Design and implementation of domain name portrait system
包正晶1,苏马婧1,康 彬2,薛继东1,刘 红1
An adversarial example generation method based on class activation map
叶启松,戴旭初
Architecture design and performance evaluation of edge gateway for industry controlling system
宋磊,黄希
A method for function-level open-source code reuse detection
张德浩1,2,徐 云1,2
Research on vehicle detection algorithm based on deep learning
苏欣欣,郭元术,李妮妮
Person re-identification incorporating appearance feature
彭玉青1,2,李 伟1,2,郭永芳1
Quantification research of convolutional neural network oriented Nor Flash
陈雅倩,黄 鲁
Efficient exploration with stochastic policy for deep reinforcement learning
杨尚彤,王子磊
Text to image generation based on single-stage GANs
胡 涛1,李金龙2
6D pose estimation based on instance segmentation and point cloud registration
侯大伟
Design of an analog multiply accumulate circuit based on NOR Flash
丁士鹏,黄 鲁
Dynamic isolation measures on complex networks based on SEIR model
汪 意,刘润然,贾春晓
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。