Research on intrusion detection method based on residual network and deep learning
李安娜,宗学军,何戡,连莲
Research on reverse method of industrial control protocol for fuzz testing
刘俐媛,霍朝宾,贺敏超
Intelligent monitoring platform for hazardous waste and solid waste based on fully autonomous blockchain
王俊,洪晟,徐进
Guangdong-Hong Kong-Macao Greater Bay Area difficulties and solutions of secure and orderly cross-border flow of data elements
韩晋雷
Research and application practice of industrial energy management and control in low-carbon
张晓慧,洪晟,黄柯茗,张亚辉
Experience and enlightenment of reusing data in the European Union data governance
唐鸿宇
Research on algorithm governance in extreme situations of autonomous driving
韦欣荃
Ananalysis of the lawsuit efficiency of asynchronous trial pattern: an empirical study based on Hangzhou Internet court
王立源
Prediction of public opinion popularity inemergencies based on ARIMA and aproved LSTM
许露萌
A binary code similarity analysis method based on code embedding
熊敏,薛吟兴,徐云
Autonomous obstacle avoidance for mobile robots based on deep reinforcement learning and social force model
李恒,刘轻尘,马麒超
Adversarial recommendation model based on user-specific space
于晓明,周淦,刘志春
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。