Page 5 - 《软件学报》2025年第9期
P. 5
4207 Implicit-enhanced Causal Modeling Method for Phrasal Visual Grounding
ZHAO Jia-Ning, WANG Jing-Jing, LUO Jia-Min, ZHOU Guo-Dong
COMPUTER NETWORKS AND INFORMATION SECURITY
4223 Access Control Structure Based on Byzantine Fault Tolerance in Cross-trust-domain Internet Scenarios
HAN Jiang, ZHANG Zhen-Feng, LIU Yu-Guo, HU Ke-Xin, HE Shuang-Yu
4241 Row-based Stripe Construction in Grids for Point-in-polygon Tests
LI Jia-Wei, WANG Sheng-Chun, WANG Wen-Cheng
4250 Defense Method Against Poisoning Attacks in Cloud-edge Federated Learning Systems
ZHAO Ya-Ru, ZHANG Jian-Biao, CAO Yi-Hao, HUANG Hao-Xiang
4271 Public-key Authenticated Encryption Scheme with Keyword Search from Chinese Cryptographic SM9
PU Lang, LIN Chao, WU Wei, GU Jing-Jing, HE De-Biao
DATABASE TECHNOLOGY
4285 Neural-network-based Compression and Query Approach for Distributed Tracing Data
WANG Shang, ZHANG Chen-Xi, PENG Xin
4311 Multi-granularity Link Prediction Algorithm Based on Spatiotemporal Attention
HE Yu-Lin, LAI Jun-Long, CUI Lai-Zhong, YIN Jian-Fei, HUANG Zhe-Xue
4327 Multi-layer Recurrent GCN Cross-domain Recommendation with Pseudo-overlap Detection Mechanism
QIAN Zhong-Sheng, WANG Ya-Hui, YU Qing-Yuan, FAN Fu-Yu, FU Ting-Feng
COMPUTER GRAPHICS AND COMPUTER AIDED DESIGN
4349 Approximate Graph Stream Triangle Counting Algorithm Based on Sliding Window Model with High Accuracy
GOU Xiang-Yang, ZOU Lei, YU Xu
4373 Semantic-modulation-based Weakly Supervised Semantic Segmentation
LI Jun-Xia, SU Jing-Feng, CUI Ying, LIU Qing-Shan
4388 Face Anti-spoofing Method Based on Visual Attention and Domain Feature Fusion
ZHU Jian-Qiu, HUA Yang, SONG Xiao-Ning
© Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
permission of the Institute of Software, the Chinese Academy of Sciences.

