Create a secure and trusted financial data space based on data elements and data vaults
韩光,周崇毅,郝东林,刘伟
Financial data security: strategies and practices for responding to the challenges of emerging technology
张杨军,杨萍
Deepfake detection based on 3D face data augmentation
王昊冉,杨敏敏,王泽源,白亮,于天元,郭延明
Risk prediction of the industrial chain of listed enterprises based on knowledge graph technology
董士豪,郑朗,王特,于晓娟,王耀君
Study onjudicial regulation of unfair competition in business data
许林波,余佳璇
Data sovereignty,single market and common space: the EU strategy for data flows and its mirroring
景然
Explanatory analysis on judicial implementation of individuals′ rights in personal information processing activities
谭昱琪
The proposition of author′s "data control rights" in the application of AI generated content
任庭汉
Copyright infringement patterns and risk management in the context of generative AI
赵宏伟,茹克娅·霍加
Research on the standardization in key domain technologies of artificial intelligence in China
朱肖曼,申志伟,时文丰,范晶,李春光,于寅虎,郭烁
Hierarchical access control method for blockchain-based data exchange
赵越,张玉健,孙雨虹,,蒋国权
A highly reliable blockchain-based covert communication model
李美鹏,郭兆中,李宴明,赵誉华,张鹏
PSO-ELM modeling of SCR denitrification system of coal-fired units based on mutual information variable selection
张瑾,姜浩,金秀章
Research on the construction path and service mode of SMT industry cloud platform
杨松柏,娄照辉,朱易顺,彭东,秦杰
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。