| [1] |
栗蔚, 张博圣, 孙松林, 等. 算力互联网架构:基于熵平衡支持算力资源跨域互联的下一代网络架构[J]. 通信学报, 2025, 46(9): 1-16.
|
| [2] |
中国信息通信研究院. 云计算蓝皮书(2025年)[R], 2025.
|
| [3] |
中国信息通信研究院. 算力网络数据安全研究报告(2024年)[R], 2024.
|
| [4] |
SASTRY G, HEIM L, BELFIELD H, et al. Computing power and the governance of artificial intelligence[J]. arXiv Preprint, arXiv:2402.08797, 2024.
|
| [5] |
段晓东, 程伟强, 张昊. 智算网络发展综述[J]. 中兴通讯技术, 2025, 31(2): 53-62.
|
| [6] |
张乾, 崔忠杰, 马金山, 等. 超节点关键技术与产业发展态势研究[J]. 信息通信技术与政策, 2025, 51(10): 14-22.
doi: 10.12267/j.issn.2096-5931.2025.10.003
|
| [7] |
GU Z, VALDEZ E, AHMED S, et al. NVIDIA GPU confidential computing demystified[J]. arXiv Preprint, arXiv:2507.02770, 2025.
|
| [8] |
SAMI M S U I, ZHANG T, SHUVO A M, et al. Advancing trustworthiness in system-in-package: a novel root-of-trust hardware security module for heterogeneous integration[J]. IEEE Access, 2024, 12: 48081-48107.
doi: 10.1109/ACCESS.2024.3375874
URL
|
| [9] |
苏昱臻, 王子潇, 钟驰量, 等. 面向异构算力互联的智算网络关键技术研究[J]. 电信科学, 2025, 41(8): 51-64.
|
| [10] |
刘雨蒙, 唐正梁, 路松峰, 等. RDMA协议应用及安全防护技术综述[J]. 网络与信息安全学报, 2024, 10(2): 22-46.
|
| [11] |
ROTHENBERGER B, TARANOV K, PERRIG A, et al. {ReDMArk}:bypassing {RDMA} security mechanisms[C]// 30th USENIX Security Symposium (USENIX Security 21). Online:USENIX, 2021: 4277-4292.
|
| [12] |
ARAMIDE O O. Converged ethernet and InfiniBand strategies for hybrid AI/HPC environments[J]. International Journal for Research Publication and Seminar, 2024, 15: 318-339.
|
| [13] |
ARAMIDE O O. Advanced network telemetry for AI-driven network optimization in Ultra Ethernet and InfiniBand Interconnects[J]. SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology, 2025, 17(1).
|
| [14] |
HOEFLER T, ROWETH D, UNDERWOOD K, et al. Datacenter ethernet and rdma: issues at hyperscale[J]. arXiv Preprint, arXiv:2302.03337, 2023.
|
| [15] |
中国信息通信研究院. 算力时代全光网架构研究报告[R], 2024.
|
| [16] |
ATAN F M, ZULKIFLI N, IDRUS S M, et al. Mitigating DBA exploits:enhanced security against degradation attacks in XG-PON[C]//2024 IEEE International Conference on Advanced Telecommunication and Networking Technologies (ATNT). Johor Bahru: IEEE, 2024, 1: 1-4.
|
| [17] |
SHESTAKOV I I, SHUVALOV V P, MININA E A. Research of methods of combating information security threats in PON networks[C]//2024 IEEE 25th International Conference of Young Professionals in Electron Devices and Materials (EDM). Altai: IEEE, 2024: 1050-1053.
|
| [18] |
ARAúJO I, BRíZIDO A, RITO LIMA S. Virtual network function development for NG-PON access network architecture[J]. Journal of Network and Systems Management, 2023, 31(4):1-30.
doi: 10.1007/s10922-022-09695-z
|
| [19] |
何涛, 杨振东, 曹畅, 等. 算力网络发展中的若干关键技术问题分析[J]. 电信科学, 2022, 38(6): 62-70.
doi: 10.11959/j.issn.1000-0801.2022147
|
| [20] |
段晓东, 姚惠娟, 付月霞, 等. 面向算网一体化演进的算力网络技术[J]. 电信科学, 2021, 37(10): 76-85.
doi: 10.11959/j.issn.1000-0801.2021248
|
| [21] |
FERDAUS M M, ABDELGUERFI M, LOUP E, et al. Towards trustworthy ai: a review of ethical and robust large language models[J]. ACM Computing Surveys, 2025, 58(7): 1-43.
|
| [22] |
HABBAL A, ALI M K, ABUZARAIDA M A. Artificial intelligence trust, risk and security management (AI TRISM): frameworks, applications, challenges and future research directions[J]. Expert Systems with Applications, 2024, 240(15): 122442.
doi: 10.1016/j.eswa.2023.122442
URL
|