Volume 31,Issue 2,2020 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Attacking Web Browser: ROP Gadget Injection by Using JavaScript Code Blocks
  • YUAN Ping-Hai, ZENG Qing-Kai, ZHANG Yun-Jian and LIU Yao
  • Published February 06, 2020 (19 pages)
  • 2020,31(2):247-265 [Abstract(2157)]  [View PDF(5027)1.84 M]
  • Domain Adaptation Approach for Cross-project Software Defect Prediction
  • CHEN Shu, YE Jun-Min and LIU Tong
  • Published February 06, 2020 (16 pages)
  • 2020,31(2):266-281 [Abstract(2238)]  [View PDF(4801)1.55 M]
  • Integrating Preference in Many-objective Optimal Software Product Selection Algorithm
  • XIANG Yi, ZHOU Yu-Ren and CAI Shao-Wei
  • Published February 06, 2020 (20 pages)
  • 2020,31(2):282-301 [Abstract(1896)]  [View PDF(3923)1.91 M]
  • Macro Discourse Structure Representation Schema and Corpus Construction
  • CHU Xiao-Min, XI Xue-Feng, JIANG Feng, XU Sheng, ZHU Qiao-Ming and ZHOU Guo-Dong
  • Published February 06, 2020 (23 pages)
  • 2020,31(2):321-343 [Abstract(2461)]  [View PDF(4883)2.01 M]
  • RDFS Schema Extracting Method Based on Analysis of Constraint Dependency
  • ZHAO Xiao-Fei, SHI Zhong-Zhi, TIAN Dong-Ping and LIU Jian-Wei
  • Published February 06, 2020 (12 pages)
  • 2020,31(2):344-355 [Abstract(1473)]  [View PDF(3032)1.27 M]
  • Many-objective Evolutionary Algorithm Based on Decomposition and Coevolution
  • XIE Cheng-Wang, YU Wei-Wei, BI Ying-Zhou, WANG Shen-Wen and HU Yu-Rong
  • Published February 06, 2020 (18 pages)
  • 2020,31(2):356-373 [Abstract(2349)]  [View PDF(4190)1.83 M]
  • Multidimensional Reputation Calculation Method Based on Feedback Reliability in MAS Environment
  • HUO Xing, ZHANG Yang-Yang, JING Yong-Jun and SHAO Kun
  • Published February 06, 2020 (21 pages)
  • 2020,31(2):374-394 [Abstract(1906)]  [View PDF(4548)2.18 M]
  • Model Counting Methods Based on Configuration Checking
  • HE Fu-Lin, LIU Lei, Lü Shuai, NIU Dang-Dang and WANG Qiang
  • Published February 06, 2020 (11 pages)
  • 2020,31(2):395-405 [Abstract(1888)]  [View PDF(3440)1.06 M]
  • Aggregate Query Processing Algorithm on Incomplete Data Based on Denotational Semantics
  • ZHANG An-Zhen, LI Jian-Zhong and GAO Hong
  • Published February 06, 2020 (15 pages)
  • 2020,31(2):406-420 [Abstract(2529)]  [View PDF(3702)1.71 M]
  • Local Event Recommendation Algorithm Based on Collective Contextual Relation Learning
  • LAI Yi-An, ZHANG Yu-Jie, DU Yu-Lu and MENG Xiang-Wu
  • Published February 06, 2020 (18 pages)
  • 2020,31(2):421-438 [Abstract(2026)]  [View PDF(4257)1.65 M]
  • Access Control Policy Specification Language Based on Metamodel
  • LUO Yang, SHEN Qing-Ni and WU Zhong-Hai
  • Published February 06, 2020 (16 pages)
  • 2020,31(2):439-454 [Abstract(8690)]  [View PDF(6513)1.47 M]
  • Verifiable Secure Data Deduplication Method in Cloud Storage
  • XIAN He-Qun, LIU Hong-Yan, ZHANG Shu-Guang and HOU Rui-Tao
  • Published February 06, 2020 (16 pages)
  • 2020,31(2):455-470 [Abstract(1988)]  [View PDF(4263)1.75 M]
  • Location Privacy and Query Privacy Preserving Method for K-nearest Neighbor Query in Road Networks
  • ZHOU Chang-Li, CHEN Yong-Hong, TIAN Hui and CAI Shao-Bin
  • Published February 06, 2020 (22 pages)
  • 2020,31(2):471-492 [Abstract(2298)]  [View PDF(6466)2.45 M]
  • Semi-supervised KFDA Algorithm Based on Low Density Separation Geometry Distance
  • TAO Xin-Min, CHANG Rui, SHEN Wei, WANG Ruo-Tong and LI Chen-Xi
  • Published February 06, 2020 (18 pages)
  • 2020,31(2):493-510 [Abstract(1602)]  [View PDF(3873)1.98 M]
  • Part-based Object Tracking Based on Multi Collaborative Model
  • LIU Ming-Hua, WANG Chuan-Sheng, HU Qiang, WANG Chuan-Xu and CUI Xue-Hong
  • Published February 06, 2020 (20 pages)
  • 2020,31(2):511-530 [Abstract(2763)]  [View PDF(4473)2.27 M]
  • Image Hierarchical Classification Based on Semantic Label Generation and Partial Order Structure
  • GU Guang-Hua, CAO Yu-Yao, LI Gang and ZHAO Yao
  • Published February 06, 2020 (13 pages)
  • 2020,31(2):531-543 [Abstract(2141)]  [View PDF(3844)1.49 M]
  • Quantification Method for Heterogeneity on Web Server with Mimic Construction
  • ZHANG Jie-Xin, PANG Jian-Min and ZHANG Zheng
  • Published February 06, 2020 (14 pages)
  • 2020,31(2):564-577 [Abstract(1773)]  [View PDF(4437)1.41 M]
  • Cloud Auditing Scheme with Dynamic Revocation of Users and Real-time Updates of Data
  • HAN Jing, LI Yan-Ping, YU Yong and DING Yong
  • Published February 06, 2020 (19 pages)
  • 2020,31(2):578-596 [Abstract(2158)]  [View PDF(4345)2.07 M]
  • Review Articles

  • Survey of Data Annotation
  • CAI Li, WANG Shu-Ting, LIU Jun-Hui and ZHU Yang-Yong
  • Published February 06, 2020 (19 pages)
  • 2020,31(2):302-320 [Abstract(6467)]  [View PDF(19328)1.88 M]
  • Microarchitectural Transient Execution Attacks and Defense Methods
  • WU Xiao-Hui, HE Ye-Ping, MA Heng-Tai, ZHOU Qi-Ming and LIN Shao-Feng
  • Published February 06, 2020 (20 pages)
  • 2020,31(2):544-563 [Abstract(3409)]  [View PDF(7193)1.86 M]