Research on prevention strategy of reflex amplification DDoS attack
郝帅,白翼铭,李致成, 包正晶
Remote monitoring and privacy protection method for the contacts in infectious disease
李泽琛,司广涛,孟 静
Design and application prospect of task-oriented cross-domain collaboration system
高岚岚,刘怡静,刘然,乐剑
Research on application of protocol analysis method for industrial control
董 健1,韩鹏军2
Application research of digital image processing in deformation detection of bridge structures
柳胜超,王夏黎,张 琪,赵嘉兴
Research on deepfakes detection combining traditional features and neural network
杨雨鑫1,周 欣1,2,熊淑华1,何小海1,卿粼波1
Research on the recognition of anti-counterfeiting pattern based on DeepLabv3
陈 雨1,陈桂雄1,周雄图1,2,张永爱1,2,林志贤1,2,吴朝兴1,2,郭太良1,2
Video caption algorithm based on X-Linear and semantic embedding
李亚杰,关胜晓,倪长好
Research on pollutant emission monitoring method based on power data analysis
刘忠辉1,蔡高琰2,梁炳基2,骆德汉1,何家峰1
Trajectory planning and optimization of SCARA based on laser guidance
王 锴,关胜晓
Simulation analysis of car body frontal crash based on RADIOSS
宁士翔,胡静波,庆光蔚,王小燕,王 爽
Super pixel machine vision and defect detection algorithm based on entropy rate clustering
李 锋
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。