Retraction

Network Security and Ideological Security Based on Wireless Communication and Big Data Analysis

Paper Information

Record ID:
46321
Author(s):
Publication Date:
January 31, 2022
Retraction Date:
July 26, 2023 (2.3 years years ago)
Article Type:
Publisher:
Hindawi
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed

Citations (18)

18
Total Citations
10
Post-Retraction
(55.6%)
7
Pre-Retraction
1
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
9 Within 1 year
0 After 2+ years
471 Days since retraction (latest)
Public security of network big data from the perspective of entrepreneurship
Xiaoyue Zhang, Xing Cui
Journal of Computational Methods in Sciences and Engineering
Published: Nov 2024
471 days after retraction
Research on Situational Awareness of Network Security Based on Machine Learning
Hui Duan
Unknown Journal
Published: Jun 2024
322 days after retraction
Optimization of Network Security Intelligent Early Warning System Based on Image Matching Technology of Partial Differential Equation
Huan Wang, Xin Li
Journal of Cyber Security and Mobility Open Access
Published: Apr 2024
258 days after retraction
Exploration on Heterogeneous Network Security Monitoring Algorithm Based on Big data Intelligent Information Technology
Xiaomeng Duan, Yun Zhou, Jiabin Guan
Unknown Journal
Published: Dec 2023
1 citation
149 days after retraction
A linear discriminant analysis-based algorithm for identifying anomalous traffic in large-scale networks
Qiubing Wu, Xiaofeng Zhao
Applied Mathematics and Nonlinear Sciences Open Access
Published: Nov 2023
2 citations
115 days after retraction
Model Construction and Analysis of Deep Learning-based Cybersecurity Awareness Enhancement for College Students
Chengli Song
Applied Mathematics and Nonlinear Sciences Open Access
Published: Nov 2023
2 citations
99 days after retraction
The effective path of ideological governance of university cyberspace in the context of big data
Fengbiao Shang
Applied Mathematics and Nonlinear Sciences Open Access
Published: Oct 2023
90 days after retraction
Research on the design of computer network security defense system applying cloud computing technology
Jian Wang
Applied Mathematics and Nonlinear Sciences Open Access
Published: Oct 2023
87 days after retraction
Cloud Native Network Security Architecture Strategy under Zero Trust Scenario
Kun Che, Shuo Sheng
2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC)
Published: Sep 2023
3 citations
51 days after retraction
Retracted: Network Security and Ideological Security Based on Wireless Communication and Big Data Analysis
Wireless Communications and Mobile Computing
Wireless Communications and Mobile Computing Open Access
Published: Jul 2023
1 citation
Same day as retraction
A Radio Modulation Data Augmentation Method Based on Improved CGAN
Xiaoyu Dong, Jin Li, Qifan Guo et al. (5 authors)
2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT)
Published: Jul 2023
5 days before retraction
Research on university laboratory network security based on Cloud Computing
Dan Li
Applied Mathematics and Nonlinear Sciences Open Access
Published: Jun 2023
54 days before retraction
Simulation research on music feature recognition based on mobile big data and smart sensors
An Wen
Applied Mathematics and Nonlinear Sciences Open Access
Published: Apr 2023
107 days before retraction
Challenges and Solutions for Network Security in the Information Age
Wenjie Wang, Dongning Jia, Jiali Xu et al. (4 authors)
Unknown Journal
Published: Apr 2023
2 citations
116 days before retraction
Deconstruction of the Innovation Path of Digital Transformation Based on Network Big Data Security in the Context of Smart City
Chen Tang, Pengyu Chen, Guang Chen
Security and Communication Networks Open Access
Published: Oct 2022
1 citation
288 days before retraction
Software Development Data Analysis and Processing under the Internet of Things Monitoring System
Junru Li, Lijuan Zhang, Xiaoqing Tang
Journal of Control Science and Engineering Open Access
Published: Oct 2022
2 citations
289 days before retraction
Application of nonlinear recursion equation in network security risk detection
Chunqiu Li
Nonlinear Engineering Open Access
Published: Jan 2022
571 days before retraction
Quick Stats
Total Citations: 18
Years Since Retraction: 2.3 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
An intrusion identification and prevention for cloud comput…
Optik - International Journal for Light and Electron Optics • 63 citations
Incomplete big data imputation mining algorithm based on BP…
Journal of Intelligent & Fuzzy Systems • 20 citations
Application of Apriori and FP-growth algorithms in soft exa…
Journal of Intelligent & Fuzzy Systems • 10 citations
A negative selection algorithm with human-in-the-loop for a…
Journal of Intelligent & Fuzzy Systems • 0 citations
Complex smoke removal in image: Integrating frequency learn…
Journal of Intelligent & Fuzzy Systems • 0 citations