Page 6 - 《软件学报》2025年第4期
P. 6

DATABASE TECHNOLOGY


                    1796       Efficient Algorithms for Maximal Defective Biclique Enumeration on Bipartite Graphs
                            DAI Qiang-Qiang, YU Han-Wen, LI Rong-Hua, LI Zhen-Jun, WANG Guo-Ren
                    1811       Survey on Complex Spatio-temporal Data Mining Methods Based on Graph Neural Network
                            ZOU Hui-Qi, SHI Bin-Ze, SONG Ling-Yun, HAN Xiao-Lin, SHANG Xue-Qun


                 COMPUTER NETWORKS AND INFORMATION SECURITY

                    1844       Crowdsourcing Scheme Based on Blockchain and Decentralized Accountable Attribute-based Authentication
                            TAO Jing-Yi, ZHANG Liang, KAN Hai-Bin
                    1859       Autonomous Driving Security of Intelligent Connected Vehicles: Threats, Attacks, and Defenses
                            XI Lai-Le, LIN Sheng-Hao, WANG Zhen, XIE Tian-Ge, SUN Yu-Yan, ZHU Hong-Song, SUN Li-Min
                    1881       Review on Multi-sensor Data Fusion Research for Unmanned Aerial Vehicles
                            LI Geng-Song, LIU Yi, ZHENG Qi-Bin, YANG Guo-Li, LIU Kun, WANG Qiang, DIAO Xing-Chun

















































                 © Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
                 publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
                 permission of the Institute of Software, the Chinese Academy of Sciences.
   1   2   3   4   5   6   7   8   9   10   11