Page 6 - 《软件学报》2025年第4期
P. 6
DATABASE TECHNOLOGY
1796 Efficient Algorithms for Maximal Defective Biclique Enumeration on Bipartite Graphs
DAI Qiang-Qiang, YU Han-Wen, LI Rong-Hua, LI Zhen-Jun, WANG Guo-Ren
1811 Survey on Complex Spatio-temporal Data Mining Methods Based on Graph Neural Network
ZOU Hui-Qi, SHI Bin-Ze, SONG Ling-Yun, HAN Xiao-Lin, SHANG Xue-Qun
COMPUTER NETWORKS AND INFORMATION SECURITY
1844 Crowdsourcing Scheme Based on Blockchain and Decentralized Accountable Attribute-based Authentication
TAO Jing-Yi, ZHANG Liang, KAN Hai-Bin
1859 Autonomous Driving Security of Intelligent Connected Vehicles: Threats, Attacks, and Defenses
XI Lai-Le, LIN Sheng-Hao, WANG Zhen, XIE Tian-Ge, SUN Yu-Yan, ZHU Hong-Song, SUN Li-Min
1881 Review on Multi-sensor Data Fusion Research for Unmanned Aerial Vehicles
LI Geng-Song, LIU Yi, ZHENG Qi-Bin, YANG Guo-Li, LIU Kun, WANG Qiang, DIAO Xing-Chun
© Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
permission of the Institute of Software, the Chinese Academy of Sciences.