| |
| Optimization for GPU-based Elliptic Curve Library and Related Algorithms |
| | GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang |
| | Published October 18, 2024 |
| | 2024,9(6):1-16 [Abstract] [View PDF(1.32 M)] |
| | |
| Few-Shot Log Anomaly Detection via Large Language Models |
| | YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing |
| | Published October 18, 2024 |
| | 2024,9(6):17-27 [Abstract] [View PDF(1.07 M)] |
| | |
| Malware Homology Analysis under Diverse Compilation Environments |
| | LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming |
| | Published October 18, 2024 |
| | 2024,9(6):28-42 [Abstract] [View PDF(4.23 M)] |
| | |
| Differential Privacy Scheme for Digital Microfluidic Biochips |
| | CHEN Xiao, DONG Chen |
| | Published October 18, 2024 |
| | 2024,9(6):43-59 [Abstract] [View PDF(2.72 M)] |
| | |
| Generating Adversarial Malware Examples Based on Saliency Analysis |
| | ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong |
| | Published October 18, 2024 |
| | 2024,9(6):60-73 [Abstract] [View PDF(1.04 M)] |
| | |
| A Survey of Cyber Threat Intelligence Entity Recognition Research |
| | WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi |
| | Published October 18, 2024 |
| | 2024,9(6):74-99 [Abstract] [View PDF(2.14 M)] |
| | |
| Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series |
| | HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining |
| | Published October 18, 2024 |
| | 2024,9(6):100-113 [Abstract] [View PDF(3.90 M)] |
| | |
| Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language |
| | ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei |
| | Published October 18, 2024 |
| | 2024,9(6):114-128 [Abstract] [View PDF(745.53 K)] |
| | |
| A Malicious User Geolocation Method on Tantan App with Distance Transition |
| | GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang |
| | Published October 18, 2024 |
| | 2024,9(6):129-139 [Abstract] [View PDF(4.46 M)] |
| | |
| RT-NIG: Reconstructing Two-tuples in Neighborhood Information Graphs for Early Rumor Detection |
| | WANG Biao, WEI Hongquan, LIU Shuxin, WANG Kai, JIANG Haocong, LI Ran |
| | Published October 18, 2024 |
| | 2024,9(6):140-158 [Abstract] [View PDF(7.10 M)] |
| | |
| Malware Detection Method Based on Information Flows Relationship Features |
| | YANG Baoshan, YANG Zhi, ZHANG Hongqi, HAN Bing, CHEN Xingyuan, SUN Lei |
| | Published October 18, 2024 |
| | 2024,9(6):159-171 [Abstract] [View PDF(3.37 M)] |
| | |
| Establishing a Comprehensive Evaluation Model for the Competency Assessment of Pentesting Cybersecurity Talents |
| | ZHANG Xiu, LIU Baoxu, GONG Xiaorui, YU Dongsong, ZHAO Beibei, LIU Yuan |
| | Published October 18, 2024 |
| | 2024,9(6):172-207 [Abstract] [View PDF(1.83 M)] |
| | |
| A Survey of Model Inversion Attack Techniques Based on Neural Networks |
| | ZHANG Huan, HAN Yanni, ZHAO Yining, ZHANG Fan, TAN Qian, MENG Yuan |
| | Published October 18, 2024 |
| | 2024,9(6):208-226 [Abstract] [View PDF(1.62 M)] |
| | |
| Evaluating Fuzzers Based on Fuzzing-hampering Features |
| | HAO Gaojian, LI Feng, HUO Wei, ZOU Wei |
| | Published October 18, 2024 |
| | 2024,9(6):227-242 [Abstract] [View PDF(968.21 K)] |
| | |