Volume 31,Issue 1,2020 Table of ContentsDownload Contents
Blockchain as a Service: Next Generation of Cloud ServicesZHU Yu-Jin, YAO Jian-Guo and GUAN Hai-BingPublished January 06, 2020 (19 pages)2020,31(1):1-19 [Abstract(7052)] [View PDF(9458)1.85 M]Defect Comprehension Research: Present, Problem and ProspectLI Xiao-Zhuo, HE Ye-Ping and MA Heng-TaiPublished January 06, 2020 (27 pages)2020,31(1):20-46 [Abstract(4214)] [View PDF(5573)2.36 M]Survey on Construction of Code Knowledge Graph and Intelligent Software DevelopmentWANG Fei, LIU Jing-Ping, LIU Bin, QIAN Tie-Yun, XIAO Yang-Hua and PENG Zhi-YongPublished January 06, 2020 (20 pages)2020,31(1):47-66 [Abstract(6435)] [View PDF(9930)1.88 M]Survey on Generating Adversarial ExamplesPAN Wen-Wen, WANG Xin-Yu, SONG Ming-Li and CHEN ChunPublished January 06, 2020 (15 pages)2020,31(1):67-81 [Abstract(5790)] [View PDF(10388)1.53 M]Overview on Mechanized Theorem ProvingJIANG Nan, LI Qing-An, WANG Lü-Meng, ZHANG Xiao-Tong and HE Yan-XiangPublished January 06, 2020 (31 pages)2020,31(1):82-112 [Abstract(5004)] [View PDF(8106)2.76 M]Survey on Cost-sensitive Learning MethodWAN Jian-Wu and YANG MingPublished January 06, 2020 (24 pages)2020,31(1):113-136 [Abstract(4247)] [View PDF(7592)2.21 M]Survey on Storage and Optimization Techniques of HDFSJIN Guo-Dong, BIAN Hao-Qiong, CHEN Yue-Guo and DU Xiao-YongPublished January 06, 2020 (25 pages)2020,31(1):137-161 [Abstract(5325)] [View PDF(6967)2.27 M]Real-time Interactive Analysis on Big DataYUAN Zhe, WEN Ji-Rong, WEI Zhe-Wei, LIU Jia-Jun, YAO Bin and ZHENG KaiPublished January 06, 2020 (21 pages)2020,31(1):162-182 [Abstract(4746)] [View PDF(6438)1.88 M]Research Development of Abnormal Traffic Detection in Software Defined NetworkingXU Yu-Hua and SUN Zhi-XinPublished January 06, 2020 (25 pages)2020,31(1):183-207 [Abstract(4457)] [View PDF(6410)2.28 M]Research on Blockchain-based Interdomain Security SolutionsCHEN Di, QIU Han, ZHU Jun-Hu and WANG Qing-XianPublished January 06, 2020 (20 pages)2020,31(1):208-227 [Abstract(6182)] [View PDF(8441)1.91 M]Categorization of Covert Channels and Its Application in Threat Restriction TechniquesWANG Chong, WANG Xiu-Li, Lü Yin-Run, ZHANG Chang-You, WU Jing-Zheng, GUAN Bei and WANG Yong-JiPublished January 06, 2020 (18 pages)2020,31(1):228-245 [Abstract(3647)] [View PDF(6094)1.66 M]