Study on the improvement of legislation for development and utilization of data resources
宋姝媛,范国浩,谭天怡,魏伟,何轶
The regulatory dilemma and relief of Big Data Price Discrimination in the perspective of law and economics
雷洁
Computationalism: the realistic ancestry of legal quantitative research in China
张芷维,马佳羽
Practical inspection and theoretical perfection of personal information reproduction right
郭小伟
Design and implementation of hmomorphic ecryption transformer for privacy-preserving machine learning
钟志威
Design and implementation of medical data access control system based on SM2 and CP-ABE
祁嘉琪,莫欣岳,周永恒,李欢,殷欣欣
Identification of abnormal nodes in network communication based on graph theory algorithm
桂丹萍,费扬
Intrusion detection based on meta-learning with multi-head attention temporal convolution
王明
Research on distributed consistency scheme for network range applications
秦媛媛,田晓娜,刘金
Research and application of CLI vulnerability mining by fuzz testing
樊志强1,王洪宇1,刘日昇2
Research on occlusion removal method based on semi global matching
邢毓华,杨广福
Quantum random number distribution and verification scheme with blockchain integration
党仁,周虎,孙羽
A scalable high precision and reliable IO timing sequence testing method
苏平,高飞,刘凯,张云飞,李兰兰
Design of outlier detection model for multidimensional data
马勇,杨敏,朱琳
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。