| |
| Differentially Private Data Sharing and Publishing in Machine Learning: Techniques, Applications, and Challenges |
| HU Aoting, HU Aiqun, HU Yun, LI Guyue, HAN Jinguang |
| Published August 18, 2022 |
| 2022,7(4):1-16 [Abstract] [View PDF(871.42 K)] |
| |
| Survey on Security Researches of Processor's Microarchitecture |
| YIN Jiawei, LI Menghao, HUO Wei |
| Published August 18, 2022 |
| 2022,7(4):17-31 [Abstract] [View PDF(949.94 K)] |
| |
| Network Security Situation Assessment Based on Deep Weighted Feature Learning |
| YANG Hongyu, ZHANG Zixin, ZHANG Liang |
| Published August 18, 2022 |
| 2022,7(4):32-43 [Abstract] [View PDF(1.18 M)] |
| |
| Countering Android Application Repackaging Attacks via Exception Exploitation |
| ZHOU Libo, LIANG Bin, YOU Wei, HUANG Jianjun, SHI Wenchang |
| Published August 18, 2022 |
| 2022,7(4):44-54 [Abstract] [View PDF(1.70 M)] |
| |
| SiCsFuzzer: A Sparse-instrumentation-based Fuzzing Platform for Closed Source Software |
| LIU Liyan, LI Feng, ZOU Yanyan, ZHOU Jianhua, PIAO Aihua, LIU Feng, HUO Wei |
| Published August 18, 2022 |
| 2022,7(4):55-70 [Abstract] [View PDF(3.97 M)] |
| |
| Identifying Alias Relationship between Built-in Objects of Script Engine Based on the Discovery of Data Structure Signatures |
| ZHANG Yiwei, YOU Wei, LIANG Bing, WAN Xinyu, GUO Suyue |
| Published August 18, 2022 |
| 2022,7(4):71-89 [Abstract] [View PDF(1.01 M)] |
| |
| Malicious Traffic Classification Based on Indefinite Length Convolutional Neural Network |
| YANG Xuan, WU Jiangxing, ZHAO Bo |
| Published August 18, 2022 |
| 2022,7(4):90-99 [Abstract] [View PDF(537.97 K)] |
| |
| Vulnerability Detection In Source Code Using Statice Analysis |
| LIU Jiayong, HAN Jiaxuan, HUANG Cheng |
| Published August 18, 2022 |
| 2022,7(4):100-113 [Abstract] [View PDF(2.20 M)] |
| |
| Design and Implementation of Integrated Multi-Variant Execution Supported by Compiler |
| LI Bingzheng, ZHANG Zheng, MA Bolin, XING Fukang, WU Jiangxing |
| Published August 18, 2022 |
| 2022,7(4):114-123 [Abstract] [View PDF(932.54 K)] |
| |
| Fingerprint extraction of Ethernet card based on adaptive filtering algorithm |
| HU Yuanyuan, HU Aiqun, LI Sheng, LIU Jiaqi, LI Bing |
| Published August 18, 2022 |
| 2022,7(4):124-136 [Abstract] [View PDF(5.14 M)] |
| |