<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-insurance-technology-wins-first-place-in-fine-grained-dialogue-social-bias-detection-at-nlpcc-2023-a10fabaf6fbc</loc>
    <lastmod>2026-03-31T10:32:54Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ai-visual-anti-fraud-model-battles-qr-code-abuse-in-the-beverage-industry-b3ee8bf6c1ec</loc>
    <lastmod>2026-03-31T10:32:47Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-open-sources-the-trusted-privacy-computing-framework-yinyu-and-outlines-its-role-in-the-emerging-data-confidentiality-era-e51215e97a67</loc>
    <lastmod>2026-03-31T10:32:34Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/trusted-ai-research-at-ant-group-advances-in-computer-vision-watermark-defense-robust-machine-learning-and-explainable-nlg-8b87710d5539</loc>
    <lastmod>2026-03-31T10:32:32Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/trusted-privacy-computing-research-report-2022-definition-core-elements-and-industry-outlook-d5d7ba28d9bc</loc>
    <lastmod>2026-03-31T10:32:32Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/trusted-environment-based-cryptographic-computing-tecc-security-performance-and-application-overview-5204c9517a18</loc>
    <lastmod>2026-03-31T10:32:30Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/hyperenclave-an-open-and-cross-platform-trusted-execution-environment-ead33b459321</loc>
    <lastmod>2026-03-31T10:32:28Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-open-sources-trusted-privacy-computing-framework-yinyu-perspectives-from-academics-and-industry-leaders-dd4d9d6d8024</loc>
    <lastmod>2026-03-31T10:32:26Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/introducing-ceresdb-an-open-source-distributed-high-performance-time-series-database-13ede672ceaf</loc>
    <lastmod>2026-03-31T10:32:20Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/open-source-core-infrastructure-ant-group-s-strategy-and-key-projects-2435903a21e8</loc>
    <lastmod>2026-03-31T10:32:18Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/interview-with-ant-group-s-trusted-native-team-cloud-native-infrastructure-service-mesh-secure-containers-and-confidential-computing-b5522071ebee</loc>
    <lastmod>2026-03-31T10:32:16Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-s-full-graph-risk-control-architecture-and-its-application-in-combating-complex-fraud-b0fc16c09e1b</loc>
    <lastmod>2026-03-31T10:32:16Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/green-computing-strategies-and-cloud-native-architecture-at-the-2022-china-computing-power-conference-eccd0551c6de</loc>
    <lastmod>2026-03-31T10:32:14Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/oceanbase-4-0-core-technology-overview-004e53d87dbd</loc>
    <lastmod>2026-03-31T10:32:06Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-financial-s-end-to-end-mobile-security-architecture-and-future-trends-15d6b0daa6cd</loc>
    <lastmod>2026-03-31T10:32:01Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/interview-on-the-origin-strategy-and-product-positioning-of-yuque-2295b1fe5455</loc>
    <lastmod>2026-03-31T10:32:01Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-wins-idc-china-digital-finance-innovation-awards-for-ai-powered-anti-fraud-system-and-secure-medical-claim-solutions-006d92b5ebf3</loc>
    <lastmod>2026-03-31T10:32:01Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/intelligent-risk-control-enters-the-10-millisecond-era-b3b9591879c2</loc>
    <lastmod>2026-03-31T10:31:59Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/insights-from-the-beijing-graph-computing-seminar-industry-academia-collaboration-and-future-directions-a8ec8049a060</loc>
    <lastmod>2026-03-31T10:31:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/highlights-from-the-2022-world-ai-conference-graph-computing-privacy-computing-ai-safety-and-new-open-platforms-92298cddcdcf</loc>
    <lastmod>2026-03-31T10:31:39Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-security-lab-wins-two-golds-and-one-silver-at-kdd-cup-2022-with-advanced-keyword-extraction-and-self-distillation-for-product-search-72ae77015f08</loc>
    <lastmod>2026-03-31T10:31:37Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/highlights-of-the-2022-world-ai-conference-graph-intelligence-forum-in-shanghai-4ac41a46814e</loc>
    <lastmod>2026-03-31T10:31:36Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/trusted-privacy-computing-summit-at-the-2022-world-ai-conference-highlights-security-challenges-and-future-directions-0a0754f4e88e</loc>
    <lastmod>2026-03-31T10:31:34Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/privacy-preserving-vertical-federated-graph-neural-network-for-node-classification-166ef72bf9ce</loc>
    <lastmod>2026-03-31T10:31:25Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/2022-china-graph-computing-technology-and-application-development-research-report-overview-085d81f4844c</loc>
    <lastmod>2026-03-31T10:31:23Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/secretflow-open-source-privacy-computing-framework-releases-version-0-7-with-enhanced-mpc-federated-learning-and-performance-optimizations-86e69e18138c</loc>
    <lastmod>2026-03-31T10:31:16Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/releasing-security-technology-productivity-building-a-new-security-system-for-digital-physical-fusion-bcdfe3f7c493</loc>
    <lastmod>2026-03-31T10:31:16Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-s-research-institute-publishes-four-neurips-2022-papers-on-advanced-computer-vision-and-ai-547b14503e00</loc>
    <lastmod>2026-03-31T10:31:13Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/advancing-trustworthy-ai-to-industrial-scale-applications-insights-from-ant-group-1983ef3fd85c</loc>
    <lastmod>2026-03-31T10:31:13Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/oceanbase-distributed-architecture-high-performance-storage-engine-paxos-based-2pc-and-record-breaking-tpc-c-benchmarks-b650fb7df1b3</loc>
    <lastmod>2026-03-31T10:31:13Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/trusted-environment-based-cryptographic-computing-tecc-white-paper-overview-and-technical-architecture-5f3e4538470f</loc>
    <lastmod>2026-03-31T10:31:11Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-s-2022-technical-highlights-open-source-privacy-computing-oceanbase-4-0-ai-security-and-research-achievements-6b0903030700</loc>
    <lastmod>2026-03-31T10:31:05Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/sky-computing-a-multi-cloud-computing-platform-for-transparent-resource-utilization-344ae128ffcc</loc>
    <lastmod>2026-03-31T10:31:05Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/in-depth-analysis-of-hyper-v-directx-attack-surface-and-related-cves-89ae91d9b1be</loc>
    <lastmod>2026-03-31T10:31:00Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/automated-attacker-a-for-enhancing-model-robustness-in-adversarial-training-4c8cf23506ae</loc>
    <lastmod>2026-03-31T10:30:57Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/advanced-rule-learning-constraint-adaptive-frameworks-and-semi-supervised-data-augmentation-for-fraud-detection-and-imbalanced-ranking-d5e8d5a84451</loc>
    <lastmod>2026-03-31T10:30:51Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/deepscaling-an-automated-capacity-evaluation-system-for-stable-cpu-utilization-in-large-scale-cloud-services-d73252cb1ac9</loc>
    <lastmod>2026-03-31T10:30:51Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/effectively-generating-vulnerable-transaction-sequences-in-smart-contracts-with-reinforcement-learning-guided-fuzzing-bedc4dbc1ea7</loc>
    <lastmod>2026-03-31T10:30:49Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/antdtx-middleware-and-collaborative-anti-fraud-efforts-with-vivo-insights-from-ant-security-lab-60dd8ae5b7dc</loc>
    <lastmod>2026-03-31T10:30:49Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-and-china-university-of-mining-and-technology-hold-blockchain-security-teacher-training-b772c85ee88f</loc>
    <lastmod>2026-03-31T10:30:42Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/an-adaptive-framework-for-confidence-constraint-rule-set-learning-in-large-datasets-2f6dd0a1c810</loc>
    <lastmod>2026-03-31T10:30:42Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/four-aaai-23-papers-from-ant-security-lab-on-adversarial-3d-point-clouds-gnn-based-anti-money-laundering-spiking-neural-network-dynamic-graph-learning-and-differential-private-adaptive-clipping-ba98612d1cdf</loc>
    <lastmod>2026-03-31T10:30:34Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/privacy-preserving-machine-learning-for-ai-and-big-data-using-intel-sgx-occlum-and-bigdl-ppml-4ed1c62ae9e0</loc>
    <lastmod>2026-03-31T10:30:34Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ieee-launches-trusted-enclave-computing-tecc-standard-initiative-led-by-ant-group-78f0cb633381</loc>
    <lastmod>2026-03-31T10:30:30Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-s-open-source-cryptographic-library-tongsuo-receives-national-commercial-cryptography-certification-f0884cca140e</loc>
    <lastmod>2026-03-31T10:30:30Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/occlum-v1-0-open-source-trusted-execution-environment-os-with-major-performance-gains-and-spark-big-data-integration-f8eeb31c9ec7</loc>
    <lastmod>2026-03-31T10:30:30Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-anti-intrusion-platform-architecture-trillion-scale-detection-risk-assessment-and-automated-response-2c804ed008ac</loc>
    <lastmod>2026-03-31T10:30:27Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/transvcl-attention-enhanced-video-copy-localization-network-with-flexible-supervision-95e37e361214</loc>
    <lastmod>2026-03-31T10:30:19Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/from-plaintext-to-data-in-encryption-the-emerging-era-of-data-and-trusted-privacy-computing-b07ab9b5cc87</loc>
    <lastmod>2026-03-31T10:30:16Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/post-cloud-native-era-scalable-operations-challenges-and-the-kusionstack-solution-353b7b5335e2</loc>
    <lastmod>2026-03-31T10:30:14Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/towards-smooth-video-composition-a-new-benchmark-for-gan-based-video-generation-a78193069f63</loc>
    <lastmod>2026-03-31T10:30:12Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/antsec-mlops-building-a-scalable-automated-and-trustworthy-ai-risk-control-platform-f297bfc4ed3f</loc>
    <lastmod>2026-03-31T10:30:06Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-and-hkust-win-acm-sigplan-distinguished-paper-award-for-complexity-guided-container-replacement-synthesis-at-oopsla-2022-d91bf48ef88d</loc>
    <lastmod>2026-03-31T10:30:03Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/insights-on-green-computing-challenges-trends-and-solutions-from-ant-group-and-academia-5aaff1ac46d0</loc>
    <lastmod>2026-03-31T10:30:03Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/overview-of-the-financial-big-data-anti-fraud-technology-whitepaper-a7e776f2f0e8</loc>
    <lastmod>2026-03-31T10:30:03Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/release-of-the-first-open-white-box-protocol-for-privacy-computing-ecdh-psi-interconnection-protocol-53200c85f393</loc>
    <lastmod>2026-03-31T10:30:00Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ray-the-distributed-framework-powering-the-next-generation-of-generative-ai-9c8a88422fde</loc>
    <lastmod>2026-03-31T10:30:00Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/green-computing-accelerating-low-carbon-digital-transformation-and-talent-development-in-china-40ff1a7bb052</loc>
    <lastmod>2026-03-31T10:29:53Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-security-s-tianjian-content-risk-control-system-receives-five-star-rating-in-2022-content-review-service-evaluation-16fcd37db2fc</loc>
    <lastmod>2026-03-31T10:29:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-and-renmin-university-conclude-blockchain-legal-teaching-and-curriculum-reform-project-winning-beijing-higher-education-teaching-achievement-award-2b022cd253f8</loc>
    <lastmod>2026-03-31T10:29:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/evolution-of-ant-group-s-risk-control-platforms-and-data-security-strategies-ce863fb6e0ac</loc>
    <lastmod>2026-03-31T10:29:48Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/cougar-a-general-framework-for-jobs-optimization-in-cloud-118499f6cabc</loc>
    <lastmod>2026-03-31T10:29:41Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/introduction-to-holoinsight-a-cloud-native-lightweight-observability-platform-c95f26cf789d</loc>
    <lastmod>2026-03-31T10:29:37Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ceresdb-1-0-release-cloud-native-time-series-database-design-features-and-performance-evaluation-9f5d5c03c286</loc>
    <lastmod>2026-03-31T10:29:35Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ccf-ant-group-green-computing-research-fund-2022-selected-projects-and-academic-exchange-057b9f9a982b</loc>
    <lastmod>2026-03-31T10:29:32Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/thoughts-on-the-next-generation-ai-infrastructure-green-and-shared-model-as-a-service-d0814d03cf28</loc>
    <lastmod>2026-03-31T10:29:30Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/large-scale-complex-heterogeneous-graph-data-intelligent-analysis-technology-wins-2022-ciee-science-and-technology-award-c37c6a305543</loc>
    <lastmod>2026-03-31T10:29:28Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/introducing-scql-secure-collaborative-query-language-for-privacy-preserving-data-analysis-de934d21c13a</loc>
    <lastmod>2026-03-31T10:29:21Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/web-photo-source-identification-based-on-neural-enhanced-camera-fingerprint-12f79cbcdd22</loc>
    <lastmod>2026-03-31T10:29:18Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/oddfuzz-discovering-java-deserialization-vulnerabilities-via-structure-aware-directed-greybox-fuzzing-e085e3596357</loc>
    <lastmod>2026-03-31T10:29:10Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-technology-research-institute-interactive-intelligence-lab-13-papers-accepted-at-cvpr-2023-and-recent-ai-research-highlights-a5da8806ef0f</loc>
    <lastmod>2026-03-31T10:29:07Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-launches-cybersecurity-student-innovation-funding-program-to-foster-industry-academia-collaboration-b66b6bab7b68</loc>
    <lastmod>2026-03-31T10:29:04Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/first-batch-of-multi-party-secure-computation-fintech-products-certified-by-beijing-national-fintech-certification-center-62c75fb5a4aa</loc>
    <lastmod>2026-03-31T10:29:04Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/sequence-oriented-dbms-fuzzing-with-lego-a-novel-database-vulnerability-discovery-approach-418db8cfaccf</loc>
    <lastmod>2026-03-31T10:28:55Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/future-of-databases-in-china-trends-history-and-benchmarking-204a47019348</loc>
    <lastmod>2026-03-31T10:28:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/exploring-chatgpt-for-smart-contract-vulnerability-detection-experiments-and-analysis-022925cb3bfe</loc>
    <lastmod>2026-03-31T10:28:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/distributed-identity-authentication-ant-group-s-blockchain-based-approach-and-ecosystem-a0c1212d75ab</loc>
    <lastmod>2026-03-31T10:28:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/threshold-proxy-re-encryption-tpre-with-national-cryptographic-algorithms-for-secure-data-sharing-4c52dedcee86</loc>
    <lastmod>2026-03-31T10:28:50Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-ospo-s-open-source-philosophy-from-an-infinite-game-to-strategic-practice-3e6a09f44e89</loc>
    <lastmod>2026-03-31T10:28:47Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-s-biometric-security-testing-lab-automated-detection-and-evaluation-of-fingerprint-and-face-recognition-systems-5b18f42e310e</loc>
    <lastmod>2026-03-31T10:28:41Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/brainwave-and-behavior-recognition-multi-modal-biometric-authentication-with-adversarial-contrastive-transfer-learning-012722c9fb04</loc>
    <lastmod>2026-03-31T10:28:31Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/introduction-to-chaosmeta-an-open-source-cloud-native-chaos-engineering-platform-633824798cd8</loc>
    <lastmod>2026-03-31T10:28:31Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/wu-wenjun-ai-science-and-technology-award-honors-tsinghua-and-ant-group-s-unconstrained-human-portrait-perception-and-understanding-technology-1c5dd1b33ac4</loc>
    <lastmod>2026-03-31T10:28:29Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/privacy-risks-and-differentially-private-defense-for-federated-knowledge-graph-representation-learning-507596c1f531</loc>
    <lastmod>2026-03-31T10:28:27Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/euler-protocol-defi-attack-detailed-analysis-reproduction-and-risk-assessment-52b4e8666733</loc>
    <lastmod>2026-03-31T10:28:20Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/detailed-analysis-of-the-tornado-cash-governance-attack-and-smart-contract-exploitation-2b139c2ca42c</loc>
    <lastmod>2026-03-31T10:28:20Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/fanglue-an-interactive-system-for-decision-rule-crafting-in-fraud-detection-5c4a917f9072</loc>
    <lastmod>2026-03-31T10:28:20Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/exploring-a-composite-data-security-governance-system-practices-from-ant-group-at-the-6th-digital-china-summit-a267903b75e8</loc>
    <lastmod>2026-03-31T10:28:17Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/flashbots-mev-bot-attack-on-ethereum-vulnerability-analysis-exploit-timeline-and-mitigation-b923a35c1f2c</loc>
    <lastmod>2026-03-31T10:28:10Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/research-report-on-interoperability-of-heterogeneous-trusted-execution-environments-in-financial-privacy-computing-67051e289832</loc>
    <lastmod>2026-03-31T10:28:08Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/secretflow-s-yinyu-1-0-release-new-mvp-deployment-package-expanded-architecture-and-full-stack-interoperability-0787d3e344d2</loc>
    <lastmod>2026-03-31T10:28:08Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/ant-group-announces-open-source-privacy-computing-framework-yinyu-1-0-and-the-first-domestic-financial-grade-tee-solution-hyperenclave-13410eac7cab</loc>
    <lastmod>2026-03-31T10:27:58Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/2023-trusted-ai-white-paper-overview-and-chapter-outline-bfbf62ecfd3c</loc>
    <lastmod>2026-03-31T10:27:53Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/achieving-full-stack-observability-for-cloud-and-on-premise-applications-with-ant-group-s-bos-platform-ed72aa00e8e8</loc>
    <lastmod>2026-03-31T10:27:51Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/open-privacy-computing-protocol-ss-lr-a-secret-sharing-based-logistic-regression-framework-81cf38d39298</loc>
    <lastmod>2026-03-31T10:27:44Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/altershield-an-open-source-change-management-platform-for-risk-control-and-observability-46203a3ddce2</loc>
    <lastmod>2026-03-31T10:27:44Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/kapacitystack-open-source-cloud-native-intelligent-capacity-management-and-ihpa-04725124bd6e</loc>
    <lastmod>2026-03-31T10:27:41Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/data-element-marketization-balancing-security-and-development-with-privacy-computing-and-trusted-cloud-infrastructure-63735d2aee62</loc>
    <lastmod>2026-03-31T10:27:41Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/hybrid-embedding-architecture-for-large-scale-sparse-ctr-models-b3c660983a92</loc>
    <lastmod>2026-03-31T10:27:39Z</lastmod>
  </url>
  <url>
    <loc>https://www.besthub.dev/articles/fury-a-high-performance-multi-language-serialization-framework-with-jit-compilation-and-zero-copy-8695c68394d5</loc>
    <lastmod>2026-03-31T10:27:32Z</lastmod>
  </url>
</urlset>