Page 5 - 《软件学报》2025年第7期
P. 5
3253 Unsupervised Domain Adaptation Method with Augmentation Technology
CAO Yi, GUO Mao-Zu, WU Wei-Ning
COMPUTER NETWORKS AND INFORMATION SECURITY
3271 Survey on Backdoor Attacks and Defenses for Deep Learning Research
GAO Meng-Nan, CHEN Wei, WU Li-Fa, ZHANG Bo-Lei
3306 Dynamic Cloud Storage Auditing Scheme with Efficient Data Ownership Sharing
YIN Xin-Chun, WANG Jing-Wei, NING Jian-Ting
3321 Low-data Quantum Key-recovery Attack on Block Cipher Structures
XU Yin-Song, LUO Yi-Yuan, DONG Xiao-Yang, YUAN Zheng
3339 Lock-free Concurrent Cuckoo Filter
WANG Han-Cheng, CHEN Zhi-Peng, DAI Hai-Peng, GU Rong, KIM Chaewon, CHEN Gui-Hai
3358 Cost-sensitive Variable Hashing-fingerprint Cuckoo Filter
LI Meng, LUO Wen-Qi, DAI Hai-Peng, WANG Han-Cheng, GU Rong, CHEN Gui-Hai
3375 Encrypted Video Identification Method for HTTP/2 Traffic Multiplexing Features
WU Hua, LUO Hao, ZHAO Shi-Shun, LIU Song-Tao, CHENG Guang, HU Xiao-Yan
3405 Locally Differentially Private Truth Discovery Algorithm via Adaptive Pruning
ZHANG Peng-Fei, ZHU Yi-Bo, CHENG Xiang, ZHANG Zhi-Kun, LIU Xi-Meng, SUN Li,
FANG Xian-Jin, ZHANG Ji
© Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
permission of the Institute of Software, the Chinese Academy of Sciences.

