Group key exchange protocols from supersingular isogenies
樊雪君1,王 龙1,徐 秀2,宋宁宁1,范 晶1,王 怡1
Research on data governance and technology of intelligent logistics
房殿军1,2,黄一丁1,蒋红琰1,2,4,洪 晟3,郑卓远1
Research on software configuration vulnerability analysis technology based on knowledge graph
张慕榕,张 尼,许凤凯,崔 轲,魏利卓,邹志博
Research and practice of active defense technology based on actual combat for cyberspace of group companies
姚 卓
Attack effect evaluation algorithm based on improved VIKOR
宿振宇,卢 凯
A lightweight super-resolution algorithm based on multi-level feature extraction
竺可沁1,2,林珊玲2,3,林志贤1,2,3,郭太良1,2
Research of matching key points of multi-human body based on improved Hungarian algorithm
邬春学,贺欣欣
Automatic music composition based on multi-Transformer cooperation
王嵩超,李金龙
Analysis of adversarial examples from frequency domain
丁 烨1,王 杰1,宛 齐1,廖 清2
Image super-resolution reconstruction algorithm for vision measurement
王亚金,吴丽君,陈志聪,郑 巧,程树英,林培杰
Bipolar disorder detection in videos by integrating attention mechanism based on CNN-LSTM
穆家宝
Utonomous decision making of UAV cluster with multi-agent deep reinforcement learning
刘志飞,曹 雷,赖 俊,陈希亮
Design and implementation of main control unit for nuclear-level instrument control system based on domestic chips
马朝阳,王 勇,程 康
Discussion on the path of clean energy development in Fujian province based on “carbon peak and carbon neutralization” goal
王秋洪
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。