Advanced Search
    Publish Online Articles in press have been peer-reviewed and accepted, which are not yet assigned to volumes /issues, but are citable by Digital Object Identifier (DOI).
    Survey of Multimodal Vision-Language Representation Learning Models and Their Adversarial Examples Attack and Defense Techniques
    Zeng Cheng, Ge Yunjie, Zhao Lingchen, Wang Qian
    DOI: 10.7544/issn1000-1239.202550410
    Abstract PDF
    A Performance Data Collection Method for Computing Software in Heterogeneous Systems
    Gu Beibei, Qiu Jiyan, Wang Ning, Chen Jian, Chi Xuebin
    DOI: 10.7544/issn1000-1239.202440512
    Abstract PDF
    LHG-VD: A Learnable Hierarchical Graph Representation Vulnerability Detection Approach
    Hu Song, Luo Jiachi, Wan Wenkai, Yan Yang, Guo Fan, Qu Yanwen
    DOI: 10.7544/issn1000-1239.202440171
    Abstract PDF
    Efficient Software Optimization Implementations of NTRU Lattice-Based Key Encapsulation Mechanisms
    Zheng Jieyu, Song Zhenyu, Zhu Haoliang, Zhao Yunlei, Lin Jingqiang, Fan jing
    DOI: 10.7544/issn1000-1239.202440478
    Abstract PDF
    Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage
    Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong
    DOI: 10.7544/issn1000-1239.202440379
    Abstract PDF
    Robust Text-Based Person Retrieval under Complex Noisy Data
    Hu Bingyu, Xu Yixin, Yu Shan, Zhao Jufeng, Yang Yuxiang
    DOI: 10.7544/issn1000-1239.202550394
    Abstract PDF
    Confidence-Guided Multimodal Data Test-Time Adaptation Framework
    Yin Xiaolong, Zhan Dechuan, Jiang Yuan
    DOI: 10.7544/issn1000-1239.202550418
    Abstract PDF
    Context-Aware Adaptive Exercise Recommendation Method for Response Sequences Data
    Chen Zejun, Zhang Suojuan, Chen Weiwei, Cui Jing, Long Jiaqi, Chen Enhong
    DOI: 10.7544/issn1000-1239.202550396
    Abstract PDF
    Clustering Method for Tabular Data Based on Pretrained Foundation Models with Synthetic Data
    Li Peiwen, Li Feijiang, Wang Jieting, Qian Yuhua
    DOI: 10.7544/issn1000-1239.202550405
    Abstract PDF
    Reinforcement Learning-Based Feature Generation Algorithm for Scientific Data
    Xiao Meng, Zhou Junfeng, Zhou Yuanchun
    DOI: 10.7544/issn1000-1239.202550306
    Abstract PDF
    Modeling and Compositional Verification Method by Time Period for Airborne System Software Requirements
    Huang Yike, Ruan Kun, Chen Xiaohong, Jin Zhi
    DOI: 10.7544/issn1000-1239.202440003
    Abstract PDF
    Privacy Auditing in Data Governance
    Xu Jingnan, Wang Leixia, Meng Xiaofeng
    DOI: 10.7544/issn1000-1239.202440530
    Abstract PDF
    Malicious Domain Detection Technology Based on Semantic Graph Learning
    Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang
    DOI: 10.7544/issn1000-1239.202440375
    Abstract PDF
    Preface
    Bai Xiang, Jiang Jie, Yin Yilong, Wang Hao
    DOI: 10.7544/issn1000-1239.20259
    Abstract PDF
    Progressive Cognition-Guided Dual-Domain Semi-Supervised Crowd Counting
    Yu Ying, Fan Zaichang, Zeng Kangli, Huang Xiaohui, Miao Duoqian
    DOI: 10.7544/issn1000-1239.202550453
    Abstract PDF
    A Searchable Encryption Scheme Based on Approximate Trapdoor Sampling
    Qi Lijun, Zhuang Jincheng
    DOI: 10.7544/issn1000-1239.202440482
    Abstract PDF
    Survey of Incomplete Time Series Imputation Methods Based on Deep Learning
    Zhou Li, Wu Yangyang, Miao Xiaoye
    DOI: 10.7544/issn1000-1239.202550449
    Abstract PDF
    Low-Latency Transmission Techniques for Large-Scale Internet Services
    Lü Gerui, Zhao Yuankang, Zhang Jiaxing, Pan Heng, Wu Qinghua, Li Zhenyu
    DOI: 10.7544/issn1000-1239.
    Abstract PDF
    A Lightweight Blockchain-Based Cross-Domain Authentication and Data Sharing Scheme for the Industrial Internet of Things
    Li Zhecheng, Zhang Bo
    DOI: 10.7544/issn1000-1239.202550402
    Abstract PDF
    Lattice-Based Conditional Privacy-Preserving Aggregate Authentication Without Sampling in Vehicular Ad Hoc Network
    Zhang Jing, Yang Zhi, Cui Jie, Xu Yan, Zhong Hong
    DOI: 10.7544/issn1000-1239.202440454
    Abstract PDF
    Adversarial Transfer Attacks on Weak Block of SAM Downstream Models
    Ding Yi, Lin Nengjian, Jiang Yuntao, Zhong Yuhao, Cao Mingsheng
    DOI: 10.7544/issn1000-1239.202550388
    Abstract PDF
    DecXClient: A General and Secure Light Client Protocol
    Deng Zhihong, Tang Chunming, Li Taotao, He Yaxuan, Zeng Zhikang, Chen Qi
    DOI: 10.7544/issn1000-1239.202550429
    Abstract PDF
    Survey on Multi-Instance Multi-Label Learning
    Wang Meixia, Wang Huiying, Huang Miaomiao, Zhao Yuhai
    DOI: 10.7544/issn1000-1239.202440643
    Abstract PDF
    Adaptive Fusion of Social Features in Generative Adversarial Networks for Recommender Systems
    Qian Zhongsheng, Zhu Hui, Yu Qingyuan, Li Yulong, Wan Zilong
    DOI: 10.7544/issn1000-1239.202440737
    Abstract PDF
    Threshold SM9 Signature Scheme with UC Security for Blockchain
    Dong Jisheng, Li Cong, Shen Zinan, Hu Daqi, Shen Qingni, Wu Zhonghai
    DOI: 10.7544/issn1000-1239.202440830
    Abstract PDF
    Design and Implementation of Chained DMA Controller Based on PCIe
    Wang Hongliang, Guo Zhenhua, Mu Qi, Lu Shengcai, Xu Yaming, Yu Quanquan
    DOI: 10.7544/issn1000-1239.202440833
    Abstract PDF
    Random Multiple Access Technologies for 6G Satellite Internet of Things: Development and Prospects
    Ding Fei, Zhao Zhiyin, Song Aiguo, Pan Zhiwen, Zhang Tingting
    DOI: 10.7544/issn1000-1239.202440839
    Abstract PDF
    Improving Self-Supervised Monocular Indoor Depth Estimation with Local Feature Guidance
    Ai Haojun, Zhang Feng, Lü Pengfei, Tang Xuehua, Wang Zhongyuan
    DOI: 10.7544/issn1000-1239.202440951
    Abstract PDF
    Adversarial Soft-Contrast Modulated Dynamic Graph Learning for Multimodal Emotion Recognition in Conversations
    Wang Shunjie, Cai Guoyong, Lü Guangrui
    DOI: 10.7544/issn1000-1239.202440896
    Abstract PDF
    A Two-Stage Cross-Chain Access Control Mechanism in Relay Chain Environment
    Zhang Peiyun, Tao Shuai, Chen Jian, Chen Zihan
    DOI: 10.7544/issn1000-1239.202440972
    Abstract PDF
    BTFAT: Breaking the Trade-off Between Robustness and Accuracy in Federated Adversarial Training
    Yan Caihong, Lu Xiaofeng
    DOI: 10.7544/issn1000-1239.202550442
    Abstract PDF
    Stable Image Reconstruction Algorithm Based on Resilient Total Variation Minimization
    Zhang Feixiang, Li Zhihua, Liu Jianjun
    DOI: 10.7544/issn1000-1239.202550014
    Abstract PDF
    Tri-Phase Correlation Verification: Detecting Fabricated Link Attacks in Low-Latency Agentic Networks
    Zhang Feng, Feng Hao, Zhou Xiumin, Zhang Maochun, Chen Zhenming, Liu Yuming
    DOI: 10.7544/issn1000-1239.202550399
    Abstract PDF
    An Intelligent Lightweight Model Construction Solution for Anomaly Detection in Cloud Platforms
    Zhou Yingjie, Yang Min, Wu Di, Liu Fanxing, Zhao Wei, Deng Yiran, Lü Jiancheng
    DOI: 10.7544/issn1000-1239.202550349
    Abstract PDF
    Single Trace Attack on SM4 Key Expansion Algorithm
    Wu Zhen, Zhao Yang, Wang Min
    DOI: 10.7544/issn1000-1239.202550382
    Abstract PDF
    An Intrusion Detection Models Integrating Federated Learning and Quantum Convolutional Neural Networks
    Li Dongfen, Xiang Qiuyu, Hu Zhikang, Yuan Yuhang, Sun Yuchen, Xu han, Song Zhengyu, Han Haomin, Bai Dongxue, Duo Bin, Zhou Rang
    DOI: 10.7544/issn1000-1239.202550413
    Abstract PDF
    A Survey on Fine-Grained Flow Control for Artificial Intelligence Data Centers
    Xu Jing, Wang Zhan, Yuan Guojun, Ma Zhenlong, Yang Fan, Sun Ninghui
    DOI: 10.7544/issn1000-1239.202440796
    Abstract PDF
    SM2-Based Decentralized Anonymous Credential Scheme
    Zhaolu Tianyu, Wang Huaqun
    DOI: 10.7544/issn1000-1239.202440756
    Abstract PDF
    Multi-Party Key Encapsulation Mechanism Based on the Internet of Underwater Things
    Xu Ming, Zhang Enbo, Zhou Rigui
    DOI: 10.7544/issn1000-1239.202440673
    Abstract PDF
    A Survey of RDMA Congestion Control Techniques for Data Center Networks
    Zhang Yutao, Yang Hui, Li Tao, Huang Mandi, Li Tianyun, Sun Zhigang
    DOI: 10.7544/issn1000-1239.202440623
    Abstract PDF
    Many-Objective Firefly Algorithm Based on Reference Point Guidance and Multiple Cooperative Strategies
    Zhao Jia, Hu Qiumin, Xiao Renbin, Pan Jeng-Shyang, Lü Li, Wang Hui, Fan Tanghuai
    DOI: 10.7544/issn1000-1239.202440019
    Abstract PDF
    Review of Face De-identification Research Based on Deep Learning
    Dai Silong, Wang Pengfei, Wang Xiaoling
    DOI: 10.7544/issn1000-1239.202440191
    Abstract PDF
    A Federated Evolutionary Feature Selection Algorithm Based on Rough Hypercuboids
    Chen Xueying, Luo Chuan, Li Tianrui, Chen Hongmei
    DOI: 10.7544/issn1000-1239.202440422
    Abstract
    Skeleton-Based Human Action Recognition for Fusion of Motion Domain Knowledge and Adaptive Spatio-Temporal Transformer
    Liang Chengwu, Jiang Songqi, Yang Jie, Zhu Peiwang, Tie Yun, Gao Lei, Hu Wei, Guo Wenbo
    DOI: 10.7544/issn1000-1239.202440558
    Abstract PDF
    AdaptDNN: An Adaptive and Scalable DNN Distributed Training System
    Liu Guodong, Zhu Jiaqi, Gao Ziyuan, Bao Yungang, Wang Sa
    DOI: 10.7544/issn1000-1239.202440560
    Abstract PDF
    Temporal Membership Inference Attack Method on Diffusion Model
    Gao Zhipeng, Zhang Yi, You Weijing, Chai Ze, Yang Yang, Rui Lanlan
    DOI: 10.7544/issn1000-1239.202440687
    Abstract PDF
    Video Snapshot Compressive Imaging Method Based on Reconstruction Difficulty Perception
    Chen Can, Shi Pengfei, Zhou Chao, Hu Jun, Zhang Dengyin
    DOI: 10.7544/issn1000-1239.202440681
    Abstract PDF
    Knowledge Distillation in Visual Algorithms: A Survey
    Pan Haiwei, Yu Fengming, Zhang Kejia, Lan Haiyan, Meng Qingyu, Li Zhe
    DOI: 10.7544/issn1000-1239.202440694
    Abstract PDF
    Distributed Computing-Oriented ISA Design for Brain-Inspired Intelligence CPU
    Feng Shuo, Lu Dongdong, Yin Fei, Yang Jianxin, Ban Dongsong, He Jun, Yan Shiyun, Li Yuan, Ju Haoyu
    DOI: 10.7544/issn1000-1239.202440675
    Abstract PDF
    Bus Topology Aware Global Routing Algorithm Based on Multi-Strategy
    Liu Genggeng, Huang Junqian, Zhu Yuhan, Yu Yantao, Wei Ling, Chen Jiarui, Xu Ning
    DOI: 10.7544/issn1000-1239.202440066
    Abstract PDF
    Heterogeneous Graph Model for Psychological Support Oriented Towards Mental Health Detection
    Liu Dexi, Zhang Zijing, Zou Zhifeng, Wan Qizhi, Liu Xiping, Liao Guoqiong, Zhu Tingshao
    DOI: 10.7544/issn1000-1239.202440247
    Abstract PDF
    Asymmetric Self-Supervised Learning on Non-Homophilic Graphs
    Qin Jiawen, Huang Pengfeng, Sun Qingyun, Zhou Haoyi, Li Jianxin
    DOI: 10.7544/issn1000-1239.202440660
    Abstract PDF
    High-Performance Optimization of SPHINCS+-SM3 Implementation Based on Domestic Deep Computing Unit
    Ning Yijing, Dong Jiankuo, Zhou Siyuan, Lin Jingqiang, Sun Siwei, Zheng Fangyu, Ge Chunpeng
    DOI: 10.7544/issn1000-1239.202440789
    Abstract PDF
    Open Domain Relation Reasoning Based on Generative Model
    Liu Jingping, Cen Zhedong, Zhang Weiyan, Ruan Tong, Wang Chao, Wang Haofen
    DOI: 10.7544/issn1000-1239.202440795
    Abstract PDF
    A Personalized Differential Privacy Truth Discovery Method Based on Crowdsensing
    Wang Taochun, Qiang Yong, Xu Nuo, Chen Fulong, Xie Dong, Zhao Chuanxin
    DOI: 10.7544/issn1000-1239.202440779
    Abstract PDF
    Model-Graph Runtime Scalable Method for Deep Computing on Mobile Devices
    Luo Shiyan, Liu Sicong, Guo Bin, Fang Cheng, Wang Minfan, Guo Sai, Yu Zhiwen
    DOI: 10.7544/issn1000-1239.202440701
    Abstract PDF
    A Survey on Object Detection Models
    Li Chengye, Zhang Zhen, Liang Zheheng, Yao Chaosheng, Zhang Jinbo, Yan Rongjie, Wu Peng
    DOI: 10.7544/issn1000-1239.202440315
    Abstract PDF
    A Low-Precision Loss Quantification Method for Self-Attention Module
    ,
    DOI: 10.7544/issn1000-1239.202440804
    Abstract PDF
    A Survey of Hallucinations in Large Vision-Language Models: Causes, Evaluations and Mitigations
    Li Xu, Zhu Rui, Chen Xiaolei, Wu Jinxuan, Zheng Yi, Lai Chenghang, Liang Yuxuan, Li Bin, Xue Xiangyang
    DOI: 10.7544/issn1000-1239.202440444
    Abstract PDF
    Adapative Query Style Transfer for Large Language Models as Knowledge Bases
    Fu Junbo, Zhao Guoshuai, Qian Xueming
    DOI: 10.7544/issn1000-1239.202440549
    Abstract PDF
    Anomaly Detection for Multivariate Time Series Based on Multi-Window Segmentation Ensemble Learning
    Wang Zenan, Wang Yijie, Zhou Xiaohui, Xiong Xudong
    DOI: 10.7544/issn1000-1239.202440573
    Abstract PDF
    Entity Semantic Enhancement Method via Multi-Scale Box Fusion
    Wu Can, Chen Yanping, Hu Ying, Huang Ruizhang, Qin Yongbin
    DOI: 10.7544/issn1000-1239.202440665
    Abstract PDF
    Identification of the Cancer Stage Biomarkers for Information System Design
    Chen Bolin, Zhang Jinlei, Zhang Jianjun, Hu Youpeng, Wang Teng, Yang Manting, Bian Jun, Shang Xuequn
    DOI: 10.7544/issn1000-1239.202440650
    Abstract
    Grip System for Multi-Runtime Support in Things-Edge-Cloud Collaborative Applications
    Yu Zishu, Wang Yifan, Zeng Chen, Zhang Xingzhou, Peng Xiaohui, Xu Zhiwei
    DOI: 10.7544/issn1000-1239.202440676
    Abstract PDF
    A Graph-based Interpolation with Deformable Convolutional Network for Sequential Recommender
    Liu Xinyue, Yin Hailian, Zang Yalei, Wu Wenlong, Zhuo Junnan, Xu Fengru, Chen lvying, Ma Weihua, Li Bohan
    DOI: 10.7544/issn1000-1239.202220749
    Abstract PDF
    Three-Stage Few-Shot Object Detection via Cross-Module Knowledge Distillation
    Wang Shuangcheng, Zhu Songhao
    DOI: 10.7544/issn1000-1239.202550009
    Abstract PDF
    Detecting Pretraining Data for Large Language Models via Long-Range Context
    Zhang Weichao, Zhang Ruqing, Guo Jiafeng, Fan Yixing
    DOI: 10.7544/issn1000-1239.202440780
    Abstract PDF
    Hierarchical Sinkhorn Distance Clustering Federated Learning for Non-IID Data
    Zhao Rui, Duan Xiaowen, Liu Xin, Zhou Rui, Zhou Qingguo
    DOI: 10.7544/issn1000-1239.202440969
    Abstract PDF
    Transformer Interpretation Method Based on Sequential Three-Way Mask and Attention Fusion
    Cheng Xiaotian, Ding Weiping, Geng Yu, Huang Jiashuang, Ju Hengrong, Guo Jing
    DOI: 10.7544/issn1000-1239.202440382
    Abstract PDF
    Mel Spectrogram and Squeeze-Excitation-Weighted Quantization for Neural Speech Codec
    Zhou Junzuo, Yi Jiangyan, Tao Jianhua, Ren Yong, Wang Tao
    DOI: 10.7544/issn1000-1239.202440329
    Abstract PDF
    MB-HGCN: A Hierarchical Graph Convolutional Network for Multi-Behavior Recommendation
    Yan Mingshi, Chen Huilin, Cheng Zhiyong, Han Yahong
    DOI: 10.7544/issn1000-1239.202440770
    Abstract PDF
    A Review of Zero Trust Security Research in Industrial Internet of Things
    Wang Hangyu, Lü Fei, Cheng Yuliang, Lü Shichao, Sun Degang, Sun Limin
    DOI: 10.7544/issn1000-1239.202440840
    Abstract PDF
    A Lightweight and Efficiently Verified Assets Cross-Chain Transfer Method for Multi-Level Blockchains Architecture
    Niu Xiangyu, Kong Lanju, Jiang Yali, Qian Jin, Cui Lizhen, Li Qingzhong
    DOI: 10.7544/issn1000-1239.202440649
    Abstract PDF
    A Brain-Inspired Network-on-Chip Architecture with Hybrid-Mode Routing
    Wang Zhichao, Chen Liang, Li Qianpeng, Chen Aoxin, Liu Xin, Song Wenna
    DOI: 10.7544/issn1000-1239.202440683
    Abstract PDF
    Dynamic Instrumentation Based Performance Measurement for Software Based Network Functions
    Jia Ru, Jiang Haiyang, Li Zhenyu, Xie Gaogang
    DOI: 10.7544/issn1000-1239.202440228
    Abstract PDF
    Review of Chiplet Interconnection Technology
    Wang Hao, Wang Yong, Feng Changlei, Gai Weixin, Wu Peng, Qian Jiang
    DOI: 10.7544/issn1000-1239.202440585
    Abstract PDF
    Ionia: A Typed Learning Framework and Code Generation Tool Based on Coq
    Zhang Xiaoli, Chen Gang, Ma Yingying, Hu Ping
    DOI: 10.7544/issn1000-1239.202440672
    Abstract PDF
    A Multimodal Cross-Domain Sentiment Analysis Algorithm Based on Feature Disentanglement Meta-Optimization
    Jia Xibin, Li Chen, Wang Luo, Zhang Muchen, Liu Xiaojian, Zhang Yangyang, Wen Jiakai
    DOI: 10.7544/issn1000-1239.202440624
    Abstract PDF
    Verifiable Boolean Searchable Encryption Based on Blockchain Index
    Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong
    DOI: 10.7544/issn1000-1239.202440501
    Abstract PDF
    Attention-enhanced Semantic Fusion Knowledge Graph Representation Learning Framework
    ,
    DOI: 10.7544/issn1000-1239.202440669
    Abstract PDF
    Research Progress on Large Models for Edge Intelligence
    Wang Rui, Zhang Liuyang, Gao Zhiyong, Jiang Tongyun
    DOI: 10.7544/issn1000-1239.202440385
    Abstract PDF
    Implicit Discourse Relation Recognition Based on Multi-Granularity Information Interaction and Data Augmentation
    Yao Hao, Xiong Jinghui, Li Chunsheng, Wu Changxing
    DOI: 10.7544/issn1000-1239.202440511
    Abstract PDF
    Generalized Stencil Auto-Tuning Framework on GPU Platform
    Sun Qingxiao, Yang Hailong
    DOI: 10.7544/issn1000-1239.202440612
    Abstract PDF
    A Survey of Audio-Driven Talking Face Video Generation and Identification
    Le Zheng, Hu Yongting, Xu Yong
    DOI: 10.7544/issn1000-1239.202440207
    Abstract PDF
    Category
    Double-Ended Joint Learning for Multi-View Clustering
    Du Liang, Li Xiaodong, Chen Yan, Zhou Peng, Qian Yuhua
    2025, 62(8): 1833-1849. DOI: 10.7544/issn1000-1239.202440175
    Abstract PDF
    Acquisition and Judgement of Implicit Hitting Sets for Model-Based Diagnosis
    Ouyang Jihong, Huang Sen
    2025, 62(8): 1850-1861. DOI: 10.7544/issn1000-1239.202440248
    Abstract PDF
    Neural Architecture Search on Temporal Convolutions for Complex Action Recognition
    Ren Pengzhen, Liang Xiaodan, Chang Xiaojun, Zhao Ziying, Xiao Yun
    2025, 62(8): 1862-1874. DOI: 10.7544/issn1000-1239.202440048
    Abstract PDF
    Open-Vocabulary Multi-Label Action Recognition Guided by LLM Knowledge
    Zhu Rongjiang, Shi Yuheng, Yang Shuo, Wang Ziyi, Wu Xinxiao
    2025, 62(8): 1875-1883. DOI: 10.7544/issn1000-1239.202440522
    Abstract PDF
    Learning Resource Recommendation Method Based on Spatio-Temporal Multi-Granularity Interest Modeling
    Zhu Haiping, Wang Ziyu, Zhao Chengcheng, Chen Yan, Liu Jun, Tian Feng
    2025, 62(8): 1884-1901. DOI: 10.7544/issn1000-1239.202440249
    Abstract PDF
    Conversation Generation Based on Variational Attention Knowledge Selection and Pre-trained Language Model
    Zhang Naizhou, Cao Wei, Zhang Xiaojian, Li Shijun
    2025, 62(8): 1902-1917. DOI: 10.7544/issn1000-1239.202440551
    Abstract PDF
    Legal Judgment Prediction Based on Chain of Judgment
    Lü Yougang, Hao Jitai, Wang Zihan, Gao Shen, Ren Pengjie, Chen Zhumin, Ma Jun, Ren Zhaochun
    2025, 62(8): 1918-1930. DOI: 10.7544/issn1000-1239.202330868
    Abstract PDF
    Code Cache Optimization Schemes Based on Fine-Grained State Label
    Niu Gen, Zhang Fuxin
    2025, 62(8): 1931-1947. DOI: 10.7544/issn1000-1239.202330856
    Abstract PDF
    A Weighted Directed Graph-Based Algorithm for Group Routing in Printed Circuit Boards
    Deng Xinguo, Zhang Xinhong, Chen Jiarui, Liu Qinghai, Chen Chuandong
    2025, 62(8): 1948-1961. DOI: 10.7544/issn1000-1239.202440069
    Abstract PDF
    Automatic Insertion Method of High-Performance Synchronization Primitives for Ascend Processors
    Li Shuaijiang, Zhang Xinyuan, Zhao Jiacheng, Tian Xinghui, Shi Xiyu, Xu Xiaoxin, Cui Huimin
    2025, 62(8): 1962-1978. DOI: 10.7544/issn1000-1239.202440093
    Abstract PDF
    Survey on Security and Privacy Risks in Large Language Models
    Jiang Yi, Yang Yong, Yin Jiali, Liu Xiaolei, Li Jiliang, Wang Wei, Tian Youliang, Wu Yingcai, Ji Shouling
    2025, 62(8): 1979-2018. DOI: 10.7544/issn1000-1239.202440265
    Abstract PDF
    Security of Deep Learning Model Supply Chains: A Survey
    Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming
    2025, 62(8): 2019-2039. DOI: 10.7544/issn1000-1239.202440327
    Abstract PDF
    Survey of Large-Language-Model-Based Automated Program Repair
    Xu Pengyu, Kuang Boyu, Su Mang, Fu Anmin
    2025, 62(8): 2040-2057. DOI: 10.7544/issn1000-1239.202440467
    Abstract PDF
    Survey of Transient Execution Attacks
    Li Yang, Ma Ziqiang, Lin Jingqiang, Meng Lingjia, Li Bingyu, Miao Li, Gao Fei
    2025, 62(8): 2058-2097. DOI: 10.7544/issn1000-1239.202440167
    Abstract PDF
    An Adversarial Detection Method Based on Tracking Performance Difference of Frequency Bands
    Zhou Ze, Sun Yinghui, Sun Quansen, Shen Xiaobo, Zheng Yuhui
    2025, 62(8): 2098-2110. DOI: 10.7544/issn1000-1239.202440428
    Abstract PDF
    Towards Transferable and Stealthy Attacks Against Object Detection in Autonomous Driving Systems
    Zheng Junhao, Lin Chenhao, Zhao Zhengyu, Jia Ziyi, Wu Libing, Shen Chao
    2025, 62(8): 2111-2124. DOI: 10.7544/issn1000-1239.202440097
    Abstract PDF
    More+

    Top ViewMore+

    Top DownloadMore+

    Top CitedMore+