Volume 35,Issue 10,2024 Table of ContentsDownload Contents
Fine-grained Assessment Method of Vulnerability Impact Scope for PyPI EcosystemWANG Zi-Bo, JIA Xiang-Kun, YING Ling-Yun, SU Pu-RuiPublished October 06, 2024 (17 pages)2024,35(10):4493-4509 [Abstract(1051)] [View PDF(2722)7.10 M]Formal Semantics of Apache Flink Complex Event Processing LanguageFU Xuan-Deng, WU Zhi-LinPublished October 06, 2024 (23 pages)2024,35(10):4510-4532 [Abstract(743)] [View PDF(2195)5.53 M]PPTA Model and Verification Method for Preemptive Scheduling ProblemZUO Zheng-Kang, ZHAO Shuai, WANG Chang-Jing, XIE Wu-Ping, HUANG QingPublished October 06, 2024 (22 pages)2024,35(10):4533-4554 [Abstract(680)] [View PDF(2449)9.76 M]LGBRoot: Partial Graph-based Automated Vulnerability Root Cause AnalysisYU Yuan-Ping, SU Pu-Rui, JIA Xiang-Kun, HUANG Hua-FengPublished October 06, 2024 (18 pages)2024,35(10):4555-4572 [Abstract(595)] [View PDF(2218)6.71 M]Threat Model-based Security Test Case Generation Framework and ToolFU Chang-Lan, ZHANG He, LI Feng-Long, KUANG Hong-YuPublished October 06, 2024 (31 pages)2024,35(10):4573-4603 [Abstract(996)] [View PDF(2560)13.25 M]Function Name Consistency Check and Recommendation Based on Deep LearningZHENG Wei, TANG Hui, CHEN Xiang, ZHANG Yong-JiePublished October 06, 2024 (19 pages)2024,35(10):4604-4622 [Abstract(613)] [View PDF(2527)6.34 M]Analysis and Testing of Indirect Jump Table Solving Algorithms in Disassembly ToolsPANG Cheng-Bin, XU Xue-Lan, ZHANG Tian-Tai, MAO BingPublished October 06, 2024 (19 pages)2024,35(10):4623-4641 [Abstract(517)] [View PDF(2115)7.20 M]Statement Level Software Bug Localization Based on Historical Bug Information RetrievalYUE Lei, CUI Zhan-Qi, CHEN Xiang, WANG Rong-Cun, LI LiPublished October 06, 2024 (20 pages)2024,35(10):4642-4661 [Abstract(673)] [View PDF(2061)7.96 M]Automated Static Warning Identification via Path-based Semantic RepresentationZHANG Yu-Wei, XING Ying, LI Ge, JIN ZhiPublished October 06, 2024 (19 pages)2024,35(10):4662-4680 [Abstract(472)] [View PDF(1926)6.65 M]Identifier Resolution Technology for Human-cyber-physical Ternary Based on Internet of DataZHANG Ning, LIU Yi, MA Xin-Jian, JIANG Hai-Ou, WANG Lu, JING Xiang, HUANG GangPublished October 06, 2024 (15 pages)2024,35(10):4681-4695 [Abstract(659)] [View PDF(2065)9.61 M]Conformance Checking Method for Process TextLIN Lei-Lei, QIAN Chen, WEN Li-Jie, QIU Hong-JunPublished October 06, 2024 (14 pages)2024,35(10):4696-4709 [Abstract(541)] [View PDF(2226)6.67 M]Long- and Short-term Spatio-temporal Preference-aware Task Assignment in CrowdsourcingWANG Fu-Xin, WANG Ning, ZENG Qi-XiongPublished October 06, 2024 (19 pages)2024,35(10):4710-4728 [Abstract(445)] [View PDF(1849)5.98 M]Multi-timed Noninterference VerificationLIU Qiao-Sen, SUN Cong, WEI Xiao-Min, ZENG Hui-Ming, MA Jian-FengPublished October 06, 2024 (22 pages)2024,35(10):4729-4750 [Abstract(392)] [View PDF(1776)8.43 M]Few-shot Named Entity Recognition Based on Fine-grained Prototypical NetworkQI Rong-Zhi, ZHOU Jun-Yu, LI Shui-Yan, MAO Ying-ChiPublished October 06, 2024 (15 pages)2024,35(10):4751-4765 [Abstract(657)] [View PDF(2107)6.15 M]Cross-modal Person Retrieval Method Based on Relation AlignmentLI Bo, ZHANG Fei-Fei, XU Chang-ShengPublished October 06, 2024 (15 pages)2024,35(10):4766-4780 [Abstract(373)] [View PDF(1762)6.11 M]Multimodal Sentiment Analysis Method Based on Adaptive Weight FusionLUO Yuan-Yi, WU Rui, LIU Jia-Feng, TANG Xiang-LongPublished October 06, 2024 (13 pages)2024,35(10):4781-4793 [Abstract(1206)] [View PDF(2889)6.02 M]Supervised Contrastive Learning for Text Emotion Category RepresentationsWANG Xiang-Yu, ZONG Cheng-QingPublished October 06, 2024 (12 pages)2024,35(10):4794-4805 [Abstract(621)] [View PDF(2884)1.70 M]Lie Group Fuzzy C-means Clustering Algorithm for Image SegmentationSUN Hao-Cheng, LIU Li, LI Fan-ZhangPublished October 06, 2024 (20 pages)2024,35(10):4806-4825 [Abstract(754)] [View PDF(2050)6.33 M]Pseudorandomness and Super-pseudorandomness of FBC ModelLIU Nan, JIN Chen-Hui, YU Jun-Wei, CUI TingPublished October 06, 2024 (11 pages)2024,35(10):4826-4836 [Abstract(389)] [View PDF(1791)6.03 M]Malicious Domain Name Detection Method Based on Graph Contrastive LearningZHANG Zhen, ZHANG San-Feng, YANG WangPublished October 06, 2024 (22 pages)2024,35(10):4837-4858 [Abstract(602)] [View PDF(2411)6.52 M]User-centric Two-factor Authentication Key Agreement ProtocolYANG Xue, LIU Yi-Jing, JIANG Qi, WANG Jin-Hua, LI Xing-HuaPublished October 06, 2024 (17 pages)2024,35(10):4859-4875 [Abstract(466)] [View PDF(1888)7.66 M]Study and Analysis of Recursive Side DNS SecurityZHANG Bin, ZHANG Yu, ZHANG Wei-ZhePublished October 06, 2024 (36 pages)2024,35(10):4876-4911 [Abstract(727)] [View PDF(3452)4.81 M]Adaptive Data Placement Strategy in Mobile Distributed Storage SystemWU Dai-Tao, TAN Yu-Juan, LIU Duo, WEI Xin-Lei, WU Yu, CHEN Xian-Zhang, QIAO LeiPublished October 06, 2024 (18 pages)2024,35(10):4912-4929 [Abstract(472)] [View PDF(1978)10.02 M]Novel and Universal OS Structure Model Based on Hierarchical Software BusYANG Pan, DONG Pan, JIANG Zhe, DING YanPublished October 06, 2024 (18 pages)2024,35(10):4930-4947 [Abstract(787)] [View PDF(2133)3.86 M]