Advanced Search

    column
    Preface
    Bai Xiang, Jiang Jie, Yin Yilong, Wang Hao
    2025, 62(9): 2125-2126. DOI: 10.7544/issn1000-1239.20259
    Abstract PDF
    Reinforcement Learning-Based Feature Generation Algorithm for Scientific Data
    Xiao Meng, Zhou Junfeng, Zhou Yuanchun
    2025, 62(9): 2127-2138. DOI: 10.7544/issn1000-1239.202550306
    Abstract PDF
    Clustering Method for Tabular Data Based on Pretrained Foundation Models with Synthetic Data
    Li Peiwen, Li Feijiang, Wang Jieting, Qian Yuhua
    2025, 62(9): 2139-2151. DOI: 10.7544/issn1000-1239.202550405
    Abstract PDF
    Context-Aware Adaptive Exercise Recommendation Method for Response Sequences Data
    Chen Zejun, Zhang Suojuan, Chen Weiwei, Cui Jing, Long Jiaqi, Chen Enhong
    2025, 62(9): 2152-2165. DOI: 10.7544/issn1000-1239.202550396
    Abstract PDF
    Confidence-Guided Multimodal Data Test-Time Adaptation Framework
    Yin Xiaolong, Zhan Dechuan, Jiang Yuan
    2025, 62(9): 2166-2182. DOI: 10.7544/issn1000-1239.202550418
    Abstract PDF
    Robust Text-Based Person Retrieval Under Complex Noisy Data
    Hu Bingyu, Xu Yixin, Yu Shan, Zhao Jufeng, Yang Yuxiang
    2025, 62(9): 2183-2193. DOI: 10.7544/issn1000-1239.202550394
    Abstract PDF
    Progressive Cognition-Guided Dual-Domain Semi-Supervised Crowd Counting
    Yu Ying, Fan Zaichang, Zeng Kangli, Huang Xiaohui, Miao Duoqian
    2025, 62(9): 2194-2207. DOI: 10.7544/issn1000-1239.202550453
    Abstract PDF
    Survey of Multimodal Vision-Language Representation Learning Models and Their Adversarial Examples Attack and Defense Techniques
    Zeng Cheng, Ge Yunjie, Zhao Lingchen, Wang Qian
    2025, 62(9): 2208-2232. DOI: 10.7544/issn1000-1239.202550410
    Abstract PDF
    Survey of Incomplete Time Series Imputation Methods Based on Deep Learning
    Zhou Li, Wu Yangyang, Miao Xiaoye
    2025, 62(9): 2233-2258. DOI: 10.7544/issn1000-1239.202550449
    Abstract PDF
    Privacy Auditing in Data Governance
    Xu Jingnan, Wang Leixia, Meng Xiaofeng
    2025, 62(9): 2259-2282. DOI: 10.7544/issn1000-1239.202440530
    Abstract PDF
    Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage
    Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong
    2025, 62(9): 2283-2297. DOI: 10.7544/issn1000-1239.202440379
    Abstract PDF
    Malicious Domain Detection Technology Based on Semantic Graph Learning
    Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang
    2025, 62(9): 2298-2314. DOI: 10.7544/issn1000-1239.202440375
    Abstract PDF
    A Searchable Encryption Scheme Based on Approximate Trapdoor Sampling
    Qi Lijun, Zhuang Jincheng
    2025, 62(9): 2315-2329. DOI: 10.7544/issn1000-1239.202440482
    Abstract PDF
    Efficient Software Optimization Implementations of NTRU Lattice-Based Key Encapsulation Mechanisms
    Zheng Jieyu, Song Zhenyu, Zhu Haoliang, Zhao Yunlei, Lin Jingqiang, Fan jing
    2025, 62(9): 2330-2347. DOI: 10.7544/issn1000-1239.202440478
    Abstract PDF
    LHG-VD: A Learnable Hierarchical Graph Representation Vulnerability Detection Method
    Hu Song, Luo Jiachi, Wan Wenkai, Yan Yang, Guo Fan, Qu Yanwen
    2025, 62(9): 2348-2361. DOI: 10.7544/issn1000-1239.202440171
    Abstract PDF
    Modeling and Compositional Verification Method by Time Period for Airborne System Software Requirements
    Huang Yike, Ruan Kun, Chen Xiaohong, Jin Zhi
    2025, 62(9): 2362-2381. DOI: 10.7544/issn1000-1239.202440003
    Abstract PDF
    A Performance Data Collection Method for Computing Software in Heterogeneous Systems
    Gu Beibei, Qiu Jiyan, Wang Ning, Chen Jian, Chi Xuebin
    2025, 62(9): 2382-2395. DOI: 10.7544/issn1000-1239.202440512
    Abstract PDF