Volume 35,Issue 8,2024 Table of ContentsDownload Contents
Hexagonal Loop Tiling for Jacobi Computation Optimization MethodQU Bin, LIU Song, ZHANG Zeng-Yuan, MA Jie, WU Wei-GuoPublished August 06, 2024 (18 pages)2024,35(8):3721-3738 [Abstract(651)] [View PDF(1718)2.48 M]Anchor-based Unsupervised Cross-modal HashingHU Peng, PENG Xi, PENG De-ZhongPublished August 06, 2024 (13 pages)2024,35(8):3739-3751 [Abstract(616)] [View PDF(1757)5.15 M]Code-search-oriented Function Multigraph EmbeddingXU Yang, CHEN Xiao-Jie, TANG De-You, HUANG HanPublished August 06, 2024 (15 pages)2024,35(8):3809-3823 [Abstract(608)] [View PDF(1710)5.65 M]Software Change Prediction Based on Hybrid Graph RepresentationYANG Xin-Yue, LIU An, ZHAO Lei, CHEN Lin, ZHANG Xiao-FangPublished August 06, 2024 (19 pages)2024,35(8):3824-3842 [Abstract(500)] [View PDF(1739)2.85 M]Over-parameterized Graph Neural Network Towards Robust Graph Structure DefendingCHU Xu, MA Xin-Yu, LIN Yang, WANG Xin, WANG Ya-Sha, ZHU Wen-Wu, MEI HongPublished August 06, 2024 (19 pages)2024,35(8):3878-3896 [Abstract(408)] [View PDF(1357)3.62 M]
PrefaceXIANG Jian-Wen, CHEN Ting, WANG Hao-Yu, LUO Xia-Bu, YANG MinPublished August 06, 2024 (2 pages)2024,35(8):3551-3552 [Abstract(427)] [View PDF(1600)492.84 K]Dual Offline Anonymous E-payment Scheme for Mobile Devices Based on TEE and SEYANG Bo, FENG Wei, QIN Yu, ZHANG Yan-Chao, TONG DongPublished August 06, 2024 (23 pages)2024,35(8):3553-3576 [Abstract(867)] [View PDF(2970)3.22 M]UEFI Fuzz Testing Method Based on Heuristic Reverse AnalysisLIN Xin-Kang, GU Kuang-Yu, ZHAO LeiPublished August 06, 2024 (14 pages)2024,35(8):3577-3590 [Abstract(757)] [View PDF(2943)1.92 M]FirmDep: Embedded Application Rehosting Assisted with Dynamic AnalysisWU Hua-Mao, JIANG Mu-Hui, ZHOU Ya-Jin, LI Jin-KuPublished August 06, 2024 (18 pages)2024,35(8):3591-3609 [Abstract(570)] [View PDF(2666)2.58 M]Network-side Alert Prioritization Method Based on Multivariate Data FusionWANG Wei-Jing, CHEN Jun-Jie, YANG Lin, HOU De-Jun, WANG Xing-Kai, WU Fu-Di, ZHANG Run-Zi, WANG ZanPublished August 06, 2024 (17 pages)2024,35(8):3610-3625 [Abstract(537)] [View PDF(2659)2.30 M]DGA Domain Name Detection Method Based on Double Branch Feature Extraction and Adaptive Capsule NetworkYANG Hong-Yu, ZHANG Tao, ZHANG Liang, CHENG Xiang, HU ZePublished August 06, 2024 (20 pages)2024,35(8):3626-3646 [Abstract(572)] [View PDF(2968)3.26 M]Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection ModelsCHEN Si-Ran, WU Jing-Zheng, LING Xiang, LUO Tian-Yue, LIU Jia-Yu, WU Yan-JunPublished August 06, 2024 (22 pages)2024,35(8):3647-3667 [Abstract(1560)] [View PDF(3539)4.04 M]Compliance Detection Method for Mobile Application Privacy Policy StatementWANG Yin, FAN Ming, TAO Jun-Jie, LEI Jing-Yi, JIN Wu-Xia, HAN De-Qiang, LIU TingPublished August 06, 2024 (16 pages)2024,35(8):3668-3683 [Abstract(523)] [View PDF(2836)2.51 M]Underground Application Collection Method Based on Spiking Traffic AnalysisCHEN Pei, HONG Geng, WU Meng-Ying, CHEN Jin-Song, DUAN Hai-Xin, YANG MinPublished August 06, 2024 (15 pages)2024,35(8):3684-3697 [Abstract(536)] [View PDF(2375)2.10 M]Privacy-preserving Graph Neural Network Recommendation System Based on Negative DatabaseZHAO Dong-Dong, XU Hu, PENG Si-Yun, ZHOU Jun-WeiPublished August 06, 2024 (24 pages)2024,35(8):3698-3720 [Abstract(864)] [View PDF(3130)3.85 M]
Survey on Testing of Deep Learning FrameworksMA Xiang-Yue, DU Xiao-Ting, CAI Qing, ZHENG Yang, HU Zheng, ZHENG ZhengPublished August 06, 2024 (33 pages)2024,35(8):3752-3784 [Abstract(1194)] [View PDF(3788)6.59 M]Survey on Few-shot for Malware DetectionLIU Hao, TIAN Zhi-Hong, QIU Jing, LIU Yuan, FANG Bin-XingPublished August 06, 2024 (24 pages)2024,35(8):3785-3808 [Abstract(1158)] [View PDF(3728)6.14 M]Survey on Quantum Machine LearningWANG Jian, ZHANG Rui, JIANG NanPublished August 06, 2024 (35 pages)2024,35(8):3843-3877 [Abstract(1280)] [View PDF(5683)8.87 M]Review on Temporal Graph Neural Networks for Financial Risk PredictionSONG Ling-Yun, MA Zhuo-Yuan, LI Zhan-Huai, SHANG Xue-QunPublished August 06, 2024 (26 pages)2024,35(8):3897-3922 [Abstract(1585)] [View PDF(5470)9.66 M]Research Progress and Trend of Temporal Knowledge Graph Representation and ReasoningWANG Yu-Han, CHEN Zi-Yang, ZHAO Xiang, TAN Zhen, XIAO Wei-Dong, CHENG Xue-QiPublished August 06, 2024 (29 pages)2024,35(8):3923-3951 [Abstract(1612)] [View PDF(5355)9.25 M]Survey on Network Congestion Control AlgorithmsJIANG Wan-Chun, LI Hao-Yang, CHEN Han-Yu, WANG Jie, WANG Jian-Xin, RUAN ChangPublished August 06, 2024 (28 pages)2024,35(8):3952-3979 [Abstract(1081)] [View PDF(5711)3.64 M]Survey on Key Techniques of Encrypted Computing in Fully Encrypted DatabasesBI Shu-Ren, NIU Ze-Ping, LI Guo-Liang, LI QiPublished August 06, 2024 (31 pages)2024,35(8):3980-4010 [Abstract(893)] [View PDF(3946)7.69 M]