Risks and insights of EU data portability in the era of big data
吕思祺
System construction and legal innovation of algorithm audit for AI generated content
王兆毓
Collaborative research on algorithm governance policies and scientific research themes in China
张涛,王瀚功,崔文波
On artificial intelligenceassisted criminal justice decisionmaking
李容佳
The dual restriction model of the right to erasure in China
马瑞聪
A new preprocessing method for vulnerability analysis based on formal concept analysis
王绍杰,祁斌,万佳蓉
Building and applying a data valuation assessment model of cyberspace surveying assets
姚旺君,郑儿,刘红,宋栋,苏马婧
Research on IoT terminal security protection method based on multidimensional feature fusion and verification
吴飞龙,郑刘潇,徐墨,锁志海,李虎群
Traffic flow prediction based on improved long shortterm memory neural network
丁梓琼,汤广李,张波涛,卢自宝
Domain generalization model in image classification based on causality and feature alignment
明水根,张洪
Research on integrated adversarial defense model based on image noise reduction
薛晨浩,杜金浩,刘泳锐,杨婧
Bad information identification technology based on TextCNNBert fusion model
裴卓雄,杨敏,杨婧
Research on the system of datadriven industrial metaverse
王绍帅,肖琳,洪晟,金冬
Accelerator node clock synchronization system based on White Rabbit time synchronization protocol
苏畅,梁昊
Research on cyber security emergency drill mode in the nuclear power industry
李实,李若兰,王颐硕,万佳蓉,林显盛
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。