Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 15-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-27
刘丹王立刚高宇刘乔阳
(宁夏自然资源信息中心银川750002)
通讯作者:
刘丹
工程师.主要研究方向为自然资源数据安全.
liudan@nxgis.ntesmail.com
作者简介:刘丹
工程师.主要研究方向为自然资源数据安全.
liudan@nxgis.ntesmail.com
王立刚
硕士,正高级工程师.主要研究方向为自然资源信息化.
wangligang@nxgis.ntesmail.com
高宇
正高级工程师.主要研究方向为自然资源信息化.
gaoyu@nxgis.ntesmail.com
刘乔阳
硕士,工程师.主要研究方向为自然资源信息化.
liuqiaoyang@nxgis.ntesmail.com
基金资助:宁夏回族自治区青年拔尖人才工程项目(RQ0039)
[1]宋晴, 李琰, 董哲源. 基于区块链的电力信息物理系统数据安全存储[J]. 舰船电子工程, 2024, 44(12): 136140[2]李祥新, 凌霄, 甘滨, 等. 基于联盟区块链的智能电网数据安全存储方案研究[J]. 价值工程, 2024, 43(34): 46[3]邵俊. 基于区块链的输电线路数据安全存储与防篡改模型[J]. 电工技术, 2025, 45(1): 7378[4]Wang Z, Niu M, Zhao W. Compressionencrypted metaoptics for storage efficiency and security enhancement[J]. ACS Photonics, 2024, 11(2): 8[5]吴元杰. 基于大数据的网络数据安全存储检索系统的设计[J]. 软件, 2024, 45(5): 9597[6]Li H, Zhang M, Hu C. Deep neural networkbased security awareness research for private data cloud storage[EBOL]. 2023 [20250713]. https:www.keyanzhidian.comdocdetail?id=2072641324[7]区健, 冯开平, 罗立宏. 基于PCA与深度学习的表情识别算法[J]. 计算机应用与软件, 2023, 40(7): 185191[8]向玺蒙, 王竞雪. 多尺度引导滤波加权聚合的立体匹配算法[J]. 测绘科学, 2023, 48(2): 131139 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 53-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||