Volume 35,Issue 8,2024 Table of Contents

Other Issues:  
  
Contents

  • A Dual Offline Anonymous E-Payment Scheme for Mobile Devices Based on TEE and SE
  • YANG Bo, FENG Wei, QIN Yu, ZHANG Yan-Chao, TONG Dong
  • 2024,35(8):0 [Abstract(208)]  [View PDF(611)1.20 M]
  • UEFI fuzz testing system and method based on heuristic reverse analysis
  • LIN Xin-Kang, GU Kuang-yu, ZHAO Lei
  • 2024,35(8):0 [Abstract(227)]  [View PDF(696)753.72 K]
  • FirmDep: Embedded Application Rehosting Assisted with Dynamic Analysis
  • WU Hua-Mao, JIANG Mu-Hui, ZHOU Ya-Jin, LI Jin-Ku
  • 2024,35(8):0 [Abstract(189)]  [View PDF(629)1.02 M]
  • Multivariate Data Fusion-Based Network Alert Prioritization Method
  • WANG Wei-Jing, CHEN Jun-Jie, YANG Lin, HOU De-Jun, WANG Xing-Kai, WU Fu-Di, ZHANG Run-Zi, WANG Zan
  • 2024,35(8):0 [Abstract(163)]  [View PDF(641)1.08 M]
  • DGA Domain Name Detection Method Based on Double Branch Feature Extraction and Adaptive Capsule Network
  • YANG Hong-Yu, ZHANG Tao, ZHANG Liang, CHENG Xiang, HU Ze
  • 2024,35(8):0 [Abstract(195)]  [View PDF(683)1.27 M]
  • Reinforcement Learning-based Adversarial Attacks Against Vulnerability Detection Models
  • CHEN Si-Ran, WU Jing-Zheng, LING Xiang, LUO Tian-Yue, LIU Jia-Yu, WU Yan-Jun
  • 2024,35(8):0 [Abstract(351)]  [View PDF(855)2.47 M]
  • Compliance Detection Method for Mobile Application Privacy Policy Content
  • WANG Yin, FAN Ming, TAO Jun-Jie, LEI Jing-Yi, JIN Wu-Xia, HAN De-Qiang, LIU Ting
  • 2024,35(8):0 [Abstract(186)]  [View PDF(665)1.11 M]
  • An underground industry application collection method based on flow analysis
  • CHEN Pei, HONG Geng, WU Meng-Ying, CHEN Jin-Song, DUAN Hai-Xin, YANG Min
  • 2024,35(8):0 [Abstract(194)]  [View PDF(582)845.02 K]
  • Privacy-preserving Graph Neural Network Recommendation System Based on Negative Database
  • ZHAO Dong-Dong, XU Hu, PENG Si-Yun, ZHOU Jun-Wei
  • 2024,35(8):0 [Abstract(323)]  [View PDF(850)2.08 M]