Volume 35,Issue 7,2024 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Identification of Memory Copy Function via Hybrid Static and Dynamic Analysis
  • YIN Xiao-Kang, CAI Rui-Jie, YANG Qi-Chao, LIU Sheng-Li
  • Published July 06, 2024 (23 pages)
  • 2024,35(7):3291-3313 [Abstract(468)]  [View PDF(1622)7.28 M]
  • SMTLOC: Bug Localization for SMT Solver Based on Multi-source Spectrum
  • WANG Xiao-Shuang, ZHOU Zhi-De, LI Xiao-Chen, JIANG He, REN Zhi-Lei
  • Published July 06, 2024 (18 pages)
  • 2024,35(7):3314-3331 [Abstract(361)]  [View PDF(1618)7.21 M]
  • Dynamic Mitigation Solution Based on eBPF Against Kernel Heap Vulnerabilities
  • WANG Zi-Cheng, GUO Ying-Gang, ZHONG Bing-Nan, CHEN Yue-Qi, ZENG Qing-Kai
  • Published July 06, 2024 (23 pages)
  • 2024,35(7):3332-3354 [Abstract(773)]  [View PDF(1798)9.14 M]
  • Mutation-based Generation Algorithm of Negative Test Strings from Regular Expressions
  • ZHENG Li-Xiao, YU Li-Lin, CHEN Hai-Ming, CHEN Zu-Xi, LUO Xiang-Yu, WANG Xiao-Yong
  • Published July 06, 2024 (22 pages)
  • 2024,35(7):3355-3376 [Abstract(425)]  [View PDF(1603)8.68 M]
  • Dynamic Multitask Learning Approach for Contract Information Extraction
  • WANG Hao-Chang, ZHENG Guan-Yu, ZHAO Tie-Jun
  • Published July 06, 2024 (15 pages)
  • 2024,35(7):3377-3391 [Abstract(498)]  [View PDF(1631)4.99 M]
  • Chinese BERT Attack Method Based on Masked Language Model
  • ZHANG Yun-Ting, YE Lin, TANG Hao-Lin, ZHANG Hong-Li, LI Shang
  • Published July 06, 2024 (18 pages)
  • 2024,35(7):3392-3409 [Abstract(597)]  [View PDF(1860)9.28 M]
  • Label Distribution Learning Method Based on Deep Forest and Heterogeneous Ensemble
  • WANG Yi-Fei, ZHU Ji-Hua, LIU Xin-Yuan, ZHOU Yi-Yang
  • Published July 06, 2024 (18 pages)
  • 2024,35(7):3410-3427 [Abstract(427)]  [View PDF(1740)6.76 M]
  • Recency-bias-avoiding Partitioned Incremental Learning Based on Self-learning Mask
  • YAO Hong-Ge, WU Zi-Yi, MA Jiao-Jiao, SHI Jun, CHENG Si-Yi, CHEN You, YU Jun, JIANG Hong
  • Published July 06, 2024 (26 pages)
  • 2024,35(7):3428-3453 [Abstract(438)]  [View PDF(1535)14.21 M]
  • Federated Learning Watermark Based on Model Backdoor
  • LI Xuan, DENG Tian-Peng, XIONG Jin-Bo, JIN Biao, LIN Jie
  • Published July 06, 2024 (15 pages)
  • 2024,35(7):3454-3468 [Abstract(839)]  [View PDF(1982)7.70 M]
  • Anonymous Credential Protocol Based on SM2 Digital Signature
  • ZHAO Yan-Qi, YANG Xiao-Yi, FENG Qi, YU Yong
  • Published July 06, 2024 (13 pages)
  • 2024,35(7):3469-3481 [Abstract(825)]  [View PDF(2476)6.33 M]
  • Construction Method of Complete Cryptographic Reverse Firewall for IBE
  • ZHAO Yi, LIU Hang, MING Yang, YANG Bo
  • Published July 06, 2024 (15 pages)
  • 2024,35(7):3482-3496 [Abstract(470)]  [View PDF(1818)6.91 M]
  • Black-box Transferable Attack Method for Object Detection Based on GAN
  • LU Yu-Xuan, LIU Ze-Yu, LUO Yong-Gang, DENG Sen-You, JIANG Tian, MA Jin-Yan, DONG Yin-Peng
  • Published July 06, 2024 (20 pages)
  • 2024,35(7):3531-3550 [Abstract(811)]  [View PDF(1797)12.55 M]
  • Special Issue's Articles

  • Preface
  • ZHANG Lu, LIU Hui, JIANG Jia-Jun, WANG Bo
  • Published July 06, 2024 (2 pages)
  • 2024,35(7):3069-3070 [Abstract(520)]  [View PDF(1635)481.72 K]
  • Empirical Study on Data Leakage Problem in Neural Program Repair
  • LI Qing-Yuan, ZHONG Wen-Kang, LI Chuan-Yi, GE Ji-Dong, LUO Bin
  • Published July 06, 2024 (22 pages)
  • 2024,35(7):3071-3092 [Abstract(604)]  [View PDF(2117)2.60 M]
  • Comparison Research on Rule-based and Learning-based Mutation Techniques
  • GONG Zhi-Hao, CHEN Yi-Zhou, CHEN Jun-Jie, HAO Dan
  • Published July 06, 2024 (23 pages)
  • 2024,35(7):3093-3114 [Abstract(501)]  [View PDF(2155)2.86 M]
  • AmazeMap: Microservices Fault Localization Method Based on Multi-level Impact Graph
  • LI Ya-Xiao, LI Qing-Shan, WANG Lu, JIANG Yu-Xuan
  • Published July 06, 2024 (27 pages)
  • 2024,35(7):3115-3140 [Abstract(708)]  [View PDF(2465)3.30 M]
  • Fuzzing Approach of Clustering Analysis-driven in Seed Scheduling
  • ZHANG Wen, CHEN Jin-Fu, CAI Sai-Hua, ZHANG Chi, LIU Yi-Song
  • Published July 06, 2024 (20 pages)
  • 2024,35(7):3141-3161 [Abstract(662)]  [View PDF(2200)3.66 M]
  • GUI Fuzzing Framework for Mobile Apps Based on Multi-modal Representation
  • ZHANG Shao-Kun, LI Yuan-Chun, LEI Han-Wen, JIANG Peng, LI Ding, GUO Yao, CHEN Xiang-Qun
  • Published July 06, 2024 (18 pages)
  • 2024,35(7):3162-3179 [Abstract(663)]  [View PDF(2106)2.57 M]
  • APP Software Defect Tracking and Analysis Method Oriented to Version Evolution
  • LIU Hai-Yi, JIANG Ying, ZHAO Ze-Jiang
  • Published July 06, 2024 (23 pages)
  • 2024,35(7):3180-3203 [Abstract(467)]  [View PDF(2010)3.16 M]
  • Fine-grained JVM Test Program Reduction Method Based on Program Constraints
  • DU Yi-Heng, WANG Zan, ZHAO Ying-Quan, CHEN Jun-Jie, CHEN Xiang, HOU De-Jun, ZHENG Kai
  • Published July 06, 2024 (23 pages)
  • 2024,35(7):3204-3226 [Abstract(360)]  [View PDF(1800)3.46 M]
  • Defect Category Prediction Method Based on Multi-source Domain Adaptation
  • XING Ying, ZHAO Meng-Ci, YANG Bin, ZHANG Yu-Wei, LI Wen-Jin, GU Jia-Wei, YUAN Jun
  • Published July 06, 2024 (17 pages)
  • 2024,35(7):3227-3244 [Abstract(568)]  [View PDF(1992)2.53 M]
  • Software Bug Location Method Combining Information Retrieval and Deep Model Features
  • SHEN Zong-Wen, NIU Fei-Fei, LI Chuan-Yi, CHEN Xiang, LI Qi, GE Ji-Dong, LUO Bin
  • Published July 06, 2024 (19 pages)
  • 2024,35(7):3245-3264 [Abstract(699)]  [View PDF(2154)3.15 M]
  • Review Articles

  • Survey on Code Review Automation Research
  • HUA Zi-Han, YANG Li, LU Jun-Yi, ZUO Chun
  • Published July 06, 2024 (26 pages)
  • 2024,35(7):3265-3290 [Abstract(1286)]  [View PDF(3439)2.88 M]
  • Survey on Deep Learning Methods for Freehand-sketch-based Visual Content Generation
  • ZUO Ran, HU Hao-Xiang, DENG Xiao-Ming, MA Cui-Xia, WANG Hong-An
  • Published July 06, 2024 (34 pages)
  • 2024,35(7):3497-3530 [Abstract(659)]  [View PDF(2389)10.06 M]