Volume 5,Issue 3,2020 Table of Contents

   
Other Issues:  
  

Contents

前言
  霍玮,梁彬,张磊,葛仕明
  Published June 18, 2020
  2020,5(3):0 [Abstract]  [View PDF(133.39 K)]
  
Research Progress in the Interpretability of Deep Learning Models
  HUA Yingying, ZHANG Daichi and GE Shiming
  Published June 18, 2020
  2020,5(3):1-12 [Abstract]  [View PDF(2.92 M)]
  
A Survey on Model Robustness under Adversarial Example
  WANG Kedi and YI Ping
  Published June 18, 2020
  2020,5(3):13-22 [Abstract]  [View PDF(2.01 M)]
  
An Information-leakage Threat Case for Multi-core Neural Network Processor
  GAO Chengsi, CHEN Weiwei and WANG Ying
  Published June 18, 2020
  2020,5(3):23-34 [Abstract]  [View PDF(690.65 K)]
  
Design and Implementation of A DGA Domain Name Detection System by Machine Learning
  YU Guangxi, ZHANG Yan, CUI Huajun, YANG Xinghua, LI Yang and LIU Chang
  Published June 18, 2020
  2020,5(3):35-47 [Abstract]  [View PDF(896.08 K)]
  
An intelligent search method of mapping relation for coverless information hiding
  WANG Yaning and WU Bin
  Published June 18, 2020
  2020,5(3):48-61 [Abstract]  [View PDF(1.94 M)]
  
Detection and Recognition Algorithm for Frequency Hopping Signals Based on HOG-SVM
  ZHANG Meng, WANG Wen, REN Junxing, WEI Dong, HUANG Weiqing, YANG Zhaoyang and LV Zhiqiang
  Published June 18, 2020
  2020,5(3):62-77 [Abstract]  [View PDF(2.43 M)]
  
A Survey of Smart Contract Vulnerability Research
  NI Yuandong, ZHANG Chao and YIN Tingting
  Published June 18, 2020
  2020,5(3):78-99 [Abstract]  [View PDF(983.73 K)]
  
DC-Hunter: Detecting Dangerous Smart Contracts via Bytecode Matching
  HAN Songming, LIANG Bin, HUANG Jianjun and SHI Wenchang
  Published June 18, 2020
  2020,5(3):100-112 [Abstract]  [View PDF(1.07 M)]
  
Robust and Reversible Data Hiding Algorithm Based on Histogram of Difference Statistics Shifting in Wavelet Domain
  LIANG Xingyuan and XIANG Shijun
  Published June 18, 2020
  2020,5(3):113-127 [Abstract]  [View PDF(2.00 M)]