Volume 35,Issue 7,2024 Table of ContentsDownload Contents
Identification of Memory Copy Function via Hybrid Static and Dynamic AnalysisYIN Xiao-Kang, CAI Rui-Jie, YANG Qi-Chao, LIU Sheng-LiPublished July 06, 2024 (23 pages)2024,35(7):3291-3313 [Abstract(468)] [View PDF(1622)7.28 M]SMTLOC: Bug Localization for SMT Solver Based on Multi-source SpectrumWANG Xiao-Shuang, ZHOU Zhi-De, LI Xiao-Chen, JIANG He, REN Zhi-LeiPublished July 06, 2024 (18 pages)2024,35(7):3314-3331 [Abstract(361)] [View PDF(1618)7.21 M]Dynamic Mitigation Solution Based on eBPF Against Kernel Heap VulnerabilitiesWANG Zi-Cheng, GUO Ying-Gang, ZHONG Bing-Nan, CHEN Yue-Qi, ZENG Qing-KaiPublished July 06, 2024 (23 pages)2024,35(7):3332-3354 [Abstract(773)] [View PDF(1798)9.14 M]Mutation-based Generation Algorithm of Negative Test Strings from Regular ExpressionsZHENG Li-Xiao, YU Li-Lin, CHEN Hai-Ming, CHEN Zu-Xi, LUO Xiang-Yu, WANG Xiao-YongPublished July 06, 2024 (22 pages)2024,35(7):3355-3376 [Abstract(425)] [View PDF(1603)8.68 M]Dynamic Multitask Learning Approach for Contract Information ExtractionWANG Hao-Chang, ZHENG Guan-Yu, ZHAO Tie-JunPublished July 06, 2024 (15 pages)2024,35(7):3377-3391 [Abstract(498)] [View PDF(1631)4.99 M]Chinese BERT Attack Method Based on Masked Language ModelZHANG Yun-Ting, YE Lin, TANG Hao-Lin, ZHANG Hong-Li, LI ShangPublished July 06, 2024 (18 pages)2024,35(7):3392-3409 [Abstract(597)] [View PDF(1860)9.28 M]Label Distribution Learning Method Based on Deep Forest and Heterogeneous EnsembleWANG Yi-Fei, ZHU Ji-Hua, LIU Xin-Yuan, ZHOU Yi-YangPublished July 06, 2024 (18 pages)2024,35(7):3410-3427 [Abstract(427)] [View PDF(1740)6.76 M]Recency-bias-avoiding Partitioned Incremental Learning Based on Self-learning MaskYAO Hong-Ge, WU Zi-Yi, MA Jiao-Jiao, SHI Jun, CHENG Si-Yi, CHEN You, YU Jun, JIANG HongPublished July 06, 2024 (26 pages)2024,35(7):3428-3453 [Abstract(438)] [View PDF(1535)14.21 M]Federated Learning Watermark Based on Model BackdoorLI Xuan, DENG Tian-Peng, XIONG Jin-Bo, JIN Biao, LIN JiePublished July 06, 2024 (15 pages)2024,35(7):3454-3468 [Abstract(839)] [View PDF(1982)7.70 M]Anonymous Credential Protocol Based on SM2 Digital SignatureZHAO Yan-Qi, YANG Xiao-Yi, FENG Qi, YU YongPublished July 06, 2024 (13 pages)2024,35(7):3469-3481 [Abstract(825)] [View PDF(2476)6.33 M]Construction Method of Complete Cryptographic Reverse Firewall for IBEZHAO Yi, LIU Hang, MING Yang, YANG BoPublished July 06, 2024 (15 pages)2024,35(7):3482-3496 [Abstract(470)] [View PDF(1818)6.91 M]Black-box Transferable Attack Method for Object Detection Based on GANLU Yu-Xuan, LIU Ze-Yu, LUO Yong-Gang, DENG Sen-You, JIANG Tian, MA Jin-Yan, DONG Yin-PengPublished July 06, 2024 (20 pages)2024,35(7):3531-3550 [Abstract(811)] [View PDF(1797)12.55 M]
PrefaceZHANG Lu, LIU Hui, JIANG Jia-Jun, WANG BoPublished July 06, 2024 (2 pages)2024,35(7):3069-3070 [Abstract(520)] [View PDF(1635)481.72 K]Empirical Study on Data Leakage Problem in Neural Program RepairLI Qing-Yuan, ZHONG Wen-Kang, LI Chuan-Yi, GE Ji-Dong, LUO BinPublished July 06, 2024 (22 pages)2024,35(7):3071-3092 [Abstract(604)] [View PDF(2117)2.60 M]Comparison Research on Rule-based and Learning-based Mutation TechniquesGONG Zhi-Hao, CHEN Yi-Zhou, CHEN Jun-Jie, HAO DanPublished July 06, 2024 (23 pages)2024,35(7):3093-3114 [Abstract(501)] [View PDF(2155)2.86 M]AmazeMap: Microservices Fault Localization Method Based on Multi-level Impact GraphLI Ya-Xiao, LI Qing-Shan, WANG Lu, JIANG Yu-XuanPublished July 06, 2024 (27 pages)2024,35(7):3115-3140 [Abstract(708)] [View PDF(2465)3.30 M]Fuzzing Approach of Clustering Analysis-driven in Seed SchedulingZHANG Wen, CHEN Jin-Fu, CAI Sai-Hua, ZHANG Chi, LIU Yi-SongPublished July 06, 2024 (20 pages)2024,35(7):3141-3161 [Abstract(662)] [View PDF(2200)3.66 M]GUI Fuzzing Framework for Mobile Apps Based on Multi-modal RepresentationZHANG Shao-Kun, LI Yuan-Chun, LEI Han-Wen, JIANG Peng, LI Ding, GUO Yao, CHEN Xiang-QunPublished July 06, 2024 (18 pages)2024,35(7):3162-3179 [Abstract(663)] [View PDF(2106)2.57 M]APP Software Defect Tracking and Analysis Method Oriented to Version EvolutionLIU Hai-Yi, JIANG Ying, ZHAO Ze-JiangPublished July 06, 2024 (23 pages)2024,35(7):3180-3203 [Abstract(467)] [View PDF(2010)3.16 M]Fine-grained JVM Test Program Reduction Method Based on Program ConstraintsDU Yi-Heng, WANG Zan, ZHAO Ying-Quan, CHEN Jun-Jie, CHEN Xiang, HOU De-Jun, ZHENG KaiPublished July 06, 2024 (23 pages)2024,35(7):3204-3226 [Abstract(360)] [View PDF(1800)3.46 M]Defect Category Prediction Method Based on Multi-source Domain AdaptationXING Ying, ZHAO Meng-Ci, YANG Bin, ZHANG Yu-Wei, LI Wen-Jin, GU Jia-Wei, YUAN JunPublished July 06, 2024 (17 pages)2024,35(7):3227-3244 [Abstract(568)] [View PDF(1992)2.53 M]Software Bug Location Method Combining Information Retrieval and Deep Model FeaturesSHEN Zong-Wen, NIU Fei-Fei, LI Chuan-Yi, CHEN Xiang, LI Qi, GE Ji-Dong, LUO BinPublished July 06, 2024 (19 pages)2024,35(7):3245-3264 [Abstract(699)] [View PDF(2154)3.15 M]
Survey on Code Review Automation ResearchHUA Zi-Han, YANG Li, LU Jun-Yi, ZUO ChunPublished July 06, 2024 (26 pages)2024,35(7):3265-3290 [Abstract(1286)] [View PDF(3439)2.88 M]Survey on Deep Learning Methods for Freehand-sketch-based Visual Content GenerationZUO Ran, HU Hao-Xiang, DENG Xiao-Ming, MA Cui-Xia, WANG Hong-AnPublished July 06, 2024 (34 pages)2024,35(7):3497-3530 [Abstract(659)] [View PDF(2389)10.06 M]