A cyberspace cartography data system framework and engineering practical methods for cross-domain joint information sharing
钟晓睿,王倩,陈魏红
Research on two-stage IoT asset identification model
权晓文1,2,汪连连2,韩卫东2,任高峰2,杨家海1
Research on fuzzing techniques for UEFI firmware Double-fetch race condition vulnerability
尹嘉伟1,2,史记1,张禹1,戴戈1,王琛1,湛蓝蓝1
Robust defense mechanisms in federated learning: a study based on NMSS and LoRA
伏欣国1,王龙1,2,刘丽泽3, 王雷4,赵建坤1
Cyber security intelligent detection technology under massive data
徐光亮,宿兴华,赵斯昂
Imbalance risks of information ecological order in the era of generative artificial intelligence and governance scheme
王文玉,代金亮
Subpixel checkerboard corner detection for camera calibration
陈泽勇1,吴丽君1,李乙2
Conception and practice of geographic information element fusion governance based on the data middle platform
文娜1,邓一杰2,杨帆1,刘贺1,徐莹2
The governance approach to data classification, grading, authorization, and right confirmation——based on domestic and international data management practices
许娟
The logical transformation and rule development of copyright protection in the Metaverse environment
胡浩翔1,吕昊然2
The dilemma and outlet of consent rules in medical artificial intelligence field
杨正杰,邓佳琳
Research on sensitive information detection in Tibetan network
吴瑜,严李强,徐梓恒,卓玛央金
The principle of risk mitigation in judicial automated decision-making and the path of algorithmic explainability
陈镜霖
The application of generative artificial intelligence in interrogation——foundation, attempts, risks, countermeasure and suggestions
马郅博
Research on cross border tax avoidance and anti tax avoidance rules in the digital economy
张雯,张弛
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。