Research status and prospect of quantum attacks in public-key cryptography
崔富鑫,王 辈,刘 焱,李 叶
Research report on feature screening of credit scoring based on photonic quantum computing
文 凯1,马 寅1,王 鹏2,朱德立2
Application of QNLP algorithms in financial industry
吴永飞1,2,王彦博2,周代数3,靳志伟4,陈 生2,孙 喆2,俞 淼5,杨 璇2
Research on governance and countermeasures of cross-border data flow
赵高华,姜 伟,王 普
The normalization management of Health Code: the problems and principles of personal information application
黄 蓉1,辜良烈 2,卢 武3
Research on identification of domestic commercial block cipher algorithms based on CNN
刘节威1,王 钢2,颜培志2,方一格1,荆 浩3
Research on impossible differential distinguisher for typical cryptographic structures
刘 健1,毕鑫杰2,李艳俊1,2,金 达1
Research on the construction of security protection system of power monitoring system in the era of classified security protection standard 2.0
李政达,杨 继,姜添元
Identification and research of microblog user community in emergencies based on interactive behavior
林国英,汪明艳
An improved WL graph kernel-based code clone detection method
班必奂1,2,徐 云2,3
Target detection of remote sensing image based on attention feature fusion SSD algorithm
尹法林,王天一
Research on effective iPPG signal recognition based on deep learning
陈泽辉1,熊继平1,李金红2,陈经纬1,程汉权1
Weakly supervised camouflage object detection algorithm fused with attention mechanism
杨 辉1,权冀川1,梁新宇1,郭安文1,王中伟2
Design and implementation of fertilization decision system based on Web service
陈 杰,黄诗悦,林开颜,吴军辉
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。