期刊文献+
共找到10,200篇文章
< 1 2 250 >
每页显示 20 50 100
Research on the Influencing Factors of China's Cross-border E-commerce Exports to Countries Along the“Belt and Road” 被引量:1
1
作者 Xinhao Zhao 《Proceedings of Business and Economic Studies》 2025年第2期321-325,共5页
Cross-border e-commerce,as a new form of international trade,has shown great development potential in the context of the“Belt and Road”initiative.Based on the cross-border e-commerce export data from 2015 to 2024,th... Cross-border e-commerce,as a new form of international trade,has shown great development potential in the context of the“Belt and Road”initiative.Based on the cross-border e-commerce export data from 2015 to 2024,this paper analyzes the influencing factors of China's cross-border e-commerce exports to countries along the“Belt and Road”by constructing an econometric model.The study found that factors such as the perfection of digital infrastructure,the efficiency of logistics and transportation,the convenience of payment and settlement,and the penetration rate of consumers online shopping significantly affect the export scale of cross-border e-commerce.Institutional factors such as the development level of e-commerce platforms in countries along the route,market access thresholds,and tariff policies also play an important role.Based on the research results,suggestions are put forward to strengthen the construction of cross-border payment system,optimize the logistics distribution network,promote customs clearance facilitation,and deepen cooperation in the field of e-commerce,to provide references for promoting the development of China's crossborder e-commerce exports to countries along the“Belt and Road.” 展开更多
关键词 The Belt and Road cross-border e-commerce Export trade Influencing factor
在线阅读 下载PDF
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
2
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
在线阅读 下载PDF
Research on the Impact of the Construction of Cross-border E-commerce Comprehensive Pilot Zones on China’s Export Transformation and Upgrading
3
作者 Jiahui Zhao 《Proceedings of Business and Economic Studies》 2025年第6期45-52,共8页
Cross-border e-commerce has emerged as a new growth point in foreign trade.While the Dalian comprehensive pilot zone has made some progress,its development is constrained by issues such as the global economic slowdown... Cross-border e-commerce has emerged as a new growth point in foreign trade.While the Dalian comprehensive pilot zone has made some progress,its development is constrained by issues such as the global economic slowdown,the relatively small scale of cross-border e-commerce,a high concentration of export commodities,imperfect information mechanisms,and high overall costs.To address these challenges,this paper explores the importance of the construction of the Dalian comprehensive pilot zone for cross-border e-commerce to the transformation and upgrading of exports.Based on my research project,“Research on Path Optimization of Financial Support for the Development of Advanced Manufacturing Clusters in Dalian,”this paper analyzes the current challenges and limiting factors and proposes corresponding countermeasures and suggestions. 展开更多
关键词 cross-border e-commerce comprehensive pilot zone cross-border e-commerce Export transformation and upgrading Foreign trade export
在线阅读 下载PDF
A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations
4
作者 Sungbum Kim Gwangsik Lee +2 位作者 Jian Song Insoo Lee Taeshik Shon 《Computers, Materials & Continua》 2025年第4期661-683,共23页
The smart home platform integrates with Internet of Things(IoT)devices,smartphones,and cloud servers,enabling seamless and convenient services.It gathers and manages extensive user data,including personal information,... The smart home platform integrates with Internet of Things(IoT)devices,smartphones,and cloud servers,enabling seamless and convenient services.It gathers and manages extensive user data,including personal information,device operations,and patterns of user behavior.Such data plays an essential role in criminal inves-tigations,highlighting the growing importance of specialized smart home forensics.Given the rapid advancement in smart home software and hardware technologies,many companies are introducing new devices and services that expand the market.Consequently,scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home ecosystems.This study thoroughly examines the core components and structures of smart homes,proposing a generalized architecture that represents various operational environments.A three-stage smart home forensics framework is introduced:(1)analyzing application functions to infer relevant data,(2)extracting and processing data from interconnected devices,and(3)identifying data valuable for investigative purposes.The framework’s applicability is validated using testbeds from Samsung SmartThings and Xiaomi Mi Home platforms,offering practical insights for real-world forensic applications.The results demonstrate that the proposed forensic framework effectively acquires and classifies relevant digital evidence in smart home platforms,confirming its practical applicability in smart home forensic investigations. 展开更多
关键词 Digital forensic forensic framework internet of things smart home smart home platform
在线阅读 下载PDF
Translation Strategies for Technological Elements in Smart Home Product Marketing Copy in Cross-Border E-Commerce
5
作者 ZHANG Ruyi 《Sino-US English Teaching》 2025年第12期289-294,共6页
Against the backdrop of economic globalization and the rapid growth of cross-border e-commerce,the overseas expansion of smart home products heavily relies on the translation quality of technological elements within m... Against the backdrop of economic globalization and the rapid growth of cross-border e-commerce,the overseas expansion of smart home products heavily relies on the translation quality of technological elements within marketing copy.This paper focuses on four core technological elements in smart home marketing copy on cross-border e-commerce platforms.Using Skopos Theory as a framework,it analyzes translation difficulties such as inconsistent terminology and imbalance between technical precision and accessibility.It constructs a five-dimensional translation strategy,“Precision+Accessibility+Localization+Structuring+Standardization”,and validates its effectiveness.This provides guidance for enterprises to enhance overseas marketing efficiency and enriches the research value of translation in the cross-border e-commerce vertical field. 展开更多
关键词 cross-border e-commerce smart home marketing copy Skopos Theory translation strategy
在线阅读 下载PDF
Data Sovereignty Construction in International Trade Agreements:Causes,Models,and China’s Choices-Based on the Study of Cross-border Data Flow Rules
6
作者 ZHANG Qianwen 《The Journal of Human Rights》 2025年第3期589-614,共26页
The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legisla... The Fourth Industrial Revolution has endowed the concept of state sovereignty with new era-specific connotations,leading to the emergence of the theory of data sovereignty.While countries refine their domestic legislation to establish their data sovereignty,they are also actively engaging in the negotiation of cross-border data flow rules within international trade agreements to construct data sovereignty.During these negotiations,countries express differing regulatory claims,with some focusing on safeguarding sovereignty and protecting human rights,some prioritizing economic promotion and security assurance,and others targeting traditional and innovative digital trade barriers.These varied approaches reflect the tension between three pairs of values:collectivism and individualism,freedom and security,and tradition and innovation.Based on their distinct value pursuits,three representative models of data sovereignty construction have emerged globally.At the current juncture,when international rules for digital trade are still in their nascent stages,China should timely establish its data sovereignty rules,actively participate in global data sovereignty competition,and balance its sovereignty interests with other interests.Specifically,China should explore the scope of system-acceptable digital trade barriers through free trade zones;integrate domestic and international legal frameworks to ensure the alignment of China’s data governance legislation with its obligations under international trade agreements;and use the development of the“Digital Silk Road”as a starting point to prioritize the formation of digital trade rules with countries participating in the Belt and Road Initiative,promoting the Chinese solutions internationally. 展开更多
关键词 data sovereignty cross-border data flow international trade agreements digital trade rules
原文传递
A Comprehensive Review on File Containers-Based Image and Video Forensics
7
作者 Pengpeng Yang Chen Zhou +2 位作者 Dasara Shullani Lanxi Liu Daniele Baracchi 《Computers, Materials & Continua》 2025年第11期2487-2526,共40页
Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis.Simultaneously,advancements in image and video proces... Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis.Simultaneously,advancements in image and video processing technologies have facilitated the widespread availability of powerful editing tools,such as Deepfakes,enabling anyone to easily create manipulated or fake visual content,which poses an enormous threat to social security and public trust.To verify the authenticity and integrity of images and videos,numerous approaches have been proposed,which are primarily based on content analysis and their effectiveness is susceptible to interference from various image or video post-processing operations.Recent research has highlighted the potential of file containers analysis as a promising forensic approach that offers efficient and interpretable results.However,there is still a lack of review articles on this kind of approach.In order to fill this gap,we present a comprehensive review of file containers-based image and video forensics in this paper.Specifically,we categorize the existing methods into two distinct stages,qualitative analysis and quantitative analysis.In addition,an overall framework is proposed to organize the exiting approaches.Then,the advantages and disadvantages of the schemes used across different forensic tasks are provided.Finally,we outline the trends in this research area,aiming to provide valuable insights and technical guidance for future research. 展开更多
关键词 Image and video forensics file containers analysis content analysis Deepfakes
在线阅读 下载PDF
A Survey of Image Forensics:Exploring Forgery Detection in Image Colorization
8
作者 Saurabh Agarwal Deepak Sharma +2 位作者 Nancy Girdhar Cheonshik Kim Ki-Hyun Jung 《Computers, Materials & Continua》 2025年第9期4195-4221,共27页
In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulat... In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field. 展开更多
关键词 Image colorization image forensic digital image forgery machine learning convolutional neural network deep learning generative adversarial network
在线阅读 下载PDF
Forensic Evaluation of Blindness Following Ocular Bee Sting:A Case Report and Literature Review
9
作者 Yongping Wei Xian Ju +1 位作者 Di Liang Cenxuelun Zhang 《Journal of Clinical and Nursing Research》 2026年第1期153-160,共8页
This report presents a forensic evaluation of a case involving blindness(visual acuity grade 5)following a bee/wasp sting to the left eye.Through systematic analysis of the patient’s multiple hospital admissions,post... This report presents a forensic evaluation of a case involving blindness(visual acuity grade 5)following a bee/wasp sting to the left eye.Through systematic analysis of the patient’s multiple hospital admissions,postoperative follow-up data,and a review of the pathological mechanisms of ocular injury caused by bee venom,this study comprehensively assesses the injury characteristics,treatment course,and visual outcomes.Bee venom induces severe complications such as corneal damage,uveitis,cataract,and secondary glaucoma through multiple mechanisms including direct cytotoxicity,immune-inflammatory responses,and enzymatic hydrolysis.Despite interventions including anterior chamber irrigation,phacoemulsification with intraocular lens implantation,and antiglaucoma surgery,the affected eye ultimately lost light perception.Forensic examination confirmed the absence of light perception in the left eye and abnormal visual pathway function,consistent with clinical observations.According to the relevant Chinese disability assessment standard(JR/T 0083-2013,Article 4.2.2),the injury was classified as grade 7 disability.This study provides an in-depth discussion of the mechanisms and key forensic identification points in bee-sting-induced blindness,offering a scientific reference for similar forensic clinical cases. 展开更多
关键词 forensic clinical medicine Bee sting Ocular injury BLINDNESS Disability assessment
在线阅读 下载PDF
Cloud Foren:A Novel Framework for Digital Forensics in Cloud Computing 被引量:2
10
作者 Mathew Nyamagwa Jigang Liu +1 位作者 Anyi Liu Tetsutaro Uehara 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期39-45,共7页
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A... Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment. 展开更多
关键词 digital forensics cloud computing FRAMEWORK
在线阅读 下载PDF
PHOTOREALISTIC COMPUTER GRAPHICS FORENSICS BASED ON LEADING DIGIT LAW 被引量:3
11
作者 Xu Bo Wang Junwen Liu Guangjie Dai Yuewei 《Journal of Electronics(China)》 2011年第1期95-100,共6页
As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it ma... As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it may lead to potential social,legal or private consequences.To this end,it is very necessary and also challenging to find effective methods to differentiate between them.In this paper,a novel leading digit law,also called Benford's law,based method to identify computer graphics is proposed.More specifically,statistics of the most significant digits are extracted from image's Discrete Cosine Transform(DCT) coefficients and magnitudes of image's gradient,and then the Support Vector Machine(SVM) based classifiers are built.Results of experiments on the image datasets indicate that the proposed method is comparable to prior works.Besides,it possesses low dimensional features and low computational complexity. 展开更多
关键词 Leading digit law Benford’s law Digital image forensic Computer graphics
在线阅读 下载PDF
Digital Forensics and Cyber Crime Datamining 被引量:2
12
作者 K. K. Sindhu B. B. Meshram 《Journal of Information Security》 2012年第3期196-201,共6页
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th... Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability. 展开更多
关键词 CYBER forensic DIGITAL forensic TOOL Network forensic TOOL CRIME Data MINING
在线阅读 下载PDF
A Survey of Blind Forensics Techniques for JPEG Image Tampering 被引量:1
13
作者 Xueling Chu Haiming Li 《Journal of Computer and Communications》 2019年第10期1-13,共13页
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and... Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology. 展开更多
关键词 IMAGE forensics TAMPER Detection JPEG IMAGE forensics JPEG BLOCK Effect
在线阅读 下载PDF
Primary Exploration of Reliability Evaluation of Computer Live Forensics Model on Physical Memory Analysis 被引量:1
14
作者 Lian-Hai Wang Qiu-Liang Xu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第4期121-128,共8页
The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is ... The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is not effective in practice. In fact,memory images are usually acquired by using forensics tools instead of using snapshots. Therefore,the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper,we study the problem in a novel viewpoint. Firstly,several definitions about memory acquisition measure error are introduced to describe the trusty. Then,we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision,which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated,that is,it accounts for the whole error from 30% to 50%. 展开更多
关键词 digital investigation live forensics volatile memory acquisition trusted probability
在线阅读 下载PDF
Business English Talent Cultivation Research under the Background of Cross-border E-commerce 被引量:1
15
作者 刘聪 《海外英语》 2018年第18期246-247,共2页
The meteoric rise of cross-border e-commerce has become one of the pillars of our foreign trade, while the lack of quali-fied talents in the industry may restrict its benign development. This paper analyzes the major ... The meteoric rise of cross-border e-commerce has become one of the pillars of our foreign trade, while the lack of quali-fied talents in the industry may restrict its benign development. This paper analyzes the major problems existing in the BusinessEnglish talents cultivation in university, and offers advice for the construction of training modal for Business English talents basedon the cross-border e-commerce. 展开更多
关键词 Business English TALENT CULTIVATION cross-border E-COMMERCE
在线阅读 下载PDF
Problems in Cross-border E-commerce Export Trade in China & Countermeasure Analysis 被引量:3
16
作者 Yang Zhenhua Shen Qiang 《International Journal of Technology Management》 2015年第10期63-66,共4页
As an emerging industry in China, cross-border e-commerce has enjoyed the leap-forward development, along with increasingly prominent problems. This paper aims at finding out the problems and related roots that hinder... As an emerging industry in China, cross-border e-commerce has enjoyed the leap-forward development, along with increasingly prominent problems. This paper aims at finding out the problems and related roots that hinder its development, through conducting an analysis on the export development of cross-border e-commerce, in order to look for solutions and countermeasures in favor of its sound development and to promote the liberalization development of foreign trade in China. 展开更多
关键词 cross-border E-commerce Export cross-border Logistics cross-border E-commerce Supervision
在线阅读 下载PDF
Digital Forensics for Recoloring via Convolutional Neural Network 被引量:2
17
作者 Zhangyi Shen Feng Ding Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第1期1-16,共16页
As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.T... As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.Thus,in digital forensics,it is necessary to understand the manipulating history of images.That requires to verify all possible manipulations applied to images.Among all the image editing manipulations,recoloring is widely used to adjust or repaint the colors in images.The color information is an important visual information that image can deliver.Thus,it is necessary to guarantee the correctness of color in digital forensics.On the other hand,many image retouching or editing applications or software are equipped with recoloring function.This enables ordinary people without expertise of image processing to apply recoloring for images.Hence,in order to secure the color information of images,in this paper,a recoloring detection method is proposed.The method is based on convolutional neural network which is quite popular in recent years.Unlike the traditional linear classifier,the proposed method can be employed for binary classification as well as multiple labels classification.The classification performance of different structure for the proposed architecture is also investigated in this paper. 展开更多
关键词 Image forensics machine learning convolutional neural network recoloring
在线阅读 下载PDF
Median Filtering Forensics Scheme for Color Images Based on Quaternion Magnitude-Phase CNN 被引量:2
18
作者 Jinwei Wang Yang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第1期99-112,共14页
In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be proces... In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be processed in a holistic manner in the proposed scheme,which makes full use of the correlation between RGB channels.And due to the use of convolutional neural network,it can effectively avoid the one-sidedness of artificial features.Experimental results have shown the scheme’s improvement over the state-of-the-art scheme on the accuracy of color image median filtering detection. 展开更多
关键词 Quaternion transform convolutional neural network median filtering forensics color image
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部