[1] |
LI Kun, LI Bin, ZHU Wenjing, ZHOU Qinglei.
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature
[J]. Journal of Frontiers of Computer Science and Technology, 2025, 19(3): 787-801.
|
[2] |
XU Zhiwei, LI Hailong, LI Bo, LI Tao, WANG Jiatai, XIE Xueshuo, DONG Zehui.
Survey of AIGC Large Model Evaluation: Enabling Technologies, Vulnerabilities and Mitigation
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(9): 2293-2325.
|
[3] |
WU Tao, CAO Xinwen, XIAN Xingping, YUAN Lin, ZHANG Shu, CUI Canyixing, TIAN Kan.
Advances of Adversarial Attacks and Robustness Evaluation for Graph Neural Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(8): 1935-1959.
|
[4] |
LU Yu, WANG Jingyu, LIU Lixin, WANG Haonan.
Auction Mechanism Driven Data Incentive Sharing Solution
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(8): 2203-2220.
|
[5] |
MENG Zhen, REN Guanyu, WAN Jianxiong, LI Leixiao.
Research on Distributed V2V Computation Offloading Method for Internet of Vehicles Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(7): 1923-1934.
|
[6] |
ZHANG Xuan, LI Leixiao, DU Jinze, SHI Jianping.
Overview of Covert Channel Research in Blockchain Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(6): 1438-1456.
|
[7] |
ZI Lingling, CONG Xin.
Blockchain Transactions Using Attached Blocks and Discrete Token Negotiation for Delay-Tolerant Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(5): 1357-1367.
|
[8] |
BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong.
Overview of Cross-Chain Identity Authentication Based on DID
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(3): 597-611.
|
[9] |
CHEN Qian, HONG Zheng, SI Jianpeng.
Application Layer Protocol Recognition Incorporating SENet and Transformer
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(3): 805-817.
|
[10] |
CHANG Yu, WANG Gang, ZHU Peng, KONG Lingfei, HE Jingheng.
Survey of Research on Construction Method of Industry Internet Security Knowledge Graph
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(2): 279-300.
|
[11] |
WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, MA Zhuo.
Research on Blockchain-Based Inter-Domain Routing Security Enhancement
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(12): 3144-3174.
|
[12] |
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei.
Forward-Secure Public-Key Encryption Scheme Based on SM9
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(12): 3348-3358.
|
[13] |
GAO Chunqi, LI Leixiao, SHI Jianping.
Overview of Trusted Authentication and Incentive Mechanisms in Blockchain-Based Internet of Vehicles
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(11): 2798-2822.
|
[14] |
XIA Lingling, WANG Qun, MA Zhuo, LIANG Guangjun.
Research on Application of Blockchain in PKI Security
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(10): 2573-2593.
|
[15] |
PEI Bingsen, LI Xin, JIANG Zhangtao, LIU Mingshuai.
Research on Public Security Professional Small Sample Knowledge Extraction Method Based on Large Language Model
[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(10): 2630-2642.
|