Research on the logic and realization path of data circulation led by data subject
陆志鹏
Information pricing and trading:an application of dimensional model
李心宓1,吴 谣2,高 峰2
Research on data classification and grading and its development path
张 敏,魏 伟,谭天怡,何 轶
Research on supervising-oriented data checking mechanism: an analogical analysis perspective on production factors
张 楠1,2,周 亮1,刁 玉1
Preliminary exploration on the construction of the metaverse legal system and data governance
胡 洋,洪 晟
Research on legal regulation of the Big Data affinity
田 蕾,洪 晟
Exploration of public data authorization operation mechanism
陆志鹏
Hotspots analysis of sentiment research on Internet public opinion in China
张 杨1,廉吉庆2,张 扬1,高德毅3
A rumor propagation model in the context of recommendation
吴日铭1,韩益亮1,郭凯阳1,李永斌2
DoS attack method on Tor hidden service
杨欢乐,刘志天
A method of finding cyber security user based on network representation learning
刘向宇,燕 玮,孟星妤,侯开茂
Design and implementation of multipath security connection anti-replay attack based on FPGA
陈 明,张宏亮,邓 军,唐 文,龚 萍
Research of data sharing information system architecture based on endogenous security
李 建1,2,王 昊1,2,姜苈峰1,2,罗清林1,2,吴凡毅1,2,3
A global terrain height detection method based on elevation data
吴 琼1,孙韶杰2,于 澜1,苏 迪1
A data augmentation method for online education sentiment analysis
黄伟强1,刘 海2,梁韬文2,杨海华2
Label embedding based multimodal multi-label emotion recognition
张 超,张信明
Multi-attention convolutional network for crowd counting
杨倩倩,何 晴,彭思凡,殷保群
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。