Research and application of federated learning in the field of financial data security
张海涛
Research on security verification technology based on face recognition
毛伊林
Research on electric power enterprise flow data analysis based on Canopy-Kmeans algorithm
黄冠杰
A black-box adversarial attack method based on local average finite difference
宗启灼,徐茹枝,年家呈
A decentralized domain name service localization model
张久发,黄 兵,许彦彬,柴处处,郝 娇
Analysis and prospect of the application of industrial control compiling tools
陈 海1,2,郭肖旺1,左 娇3,原崇蛟1
Research on the development route of industrial Internet technology in China
方 芳,陆海婧
Identification and restoration of transformed voice by fusing CNN and Transformer encoder
魏春雨,孙 蒙,刘 伟,张星昱
Unsupervised image super-resolution algorithm based on Generative Adversarial Network
赵志博,滕奇志,任 超,何小海,翟 森
A class activation mapping algorithm for CNN
杨继增,关胜晓
Research on the real-time monitoring system for the cable surface defects based on the photoelectric detection technology
刘秀婷
Design and optimization of regenerative braking strategy for heavy-duty hybrid electrical vehicles
薛金红,涂群章,邵发明,潘 明
Research on the prediction and early warning model of student achievement based on heterogeneous information network
徐小玉
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。