- Current Issue
- Archive
- 2026, Vol. 52, No. 1 Published:25 January 2026 Previous Issue
- Industrial 5G SNPN build the dedicated digital foundation for new industrial networks
- CHU Junsheng, WANG Han
- Information and Communications Technology and Policy. 2026, 52(1): 2-11. DOI:10.12267/j.issn.2096-5931.2026.01.001
- Abstract ( 38 ) HTML( 13 )
-
As the industrial digital transformation progresses deeper, new scenarios and applications have placed higher demands for industrial network infrastructure, encompassing ubiquitous connectivity, deterministic transmission, integration of control networks and computing resources, open intelligence, and secure controllability. Industrial 5G stand-alone non-public network (SNPN), leveraging its differentiated advantages in asset exclusivity, resource specialization, flexible deployment, autonomous management, and security reliability, are expected to serve as a powerful supplement to traditional industrial networks and operator 5G virtual/hybrid private networks. Based on the core requirements of industrial scenarios, this paper elaborates on the system architecture and functional characteristics of the industrial 5G SNPN for building a new industrial network exclusive digital foundation, clarifying its key capabilities in industrial application support, computing network collaboration, and network security protection. Through the construction of an integrated digital foundation of “connection management-computing & network collaboration-security protection”, the industrial 5G SNPN provides universal connectivity, guaranteed transmission, and autonomous controllability as the underlying support for the new industrial network, facilitating the transition from automation to intelligence and providing strong support for the digital transformation of industries.
- Figures/Tables | References | Related Articles | Metrics
- Research on architecture and application of single pair ethernet in process industry
- LUO Rui, YANG Guilin, WU Jian
- Information and Communications Technology and Policy. 2026, 52(1): 12-17. DOI:10.12267/j.issn.2096-5931.2026.01.002
- Abstract ( 52 ) HTML( 5 )
-
Single Pair Ethernet (SPE) and its evolution into ethernet advanced physical layer technologies enable long-distance data transmission and intrinsic safety power delivery over a single twisted pair cable, breaking down the traditional physical barriers between OT and IT. This paper provides an in-depth analysis from four dimensions: policy drivers, technical standards, network architecture transformation, and typical unmanned application scenarios. It demonstrates how SPE, by establishing an “end-to-end” full-IP architecture, provides critical physical layer support for the process industry in achieving predictive maintenance, unmanned inspections in hazardous environments, and the foundational structure for digital twin models.
- Figures/Tables | References | Related Articles | Metrics
- Analysis of safety requirements and key technologies for the integration of vision and auditory sensation
- XIONG Ziyi, SHI Hui, WANG Mingyue
- Information and Communications Technology and Policy. 2026, 52(1): 18-23. DOI:10.12267/j.issn.2096-5931.2026.01.003
- Abstract ( 27 ) HTML( 10 )
-
With the rapid advancement of integrated communication-sensing technology in future 6G networks, the deep integration of communication and sensing functions not only enhances system performance but also introduces multidimensional security challenges. From a security perspective, this paper analyzes the composite security risks of integrated communication-sensing systems at the physical layer, privacy protection, and in traditional communication versus 6G new scenarios. Specifically, physical layer security faces threats such as channel state spoofing, environmental reflection manipulation, and joint attacks on communication and sensing signals. Privacy protection requires addressing risks of user location information leakage, behavioral trajectory exposure, and high-dimensional sensing data breaches. Simultaneously, the system must still meet fundamental security requirements including identity authentication, data integrity, and low-latency interaction. To address these security needs, key technological advancements are summarized, including lightweight RF fingerprint authentication, deep learning-based anomaly detection, perception data protection combining differential privacy and federated learning, resource regulation and joint scheduling mechanisms driven by deep reinforcement learning, as well as blockchain-based distributed trust management and lightweight edge collaboration strategies. By integrating these technologies, system-level security safeguards can be established across multiple dimensions including physical layer, data processing, resource management, and cross-domain collaboration, providing theoretical support and technical references for secure and trustworthy operation of integrated communication-sensing systems in high-dynamic, high-density, and strongly real-time environments.
- References | Related Articles | Metrics
- Industrial network technology for digital transformation: an applied study in manufacturing
- LIANG Yong, ZHANG Xin, DENG Jing, WU Quan, LIU Wennan, KANG Chen
- Information and Communications Technology and Policy. 2026, 52(1): 24-30. DOI:10.12267/j.issn.2096-5931.2026.01.004
- Abstract ( 27 ) HTML( 12 )
-
Under the global wave of industrial digitalization and intelligence, traditional manufacturing enterprises face systematic challenges in their digital transformation, including heterogeneous systems, data silos, difficulties in cross-entity collaboration, and high costs associated with large-scale replication. New industrial network technologies, serving as next-generation industrial infrastructure that integrates advanced communication, computing, and control technologies, provide a critical pathway for constructing a unified digital foundation to support enterprise-wide transformation. This paper systematically explores how to drive the construction of group-level data platforms and intelligent platforms by establishing a “cloud-edge-device” collaborative industrial network architecture. The research focuses on analyzing the application mechanisms of advanced technologies within the core model of “capability precipitation and rapid replication.” By integrating scenarios such as intelligent application promotion, data closed-loop processes, and integrated group operations, it elaborates on viable pathways for technology-enabled business transformation. Furthermore, this paper provides an in-depth analysis of the core challenges encountered during the transformation process—including data governance, technology integration, organizational change, and security controllability—along with corresponding coping strategies. This case study demonstrates that leveraging new industrial networks as the foundation and guiding the overall strategy with a unified architecture represents an effective paradigm for group-based manufacturing enterprises to advance from local optimization to holistic synergy, and from technology application to model innovation.
- Figures/Tables | References | Related Articles | Metrics
- Research on the development status and trends of the industrial computing and network convergence industrial artificial intelligence
- CHEN Xin, ZHANG Hengsheng, FU Tao, LI Guo
- Information and Communications Technology and Policy. 2026, 52(1): 31-40. DOI:10.12267/j.issn.2096-5931.2026.01.005
- Abstract ( 22 ) HTML( 8 )
-
At present, the integration of Industrial Computing and Network Convergences and industrial artificial intelligence still faces such challenges as poor versatility of solutions, which leads to high investment and difficulties in promotion and application. Most integrations are still at the system adaptation stage, and the lack of deep integration with business processes and management control mechanisms leads to fragmented management and insufficient collaboration. By examining the current state of technological convergence, this paper analyzes the problems of the mismatch between supply and demand, insufficient depth of integration, potential risks in system security and the standard development is still in the initial stage. Meanwhile, this paper looks forward to the future development trends in terms of technology, application and ecology, and puts forward targeted suggestions from three dimensions: technological tackling, guidance and support, and ecological construction. With continuous breakthroughs in technological innovation and deepening ecological synergy, integrated development will gradually overcome current bottlenecks, delivering multiple benefits to the industrial sector—significant improvements in production efficiency, substantial reductions in energy consumption, and marked enhancements in self-reliance. This will propel China’s industrial system toward smarter, greener, and more integrated.
- Figures/Tables | References | Related Articles | Metrics
- Research on key technologies of industrial data fusion and interoperability
- GAO Yuan, CONG Baoyi, ZHENG Liang, YU Sicong, HUANG Ying
- Information and Communications Technology and Policy. 2026, 52(1): 41-49. DOI:10.12267/j.issn.2096-5931.2026.01.006
- Abstract ( 23 ) HTML( 13 )
-
Against the backdrop of the accelerated development of industrial intelligence, industrial data has become a key production factor. However, its low quality, heterogeneity, fragmentation, and semantic disconnection have restricted cross-system applications. This paper proposes a technical architecture for industrial data fusion and interoperability, systematically studying three key technologies: data standardization, data quality processing, and data annotation. It constructs a standardized promotion path, introduces a large model-driven dynamic self-closed-loop quality processing system, and establishes a scenario-oriented annotation evaluation model to achieve controllable and quantifiable assessment of the annotation process. The related research provides methods and technical support for the construction of a high-quality industrial data application environment.
- Figures/Tables | References | Related Articles | Metrics
- Exploration of registration models for the national integrated data market
- WANG Weidong, ZENG Yuan
- Information and Communications Technology and Policy. 2026, 52(1): 50-58. DOI:10.12267/j.issn.2096-5931.2026.01.007
- Abstract ( 25 ) HTML( 14 )
-
As the first step to promote the formation of a national integrated data market, the practical exploration of data registration is in full swing and has differentiated into two major development paths: the combined registration path integrating data property rights and intellectual property rights, and the independent registration path for data property rights. A comprehensive review of current local data registration practices reveals that data registration has not fulfilled its expected role, and the root cause lies in the lack of a unified national registration system. In view of this, coordinated efforts should be made in three aspects: improving the institutional framework, enhancing the technical system, and optimizing the organizational structure, to establish a data registration system that meets the development needs of data elements and the construction goals of a national integrated data market.
- Figures/Tables | References | Related Articles | Metrics
- Driving factors for digital transformation of leadership in the AI era: research based on technology acceptance model
- ZHANG Bin
- Information and Communications Technology and Policy. 2026, 52(1): 59-67. DOI:10.12267/j.issn.2096-5931.2026.01.008
- Abstract ( 79 ) HTML( 21 )
-
Based on the technology acceptance model, this study explores the driving factors and mechanisms of digital leadership transformation in the era of artificial intelligence through theoretical analysis and empirical research. Research has found that leaders exhibit significant hierarchical differences in their acceptance of technology. Senior managers are more concerned with the strategic value of technology, mid-level managers focus on the feasibility of technology implementation, and grassroots managers rely more on organizational support. Through structural equation modeling verification, it was found that technological infrastructure and industry competitive pressure are the core driving factors, while the impact of changes in customer demand did not reach a significant level. Research has shown that enhancing perceived usefulness and perceived ease of use can effectively improve the efficiency of digital leadership transformation, providing theoretical support and implementation framework for the dynamic evolution of digital leadership.
- Figures/Tables | References | Related Articles | Metrics
- Research on the evolution trends of cybersecurity industry policies in the Asia-Pacific region and China’s response strategies
- FENG Shiduo, LI Shenzhi, GOU Wenqi, YAO Nanwei, GAO Jingjie
- Information and Communications Technology and Policy. 2026, 52(1): 68-74. DOI:10.12267/j.issn.2096-5931.2026.1.009
- Abstract ( 21 ) HTML( 8 )
-
Based on the current development of cybersecurity situation, this article examines the evolution trends of cybersecurity industry policies in the Asia-Pacific region. By defining conceptual boundaries and selecting typical countries and regions, such as the United States, Russia, Australia, South Korea, Japan, and ASEAN nations for horizontal and vertical comparisons, the research provides a summarized analysis from perspectives including policy differences, overarching strategies, and specialized sectors, clarifying the developmental trajectory of cybersecurity industry policies across the Asia-Pacific region. In light of both international and domestic security dynamics, targeted recommendations are proposed to advance China’s cybersecurity industry and effectively address external challenges, focusing on areas such as talent development, industrial foundation, and international cooperation.
- References | Related Articles | Metrics
- Research on continual learning method for overcoming catastrophic forgetting of artificial neural networks
- YU Da, DONG Xiaofei, CAO Feng, ZHA Fusheng, SUN Lining
- Information and Communications Technology and Policy. 2026, 52(1): 75-83. DOI:10.12267/j.issn.2096-5931.2026.01.010
- Abstract ( 19 ) HTML( 10 )
-
Traditional artificial neural network training typically focuses on closed, static, independent and identically distributed data, and performs a single task after completing offline training. However, when the data distribution continuously changes with the environment, the model will forget the knowledge learned from previous tasks, a phenomenon known as “catastrophic forgetting”. As an emerging learning paradigm, continual learning aims to endow models with the ability to continuously learn, accumulate, and consolidate knowledge from data streams with constantly changing distributions. This enables artificial neural networks to achieve a “stability-plasticity” balance, thereby overcoming catastrophic forgetting. Through in-depth analysis of the key characteristics of current continual learning algorithms, a real-world robotic physical verification platform was established. The effectiveness of continual learning algorithms was verified in the scenario of robotic physical object grasping. Experimental results show that when the Contrastive Correlation Preserving Replay (CCPR) algorithm is applied to the robotic physical object grasping task, the average accuracy of the grasping task increases by 26.67%, better assisting the robot in performing the target task.
- Figures/Tables | References | Related Articles | Metrics
- Artificial intelligence empowering lifecycle management of smart wind farms
- LI Xiang, SUN Yonghua, LI Weijian
- Information and Communications Technology and Policy. 2026, 52(1): 84-89. DOI:10.12267/j.issn.2096-5931.2026.01.011
- Abstract ( 22 ) HTML( 6 )
-
This study explores the application of artificial intelligence in the construction of smart wind farms, empowering smart wind power and addressing issues such as operational efficiency and equipment fault diagnosis. A comprehensive intelligent application process is established, covering data collection, governance, feature engineering, modeling, and application. Through the implementation of this process, wind farms have achieved smartization throughout their entire lifecycle, including planning, operation, maintenance, and decommissioning. A case experiment on short-term power prediction verifies the effectiveness of simulated annealing optimized long short-term memory and the engineering applicability of the process.The innovative full lifecycle intelligent management paradigm proposed in this research provides technical support for the smart transformation of the wind power.
- Figures/Tables | References | Related Articles | Metrics
- Research on the status quo and governance strategy of deceptive and misleading behaviors in internet applications
- QU Leilei, YANG Mengke, SONG Kai
- Information and Communications Technology and Policy. 2026, 52(1): 90-96. DOI:10.12267/j.issn.2096-5931.2026.01.012
- Abstract ( 19 ) HTML( 11 )
-
Despite the substantial body of international research developed over decades, scholarly investigation into deceptive and misleading behaviors, commonly known as dark patterns, within the context of Chinese internet applications is still limited. This gap has resulted in a lack of theoretical underpinning for corresponding governance frameworks. To inform relevant research and policy-making, this paper reviews scholarly progress in regulating dark patterns, clarifies their conceptual definition and manifestations within digital governance, and examines their adverse effects on users and society through real-world case studies. It concludes by focusing on the key regulatory challenges and potential pathways forward.
- Figures/Tables | References | Related Articles | Metrics
| 2025, Vol.51 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
|---|---|---|---|---|---|---|
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2024, Vol.50 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2023, Vol.49 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2022, Vol.48 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2021, Vol.47 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2020, Vol.46 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2019, Vol.45 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 | No.5 | No.4 | No.3 | No.2 | No.1 | |
| 2018, Vol.44 | No.12 | No.11 | No.10 | No.9 | No.8 | No.7 |
| No.6 |
- Most Read
- Most Download
- Most Cited
- Global brain computer interface technology and industry development trends
- ZHOU Jie, CHENG Liwei
- 2025, 51(3): 53-58. DOI: 10.12267/j.issn.2096-5931.2025.03.007
- Abstract ( 2112 ) HTML ( 79 ) PDF (947KB) (1178)
- Research on the ethical risks and ethical review of brain-computer interfaces
- FU Na, ZHOU Jie
- 2025, 51(3): 11-15. DOI: 10.12267/j.issn.2096-5931.2025.03.002
- Abstract ( 1431 ) HTML ( 193 ) PDF (903KB) (1896)
- Key technologies and typical applications of “AI+” empowered embodied intelligence robots
- LI Tengda, ZHU Ziyu, HAN Ziqi
- 2025, 51(8): 15-25. DOI: 10.12267/j.issn.2096-5931.2025.08.003
- Abstract ( 1403 ) HTML ( 77 ) PDF (1110KB) (764)
- Study on definition and key measures of computing and electric power coordinated development
- LI Jie, WANG Yue, JIANG Lingfei
- 2025, 51(2): 2-8. DOI: 10.12267/j.issn.2096-5931.2025.02.001
- Abstract ( 1344 ) HTML ( 58 ) PDF (1032KB) (1477)
- Artificial intelligence enables high-level development and high-quality construction of digital twin city
- LIU Gaofeng, JIANG Yuehan, ZHANG Yuxiong
- 2025, 51(3): 74-82. DOI: 10.12267/j.issn.2096-5931.2025.03.010
- Abstract ( 1299 ) HTML ( 57 ) PDF (1544KB) (587)
- Design and implementation of high-performance EEG signal processing cluster architecture based on Nginx load balancing
- LIU Yuting, WU Tong, REN Xianghui
- 2025, 51(3): 16-24. DOI: 10.12267/j.issn.2096-5931.2025.03.003
- Abstract ( 1086 ) HTML ( 20 ) PDF (1190KB) (215)
- Current situation and development suggestions for the construction of urban intelligent computing power base
- YAN Jiahao
- 2025, 51(9): 2-7. DOI: 10.12267/j.issn.2096-5931.2025.09.001
- Abstract ( 1086 ) HTML ( 79 ) PDF (959KB) (363)
- Research on basic concepts of data assetization
- WANG Zeyu, YAN Shu, WANG Danyang
- 2025, 51(2): 53-59. DOI: 10.12267/j.issn.2096-5931.2025.02.008
- Abstract ( 1067 ) HTML ( 47 ) PDF (1032KB) (1054)
- 2025, 51(9): 1-1.
- Abstract ( 1066 ) HTML ( 138 ) PDF (267KB) (573)
- New models, experiences, and ideas for Beijing’s digital transformation: a case study of digital economy innovation and development
- WANG Peng, WANG Tianyuan
- 2025, 51(9): 85-91. DOI: 10.12267/j.issn.2096-5931.2025.09.014
- Abstract ( 1051 ) HTML ( 59 ) PDF (1007KB) (277)
- Hot spots and trend analysis of data element circulation development
- LYU Ailin, WANG Danyang, YANG Xiaoyun, YANG Jingshi, BAI Yuzhen
- 2025, 51(4): 2-7. DOI: 10.12267/j.issn.2096-5931.2025.04.001
- Abstract ( 1012 ) HTML ( 334 ) PDF (936KB) (583)
- Study on artificial intelligence native network
- SHANG Xingyu, LIU Xiao’ou, YANG Mingchuan
- 2025, 51(2): 9-17. DOI: 10.12267/j.issn.2096-5931.2025.02.002
- Abstract ( 994 ) HTML ( 61 ) PDF (1308KB) (704)
- Research on cloud service architecture and key technologies of computing center
- ZHAO Xiping, DING Fei, WANG Shiyi, WANG Rui, WU Di, LIU Zhishuai
- 2025, 51(2): 30-39. DOI: 10.12267/j.issn.2096-5931.2025.02.005
- Abstract ( 985 ) HTML ( 57 ) PDF (1681KB) (753)
- 2025, 51(8): 1-1.
- Abstract ( 984 ) HTML ( 104 ) PDF (223KB) (878)
- Research on the mechanism of action and practical path of the new generation of data annotation industry on the innovation of the “AI+” paradigm
- YAN Jiangyi, LI Sun, FAN Wei, CAO Feng
- 2025, 51(8): 26-34. DOI: 10.12267/j.issn.2096-5931.2025.08.004
- Abstract ( 969 ) HTML ( 60 ) PDF (1032KB) (387)
- High-quality computing power trends in the era of artificial intelligence
- MU Xiangxu, JIA Mingyan, WANG Tiancheng, WU Meixi
- 2025, 51(2): 18-23. DOI: 10.12267/j.issn.2096-5931.2025.02.003
- Abstract ( 966 ) HTML ( 65 ) PDF (943KB) (516)
- Research on key problems of decoupling of cold plate liquid cooling quick disconnect blind-mate
- LIU Xinning, XIE Lina, SHAO Jianfeng
- 2025, 51(2): 40-45. DOI: 10.12267/j.issn.2096-5931.2025.02.006
- Abstract ( 958 ) HTML ( 15 ) PDF (2225KB) (513)
- Design of government data architecture system for comprehensive digital transformation in megacities
- KANG Yanlong, LYU Jianzhou, YIN Xu, ZHANG Linjun
- 2025, 51(9): 77-84. DOI: 10.12267/j.issn.2096-5931.2025.09.013
- Abstract ( 939 ) HTML ( 19 ) PDF (1249KB) (157)
- The latest advances and outlooks of post-quantum cryptography
- ZHANG Feng, ZHUANG Yan, YU Le, SUN Shuo, CUI Handong, MA Yusheng
- 2025, 51(7): 92-96. DOI: 10.12267/j.issn.2096-5931.2025.07.012
- Abstract ( 936 ) HTML ( 35 ) PDF (931KB) (970)
- Analysis of enterprise data assetization pathways in the context of data elements
- LI Yufei, AI Bohuan, QIU Mengyuan, MA Wenda
- 2025, 51(4): 47-54. DOI: 10.12267/j.issn.2096-5931.2025.04.007
- Abstract ( 931 ) HTML ( 44 ) PDF (951KB) (670)
- Research progress of large-capacity optical transmission technologies and investigation on 400G C+L band system
- FENG Zhenhua , SHANG Wendong , LU Yuan , WANG Zhaohui , SHI Hu , CHEN Yong
- 2021, 47(12): 48-. DOI: 10.12267/j.issn.2096-5931.2021.12.007
- Abstract ( 1454 ) PDF (1594KB) (7294)
- In-depth analysis of the satellite constellation Starlink
- XU Bingyu, LI Xiayu
- 2021, 47(9): 16-20. DOI: 10.12267/j.issn.2096-5931.2021.09.003
- Abstract ( 1967 ) PDF (912KB) (6331)
- Research on the development framework and trend of digital economy
- WANG Yong, ZHU Jianyu, ZHANG Haifeng
- 2023, 49(1): 2-6. DOI: 10.12267/j.issn.2096-5931.2023.01.001
- Abstract ( 5243 ) HTML ( 5557 ) PDF (967KB) (4548)
- Overview of China's digital economy development
- HE Wei
- 2021, 47(2): 1-7. DOI: 10.12267/j.issn.2096-5931.2021.02.001
- Abstract ( 6792 ) PDF (533KB) (4398)
- The status, trends and suggestions of computing infrastructure
- LI Jie, WANG Yue
- 2022, 48(3): 2-6. DOI: 10.12267/j.issn.2096-5931.2022.03.001
- Abstract ( 2942 ) HTML ( 9339 ) PDF (902KB) (4072)
- 2019, 45(6): 29-31.
- Abstract ( 1361 ) PDF (1006KB) (3538)
- Enlightenment of ChatGPT to smart cities: discussion about evolution path for cities of the future
- ZHU Gang, ZHANG Meixiang, SUN Haowen, LI Jiajing, ZHANG Liang, YANG Yunlong
- 2023, 49(6): 71-78. DOI: 10.12267/j.issn.2096-5931.2023.06.010
- Abstract ( 1613 ) HTML ( 989 ) PDF (1048KB) (3431)
- Mechanism + data fusion modeling method in digital twin system for industrial internet
- LI Shuo, LIU Tianyuan, HUANG Feng, XIE Xin, ZHANG Jinyi
- 2022, 48(10): 52-61. DOI: 10.12267/j.issn.2096-5931.2022.10.008
- Abstract ( 4326 ) HTML ( 928 ) PDF (1076KB) (3290)
- Analysis and suggestions of the digital talents shortage issues in China
- ZHANG Lin, WANG Lixiang, HU Yanni
- 2021, 47(12): 76-. DOI: 10.12267/j.issn.2096-5931.2021.12.010
- Abstract ( 2114 ) PDF (802KB) (3226)
- Overall architecture and enhancement pathways of low-altitude economy
- LU Fangzhou, YAN Kun, LI Wenyu, WANG Fang
- 2024, 50(11): 2-10. DOI: 10.12267/j.issn.2096-5931.2024.11.001
- Abstract ( 2582 ) HTML ( 412 ) PDF (1026KB) (3110)
- Analysis of the domestic and international development and status of AI governance
- ZHANG Pei, LIU Yuanyuan
- 2023, 49(1): 46-51. DOI: 10.12267/j.issn.2096-5931.2023.01.008
- Abstract ( 3437 ) HTML ( 888 ) PDF (935KB) (3009)
- Overview of the development of privacy preserving computing
- YAN Shu, LYU Ailin
- 2021, 47(6): 1-11. DOI: 10.12267/j.issn.2096-5931.2021.06.001
- Abstract ( 2916 ) PDF (611KB) (2980)
- Research on security challenges and governance path of generative artificial intelligence big model
- XU Ming
- 2025, 51(1): 10-19. DOI: 10.12267/j.issn.2096-5931.2025.01.002
- Abstract ( 1823 ) HTML ( 95 ) PDF (1014KB) (2795)
- Research on market space forecast of low-altitude economy
- SUN Guohui, NIE Peng, ZHAO Litong
- 2024, 50(11): 33-40. DOI: 10.12267/j.issn.2096-5931.2024.11.006
- Abstract ( 2806 ) HTML ( 76 ) PDF (1060KB) (2734)
- Overview of data center development
- GUO Liang
- 2023, 49(5): 2-8. DOI: 10.12267/j.issn.2096-5931.2023.05.001
- Abstract ( 3069 ) HTML ( 1412 ) PDF (915KB) (2674)
- 2024, 50(12): 1-1.
- Abstract ( 6283 ) HTML ( 1178 ) PDF (266KB) (2541)
- 2023, 49(1): 1-1.
- Abstract ( 3109 ) HTML ( 2700 ) PDF (221KB) (2522)
- Research on ethical challenges and rational regulation of brain-computer interface technology
- XU Ming
- 2024, 50(5): 54-59. DOI: 10.12267/j.issn.2096-5931.2024.05.008
- Abstract ( 1354 ) HTML ( 47 ) PDF (932KB) (2378)
- Research and protection suggestions of 5G network attack technology
- SHAO Xiaomeng, HAN Wenting
- 2022, 48(12): 79-81. DOI: 10.12267/j.issn.2096-5931.2022.12.013
- Abstract ( 1011 ) HTML ( 148 ) PDF (872KB) (2320)
- Research on application cases and path of artificial intelligence in industry
- QU Jiang, ZHANG Yi
- 2024, 50(12): 51-57. DOI: 10.12267/j.issn.2096-5931.2024.12.008
- Abstract ( 1931 ) HTML ( 217 ) PDF (964KB) (2315)
- Supervised by MIIT
- Founded in 1975
China Academy of Information and Communications Technology (CAICT)
Editor: The Editorial Department of Information and Communications Technology and Policy
Chief Editor: Yu Xiaohui
Deputy Chief Editor: XU Heyuan
Executive Chief Editor: ZHANG Jing
Editors: ZHANG Chun, WU Hui, LIU Shan, WANG Xiuping, ZHAO Zhihua, LIU Sihan
Address: 52 Huayuan North Road, Beijing, China
Phone: 010-62300192
E-mail: ictp@caict.ac.cn
Post Code: 100191
