Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 72-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-27
刘楠陶源陈广勇
(公安部第三研究所上海200031) (网络安全等级保护与安全保卫技术国家工程研究中心上海200031)
通讯作者:
刘楠
硕士,研究实习员.主要研究方向为网络安全等级保护、关键信息基础设施保护、人工智能安全.
liunan1@gass.ac.cn
作者简介:刘楠
硕士,研究实习员.主要研究方向为网络安全等级保护、关键信息基础设施保护、人工智能安全.
liunan1@gass.ac.cn
陶源
博士,副研究员.主要研究方向为网络安全等级保护、关键信息基础设施保护、人工智能安全.
taoyuan@gass.ac.cn
陈广勇
硕士,副研究员.主要研究方向为人工智能安全、网络安全等级保护和关键信息基础设施保护.
chenguangyong@gass.ac.cn
基金资助:国家重点研发计划项目(2018YFB0803503);网络安全等级保护与安全保卫技术国家工程研究中心开放课题(C216403);公安部第三研究所2023年度科研优青班项目(C23282)
[1]Chang Weilin, Li Zhuohan, Lin Zi, et al. Vicuna: An opensource chatbot impressing gpt4 with 90%* chatgpt quality[EBOL]. 2023 [20250813]. https:vicuna.lmsys.org[2]Levine Y, Lenz B, Dagan O, et al. SenseBERT: Driving some sense into BERT[EBOL]. 2019 [20250813]. https:arxiv.orgabs1908.05646[3]Tian Hao, Gao Chenyu, Xiao Xinyan, et al. SKEP: Sentiment knowledge enhanced pretraining forsentiment analysis[EBOL]. 2020 [20250813]. https:arxiv.orgabs2005.05635[4]Lyu Bole, Chen Ling, Zhu Su, et al. LET: Linguistic knowledge enhanced graph transformer for Chinese short text matching[EBOL]. 2021 [20250813]. https:arxiv.orgabs2102.12671[5]Xu Yige, Zhu Chen, Wang Sihao, et al. Human parity on CommonsenseQA: Augmenting selfattention with external attention[EBOL]. 2021 [20250813]. https:arxiv.orgabs2112.03254[6]Grave E, Joulin A, Usunier N. Improving neural language models with a continuous cache[EBOL]. 2016 [20250813]. https:arxiv.orgabs1612.04426[7]Murty S, Koh P W, Liang P. ExpBERT: Representation engineering with natural language explanations[EBOL]. 2020 [20250813]. https:arxiv.orgabs2005.01932[8]Oguz B, Chen X, Karpukhin V, et al. UniKQA: Unified representations of structured and unstructured knowledge for opendomain question answering[EBOL]. 2020 [20250813]. https:arxiv.orgabs2012.14610[9]Lee J, Yoon W, Kim S, et al. BioBERT: A pretrained biomedical language representation model for biomedical text mining[J]. Bioinformatics, 2020, 36(4): 12341240[10]Zhao Yifan, Zhou Hongjin, Zhang Aiping, et al. Connecting embeddings based on multiplex relational graph attention networks for knowledge graph entity typing[J]. IEEE Trans on Knowledge and Data Engineering, 2022, 34(5): 21512162[11]Wang Jian, Wang Chengyu, Qiu Ming, et al. KECP: Knowledge enhanced contrastive prompting for fewshot extractive question answering[EBOL]. 2022 [20250813]. https:arxiv.orgabs2205.03071[12]Yamada I, Asai A, Shindo H, et al. LUKE: Deep contextualized entity representations with entityaware selfattention[EBOL]. 2020 [20250813]. https:arxiv.orgabs2010.01057 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||