Page 5 - 《软件学报》2025年第10期
P. 5

PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE

                    4660       Intuitionistic Fuzzy Deep Stochastic Configuration Network for Solving Binary Classification Problems
                            DING Shi-Fei, ZHU Jiang-Lan, ZHANG Cheng-Long, GUO Li-Li, ZHANG Jian
                    4671       Specification Method of Securities Rules Integrating Large Language Models and Domain Knowledge Base
                            LI Liang-Guo, XUE Zhi-Yi, CHEN Xiao-Hong, ZHANG Min, CHEN Liang-Yu, LI Ping-Ping, JIANG Ting-Ting
                    4695       Offline Reinforcement Learning Method with Diffusion Model and Expectation Maximization
                            LIU Quan, YAN Jie, WU Lan
                    4710       Robustness Evaluation of ChatGPT Against Chinese Adversarial Attacks
                            ZHANG Yun-Ting, YE Lin, LI Bai-Song, ZHANG Hong-Li
                    4735       Twin Support Function Machine for Set-valued Data
                            LIANG Zhi-Zhen, MIN Yu-Han, DING Shi-Fei
                    4753       Multi-agent Consistency Reflection for LLM-grounded Conversational Aspect Sentiment Understanding
                            LIU Yi-Ding, WANG Jing-Jing, LUO Jia-Min, ZHOU Guo-Dong
                    4768       BIVM: Compilation Framework for Brain-inspired Computing and Prototype Research
                            YANG Le, LIU Xiao-Yi, LI Guang-Li, QU Peng, CUI Hui-Min, ZHANG You-Hui


                 COMPUTER NETWORKS AND INFORMATION SECURITY

                    4792       Mobile Edge Computing Resource Allocation Algorithm Under Multi-base Station Based on Double Auction
                            WANG Jian-Zhou, FU Xiao-Dong, DING Jia-Man, LI Jie
                    4812       Data-free Model Stealing Attack Method Based on Visual Feature Decoupling
                            ZHANG Jin-Hong, LIU Ren-Yang, WEI Ting-Chu, DONG Yun-Yun, ZHOU Wei
                    4827       FBS-uBlock: Flexible Bit Slicing Optimization Method of uBlock Algorithm
                            GONG Zi-Rui, GUO Hua, CHEN Chen, ZHANG Yu-Xuan, CHEN Jun-Xin, GUAN Zhen-Yu


                 COMPUTER GRAPHICS AND COMPUTER AIDED DESIGN

                    4846       Implicit Multi-scale Alignment and Interaction for Text-image Person Re-identification Method
                            SUN Rui, DU Yun, CHEN Long, ZHANG Xu-Dong
                    4864       Dual-threshold Adversarial Example Detection Based on Image Transformation
                            LIU Hui, WEN Fu-Ju, DU Hong-Qin, WANG Jing-Hua, ZHAO Bo

                 COMPUTER ARCHITECTURE

                    4880       Widening and Squeezing Mechanism for Binary Neural Network
                            HAN Kai, LIU Chuan-Jian, WU En-Hua















                 © Copyright 2025, Institute of Software, the Chinese Academy of Sciences. All rights reserved. No part of this
                 publication may be reproduced, stored in a retrieval system or transmitted in any form without the prior written
                 permission of the Institute of Software, the Chinese Academy of Sciences.
   1   2   3   4   5   6   7   8   9   10