Volume 35,Issue 8,2024 Table of Contents
A Dual Offline Anonymous E-Payment Scheme for Mobile Devices Based on TEE and SEYANG Bo, FENG Wei, QIN Yu, ZHANG Yan-Chao, TONG Dong2024,35(8):0 [Abstract(208)] [View PDF(611)1.20 M]UEFI fuzz testing system and method based on heuristic reverse analysisLIN Xin-Kang, GU Kuang-yu, ZHAO Lei2024,35(8):0 [Abstract(227)] [View PDF(696)753.72 K]FirmDep: Embedded Application Rehosting Assisted with Dynamic AnalysisWU Hua-Mao, JIANG Mu-Hui, ZHOU Ya-Jin, LI Jin-Ku2024,35(8):0 [Abstract(189)] [View PDF(629)1.02 M]Multivariate Data Fusion-Based Network Alert Prioritization MethodWANG Wei-Jing, CHEN Jun-Jie, YANG Lin, HOU De-Jun, WANG Xing-Kai, WU Fu-Di, ZHANG Run-Zi, WANG Zan2024,35(8):0 [Abstract(163)] [View PDF(641)1.08 M]DGA Domain Name Detection Method Based on Double Branch Feature Extraction and Adaptive Capsule NetworkYANG Hong-Yu, ZHANG Tao, ZHANG Liang, CHENG Xiang, HU Ze2024,35(8):0 [Abstract(195)] [View PDF(683)1.27 M]Reinforcement Learning-based Adversarial Attacks Against Vulnerability Detection ModelsCHEN Si-Ran, WU Jing-Zheng, LING Xiang, LUO Tian-Yue, LIU Jia-Yu, WU Yan-Jun2024,35(8):0 [Abstract(351)] [View PDF(855)2.47 M]Compliance Detection Method for Mobile Application Privacy Policy ContentWANG Yin, FAN Ming, TAO Jun-Jie, LEI Jing-Yi, JIN Wu-Xia, HAN De-Qiang, LIU Ting2024,35(8):0 [Abstract(186)] [View PDF(665)1.11 M]An underground industry application collection method based on flow analysisCHEN Pei, HONG Geng, WU Meng-Ying, CHEN Jin-Song, DUAN Hai-Xin, YANG Min2024,35(8):0 [Abstract(194)] [View PDF(582)845.02 K]Privacy-preserving Graph Neural Network Recommendation System Based on Negative DatabaseZHAO Dong-Dong, XU Hu, PENG Si-Yun, ZHOU Jun-Wei2024,35(8):0 [Abstract(323)] [View PDF(850)2.08 M]