Volume 30,Issue 2,2019 Table of Contents
Fine-grained Software Bug Location Approach at Method LevelZHANG Wen, LI ZI-Qiang, DU Yu-Hang and YANG Ye2019,30(2):195-210 [Abstract(4173)] [View PDF(5286)1.88 M]Multi-source Taint Analysis Technique for Privacy Leak Detection of Android AppsWANG Lei, ZHOU Qing, HE Dong-Jie, LI Lian and FENG Xiao-Bing2019,30(2):211-230 [Abstract(4021)] [View PDF(8217)2.36 M]APTL Model Checker for Verifying Multi-agent SystemsWANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong2019,30(2):231-243 [Abstract(3582)] [View PDF(4461)1.41 M]Multi-view Fuzzy Clustering Approach Based on Medoid Invariant ConstraintZHANG Yuan-Peng, ZHOU Jie, DENG Zhao-Hong, CHUNG Fu-Lai, JIANG Yi-Zhang, HANG Weng-Long and WANG Shi-Tong2019,30(2):282-301 [Abstract(2938)] [View PDF(4405)2.75 M]Data Transmission for Joint Optimization of Flow Scheduling and Path Selection in VANETsQIANG Min, CHEN Xiao-Jiang, YIN Xiao-Yan, JIA Ru-Zhao, XU Dan, TANG Zhan-Yong and FANG Ding-Yi2019,30(2):346-361 [Abstract(2485)] [View PDF(4251)1.73 M]Batch Provable Data Possession Scheme with Error LocatingPANG Xiao-Qiong, WANG Tian-Qi, CHEN Wen-Jun and REN Meng-Qi2019,30(2):362-380 [Abstract(3239)] [View PDF(4116)2.00 M]Hierarchical Name-based Route Aggregation SchemeXU Zhi-Wei, CHEN Bo and ZHANG Yu-Jun2019,30(2):381-398 [Abstract(3071)] [View PDF(4189)2.00 M]Verifiable Computation Using Re-randomizable Garbled CircuitsZHAO Qing-Song, ZENG Qing-Kai, LIU Xi-Meng and XU Huan-Liang2019,30(2):399-415 [Abstract(4041)] [View PDF(5477)1.72 M]Algorithm to Generate Adversarial Examples for Face-spoofing DetectionMA Yu-Kun, WU Li-Fang, JIAN Meng, LIU Fang-Hao and YANG Zhou2019,30(2):469-480 [Abstract(4741)] [View PDF(7057)1.66 M]Method for Graph-based Real-time Rule Scheduling in Multi-core EnvironmentWANG Juan-Juan, QIAO Ying, XIONG Jin-Quan and WANG Hong-An2019,30(2):481-494 [Abstract(4141)] [View PDF(4862)1.62 M]
Automatic Program Repair: Key Problems and TechnologiesLI Bin, HE Ye-Ping and MA Heng-Tai2019,30(2):244-265 [Abstract(4171)] [View PDF(10459)2.11 M]Effective Fault Localization Approach Based on Enhanced ContextsZHANG Zhuo, TAN Qing-Ping, MAO Xiao-Guang, LEI Yan, CHANG Xi and XUE Jian-Xin2019,30(2):266-281 [Abstract(4099)] [View PDF(6833)2.08 M]Survey on Internet End-to-end Multipath Transfer Research with Cross-layer OptimizationJIANG Zhuo, WU Qian, LI He-Wu and WU Jian-Ping2019,30(2):302-322 [Abstract(4068)] [View PDF(8708)2.19 M]Survey on Contact Graph Routing for Space Delay/Disruption Tolerant NetworksXU Shuang, WANG Xing-Wei, HUANG Min and ZHANG Lin-Lin2019,30(2):323-345 [Abstract(3601)] [View PDF(11453)3.06 M]Review of Visual Attention DetectionWANG Wen-Guan, SHEN Jian-Bing and JIA Yun-De2019,30(2):416-439 [Abstract(5044)] [View PDF(17404)2.65 M]Review of Image Semantic Segmentation Based on Deep LearningTIAN Xuan, WANG Liang and DING Qi2019,30(2):440-468 [Abstract(9429)] [View PDF(25026)3.27 M]