Page 5 - 《软件学报》2025年第7期
P. 5

3253       Unsupervised Domain Adaptation Method with Augmentation Technology
                            CAO Yi, GUO Mao-Zu, WU Wei-Ning


                 COMPUTER NETWORKS AND INFORMATION SECURITY


                    3271       Survey on Backdoor Attacks and Defenses for Deep Learning Research
                            GAO Meng-Nan, CHEN Wei, WU Li-Fa, ZHANG Bo-Lei

                    3306       Dynamic Cloud Storage Auditing Scheme with Efficient Data Ownership Sharing
                            YIN Xin-Chun, WANG Jing-Wei, NING Jian-Ting
                    3321       Low-data Quantum Key-recovery Attack on Block Cipher Structures
                            XU Yin-Song, LUO Yi-Yuan, DONG Xiao-Yang, YUAN Zheng
                    3339       Lock-free Concurrent Cuckoo Filter
                            WANG Han-Cheng, CHEN Zhi-Peng, DAI Hai-Peng, GU Rong, KIM Chaewon, CHEN Gui-Hai
                    3358       Cost-sensitive Variable  Hashing-fingerprint Cuckoo Filter
                            LI Meng, LUO Wen-Qi, DAI Hai-Peng, WANG Han-Cheng, GU Rong, CHEN Gui-Hai
                    3375       Encrypted Video Identification Method for HTTP/2 Traffic Multiplexing Features
                            WU Hua, LUO Hao, ZHAO Shi-Shun, LIU Song-Tao, CHENG Guang, HU Xiao-Yan
                    3405       Locally Differentially Private Truth Discovery Algorithm via Adaptive Pruning
                            ZHANG Peng-Fei, ZHU Yi-Bo, CHENG Xiang, ZHANG Zhi-Kun, LIU Xi-Meng, SUN Li,
                            FANG Xian-Jin, ZHANG Ji










































                 © Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
                 publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
                 permission of the Institute of Software, the Chinese Academy of Sciences.
   1   2   3   4   5   6   7   8   9   10