Advanced Search
    Publish Online Articles in press have been peer-reviewed and accepted, which are not yet assigned to volumes /issues, but are citable by Digital Object Identifier (DOI).
    A Machine Unlearning Method via Feature Constraint and Adaptive Loss Balance
    Yin Yuyu, Wu Guangqiang, Li Youhuizi, Wang Xinyu, Gao Honghao
    DOI: 10.7544/issn1000-1239.202440476
    Abstract PDF
    Survey of Security Attack and Defense Strategies for Artificial Intelligence Model
    Qin Zhen, Zhuang Tianming, Zhu Guosong, Zhou Erqiang, Ding Yi, Geng Ji
    DOI: 10.7544/issn1000-1239.202440449
    Abstract
    A Survey of Backdoor Attacks and Defenses Based on Federated Learning
    Liu Jialang, Guo Yanming, Lao Mingrui, Yu Tianyuan, Wu Yulun, Feng Yunhao, Wu Jiazhuang
    DOI: 10.7544/issn1000-1239.202440487
    Abstract
    Intellectual Property Protection of Deep Neural Network Models Based on Watermarking Technology
    Jin Biao, Lin Xiang, Xiong Jinbo, You Weijing, Li Xuan, Yao Zhiqiang
    DOI: 10.7544/issn1000-1239.202440413
    Abstract
    Cross-Domain Data Trading System Based on Decentralized Identity
    Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong
    DOI: 10.7544/issn1000-1239.202440456
    Abstract
    A Blockchain Data Acceleration Exchange Method for Data Element Circulation
    Li Zhenyu, Ding Yong, Yi Chen, Liang Hai
    DOI: 10.7544/issn1000-1239.202440367
    Abstract
    A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains
    Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang
    DOI: 10.7544/issn1000-1239.202440472
    Abstract
    An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms
    Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming
    DOI: 10.7544/issn1000-1239.202440477
    Abstract
    An Efficient Passwordless Authentication Scheme Based on Blockchain
    Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie
    DOI: 10.7544/issn1000-1239.202440468
    Abstract
    Auditable Healthcare Data Sharing Based on Decentralized Identity
    Song Wenpeng, Zhang Liang, Ma Yuhang
    DOI: 10.7544/issn1000-1239.202440351
    Abstract PDF
    Scheme of Runtime Monitoring in Confidential Computing with Dynamic Integrity Measurement
    Li Wei, Feng Wei, Qin Yu, Feng Dengguo
    DOI: 10.7544/issn1000-1239.202440480
    Abstract
    Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
    Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng
    DOI: 10.7544/issn1000-1239.202440489
    Abstract
    Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme
    Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei
    DOI: 10.7544/issn1000-1239.202440453
    Abstract
    Sampling Based Fast Publishing Algorithm with Differential Privacy for Data Stream
    Wang Xiujun, Mo Lei, Zheng Xiao, Wei Linna, Dong Jun, Liu Zhi, Guo Longkun
    DOI: 10.7544/issn1000-1239.202440481
    Abstract
    A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint
    Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong
    DOI: 10.7544/issn1000-1239.202440496
    Abstract
    Dynamic Decision-Driven Threat Detection Method for Data Elements in Industrial Control Networks
    Wang Zepeng, Ma Chao, Zhang Zhuangzhuang, Wu Libing, Shi Xiaochuan
    DOI: 10.7544/issn1000-1239.202440387
    Abstract
    Magnetic Resonant Coupling Wireless Power Transfer Technology: Progress and Prospects
    Wang Xinyu, Zhou Wangqiu, Zhou Hao, Li Xiangyang
    DOI: 10.7544/issn1000-1239.202440394
    Abstract PDF
    GCC Optimization for LoongArch Memory Accessing Instructions with Bound-Checking
    Shu Yanjun, Zheng Xiangyu, Xu Chenghua, Huang Pei, Wang Yongqi, Zhou Fan, Zhang Zhan, Zuo Decheng
    DOI: 10.7544/issn1000-1239.202440100
    Abstract
    Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su Zelin, Zhang Wenfang, Wang Xiaomin
    DOI: 10.7544/issn1000-1239.202220133
    Abstract
    A User Security Continuous Authentication Method for Earable Devices
    Wang Yong, Xiong Yi, Yang Tianyu, Shen Yiran
    DOI: 10.7544/issn1000-1239.202440415
    Abstract PDF
    A Plan Reuse Mechanism for LLM-based Agent
    Li Guopeng, Wu Ruiqi, Tan Haisheng, Chen Guoliang
    DOI: 10.7544/issn1000-1239.202440380
    Abstract PDF
    Survey on Neural Rendering and Its Hardware Acceleration
    Yan Xinkai, Huo Yuchi, Bao Hujun
    DOI: 10.7544/issn1000-1239.202330483
    Abstract PDF
    Survey of AIoT-Oriented Collaborative Intelligence
    Luo Yuzhe, Li Ling, Hou Pengpeng, Yu Jiageng, Cheng Limin, Zhang Changyou, Wu Yanjun, Zhao Chen
    DOI: 10.7544/issn1000-1239.202330975
    Abstract
    Deadlock-Free Strategies Based on Synchronized Hamiltonian Ring in Triplet-Based Many-Core Architecture
    Li Chunfeng, Karim Soliman, Ji Weixing, Shi Feng
    DOI: 10.7544/issn1000-1239.202331042
    Abstract
    Data Center Heterogeneous Acceleration Software-Hardware System-Level Platform Based on Reconfigurable Architecture
    Wang Yanwei, Li Rengang, Xu Ran, Liu Junkai
    DOI: 10.7544/issn1000-1239.202440041
    Abstract
    GroupUCP: An On-Demand Fine-Grained Cache Dynamic Partition Strategy
    Zhang Chuanqi, Wang Sa, Sun Ninghui, Bao Yungang
    DOI: 10.7544/issn1000-1239.202440061
    Abstract
    Survey of Graph Partitioning Techniques for Distributed Graph Computing
    Shang Junlin, Zhang Zhenyu, Qu Wenwen, Wang Xiaoling
    DOI: 10.7544/issn1000-1239.202330790
    Abstract
    R-FCCL: A Novel Fuzzy-Based Concept-Cognitive Learning Approach for High- Dimensional Data
    Guo Doudou, Xu Weihua
    DOI: 10.7544/issn1000-1239.202330428
    Abstract
    Human Fall Detection Method Beyond the Sensing Range of IR-UWB Using Ambient Vibration
    Wang Dongzi, Guo Zhengxin, Gui Linqing, Sheng Biyun, Cai Hui, Xiao Fu
    DOI: 10.7544/issn1000-1239.202440386
    Abstract
    Smart Integrated Cooperative Transmission Method for Space-Air-Ground Heterogeneous Networks
    Ji Xiang, Xu Changqiao, Zhang Hongke
    DOI: 10.7544/issn1000-1239.202440314
    Abstract
    Porting and Parallel Optimization of Common Operators Based on Heterogeneous Programming Models
    Ma Zhaojia, Shao En, Di Zhanyuan, Ma Lixian
    DOI: 10.7544/issn1000-1239.202330869
    Abstract PDF
    Multi-task Attention Network for Contactless Sleep Monitoring
    Li Siheng, Jin Beihong, Zhang Fusang, Wang Zhi, Ma Junqi, Su Chang, Ren Xiaoyong, Liu Haiqin
    DOI: 10.7544/issn1000-1239.202440389
    Abstract PDF
    LingLong: A High-Quality Small-Scale Chinese Pre-trained Language Model
    Li Dongwen, Zhong Zhenyu, Sun Yufei, Shen Junyu, Ma Zizhi, Yu Chuanyue, Zhang Yuzhi
    DOI: 10.7544/issn1000-1239.202330844
    Abstract PDF
    A Cross-Modal Entity Linking Model Based on Contrastive Learning
    Wang Yuanzheng, Sun Wenxiang, Fan Yixing, Liao Huaming, Guo Jiafeng
    DOI: 10.7544/issn1000-1239.202330731
    Abstract PDF
    Multi-View Clustering Based on Adaptive Tensor Singular Value Shrinkage
    Qian Luoxiong, Chen Mei, Ma Xueyan, Zhang Chi, Zhang Jinhong
    DOI: 10.7544/issn1000-1239.202330785
    Abstract PDF
    Continuous Learning-based Task Demand Understanding and Scheduling Method for Video Internet of Things
    Xu Dongzhu, Zhou Anfu, Ma Huadong, Zhang Yuan
    DOI: 10.7544/issn1000-1239.202440403
    Abstract PDF
    Survey of Machine Learning-Based KPI Anomaly Detection on Internet-Based Services
    Shang Shuyi, Li Hongjia, Song Chen, Lu Zhitong, Wang Liming, Xu Zhen
    DOI: 10.7544/issn1000-1239.202330577
    Abstract PDF
    Term-Prompted and Dual-Path Text Generation for Aspect Sentiment Triplet Extraction
    Li Yinqiang, Lan Tian, Liu Yao, Xiang Feiyang, Sun Lichun, Du Zhihan, Liu Qiao
    DOI: 10.7544/issn1000-1239.202330838
    Abstract
    Survey of Log-Structured File Systems in Mobile Devices
    Yang Lihua, Dong Yong, Wu Huijun, Tan Zhipeng, Wang Fang, Lu Kai
    DOI: 10.7544/issn1000-1239.202330789
    Abstract
    Efficient Subgraph Matching Algorithm with Graph Neural Network
    Xue Xin, Zhu Tianchen, Sun Qingyun, Zhou Haoyi, Li Jianxin
    DOI: 10.7544/issn1000-1239.202330732
    Abstract
    Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware
    Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao
    DOI: 10.7544/issn1000-1239.202330815
    Abstract
    Survey on Low Power Sensing of AIoT
    Li Xiangyang, Shang Fei, Yan Yubo, Wang Shanyue, Han Feiyu, Chi Guoxuan, Yang Zheng, Chen Xiaojiang
    DOI: 10.7544/issn1000-1239.202440396
    Abstract PDF
    Wi-HFM: A Human Flow Monitoring Method Based on WiFi Channel Features
    Yang Zhiyong, Lu Chao, Wang Junjie
    DOI: 10.7544/issn1000-1239.202330712
    Abstract
    Optimization of Multi-Agent Vehicle Handover Based on Team Model in C-V2X Environments
    Liu Bingyi, Wang Dongdong, Shi Haiyong, Wang Enshu, Wu Libing, Wang Jianping
    DOI: 10.7544/issn1000-1239.202440404
    Abstract PDF
    Efficiency Optimization for Computer Network Integrated Database Empowered by Artificial Intelligence of Things
    Zhu Maosheng, Wang Baohan, Kang Mancong, Yu Wei, Yang Lichao
    DOI: 10.7544/issn1000-1239.202440416
    Abstract PDF
    Adaptive Pipeline Unsupervised Question Generation Method
    Li Kunze, Zhang Yu
    DOI: 10.7544/issn1000-1239.202330857
    Abstract
    Privacy-Preserving Bilateral Reputation Evaluation in Blockchain Based Crowdsensing
    Deng Qingyong, Zuo Qinghua, Li Zhetao, Wang En, Guo Bin
    DOI: 10.7544/issn1000-1239.202440302
    Abstract
    Enhanced Capacity for Multi-Tag Concurrent Backscatter Communication Systems under Spectrum Constraints
    Li Xiangyang, Wang Shanyue, Zhang Chi, Yan Yubo, Tan Haisheng
    DOI: 10.7544/issn1000-1239.2024-40401
    Abstract PDF
    Range Expansion Method for WiFi-Based Respiration Monitoring Under Dynamic Scenes
    Lin Yiqun, Qiu Jiefan, Zhang Jinhong, Zhou Kezhong, Fang Kai, Liu Xiaoying, Chi Kaikai
    DOI: 10.7544/issn1000-1239.202330884
    Abstract
    Review of Knowledge Base Question Answering Based on Information Retrieval
    Tian Xuan, Wu Zhichao
    DOI: 10.7544/issn1000-1239.202331013
    Abstract PDF
    Generative Information Hiding Method Based on Couplet Carrier
    Li Xinran, Li Rongshou, Qin Chuan, Qian Zhenxing, Zhang Xinpeng
    DOI: 10.7544/issn1000-1239.202330663
    Abstract
    Reversible Data Hiding in Color Encrypted Images Based on Color Channels Correlation and Entropy Coding
    Gao Guangyong, Ji Chi, Xia Zhihua
    DOI: 10.7544/issn1000-1239.202330880
    Abstract
    Small Pedestrian Target Detection in Subway Scene Based on Improved SSD Algorithm
    Zhang Xiuzai, Qiu Ye, Shen Tao
    DOI: 10.7544/issn1000-1239.202330069
    Abstract PDF
    Protocol Design and Performance Analysis of Backscatter Communications Using Codes
    He Xin, Wu Fan, Zhu Yujun, Xu Yong, Yang Panlong
    DOI: 10.7544/issn1000-1239.202221010
    Abstract PDF
    Multi-Perspective Graph Contrastive Learning Recommendation Method with Layer Attention Mechanism
    Qian Zhongsheng, Huang Heng, Zhu Hui, Liu Jinping
    DOI: 10.7544/issn1000-1239.202330804
    Abstract
    Novel Practical Query Pricing Algorithm Based on Labor Game Model
    Wang Huiju, Huang Weixuan, Yue Xiao
    DOI: 10.7544/issn1000-1239.202330791
    Abstract
    A User Demand Driven Approach for 5G Base Station Location Selection
    Huang Wenhui, Wang Jiahui, Zhou Liping, Yue Kun
    DOI: 10.7544/issn1000-1239.202330621
    Abstract PDF
    Probability Distribution Based Auto-Scaling Algorithm in Serverless Computing
    Li Wei, Li Guanghui, Zhao Qinglin, Dai Chenglong, Chen Si
    DOI: 10.7544/issn1000-1239.202330191
    Abstract
    A Near-Ultrasonic Robust Indoor Localization Method Based on Stacking Ensemble Learning
    Jia Naizheng, Xue Can, Yang Liu, Wang Zhi
    DOI: 10.7544/issn1000-1239.202330882
    Abstract PDF
    CBFuzzer: Fuzzy Detection of Program Defects Based on Execution Context Orientation and Protection Breakthrough
    Tang Chenghua, Cai Weijia, Yang Mengmeng, Qiang Baohua
    DOI: 10.7544/issn1000-1239.202330755
    Abstract
    MNDetector: Anomaly Access Detection Method Based on Multiplex Network
    Yuan Ziqi, Sun Qingyun, Zhou Haoyi, Zhu Zukun, Li Jianxin
    DOI: 10.7544/issn1000-1239.202330735
    Abstract
    Phonemic Adversarial Attack Against Audio Recognition in Real World
    Wang Jiakai, Kong Yusheng, Chen Zhendong, Hu Jin, Yin Zixin, Ma Yuqing, Yang Qinghong, Liu Xianglong
    DOI: 10.7544/issn1000-1239.202330445
    Abstract
    An Image Captioning Method Based on DSC-Net
    Jiang Zetao, Zhu Wencai, Jin Xin, Liao Peiqi, Huang Jingfan
    DOI: 10.7544/issn1000-1239.202330523
    Abstract PDF
    Online Cross-Modal Hashing with Double Structure Preserving
    Kang Xiao, Liu Xingbo, Lu Pengyu, Zhao Zhijie, Nie Xiushan, Wang Shaohua, Yin Yilong
    DOI: 10.7544/issn1000-1239.202330433
    Abstract PDF
    Blockchain Marketing Label Trading System for E-Commerce Alliance
    Dai Weiqi, Li Ming, Zhao Kexuan, Jiang Wenchao, Zhou Weilin, Zou Deqing, Jin Hai
    DOI: 10.7544/issn1000-1239.202330217
    Abstract
    Directed Graph Clustering Method with Edge Local Differential Privacy
    Fu Nan, Ni Weiwei, Jiang Zepeng, Hou Lihe, Zhang Dongyue, Zhang Ruyu
    DOI: 10.7544/issn1000-1239.202330193
    Abstract PDF
    A Parallel Multi-Objective Dividing Rectangles Algorithm Based on Normalized Decomposition
    Li Chen, Chen Yidong, Lu Zhonghua, Yang Yueying, Wang Zitian, Chi Xuebin
    DOI: 10.7544/issn1000-1239.202330093
    Abstract PDF
    Research on Graph-Based Point Cloud: A Survey
    Liang Xun, Li Zhiying, Jiang Hongxun
    DOI: 10.7544/issn1000-1239.202330077
    Abstract PDF
    Latency Optimization in Real-Time Multimedia Transport: Architecture, Progress and the Future
    Meng Zili, Xu Mingwei
    DOI: 10.7544/issn1000-1239.202330240
    Abstract PDF
    HVMS: A Hybrid Vectorization-Optimized Mechanism of SpMV
    Yan Zhiyuan, Xie Biwei, Bao Yungang
    DOI: 10.7544/issn1000-1239.202330204
    Abstract PDF
    MC2 Energy Consumption Model for Massively Distributed Data Parallel Training of Deep Neural Networks
    Wei Jia, Zhang Xingjun, Wang Longxiang, Zhao Mingqiang, Dong Xiaoshe
    DOI: 10.7544/issn1000-1239.202330164
    Abstract PDF
    A Lightweight Noise Label Learning Method Based on Online Distillation
    Huang Yiwang, Huang Yuxin, Liu Sheng
    DOI: 10.7544/issn1000-1239.202330382
    Abstract
    A Model-Based Diagnosis Method for Integrating Cardinality Constraints and Enqueueing at Once
    Qing Yang, Ouyang Dantong, Zhou Huisi, Zhang Liming
    DOI: 10.7544/issn1000-1239.202330546
    Abstract PDF
    A Diversity-Enriched Option-Critic Algorithm with Interest Functions
    Li Junwei, Liu Quan, Huang Zhigang, Xu Yapeng
    DOI: 10.7544/issn1000-1239.202220970
    Abstract PDF
    Person Re-identification Method Based on Hybrid Real-Synthetic Data
    Qi Lei, Ren Zihao, Liu Junxi, Geng Xin
    DOI: 10.7544/issn1000-1239.202330718
    Abstract PDF
    A Cross-Region and Cross-Rating Collaborative Filtering Recommendation Algorithm
    Yu Xu, Peng Qinglong, Zhan Dingjia, Du Junwei, Liu Jinhuan, Lin Junyu, Gong Dunwei, Zhang Ziying, Yu Jie
    DOI: 10.7544/issn1000-1239.202330017
    Abstract PDF
    Survey of In-Memory Computing Technology Based on SRAM and Non-Volatile Memory
    Zhang Zhang, Shi Gang, Wang Qifan, Ma Yongbo, Liu Gang, Qian Libo
    DOI: 10.7544/issn1000-1239.202330364
    Abstract PDF
    ChipletNP: Chiplet-Based Agile Customizable Network Processor Architecture
    Li Tao, Yang Hui, Li Junnan, Liu Rulin, Sun Zhigang
    Abstract PDF
    Survey of WebAssembly Security
    Zhuang Junjie, Hu Shuang, Hua Baojian, Wang Yang, Pan Zhizhong
    DOI: 10.7544/issn1000-1239.202330049
    Abstract PDF
    Survey of Risk Perception Technology for Web 3.0 Digital Economic
    Jia Jinping, Xiao Shihan, Qian Kun, Yang Yanqin, Zhang Zhao
    DOI: 10.7544/issn1000-1239.202330298
    Abstract PDF
    Research Progress of Fully Homomorphic Encryption
    Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi
    DOI: 10.7544/issn1000-1239.202221052
    Abstract PDF
    Deep Knowledge Tracing Model with the Integration of Skills Relation and Forgetting Degree
    Jia Rui, Dong Yongquan, Liu Yuan, Chen Cheng
    DOI: 10.7544/issn1000-1239.202330697
    Abstract PDF
    A Framework for Evolutionary Large-Scale Multi-Objective Security Games Based on Priority Priors
    Wu Yupeng, Qian Hong, Wang Weiye, Zhang Yangwenhui, Zhou Aimin
    DOI: 10.7544/issn1000-1239.202330463
    Abstract PDF
    Spatial-Temporal Traffic Data Imputation Method with Uncertainty Modeling
    Liu Le, Guo Shengnan, Jin Xiyuan, Zhao Miaomiao, Chen Ran, Lin Youfang, Wan Huaiyu
    DOI: 10.7544/issn1000-1239.202330455
    Abstract PDF
    Federated Learning under User-Level Local Differential Privacy
    , ,
    DOI: 10.7544/issn1000-1239.202330167
    Abstract PDF
    Category
    Open World Object Recognition and Detection Systems: Landscapes, Challenges and Prospects
    Nie Hui, Wang Ruiping, Chen Xilin
    2024, 61(9): 2128-2141. DOI: 10.7544/issn1000-1239.202440054
    Abstract PDF
    An Optimized Over-the-Air Software Update Framework Based on Uptane for Automobiles
    Xie Yong, Hu Qiuyan, Li Renfa, Xie Guoqi, Xiao Fu
    2024, 61(9): 2145-2155. DOI: 10.7544/issn1000-1239.202330874
    Abstract PDF
    Optimizing and Accelerating Privacy Protection Algorithm for Real-Time Location
    Dong Kai, Wang Lifu, Ling Zhen
    2024, 61(9): 2156-2169. DOI: 10.7544/issn1000-1239.202330877
    Abstract PDF
    Multi-Stage Federated Learning Mechanism with non-IID Data in Internet of Vehicles
    Tang Xiaolan, Liang Yuting, Chen Wenlong
    2024, 61(9): 2170-2184. DOI: 10.7544/issn1000-1239.202330885
    Abstract PDF
    Detecting Free-Riding Attack in Federated Learning Based on Gradient Backtracking
    Hong Zhen, Feng Wanglei, Wen Zhenyu, Wu Di, Li Taotao, Wu Yiming, Wang Cong, Ji Shouling
    2024, 61(9): 2185-2198. DOI: 10.7544/issn1000-1239.202330886
    Abstract PDF
    Secure and Efficient Federated Learning for Continuous IoV Data Sharing
    Le Junqing, Tan Zhouyong, Zhang Di, Liu Gao, Xiang Tao, Liao Xiaofeng
    2024, 61(9): 2199-2212. DOI: 10.7544/issn1000-1239.202330894
    Abstract PDF
    Incentive-Driven Vehicle Selection and Scheduling Method in Vehicular Crowdsensing
    Wang Zhenning, Cao Yue, Jiang Kai, Lin Hai, Zhou Huan
    2024, 61(9): 2213-2228. DOI: 10.7544/issn1000-1239.202330881
    Abstract PDF
    Wireless Resource Allocation Algorithm Based on Multi-Objective Deep Reinforcement Learning for Vehicle-to-Vehicle Communications
    Li Ke, Ma Sai, Dai Penglin, Ren Jing, Fan Pingzhi
    2024, 61(9): 2229-2245. DOI: 10.7544/issn1000-1239.202330895
    Abstract PDF
    Internet of Vehicles Data Sharing Scheme via Blockchain Sharding
    Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong
    2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    Abstract PDF
    Survey of Automatic Software Vulnerability Exploitation
    Wu Zehui, Wei Qiang, Wang Xinlei, Wang Yunchao, Yan Chenyu, Chen Jing
    2024, 61(9): 2261-2274. DOI: 10.7544/issn1000-1239.202220410
    Abstract PDF
    Binary Code Modularization Method Based on Graph Embedding
    Sun Huaqi, Kang Fei, Shu Hui, Huang Yuyao, Bu Wenjuan
    2024, 61(9): 2275-2289. DOI: 10.7544/issn1000-1239.202330337
    Abstract PDF
    A Multichain-Collaborating Governing Chain-Supervising-Chain Supervision Framework
    Chen Xiaofeng, Song Zhaoxiong, Zheng Peiyu, Zhang Jun, Yu Zhi, Sun Yi
    2024, 61(9): 2290-2306. DOI: 10.7544/issn1000-1239.202330279
    Abstract PDF
    Survey on Target-Generated IPv6 Network Address Scanning
    Hou Bingnan, Liu Ning, Li Xionglüe, Zhou Tongqing, Chen Yingwen, Cai Zhiping, Lu Kai
    2024, 61(9): 2307-2320. DOI: 10.7544/issn1000-1239.202330335
    Abstract PDF
    Social Software User Behavior Identification for Encrypted Traffic
    Wu Hua, Wang Lei, Huang Ruiqi, Cheng Guang, Hu Xiaoyan
    2024, 61(9): 2321-2333. DOI: 10.7544/issn1000-1239.202330055
    Abstract PDF
    Malicious Domain Name Detection Method Based on Enhanced Embedded Feature Hypergraph Learning
    Wei Jinxia, Long Chun, Fu Hao, Gong Liangyi, Zhao Jing, Wan Wei, Huang Pan
    2024, 61(9): 2334-2346. DOI: 10.7544/issn1000-1239.202330117
    Abstract PDF
    Selection of Reputable Medical Participants Based on an Iterative Collaborative Learning Framework
    Lu Feng, Li Wei, Gu Lin, Liu Shuai, Wang Runheng, Ren Yufei, Dai Xiaohai, Liao Xiaofei, Jin Hai
    2024, 61(9): 2347-2363. DOI: 10.7544/issn1000-1239.202330270
    Abstract PDF
    Blockchain Based Metaverse Ecosystem Achitecture
    Li Ming, Song Wenpeng, Zong Yan, Liu Mianchen
    2024, 61(9): 2364-2383. DOI: 10.7544/issn1000-1239.202330074
    Abstract PDF
    A Dynamic Resource Allocation Method for High-Density Colocation Scenario
    Guo Jing, Hu Cunchen, Bao Yungang
    2024, 61(9): 2384-2399. DOI: 10.7544/issn1000-1239.202221043
    Abstract PDF
    More+

    Top ViewMore+

    Top DownloadMore+

    Top CitedMore+