Volume 36,Issue 7,2025 Table of Contents
Efficient Differential Privacy Random Forest Training AlgorithmWANG Shu-Lan, QIU Yao, ZHAO Chen-Bin, ZOU Jia-Xu, WANG Cai-Fen2025,36(7):0 [Abstract(49)] [View PDF(42)1.32 M]Semantic Aware Greybox Compiler FuzzingOU Xian-Fei, JIANG Yan-Yan, XU Chang2025,36(7):0 [Abstract(38)] [View PDF(40)925.64 K]Survey of Dynamic Testing Methods for Distributed SystemsCHEN Yuan-Liang, MA Fu-Chen, ZHOU Yuan-Hang, YAN Zhen, JIANG Yu, SUN Jia-Guang2025,36(7):0 [Abstract(45)] [View PDF(48)1.66 M]Binary2Source Function Similarity Detection under Function InliningJIA Ang, FAN Ming, XU Xi, JIN Wu-Xia, WANG Hai-Jun, LIU Ting2025,36(7):0 [Abstract(31)] [View PDF(37)1.25 M]Toward Understanding the Current Status and Evolution of Deep Learning Compiler BugsSHEN Qing-Chao, TIAN Jia-Shuo, CHEN Jun-Jie, CHEN Xiang, CHEN Qing-Yan, WANG Zan2025,36(7):0 [Abstract(38)] [View PDF(44)916.64 K]Empirical Study of Code Smell Detection on Active LearningCHEN Hao-Xuan, LIU Lei, HUANG Ruo-Xuan, ZHANG Yi-Zhuo, HU Wen-Hua, MA Chuan-Xiang2025,36(7):0 [Abstract(29)] [View PDF(36)3.76 M]Empirical Study and Unified Detection Technique of Dependency Smells in Java ProjectsSUN Wei-Jie, XU Chang, WANG Ying2025,36(7):0 [Abstract(34)] [View PDF(33)2.55 M]Scalable Secure Iris Recognition Combining Feature Generation and ReplayZHAO Dong-Dong, SONG Bao-Gang, LIAO Hu-Cheng, YAN Jiang, XIANG Jian-Wen2025,36(7):0 [Abstract(28)] [View PDF(43)1.59 M]Dynamic Random Testing Approach for Intelligent Agent Path Planning AlgorithmsZHANG Xiao-Yi, LI Xing, LIU Yang, ZHENG Zheng, SUN Chang-Ai2025,36(7):0 [Abstract(30)] [View PDF(32)1.99 M]Software Vulnerability Detection Based on Correlation of Structural Features between FunctionsQIU Shao-Jian, CHENG Jia-Hao, HUANG Meng-Yang, HUANG Qiong2025,36(7):0 [Abstract(60)] [View PDF(56)1.71 M]