Volume ,Issue 0,0 Table of Contents

Other Issues:  
  
Contents

  • Provable Secure Authorization Mechanism for the APK Redevelopment in the Standard Model
  • LI Dao-Feng, CHEN Hai-Qiang, LIANG Jia-Rrong and ZHAO Bo-Wen
  • 0(0):0 [Abstract(787)]  [View PDF(532)418.35 K]
  • Crowdsourcing test method for Android applications based on recording/replay
  • CAO Yu-Zhong, WU Guo-Quan, CHEN Wei, WEI Jun, HUANG Tao and Wang Su
  • 0(0):0 [Abstract(1029)]  [View PDF(1077)814.51 K]
  • Modeling and Correctness Repairing for Collaborative Business Processes
  • MO Qi, DAI Fei, DA Jian, ZHU Rui, XIE Zhong-Wen, LI Tong
  • 0(0):0 [Abstract(217)]  [View PDF(983)537.46 K]
  • S-Bridge: CPU Load Balancing Agent for Performance Asymmetric Multicore Processors
  • ZHAO Shan, HAO Chun-Liang, ZHAI Jian, LI Ming-Shu
  • 0(0):0 [Abstract(223)]  [View PDF(437)1.24 M]
  • Weakly Supervised Image Semantic Segmentation Method Based on Object Location Cues
  • LI Yang, LIU Yang, LIU Guo-Jun and GUO Mao-Zu
  • 0(0):0 [Abstract(705)]  [View PDF(1359)1.10 M]
  • System Dynamics Simulation of Software Requirements Change Management
  • KANG Yan-Ni, ZHANG Xuan, WANG Xu, LI Tong, TANG Zi-Qi and NIU Jia-Mei
  • 0(0):0 [Abstract(615)]  [View PDF(601)1.37 M]
  • Scheduling Algorithm for Mixed-Criticality Jobs System based on Dynamical Demand Boundary
  • ZENG Li-Ning, XU Cheng, LI Ren-Fa, YANG Fan and XU Hong-Zhi
  • 0(0):0 [Abstract(510)]  [View PDF(281)497.78 K]
  • Application of PES Algorithm Based on Preferred Collaborative Strategy on Integer Programming
  • WANG Zhan-Zhan, HUANG Zhang-Can, HOU Gai, TANG He-Hua and LI He
  • 0(0):0 [Abstract(607)]  [View PDF(502)580.86 K]
  • Image Restoration Based on Cascading Dense Convolutional Nerual Network in Contourlet Transform Domain
  • LIU Yunan, ZHANG Shan-Shan, WANG Chun-Peng, LI Guang-Yu and YANG Jian
  • 0(0):0 [Abstract(734)]  [View PDF(621)1006.14 K]
  • Preference vector guided co-evolutionary algorithm for Many-Objective Optimization
  • WANG Li-Ping, CHEN Hong, DU Jie-Jie, YU Wei and QIU Fei-Yue
  • 0(0):0 [Abstract(772)]  [View PDF(500)1.65 M]
  • FCSP-Blockchain: Fair Contract Signing Protocol Based on Blockchain Technology
  • YU Lei, ZHAO Xiao-Fang, SUN Yi, ZHANG Jun, ZHANG Han-Wen, WANG Ke-Yuan, JIA Lin-Peng, JIN Yan and HU Bin
  • 0(0):0 [Abstract(1629)]  [View PDF(772)588.96 K]
  • Efficient Single-Packet Trceback Approach Based on Alliance Theory
  • LU Ning, ZHANG Jun-Wei, MA Jian-Feng, CHENG Qing-Feng, ZHANG Jia-Wei, WANG Shang-Guang
  • 0(0):0 [Abstract(112)]  [View PDF(320)1.43 M]
  • Temporal Epistemic Logic for Perfect Recall
  • ZHANG Yu-Zhi and TANG Xiao-Jia
  • 0(0):0 [Abstract(564)]  [View PDF(279)362.42 K]
  • A Scheme of Revisable Blockchain
  • REN Yan-Li, XU Dan-Ting, ZHANG Xin-Peng and GU Da-Wu
  • 0(0):0 [Abstract(1188)]  [View PDF(749)658.64 K]
  • Local Search-Based Parallel Extension Rule Reasoning Method
  • LI Zhuang, LIU Lei, ZHANG Tongbo, ZHOU Wenbo and Lü Shuai
  • 0(0):0 [Abstract(863)]  [View PDF(381)322.34 K]
  • Spatial Steganalysis of Low Embedding Rate Based on Convolutional Neural Network
  • SHEN Jun, LIAO Xin, QIN Zhen, LIU Xu-Chong
  • 0(0):0 [Abstract(404)]  [View PDF(1181)906.23 K]
  • Node Mobility Based Routing Algorithm in Opportunistic Networks
  • ZHANG Qi-Fei, GUI Chao, SONG Ying, SUN Bao-Lin, DAI Zhi-Feng
  • 0(0):0 [Abstract(267)]  [View PDF(1119)1.58 M]
  • A Fusion Technique for Fragmented Genealogy Data
  • WU Xin-Dong, LI Jiao, ZHOU Peng, BU Chen-Yang
  • 0(0):0 [Abstract(456)]  [View PDF(1397)601.67 K]
  • Gaussian Convolution Angle: A Shape Description Invariant for Leaf Image Retrieval
  • CHEN Xin, WANG Bin, JI Zi-heng
  • 0(0):0 [Abstract(28)]  [View PDF(25)697.17 K]
  • Private Data Protection Scheme for Consortium Blockchain Platform Based on Two-Layer Cooperation
  • CAI Liang, Duan Hao, YAN Meng, XIA Xin
  • 0(0):0 [Abstract(337)]  [View PDF(262)799.22 K]
  • Fault Localization Using Term Frequency-Inverse Document Frequency
  • ZHANG Zhuo, LEI Yan, MAO Xiao-Guang, CHANG Xi, XUE Jian-Xin, XIONG Qing-Yu
  • 0(0):0 [Abstract(271)]  [View PDF(729)540.75 K]
  • Walking Recognition and Parameters Estimation Based on Wi-Fi Channel State Information
  • LI Sheng-Jie, LI Xiang, ZHANG Yue, WANG Ya-Sha, ZHANG Da-Qing
  • 0(0):0 [Abstract(129)]  [View PDF(283)1003.71 K]
  • Scenario-Driven and Bottom-Up Microservice Decomposition for Monolithic Systems
  • DING Dan, PENG Xin, GUO Xiao-Feng, ZHANG Jian, WU Yi-Jian
  • 0(0):0 [Abstract(418)]  [View PDF(719)1.25 M]
  • Satisfiability Threshold of the Strictly d-Regular Random (3,2s)-SAT Problem for Fixed s
  • WANG Yong-Ping, XU Dao-Yun
  • 0(0):0 [Abstract(154)]  [View PDF(159)423.77 K]
  • Performance Optimizing Method for Sparse Convolutional Neural Networks on GPU
  • DONG Xiao, LIU Lei, LI Jing, FENG Xiao-Bing
  • 0(0):0 [Abstract(395)]  [View PDF(1684)3.41 M]
  • Response Time constrained Code Reviewer Recommandation
  • HU Yuan-Zhe, WANG Jun-Jie, LI Shou-Bin, HU Jun, WANG Qing
  • 0(0):0 [Abstract(435)]  [View PDF(248)672.17 K]
  • Hyperbolic Representation Learning for Complex Networks
  • WANG Qiang, JIANG Hao, YI Shu-Wen, YANG Lin-Tao, NAI He, NIE Qi
  • 0(0):0 [Abstract(55)]  [View PDF(87)1.14 M]
  • Research Progress of SGX Application Supporting Techniques
  • DONG Chun-Tao, SHEN Qing-Ni, LUO Wu, WU Peng-Fei, WU Zhong-Hai
  • 0(0):0 [Abstract(119)]  [View PDF(49)802.87 K]
  • Survey of Deep Learning Model Compression and Acceleration
  • GAO Han, TIAN Yu-Long, XU Feng-Yuan, ZHONG Sheng
  • 0(0):0 [Abstract(217)]  [View PDF(111)732.56 K]
  • Overview of Graph Based Anomaly Detection
  • LI Zhong, JIN Xiao-Long, ZHUANG Chuan-Zhi, SUN Zhi
  • 0(0):0 [Abstract(173)]  [View PDF(99)764.19 K]
  • Survey on Anonymity Metrics in Communication Network
  • ZHAO Hui, WANG Liang-Min, SHEN Tu-Hao, HUANG Lei, NI Xiao-Ling
  • 0(0):0 [Abstract(109)]  [View PDF(53)1.33 M]
  • U-net based Medical Image Segmentation Technology: A Survey
  • 殷晓航,王永才,李德英
  • 0(0):0 [Abstract(103)]  [View PDF(107)2.41 M]
  • Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
  • LIU Xue-Hua, DING Li-Ping, ZHENG Tao, WU Jing-Zheng, LI Yan-Feng
  • 0(0):0 [Abstract(409)]  [View PDF(121)516.15 K]
  • Data-driven Modeling and Prediction of User Acceptance for Mobile Apps
  • LU Xuan, CHEN Zhenpeng, LIU Xuanzhe, MEI Hong
  • 0(0):0 [Abstract(23)]  [View PDF(32)497.13 K]
  • Survey of Storage Scalability on Blockchain
  • SUN Zhi-Xin, ZHANG Xin, XIANG Feng, CHEN Lu
  • 0(0):0 [Abstract(205)]  [View PDF(93)973.15 K]
  • Research and Development on Efficient Elliptic Curve Isogenous Computations
  • HUANG Yan, ZHANG Fang-Guo
  • 0(0):0 [Abstract(127)]  [View PDF(50)475.09 K]
  • Survey of Intelligent Software Defined Networking
  • LI Ke-Xin, WANG Xing-Wei, YI Bo, HUANG Min, LIU Xiao-Jie
  • 0(0):0 [Abstract(187)]  [View PDF(64)464.88 K]
  • Survey of Data Management Techniques for Supporting Artificial Intelligence
  • LI Guo-Liang, ZHOU Xuan-He
  • 0(0):0 [Abstract(288)]  [View PDF(88)712.26 K]