| Volume 5,Issue 5,2020 Table of Contents
Contents | | | Research on Mutator Strategy-aware Parallel Fuzzing | | ZOU Yanyan, ZOU Wei, YIN Jiawei, HUO Wei, YANG Meifang, SUN Dandan and SHI Ji | | Published 10月 18日, 2020 | | 2020,5(5):1-16 [Abstract] [View PDF(1013.11 K)] | | | | Semantic-aware Security Check Detection Method | | FANG Yutong, LIU Hongyi, LI Jingwei and WEN Weiping | | Published 10月 18日, 2020 | | 2020,5(5):17-29 [Abstract] [View PDF(1.25 M)] | | | | A System Audit Log Compression Method based on Taint Tracking | | BEN Yongming, HAN Yanni, An Wei and Xu Zhen | | Published 10月 18日, 2020 | | 2020,5(5):30-42 [Abstract] [View PDF(1.28 M)] | | | | BinaryFace: the Model of Face Template Protection based on CNN | | ZHAO Chenghui, LI Yong and ZHANG Zhenjiang | | Published 10月 18日, 2020 | | 2020,5(5):43-55 [Abstract] [View PDF(2.29 M)] | | | | Knowledge Graph for Cyberspace Security Intelligence: A Survey | | DONG Cong, JIANG Bo, LU Zhigang, LIU Baoxu, LI Ning, MA Pingchuan, JIANG Zhengwei and LIU Junrong | | Published 10月 18日, 2020 | | 2020,5(5):56-76 [Abstract] [View PDF(715.87 K)] | | | | A Survey on Multi-Variant Execution Security Defense Technology | | YAO Dong, ZHANG Zheng, ZHANG Gaofei, LIU Hao, PAN Chuanxing and WU Jiangxing | | Published 10月 18日, 2020 | | 2020,5(5):77-94 [Abstract] [View PDF(1.96 M)] | | | | A Survey on Paraphrase Identification Technology | | LI Boxin, LI Peng, QI Baoyuan, WANG Bin and WANG Lihong | | Published 10月 18日, 2020 | | 2020,5(5):95-109 [Abstract] [View PDF(685.70 K)] | | | | Three-dimensional model information hiding algorithm based on distance feature and volume integral invariant | | REN Shuai, SU Dongxu, XU Zhenchao, FAN Aoxiong and ZHANG Tao | | Published 10月 18日, 2020 | | 2020,5(5):110-120 [Abstract] [View PDF(2.74 M)] | | | | A Survey of Security in Content Centric Networking | | ZHU Dali, LIANG Jie, LI Ting, ZHANG Hangsheng, GENG Liru, WU Di, ZHANG Tiankui and LIU Yinlong | | Published 10月 18日, 2020 | | 2020,5(5):121-143 [Abstract] [View PDF(1006.43 K)] | | | | Android Privacy Leak Detection Method Based on Static Taint Analysis | | HU Yingjie, ZHANG Linlin, ZHAO Kai, FANG Wenbo and YU Yuaner | | Published 10月 18日, 2020 | | 2020,5(5):144-151 [Abstract] [View PDF(694.81 K)] | | |
|