Design and implementation of binary program vulnerability detection
罗治祥1,向栖2,李乐言1,3
Binary code similarity detection via attention mechanism and Child-Sum Tree-LSTM
李涛,王金双
Data service sharing technology based on edge caching
任德旺1,2,周俊鹏1,2,倪鑫1,2,李丽娜1,2,李亚晖1,2,李运喜1,2
Research on false information detection based on event representation
刘玉婷1,2,3,丁鲲1,3,刘茗1,3
A scalability optimization algorithm for big data storage architecture based on Kalman algorithm
韩镇阳,张磊,任冬
Prediction correction of western climate model based on machine learning algorithm
杨理智,张栌丹,王俊锋,张帅,严渝昇
Underwater acoustic signal recognition method based on deep convolutional network and convolutional denoising autoencoder
曹琳,彭圆,牟林,孙悦,徐剑秋
Understand and improve the personal information protection certification system from the perspective of the whole certification process
聂磊磊
Reflection and reconstruction of the "Informed Consent" rule in network privacy policy
陈黎明
Design of national standard for important data security
陈磊1,彭理云2,单博深3,左晓栋3
The challenge of Antitrust Law in the AI era: the competitive threat of algorithmic collusion and rule improvement
刘奕麟
The hierarchical sequence, unfolding dimensions, and risk prevention of contract automation
唐子晗
The realization path of personal information deletion right in anti telecom network fraud
朱园伟
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。