Volume 30,Issue 2,2019 Table of Contents

Other Issues:  
  
Contents

  • Fine-grained Software Bug Location Approach at Method Level
  • ZHANG Wen, LI ZI-Qiang, DU Yu-Hang and YANG Ye
  • 2019,30(2):195-210 [Abstract(4035)]  [View PDF(4232)1.88 M]
  • Multi-source Taint Analysis Technique for Privacy Leak Detection of Android Apps
  • WANG Lei, ZHOU Qing, HE Dong-Jie, LI Lian and FENG Xiao-Bing
  • 2019,30(2):211-230 [Abstract(3843)]  [View PDF(6015)2.36 M]
  • APTL Model Checker for Verifying Multi-agent Systems
  • WANG Hai-Yang, DUAN Zhen-Hua and TIAN Cong
  • 2019,30(2):231-243 [Abstract(3416)]  [View PDF(3524)1.41 M]
  • Multi-view Fuzzy Clustering Approach Based on Medoid Invariant Constraint
  • ZHANG Yuan-Peng, ZHOU Jie, DENG Zhao-Hong, CHUNG Fu-Lai, JIANG Yi-Zhang, HANG Weng-Long and WANG Shi-Tong
  • 2019,30(2):282-301 [Abstract(2743)]  [View PDF(3391)2.75 M]
  • Data Transmission for Joint Optimization of Flow Scheduling and Path Selection in VANETs
  • QIANG Min, CHEN Xiao-Jiang, YIN Xiao-Yan, JIA Ru-Zhao, XU Dan, TANG Zhan-Yong and FANG Ding-Yi
  • 2019,30(2):346-361 [Abstract(2307)]  [View PDF(3203)1.73 M]
  • Batch Provable Data Possession Scheme with Error Locating
  • PANG Xiao-Qiong, WANG Tian-Qi, CHEN Wen-Jun and REN Meng-Qi
  • 2019,30(2):362-380 [Abstract(3138)]  [View PDF(3396)2.00 M]
  • Hierarchical Name-based Route Aggregation Scheme
  • XU Zhi-Wei, CHEN Bo and ZHANG Yu-Jun
  • 2019,30(2):381-398 [Abstract(2969)]  [View PDF(3355)2.00 M]
  • Verifiable Computation Using Re-randomizable Garbled Circuits
  • ZHAO Qing-Song, ZENG Qing-Kai, LIU Xi-Meng and XU Huan-Liang
  • 2019,30(2):399-415 [Abstract(3912)]  [View PDF(4516)1.72 M]
  • Algorithm to Generate Adversarial Examples for Face-spoofing Detection
  • MA Yu-Kun, WU Li-Fang, JIAN Meng, LIU Fang-Hao and YANG Zhou
  • 2019,30(2):469-480 [Abstract(4521)]  [View PDF(5924)1.66 M]
  • Method for Graph-based Real-time Rule Scheduling in Multi-core Environment
  • WANG Juan-Juan, QIAO Ying, XIONG Jin-Quan and WANG Hong-An
  • 2019,30(2):481-494 [Abstract(4036)]  [View PDF(3920)1.62 M]
  • Review Articles

  • Automatic Program Repair: Key Problems and Technologies
  • LI Bin, HE Ye-Ping and MA Heng-Tai
  • 2019,30(2):244-265 [Abstract(3936)]  [View PDF(7787)2.11 M]
  • Effective Fault Localization Approach Based on Enhanced Contexts
  • ZHANG Zhuo, TAN Qing-Ping, MAO Xiao-Guang, LEI Yan, CHANG Xi and XUE Jian-Xin
  • 2019,30(2):266-281 [Abstract(3893)]  [View PDF(4794)2.08 M]
  • Survey on Internet End-to-end Multipath Transfer Research with Cross-layer Optimization
  • JIANG Zhuo, WU Qian, LI He-Wu and WU Jian-Ping
  • 2019,30(2):302-322 [Abstract(3691)]  [View PDF(5428)2.19 M]
  • Survey on Contact Graph Routing for Space Delay/Disruption Tolerant Networks
  • XU Shuang, WANG Xing-Wei, HUANG Min and ZHANG Lin-Lin
  • 2019,30(2):323-345 [Abstract(3401)]  [View PDF(6876)3.06 M]
  • Review of Visual Attention Detection
  • WANG Wen-Guan, SHEN Jian-Bing and JIA Yun-De
  • 2019,30(2):416-439 [Abstract(4589)]  [View PDF(12235)2.65 M]
  • Review of Image Semantic Segmentation Based on Deep Learning
  • TIAN Xuan, WANG Liang and DING Qi
  • 2019,30(2):440-468 [Abstract(7831)]  [View PDF(17956)3.27 M]