Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 167-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
刘静王勇王雪
公安部第三研究所上海200031
通讯作者:
刘静
硕士,研究实习员.主要研究方向为大模型、网络安全等级保护.
lj234894588@163.com
作者简介:刘静
硕士,研究实习员.主要研究方向为大模型、网络安全等级保护.
lj234894588@163.com
王勇
助理研究员.主要研究方向为网络安全、数据安全、供应链安全.
wangyong@gass.ac.cn
王雪
硕士,研究实习员.主要研究方向为网络安全,数据安全、供应链安全.
wangxue@gass.ac.cn
[1]付艳茹, 马强. 大数据技术: 数据驱动警务模式与控制犯罪问题研究[M]. 北京: 中国人民公安大学出版社, 2018[2]Liu Y, Chen X. CPSDBench: A large language model evaluation benchmark for Chinese public security domain[C] Proc of AAAI 2024. New York: AAAI Press, 2024: 1023410242[3]金益锋, 马忠红. 刑事侦查中人工智能的应用:实践样态、风险挑战与发展策略[J]. 科技导报, 2023, 41(7): 8997[4]王建军, 李雪峰. 支持智能应用的公安情报知识图谱本体构建[J]. 中国人民公安大学学报: 自然科学版, 2021, 27(1): 4552[5]高翔. 人工智能民事司法应用的法律知识图谱构建——以要件事实型民事裁判论为基础[J]. 法制与社会发展, 2018, 24(6): 6680 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||