| |
| Optimization for GPU-based Elliptic Curve Library and Related Algorithms |
| GAO Yuyang, ZHANG Jianning, WANG Gang, SU Ming, LIU Xiaoguang |
| Published October 18, 2024 |
| 2024,9(6):1-16 [Abstract] [View PDF(1.32 M)] |
| |
| Few-Shot Log Anomaly Detection via Large Language Models |
| YUAN Ziyi, ZHANG Haoxing, ZHANG Yuanyuan, WU Gaofei, ZHANG Yuqing |
| Published October 18, 2024 |
| 2024,9(6):17-27 [Abstract] [View PDF(1.07 M)] |
| |
| Malware Homology Analysis under Diverse Compilation Environments |
| LIU Xinyi, PENG Guojun, LIU Side, YANG Xiuzhang, FU Jianming |
| Published October 18, 2024 |
| 2024,9(6):28-42 [Abstract] [View PDF(4.23 M)] |
| |
| Differential Privacy Scheme for Digital Microfluidic Biochips |
| CHEN Xiao, DONG Chen |
| Published October 18, 2024 |
| 2024,9(6):43-59 [Abstract] [View PDF(2.72 M)] |
| |
| Generating Adversarial Malware Examples Based on Saliency Analysis |
| ZHAN Dazhi, SUN Yi, ZHANG Lei, LIU Xin, GUO Shize, PAN Zhisong |
| Published October 18, 2024 |
| 2024,9(6):60-73 [Abstract] [View PDF(1.04 M)] |
| |
| A Survey of Cyber Threat Intelligence Entity Recognition Research |
| WANG Xuren, WEI Xinxin, WANG Yuanyuan, JIANG Zhengwei, JIANG Jun, YANG Peian, LIU Runshi |
| Published October 18, 2024 |
| 2024,9(6):74-99 [Abstract] [View PDF(2.14 M)] |
| |
| Relation Mining and Attention Based Anomaly Detection for Multivariate Time Series |
| HU Zhichao, YU Xiangzhan, LIU Likun, ZHANG Yu, YU Haining |
| Published October 18, 2024 |
| 2024,9(6):100-113 [Abstract] [View PDF(3.90 M)] |
| |
| Research on PHP Injection Vulnerability Detection Method Based on Intermediate Language |
| ZHANG Guodong, LIU Zilong, YAO Tianyu, JIN Zhuo, SUN Donghong, QIN Jiawei |
| Published October 18, 2024 |
| 2024,9(6):114-128 [Abstract] [View PDF(745.53 K)] |
| |
| A Malicious User Geolocation Method on Tantan App with Distance Transition |
| GUO Jiashan, DU Shaoyong, SHI Wenqi, LIU Ruiting, LUO Xiangyang |
| Published October 18, 2024 |
| 2024,9(6):129-139 [Abstract] [View PDF(4.46 M)] |
| |
| RT-NIG: Reconstructing Two-tuples in Neighborhood Information Graphs for Early Rumor Detection |
| WANG Biao, WEI Hongquan, LIU Shuxin, WANG Kai, JIANG Haocong, LI Ran |
| Published October 18, 2024 |
| 2024,9(6):140-158 [Abstract] [View PDF(7.10 M)] |
| |
| Malware Detection Method Based on Information Flows Relationship Features |
| YANG Baoshan, YANG Zhi, ZHANG Hongqi, HAN Bing, CHEN Xingyuan, SUN Lei |
| Published October 18, 2024 |
| 2024,9(6):159-171 [Abstract] [View PDF(3.37 M)] |
| |
| Establishing a Comprehensive Evaluation Model for the Competency Assessment of Pentesting Cybersecurity Talents |
| ZHANG Xiu, LIU Baoxu, GONG Xiaorui, YU Dongsong, ZHAO Beibei, LIU Yuan |
| Published October 18, 2024 |
| 2024,9(6):172-207 [Abstract] [View PDF(1.83 M)] |
| |
| A Survey of Model Inversion Attack Techniques Based on Neural Networks |
| ZHANG Huan, HAN Yanni, ZHAO Yining, ZHANG Fan, TAN Qian, MENG Yuan |
| Published October 18, 2024 |
| 2024,9(6):208-226 [Abstract] [View PDF(1.62 M)] |
| |
| Evaluating Fuzzers Based on Fuzzing-hampering Features |
| HAO Gaojian, LI Feng, HUO Wei, ZOU Wei |
| Published October 18, 2024 |
| 2024,9(6):227-242 [Abstract] [View PDF(968.21 K)] |
| |