Volume 31,Issue 1,2020 Table of ContentsDownload Contents

Other Issues:  
  
Review Articles

  • Blockchain as a Service: Next Generation of Cloud Services
  • ZHU Yu-Jin, YAO Jian-Guo and GUAN Hai-Bing
  • Published January 06, 2020 (19 pages)
  • 2020,31(1):1-19 [Abstract(7052)]  [View PDF(9458)1.85 M]
  • Defect Comprehension Research: Present, Problem and Prospect
  • LI Xiao-Zhuo, HE Ye-Ping and MA Heng-Tai
  • Published January 06, 2020 (27 pages)
  • 2020,31(1):20-46 [Abstract(4214)]  [View PDF(5573)2.36 M]
  • Survey on Construction of Code Knowledge Graph and Intelligent Software Development
  • WANG Fei, LIU Jing-Ping, LIU Bin, QIAN Tie-Yun, XIAO Yang-Hua and PENG Zhi-Yong
  • Published January 06, 2020 (20 pages)
  • 2020,31(1):47-66 [Abstract(6435)]  [View PDF(9930)1.88 M]
  • Survey on Generating Adversarial Examples
  • PAN Wen-Wen, WANG Xin-Yu, SONG Ming-Li and CHEN Chun
  • Published January 06, 2020 (15 pages)
  • 2020,31(1):67-81 [Abstract(5790)]  [View PDF(10388)1.53 M]
  • Overview on Mechanized Theorem Proving
  • JIANG Nan, LI Qing-An, WANG Lü-Meng, ZHANG Xiao-Tong and HE Yan-Xiang
  • Published January 06, 2020 (31 pages)
  • 2020,31(1):82-112 [Abstract(5004)]  [View PDF(8106)2.76 M]
  • Survey on Cost-sensitive Learning Method
  • WAN Jian-Wu and YANG Ming
  • Published January 06, 2020 (24 pages)
  • 2020,31(1):113-136 [Abstract(4247)]  [View PDF(7592)2.21 M]
  • Survey on Storage and Optimization Techniques of HDFS
  • JIN Guo-Dong, BIAN Hao-Qiong, CHEN Yue-Guo and DU Xiao-Yong
  • Published January 06, 2020 (25 pages)
  • 2020,31(1):137-161 [Abstract(5325)]  [View PDF(6967)2.27 M]
  • Real-time Interactive Analysis on Big Data
  • YUAN Zhe, WEN Ji-Rong, WEI Zhe-Wei, LIU Jia-Jun, YAO Bin and ZHENG Kai
  • Published January 06, 2020 (21 pages)
  • 2020,31(1):162-182 [Abstract(4746)]  [View PDF(6438)1.88 M]
  • Research Development of Abnormal Traffic Detection in Software Defined Networking
  • XU Yu-Hua and SUN Zhi-Xin
  • Published January 06, 2020 (25 pages)
  • 2020,31(1):183-207 [Abstract(4457)]  [View PDF(6410)2.28 M]
  • Research on Blockchain-based Interdomain Security Solutions
  • CHEN Di, QIU Han, ZHU Jun-Hu and WANG Qing-Xian
  • Published January 06, 2020 (20 pages)
  • 2020,31(1):208-227 [Abstract(6182)]  [View PDF(8441)1.91 M]
  • Categorization of Covert Channels and Its Application in Threat Restriction Techniques
  • WANG Chong, WANG Xiu-Li, Lü Yin-Run, ZHANG Chang-You, WU Jing-Zheng, GUAN Bei and WANG Yong-Ji
  • Published January 06, 2020 (18 pages)
  • 2020,31(1):228-245 [Abstract(3647)]  [View PDF(6094)1.66 M]