Volume 35,Issue 5,2024 Table of ContentsDownload Contents

Other Issues:  
  
Special Issue's Articles

  • 多模态协同感知与融合技术专题前言
  • SUN Li-Feng, SONG Xin-Hang, JIANG Shu-Qiang, WANG Li-Li, SHEN Heng-Tao
  • Published May 06, 2024 (2 pages)
  • 2024,35(5):2099-2100 [Abstract(871)]  [View PDF(5655)5.62 M]
  • Few-shot Incremental Learning with Textual-knowledge Embedding by Visual-language Model
  • YAO Han-Tao, YU Lu, XU Chang-Sheng
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2101-2119 [Abstract(1517)]  [View PDF(4627)7.05 M]
  • Query Aware Dual Contrastive Learning Network for Cross-modal Retrieval
  • YIN Meng-Ran, LIANG Mei-Yu, YU Yang, CAO Xiao-Wen, DU Jun-Ping, XUE Zhe
  • Published May 06, 2024 (13 pages)
  • 2024,35(5):2120-2132 [Abstract(1180)]  [View PDF(3777)10.54 M]
  • Scale-guided Fusion Inference Network for Remote Sensing Visual Question Answering
  • ZHAO En-Yuan, SONG Ning, NIE Jie, WANG Xin, ZHENG Cheng-Yu, WEI Zhi-Qiang
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2133-2149 [Abstract(1030)]  [View PDF(3677)4.58 M]
  • Text-to-image Generation with Conditional Semantic Augmentation
  • YU Kai, BIN Yi, ZHENG Zi-Qiang, YANG Yang
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2150-2164 [Abstract(1051)]  [View PDF(3796)7.68 M]
  • Visually Guided Binaural Audio Generation Method Based on Hierarchical Feature Encoding and Decoding
  • WANG Rui-Qi, CHENG Hao-Nan, YE Long
  • Published May 06, 2024 (12 pages)
  • 2024,35(5):2165-2175 [Abstract(590)]  [View PDF(3067)4.93 M]
  • AU-aware Algorithm for 3D Facial Reconstruction
  • ZHANG Yi, Lü Jia-Yi, LAN Xing, XUE Jian
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2176-2191 [Abstract(951)]  [View PDF(3780)7.66 M]
  • Auxiliary Diagnosis for Parkinson’s Disease Using Multimodel Feature Analysis
  • QIANG Wei, DU Yu, LI Xin-Jin, FAN Xiang-Min, SU Wen, CHEN Hai-Bo, SUN Wei, TIAN Feng
  • Published May 06, 2024 (17 pages)
  • 2024,35(5):2192-2207 [Abstract(1058)]  [View PDF(3671)10.48 M]
  • 3D Shape Recognition Based on Multimodal Relation Modeling
  • CHEN Hao-Nan, ZHU Ying-Ying, ZHAO Jun-Qi, TIAN Qi
  • Published May 06, 2024 (12 pages)
  • 2024,35(5):2208-2219 [Abstract(677)]  [View PDF(3095)6.64 M]
  • Event-fusion-based Spatial Attentive and Temporal Memorable Network for Video Deraining
  • SUN Shang-Quan, REN Wen-Qi, CAO Xiao-Chun
  • Published May 06, 2024 (14 pages)
  • 2024,35(5):2220-2234 [Abstract(888)]  [View PDF(3350)10.27 M]
  • Review Articles

  • Research Progress of Security Vulnerability Detection of Smart Contracts
  • CUI Zhan-Qi, YANG Hui-Wen, CHEN Xiang, WANG Lin-Zhang
  • Published May 06, 2024 (33 pages)
  • 2024,35(5):2235-2267 [Abstract(1063)]  [View PDF(4502)4.22 M]
  • Survey on Automated Penetration Testing Technology Research
  • CHEN Ke, LU Hui, FANG Bin-Xing, SUN Yan-Bin, SU Shen, TIAN Zhi-Hong
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2268-2288 [Abstract(1783)]  [View PDF(5910)9.33 M]
  • Contents

  • Model-domain Data Augmentation Using Generative Adversarial Network for Fault Localization
  • ZHANG Zhuo, LEI Yan, MAO Xiao-Guang, XUE Jian-Xin, CHANG Xi
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2289-2306 [Abstract(577)]  [View PDF(1842)8.46 M]
  • Verification for Neural Network Based on Error Divide and Conquer
  • DONG Yan-Song, LIU Yue-Hao, DONG Xu-Qian, ZHAO Liang, TIAN Cong, YU Bin, DUAN Zhen-Hua
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2307-2324 [Abstract(458)]  [View PDF(1598)10.88 M]
  • Detection of Smart Contract Timestamp Vulnerability Based on Data-flow Path Learning
  • ZHANG Zhuo, LIU Ye-Peng, XUE Jian-Xin, YAN Meng, CHEN Jia-Chi, MAO Xiao-Guang
  • Published May 06, 2024 (15 pages)
  • 2024,35(5):2325-2339 [Abstract(554)]  [View PDF(2138)2.95 M]
  • Cross-project Issue Recommendation Method for Open-source Software Defects
  • LIU Bao-Chuan, ZHANG Li, LIU Zhen-Wei, JIANG Jing
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2340-2358 [Abstract(1172)]  [View PDF(1762)2.90 M]
  • swLLVM: Optimized Compiler for New Generation Sunway Supercomputer
  • SHEN Li, ZHOU Wen-Hao, WANG Fei, XIAO Qian, WU Wen-Hao, ZHANG Lu-Fei, AN Hong, QI Feng-Bin
  • Published May 06, 2024 (20 pages)
  • 2024,35(5):2359-2378 [Abstract(866)]  [View PDF(2091)11.85 M]
  • Review Articles

  • Research Progress on Stochastic Configuration Network
  • ZHANG Cheng-Long, DING Shi-Fei, GUO Li-Li, ZHANG Jian
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2379-2399 [Abstract(2144)]  [View PDF(5485)7.12 M]
  • Contents

  • Stealthy Backdoor Attack Based on Singular Value Decomposition
  • WU Shang-Xi, YIN Yu-Yang, SONG Si-Qing, CHEN Guan-Hao, SANG Ji-Tao, YU Jian
  • Published May 06, 2024 (14 pages)
  • 2024,35(5):2400-2413 [Abstract(625)]  [View PDF(2681)9.00 M]
  • Lightweight Knowledge Distillation for Few-shot Learning
  • CHEN Jia-Yan, REN Dong-Dong, LI Wen-Bin, HUO Jing, GAO Yang
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2414-2429 [Abstract(1017)]  [View PDF(3021)7.75 M]
  • KENN: Graph Kernel Neural Network Based on Linear Structural Entropy
  • XU Li-Xiang, XU Wei, CHEN En-Hong, LUO Bin, TANG Yuan-Yan
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2430-2445 [Abstract(666)]  [View PDF(2203)4.18 M]
  • Two-stage Learning for Multi-behavior Recommendation
  • YAN Ming-Shi, CHENG Zhi-Yong, SUN Jing, WANG Fa-Sheng, SUN Fu-Ming
  • Published May 06, 2024 (20 pages)
  • 2024,35(5):2446-2465 [Abstract(671)]  [View PDF(1865)10.05 M]
  • Fuzzy Concept Lattice Models for Knowledge Structure Analysis
  • ZHI Hui-Lai, LI Jin-Hai
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2466-2484 [Abstract(591)]  [View PDF(1693)3.52 M]
  • Dynamic Blockchain Consensus with Pre-validation
  • HOU Kai-Xiang, QIU Tie, XU Tian-Yi, ZHOU Xiao-Bo, CHI Jian-Cheng
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2485-2502 [Abstract(510)]  [View PDF(2088)3.93 M]
  • Method for Enhancing Network Security of Transport Layer by Leveraging Lightweight Chain Verification
  • FENG Xue-Wei, XU Ke, LI Qi, YANG Yu-Xiang, ZHU Min, FU Song-Tao
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2503-2521 [Abstract(548)]  [View PDF(1714)3.48 M]
  • Two-stage DDoS Attack Defense Mechanism Based on Convolution in IPv6
  • WANG Yu-Fu, WANG Xing-Wei, YI Bo, HUANG Min
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2522-2542 [Abstract(426)]  [View PDF(1923)8.98 M]
  • Adversarial Attack Based on Runge-Kutta Method
  • WAN Chen, HUANG Fang-Jun
  • Published May 06, 2024 (23 pages)
  • 2024,35(5):2543-2565 [Abstract(517)]  [View PDF(1845)5.32 M]
  • SM2-based Adaptor Signature with Batch Proofs and Its Distributed Extension
  • TU Bin-Bin, CHEN Yu
  • Published May 06, 2024 (17 pages)
  • 2024,35(5):2566-2582 [Abstract(1061)]  [View PDF(2485)5.59 M]