Super-resolution reconstruction of Raw core image
黄帅坤,陈洪刚,卿粼波,郝传铭
Survey of research on small and micro bionic flapping wing aircraft
徐韦佳1,姚 奎1,宋阿羚1,施 雯2,侯 煜1
Mesh parameterization based on convolutional mesh autoencoders
高 晨
New hierarchical clustering algorithm based on intersection
李青旭,陈天鹰,胡 波
Knowledge base error detection with relation sensitive embedding
缪 琦,杨昕悦
Research advances on cube attack
王明兴1,2,朱玉倩1,苗三立1
Discussion on the construction of information system security integrated service ability
翟亚红1,吴 治1,2,段静辉1,彭琳赓1
Research on network security solution for petroleum industrial control system
王 晔,靳方略,吕铭心
Research on Internet of Things intrusion detection by optimizing SVM using Grey Wolf Optimization algorithm
张金霜1,梁树杰1,左敬龙2
A method of SOC estimation based on UKF
官洪运,张抒艺,井倩倩,王亚青,缪新苗
Research on Modbus_TCP communication anomaly detection method based on machine learning
陈鑫龙1,陈志翔1,2,周小方2,3
Design of health status analysis method for brick pressing machine based on cloud platform
李晓昌1,徐哲壮1,谢仁栩1,王 毅1,刘 兴1,王宏飞1,夏玉雄2
Research on pipeline defect classification based on sparse modeling and SVM
郑 林1,张红星2,句海洋3,4
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。