收藏成功
(推荐电脑端登录)
右上角查看我的术语->我的标签
| 原文 | 译文 | 详情 |
|---|---|---|
| AI大模型 | AI large model | - |
| AI | AI | - |
| 数据安全 | Data Security | - |
| Security | Security | - |
| 模型应用 | Model application | - |
| AI大模型 | AI large model | - |
| 信息智能 | Information intelligence | - |
| AI大模型 | AI large model | - |
| AI | AI | - |
| 王绍兰 | Wang Shaolan | - |
| AI | AI | - |
| 数据安全 | Data Security | - |
| 中央网信办 | Central Cyberspace Administration of China | - |
| 数据安全 | Data Security | - |
| 安全领域 | Security area | - |
| Security | Security | - |
| Security | Security | - |
| 智能体 | Agent | - |
| 模型应用 | Model application | - |
| 模型应用 | Model application | - |
| 攻击者 | Attacker | - |
| 信息智能 | Information intelligence | - |
| 信息智能 | Information intelligence | - |
| 安全威胁 | Security threat | - |
| 王绍兰 | Wang Shaolan | - |
| 王绍兰 | Wang Shaolan | - |
| 中央网信办 | Central Cyberspace Administration of China | - |
| 陈奋 | Chen Fen | - |
| 中央网信办 | Central Cyberspace Administration of China | - |
| 安全领域 | Security area | - |
| 模型安全 | Model Security | - |
| 安全领域 | Security area | - |
| 智能体 | Agent | - |
| 安全保护 | Safety Protection | - |
| 攻击者 | Attacker | - |
| 智能体 | Agent | - |
| 安全防护 | Safety Protection | - |
| 安全威胁 | Security threat | - |
| 攻击者 | Attacker | - |
| 安全问题 | Security issues | - |
| 陈奋 | Chen Fen | - |
| 安全威胁 | Security threat | - |
| 网络安全 | Network security | - |
| 模型安全 | Model Security | - |
| 攻防 | Offensive and defensive | - |
| 陈奋 | Chen Fen | - |
| 安全保护 | Safety Protection | - |
| 解释性 | Explanatory | - |
| 模型安全 | Model Security | - |
| 安全防护 | Safety Protection | - |
| 张亚勤 | Zhang Yaqin | - |
| 安全问题 | Security issues | - |
| 安全保护 | Safety Protection | - |
| 重要趋势 | Important trends | - |
| 网络安全 | Network security | - |
| 安全防护 | Safety Protection | - |
| 网络攻击 | Cyber attack | - |
| 攻防 | Offensive and defensive | - |
| 安全问题 | Security issues | - |
| 应用安全 | Application Security | - |
| 解释性 | Explanatory | - |
| 网络安全 | Network security | - |
| 张亚勤 | Zhang Yaqin | - |
| 可解释性 | Interpretability | - |
| 攻防 | Offensive and defensive | - |
| 重要趋势 | Important trends | - |
| 新一轮 | A new round | - |
| 网络攻击 | Cyber attack | - |
| 解释性 | Explanatory | - |
| 模型技术 | Modeling technique | - |
| 应用安全 | Application Security | - |
| 亚信 | AsiaInfo | - |
| 张亚勤 | Zhang Yaqin | - |
| 可解释性 | Interpretability | - |
| AGI | AGI | - |
| 重要趋势 | Important trends | - |
| 新一轮 | A new round | - |
| Paloalto | Paloalto | - |
| 网络攻击 | Cyber attack | - |
| 模型技术 | Modeling technique | - |
| 应用安全 | Application Security | - |
| 亚信 | AsiaInfo | - |
| AGI | AGI | - |
| 可解释性 | Interpretability | - |
| Paloalto | Paloalto | - |
| 新一轮 | A new round | - |
| 模型技术 | Modeling technique | - |
| 亚信 | AsiaInfo | - |
| AGI | AGI | - |
| Paloalto | Paloalto | - |
收藏成功
(推荐电脑端登录)
右上角查看我的术语->我的标签