Page 6 - 《软件学报》2025年第5期
P. 6
2212 Data Poisoning Attacks and Defense Methods for Frequency Estimation in Local Differential Privacy
WANG Yuan-Yuan, ZHU You-Wen, WU Qi-Hui, WANG Wei, WANG Jian
2229 Survey on Acoustic-sensing-based Authentication on Mobile Devices
ZHOU Man, LI Xiang-Qian, WANG Qian, LI Qi, SHEN Chao, ZHOU Yu-Ting
2254 Reward Fraud Attack and Defense for Federated Learning Based on Gradient Scale-up
YUE Zi-Ying, CHEN Ke, SHOU Li-Dan, LUO Xin-Yuan, CHEN Gang
2270 DEFAULT Lightweight Cryptosystem Against Statistical Fault Analysis Based on Algebraic Relationship
LI Wei, QIN Meng-Yang, GU Da-Wu, LIAN Sheng, WEN Yun-Hua
2288 Malicious Node Detection Based on Semi-supervised and Self-supervised Graph Representation Learning
WANG Chen-Xu, WANG Kai-Yue, WANG Meng-Qin
DATABASE TECHNOLOGY
2308 Degree Corrected General Stochastic Block Model for Community Detection in Attributed Network
WANG Xiao, DAI Fang, GUO Wen-Yan, WANG Jun-Feng
2321 PLTree: High-performance Learning Index for Persistent Memory
ZHANG Zhi-Guo, XIE Zhong-Le, CHEN Ke, SHOU Li-Dan
2342 Clustering Frequent Pattern Mining for Time-ordered Transaction Data
WANG Shao-Peng, NIU Chao-Yu
COMPUTER ARCHITECTURE
2362 Low-latency Microkernel IPC Design for SPARC Architecture
SU Hao-Ran, LI Wen-Tai, GU Jin-Yu, ZANG Bin-Yu, CHEN Hai-Bo, GUAN Hai-Bing
2381 Quantum Circuit Mapping for Distributed Superconducting Quantum Computing Architecture
ZHU Peng-Cheng, WEI Li-Hua, FENG Shi-Guang, ZHOU Xiang-Zhen, ZHENG Sheng-Gen, GUAN Zhi-Jin
© Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
permission of the Institute of Software, the Chinese Academy of Sciences.