Volume 31,Issue 2,2020 Table of ContentsDownload Contents
Attacking Web Browser: ROP Gadget Injection by Using JavaScript Code BlocksYUAN Ping-Hai, ZENG Qing-Kai, ZHANG Yun-Jian and LIU YaoPublished February 06, 2020 (19 pages)2020,31(2):247-265 [Abstract(2157)] [View PDF(5027)1.84 M]Domain Adaptation Approach for Cross-project Software Defect PredictionCHEN Shu, YE Jun-Min and LIU TongPublished February 06, 2020 (16 pages)2020,31(2):266-281 [Abstract(2238)] [View PDF(4801)1.55 M]Integrating Preference in Many-objective Optimal Software Product Selection AlgorithmXIANG Yi, ZHOU Yu-Ren and CAI Shao-WeiPublished February 06, 2020 (20 pages)2020,31(2):282-301 [Abstract(1896)] [View PDF(3923)1.91 M]Macro Discourse Structure Representation Schema and Corpus ConstructionCHU Xiao-Min, XI Xue-Feng, JIANG Feng, XU Sheng, ZHU Qiao-Ming and ZHOU Guo-DongPublished February 06, 2020 (23 pages)2020,31(2):321-343 [Abstract(2461)] [View PDF(4883)2.01 M]RDFS Schema Extracting Method Based on Analysis of Constraint DependencyZHAO Xiao-Fei, SHI Zhong-Zhi, TIAN Dong-Ping and LIU Jian-WeiPublished February 06, 2020 (12 pages)2020,31(2):344-355 [Abstract(1473)] [View PDF(3032)1.27 M]Many-objective Evolutionary Algorithm Based on Decomposition and CoevolutionXIE Cheng-Wang, YU Wei-Wei, BI Ying-Zhou, WANG Shen-Wen and HU Yu-RongPublished February 06, 2020 (18 pages)2020,31(2):356-373 [Abstract(2349)] [View PDF(4190)1.83 M]Multidimensional Reputation Calculation Method Based on Feedback Reliability in MAS EnvironmentHUO Xing, ZHANG Yang-Yang, JING Yong-Jun and SHAO KunPublished February 06, 2020 (21 pages)2020,31(2):374-394 [Abstract(1906)] [View PDF(4548)2.18 M]Model Counting Methods Based on Configuration CheckingHE Fu-Lin, LIU Lei, Lü Shuai, NIU Dang-Dang and WANG QiangPublished February 06, 2020 (11 pages)2020,31(2):395-405 [Abstract(1888)] [View PDF(3440)1.06 M]Aggregate Query Processing Algorithm on Incomplete Data Based on Denotational SemanticsZHANG An-Zhen, LI Jian-Zhong and GAO HongPublished February 06, 2020 (15 pages)2020,31(2):406-420 [Abstract(2529)] [View PDF(3702)1.71 M]Local Event Recommendation Algorithm Based on Collective Contextual Relation LearningLAI Yi-An, ZHANG Yu-Jie, DU Yu-Lu and MENG Xiang-WuPublished February 06, 2020 (18 pages)2020,31(2):421-438 [Abstract(2026)] [View PDF(4257)1.65 M]Access Control Policy Specification Language Based on MetamodelLUO Yang, SHEN Qing-Ni and WU Zhong-HaiPublished February 06, 2020 (16 pages)2020,31(2):439-454 [Abstract(8690)] [View PDF(6513)1.47 M]Verifiable Secure Data Deduplication Method in Cloud StorageXIAN He-Qun, LIU Hong-Yan, ZHANG Shu-Guang and HOU Rui-TaoPublished February 06, 2020 (16 pages)2020,31(2):455-470 [Abstract(1988)] [View PDF(4263)1.75 M]Location Privacy and Query Privacy Preserving Method for K-nearest Neighbor Query in Road NetworksZHOU Chang-Li, CHEN Yong-Hong, TIAN Hui and CAI Shao-BinPublished February 06, 2020 (22 pages)2020,31(2):471-492 [Abstract(2298)] [View PDF(6466)2.45 M]Semi-supervised KFDA Algorithm Based on Low Density Separation Geometry DistanceTAO Xin-Min, CHANG Rui, SHEN Wei, WANG Ruo-Tong and LI Chen-XiPublished February 06, 2020 (18 pages)2020,31(2):493-510 [Abstract(1602)] [View PDF(3873)1.98 M]Part-based Object Tracking Based on Multi Collaborative ModelLIU Ming-Hua, WANG Chuan-Sheng, HU Qiang, WANG Chuan-Xu and CUI Xue-HongPublished February 06, 2020 (20 pages)2020,31(2):511-530 [Abstract(2763)] [View PDF(4473)2.27 M]Image Hierarchical Classification Based on Semantic Label Generation and Partial Order StructureGU Guang-Hua, CAO Yu-Yao, LI Gang and ZHAO YaoPublished February 06, 2020 (13 pages)2020,31(2):531-543 [Abstract(2141)] [View PDF(3844)1.49 M]Quantification Method for Heterogeneity on Web Server with Mimic ConstructionZHANG Jie-Xin, PANG Jian-Min and ZHANG ZhengPublished February 06, 2020 (14 pages)2020,31(2):564-577 [Abstract(1773)] [View PDF(4437)1.41 M]Cloud Auditing Scheme with Dynamic Revocation of Users and Real-time Updates of DataHAN Jing, LI Yan-Ping, YU Yong and DING YongPublished February 06, 2020 (19 pages)2020,31(2):578-596 [Abstract(2158)] [View PDF(4345)2.07 M]
Survey of Data AnnotationCAI Li, WANG Shu-Ting, LIU Jun-Hui and ZHU Yang-YongPublished February 06, 2020 (19 pages)2020,31(2):302-320 [Abstract(6467)] [View PDF(19328)1.88 M]Microarchitectural Transient Execution Attacks and Defense MethodsWU Xiao-Hui, HE Ye-Ping, MA Heng-Tai, ZHOU Qi-Ming and LIN Shao-FengPublished February 06, 2020 (20 pages)2020,31(2):544-563 [Abstract(3409)] [View PDF(7193)1.86 M]