Advances in multivariate public-key cryptosystem
韩益亮
Revocable hierarchical attribute-based encryption scheme from RLWE
郭凯阳1,2,韩益亮1,2,吴日铭1,2
Attack on hidden subspace quantum money
胡志泉1,2,薛立德1,2,杨 威1,2
Secure face recognition algorithm based on full homomorphic encryption
王璐瑶
A malicious PDF detection method based on feature agglomeration and convolutional neural network
俞远哲,王金双,邹 霞
FFT parallel algorithm and optimization based on Flink stream processing framework
钟旭阳1,2,徐 云1,2
A method of dissolved oxygen prediction based on CEEMDAN-LSTM combination
李 港1,幸 兴2,黄健明3,骆德汉1
Research on improvement of bias in recommendation system based on deep neural network
张天蔚
No reference super resolution image quality assessment based on multi-task learning
刘锡泽1,李志龙2,何欣泽3,范 红1
Reasearch on membership inference attack and defense in machine learning
王鹏焱
Flight altitude deployment of UAV base station based on application scenario features description
谭诗翰,金凤林,顿聪颖
Research on automatic filing system of detection report based on template matching and OCR recognition
张 辰1,陈 阳2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。