Volume 30,Issue 2,2019 Table of Contents

Other Issues:  
  
Contents

  • Fine-grained Software Bug Location Approach at Method Level
  • ZHANG Wen, LI ZI-Qiang, DU Yu-Hang and YANG Ye
  • 2019,30(2):195-210 [Abstract(2575)]  [View PDF(1492)1.88 M]
  • Multi-source Taint Analysis Technique for Privacy Leak Detection of Android Apps
  • WANG Lei, ZHOU Qing, HE Dong-Jie, LI Lian and FENG Xiao-Bing
  • 2019,30(2):211-230 [Abstract(2480)]  [View PDF(2239)2.36 M]
  • APTL Model Checker for Verifying Multi-agent Systems
  • WANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong
  • 2019,30(2):231-243 [Abstract(2161)]  [View PDF(1332)1.41 M]
  • Multi-view Fuzzy Clustering Approach Based on Medoid Invariant Constraint
  • ZHANG Yuan-Peng, ZHOU Jie, DENG Zhao-Hong, CHUNG Fu-Lai, JIANG Yi-Zhang, HANG Weng-Long and WANG Shi-Tong
  • 2019,30(2):282-301 [Abstract(1457)]  [View PDF(871)2.75 M]
  • Data Transmission for Joint Optimization of Flow Scheduling and Path Selection in VANETs
  • QIANG Min, CHEN Xiao-Jiang, YIN Xiao-Yan, JIA Ru-Zhao, XU Dan, TANG Zhan-Yong and FANG Ding-Yi
  • 2019,30(2):346-361 [Abstract(1177)]  [View PDF(1004)1.73 M]
  • Batch Provable Data Possession Scheme with Error Locating
  • PANG Xiao-Qiong, WANG Tian-Qi, CHEN Wen-Jun and REN Meng-Qi
  • 2019,30(2):362-380 [Abstract(1973)]  [View PDF(1033)2.00 M]
  • Hierarchical Name-based Route Aggregation Scheme
  • XU Zhi-Wei, CHEN Bo and ZHANG Yu-Jun
  • 2019,30(2):381-398 [Abstract(1854)]  [View PDF(1101)2.00 M]
  • Verifiable Computation Using Re-randomizable Garbled Circuits
  • ZHAO Qing-Song, ZENG Qing-Kai, LIU Xi-Meng and XU Huan-Liang
  • 2019,30(2):399-415 [Abstract(2624)]  [View PDF(1698)1.72 M]
  • Algorithm to Generate Adversarial Examples for Face-spoofing Detection
  • MA Yu-Kun, WU Li-Fang, JIAN Meng, LIU Fang-Hao and YANG Zhou
  • 2019,30(2):469-480 [Abstract(2905)]  [View PDF(2609)1.66 M]
  • Method for Graph-based Real-time Rule Scheduling in Multi-core Environment
  • WANG Juan-Juan, QIAO Ying, XIONG Jin-Quan and WANG Hong-An
  • 2019,30(2):481-494 [Abstract(2768)]  [View PDF(1491)1.62 M]
  • Review Articles

  • Automatic Program Repair: Key Problems and Technologies
  • LI Bin, HE Ye-Ping and MA Heng-Tai
  • 2019,30(2):244-265 [Abstract(1881)]  [View PDF(2484)2.11 M]
  • Effective Fault Localization Approach Based on Enhanced Contexts
  • ZHANG Zhuo, TAN Qing-Ping, MAO Xiao-Guang, LEI Yan, CHANG Xi and XUE Jian-Xin
  • 2019,30(2):266-281 [Abstract(1999)]  [View PDF(1309)2.08 M]
  • Survey on Internet End-to-end Multipath Transfer Research with Cross-layer Optimization
  • JIANG Zhuo, WU Qian, LI He-Wu and WU Jian-Ping
  • 2019,30(2):302-322 [Abstract(1624)]  [View PDF(1244)2.19 M]
  • Survey on Contact Graph Routing for Space Delay/Disruption Tolerant Networks
  • XU Shuang, WANG Xing-Wei, HUANG Min and ZHANG Lin-Lin
  • 2019,30(2):323-345 [Abstract(1595)]  [View PDF(1603)3.06 M]
  • Review of Visual Attention Detection
  • WANG Wen-Guan, SHEN Jian-Bing and JIA Yun-De
  • 2019,30(2):416-439 [Abstract(2118)]  [View PDF(3071)2.65 M]
  • Review of Image Semantic Segmentation Based on Deep Learning
  • TIAN Xuan, WANG Liang and DING Qi
  • 2019,30(2):440-468 [Abstract(3182)]  [View PDF(5148)3.27 M]