Volume 35,Issue 8,2024 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Hexagonal Loop Tiling for Jacobi Computation Optimization Method
  • QU Bin, LIU Song, ZHANG Zeng-Yuan, MA Jie, WU Wei-Guo
  • Published August 06, 2024 (18 pages)
  • 2024,35(8):3721-3738 [Abstract(651)]  [View PDF(1718)2.48 M]
  • Anchor-based Unsupervised Cross-modal Hashing
  • HU Peng, PENG Xi, PENG De-Zhong
  • Published August 06, 2024 (13 pages)
  • 2024,35(8):3739-3751 [Abstract(616)]  [View PDF(1757)5.15 M]
  • Code-search-oriented Function Multigraph Embedding
  • XU Yang, CHEN Xiao-Jie, TANG De-You, HUANG Han
  • Published August 06, 2024 (15 pages)
  • 2024,35(8):3809-3823 [Abstract(608)]  [View PDF(1710)5.65 M]
  • Software Change Prediction Based on Hybrid Graph Representation
  • YANG Xin-Yue, LIU An, ZHAO Lei, CHEN Lin, ZHANG Xiao-Fang
  • Published August 06, 2024 (19 pages)
  • 2024,35(8):3824-3842 [Abstract(500)]  [View PDF(1739)2.85 M]
  • Over-parameterized Graph Neural Network Towards Robust Graph Structure Defending
  • CHU Xu, MA Xin-Yu, LIN Yang, WANG Xin, WANG Ya-Sha, ZHU Wen-Wu, MEI Hong
  • Published August 06, 2024 (19 pages)
  • 2024,35(8):3878-3896 [Abstract(408)]  [View PDF(1357)3.62 M]
  • Special Issue's Articles

  • Preface
  • XIANG Jian-Wen, CHEN Ting, WANG Hao-Yu, LUO Xia-Bu, YANG Min
  • Published August 06, 2024 (2 pages)
  • 2024,35(8):3551-3552 [Abstract(427)]  [View PDF(1600)492.84 K]
  • Dual Offline Anonymous E-payment Scheme for Mobile Devices Based on TEE and SE
  • YANG Bo, FENG Wei, QIN Yu, ZHANG Yan-Chao, TONG Dong
  • Published August 06, 2024 (23 pages)
  • 2024,35(8):3553-3576 [Abstract(867)]  [View PDF(2970)3.22 M]
  • UEFI Fuzz Testing Method Based on Heuristic Reverse Analysis
  • LIN Xin-Kang, GU Kuang-Yu, ZHAO Lei
  • Published August 06, 2024 (14 pages)
  • 2024,35(8):3577-3590 [Abstract(757)]  [View PDF(2943)1.92 M]
  • FirmDep: Embedded Application Rehosting Assisted with Dynamic Analysis
  • WU Hua-Mao, JIANG Mu-Hui, ZHOU Ya-Jin, LI Jin-Ku
  • Published August 06, 2024 (18 pages)
  • 2024,35(8):3591-3609 [Abstract(570)]  [View PDF(2666)2.58 M]
  • Network-side Alert Prioritization Method Based on Multivariate Data Fusion
  • WANG Wei-Jing, CHEN Jun-Jie, YANG Lin, HOU De-Jun, WANG Xing-Kai, WU Fu-Di, ZHANG Run-Zi, WANG Zan
  • Published August 06, 2024 (17 pages)
  • 2024,35(8):3610-3625 [Abstract(537)]  [View PDF(2659)2.30 M]
  • DGA Domain Name Detection Method Based on Double Branch Feature Extraction and Adaptive Capsule Network
  • YANG Hong-Yu, ZHANG Tao, ZHANG Liang, CHENG Xiang, HU Ze
  • Published August 06, 2024 (20 pages)
  • 2024,35(8):3626-3646 [Abstract(572)]  [View PDF(2968)3.26 M]
  • Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection Models
  • CHEN Si-Ran, WU Jing-Zheng, LING Xiang, LUO Tian-Yue, LIU Jia-Yu, WU Yan-Jun
  • Published August 06, 2024 (22 pages)
  • 2024,35(8):3647-3667 [Abstract(1560)]  [View PDF(3539)4.04 M]
  • Compliance Detection Method for Mobile Application Privacy Policy Statement
  • WANG Yin, FAN Ming, TAO Jun-Jie, LEI Jing-Yi, JIN Wu-Xia, HAN De-Qiang, LIU Ting
  • Published August 06, 2024 (16 pages)
  • 2024,35(8):3668-3683 [Abstract(523)]  [View PDF(2836)2.51 M]
  • Underground Application Collection Method Based on Spiking Traffic Analysis
  • CHEN Pei, HONG Geng, WU Meng-Ying, CHEN Jin-Song, DUAN Hai-Xin, YANG Min
  • Published August 06, 2024 (15 pages)
  • 2024,35(8):3684-3697 [Abstract(536)]  [View PDF(2375)2.10 M]
  • Privacy-preserving Graph Neural Network Recommendation System Based on Negative Database
  • ZHAO Dong-Dong, XU Hu, PENG Si-Yun, ZHOU Jun-Wei
  • Published August 06, 2024 (24 pages)
  • 2024,35(8):3698-3720 [Abstract(864)]  [View PDF(3130)3.85 M]
  • Review Articles

  • Survey on Testing of Deep Learning Frameworks
  • MA Xiang-Yue, DU Xiao-Ting, CAI Qing, ZHENG Yang, HU Zheng, ZHENG Zheng
  • Published August 06, 2024 (33 pages)
  • 2024,35(8):3752-3784 [Abstract(1194)]  [View PDF(3788)6.59 M]
  • Survey on Few-shot for Malware Detection
  • LIU Hao, TIAN Zhi-Hong, QIU Jing, LIU Yuan, FANG Bin-Xing
  • Published August 06, 2024 (24 pages)
  • 2024,35(8):3785-3808 [Abstract(1158)]  [View PDF(3728)6.14 M]
  • Survey on Quantum Machine Learning
  • WANG Jian, ZHANG Rui, JIANG Nan
  • Published August 06, 2024 (35 pages)
  • 2024,35(8):3843-3877 [Abstract(1280)]  [View PDF(5683)8.87 M]
  • Review on Temporal Graph Neural Networks for Financial Risk Prediction
  • SONG Ling-Yun, MA Zhuo-Yuan, LI Zhan-Huai, SHANG Xue-Qun
  • Published August 06, 2024 (26 pages)
  • 2024,35(8):3897-3922 [Abstract(1585)]  [View PDF(5470)9.66 M]
  • Research Progress and Trend of Temporal Knowledge Graph Representation and Reasoning
  • WANG Yu-Han, CHEN Zi-Yang, ZHAO Xiang, TAN Zhen, XIAO Wei-Dong, CHENG Xue-Qi
  • Published August 06, 2024 (29 pages)
  • 2024,35(8):3923-3951 [Abstract(1612)]  [View PDF(5355)9.25 M]
  • Survey on Network Congestion Control Algorithms
  • JIANG Wan-Chun, LI Hao-Yang, CHEN Han-Yu, WANG Jie, WANG Jian-Xin, RUAN Chang
  • Published August 06, 2024 (28 pages)
  • 2024,35(8):3952-3979 [Abstract(1081)]  [View PDF(5711)3.64 M]
  • Survey on Key Techniques of Encrypted Computing in Fully Encrypted Databases
  • BI Shu-Ren, NIU Ze-Ping, LI Guo-Liang, LI Qi
  • Published August 06, 2024 (31 pages)
  • 2024,35(8):3980-4010 [Abstract(893)]  [View PDF(3946)7.69 M]