Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 267-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
汤志伟1罗佳莹1俞贵琪2
1(公安部第三研究所公安部网络安全等级保护评估中心上海200031) 2(上海市公安局网络安全保卫总队上海201799)
通讯作者:
汤志伟
博士,研究员.主要研究方向为网络安全等级保护、警用物联网技术、智能视频处理、大模型安全.
99chaoyang@163.com
作者简介:汤志伟
博士,研究员.主要研究方向为网络安全等级保护、警用物联网技术、智能视频处理、大模型安全.
99chaoyang@163.com
罗佳莹
硕士.主要研究方向为大模型、等级保护测评.
luojiaying@gass.ac.cn
俞贵琪
主要研究方向为网络安全、等级保护、数据安全.
yuguiqi@163.com
[1]张昊星, 赵景欣, 岳星辉, 等. 全生命周期数据安全管理和人工智能技术的融合研究[J]. 信息安全研究, 2023, 9(6): 543550[2]钱汉伟, 彭季天, 袁明, 等. 影响预训练语言模型数据泄露的因素研究[J]. 信息安全研究, 2025, 11(2): 181188[3]Carlini N, Tramer F, Wallace E, et al. Extracting training data from large language models [EBOL]. 2020 [20250815]. https:www.researchgate.netpublication347125123_Extracting_Training_Data_from_Large_Language_Models[4]Li H, Guo D, Fan W, et al. Multistep jailbreaking privacy attacks on chatgpt[EBOL]. 2023 [20250815]. https:aclanthology.org2023.findingsemnlp.272[5]付志远, 陈思宇, 陈骏帆, 等. 大语言模型安全的挑战与机遇[J]. 信息安全学报, 2024, 9(5): 2655[6]Lin C S, Qu J, Saileshwar G. GPUHammer: Rowhammer Attacks on GPU Memories are Practical[EBOL]. 2025 [20250815]. https:arxiv.orgabs2507.08166[7]Touvron H, Martin L, Stone K, et al. Llama 2: Open foundation and finetuned chat models[EBOL]. 2023 [20250815]. https:blog.csdn.netTogether_CZarticledetails144878849[8]生成式人工智能服务管理暂行办法[EBOL]. 2023 [20250815]. https:www.gov.cnzhengcezhengceku202307content_6891752.htm |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||