Stack overflow detection method based on operating system behavior measurement
王俊卿1,邬江1,黄永洪2,祝林1
Research on security dissemination method of facial images based on differential privacy
贺春禄1,唐琪2
Information network security improvement strategy based on fusion data encryption technology
张恒,刘戈威,黄锐
A video prediction method based on edge enhancement and multi-scale spatio-temporal reorganisation
吴孔贤,郑明魁
Research on the application of LSTM and Transformer fusion model in time series prediction
王首晨1,王利民2
Hybrid-field channel estimation for extreme large scale massive MIMO systems in plateau regions
张钧鑫1,2,彭秋云1,2,张雨晨1,2,黄欢1,2,杨君楠1,2,姜军1,2
An OFDM radiation source individual identification combining dual thresholding and WSN
刘高辉, 郑文文
A multi-category bundling recommendation algorithm based on the improved FP-growth algorithm
李雄清1,2,李永1,2,王骏飞1,2,臧凌1,2,刘德志1,3, 卞宇轩1,3,柴阅林1,3,李卓潇 1,3,刘云韬1,3
Evolution and normative solution of the application of data exit security assessment system under the rule of "data exemption"
白佳宁
Exploration and practice of meteorological data security protection system construction
蒲晓虎1,2 ,何奇1,2,钟美1,2
Data governance technical process for machine learning modeling
李彦泽1,郭超2,孙旭明2,母东杰2
Research on enterprise data compliance guidelines in the data factor market
程广明1,赵增振2,孔德智1
Risk assessment of public data authorization operation and cooperative governance
关佳1,黄佳琦2
Research on the construction of personal data trust system
逯达1,2
Research on the civil and criminal liability boundary mechanism of "traffic hijacking"
刘洋1,刘舒婷2
Addressing the challenges of establishing causation in personal information tort under automated decision-making algorithms
姚朱沁
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。