Volume 34,Issue 7,2023 Table of ContentsDownload Contents
Transparent Request Tracing and Sampling Method for Java-based Microservice SystemHUANG Zi-Cheng, CHEN Peng-Fei, YU Guang-Ba, CHEN Hong-YangPublished July 06, 2023 (21 pages)2023,34(7):3167-3187 [Abstract(1048)] [View PDF(2395)8.66 M]Malware Similarity Measurement Method Based on Multiplex Heterogeneous GraphGU Yong-Hao, WANG Yi-Fei, LIU Wei-Xin, WU Tie-Jun, MENG Guo-ZhuPublished July 06, 2023 (18 pages)2023,34(7):3188-3205 [Abstract(1235)] [View PDF(3098)3.14 M]Stable Learning via Sample Reweighting and Dual ClassifiersYANG Shuai, WANG Hao, YU Kui, CAO Fu-YuanPublished July 06, 2023 (20 pages)2023,34(7):3206-3225 [Abstract(758)] [View PDF(2417)7.51 M]Event Extraction Method Based on Dual Attention MechanismZHU Min, MAO Ying-Chi, CHENG Yong, CHEN Cheng-Jun, WANG Long-BaoPublished July 06, 2023 (15 pages)2023,34(7):3226-3240 [Abstract(1015)] [View PDF(3212)7.72 M]Optimization of Equivalence Query Algorithm in Active Automata LearningPAN Yan, ZHU Yue-FeiPublished July 06, 2023 (15 pages)2023,34(7):3241-3255 [Abstract(646)] [View PDF(2278)5.55 M]Heterogeneous Network Representation Learning Method Fusing Mutual Information and Multiple Meta-pathsJIA Xiao-Sheng, ZHAO Zhong-Ying, LI Chao, LUAN Wen-Jing, LIANG Yong-QuanPublished July 06, 2023 (16 pages)2023,34(7):3256-3271 [Abstract(1118)] [View PDF(3122)9.42 M]Fog Computing-based Three-party Authentication and Key Agreement Protocol for Smart HealthcareWANG Fei-Fei, WANG DingPublished July 06, 2023 (20 pages)2023,34(7):3272-3291 [Abstract(710)] [View PDF(2443)5.02 M]Supervised Identity Privacy Protection Scheme in BlockchainSONG Jing-Wen, ZHANG Da-Wei, HAN Xu, DU YePublished July 06, 2023 (21 pages)2023,34(7):3292-3312 [Abstract(1436)] [View PDF(3165)8.75 M]Enhancement of Textual Adversarial Attack Ability Based on Sememe-level Sentence Dilution AlgorithmYE Wen-Tao, ZHANG Min, CHEN Yi-XiangPublished July 06, 2023 (16 pages)2023,34(7):3313-3328 [Abstract(786)] [View PDF(2392)7.00 M]File Hierarchy CP-ABE Scheme Supporting Graded User AccessLIU Shuai-Nan, LIU Bin, GUO Zhen, FENG Chao-Sheng, QIN Zhi-Guang, QING YuPublished July 06, 2023 (14 pages)2023,34(7):3329-3342 [Abstract(777)] [View PDF(2637)10.55 M]Secure Intersection-sum ComputationLI Shun-Dong, ZHANG Kai-Xin, YANG Chen, WANG Yu-LinPublished July 06, 2023 (11 pages)2023,34(7):3343-3353 [Abstract(662)] [View PDF(2130)5.55 M]CCA Secure Broadcast Encryption Based on SM9LAI Jian-Chang, HUANG Xin-Yi, HE De-Biao, NING Jian-TingPublished July 06, 2023 (11 pages)2023,34(7):3354-3364 [Abstract(968)] [View PDF(2797)6.00 M]Deep Recommendation Model with Cross-domain Association and Privacy ProtectionWANG Li-E, LI Dong-Cheng, LI Xian-XianPublished July 06, 2023 (20 pages)2023,34(7):3365-3384 [Abstract(857)] [View PDF(2959)5.28 M]Generative Multiple Adversarial Steganography Algorithm Based on U-Net StructureMA Bin, HAN Zuo-Wei, XU Jian, WANG Chun-Peng, LI Jian, WANG Yu-LiPublished July 06, 2023 (23 pages)2023,34(7):3385-3407 [Abstract(945)] [View PDF(2694)10.20 M]CNN Based Transformer for Panoptic SegmentationMAO Lin, REN Feng-Zhi, YANG Da-Wei, ZHANG Ru-BoPublished July 06, 2023 (14 pages)2023,34(7):3408-3421 [Abstract(1405)] [View PDF(3021)8.76 M]Priority Ceiling Protocol Based on Avoidance BlockingCHEN Xi, QIAO Lei, YANG Meng-Fei, LIU Hong-BiaoPublished July 06, 2023 (16 pages)2023,34(7):3422-3437 [Abstract(787)] [View PDF(2335)11.36 M]Label Enhancement Based Discrete Cross-modal Hashing MethodWANG Yong-Xin, TIAN Jie-Ru, CHEN Zhen-Duo, LUO Xin, XU Xin-ShunPublished July 06, 2023 (13 pages)2023,34(7):3438-3450 [Abstract(690)] [View PDF(2395)6.65 M]Optimization of GEMM on SW1621 ProcessorsYAN Hao, LIU Fang-Fang, MA Wen-Jing, CHEN Dao-KunPublished July 06, 2023 (13 pages)2023,34(7):3451-3463 [Abstract(897)] [View PDF(2904)7.02 M]
PrefaceDONG Yun-Wei, LIU Guan-Jun, MAO Xiao-GuangPublished July 06, 2023 (2 pages)2023,34(7):2979-2980 [Abstract(743)] [View PDF(3097)530.35 K]Safe Neural Network Controller Synthesis and Verification for Hybrid SystemsZHAO Qing-Ye, WANG Yu, LI Xuan-DongPublished July 06, 2023 (21 pages)2023,34(7):2981-3001 [Abstract(1257)] [View PDF(2928)2.37 M]Modeling and Verification Method of Intersection Test Scenario for Automated DrivingXIA Chun-Yan, HUANG Song, ZHENG Chang-You, ZHANG Qing-Rui, WANG Yu, WEI Yu-HaoPublished July 06, 2023 (18 pages)2023,34(7):3002-3021 [Abstract(1465)] [View PDF(3534)3.49 M]Automatic Parallelization Framework for Complex Nested Loops Based on LLVM PassMA Chun-Yan, Lü Bing-Xu, YE Xu-Jiao, ZHANG YuPublished July 06, 2023 (21 pages)2023,34(7):3022-3042 [Abstract(1197)] [View PDF(3159)2.96 M]Target-oriented UAF Vulnerability Prediction Method of Multi-threaded ProgramsLU Fa-Ming, TANG Meng-Fan, BAO Yun-Xia, ZENG Qing-Tian, LI Yan-ChengPublished July 06, 2023 (19 pages)2023,34(7):3043-3063 [Abstract(1127)] [View PDF(3069)2.33 M]Model Checking Tool for Concurrent Program Based on Constrained Dependency GraphSU Jie, YANG Zu-Chao, TIAN Cong, DUAN Zhen-HuaPublished July 06, 2023 (17 pages)2023,34(7):3064-3079 [Abstract(1096)] [View PDF(3490)2.37 M]SMT-based Formal Verification of Synchronous Reactive Model for Zone ControllerLI Teng-Fei, SUN Jun-Feng, Lü Xin-Jun, CHEN Xiang, LIU Jing, SUN Hai-Ying, HE Ji-FengPublished July 06, 2023 (19 pages)2023,34(7):3080-3098 [Abstract(1110)] [View PDF(2961)2.82 M]Efficient Approach for Solving Simple Preference in AI PlanningLU Xu, YU Bin, DUAN Zhen-Hua, WANG De-Kui, CHEN Chu, CUI JinPublished July 06, 2023 (18 pages)2023,34(7):3099-3115 [Abstract(1033)] [View PDF(3233)2.27 M]Collaborative Verification Method of Uninterpreted ProgramsDU Yi-De, HONG Wei-Jiang, CHEN Zhen-Bang, WANG JiPublished July 06, 2023 (18 pages)2023,34(7):3116-3133 [Abstract(687)] [View PDF(2654)2.82 M]
Survey on Robustness Verification of Feedforward Neural Networks and Recurrent Neural NetworksLIU Ying, YANG Peng-Fei, ZHANG Li-Jun, WU Zhi-Lin, FENG YuanPublished July 06, 2023 (35 pages)2023,34(7):3134-3166 [Abstract(1580)] [View PDF(4066)10.65 M]