{"id":8666,"date":"2019-05-20T03:45:33","date_gmt":"2019-05-20T03:45:33","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8666"},"modified":"2026-04-17T18:07:53","modified_gmt":"2026-04-17T18:07:53","slug":"practices-of-chinas-internet-giants-in-machine-learning","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/practices-of-chinas-internet-giants-in-machine-learning\/","title":{"rendered":"Practices of China&#8217;s Internet Giants in Machine Learning"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<p>At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started his presentation on application of statistical learning to intrusion detection in the context of massive big data with an account of challenges facing Internet giants in security data analysis, and then shared his constructive ideas on this topic.<\/p>\n<p>For starters, Tao Zhou pointed out that in security defense and attack, the biggest advantage defenders have lies in massive data of various types.<\/p>\n<p>However, data is a double-edged sword. How to put massive data into good use is a common question baffling defenders in the era of big data.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8667\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"547\" height=\"280\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-1.jpg 547w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-1-300x154.jpg 300w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/a><\/p>\n<p>Massive data is far beyond the human capacity to process. Therefore, it is high time for computers to step in, relieving people of the burden of complex computation with various algorithm models, as represented by machine learning and statistical modeling.<\/p>\n<p>Tao Zhou thinks that the most distinctive difference between the two models is that machine learning relies on training data (preferably labeled data), but statistical modeling relies on human&#8217;s understanding of data traits.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8668\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"244\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2-300x132.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a> <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8669\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"283\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-3.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-3-300x153.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>Machine learning, when applied as the only approach to intrusion detection, would encounter a lot of problems because machine learning is good at detecting &#8220;normal patterns&#8221;, but intrusion is abnormal behavior. Moreover, for supervised learning, machine learning algorithms need large amounts of labeled data, which are hard to obtain. For unsupervised learning, currently the accuracy and recall rate of almost all related algorithms cannot support security operations. Finally, the biggest problem of machine learning is that the classification model built on data training is usually too complex to interpret. The simple answer of &#8220;Yes&#8221; or &#8220;No&#8221; is insufficient for security analysis.<\/p>\n<p>Therefore, when applying machine learning to intrusion detection, we usually need to specify certain scenarios, typically those where labeled data is easy to obtain, like spam detection, DGA domain detection, and web crawler detection.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8670\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"545\" height=\"269\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-4.jpg 545w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-4-300x148.jpg 300w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p>Tao Zhou then went further to illustrate the common process of applying statistical modeling to intrusion data analysis. First, he pointed out that, effective attacks always take a long process, generally spanning a long time period with multiple stages and originated from multiple nodes.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8671\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"545\" height=\"269\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-5.jpg 545w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-5-300x148.jpg 300w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p>Security data analysis consists of three steps:\n<\/p>\n<ul>\n<li>Data preprocessing<\/li>\n<\/ul>\n<p>Remove interference of normal data.<\/p>\n<ul>\n<li>Attack modeling<\/li>\n<\/ul>\n<p>Build an attack model that can identify suspicious behavior.<\/p>\n<ul>\n<li>Alarm correlation<\/li>\n<\/ul>\n<p>Prioritize alarms based on the risk level.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8672\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"549\" height=\"184\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-6.jpg 549w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-6-300x101.jpg 300w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/a><\/p>\n<p>During data preprocessing, data of the most frequently repeated behavior, which is always normal, should be filtered out. In this step, the recall rate is the most important indicator as it reflects the capability of discerning normal data and the aim of removing as much normal data as possible.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8673\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"550\" height=\"289\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-7.jpg 550w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-7-300x158.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>During attack modeling, a model should be built on preprocessed data to reflect a specific type of attack. The same type of attacks tends to have common features, which can be obtained from data of abnormal behavior. In this step, precision is the most important indicator, reflecting an emphasis on the accuracy of determination of attack patterns.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8674\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"550\" height=\"299\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-8.jpg 550w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-8-300x163.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>The kill chain-based model is a good option for modeling in this step.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8675\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"550\" height=\"282\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-9.jpg 550w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-9-300x154.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>Despite being superior to machine learning that is applied as the only approach to intrusion detection, statistical modeling has its own deficiency as it follows an important principle called &#8220;Occam&#8217;s razor&#8221;, which, simply put, means that parameters should be as few as possible in a model. This causes the model to be less generalized. Besides, in certain scenarios, this may also add to the interference to intrusion detection, as illustrated by Tao Zhu in the following figure.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8676\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"550\" height=\"219\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-10.jpg 550w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-10-300x119.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>To make up for this deficiency, Tao Zhu proposed an optimization method. Specifically, build a directed graph of attacks for post-incident risk assessment. Then prioritize incidents according to their risk level and confidence level. The risk is quantified based on such factors as the attack phase, network distribution of assets, and the risk and accuracy of alarms.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8677\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-11.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"568\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-11.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-11-293x300.jpg 293w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>After the preceding three steps are complete, alarm data is cut down to a maintainable scale, making it possible to conduct effective and efficient security analysis in the context of big data.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8678\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-12.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"264\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-12.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-12-300x143.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p><strong>Sum-up<\/strong><\/p>\n<p>In intrusion data analysis, it is a must to interpret analysis results. Traditional machine learning algorithms built upon training data, however, are usually &#8220;black boxes&#8221; that deny interpretation. For this reason, many scholars begin to study the explainable AI (XAI, or interpretable AI), with a purpose of delivering interpretable analysis results, whether using the statistical modeling (for example, topic modeling frequently mentioned at this year&#8217;s RSA conference) or the knowledge graph (semantic network) technology (such as Watson from IBM). Nowadays, AI technologies, including machine learning, have been widely applied in numerous scenarios in the security domain. How to continuously optimize solutions and resolve security risks and issues arising during the actual application of such solutions will be a long-term research project.<\/p>\n<p>The threat modeling research team at NSFOCUS is now working on construction of a threat knowledge graph that contains dozens of threat-related databases covering threat actors, attack patterns, attack targets, and the like by using ontology modeling and referring to the international frameworks or standards such as CAPEC and STIX. The knowledge graph keeps expanding based on knowledge obtained from various structured and unstructured data sources to provide context for better understanding of security threat events. It visualizes in more detail security scenarios and supports reasoning based on threat knowledge as well as providing applications such as attack group clustering and profiling.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started his presentation on application of statistical learning to intrusion detection in the context of massive big data with an account of challenges facing Internet giants in security data analysis, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8668,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[20],"tags":[503],"class_list":["post-8666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-machine-learning"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Practices of China&#039;s Internet Giants in Machine Learning - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Practices of China&#039;s Internet Giants in Machine Learning - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-20T03:45:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Practices of China&#039;s Internet Giants in Machine Learning - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Practices of China&#8217;s Internet Giants in Machine Learning\",\"datePublished\":\"2019-05-20T03:45:33+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/\"},\"wordCount\":919,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/0520-2.jpg\",\"keywords\":[\"Machine Learning\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/\",\"name\":\"Practices of China's Internet Giants in Machine Learning - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/0520-2.jpg\",\"datePublished\":\"2019-05-20T03:45:33+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/0520-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/0520-2.jpg\",\"width\":554,\"height\":244,\"caption\":\"Network administrator and security operator discussing capabilities.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/practices-of-chinas-internet-giants-in-machine-learning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Practices of China&#8217;s Internet Giants in Machine Learning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Practices of China's Internet Giants in Machine Learning - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Practices of China's Internet Giants in Machine Learning - NSFOCUS","og_description":"At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started","og_url":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/","og_site_name":"NSFOCUS","article_published_time":"2019-05-20T03:45:33+00:00","article_modified_time":"2026-04-17T18:07:53+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Practices of China's Internet Giants in Machine Learning - NSFOCUS","twitter_description":"At RSA Conference 2019, Tao Zhou, a senior staff algorithm engineer from Alibaba Security, Alibaba Group, as one of only a few Chinese speakers, started","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Practices of China&#8217;s Internet Giants in Machine Learning","datePublished":"2019-05-20T03:45:33+00:00","dateModified":"2026-04-17T18:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/"},"wordCount":919,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","keywords":["Machine Learning"],"articleSection":["Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/","url":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/","name":"Practices of China's Internet Giants in Machine Learning - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","datePublished":"2019-05-20T03:45:33+00:00","dateModified":"2026-04-17T18:07:53+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/0520-2.jpg","width":554,"height":244,"caption":"Network administrator and security operator discussing capabilities."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/practices-of-chinas-internet-giants-in-machine-learning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Practices of China&#8217;s Internet Giants in Machine Learning"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8666"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8668"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}