Volume 9,Issue 6,2024 Table of Contents

   
Other Issues:  
  

Contents

Optimization for GPU-based Elliptic Curve Library and Related Algorithms
  GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang
  Published October 18, 2024
  2024,9(6):1-16 [Abstract]  [View PDF(1.32 M)]
  
Few-Shot Log Anomaly Detection via Large Language Models
  YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing
  Published October 18, 2024
  2024,9(6):17-27 [Abstract]  [View PDF(1.07 M)]
  
Malware Homology Analysis under Diverse Compilation Environments
  LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming
  Published October 18, 2024
  2024,9(6):28-42 [Abstract]  [View PDF(4.23 M)]
  
Differential Privacy Scheme for Digital Microfluidic Biochips
  CHEN Xiao, DONG Chen
  Published October 18, 2024
  2024,9(6):43-59 [Abstract]  [View PDF(2.72 M)]
  
Generating Adversarial Malware Examples Based on Saliency Analysis
  ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong
  Published October 18, 2024
  2024,9(6):60-73 [Abstract]  [View PDF(1.04 M)]
  
A Survey of Cyber Threat Intelligence Entity Recognition Research
  WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi
  Published October 18, 2024
  2024,9(6):74-99 [Abstract]  [View PDF(2.14 M)]
  
Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series
  HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining
  Published October 18, 2024
  2024,9(6):100-113 [Abstract]  [View PDF(3.90 M)]
  
Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language
  ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei
  Published October 18, 2024
  2024,9(6):114-128 [Abstract]  [View PDF(745.53 K)]
  
A Malicious User Geolocation Method on Tantan App with Distance Transition
  GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang
  Published October 18, 2024
  2024,9(6):129-139 [Abstract]  [View PDF(4.46 M)]
  
RT-NIG: Reconstructing Two-tuples in Neighborhood Information Graphs for Early Rumor Detection
  WANG Biao, WEI Hongquan, LIU Shuxin, WANG Kai, JIANG Haocong, LI Ran
  Published October 18, 2024
  2024,9(6):140-158 [Abstract]  [View PDF(7.10 M)]
  
Malware Detection Method Based on Information Flows Relationship Features
  YANG Baoshan, YANG Zhi, ZHANG Hongqi, HAN Bing, CHEN Xingyuan, SUN Lei
  Published October 18, 2024
  2024,9(6):159-171 [Abstract]  [View PDF(3.37 M)]
  
Establishing a Comprehensive Evaluation Model for the Competency Assessment of Pentesting Cybersecurity Talents
  ZHANG Xiu, LIU Baoxu, GONG Xiaorui, YU Dongsong, ZHAO Beibei, LIU Yuan
  Published October 18, 2024
  2024,9(6):172-207 [Abstract]  [View PDF(1.83 M)]
  
A Survey of Model Inversion Attack Techniques Based on Neural Networks
  ZHANG Huan, HAN Yanni, ZHAO Yining, ZHANG Fan, TAN Qian, MENG Yuan
  Published October 18, 2024
  2024,9(6):208-226 [Abstract]  [View PDF(1.62 M)]
  
Evaluating Fuzzers Based on Fuzzing-hampering Features
  HAO Gaojian, LI Feng, HUO Wei, ZOU Wei
  Published October 18, 2024
  2024,9(6):227-242 [Abstract]  [View PDF(968.21 K)]