Volume 31,Issue 11,2020 Table of ContentsDownload Contents
Optimized Density Peaks Clustering Algorithm Based on Dissimilarity MeasureDING Shi-Fei, XU Xiao, WANG Yan-RuPublished November 06, 2020 (13 pages)2020,31(11):3321-3333 [Abstract(1778)] [View PDF(2926)1.82 M]Dynamic Gene Regulatory Network Evolution AnalysisLIU Zhong-Zhou, HU Wen-Bin, XU Ping-Hua, TANG Chuan-Hui, GAO Kuang, MA Fu-Ying, QIU Zhen-YuPublished November 06, 2020 (17 pages)2020,31(11):3334-3350 [Abstract(1395)] [View PDF(2473)1.93 M]Application of PES Algorithm Based on Preferred Collaborative Strategy on Integer ProgrammingWANG Zhan-Zhan, HUANG Zhang-Can, HOU Gai, TANG He-Hua, LI HePublished November 06, 2020 (13 pages)2020,31(11):3351-3363 [Abstract(2011)] [View PDF(3179)1.43 M]Data-driven Modeling and Prediction of User Acceptance for Mobile AppsLU Xuan, CHEN Zhen-Peng, LIU Xuan-Zhe, MEI HongPublished November 06, 2020 (16 pages)2020,31(11):3364-3379 [Abstract(1496)] [View PDF(2859)1.74 M]System Dynamics Simulation Modeling of Software Requirements Change ManagementKANG Yan-Ni, ZHANG Xuan, WANG Xu, LI Tong, TANG Zi-Qi, NIU Jia-MeiPublished November 06, 2020 (24 pages)2020,31(11):3380-3403 [Abstract(2210)] [View PDF(3591)3.25 M]Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTMDUAN Xu, WU Jing-Zheng, LUO Tian-Yue, YANG Mu-Tian, WU Yan-JunPublished November 06, 2020 (17 pages)2020,31(11):3404-3420 [Abstract(2074)] [View PDF(6293)1.86 M]Function-level Data Dependence Graph and Its Application in Static Vulnerability AnalysisCHEN Qian, CHENG Kai, ZHENG Yao-Wen, ZHU Hong-Song, SUN Li-MinPublished November 06, 2020 (15 pages)2020,31(11):3421-3435 [Abstract(1535)] [View PDF(2803)1.63 M]Malware Detection Method Based on Subgraph SimilarityWANG Jie, WANG Chang-QingPublished November 06, 2020 (12 pages)2020,31(11):3436-3447 [Abstract(1297)] [View PDF(2376)1.19 M]Fault Localization Approach Using Term Frequency and Inverse Document FrequencyZHANG Zhuo, LEI Yan, MAO Xiao-Guang, CHANG Xi, XUE Jian-Xin, XIONG Qing-YuPublished November 06, 2020 (13 pages)2020,31(11):3448-3460 [Abstract(4231)] [View PDF(3372)540.75 K]Scenario-driven and Bottom-up Microservice Decomposition Method for Monolithic SystemsDING Dan, PENG Xin, GUO Xiao-Feng, ZHANG Jian, WU Yi-JianPublished November 06, 2020 (20 pages)2020,31(11):3461-3480 [Abstract(2423)] [View PDF(4297)1.25 M]Local Community Discovery Approach Based on Fuzzy Similarity RelationLIU Jing-Lian, WANG Da-Ling, FENG Shi, ZHANG Yi-FeiPublished November 06, 2020 (11 pages)2020,31(11):3481-3491 [Abstract(1230)] [View PDF(2516)1.14 M]Kernel Subspace Clustering Algorithm for Categorical DataXU Kun-Peng, CHEN Li-Fei, SUN Hao-Jun, WANG Bei-ZhanPublished November 06, 2020 (14 pages)2020,31(11):3492-3505 [Abstract(1077)] [View PDF(2600)1.67 M]Multi-module TSK Fuzzy System Based on Training Space ReconstructionZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang, WANG Shi-TongPublished November 06, 2020 (14 pages)2020,31(11):3506-3518 [Abstract(1045)] [View PDF(2531)1.34 M]Temporal Index and Query Based on Timing PartitionYANG Zuo-Xi, TANG Na, TANG Yong, PAN Ming-Ming, LI Ding-Ding, YE Xiao-PingPublished November 06, 2020 (21 pages)2020,31(11):3519-3539 [Abstract(1170)] [View PDF(2322)2.23 M]Sampling-based Collection and Updating of Online Big Graph DataYIN Zi-Du, YUE Kun, ZHANG Bin-Bin, LI JinPublished November 06, 2020 (19 pages)2020,31(11):3540-3558 [Abstract(1477)] [View PDF(2506)1.82 M]Network Evolution Algorithm of Unmanned Aerial Vehicle Flocking Based on Two-hop Common NeighborYU Chong, SI Shuai-Zong, ZHAO Hai, ZHU Jian, SHAO Shi-Liang, LIU Jia-LiangPublished November 06, 2020 (12 pages)2020,31(11):3559-3570 [Abstract(1254)] [View PDF(2497)1.30 M]Graded Reversible Watermarking Scheme for Relational DataHOU Rui-Tao, XIAN He-Qun, LI Jing, DI Guan-DongPublished November 06, 2020 (17 pages)2020,31(11):3571-3587 [Abstract(1229)] [View PDF(2491)1.71 M]ROP Attack Detection Approach Based on Hardware Branch InformationLI Wei-Wei, MA Yue, WANG Jun-Jie, GAO Wei-Yi, YANG Qiu-Song, LI Ming-ShuPublished November 06, 2020 (15 pages)2020,31(11):3588-3602 [Abstract(1046)] [View PDF(2493)1.83 M]Optimized Block-matching Motion Estimation Using Adaptive Zoom CoefficientSONG Chuan-Ming, YAN Xiao-Hong, GE Ming-Bo, WANG Xiang-Hai, YIN Bao-CaiPublished November 06, 2020 (18 pages)2020,31(11):3603-3620 [Abstract(1009)] [View PDF(2191)1.79 M]Feature Representation Method of Microscopic Sandstone Images Based on Convolutional Neural NetworkLI Na, GU Qing, JIANG Feng, HAO Hui-Zhen, YU Hua, NI ChaoPublished November 06, 2020 (19 pages)2020,31(11):3621-3639 [Abstract(1205)] [View PDF(2408)2.15 M]Weakly Supervised Image Semantic Segmentation Method Based on Object Location CuesLI Yang, LIU Yang, LIU Guo-Jun, GUO Mao-ZuPublished November 06, 2020 (17 pages)2020,31(11):3640-3656 [Abstract(2474)] [View PDF(4812)1.95 M]Scheduling Algorithm for Mixed-criticality Jobs Based on Dynamical Demand BoundaryZENG Li-Ning, XU Cheng, LI Ren-Fa, YANG Fan, XU Hong-ZhiPublished November 06, 2020 (14 pages)2020,31(11):3657-3670 [Abstract(1948)] [View PDF(2856)1.44 M]