A survey on covert communicationbased access control enhancement technology
张宏,郭云伟
Data transaction supervision concept and institutional system construction
何卿豪
Research on data security in China-US stock audit cooperation
车志远,左晓栋
“Personal data” should be regarded as a legal concept
丁梦雨,王偲
The legal regulation dilemma and countermeasures of data unfair competition
王文韫
The construction of data law system in the perspective of production factors
彭家阔
Privacy-preserving collaborative learning technology for classification
黎兰兰,张信明
Label-based data-free membership inference attack
杨盼盼,张信明
Transformer and semantic enhancement for crowd counting
何晴,杨倩倩,彭思凡,殷保群
An exploration on the highquality development of smart campuses
张红卓,张永兵,郭建明
Modeling and application of corporation R&D project value evaluation
史双,梁平
Individual recognition of communication radiation source based on depth adaptive wavelet network
刘高辉,于文涛
Systematic reflections and future perspectives on computational law science
阙梓冰
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。