Volume 30,Issue 2,2019 Table of Contents
Fine-grained Software Bug Location Approach at Method LevelZHANG Wen, LI ZI-Qiang, DU Yu-Hang and YANG Ye2019,30(2):195-210 [Abstract(4035)] [View PDF(4232)1.88 M]Multi-source Taint Analysis Technique for Privacy Leak Detection of Android AppsWANG Lei, ZHOU Qing, HE Dong-Jie, LI Lian and FENG Xiao-Bing2019,30(2):211-230 [Abstract(3843)] [View PDF(6015)2.36 M]APTL Model Checker for Verifying Multi-agent SystemsWANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong2019,30(2):231-243 [Abstract(3416)] [View PDF(3524)1.41 M]Multi-view Fuzzy Clustering Approach Based on Medoid Invariant ConstraintZHANG Yuan-Peng, ZHOU Jie, DENG Zhao-Hong, CHUNG Fu-Lai, JIANG Yi-Zhang, HANG Weng-Long and WANG Shi-Tong2019,30(2):282-301 [Abstract(2743)] [View PDF(3391)2.75 M]Data Transmission for Joint Optimization of Flow Scheduling and Path Selection in VANETsQIANG Min, CHEN Xiao-Jiang, YIN Xiao-Yan, JIA Ru-Zhao, XU Dan, TANG Zhan-Yong and FANG Ding-Yi2019,30(2):346-361 [Abstract(2307)] [View PDF(3203)1.73 M]Batch Provable Data Possession Scheme with Error LocatingPANG Xiao-Qiong, WANG Tian-Qi, CHEN Wen-Jun and REN Meng-Qi2019,30(2):362-380 [Abstract(3138)] [View PDF(3396)2.00 M]Hierarchical Name-based Route Aggregation SchemeXU Zhi-Wei, CHEN Bo and ZHANG Yu-Jun2019,30(2):381-398 [Abstract(2969)] [View PDF(3355)2.00 M]Verifiable Computation Using Re-randomizable Garbled CircuitsZHAO Qing-Song, ZENG Qing-Kai, LIU Xi-Meng and XU Huan-Liang2019,30(2):399-415 [Abstract(3912)] [View PDF(4516)1.72 M]Algorithm to Generate Adversarial Examples for Face-spoofing DetectionMA Yu-Kun, WU Li-Fang, JIAN Meng, LIU Fang-Hao and YANG Zhou2019,30(2):469-480 [Abstract(4521)] [View PDF(5924)1.66 M]Method for Graph-based Real-time Rule Scheduling in Multi-core EnvironmentWANG Juan-Juan, QIAO Ying, XIONG Jin-Quan and WANG Hong-An2019,30(2):481-494 [Abstract(4036)] [View PDF(3920)1.62 M]
Automatic Program Repair: Key Problems and TechnologiesLI Bin, HE Ye-Ping and MA Heng-Tai2019,30(2):244-265 [Abstract(3936)] [View PDF(7787)2.11 M]Effective Fault Localization Approach Based on Enhanced ContextsZHANG Zhuo, TAN Qing-Ping, MAO Xiao-Guang, LEI Yan, CHANG Xi and XUE Jian-Xin2019,30(2):266-281 [Abstract(3893)] [View PDF(4794)2.08 M]Survey on Internet End-to-end Multipath Transfer Research with Cross-layer OptimizationJIANG Zhuo, WU Qian, LI He-Wu and WU Jian-Ping2019,30(2):302-322 [Abstract(3691)] [View PDF(5428)2.19 M]Survey on Contact Graph Routing for Space Delay/Disruption Tolerant NetworksXU Shuang, WANG Xing-Wei, HUANG Min and ZHANG Lin-Lin2019,30(2):323-345 [Abstract(3401)] [View PDF(6876)3.06 M]Review of Visual Attention DetectionWANG Wen-Guan, SHEN Jian-Bing and JIA Yun-De2019,30(2):416-439 [Abstract(4589)] [View PDF(12235)2.65 M]Review of Image Semantic Segmentation Based on Deep LearningTIAN Xuan, WANG Liang and DING Qi2019,30(2):440-468 [Abstract(7831)] [View PDF(17956)3.27 M]