|
[1]
|
Kohavi, R., Tang, D. and Xu, Y. (2020) Trustworthy Online Controlled Experiments: A Practical Guide to A/B Testing. Cambridge University Press. [Google Scholar] [CrossRef]
|
|
[2]
|
Cunningham, S. (2021) Causal Inference: The Mixtape. Yale University Press.
|
|
[3]
|
Chandola, V., Banerjee, A. and Kumar, V. (2009) Anomaly Detection: A Survey. ACM Computing Surveys, 41, 1-58. [Google Scholar] [CrossRef]
|
|
[4]
|
OECD (2022) OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing. [Google Scholar] [CrossRef]
|
|
[5]
|
NIST (2020) Zero Trust Architecture. NIST Special Publication 800-207.
|
|
[6]
|
European Union (2016) General Data Protection Regulation (GDPR). European Union. https://eur-lex.europa.eu/eli/reg/2016/679/oj
|
|
[7]
|
Shi, W., Cao, J., Zhang, Q., Li, Y. and Xu, L. (2016) Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3, 637-646. [Google Scholar] [CrossRef]
|
|
[8]
|
ETSI (2019) Multi-Access Edge Computing (MEC); Framework and Reference Architecture. ETSI GS MEC 003.
|
|
[9]
|
韩涛, 卜青原, 杨晓蕊. 云新闻发布平台直播流智能审核控制系统的设计与实现[J]. 广播与电视技术, 2023, 50(5): 55-58.
|
|
[10]
|
武开有. 基于人机协同的融媒内容智能审核系统探索与实践[J]. 广播与电视技术, 2025, 52(1): 41-45.
|
|
[11]
|
周辉, 魏日升. 直播电商治理的现实困境与优化路径[J]. 中国市场监管研究, 2025(10): 25-32.
|
|
[12]
|
Tang, T., Wu, Y., Wu, Y., Yu, L. and Li, Y. (2022) Videomoderator: A Risk-Aware Framework for Multimodal Video Moderation in E-commerce. IEEE Transactions on Visualization and Computer Graphics, 28, 846-856. [Google Scholar] [CrossRef] [PubMed]
|
|
[13]
|
Carbone, P., Katsifodimos, A., Ewen, S., et al. (2015) Apache Flink™: Stream and Batch Processing in a Single Engine. IEEE Data Engineering Bulletin, 38, 28-38.
|
|
[14]
|
晏青, 杜美玲. 驯顺与偏离: 社交媒体平台用户治理研究[J]. 新闻与传播研究, 2024, 31(1): 95-110, 128.
|
|
[15]
|
腾讯云. 实时音视频 内容安全审核[EB/OL]. https://cloud.tencent.com/document/product/647/77791, 2026-03-25.
|
|
[16]
|
阿里云. 直播全链路安全防护体系[EB/OL]. https://help.aliyun.com/zh/live/user-guide/security-overview/, 2026-03-25.
|
|
[17]
|
Hinton, G., Vinyals, O. and Dean, J. (2015) Distilling the Knowledge in a Neural Network. arXiv: 1503.02531.
|
|
[18]
|
Jacob, B., Kligys, S., Chen, B., Zhu, M., Tang, M., Howard, A., et al. (2018) Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, 18-23 June 2018, 2704-2713. [Google Scholar] [CrossRef]
|
|
[19]
|
Redmon, J. and Farhadi, A. (2018) YOLOv3: An Incremental Improvement. arXiv: 1804.02767.
|
|
[20]
|
邵仁荣, 刘宇昂, 张伟, 王骏. 深度学习中知识蒸馏研究综述[J]. 计算机学报, 2022, 45(8): 1638-1673.
|
|
[21]
|
Banks, J., et al. (2019) MQTT Version 5.0 Specification. OASIS Standard.
|
|
[22]
|
Iyengar, J. and Thomson, M. (2021) QUIC: A UDP-Based Multiplexed and Secure Transport. IETF RFC 9000.
|
|
[23]
|
Chen, W., Liu, Y., Wang, W., Bakker, E., Georgiou, T., Fieguth, P., Liu, L., and Lew, M. S. (2021) Deep Learning for Instance Retrieval: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, 7270-7292.
|
|
[24]
|
Graves, A., Mohamed, A. and Hinton, G. (2013) Speech Recognition with Deep Recurrent Neural Networks. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, 26-31 May 2013, 6645-6649. [Google Scholar] [CrossRef]
|
|
[25]
|
Ribeiro, M.T., Singh, S. and Guestrin, C. (2016) “Why Should I Trust You?” Explaining the Predictions of Any Classifier. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, 13-17 August 2016, 1135-1144. [Google Scholar] [CrossRef]
|
|
[26]
|
Howard, A.G., et al. (2017) MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv: 1704.04861.
|
|
[27]
|
Dwork, C. and Roth, A. (2013) The Algorithmic Foundations of Differential Privacy. Now Publishers Inc. [Google Scholar] [CrossRef]
|