Volume 31,Issue 1,2020 Table of ContentsDownload Contents
Blockchain as a Service: Next Generation of Cloud ServicesZHU Yu-Jin, YAO Jian-Guo and GUAN Hai-BingPublished January 06, 2020 (19 pages)2020,31(1):1-19 [Abstract(7256)] [View PDF(10846)1.85 M]Defect Comprehension Research: Present, Problem and ProspectLI Xiao-Zhuo, HE Ye-Ping and MA Heng-TaiPublished January 06, 2020 (27 pages)2020,31(1):20-46 [Abstract(4368)] [View PDF(7368)2.36 M]Survey on Construction of Code Knowledge Graph and Intelligent Software DevelopmentWANG Fei, LIU Jing-Ping, LIU Bin, QIAN Tie-Yun, XIAO Yang-Hua and PENG Zhi-YongPublished January 06, 2020 (20 pages)2020,31(1):47-66 [Abstract(6813)] [View PDF(11747)1.88 M]Survey on Generating Adversarial ExamplesPAN Wen-Wen, WANG Xin-Yu, SONG Ming-Li and CHEN ChunPublished January 06, 2020 (15 pages)2020,31(1):67-81 [Abstract(6461)] [View PDF(13845)1.53 M]Overview on Mechanized Theorem ProvingJIANG Nan, LI Qing-An, WANG Lü-Meng, ZHANG Xiao-Tong and HE Yan-XiangPublished January 06, 2020 (31 pages)2020,31(1):82-112 [Abstract(5139)] [View PDF(10183)2.76 M]Survey on Cost-sensitive Learning MethodWAN Jian-Wu and YANG MingPublished January 06, 2020 (24 pages)2020,31(1):113-136 [Abstract(4563)] [View PDF(10404)2.21 M]Survey on Storage and Optimization Techniques of HDFSJIN Guo-Dong, BIAN Hao-Qiong, CHEN Yue-Guo and DU Xiao-YongPublished January 06, 2020 (25 pages)2020,31(1):137-161 [Abstract(5780)] [View PDF(8932)2.27 M]Real-time Interactive Analysis on Big DataYUAN Zhe, WEN Ji-Rong, WEI Zhe-Wei, LIU Jia-Jun, YAO Bin and ZHENG KaiPublished January 06, 2020 (21 pages)2020,31(1):162-182 [Abstract(4974)] [View PDF(8322)1.88 M]Research Development of Abnormal Traffic Detection in Software Defined NetworkingXU Yu-Hua and SUN Zhi-XinPublished January 06, 2020 (25 pages)2020,31(1):183-207 [Abstract(4712)] [View PDF(8379)2.28 M]Research on Blockchain-based Interdomain Security SolutionsCHEN Di, QIU Han, ZHU Jun-Hu and WANG Qing-XianPublished January 06, 2020 (20 pages)2020,31(1):208-227 [Abstract(6386)] [View PDF(9986)1.91 M]Categorization of Covert Channels and Its Application in Threat Restriction TechniquesWANG Chong, WANG Xiu-Li, Lü Yin-Run, ZHANG Chang-You, WU Jing-Zheng, GUAN Bei and WANG Yong-JiPublished January 06, 2020 (18 pages)2020,31(1):228-245 [Abstract(3846)] [View PDF(8059)1.66 M]