Anti-monopoly law regulation path of algorithmic price discrimination
王聚兴,李晗
The balance between data protection and utilization inspired by the concept of data trust
杨帆
Protection mechanism of the European Court of Human Rights on data privacy
管朝辉
Data security and utilization compliance path under the federated learning framework
孙绮雯
Review and improvement of informed consent rules in the context of the implementation of Personal Information Protection Law
罗陈鑫
Legal expression of "separation of three rights" in data
曹新舒
Exploration of "1+1+N" urban data operation mode
赵将,陈丹
Protection of consumer personal information rights and interests on Internet platforms under the antimonopoly law
孙梦如
Design and implementation of virtual-real interconnection platform with lightweight security isolation
贾星威,田晓娜,张宏斌,刘楚涵,石春竹,崔轲
Exploration of the integration application of IAST in DevOps for the financial industry
朱嶷东,黄施宇,薛质,王洪涛,刘宏,李文清
Research on command obfuscation bypass detection based on random forest algorithm
戚臻彦,孙永清
A millimeter-wave radar human fall detection algorithm based on TsFreshStacking
李牧,王昭,骆宇
Few-shot image data augmentation based on generative adversarial networks
杨鹏坤,李金龙,郝润来
Optical communication signal detection for on-off key modulation of opticalcommunication signal across turbulent channels based on SVM
李楚妤,王艺敏,徐智勇,汪井源,李建华,赵继勇
Beidou multi-star positioning method based on particle swarm optimization
李浩,郑睿
Research on outpatient volume prediction model based on the combination of EMD and ELM
樊冲
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。