policy tracking audit as an example. Audit research (4), 7.
[8]
Ren Zhihui, Sun Weihong, & Wang Yuming. (2017). Discussion on supply chain audit from the perspective of supply chain risk. Logistics Engineering and Management, 39(5), 3.
[9]
Wang Yefei. (2019). Risk study of engineering audit in colleges and universities-based on ahp method. Economist (7), 3.
[10]
Yang Xiaohong. (2019). Analysis on the application of internal audit of New Third Board Securities Company based on risk-oriented audit. Knowledge economy (21), 2.
[11]
Wu Yong, Fang Jun, Wang Shangchun, &Yu Jie. (2021). Audit application based on machine learning model: connotation, mode and risk. China Certified Public Accountant, 000(009), 34-40.
[12]
Ceng Wei. (2021). Application of machine learning in user behavior audit. Jiangxi Communication Technology (2), 3.
[13]
Kim, P., Jo, E., & Lee, Y. (2021). An efficient search algorithm for large encrypted data by homomorphic encryption. Electronics, 10(4), 484.
[14]
Loukil, F., Ghedira-Guegan, C., Boukadi, K., & Benharkat, A. N. (2021). Privacy-preserving iot data aggregation based on blockchain and homomorphic encryption. Sensors, 21(7), 2452.
[15]
Sarrafpour, B. A. S., Alkorbi, M., Jamil, N., Naeem, M. A., & Mirza, F. . (2020). Evaluating encryption algorithms for sensitive data using different storage devices. Scientific Programming, 2020(2), 1-9.

Index Terms

  1. Optimal design of data processing and data encryption detection and identification algorithm for engineering risk points based on machine learning

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCIR '24: Proceedings of the 2024 4th International Conference on Control and Intelligent Robotics
    June 2024
    399 pages
    ISBN:9798400709937
    DOI:10.1145/3687488
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 November 2024

    Check for updates

    Author Tags

    1. Engineering audit
    2. data processing
    3. encryption detection
    4. engineering risk
    5. machine learning

    Qualifiers

    • Research-article

    Conference

    ICCIR 2024

    Acceptance Rates

    Overall Acceptance Rate 131 of 239 submissions, 55%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 11
      Total Downloads
    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media