Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 112-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-27
于洋李超张晓京王琼张湘海胡振凤
(中移动信息技术有限公司北京100032)
通讯作者:
于洋
硕士.主要研究方向为计算机网络架构、网络安全与隐私保护、通信网络中的跨域传输.
yuyang@chinamobile.com
作者简介:于洋
硕士.主要研究方向为计算机网络架构、网络安全与隐私保护、通信网络中的跨域传输.
yuyang@chinamobile.com
李超
硕士.主要研究方向为系统架构设计与优化.
lichaozq@chinamobile.com
张晓京
硕士.主要研究方向为系统架构设计与优化.
zhangxiaojing@chinamobile.com
王琼
硕士.主要研究方向为网络跨域传输、数据中心间的高速跨域互联.
wangqiong@chinamobile.com
张湘海
主要研究方向为计算机网络架构、人工智能与网络安全融合.
zhangxianghai@chinamobile.com
胡振凤
主要研究方向为网络安全与隐私保护、网络跨域切片传输技术.
huzhenfeng@chinamobile.com
[1]Terry Yue Zhuo, Minh Chien Vu, Jenny Chim,et al. BigCodeBench: Benchmarking code generation with diverse function calls and complex instructions[EBOL]. (20241007). https:arxiv.orgabs2406.15877v3[2]Du Wenyu, Cheng Shuang, Luo Tongxu, et al. Unlocking continual learning abilities in language models[EBOL]. (20241006). https:arxiv.orgabs2406.17245[3]Zhu Zhaocheng, Xue Yuan, Chen Xinyun, et al. Large language models can learn rules[EBOL]. (20241219). https:arxiv.orgabs2310.07064[4]Hu Xuming, Chen Junzhe, Li Xiaochuan, et al. Towards understanding factual knowledge of large language models[EBOL]. (20240508). https:openreview.netattachment?id=9OevMUdods&name=pdf[5]Zhou Chunting, Liu Pengfei, Xu Puxin, et al. LIMA: Less is more for alignment[EBOL]. (20230511). https:arxiv.orgabs2305.11206 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||