Privacy-preserving multi-party authorization scheme for decentralized identity
牟翰翔,万长胜
Research on an APT attack detection model integrating provenance graphs and knowledge graphs
安渊1,鲍永庆2
Research on network security risk governance oriented to attack surface convergence
沈萍
UAV small-scale object detection based on multi-scale feature fusion and SAM guidance
钟嘉宇1,牛利玲2,任超1
Key point matching method for nonrigid deformed images
董家麟,吴丽君
CFR-JVMD-based multi-receiver cooperative OFDM specific emitter identification
朱丽,刘高辉
The legal theoretical foundation and regulatory framework for neurodata protection
汪雨馨
Research on the architecture and roadmap for activating data element value in small and medium enterprises through "dualchain" integration
刘传玉,石飞,李圣斌,曹申会,杨松
Digital platform pricing and data privacy incentives: a structural estimation using contracts variation
王新兴
From data to value: a study on the practice of data asset recognition in the balance sheet in the cultural industry
徐明丽,顾世玲
Legal risks and regulatory paths for crossborder flow of Generative AI data
宋延敏
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。