A family detection method for malicious code based on squeezed-and-excitation networks
申高宁1,2,陈志翔3,王 辉3,陈 姮1,2
An industrial intrusion detection algorithm based on variational autoencoder and three-way decisions
王 晨,张迪明,韩 斌
Research on satellite communication authentication technology based on CL-PKC
苗婷婷,刘笑凯,姬胜凯,郝克林,苏立文
Two-time scrambling mode of FPE schemes
张玉安1,王 野1,漆骏锋2,胡伯良1
Legal issues of privacy protection in Big Data technology
宋青林,洪 晟
Research on legal regulation of data and flight safety in civil UAV field
黄煦淇,洪 晟
Design and implementation of a MATLAB to high-performance C code conversion system
余泽霖1,2,徐 云1,2
Perceptual path allocation algorithm based on deep reinforcement learning in traffic scene
曹 欢
Unsupervised single target tracking algorithm based on attention mechanism
林志雄,吴丽君,陈志聪
Lightweight lane line detection based on directional consistency loss
陆智臣,吴丽君,陈志聪,林培杰,程树英
Direct high-order attention and multi-scale routing for graph neural networks
杨广乾,李金龙
Speech recognition research on emergency disposal training for subway operation positions
周 杨,钱雪军
Scheme of FSO/RF automatic request retransmission protocol based on convex optimization
邵军虎1,2,江 娜1,杜旭晓1,史魏征1
A traffic adaptive and low collision TDMA-MAC protocol in distributed VANETs
程 凯,张信明
Hyperledger fabric concurrency conflict detection method based on caching mechanism
王盛姣,董建亮,熊 航,李 京
Research on signal timing optimization based on intersection multi-dimensional state evaluation
倪 茹
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。