Research on data security governance framework of intelligent connected vehicles
宋琦1,武波2,刘永东1
Dependent differential privacy: Gaussian mechanism for correlated datasets
欧阳恒,陈洪超
Network traffic anomaly identification and detection based on genetic algorithm and LightGBM
胡锐,徐芳,熊郁峰,熊洲宇,陈敏
Research on a rapid military decision-making framework for wargame
陈健,赵建印,纪红
A lightweight image super resolution method based on a hybrid CNN-Transformer architecture
林承浩,吴丽君
Real image super resolution network for simplifying the degradation model
林旭锋,吴丽君
The rights of enterprise data holders under the new paradigm of data property rights
万美秀
The dilemma and relief of traffic hijacking offense determination ——Based on the perspective of the legal benefits of data security
许瀚文
The dilemma of discretion in administrative automation and its resolving pathways
何扬阳
Algorithm explanation rights: controversial empowerment, application logic and application mechanisms
本照清
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。