Large language model based on sentence granularity prompts for temporal knowledge Q&A approach
李志东,罗琪彬,乔思龙
Intelligent chaoqing based on large models: event key point extraction and report generation
曾文龙1,刘丹2,张超1
Copyright protection for deep learning models utilizing a black box testing framework
屈详颜1,2,于静1,2,熊刚1,2,盖珂珂3
Research on gradient optimization based backdoor identification of large language model
陈佳华1,陈宇2,曹婍3
Data security risks of generative large model and its legal governance
刘羿鸣1,林梓瀚2
TOR anonymity network traffic recognition method integrating protocol information fusion
杨刚1,姜舟1,张娇婷1,汪俊永1,王强2,3,张研1
Internet of Things security posture prediction based on ADE ABiGRU
彭兴维1,袁凌云1,2
A data security sharing and interaction framework based on privacy computing technology
张鹏1,李美鹏1,郭兆中2,刘文杰1,孙立群1
Research of data security based on cybersecurity classified protection
李尚号,王勇
High concurrency and reliable access method for massive heterogeneous data based on dynamic balancing technology
赵勋,周成胜,靳文京,刘晓曼,王桂温
Data altruism: a new concept of data governance in the EU and its implications
张艺洋
Study of the requirements, methods and strategies for intranet sensitive big data exchanging between various networks or network areas
李祺睿1,2,蒋晶晶2,张加洪2
Design and implementation of a elastic self organizing multi cluster management system
夏令明, 周俊,赵锋
Design and implementation of the 3D visualization system for target and situation
杨垚,刘永海,肖雅娟,卞泊
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。