Analysis of the trend of blockchain technology and applications ——a comparative perspective between China and U.S.
郭滕达,周代数
Application of consortium blockchain in trade finance
宫延新,宣 奇,陈志明
China welfare lottery system based on the consortium blockchain
李梦炜
Intellectual property protection service system based on blockchain
王小芳1,2,毕晓燕1,2
Design and implementation of honeynet based on honeypot for industrial control system
李政达1,周成胜2
Research on the security of Manchu rescue platform based on big data
张颢芳1,康春颖1,张 伟2
Voice disguise and its countermeasures for anti-disguise
郑琳琳1,孙 蒙1,张雄伟1,潘志欣2
Judgement and fitting method of sketch overlapping strokes based on geometric transformation
穆慧茹,郑程文
Object detection algorithm combining improved ViBe and adaptive shadow elimination
官洪运,井倩倩,王亚青,缪新苗,张抒艺
Design and simulation of digital filter cascade
崔永青1,史琳芸1,阴超波2
Research on fish recognition and detection algorithm based on deep Learning
王文成1,蒋 慧1,乔 倩1,祝捍皓2,郑 红2
Modeling of pH value of wet flue gas desulfurization slurry based on LSTM
金秀章,景 昊
Research and implementation of Modbus protocol for ultra-low power sensor
姜 飞1,童海明1,赵玉薇2,董刘同1,张 瀚3
Research on information security of urban rail transit ACLC system
周品荣
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。