Volume 31,Issue 1,2020 Table of ContentsDownload Contents

Other Issues:  
  
Review Articles

  • Blockchain as a Service: Next Generation of Cloud Services
  • ZHU Yu-Jin, YAO Jian-Guo and GUAN Hai-Bing
  • Published January 06, 2020 (19 pages)
  • 2020,31(1):1-19 [Abstract(7256)]  [View PDF(10846)1.85 M]
  • Defect Comprehension Research: Present, Problem and Prospect
  • LI Xiao-Zhuo, HE Ye-Ping and MA Heng-Tai
  • Published January 06, 2020 (27 pages)
  • 2020,31(1):20-46 [Abstract(4368)]  [View PDF(7368)2.36 M]
  • Survey on Construction of Code Knowledge Graph and Intelligent Software Development
  • WANG Fei, LIU Jing-Ping, LIU Bin, QIAN Tie-Yun, XIAO Yang-Hua and PENG Zhi-Yong
  • Published January 06, 2020 (20 pages)
  • 2020,31(1):47-66 [Abstract(6813)]  [View PDF(11747)1.88 M]
  • Survey on Generating Adversarial Examples
  • PAN Wen-Wen, WANG Xin-Yu, SONG Ming-Li and CHEN Chun
  • Published January 06, 2020 (15 pages)
  • 2020,31(1):67-81 [Abstract(6461)]  [View PDF(13845)1.53 M]
  • Overview on Mechanized Theorem Proving
  • JIANG Nan, LI Qing-An, WANG Lü-Meng, ZHANG Xiao-Tong and HE Yan-Xiang
  • Published January 06, 2020 (31 pages)
  • 2020,31(1):82-112 [Abstract(5139)]  [View PDF(10183)2.76 M]
  • Survey on Cost-sensitive Learning Method
  • WAN Jian-Wu and YANG Ming
  • Published January 06, 2020 (24 pages)
  • 2020,31(1):113-136 [Abstract(4563)]  [View PDF(10404)2.21 M]
  • Survey on Storage and Optimization Techniques of HDFS
  • JIN Guo-Dong, BIAN Hao-Qiong, CHEN Yue-Guo and DU Xiao-Yong
  • Published January 06, 2020 (25 pages)
  • 2020,31(1):137-161 [Abstract(5780)]  [View PDF(8932)2.27 M]
  • Real-time Interactive Analysis on Big Data
  • YUAN Zhe, WEN Ji-Rong, WEI Zhe-Wei, LIU Jia-Jun, YAO Bin and ZHENG Kai
  • Published January 06, 2020 (21 pages)
  • 2020,31(1):162-182 [Abstract(4974)]  [View PDF(8322)1.88 M]
  • Research Development of Abnormal Traffic Detection in Software Defined Networking
  • XU Yu-Hua and SUN Zhi-Xin
  • Published January 06, 2020 (25 pages)
  • 2020,31(1):183-207 [Abstract(4712)]  [View PDF(8379)2.28 M]
  • Research on Blockchain-based Interdomain Security Solutions
  • CHEN Di, QIU Han, ZHU Jun-Hu and WANG Qing-Xian
  • Published January 06, 2020 (20 pages)
  • 2020,31(1):208-227 [Abstract(6386)]  [View PDF(9986)1.91 M]
  • Categorization of Covert Channels and Its Application in Threat Restriction Techniques
  • WANG Chong, WANG Xiu-Li, Lü Yin-Run, ZHANG Chang-You, WU Jing-Zheng, GUAN Bei and WANG Yong-Ji
  • Published January 06, 2020 (18 pages)
  • 2020,31(1):228-245 [Abstract(3846)]  [View PDF(8059)1.66 M]