Fuzzing test method for industrial control protocol based on deep feature and reinforcement learning
宗学军1,2,孙俊辉1,2,何戡1,2,史洪岩1,2,连莲1,2,宁博伟2,3
Analysis and security recommendations for covert channels using the CoAP protocol
姬国珍 , 康荣保 , 田 学成 , 孙宁天 , 张 蕾
A deep Web privilege escalation vulnerability detection method based on large models
覃锦端1 , 尉雯雯2 , 王月兵1 , 柳遵梁1 , 刘 聪1
A binarized super-resolution network based on attention information focusing and progressive gradient constraints
黄家锋 , 吴丽君
Content-guided heterogeneous dual-decoder network for polyp image segmentation
王丽黎1 ,2 , 郑益聪1 , 郭东旭1 , 王振宁1
Research on storage strategy and applications based on embedded industrial time series data
周俊鹏1 ,2 , 王 卓1 ,2 , 康永乐1 ,2 , 任德旺1 ,2
Three-party evolutionary game analysis of blockchain technology adoption under the digital supply chain
康博涵 , 周剑桥 , 张烜通
Research on architecture construction of helicopter big data governance system
鲁 兴1 , 孟 浩1 , 吕少杰2 , 张京亮2
Research on the development characteristics, models, and cultivation strategies of the data industry
王建 , 徐浩 , 魏伟 , 师旭颖 , 王思博
Legal use of publicly available personal data in machine learning
王婉清
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。