Volume 35,Issue 5,2024 Table of ContentsDownload Contents

Other Issues:  
  
Special Issue's Articles

  • 多模态协同感知与融合技术专题前言
  • SUN Li-Feng, SONG Xin-Hang, JIANG Shu-Qiang, WANG Li-Li, SHEN Heng-Tao
  • Published May 06, 2024 (2 pages)
  • 2024,35(5):2099-2100 [Abstract(772)]  [View PDF(4916)5.62 M]
  • Few-shot Incremental Learning with Textual-knowledge Embedding by Visual-language Model
  • YAO Han-Tao, YU Lu, XU Chang-Sheng
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2101-2119 [Abstract(1418)]  [View PDF(3731)7.05 M]
  • Query Aware Dual Contrastive Learning Network for Cross-modal Retrieval
  • YIN Meng-Ran, LIANG Mei-Yu, YU Yang, CAO Xiao-Wen, DU Jun-Ping, XUE Zhe
  • Published May 06, 2024 (13 pages)
  • 2024,35(5):2120-2132 [Abstract(1074)]  [View PDF(3117)10.54 M]
  • Scale-guided Fusion Inference Network for Remote Sensing Visual Question Answering
  • ZHAO En-Yuan, SONG Ning, NIE Jie, WANG Xin, ZHENG Cheng-Yu, WEI Zhi-Qiang
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2133-2149 [Abstract(936)]  [View PDF(2879)4.58 M]
  • Text-to-image Generation with Conditional Semantic Augmentation
  • YU Kai, BIN Yi, ZHENG Zi-Qiang, YANG Yang
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2150-2164 [Abstract(952)]  [View PDF(3082)7.68 M]
  • Visually Guided Binaural Audio Generation Method Based on Hierarchical Feature Encoding and Decoding
  • WANG Rui-Qi, CHENG Hao-Nan, YE Long
  • Published May 06, 2024 (12 pages)
  • 2024,35(5):2165-2175 [Abstract(545)]  [View PDF(2410)4.93 M]
  • AU-aware Algorithm for 3D Facial Reconstruction
  • ZHANG Yi, Lü Jia-Yi, LAN Xing, XUE Jian
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2176-2191 [Abstract(849)]  [View PDF(3051)7.66 M]
  • Auxiliary Diagnosis for Parkinson’s Disease Using Multimodel Feature Analysis
  • QIANG Wei, DU Yu, LI Xin-Jin, FAN Xiang-Min, SU Wen, CHEN Hai-Bo, SUN Wei, TIAN Feng
  • Published May 06, 2024 (17 pages)
  • 2024,35(5):2192-2207 [Abstract(910)]  [View PDF(2976)10.48 M]
  • 3D Shape Recognition Based on Multimodal Relation Modeling
  • CHEN Hao-Nan, ZHU Ying-Ying, ZHAO Jun-Qi, TIAN Qi
  • Published May 06, 2024 (12 pages)
  • 2024,35(5):2208-2219 [Abstract(624)]  [View PDF(2395)6.64 M]
  • Event-fusion-based Spatial Attentive and Temporal Memorable Network for Video Deraining
  • SUN Shang-Quan, REN Wen-Qi, CAO Xiao-Chun
  • Published May 06, 2024 (14 pages)
  • 2024,35(5):2220-2234 [Abstract(762)]  [View PDF(2700)10.27 M]
  • Review Articles

  • Research Progress of Security Vulnerability Detection of Smart Contracts
  • CUI Zhan-Qi, YANG Hui-Wen, CHEN Xiang, WANG Lin-Zhang
  • Published May 06, 2024 (33 pages)
  • 2024,35(5):2235-2267 [Abstract(841)]  [View PDF(3607)4.22 M]
  • Survey on Automated Penetration Testing Technology Research
  • CHEN Ke, LU Hui, FANG Bin-Xing, SUN Yan-Bin, SU Shen, TIAN Zhi-Hong
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2268-2288 [Abstract(1507)]  [View PDF(4717)9.33 M]
  • Contents

  • Model-domain Data Augmentation Using Generative Adversarial Network for Fault Localization
  • ZHANG Zhuo, LEI Yan, MAO Xiao-Guang, XUE Jian-Xin, CHANG Xi
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2289-2306 [Abstract(526)]  [View PDF(1683)8.46 M]
  • Verification for Neural Network Based on Error Divide and Conquer
  • DONG Yan-Song, LIU Yue-Hao, DONG Xu-Qian, ZHAO Liang, TIAN Cong, YU Bin, DUAN Zhen-Hua
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2307-2324 [Abstract(402)]  [View PDF(1439)10.88 M]
  • Detection of Smart Contract Timestamp Vulnerability Based on Data-flow Path Learning
  • ZHANG Zhuo, LIU Ye-Peng, XUE Jian-Xin, YAN Meng, CHEN Jia-Chi, MAO Xiao-Guang
  • Published May 06, 2024 (15 pages)
  • 2024,35(5):2325-2339 [Abstract(486)]  [View PDF(1639)2.95 M]
  • Cross-project Issue Recommendation Method for Open-source Software Defects
  • LIU Bao-Chuan, ZHANG Li, LIU Zhen-Wei, JIANG Jing
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2340-2358 [Abstract(682)]  [View PDF(1602)2.90 M]
  • swLLVM: Optimized Compiler for New Generation Sunway Supercomputer
  • SHEN Li, ZHOU Wen-Hao, WANG Fei, XIAO Qian, WU Wen-Hao, ZHANG Lu-Fei, AN Hong, QI Feng-Bin
  • Published May 06, 2024 (20 pages)
  • 2024,35(5):2359-2378 [Abstract(778)]  [View PDF(1917)11.85 M]
  • Review Articles

  • Research Progress on Stochastic Configuration Network
  • ZHANG Cheng-Long, DING Shi-Fei, GUO Li-Li, ZHANG Jian
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2379-2399 [Abstract(1887)]  [View PDF(4328)7.12 M]
  • Contents

  • Stealthy Backdoor Attack Based on Singular Value Decomposition
  • WU Shang-Xi, YIN Yu-Yang, SONG Si-Qing, CHEN Guan-Hao, SANG Ji-Tao, YU Jian
  • Published May 06, 2024 (14 pages)
  • 2024,35(5):2400-2413 [Abstract(561)]  [View PDF(2276)9.00 M]
  • Lightweight Knowledge Distillation for Few-shot Learning
  • CHEN Jia-Yan, REN Dong-Dong, LI Wen-Bin, HUO Jing, GAO Yang
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2414-2429 [Abstract(849)]  [View PDF(2528)7.75 M]
  • KENN: Graph Kernel Neural Network Based on Linear Structural Entropy
  • XU Li-Xiang, XU Wei, CHEN En-Hong, LUO Bin, TANG Yuan-Yan
  • Published May 06, 2024 (16 pages)
  • 2024,35(5):2430-2445 [Abstract(572)]  [View PDF(1764)4.18 M]
  • Two-stage Learning for Multi-behavior Recommendation
  • YAN Ming-Shi, CHENG Zhi-Yong, SUN Jing, WANG Fa-Sheng, SUN Fu-Ming
  • Published May 06, 2024 (20 pages)
  • 2024,35(5):2446-2465 [Abstract(611)]  [View PDF(1709)10.05 M]
  • Fuzzy Concept Lattice Models for Knowledge Structure Analysis
  • ZHI Hui-Lai, LI Jin-Hai
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2466-2484 [Abstract(534)]  [View PDF(1527)3.52 M]
  • Dynamic Blockchain Consensus with Pre-validation
  • HOU Kai-Xiang, QIU Tie, XU Tian-Yi, ZHOU Xiao-Bo, CHI Jian-Cheng
  • Published May 06, 2024 (18 pages)
  • 2024,35(5):2485-2502 [Abstract(416)]  [View PDF(1744)3.93 M]
  • Method for Enhancing Network Security of Transport Layer by Leveraging Lightweight Chain Verification
  • FENG Xue-Wei, XU Ke, LI Qi, YANG Yu-Xiang, ZHU Min, FU Song-Tao
  • Published May 06, 2024 (19 pages)
  • 2024,35(5):2503-2521 [Abstract(498)]  [View PDF(1554)3.48 M]
  • Two-stage DDoS Attack Defense Mechanism Based on Convolution in IPv6
  • WANG Yu-Fu, WANG Xing-Wei, YI Bo, HUANG Min
  • Published May 06, 2024 (21 pages)
  • 2024,35(5):2522-2542 [Abstract(392)]  [View PDF(1616)8.98 M]
  • Adversarial Attack Based on Runge-Kutta Method
  • WAN Chen, HUANG Fang-Jun
  • Published May 06, 2024 (23 pages)
  • 2024,35(5):2543-2565 [Abstract(462)]  [View PDF(1678)5.32 M]
  • SM2-based Adaptor Signature with Batch Proofs and Its Distributed Extension
  • TU Bin-Bin, CHEN Yu
  • Published May 06, 2024 (17 pages)
  • 2024,35(5):2566-2582 [Abstract(976)]  [View PDF(2245)5.59 M]