期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Malware of Dynamic Behavior and Attack Patterns Using ATT&CK Framework
1
作者 Jong-Yih Kuo Ping-Feng Wang +1 位作者 Ti-Feng Hsieh Cheng-Hsuan Kuo 《Computer Modeling in Engineering & Sciences》 2025年第6期3133-3166,共34页
In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularl... In recent years,cyber threats have escalated across diverse sectors,with cybercrime syndicates increasingly exploiting system vulnerabilities.Traditional passive defense mechanisms have proven insufficient,particularly as Linux platforms—historically overlooked in favor of Windows—have emerged as frequent targets.According to Trend Micro,there has been a substantial increase in Linux-targeted malware,with ransomware attacks on Linux surpassing those on macOS.This alarming trend underscores the need for detection strategies specifically designed for Linux environments.To address this challenge,this study proposes a comprehensive malware detection framework tailored for Linux systems,integrating dynamic behavioral analysis with the semantic reasoning capabilities of large language models(LLMs).Malware samples are executed within sandbox environments to extract behavioral features such as system calls and command-line executions.These features are then systematically mapped to the MITRE ATT&CK framework,incorporating its defined data sources,data components,and Tactics,Techniques,and Procedures(TTPs).Two mapping constructs—Conceptual Definition Mapping and TTP Technical Keyword Mapping—are developed from official MITRE documentation.These resources are utilized to fine-tune an LLM,enabling it to semantically interpret complex behavioral patterns and infer associated attack techniques,including those employed by previously unknown malware variants.The resulting detection pipeline effectively bridges raw behavioral data with structured threat intelligence.Experimental evaluations confirm the efficacy of the proposed system,with the fine-tuned Gemma 2B model demonstrating significantly enhanced accuracy in associating behavioral features with ATT&CK-defined techniques.This study contributes a fully integrated Linux-specific detection framework,a novel approach for transforming unstructured behavioral data into actionable intelligence,improved interpretability of malicious behavior,and a scalable training process for future applications of LLMs in cybersecurity. 展开更多
关键词 Linux malware dynamic analysis behavior analysis behavioral feature ATT&CK SANDBOX large language model fine-tuning
在线阅读 下载PDF
Evaluation and Regulation of Medical Artificial Intelligence Applications in China
2
作者 Mao You Yue Xiao +3 位作者 Han Yao Xue-Qing Tian Li-Wei Shi Ying-Peng Qiu 《Chinese Medical Sciences Journal》 2025年第1期3-8,I0002,共7页
Amid the global wave of digital economy,China's medical artificial intelligence applications are rapidly advancing through technological innovation and policy support,while facing multifaceted evaluation and regul... Amid the global wave of digital economy,China's medical artificial intelligence applications are rapidly advancing through technological innovation and policy support,while facing multifaceted evaluation and regulatory challenges.The dynamic algorithm evolution undermines the consistency of assessment criteria,multimodal systems lack unified evaluation metrics,and conflicts persist between data sharing and privacy protection.To address these issues,the China National Health Development Research Center has established a value assessment framework for artificial intelligence medical technologies,formulated the country's first technical guideline for clinical evaluation,and validated their practicality through scenario-based pilot studies.Furthermore,this paper proposes introducing a"regulatory sandbox"model to test technical compliance in controlled environments,thereby balancing innovation incentives with risk governance. 展开更多
关键词 regulatory sandbox medical artificial intelligence health technology assessment
暂未订购
Regarding the Regulatory Sandbox Route and Mechanism for Governance of Artificial Intelligence 被引量:3
3
作者 Ye Xuanhan 《科技与法律(中英文)》 CSSCI 2024年第5期136-148,共13页
The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was... The main challenge in AI governance today is striking a balance between controlling AI dangers and fostering AI innovation.Regulators in a number of nations have progressively extended the regulatory sandbox,which was first implemented in the banking sector,to AI governance in an effort to reduce the conflict between regulation and innovation.The AI regulatory sandbox is a new and feasible route for AI governance in China that not only helps to manage the risks of technology application but also prevents inhibiting AI innovation.It keeps inventors'trial-and-error tolerance space inside the regulatory purview while offering a controlled setting for the development and testing of novel AI that hasn't yet been put on the market.By providing full-cycle governance of AI with the principles of agility and inclusive prudence,the regulatory sandbox offers an alternative to the conventional top-down hard regulation,expost regulation,and tight regulation.However,the current system also has inherent limitations and practical obstacles that need to be overcome by a more rational and effective approach.To achieve its positive impact on AI governance,the AI regulatory sandbox system should build and improve the access and exit mechanism,the coordination mechanism between the sandbox and personal information protection,and the mechanisms of exemption,disclosure,and communication. 展开更多
关键词 artificial intelligence governance regulatory sandbox agile regulation inclusive prudential regulation access and exit mechanism coordination mechanism
在线阅读 下载PDF
基于数字图像处理的平原城镇河网分形特征研究 被引量:5
4
作者 陈菁 刘昭辰 +3 位作者 陈丹 肖晨光 李建国 刘素芳 《水资源与水工程学报》 2016年第6期31-38,共8页
城镇河网分形特征反映了城镇水系分布密集度、城镇河网水面率与水系连通程度,对预测城镇水文趋势、旱涝抵御能力、水系及地貌演变等具有指导意义。本文以苏州吴江桃源镇河网为研究对象,基于数字图像处理技术,采用盒计数法和Sandbox法对... 城镇河网分形特征反映了城镇水系分布密集度、城镇河网水面率与水系连通程度,对预测城镇水文趋势、旱涝抵御能力、水系及地貌演变等具有指导意义。本文以苏州吴江桃源镇河网为研究对象,基于数字图像处理技术,采用盒计数法和Sandbox法对桃源镇河网的分形特征进行定量分析。结果表明:盒计数法和Sandbox法均较好地揭示了该地区河网分形特性,分维值分别为1.4085和1.7442。盒计数法12个标度下的栅格边长和非空盒数关系曲线呈外凸状,揭示了该地区分形规律随标度减小而减弱的特征;以5个随机点和形心为控制点,采用Sandbox法对河网骨架分形进行计算,揭示了不同点控制区域分形维数的差异性。Sandbox法分维较盒计数法精确,原因为盒计数法受到最小标度、分形体不规则性和边界效应的影响,因此可采用盒计数法的定性判别与Sandbox法的定量计算对城镇河网分维综合评价。桃源镇河网分形特征说明了该区域地貌平缓且土地被河网分割严重,其河网分维受制于河道离散、土地破碎与城镇化发展的矛盾。 展开更多
关键词 数字图像处理 河网水系 分形维数 盒计数法 Sandbox法
在线阅读 下载PDF
移动智能体技术的安全机制研究 被引量:2
5
作者 狄晓龙 庄镇泉 张仕山 《小型微型计算机系统》 CSCD 北大核心 2004年第4期493-496,共4页
移动智能体 (Mobile Agent)技术是分布式对象技术的扩展和加强 ,而是否具备高效合理的安全机制是其推广应用的关键 .本文从多方面讨论了移动智能体技术的安全问题 ,阐述了如何应用 Java安全机制解决移动智能体在驻留节点上的资源访问控... 移动智能体 (Mobile Agent)技术是分布式对象技术的扩展和加强 ,而是否具备高效合理的安全机制是其推广应用的关键 .本文从多方面讨论了移动智能体技术的安全问题 ,阐述了如何应用 Java安全机制解决移动智能体在驻留节点上的资源访问控制问题 。 展开更多
关键词 移动智能体 安全机制 SANDBOX 密码技术
在线阅读 下载PDF
初始状态对自组织演化过程的影响 被引量:2
6
作者 苏亚凤 李普选 +1 位作者 徐忠锋 张孝林 《大学物理实验》 2015年第2期60-65,共6页
从实验上系统研究了在强电场下处于介质中的大量金属小球从不同初始状态通过自组织演化为分形的过程;用Sandbox方法定量分析了最终形成的稳定树枝状分形的维数。结果表明:不同初始状态形成分形的过程完全不同,但最终的树枝状分形的维数... 从实验上系统研究了在强电场下处于介质中的大量金属小球从不同初始状态通过自组织演化为分形的过程;用Sandbox方法定量分析了最终形成的稳定树枝状分形的维数。结果表明:不同初始状态形成分形的过程完全不同,但最终的树枝状分形的维数基本相同。分析认为,小球之间的相互作用存在临界作用距离,不同初始状态相邻小球之间的平均间距不同,因而演化过程不同;而维数相同正是系统耗散相同的体现。 展开更多
关键词 自组织 分形 Sandbox方法 分维数
在线阅读 下载PDF
Sandbox法求沥青混合料空隙分形维数 被引量:1
7
作者 于江 张帆 《公路工程》 北大核心 2015年第1期68-71,132,共5页
将沥青混合料横向剖切面图像用Matlab软件处理,分割出空隙的二值化图像并计算空隙分维数。在求沥青混合料空隙分维数时大多采用计盒维数法,然而此方法在网格划分的过程中对图像的尺寸有严格要求,并且背景区域对沥青混合料横向剖切面图... 将沥青混合料横向剖切面图像用Matlab软件处理,分割出空隙的二值化图像并计算空隙分维数。在求沥青混合料空隙分维数时大多采用计盒维数法,然而此方法在网格划分的过程中对图像的尺寸有严格要求,并且背景区域对沥青混合料横向剖切面图像的计算结果有一定的影响。为此提出采用Sandbox法求空隙分维数,不用考虑网格划分及背景区域对分维数的影响,且能真实的表达出沥青混合料横向剖切面空隙分维数的实际意义。通过Matlab编程运算,用Sandbox法求沥青混合料横向剖切面的空隙分维数为1.146,其结果符合多数文献中给出的范围,其求解过程更加简单方便,值得研究和推广运用。 展开更多
关键词 公路工程 空隙分形维数 Sandbox法 沥青混合料图像 计盒维数法
在线阅读 下载PDF
The nature and sources of international variation in formal institutions related to initial coin offerings:preliminary findings and a research agenda
8
作者 Nir Kshetri 《Financial Innovation》 2023年第1期281-318,共38页
As prior researchers have suggested,a firm’s success in an international market depends on how well its strategy fits the nonmarket environment,such as formal institutions.This paper examines the determinants of form... As prior researchers have suggested,a firm’s success in an international market depends on how well its strategy fits the nonmarket environment,such as formal institutions.This paper examines the determinants of formal institutions around new areas of economic activities.Specifically,we propose a framework for understanding how the quality of formal institutions in promoting entrepreneurship drives the focus of such institutions concerning initial coin offering(ICO),which is emerging as a popular fundraising method.The paper uses inductive analysis to examine how nonmarket factors—such as a jurisdiction’s tax haven nature,regulators’perceptions of ICOs as threats to national or political interests,and trade and industry associations—might moderate the relationship between the quality of institutions and the focus of such institutions regarding ICOs.One of this study’s key findings is that an economy’s quality of entrepreneurship-related institutions,perceived threats to national/political interests,and tax haven nature lead to different policy orientations.Consequently,regulators assign different importance when promoting crypto-entrepreneurship and dealing with associated risks.Regulators focusing mainly on promoting crypto-ventures have taken measures to enrich the blockchain ecosystem and provided tax and non-tax incentives to attract such ventures.Regulators focusing mainly on dealing with crypto-venture risks rely on a regulatory sandbox and close regulatory monitoring of such ventures. 展开更多
关键词 Blockchain Cryptocurrencies Crypto-ventures Initial coin offerings Regulatory sandboxes Tax havens
在线阅读 下载PDF
树状分形结构的计算机模拟 被引量:1
9
作者 范德力 蒋绍周 林达斌 《大学物理》 北大核心 2017年第7期74-76,81,共4页
运用扩散有限凝聚模型模拟在直角网格、正三角形网格、正六边形网格中的树状分形结构.此外,为消除运动方向所带来的影响,以金属小球在电场中运动来模拟树状分形结构的生成.对不同线电荷密度的模拟结果利用Sandbox方法计算相应的分维数,... 运用扩散有限凝聚模型模拟在直角网格、正三角形网格、正六边形网格中的树状分形结构.此外,为消除运动方向所带来的影响,以金属小球在电场中运动来模拟树状分形结构的生成.对不同线电荷密度的模拟结果利用Sandbox方法计算相应的分维数,得到分维数随着线电荷密度的增加而减少的现象符合已有实验的结果. 展开更多
关键词 DLA分形 树状结构模拟 Sandbox方法
在线阅读 下载PDF
Sandbox modeling of fault formation and evolution in the Weixinan Sag, Beibuwan Basin, China 被引量:9
10
作者 Tong Hengmao 《Petroleum Science》 SCIE CAS CSCD 2012年第2期121-128,共8页
Fault formation and evolution in the presence of multiple pre-existing weaknesses has not been investigated extensively in rift basins. The fault systems of Weixinan Sag, Beibuwan Basin of China, which is fully covere... Fault formation and evolution in the presence of multiple pre-existing weaknesses has not been investigated extensively in rift basins. The fault systems of Weixinan Sag, Beibuwan Basin of China, which is fully covered with high-precision 3-D seismic data and is rich in oil-gas resources, have been successfully reproduced by sandbox modeling in this study with inclusion of multiple pre-existing weaknesses in the experimental model. The basic characteristics of fault formation and evolution revealed by sandbox modeling are as follows. 1) Weakness-reactivation faults and weakness-related faults are formed much earlier than the distant-weakness faults (faults far away from and with little or no relationship to the weakness). 2) Weakness-reactivation faults and weakness-related faults develop mainly along or parallel to a pre-existing weakness, while distant-weakness faults develop nearly perpendicular to the extension direction. A complicated fault system can be formed in a fixed direction of extension with the existence of multiple pre-existing weaknesses, and the complicated fault system in the Weixinan Sag formed gradually in a nearly N-S direction with multiple pre-existing weaknesses. 3) The increase in the length and number of faults is closely tied to the nature of pre-existing weaknesses. The sandbox model may provide a new clue to detailed fault system research for oil and gas exploration in rift basins. 展开更多
关键词 Fault system rift basin multiple pre-existing weaknesses Weixinan Sag sandbox modeling
原文传递
Sandbox Modeling of the Fault-increment Pattern in Extensional Basins 被引量:6
11
作者 Geng Changbo Tong Hengmao +1 位作者 He Yudan Wei Chunguang 《Petroleum Science》 SCIE CAS CSCD 2007年第2期29-34,共6页
Three series of sandbox modeling experiments were performed to study the fault-increment pattern in extensional basins. Experimental results showed that the tectonic action mode of boundaries and the shape of major bo... Three series of sandbox modeling experiments were performed to study the fault-increment pattern in extensional basins. Experimental results showed that the tectonic action mode of boundaries and the shape of major boundary faults control the formation and evolution of faults in extensional basins. In the process of extensional deformation, the increase in the number and length of faults was episodic, and every 'episode' experienced three periods, strain-accumulation period, quick fault-increment period and strain-adjustment period. The more complex the shape of the boundary fault, the higher the strain increment each 'episode' experienced. Different extensional modes resulted in different fault-increment patterns. The horizontal detachment extensional mode has the 'linear' style of fault-increment pattern, while the extensional mode controlled by a listric fault has the 'stepwise' style of fault-increment pattern, and the extensional mode controlled by a ramp-flat boundary fault has the 'stepwise-linear' style of fault-increment pattern. These fault-increment patterns given above could provide a theoretical method of fault interpretation and fracture prediction in extensional basins. 展开更多
关键词 Extensional basin sandbox modeling fault-increment pattern boundary fault
原文传递
Design and Implementation of Open Source Online Evaluation System Based on Cloud Platform 被引量:1
12
作者 Zuwei Tian Shubo Tian +2 位作者 Tuo Wang Zhen Gong Zhenqin Jiang 《Journal on Big Data》 2020年第3期117-123,共7页
In order to provide a good practice platform for the program design contestants and algorithm enthusiasts,this paper designs and implements a programming online evaluation system based on cloud platform,which is a web... In order to provide a good practice platform for the program design contestants and algorithm enthusiasts,this paper designs and implements a programming online evaluation system based on cloud platform,which is a web system that can return the test results of the program source codes submitted by users in real time.It realizes the automatic evaluation of the program design training questions.The system is implemented by the way of front-end and back-end separation and modular programming.The front-end of the web is implemented by Vue framework,the back-end is implemented by Django framework.The judgment core is written in C language for the sake of improving the efficiency of the system.Sandbox technology is used to ensure the security of the judgment system.Experimental results show that the system can meet the need of daily teaching and competition. 展开更多
关键词 Online judge system Vue framework Django framework SANDBOX
在线阅读 下载PDF
Universe Sandbox^2软件在地理教学中的应用探究 被引量:1
13
作者 宋少威 《地理教学》 2021年第2期42-44,共3页
Universe Sandbox^2软件可以提供各种天体的质量、天体年龄、表面温度、自转周期等各类实时运转详细数据,它的最大的特点是可以自行修改初始参数或者自定义创造天体系统。Universe Sandbox^2软件不仅是一款可以模拟近似真实宇宙环境的软... Universe Sandbox^2软件可以提供各种天体的质量、天体年龄、表面温度、自转周期等各类实时运转详细数据,它的最大的特点是可以自行修改初始参数或者自定义创造天体系统。Universe Sandbox^2软件不仅是一款可以模拟近似真实宇宙环境的软件,而且还是一款可以帮助学生建立时空观、有效突破教学难点的软件。因此,它为师生教学提供了一个了解天体、了解宇宙的良好平台。 展开更多
关键词 Universe Sandbox2 地理教学 应用实例
在线阅读 下载PDF
基于AR Sandbox的中学地理可视化教学及应用示范 被引量:2
14
作者 王夏青 周芳 +3 位作者 米元 邹小燕 喻伟建 王海珍 《中国教育技术装备》 2019年第21期32-34,37,共4页
AR Sandbox有助于学生对地理环境的手动实践操作和实时监控,是实现可视化教学的理想平台。介绍AR Sandbox平台基本原理及应用优势,并以中学地理"等高线地形图的判读"章节的教学案例作为应用示范,希望能为今后AR Sandbox在国... AR Sandbox有助于学生对地理环境的手动实践操作和实时监控,是实现可视化教学的理想平台。介绍AR Sandbox平台基本原理及应用优势,并以中学地理"等高线地形图的判读"章节的教学案例作为应用示范,希望能为今后AR Sandbox在国内中学地理教学中的应用提供理论依据和科学参考。 展开更多
关键词 AR SANDBOX 3D模型 可视化教学 中学地理 等高线
在线阅读 下载PDF
Estimating the change of porosity in the saturated zone during air sparging
15
作者 Yih-jin Tsai Yu-chia Kuo +1 位作者 Tsu-chi Chen Feng-chih Chou 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2006年第4期675-679,共5页
Air sparging is a remedial method for groundwater. The remedial region is similar to the air flow region in the saturated zone. If soil particles are transported during air sparging, the porosity distributions in the ... Air sparging is a remedial method for groundwater. The remedial region is similar to the air flow region in the saturated zone. If soil particles are transported during air sparging, the porosity distributions in the saturated zone change, which may alter the flow path of the air. To understand better the particle movement, this study performed a sandbox test to estimate the soil porosity change during air sparging. A clear fracture was formed and the phenomenon of particle movement was observed when the air injection was started. The moved sand filled the porous around the fracture and the reparked sand filled the fracture, reducing the porosity around the fracture. The results obtained from the photographs of the sandbox, the current measurements and the direct sand sample measurements were close to each other and are credible. Therefore, air injection during air sparging causes sand particle movement of sand, altering the characteristic of the sand matrix and the air distribution. 展开更多
关键词 air sparging sandbox test particle movement current measurement
在线阅读 下载PDF
Sandbox Experi mental Study on the Influence of Rock Strength and Gravity on Formation of Thrusts
16
作者 魏春光 周建勋 何雨丹 《Journal of China University of Geosciences》 SCIE CSCD 2006年第1期43-48,共6页
A sandbox experiment model was designed to simulate how differences in rock strength and gravity between two blocks can influence the formation characteristics of thrusts. In the experiment the compression was from on... A sandbox experiment model was designed to simulate how differences in rock strength and gravity between two blocks can influence the formation characteristics of thrusts. In the experiment the compression was from one direction with basement shortening and the initial surfaces of the model were oblique. The results show that if the initial surface was horizontal or the slope angle was smaller than 7°, the compression induced two groups of thrusts with opposite dip orientations. If the slope angle of the initial surface was greater than 7°, the compression induced only one group of thrusts with a dip orientation contrary to the original compression direction. This result is similar to the actual section of a collision zone between two continental blocks. By applying stress analysis, rock strength is shown to be an important factor in deformation. As other boundary conditions are changeless, it is the change of gravitational potential energy that leads to different deformation styles. 展开更多
关键词 sandbox experiment STRENGTH surface slope THRUSTS energy GRAVITY
在线阅读 下载PDF
A User-friendly Model for Ransomware Analysis Using Sandboxing
17
作者 Akhtar Kamal Morched Derbali +5 位作者 Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第6期3833-3846,共14页
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including... Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker.There have been several reported high-profile ransomware attacks including WannaCry,Petya,and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world.The analysis of ransomware is often carried out via sandbox environments;however,the initial setup and configuration of such environments is a challenging task.Also,it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis tools.In this research work,we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware attacks.Also,we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer user.Our model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized reports.In addition,for evaluating the usability and accessibility of our proposed model,we conduct a comprehensive user survey consisting of participants from various fields,e.g.,professional developers from software houses,people from academia(professors,students).Our evaluation results demonstrate a positive feedback of approximately 92%on the usability of our proposed model. 展开更多
关键词 Ransomware SANDBOX user-friendly model SURVEY
在线阅读 下载PDF
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
18
作者 Nick Rahimi John Nolen Bidyut Gupta 《Journal of Information Security》 2019年第2期91-102,共12页
The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have... The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at the forefront of communication and information, people have resorted to the use of mobile phones with a great percentile preferring android oriented systems. Similarly, the systems are susceptible to the various threats posed by technology with due summations showing that security flaws and unauthorized access to sensitive data pose a huge threat to the overarching efficacy of the android systems. The research presented lays a primal focus on how users can improve intrinsic android features through the use of Google services, rooting, custom kernels and ROM techniques. The research also focused on how Android security features can be improved when using or installing applications. Results indicate that the rooting process is the most conclusive and safest scheme. Summations drawn are indicative of the fact that system security is a moot research topic that requires further research into how it can be improved. 展开更多
关键词 ANDROID SECURITY SANDBOX BRICKING Firmware ROOTING
暂未订购
Laws and Ethics Policy of Self-driving Cars in Taiwan
19
作者 Li-Ching Chang 《Journal of Mechanics Engineering and Automation》 2021年第5期149-157,共9页
Countries have invested considerable sums of human capital and material resources in the practical application of self-driving cars demonstrating the impressive market opportunity.In light of this trend,Taiwan does no... Countries have invested considerable sums of human capital and material resources in the practical application of self-driving cars demonstrating the impressive market opportunity.In light of this trend,Taiwan does not want to fall behind either.As on-road testing and technological development for self-driving cars continue to develop in different countries,the controversial issues of safety,ethics,liability,and the invasion of privacy continue to emerge.In order to resolve these issues,the government of Taiwan seeks to provide a good environment for AI(artificial intelligence)innovation and applications.This article summarizes and highlights relevant content and key points of Unmanned Vehicles Technology Innovative Experimentation Act,which was legislated in Taiwan in 2018.In addition,it points out the fundamental ethics regulation of AI,which has influenced Taiwan legal policy. 展开更多
关键词 AI Unmanned Vehicles Technology Innovative Experimentation Act self-driving cars ethics guideline regulatory sandbox
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部