计算机/ 电子/ 通讯 / 人工智能 Computer Science/ Electronic / Communication / AI
期刊名称《Journal of Software》标题:TaGNN: Tendency-aware Graph Neural Network for Water Quality Prediction with Coupled Noise作者:Jian-MingSUN, Yu-YangXU, ShuoTONG, Hao-ChaoYING, XiaoZHANG, Fu-ZhenZHUANG, JianWU卷号:Journal of Software 36(11), 5227 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007381DOI:10.13328/j.cnki.jos.007381标题:AutoConfig: Automatic Configuration Mechanism for Deep Learning Compilation Optimization作者:Hong-BinZHANG, Xu-LinZHOU, Ming-JieXING, Yan-JunWU, ChenZHAO卷号:Journal of Software 35(6), 2668 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007102DOI:10.13328/j.cnki.jos.007102标题:Intuitionistic Fuzzy Deep Stochastic Configuration Network for Solving Binary Classification Problems作者:Shi-FeiDING, Jiang-LanZHU, Cheng-LongZHANG, Li-LiGUO, JianZHANG卷号:Journal of Software 36(10), 4660 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007291DOI:10.13328/j.cnki.jos.007291标题:面向多模态数据的新型数据库技术专题前言作者:彭智勇, 高云君, 李国良, 许建秋卷号:Journal of Software 35(3), 1049 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007079DOI:10.13328/j.cnki.jos.007079标题:Visual-language Multimodal Pre-training Based on Multi-entity Alignment作者:DengLI, A-MingWU, Ya-HongHAN卷号:Journal of Software 36(11), 5118 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007321DOI:10.13328/j.cnki.jos.007321标题:swLLVM: Optimized Compiler for New Generation Sunway Supercomputer作者:LiSHEN, Wen-HaoZHOU, FeiWANG, QianXIAO, Wen-HaoWU, Lu-FeiZHANG, HongAN, Feng-BinQI卷号:Journal of Software 35(5), 2359 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006896DOI:10.13328/j.cnki.jos.006896标题:Code Similarity Detection Supported by Longest Common Subsequence Embedding作者:Yuan-JunGONG, Jian-JunHUANG, WeiYOU, Wen-ChangSHI, BinLIANG, PanBIAN, JianZHANG卷号:Journal of Software 36(11), 4975 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007362DOI:10.13328/j.cnki.jos.007362标题:Adaptive Weight-induced Multi-source Partial Domain Adaptation作者:QingTIAN, Can-YuSUN, YiCHU卷号:Journal of Software 35(4), 1703 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007015DOI:10.13328/j.cnki.jos.007015标题:Ponzi Scheme Contract Detection Based on Code Control Flow Graph作者:JingHUANG, Meng-XiaoWANG, Hong-GuiHAN卷号:Journal of Software 36(10), 4628 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007318DOI:10.13328/j.cnki.jos.007318标题:Cross-project Prediction Method of Security Bug Reports Based on Knowledge Graph作者:WeiZHENG, Cheng-YuanLIU, Xiao-XueWU, XiangCHEN, Jing-YuanCHENG, Xiao-BingSUN, Rui-YangSUN卷号:Journal of Software 35(3), 1257 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006812DOI:10.13328/j.cnki.jos.006812标题:Event Coreference Resolution Method Enhanced by External Knowledge作者:ShengXU, Pei-FengLI, Qiao-MingZHU卷号:Journal of Software 36(11), 5158 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007367DOI:10.13328/j.cnki.jos.007367标题:Fuzz Testing for Sequential Decision-making Model with Intervening Inert Sequences作者:Bo-YuWU, Kai-RuiWANG, Ya-WenWANG, Jun-JieWANG卷号:Journal of Software 36(10), 4645 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007320DOI:10.13328/j.cnki.jos.007320标题:Survey on Automated Vulnerability Repair作者:Tong-TongXU, KuiLIU, XinXIA卷号:Journal of Software 35(1), 136 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006828DOI:10.13328/j.cnki.jos.006828标题:Vulnerability Sample Generation Method Based on Abstract Syntax Tree Variation作者:WeiZHENG, Yun-FanLI, KuiGUI, Xiao-XueWU, XiangCHEN, Pei-RanDENG卷号:Journal of Software 36(10), 4590 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007309DOI:10.13328/j.cnki.jos.007309标题:Hybrid Instruction Scheduling Algorithm for RISC-V VLIW Architecture作者:Yi-JinLI, Shao-MinDU, Jia-ChengZHAO, Xue-YingWANG, Yong-QuanZHA, Hui-MinCUI卷号:Journal of Software 36(9), 3937 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007357DOI:10.13328/j.cnki.jos.007357标题:Safe and Efficient Scalar Multiplication Algorithms Based on Two New Scalar Representations作者:ShiCHENG, ZhiHU, ZhengTAO卷号:Journal of Software 36(10), 4542 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007301DOI:10.13328/j.cnki.jos.007301标题:Survey on Key Technologies in Space-ground Integrated Network作者:Chang-LinJIANG, QingLI, YuWANG, DanZHAO, Da-YiZHAO, YongJIANG, Ming-WeiXU卷号:Journal of Software 35(1), 266 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006753DOI:10.13328/j.cnki.jos.006753标题:Issue-based LLM Retrieval Augmentation for Generating Supplementary Code Comments作者:Xing-LuPAN, Xian-LinZHAO, Chen-XiaoLIU, Yan-ZhenZOU, BingXIE卷号:Journal of Software 36(11), 5008 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007369DOI:10.13328/j.cnki.jos.007369标题:Survey on Vulnerability Mining Techniques of Network Protocol Software作者:BoYU, Jin-ShuSU, QiangYANG, Jian-XinHUANG, Zhou-ShiSHENG, Run-HaoLIU, Jian-JunLU, ChenLIANG, ChenCHEN, LeiZHAO卷号:Journal of Software 35(2), 872 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006942DOI:10.13328/j.cnki.jos.006942标题:Collective Emotional Stabilization Method for Social Network Rumor Detection作者:MingYIN, ShengQIAO, WeiCHEN, Ji-JiaoJIANG卷号:Journal of Software 36(11), 5134 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007322DOI:10.13328/j.cnki.jos.007322标题:Survey on Database Management Systems Supporting HTAP作者:Song-LiWANG, Yi-NanJING, Zhen-YingHE, KaiZHANG, Xiao-YangWANG卷号:Journal of Software 35(1), 405 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006916DOI:10.13328/j.cnki.jos.006916标题:SM3-OTS: Compact Post Quantum One-time Signature Scheme Based on Chinese Cryptographic Algorithm SM3作者:Ya-TaoYANG, Fang-RuiYIN, Liang-YuCHEN, DengPAN卷号:Journal of Software 36(10), 4417 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007392DOI:10.13328/j.cnki.jos.007392标题:Survey on Blockchain Interoperability作者:Tian-TianDUAN, Han-WenZHANG, BoLI, Zhao-XiongSONG, Zhong-ChengLI, JunZHANG, YiSUN卷号:Journal of Software 35(2), 800 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006950DOI:10.13328/j.cnki.jos.006950标题:Implicit Multi-scale Alignment and Interaction for Text-image Person Re-identification Method作者:RuiSUN, YunDU, LongCHEN, Xu-DongZHANG卷号:Journal of Software 36(10), 4846 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007293DOI:10.13328/j.cnki.jos.007293标题:Video Segmentation with Absorbing Markov Chains and Skeleton Mapping作者:YunLIANG, Yu-QingZHANG, Jin-TuZHENG, YongZHANG卷号:Journal of Software 35(3), 1552 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006821DOI:10.13328/j.cnki.jos.006821标题:RISC-V系统软件及软硬协同技术专题前言作者:武延军, 谢涛, 侯锐, 张科, 宋威, 邢明杰卷号:Journal of Software 36(9), 3917 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007361DOI:10.13328/j.cnki.jos.007361标题:Continuous Offloading and Resource Allocation Method of Uncertain Tasks in Mobile Edge Computing作者:BinXU, Yun-KaiZHAO, Jian-MingZHU, Yi-ChuanLIU, Xuan-TaoLI, Yan-FeiSUN, Yi-MuJI卷号:Journal of Software 35(3), 1466 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006805DOI:10.13328/j.cnki.jos.006805标题:抗量子密码与区块链应用专题前言作者:翁健, 祝烈煌, 赵运磊卷号:Journal of Software 36(10), 4403 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007395DOI:10.13328/j.cnki.jos.007395标题:Survey on Key Techniques of Multi-replica Distributed Transaction Processing and Representative Database Systems作者:Chun-YueHUANG, QiPENG, Fu-XiaoZHANG, Sheng-YiWANG, ChengLUO, Yan-FengZHANG, GeYU卷号:Journal of Software 35(1), 455 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006822DOI:10.13328/j.cnki.jos.006822标题:Legalization Principles and Transformation Verification Model of Smart Contracts作者:Ren-XiangLI, Zhong-YuanJIANG, ShengGAO, XiaoQIAN, Xiu-XuanSHEN, Bing-ChengLIU, Mei-YueTAO, Jian-FengMA卷号:Journal of Software 36(11), 5298 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007386DOI:10.13328/j.cnki.jos.007386标题:Research on Construction and Interactive Feedback of Online Exhibition Hall with Introduction of Intelligent Virtual Agent作者:FangLIU, TianLÜ, Xin-GeLIU, ShengYE, RuiGUO, LieZHANG, Cui-XiaMA, Qing-WeiWANG, Yong-JinLIU卷号:Journal of Software 35(3), 1534 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006801DOI:10.13328/j.cnki.jos.006801标题:Efficient Authenticated Key Exchange Protocol Based on Kyber Public-key Encryption作者:Rui-QiMI, Hao-DongJIANG, Zhen-FengZHANG卷号:Journal of Software 36(10), 4430 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007393DOI:10.13328/j.cnki.jos.007393标题:Explainable Feature-based Hierarchical Approach to Predict Remaining Process Time作者:NaGUO, CongLIU, Cai-HongLI, TingLU, Li-JieWEN, Qing-TianZENG卷号:Journal of Software 35(3), 1341 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006824DOI:10.13328/j.cnki.jos.006824标题:Multi-agent Consistency Reflection for LLM-grounded Conversational Aspect Sentiment Understanding作者:Yi-DingLIU, Jing-JingWANG, Jia-MinLUO, Guo-DongZHOU卷号:Journal of Software 36(10), 4753 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007365DOI:10.13328/j.cnki.jos.007365标题:Methods for Constraint Solving Problems Based on Learn to Reason Model: A Review作者:YueZOU, Jia-YangLAI, Yong-GangZHANG卷号:Journal of Software 35(1), 220 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006844DOI:10.13328/j.cnki.jos.006844标题:Offline Reinforcement Learning Method with Diffusion Model and Expectation Maximization作者:QuanLIU, JieYAN, LanWU卷号:Journal of Software 36(10), 4695 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007296DOI:10.13328/j.cnki.jos.007296标题:Open-domain Multi-turn Dialogue Model Based on Knowledge Enhancement作者:FanXU, Jian-MingXU, YongMA, Ming-WenWANG, Guo-DongZHOU卷号:Journal of Software 35(2), 758 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006823DOI:10.13328/j.cnki.jos.006823标题:Survey on Open Source Software Supply Chains作者:KaiGAO, HaoHE, BingXIE, Ming-HuiZHOU卷号:Journal of Software 35(2), 581 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006975DOI:10.13328/j.cnki.jos.006975标题:Survey on Quality of Software Code Comments作者:ChaoWANG, Wei-WeiXU, Ming-HuiZHOU卷号:Journal of Software 35(2), 513 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006944DOI:10.13328/j.cnki.jos.006944标题:Dynamic Spatiotemporal Charging Scheduling Based on Deep Reinforcement Learning for WRSN作者:Yi-JunWANG, YongFENG, MingLIU, Nian-BoLIU卷号:Journal of Software 35(3), 1485 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006814DOI:10.13328/j.cnki.jos.006814标题:Quantum-resistant and Efficient Blockchain Authentication Storage Scheme作者:ChuanZHANG, Xu-HaoREN, Hao-TianDENG, Ya-JieWANG, Chun-HaiLI, TongWU, Li-ChengWANG卷号:Journal of Software 36(10), 4483 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007394DOI:10.13328/j.cnki.jos.007394标题:Multi-source Chinese Medical Knowledge Graph Entity ?Alignment via Entity Semantics and Ontology Information作者:Rui-QingDING, Jun-FengZHAO, Le-YeWANG卷号:Journal of Software 36(11), 5178 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007370DOI:10.13328/j.cnki.jos.007370标题:Cross-level Requirement Tracing Method of Open-source Systems Based on Correlation Feedback作者:Jia-HaoTIAN, LiZHANG, Xiao-LiLIAN, Qian-HuiZHAO卷号:Journal of Software 35(3), 1321 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006820DOI:10.13328/j.cnki.jos.006820标题:Public-key Authenticated Encryption Scheme with Keyword Search from Chinese Cryptographic SM9作者:LangPU, ChaoLIN, WeiWU, Jing-JingGU, De-BiaoHE卷号:Journal of Software 36(9), 4271 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007271DOI:10.13328/j.cnki.jos.007271标题:Survey on Sim-to-real Transfer Reinforcement Learning in Robot Systems作者:QianLIN, ChaoYU, Xia-WeiWU, Yin-ZhaoDONG, XinXU, QiangZHANG, XianGUO卷号:Journal of Software 35(2), 711 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007006DOI:10.13328/j.cnki.jos.007006标题:FBS-uBlock: Flexible Bit Slicing Optimization Method of uBlock Algorithm作者:Zi-RuiGONG, HuaGUO, ChenCHEN, Yu-XuanZHANG, Jun-XinCHEN, Zhen-YuGUAN卷号:Journal of Software 36(10), 4827 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007316DOI:10.13328/j.cnki.jos.007316标题:Deep Learning Based Code Generation Methods: Literature Review作者:Ze-ZhouYANG, Si-RongCHEN, Cui-YunGAO, Zhen-HaoLI, GeLI, Michael Rung-TsongLYU卷号:Journal of Software 35(2), 604 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006981DOI:10.13328/j.cnki.jos.006981标题:Survey on Visual Relocalization in Prior Map作者:Xu-DongCAI, Yong-CaiWANG, Xue-WeiBAI, De-YingLI卷号:Journal of Software 35(2), 975 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006946DOI:10.13328/j.cnki.jos.006946标题:Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection Models作者:Si-RanCHEN, Jing-ZhengWU, XiangLING, Tian-YueLUO, Jia-YuLIU, Yan-JunWU卷号:Journal of Software 35(8), 3647 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007120DOI:10.13328/j.cnki.jos.007120标题:Knowledge Graph Accuracy Evaluation Using Embedding Model作者:Ming-TaoZHANG, Guo-LiYANG, Xiao-YingBAI卷号:Journal of Software 36(12), 5674 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007403DOI:10.13328/j.cnki.jos.007403标题:APP Software Defect Tracking and Analysis Method Oriented to Version Evolution作者:Hai-YiLIU, YingJIANG, Ze-JiangZHAO卷号:Journal of Software 35(7), 3180 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007107DOI:10.13328/j.cnki.jos.007107标题:Cross Semi-supervised Semantic Segmentation Network Based on Differential Feature Extraction作者:Ya-DangCHEN, Jia-QiLI, XunCHE, En-HuaWU卷号:Journal of Software 36(12), 5851 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007412DOI:10.13328/j.cnki.jos.007412标题:Over-parameterized Graph Neural Network Towards Robust Graph Structure Defending作者:XuCHU, Xin-YuMA, YangLIN, XinWANG, Ya-ShaWANG, Wen-WuZHU, HongMEI卷号:Journal of Software 35(8), 3878 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007065DOI:10.13328/j.cnki.jos.007065标题:Huaputong: Large Language Model for Genealogical Question-answering with Knowledge Reasoning作者:Xin-DongWU, Xing-RuiZHUO, Yong-PanCHANG, Gong-QingWU, ZanZHANG, YiZHU卷号:Journal of Software 36(12), 5572 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007399DOI:10.13328/j.cnki.jos.007399标题:Construction Method of Complete Cryptographic Reverse Firewall for IBE作者:YiZHAO, HangLIU, YangMING, BoYANG卷号:Journal of Software 35(7), 3482 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006930DOI:10.13328/j.cnki.jos.006930标题:NUMA-conscious Foreign Key Join Optimization Technique作者:Rui-ChenHAN, Yan-SongZHANG, ZhuanLIU, YuZHANG, MinJIAO, ShanWANG卷号:Journal of Software 36(12), 5821 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007411DOI:10.13328/j.cnki.jos.007411标题:SMTLOC: Bug Localization for SMT Solver Based on Multi-source Spectrum作者:Xiao-ShuangWANG, Zhi-DeZHOU, Xiao-ChenLI, HeJIANG, Zhi-LeiREN卷号:Journal of Software 35(7), 3314 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006922DOI:10.13328/j.cnki.jos.006922标题:UEFI Fuzz Testing Method Based on Heuristic Reverse Analysis作者:Xin-KangLIN, Kuang-YuGU, LeiZHAO卷号:Journal of Software 35(8), 3577 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007116DOI:10.13328/j.cnki.jos.007116标题:Survey on Testing of Deep Learning Frameworks作者:Xiang-YueMA, Xiao-TingDU, QingCAI, YangZHENG, ZhengHU, ZhengZHENG卷号:Journal of Software 35(8), 3752 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007059DOI:10.13328/j.cnki.jos.007059标题:Cloud-edge Coordinated Scheduling Method for Deep Learning Jobs作者:Dian-DianGU, XinJIN, Xuan-ZheLIU卷号:Journal of Software 36(12), 5480 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007432DOI:10.13328/j.cnki.jos.007432标题:Survey on Few-shot for Malware Detection作者:HaoLIU, Zhi-HongTIAN, JingQIU, YuanLIU, Bin-XingFANG卷号:Journal of Software 35(8), 3785 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007080DOI:10.13328/j.cnki.jos.007080标题:Knowledge Graph Completion: Techniques and Applications作者:Xiu-LinZHENG, PengZHOU, Pei-PeiLI, ZanZHANG, Yan-XiangHUANG, Xin-DongWU卷号:Journal of Software 36(12), 5599 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007400DOI:10.13328/j.cnki.jos.007400标题:Defect Category Prediction Method Based on Multi-source Domain Adaptation作者:YingXING, Meng-CiZHAO, BinYANG, Yu-WeiZHANG, Wen-JinLI, Jia-WeiGU, JunYUAN卷号:Journal of Software 35(7), 3227 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007109DOI:10.13328/j.cnki.jos.007109标题:Semantic Matching-based Cross-platform Mobile App Test Script Record and Replay via Large Language Models作者:Sheng-ChengYU, Chun-RongFANG, YeZHONG, Quan-JunZHANG, QinLIU, JiaLIU, TaoZHENG, Zhen-YuCHEN卷号:Journal of Software 36(12), 5456 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007414DOI:10.13328/j.cnki.jos.007414标题:Software Bug Location Method Combining Information Retrieval and Deep Model Features作者:Zong-WenSHEN, Fei-FeiNIU, Chuan-YiLI, XiangCHEN, QiLI, Ji-DongGE, BinLUO卷号:Journal of Software 35(7), 3245 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007111DOI:10.13328/j.cnki.jos.007111标题:Dual-view Self-supervised Session-based Recommendation Model Based on Temporal Interval Aware Data Augmentation作者:Zhong-ShengQIAN, Zi-LongWAN, Fu-YuFAN, Ting-FengFU卷号:Journal of Software 36(12), 5695 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007404DOI:10.13328/j.cnki.jos.007404标题:Compliance Detection Method for Mobile Application Privacy Policy Statement作者:YinWANG, MingFAN, Jun-JieTAO, Jing-YiLEI, Wu-XiaJIN, De-QiangHAN, TingLIU卷号:Journal of Software 35(8), 3668 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007121DOI:10.13328/j.cnki.jos.007121标题:Identification of Memory Copy Function via Hybrid Static and Dynamic Analysis作者:Xiao-KangYIN, Rui-JieCAI, Qi-ChaoYANG, Sheng-LiLIU卷号:Journal of Software 35(7), 3291 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006919DOI:10.13328/j.cnki.jos.006919标题:Sequential Consistency Per Location Theorem Proving in RISC-V Memory Consistency Model作者:Xue-ZhengXU, De-HengYANG, LuWANG, TaoWANG, An-WenHUANG, QiongLI卷号:Journal of Software 36(9), 3919 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007292DOI:10.13328/j.cnki.jos.007292标题:Network-side Alert Prioritization Method Based on Multivariate Data Fusion作者:Wei-JingWANG, Jun-JieCHEN, LinYANG, De-JunHOU, Xing-KaiWANG, Fu-DiWU, Run-ZiZHANG, ZanWANG卷号:Journal of Software 35(8), 3610 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007118DOI:10.13328/j.cnki.jos.007118标题:Research Advances in Programmable Switches Driven Network Security作者:Zhi-KaiZOU, Meng-HaoZHANG, Guan-YuLI, Ren-YuYANG, Tian-YuWO, Chun-MingHU, Ming-WeiXU卷号:Journal of Software 36(11), 5276 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007385DOI:10.13328/j.cnki.jos.007385标题:Collaborative Bug Triaging Method Based on Multimodal Fusion作者:Sheng-LongXIE, Qing-ShanLI, JieDAI, DiCUI卷号:Journal of Software 36(9), 4036 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007267DOI:10.13328/j.cnki.jos.007267标题:Survey on Deep Learning Methods for Freehand-sketch-based Visual Content Generation作者:RanZUO, Hao-XiangHU, Xiao-MingDENG, Cui-XiaMA, Hong-AnWANG卷号:Journal of Software 35(7), 3497 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007053DOI:10.13328/j.cnki.jos.007053标题:Implicit-enhanced Causal Modeling Method for Phrasal Visual Grounding作者:Jia-NingZHAO, Jing-JingWANG, Jia-MinLUO, Guo-DongZHOU卷号:Journal of Software 36(9), 4207 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007303DOI:10.13328/j.cnki.jos.007303标题:Anonymous Credential Protocol Based on SM2 Digital Signature作者:Yan-QiZHAO, Xiao-YiYANG, QiFENG, YongYU卷号:Journal of Software 35(7), 3469 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006929DOI:10.13328/j.cnki.jos.006929标题:Tighter Reductions of LWE Problems with Semi-uniform Seeds作者:YangWANG, Ming-QiangWANG卷号:Journal of Software 36(10), 4405 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007388DOI:10.13328/j.cnki.jos.007388标题:Comparison Research on Rule-based and Learning-based Mutation Techniques作者:Zhi-HaoGONG, Yi-ZhouCHEN, Jun-JieCHEN, DanHAO卷号:Journal of Software 35(7), 3093 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007113DOI:10.13328/j.cnki.jos.007113标题:Detection of Timer Concurrency Bug in Linux Kernel作者:Duo-MingZHOU, LinMA, Ya-JinZHOU卷号:Journal of Software 36(11), 5358 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007377DOI:10.13328/j.cnki.jos.007377标题:Software Change Prediction Based on Hybrid Graph Representation作者:Xin-YueYANG, AnLIU, LeiZHAO, LinCHEN, Xiao-FangZHANG卷号:Journal of Software 35(8), 3824 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006947DOI:10.13328/j.cnki.jos.006947标题:Neural-network-based Compression and Query Approach for Distributed Tracing Data作者:ShangWANG, Chen-XiZHANG, XinPENG卷号:Journal of Software 36(9), 4285 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007315DOI:10.13328/j.cnki.jos.007315标题:Multi-class Vulnerability Detection with Structure-aware Graph Neural Network作者:Si-CongCAO, Xiao-BingSUN, Li-LiBO, Xiao-XueWU, BinLI, TingCHEN, Xia-PuLUO, TaoZHANG, WeiLIU卷号:Journal of Software 36(11), 5045 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007375DOI:10.13328/j.cnki.jos.007375标题:Survey on Quantum Machine Learning作者:JianWANG, RuiZHANG, NanJIANG卷号:Journal of Software 35(8), 3843 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007042DOI:10.13328/j.cnki.jos.007042标题:Lazy Shadow Paging Under the RISC-V Architecture作者:Chuan-DongLI, RanYI, Ying-WeiLUO, Xiao-LinWANG, Zhen-LinWANG卷号:Journal of Software 36(9), 3970 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007359DOI:10.13328/j.cnki.jos.007359标题:Hexagonal Loop Tiling for Jacobi Computation Optimization Method作者:BinQU, SongLIU, Zeng-YuanZHANG, JieMA, Wei-GuoWU卷号:Journal of Software 35(8), 3721 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006945DOI:10.13328/j.cnki.jos.006945标题:Fine-grained Dichotomies for Symmetric 2-spin System on Regular Graphs作者:YingLIU卷号:Journal of Software 36(10), 4525 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007302DOI:10.13328/j.cnki.jos.007302标题:Dual Offline Anonymous E-payment Scheme for Mobile Devices Based on TEE and SE作者:BoYANG, WeiFENG, YuQIN, Yan-ChaoZHANG, DongTONG卷号:Journal of Software 35(8), 3553 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007115DOI:10.13328/j.cnki.jos.007115标题:Identification of Maintenance Status in Open-source Software Projects Based on Machine Learning作者:Shi-YuLUO, Xin-LeiLI, Jun-TaoLUO, XinWANG, Guo-FengZHANG, YangCHEN卷号:Journal of Software 36(11), 5082 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007380DOI:10.13328/j.cnki.jos.007380标题:AmazeMap: Microservices Fault Localization Method Based on Multi-level Impact Graph作者:Ya-XiaoLI, Qing-ShanLI, LuWANG, Yu-XuanJIANG卷号:Journal of Software 35(7), 3115 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007104DOI:10.13328/j.cnki.jos.007104标题:Trusted Verification Mechanism of Smart Contract Behaviour for Consortium Blockchain作者:Jian-BiaoZHANG, ShuangKANG, Zhao-QianZHANG, De-TianLIU卷号:Journal of Software 36(10), 4612 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007311DOI:10.13328/j.cnki.jos.007311标题:系统与网络软件安全专题前言作者:向剑文, 陈厅, 王浩宇, 罗夏朴, 杨珉卷号:Journal of Software 35(8), 3551 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007125DOI:10.13328/j.cnki.jos.007125标题:Chinese Idiom Misuse Diagnosis Based on Levitating Injection of Interpretation Knowledge作者:LiangHE, Yong-ChangCAO, Yan-ChenHUANG, ZhenWU, Xin-YuDAI, Jia-JunCHEN卷号:Journal of Software 36(11), 5213 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007373DOI:10.13328/j.cnki.jos.007373标题:Privacy-preserving Graph Neural Network Recommendation System Based on Negative Database作者:Dong-DongZHAO, HuXU, Si-YunPENG, Jun-WeiZHOU卷号:Journal of Software 35(8), 3698 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007124DOI:10.13328/j.cnki.jos.007124标题:Optimization Method for High-performance Libraries Targeting RISC-V Vector Extension作者:Liu-TongHAN, Hong-BinZHANG, Ming-JieXING, Yan-JunWU, ChenZHAO卷号:Journal of Software 36(9), 3985 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007360DOI:10.13328/j.cnki.jos.007360标题:Black-box Transferable Attack Method for Object Detection Based on GAN作者:Yu-XuanLU, Ze-YuLIU, Yong-GangLUO, Sen-YouDENG, TianJIANG, Jin-YanMA, Yin-PengDONG卷号:Journal of Software 35(7), 3531 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.006937DOI:10.13328/j.cnki.jos.006937标题:Deterministic Scheduling Theory for Time-triggered Airborne Wireless Communication Network作者:QinWEN, Shi-NingLI, Jiang-WeiXU, YuanJI, Lin-JieXIAO, Yi-MingLI, TaoCHENG卷号:Journal of Software 36(11), 5336 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007384DOI:10.13328/j.cnki.jos.007384标题:GUI Fuzzing Framework for Mobile Apps Based on Multi-modal Representation作者:Shao-KunZHANG, Yuan-ChunLI, Han-WenLEI, PengJIANG, DingLI, YaoGUO, Xiang-QunCHEN卷号:Journal of Software 35(7), 3162 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007106DOI:10.13328/j.cnki.jos.007106标题:Black-box Adversarial Attack for Deep Vulnerability Detection Model作者:Yu-BinQU, SongHUANG, XiangCHEN, Xing-YaWANG, LongLI, DanWANG, Yong-MingYAO, Xiao-LinJU卷号:Journal of Software 36(11), 5062 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007379DOI:10.13328/j.cnki.jos.007379标题:Multi-view Interaction Graph Convolutional Network for Semi-supervised Classification作者:Yue-TianWANG, Si-ChaoFU, Qin-MuPENG, BinZOU, Xiao-YuanJING, Xin-GeYOU卷号:Journal of Software 35(11), 5098 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007007DOI:10.13328/j.cnki.jos.007007标题:Structural-entropy-based Anomaly Detection in Attributed Graph作者:Jiang-HaoWU, LiangDUAN, KunYUE, Ang-ShengLI, Pei-ZhongYANG卷号:Journal of Software 36(11), 5031 (2025)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007374DOI:10.13328/j.cnki.jos.007374标题:Attention Guided Logo Detection and Recognition作者:Dong-MingZHANG, Guo-QingJIN, Ding-YuLU, JingZHANG, Yong-DongZHANG卷号:Journal of Software 35(11), 5116 (2024)链接:https://www.sciengine.com/doi/10.13328/j.cnki.jos.007033DOI:10.13328/j.cnki.jos.007033