Volume 31,Issue 11,2020 Table of ContentsDownload Contents
Optimized Density Peaks Clustering Algorithm Based on Dissimilarity MeasureDING Shi-Fei, XU Xiao, WANG Yan-RuPublished November 06, 2020 (13 pages)2020,31(11):3321-3333 [Abstract(2016)] [View PDF(3993)1.82 M]Dynamic Gene Regulatory Network Evolution AnalysisLIU Zhong-Zhou, HU Wen-Bin, XU Ping-Hua, TANG Chuan-Hui, GAO Kuang, MA Fu-Ying, QIU Zhen-YuPublished November 06, 2020 (17 pages)2020,31(11):3334-3350 [Abstract(1513)] [View PDF(3513)1.93 M]Application of PES Algorithm Based on Preferred Collaborative Strategy on Integer ProgrammingWANG Zhan-Zhan, HUANG Zhang-Can, HOU Gai, TANG He-Hua, LI HePublished November 06, 2020 (13 pages)2020,31(11):3351-3363 [Abstract(2089)] [View PDF(4016)1.43 M]Data-driven Modeling and Prediction of User Acceptance for Mobile AppsLU Xuan, CHEN Zhen-Peng, LIU Xuan-Zhe, MEI HongPublished November 06, 2020 (16 pages)2020,31(11):3364-3379 [Abstract(1655)] [View PDF(4295)1.74 M]System Dynamics Simulation Modeling of Software Requirements Change ManagementKANG Yan-Ni, ZHANG Xuan, WANG Xu, LI Tong, TANG Zi-Qi, NIU Jia-MeiPublished November 06, 2020 (24 pages)2020,31(11):3380-3403 [Abstract(2309)] [View PDF(4616)3.25 M]Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTMDUAN Xu, WU Jing-Zheng, LUO Tian-Yue, YANG Mu-Tian, WU Yan-JunPublished November 06, 2020 (17 pages)2020,31(11):3404-3420 [Abstract(2334)] [View PDF(7666)1.86 M]Function-level Data Dependence Graph and Its Application in Static Vulnerability AnalysisCHEN Qian, CHENG Kai, ZHENG Yao-Wen, ZHU Hong-Song, SUN Li-MinPublished November 06, 2020 (15 pages)2020,31(11):3421-3435 [Abstract(1702)] [View PDF(3720)1.63 M]Malware Detection Method Based on Subgraph SimilarityWANG Jie, WANG Chang-QingPublished November 06, 2020 (12 pages)2020,31(11):3436-3447 [Abstract(1430)] [View PDF(3186)1.19 M]Fault Localization Approach Using Term Frequency and Inverse Document FrequencyZHANG Zhuo, LEI Yan, MAO Xiao-Guang, CHANG Xi, XUE Jian-Xin, XIONG Qing-YuPublished November 06, 2020 (13 pages)2020,31(11):3448-3460 [Abstract(4313)] [View PDF(4022)540.75 K]Scenario-driven and Bottom-up Microservice Decomposition Method for Monolithic SystemsDING Dan, PENG Xin, GUO Xiao-Feng, ZHANG Jian, WU Yi-JianPublished November 06, 2020 (20 pages)2020,31(11):3461-3480 [Abstract(2584)] [View PDF(5350)1.25 M]Local Community Discovery Approach Based on Fuzzy Similarity RelationLIU Jing-Lian, WANG Da-Ling, FENG Shi, ZHANG Yi-FeiPublished November 06, 2020 (11 pages)2020,31(11):3481-3491 [Abstract(1338)] [View PDF(3575)1.14 M]Kernel Subspace Clustering Algorithm for Categorical DataXU Kun-Peng, CHEN Li-Fei, SUN Hao-Jun, WANG Bei-ZhanPublished November 06, 2020 (14 pages)2020,31(11):3492-3505 [Abstract(1144)] [View PDF(3980)1.67 M]Multi-module TSK Fuzzy System Based on Training Space ReconstructionZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang, WANG Shi-TongPublished November 06, 2020 (14 pages)2020,31(11):3506-3518 [Abstract(1148)] [View PDF(3457)1.34 M]Temporal Index and Query Based on Timing PartitionYANG Zuo-Xi, TANG Na, TANG Yong, PAN Ming-Ming, LI Ding-Ding, YE Xiao-PingPublished November 06, 2020 (21 pages)2020,31(11):3519-3539 [Abstract(1245)] [View PDF(3122)2.23 M]Sampling-based Collection and Updating of Online Big Graph DataYIN Zi-Du, YUE Kun, ZHANG Bin-Bin, LI JinPublished November 06, 2020 (19 pages)2020,31(11):3540-3558 [Abstract(1569)] [View PDF(3398)1.82 M]Network Evolution Algorithm of Unmanned Aerial Vehicle Flocking Based on Two-hop Common NeighborYU Chong, SI Shuai-Zong, ZHAO Hai, ZHU Jian, SHAO Shi-Liang, LIU Jia-LiangPublished November 06, 2020 (12 pages)2020,31(11):3559-3570 [Abstract(1342)] [View PDF(3395)1.30 M]Graded Reversible Watermarking Scheme for Relational DataHOU Rui-Tao, XIAN He-Qun, LI Jing, DI Guan-DongPublished November 06, 2020 (17 pages)2020,31(11):3571-3587 [Abstract(1326)] [View PDF(3563)1.71 M]ROP Attack Detection Approach Based on Hardware Branch InformationLI Wei-Wei, MA Yue, WANG Jun-Jie, GAO Wei-Yi, YANG Qiu-Song, LI Ming-ShuPublished November 06, 2020 (15 pages)2020,31(11):3588-3602 [Abstract(1164)] [View PDF(3475)1.83 M]Optimized Block-matching Motion Estimation Using Adaptive Zoom CoefficientSONG Chuan-Ming, YAN Xiao-Hong, GE Ming-Bo, WANG Xiang-Hai, YIN Bao-CaiPublished November 06, 2020 (18 pages)2020,31(11):3603-3620 [Abstract(1071)] [View PDF(3188)1.79 M]Feature Representation Method of Microscopic Sandstone Images Based on Convolutional Neural NetworkLI Na, GU Qing, JIANG Feng, HAO Hui-Zhen, YU Hua, NI ChaoPublished November 06, 2020 (19 pages)2020,31(11):3621-3639 [Abstract(1284)] [View PDF(3164)2.15 M]Weakly Supervised Image Semantic Segmentation Method Based on Object Location CuesLI Yang, LIU Yang, LIU Guo-Jun, GUO Mao-ZuPublished November 06, 2020 (17 pages)2020,31(11):3640-3656 [Abstract(2587)] [View PDF(5592)1.95 M]Scheduling Algorithm for Mixed-criticality Jobs Based on Dynamical Demand BoundaryZENG Li-Ning, XU Cheng, LI Ren-Fa, YANG Fan, XU Hong-ZhiPublished November 06, 2020 (14 pages)2020,31(11):3657-3670 [Abstract(2010)] [View PDF(3576)1.44 M]