Application of Artificial Intelligence Technology in Network Security Protection of Power Enterprise
Yong Fu*
Abstract | References | PDF | HTML | Pub. Date: Dec 30, 2025
DOI: 10.23977/jaip.2025.080407 | Downloads: 3 | Views: 185
A Four-Layer Security Governance Framework for LLM-Based AI Agents
Yiang Gao*, Shanshan Wu
Abstract | References | PDF | HTML | Pub. Date: Dec 29, 2025
DOI: 10.23977/jaip.2025.080406 | Downloads: 16 | Views: 467
AI-Driven Reverse Engineering of Biomimetic Structures via GNN-GAN Synergy
Baixin Pan*
Abstract | References | PDF | HTML | Pub. Date: Dec 26, 2025
DOI: 10.23977/jaip.2025.080405 | Downloads: 7 | Views: 232
NF-Net: Crowd Counting Based on Near-Far Network and Dynamic Dual Attention Mechanism
Zhang Dongming, Tian Xueqing*, Zhao Wenhui, Guo Yihan, Chen Lijia
Abstract | References | PDF | HTML | Pub. Date: Dec 2, 2025
DOI: 10.23977/jaip.2025.080404 | Downloads: 10 | Views: 333
Cloud Computing Environment: Research on Big Data Security and Privacy Protection Strategies
Shenpeiyilin*
Abstract | References | PDF | HTML | Pub. Date: Dec 1, 2025
DOI: 10.23977/jaip.2025.080403 | Downloads: 14 | Views: 334
Adaptive Inspection Path Planning Algorithm for Oil Pipeline Robots Driven by Fluid Kinetic Energy
Xiaomin Shan*, Hongyue Peng
Abstract | References | PDF | HTML | Pub. Date: Nov 28, 2025
DOI: 10.23977/jaip.2025.080402 | Downloads: 6 | Views: 298
Hybrid Detection Method for Concrete Cracks Based on Maskr-CNN and Swin Transformer
Hongbo Luo*, Xiangyuan Ma, Fan Yu
Abstract | References | PDF | HTML | Pub. Date: Nov 27, 2025
DOI: 10.23977/jaip.2025.080401 | Downloads: 14 | Views: 323
















































