Volume 34,Issue 7,2023 Table of ContentsDownload Contents
Transparent Request Tracing and Sampling Method for Java-based Microservice SystemHUANG Zi-Cheng, CHEN Peng-Fei, YU Guang-Ba, CHEN Hong-YangPublished July 06, 2023 (21 pages)2023,34(7):3167-3187 [Abstract(1103)] [View PDF(2558)8.66 M]Malware Similarity Measurement Method Based on Multiplex Heterogeneous GraphGU Yong-Hao, WANG Yi-Fei, LIU Wei-Xin, WU Tie-Jun, MENG Guo-ZhuPublished July 06, 2023 (18 pages)2023,34(7):3188-3205 [Abstract(1291)] [View PDF(3274)3.14 M]Stable Learning via Sample Reweighting and Dual ClassifiersYANG Shuai, WANG Hao, YU Kui, CAO Fu-YuanPublished July 06, 2023 (20 pages)2023,34(7):3206-3225 [Abstract(784)] [View PDF(2566)7.51 M]Event Extraction Method Based on Dual Attention MechanismZHU Min, MAO Ying-Chi, CHENG Yong, CHEN Cheng-Jun, WANG Long-BaoPublished July 06, 2023 (15 pages)2023,34(7):3226-3240 [Abstract(1074)] [View PDF(3396)7.72 M]Optimization of Equivalence Query Algorithm in Active Automata LearningPAN Yan, ZHU Yue-FeiPublished July 06, 2023 (15 pages)2023,34(7):3241-3255 [Abstract(668)] [View PDF(2413)5.55 M]Heterogeneous Network Representation Learning Method Fusing Mutual Information and Multiple Meta-pathsJIA Xiao-Sheng, ZHAO Zhong-Ying, LI Chao, LUAN Wen-Jing, LIANG Yong-QuanPublished July 06, 2023 (16 pages)2023,34(7):3256-3271 [Abstract(1187)] [View PDF(3289)9.42 M]Fog Computing-based Three-party Authentication and Key Agreement Protocol for Smart HealthcareWANG Fei-Fei, WANG DingPublished July 06, 2023 (20 pages)2023,34(7):3272-3291 [Abstract(766)] [View PDF(2614)5.02 M]Supervised Identity Privacy Protection Scheme in BlockchainSONG Jing-Wen, ZHANG Da-Wei, HAN Xu, DU YePublished July 06, 2023 (21 pages)2023,34(7):3292-3312 [Abstract(1650)] [View PDF(3346)8.75 M]Enhancement of Textual Adversarial Attack Ability Based on Sememe-level Sentence Dilution AlgorithmYE Wen-Tao, ZHANG Min, CHEN Yi-XiangPublished July 06, 2023 (16 pages)2023,34(7):3313-3328 [Abstract(810)] [View PDF(2556)7.00 M]File Hierarchy CP-ABE Scheme Supporting Graded User AccessLIU Shuai-Nan, LIU Bin, GUO Zhen, FENG Chao-Sheng, QIN Zhi-Guang, QING YuPublished July 06, 2023 (14 pages)2023,34(7):3329-3342 [Abstract(837)] [View PDF(2784)10.55 M]Secure Intersection-sum ComputationLI Shun-Dong, ZHANG Kai-Xin, YANG Chen, WANG Yu-LinPublished July 06, 2023 (11 pages)2023,34(7):3343-3353 [Abstract(697)] [View PDF(2259)5.55 M]CCA Secure Broadcast Encryption Based on SM9LAI Jian-Chang, HUANG Xin-Yi, HE De-Biao, NING Jian-TingPublished July 06, 2023 (11 pages)2023,34(7):3354-3364 [Abstract(1034)] [View PDF(2996)6.00 M]Deep Recommendation Model with Cross-domain Association and Privacy ProtectionWANG Li-E, LI Dong-Cheng, LI Xian-XianPublished July 06, 2023 (20 pages)2023,34(7):3365-3384 [Abstract(936)] [View PDF(3125)5.28 M]Generative Multiple Adversarial Steganography Algorithm Based on U-Net StructureMA Bin, HAN Zuo-Wei, XU Jian, WANG Chun-Peng, LI Jian, WANG Yu-LiPublished July 06, 2023 (23 pages)2023,34(7):3385-3407 [Abstract(1027)] [View PDF(2848)10.20 M]CNN Based Transformer for Panoptic SegmentationMAO Lin, REN Feng-Zhi, YANG Da-Wei, ZHANG Ru-BoPublished July 06, 2023 (14 pages)2023,34(7):3408-3421 [Abstract(1479)] [View PDF(3204)8.76 M]Priority Ceiling Protocol Based on Avoidance BlockingCHEN Xi, QIAO Lei, YANG Meng-Fei, LIU Hong-BiaoPublished July 06, 2023 (16 pages)2023,34(7):3422-3437 [Abstract(824)] [View PDF(2474)11.36 M]Label Enhancement Based Discrete Cross-modal Hashing MethodWANG Yong-Xin, TIAN Jie-Ru, CHEN Zhen-Duo, LUO Xin, XU Xin-ShunPublished July 06, 2023 (13 pages)2023,34(7):3438-3450 [Abstract(731)] [View PDF(2554)6.65 M]Optimization of GEMM on SW1621 ProcessorsYAN Hao, LIU Fang-Fang, MA Wen-Jing, CHEN Dao-KunPublished July 06, 2023 (13 pages)2023,34(7):3451-3463 [Abstract(955)] [View PDF(3085)7.02 M]
PrefaceDONG Yun-Wei, LIU Guan-Jun, MAO Xiao-GuangPublished July 06, 2023 (2 pages)2023,34(7):2979-2980 [Abstract(781)] [View PDF(3598)530.35 K]Safe Neural Network Controller Synthesis and Verification for Hybrid SystemsZHAO Qing-Ye, WANG Yu, LI Xuan-DongPublished July 06, 2023 (21 pages)2023,34(7):2981-3001 [Abstract(1319)] [View PDF(3570)2.37 M]Modeling and Verification Method of Intersection Test Scenario for Automated DrivingXIA Chun-Yan, HUANG Song, ZHENG Chang-You, ZHANG Qing-Rui, WANG Yu, WEI Yu-HaoPublished July 06, 2023 (18 pages)2023,34(7):3002-3021 [Abstract(1603)] [View PDF(4189)3.49 M]Automatic Parallelization Framework for Complex Nested Loops Based on LLVM PassMA Chun-Yan, Lü Bing-Xu, YE Xu-Jiao, ZHANG YuPublished July 06, 2023 (21 pages)2023,34(7):3022-3042 [Abstract(1329)] [View PDF(3785)2.96 M]Target-oriented UAF Vulnerability Prediction Method of Multi-threaded ProgramsLU Fa-Ming, TANG Meng-Fan, BAO Yun-Xia, ZENG Qing-Tian, LI Yan-ChengPublished July 06, 2023 (19 pages)2023,34(7):3043-3063 [Abstract(1184)] [View PDF(3700)2.33 M]Model Checking Tool for Concurrent Program Based on Constrained Dependency GraphSU Jie, YANG Zu-Chao, TIAN Cong, DUAN Zhen-HuaPublished July 06, 2023 (17 pages)2023,34(7):3064-3079 [Abstract(1167)] [View PDF(4138)2.37 M]SMT-based Formal Verification of Synchronous Reactive Model for Zone ControllerLI Teng-Fei, SUN Jun-Feng, Lü Xin-Jun, CHEN Xiang, LIU Jing, SUN Hai-Ying, HE Ji-FengPublished July 06, 2023 (19 pages)2023,34(7):3080-3098 [Abstract(1174)] [View PDF(3625)2.82 M]Efficient Approach for Solving Simple Preference in AI PlanningLU Xu, YU Bin, DUAN Zhen-Hua, WANG De-Kui, CHEN Chu, CUI JinPublished July 06, 2023 (18 pages)2023,34(7):3099-3115 [Abstract(1106)] [View PDF(3867)2.27 M]Collaborative Verification Method of Uninterpreted ProgramsDU Yi-De, HONG Wei-Jiang, CHEN Zhen-Bang, WANG JiPublished July 06, 2023 (18 pages)2023,34(7):3116-3133 [Abstract(717)] [View PDF(3283)2.82 M]
Survey on Robustness Verification of Feedforward Neural Networks and Recurrent Neural NetworksLIU Ying, YANG Peng-Fei, ZHANG Li-Jun, WU Zhi-Lin, FENG YuanPublished July 06, 2023 (35 pages)2023,34(7):3134-3166 [Abstract(1679)] [View PDF(4787)10.65 M]