Volume 28,Issue 9,2017 Table of Contents

Other Issues:  
  
Contents

  • Visual Analysis of Consumer Purchasing Behavior for Online Transaction Log
  • JIA Ruo-Yu, ZENG Ang, ZHU Min, LIU Han-Qing and LI Ming-Zhao
  • 2017,28(9):2450-2467 [Abstract(1376)]  [View PDF(1471)2.22 M]
  • Personal Group Recommendation via Textual and Social Information
  • WANG Zhong-Qing, LI Shou-Shan and ZHOU Guo-Dong
  • 2017,28(9):2468-2480 [Abstract(908)]  [View PDF(1030)1.16 M]
  • Adaptive Routing Service Composition: Modeling and Optimization
  • BU Chao, WANG Xing-Wei and HUANG Min
  • 2017,28(9):2481-2501 [Abstract(987)]  [View PDF(636)1.98 M]
  • Special Issue's Articles

  • 信息系统安全专题前言
  • 李舟军,李瑞轩,陈驰
  • 2017,28(9):2227-2228 [Abstract(1691)]  [View PDF(846)201.09 K]
  • Security Technology Based on ARM Virtualization Extension
  • LI Zhou-Jun, SHEN Dong, SU Xiao-Jing and MA Jin-Xin
  • 2017,28(9):2229-2247 [Abstract(1462)]  [View PDF(998)1.63 M]
  • Security Analysis for Android Applications Using Sensitive Path Identification
  • MIAO Xiao-Chuan, WANG Rui, XU Lei, ZHANG Wei-Feng and XU Bao-Wen
  • 2017,28(9):2248-2263 [Abstract(1470)]  [View PDF(1292)1.41 M]
  • Obfuscation Tool for Mobile Apps Based on Huffman and LZW Encoding
  • LI Cheng-Ze, YU Jian-Bo, ZHANG Miao, XU Guo-Ai and KONG Hao-Hao
  • 2017,28(9):2264-2280 [Abstract(1430)]  [View PDF(805)1.68 M]
  • Multi-Party Privacy-Preserving Record Linkage Approach
  • HAN Shu-Min, SHEN De-Rong, NIE Tie-Zheng, KOU Yue and YU Ge
  • 2017,28(9):2281-2292 [Abstract(1537)]  [View PDF(891)1.30 M]
  • Privacy Preserving Cluster Mining Method Based on Lattice
  • CUI Yi-HUI, SONG Wei, WANG Zhan-Bing, SHI Cheng-Liang and CHENG Fang-Quan
  • 2017,28(9):2293-2308 [Abstract(1533)]  [View PDF(1044)1.61 M]
  • Near-Optimal Differentially Private Mechanism for Linear Queries
  • WU Gen-Qiang, HE Ye-Ping and XIA Xian-Yao
  • 2017,28(9):2309-2322 [Abstract(1354)]  [View PDF(922)1.29 M]
  • Clustering-Anonymity Approach for Privacy Preservation of Graph Data-Publishing
  • JIANG Huo-Wen, ZHAN Qing-Hua, LIU Wen-Juan and MA Hai-Ying
  • 2017,28(9):2323-2333 [Abstract(1688)]  [View PDF(1023)1.05 M]
  • Access Control Mechanism for Classified and Graded Object Storage in Cloud Computing
  • YANG Teng-Fei, SHEN Pei-Song, TIAN Xue and FENG Rong-Quan
  • 2017,28(9):2334-2353 [Abstract(1535)]  [View PDF(1201)2.04 M]
  • Distributed Dynamic Trust Management Model Based on Trust Reliability
  • YOU Jing, SHANG-GUAN Jing-Lun, XU Shou-Kun, LI Qian-Mu and WANG Yin-Hai
  • 2017,28(9):2354-2369 [Abstract(1349)]  [View PDF(751)2.94 M]
  • DNS Surveillance on Backbone
  • ZHANG Wei-Wei, GONG Jian, LIU Shang-Dong and HU Xiao-Yan
  • 2017,28(9):2370-2387 [Abstract(1450)]  [View PDF(1002)2.47 M]
  • Taint Analysis Method Based on Offline Indices of Instruction Trace
  • MA Jin-Xin, LI Zhou-Jun, ZHANG Tao, SHEN Dong and ZHANG Zhang-Kai
  • 2017,28(9):2388-2401 [Abstract(1549)]  [View PDF(935)1.23 M]
  • Review Articles

  • Survey of Software Reliability Growth Model
  • ZHANG Ce, MENG Fan-Chao, KAO Yong-Gui, LÜ Wei-Gong, LIU Hong-Wei, WAN Kun, JIANG Jia-Nan, CUI Gang and LIU Zi-He
  • 2017,28(9):2402-2430 [Abstract(1764)]  [View PDF(746)4.87 M]
  • Review of Research in Automatic Keyword Extraction
  • ZHAO Jing-Sheng, ZHU Qiao-Ming, ZHOU Guo-Dong and ZHANG Li
  • 2017,28(9):2431-2449 [Abstract(2049)]  [View PDF(5091)1.70 M]
  • Survey on the Application and Design of Material Constitutive Model for Deformable Solid Simulation
  • ZHAO Jing, TANG Yong, LI Sheng, LIU Xue-Hui and WANG Guo-Ping
  • 2017,28(9):2502-2523 [Abstract(1268)]  [View PDF(969)2.37 M]