Volume 35,Issue 10,2024 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Fine-grained Assessment Method of Vulnerability Impact Scope for PyPI Ecosystem
  • WANG Zi-Bo, JIA Xiang-Kun, YING Ling-Yun, SU Pu-Rui
  • Published October 06, 2024 (17 pages)
  • 2024,35(10):4493-4509 [Abstract(1051)]  [View PDF(2722)7.10 M]
  • Formal Semantics of Apache Flink Complex Event Processing Language
  • FU Xuan-Deng, WU Zhi-Lin
  • Published October 06, 2024 (23 pages)
  • 2024,35(10):4510-4532 [Abstract(743)]  [View PDF(2195)5.53 M]
  • PPTA Model and Verification Method for Preemptive Scheduling Problem
  • ZUO Zheng-Kang, ZHAO Shuai, WANG Chang-Jing, XIE Wu-Ping, HUANG Qing
  • Published October 06, 2024 (22 pages)
  • 2024,35(10):4533-4554 [Abstract(680)]  [View PDF(2449)9.76 M]
  • LGBRoot: Partial Graph-based Automated Vulnerability Root Cause Analysis
  • YU Yuan-Ping, SU Pu-Rui, JIA Xiang-Kun, HUANG Hua-Feng
  • Published October 06, 2024 (18 pages)
  • 2024,35(10):4555-4572 [Abstract(595)]  [View PDF(2218)6.71 M]
  • Threat Model-based Security Test Case Generation Framework and Tool
  • FU Chang-Lan, ZHANG He, LI Feng-Long, KUANG Hong-Yu
  • Published October 06, 2024 (31 pages)
  • 2024,35(10):4573-4603 [Abstract(996)]  [View PDF(2560)13.25 M]
  • Function Name Consistency Check and Recommendation Based on Deep Learning
  • ZHENG Wei, TANG Hui, CHEN Xiang, ZHANG Yong-Jie
  • Published October 06, 2024 (19 pages)
  • 2024,35(10):4604-4622 [Abstract(613)]  [View PDF(2527)6.34 M]
  • Analysis and Testing of Indirect Jump Table Solving Algorithms in Disassembly Tools
  • PANG Cheng-Bin, XU Xue-Lan, ZHANG Tian-Tai, MAO Bing
  • Published October 06, 2024 (19 pages)
  • 2024,35(10):4623-4641 [Abstract(517)]  [View PDF(2115)7.20 M]
  • Statement Level Software Bug Localization Based on Historical Bug Information Retrieval
  • YUE Lei, CUI Zhan-Qi, CHEN Xiang, WANG Rong-Cun, LI Li
  • Published October 06, 2024 (20 pages)
  • 2024,35(10):4642-4661 [Abstract(673)]  [View PDF(2061)7.96 M]
  • Automated Static Warning Identification via Path-based Semantic Representation
  • ZHANG Yu-Wei, XING Ying, LI Ge, JIN Zhi
  • Published October 06, 2024 (19 pages)
  • 2024,35(10):4662-4680 [Abstract(472)]  [View PDF(1926)6.65 M]
  • Identifier Resolution Technology for Human-cyber-physical Ternary Based on Internet of Data
  • ZHANG Ning, LIU Yi, MA Xin-Jian, JIANG Hai-Ou, WANG Lu, JING Xiang, HUANG Gang
  • Published October 06, 2024 (15 pages)
  • 2024,35(10):4681-4695 [Abstract(659)]  [View PDF(2065)9.61 M]
  • Conformance Checking Method for Process Text
  • LIN Lei-Lei, QIAN Chen, WEN Li-Jie, QIU Hong-Jun
  • Published October 06, 2024 (14 pages)
  • 2024,35(10):4696-4709 [Abstract(541)]  [View PDF(2226)6.67 M]
  • Long- and Short-term Spatio-temporal Preference-aware Task Assignment in Crowdsourcing
  • WANG Fu-Xin, WANG Ning, ZENG Qi-Xiong
  • Published October 06, 2024 (19 pages)
  • 2024,35(10):4710-4728 [Abstract(445)]  [View PDF(1849)5.98 M]
  • Multi-timed Noninterference Verification
  • LIU Qiao-Sen, SUN Cong, WEI Xiao-Min, ZENG Hui-Ming, MA Jian-Feng
  • Published October 06, 2024 (22 pages)
  • 2024,35(10):4729-4750 [Abstract(392)]  [View PDF(1776)8.43 M]
  • Few-shot Named Entity Recognition Based on Fine-grained Prototypical Network
  • QI Rong-Zhi, ZHOU Jun-Yu, LI Shui-Yan, MAO Ying-Chi
  • Published October 06, 2024 (15 pages)
  • 2024,35(10):4751-4765 [Abstract(657)]  [View PDF(2107)6.15 M]
  • Cross-modal Person Retrieval Method Based on Relation Alignment
  • LI Bo, ZHANG Fei-Fei, XU Chang-Sheng
  • Published October 06, 2024 (15 pages)
  • 2024,35(10):4766-4780 [Abstract(373)]  [View PDF(1762)6.11 M]
  • Multimodal Sentiment Analysis Method Based on Adaptive Weight Fusion
  • LUO Yuan-Yi, WU Rui, LIU Jia-Feng, TANG Xiang-Long
  • Published October 06, 2024 (13 pages)
  • 2024,35(10):4781-4793 [Abstract(1206)]  [View PDF(2889)6.02 M]
  • Supervised Contrastive Learning for Text Emotion Category Representations
  • WANG Xiang-Yu, ZONG Cheng-Qing
  • Published October 06, 2024 (12 pages)
  • 2024,35(10):4794-4805 [Abstract(621)]  [View PDF(2884)1.70 M]
  • Lie Group Fuzzy C-means Clustering Algorithm for Image Segmentation
  • SUN Hao-Cheng, LIU Li, LI Fan-Zhang
  • Published October 06, 2024 (20 pages)
  • 2024,35(10):4806-4825 [Abstract(754)]  [View PDF(2050)6.33 M]
  • Pseudorandomness and Super-pseudorandomness of FBC Model
  • LIU Nan, JIN Chen-Hui, YU Jun-Wei, CUI Ting
  • Published October 06, 2024 (11 pages)
  • 2024,35(10):4826-4836 [Abstract(389)]  [View PDF(1791)6.03 M]
  • Malicious Domain Name Detection Method Based on Graph Contrastive Learning
  • ZHANG Zhen, ZHANG San-Feng, YANG Wang
  • Published October 06, 2024 (22 pages)
  • 2024,35(10):4837-4858 [Abstract(602)]  [View PDF(2411)6.52 M]
  • User-centric Two-factor Authentication Key Agreement Protocol
  • YANG Xue, LIU Yi-Jing, JIANG Qi, WANG Jin-Hua, LI Xing-Hua
  • Published October 06, 2024 (17 pages)
  • 2024,35(10):4859-4875 [Abstract(466)]  [View PDF(1888)7.66 M]
  • Study and Analysis of Recursive Side DNS Security
  • ZHANG Bin, ZHANG Yu, ZHANG Wei-Zhe
  • Published October 06, 2024 (36 pages)
  • 2024,35(10):4876-4911 [Abstract(727)]  [View PDF(3452)4.81 M]
  • Adaptive Data Placement Strategy in Mobile Distributed Storage System
  • WU Dai-Tao, TAN Yu-Juan, LIU Duo, WEI Xin-Lei, WU Yu, CHEN Xian-Zhang, QIAO Lei
  • Published October 06, 2024 (18 pages)
  • 2024,35(10):4912-4929 [Abstract(472)]  [View PDF(1978)10.02 M]
  • Novel and Universal OS Structure Model Based on Hierarchical Software Bus
  • YANG Pan, DONG Pan, JIANG Zhe, DING Yan
  • Published October 06, 2024 (18 pages)
  • 2024,35(10):4930-4947 [Abstract(787)]  [View PDF(2133)3.86 M]