Re-identification risk assessment of de-identified datasets based on information entropy
陈 磊1,2,薛见新1,2,张润滋1,2,刘文懋1
Research on trusted university smart library based on blockchain
杜 兰,陈琳琳,张 丽,田 越
Secure sharing technology of logistics value chain data based on blockchain
龙 萍1,邢 镔2,3,胡小林2,朱林全2
Discussion on technical vulnerability management based on information security management system
魏为民1,张运琴1,翟亚红2
Research advances on lightweight stream cipher
王明兴1,2,苗三立1,朱明佳1
Real-time tracking of UAV dynamic target based on stereo vision
唐 凯,张海涛,郑建杰,孔维迪
Pointer meter reading recognition by deep regression
彭昆福1,王子磊1,王 磊2,顾 杨2
Video flame recognition method based on deep learning
蔡春兵,吴翠平,徐鲲鹏
Research on improvement test method of Cassegrain antanna tracking rate
冯国兵,关 涛,许轶楠
A densely connected pedestrian detection algorithm based on the combination of SSD and FRN
冯婷婷,葛华勇,孙家慧
Design and implementation of multi-eye ultra-high-definition airport video stitching system
方诤言,陈贤富
A telemetry data prediction method of environmental control and life support system based on time series analysis
潘点飞1,胡 伟1,周文兴1,张慧颖2,唐 斌1,罗亚斌1,郑为阁1
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。