• Login
  • Register
  • Search

Research on Curriculum Reform of Machine Learning and Artificial Intelligence under the background of Emerging Engineering Education

Quanfu Wang, Qi Ni, Huanhui Liang, Xuanjiao Lyu, Wenjia Guo

Abstract


In the context of Emerging Engineering Education, ‘Machine Learning and artificial Intelligence’, is one of pivot components in studies in higher education reforms. However, the theoretical knowledge of Machine Learning and artificial Intelligence cybersecurity is obscure and complex, rendering it challenging for students to comprehend. Even, practical case studies are scarce, and students demonstrate a lack of interest and motivation to the course. To address these issues, this paper proposes a teaching method, which incorporates an image recognition engine bypass experiment, to augment practical case studies and enhance teaching efficacy. The course feedback indicates the method practically deepening students’ understanding of course content and significantly improving faculty quality in educational reform efforts.

Keywords


Emerging Engineering Education; Studies In Curriculum Reform; Machine Learning; Artificial Intelligence; Teaching Quality

Full Text:

PDF

Included Database


References


[1] Ge neral Offi ce of the Ministry of Education. Notice on organizing the implementation of the action plan for empowering teachers through digitalization [EB/OL]. 2025 Jul 2. Retrieved from: http://www.moe.gov.cn/srcsite/A10/s7034/202507/t20250704_1196586.html.

[2] Ki ssinger H, et al. The Age of artificial Intelligence and the Future of Humanity. Hu Liping et al., translators. Beijing: CITIC Press; 2023. p. 12.

[3] Zh ang H. How DeepSeek-R1 was created? Journal of Shenzhen University Science and Engineering 2025; 42(2): 226–232.

[4] El man JL. Finding structure in time. Cognitive Science 1990; 14(2): 179–211. https://doi.org/10.1207/s15516709cog1402_1.

[5] Le Cun Y, Bottou L, Bengio Y, et al. Gradient-based learning applied to document recognition. Proceedings of the IEEE 1998; 86(11): 2278–2324. https://doi.org/10.1109/5.726791.

[6] Hi nton GE, Salakhutdinov RR. Reducing the dimensionality of data with neural networks. Science 2006; 313(5786): 504–507. https://doi.org/10.1126/science.1127647.

[7] Wa ng Z, Wang X, et al. A survey on adversarial example attacks for computer vision systems. Journal of Computer Research and Development 2023; 46(2): 436–468.

[8] Go odfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. 2014.

[9] Va swani A, Shazeer N, Parmar N, et al. Attention is all you need, 7th ed. arXiv:1706.03762v7 [cs.CV]. 2017. https://doi.org/10.48550/arXiv.1706.03762.

[10] D osovitskiy A, Beyer L, Kolesnikov A, et al. An image is worth 16x16 words: Transformers for image recognition at scale. 2nded. arXiv preprint arXiv:2010.11929 [cs.CV]. 2020. https://doi.org/10.48550/arXiv.2010.11929.

[11] R adford A, Kim JW, Hallacy C, et al. Learning transferable visual models from natural language supervision. arXiv preprint arXiv:2103.00020 [cs.CV]. 2021. https://doi.org/10.48550/arXiv.2103.00020.




DOI: http://dx.doi.org/10.18686/ahe.v9i5.14264

Refbacks