Program integrity verification method based on combined control of long and short codes
姬一文,杨 钊,王玉成,杨诏钧,康 昱
Design and implementation of trusted network connection based on trusted root of TPCM
夏 攀
Intrusion detection method based on multi-scale DRN feature extraction
邵凌威1,郑灿伟1,渠振华1,黄 博1,李世明1,2
Research on indoor positioning technology based on KDMSPCS-GRNN
王 超1,单志勇2
Deepfake detection method in videos based on convolutional LSTM
李永强,白 天
A high-order graph convolutional network for urban air quality inference
陈 杰1,许镇义1,2
Prediction method of toxic gas diffusion based on gated recycle unit(GRU)
陈 立,陈贤富
Survey of load balancing routing technology in satellite network
顿聪颖1,2,金凤林1,谭诗翰1,祁春雨2
Design of a multi-channel high-speed and high-precision PXIe data acquisition module
唐新懿1,2,曹 平1,2,解立坤1,2,李 超1,2,黄锡汝1,2,安 琪1,2
Design and implementation of acquisition circuit for automatic meteorological temperature and humidity sensor
李要中
Matching algorithm of product image based on multi-feature fusion
王鑫城,范 红,刘锡泽,胡晨熙,林 威,禹素萍
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。