Volume 31,Issue 11,2020 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Optimized Density Peaks Clustering Algorithm Based on Dissimilarity Measure
  • DING Shi-Fei, XU Xiao, WANG Yan-Ru
  • Published November 06, 2020 (13 pages)
  • 2020,31(11):3321-3333 [Abstract(1778)]  [View PDF(2926)1.82 M]
  • Dynamic Gene Regulatory Network Evolution Analysis
  • LIU Zhong-Zhou, HU Wen-Bin, XU Ping-Hua, TANG Chuan-Hui, GAO Kuang, MA Fu-Ying, QIU Zhen-Yu
  • Published November 06, 2020 (17 pages)
  • 2020,31(11):3334-3350 [Abstract(1395)]  [View PDF(2473)1.93 M]
  • Application of PES Algorithm Based on Preferred Collaborative Strategy on Integer Programming
  • WANG Zhan-Zhan, HUANG Zhang-Can, HOU Gai, TANG He-Hua, LI He
  • Published November 06, 2020 (13 pages)
  • 2020,31(11):3351-3363 [Abstract(2011)]  [View PDF(3179)1.43 M]
  • Data-driven Modeling and Prediction of User Acceptance for Mobile Apps
  • LU Xuan, CHEN Zhen-Peng, LIU Xuan-Zhe, MEI Hong
  • Published November 06, 2020 (16 pages)
  • 2020,31(11):3364-3379 [Abstract(1496)]  [View PDF(2859)1.74 M]
  • System Dynamics Simulation Modeling of Software Requirements Change Management
  • KANG Yan-Ni, ZHANG Xuan, WANG Xu, LI Tong, TANG Zi-Qi, NIU Jia-Mei
  • Published November 06, 2020 (24 pages)
  • 2020,31(11):3380-3403 [Abstract(2210)]  [View PDF(3591)3.25 M]
  • Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTM
  • DUAN Xu, WU Jing-Zheng, LUO Tian-Yue, YANG Mu-Tian, WU Yan-Jun
  • Published November 06, 2020 (17 pages)
  • 2020,31(11):3404-3420 [Abstract(2074)]  [View PDF(6293)1.86 M]
  • Function-level Data Dependence Graph and Its Application in Static Vulnerability Analysis
  • CHEN Qian, CHENG Kai, ZHENG Yao-Wen, ZHU Hong-Song, SUN Li-Min
  • Published November 06, 2020 (15 pages)
  • 2020,31(11):3421-3435 [Abstract(1535)]  [View PDF(2803)1.63 M]
  • Malware Detection Method Based on Subgraph Similarity
  • WANG Jie, WANG Chang-Qing
  • Published November 06, 2020 (12 pages)
  • 2020,31(11):3436-3447 [Abstract(1297)]  [View PDF(2376)1.19 M]
  • Fault Localization Approach Using Term Frequency and Inverse Document Frequency
  • ZHANG Zhuo, LEI Yan, MAO Xiao-Guang, CHANG Xi, XUE Jian-Xin, XIONG Qing-Yu
  • Published November 06, 2020 (13 pages)
  • 2020,31(11):3448-3460 [Abstract(4231)]  [View PDF(3372)540.75 K]
  • Scenario-driven and Bottom-up Microservice Decomposition Method for Monolithic Systems
  • DING Dan, PENG Xin, GUO Xiao-Feng, ZHANG Jian, WU Yi-Jian
  • Published November 06, 2020 (20 pages)
  • 2020,31(11):3461-3480 [Abstract(2423)]  [View PDF(4297)1.25 M]
  • Local Community Discovery Approach Based on Fuzzy Similarity Relation
  • LIU Jing-Lian, WANG Da-Ling, FENG Shi, ZHANG Yi-Fei
  • Published November 06, 2020 (11 pages)
  • 2020,31(11):3481-3491 [Abstract(1230)]  [View PDF(2516)1.14 M]
  • Kernel Subspace Clustering Algorithm for Categorical Data
  • XU Kun-Peng, CHEN Li-Fei, SUN Hao-Jun, WANG Bei-Zhan
  • Published November 06, 2020 (14 pages)
  • 2020,31(11):3492-3505 [Abstract(1077)]  [View PDF(2600)1.67 M]
  • Multi-module TSK Fuzzy System Based on Training Space Reconstruction
  • ZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang, WANG Shi-Tong
  • Published November 06, 2020 (14 pages)
  • 2020,31(11):3506-3518 [Abstract(1045)]  [View PDF(2531)1.34 M]
  • Temporal Index and Query Based on Timing Partition
  • YANG Zuo-Xi, TANG Na, TANG Yong, PAN Ming-Ming, LI Ding-Ding, YE Xiao-Ping
  • Published November 06, 2020 (21 pages)
  • 2020,31(11):3519-3539 [Abstract(1170)]  [View PDF(2322)2.23 M]
  • Sampling-based Collection and Updating of Online Big Graph Data
  • YIN Zi-Du, YUE Kun, ZHANG Bin-Bin, LI Jin
  • Published November 06, 2020 (19 pages)
  • 2020,31(11):3540-3558 [Abstract(1477)]  [View PDF(2506)1.82 M]
  • Network Evolution Algorithm of Unmanned Aerial Vehicle Flocking Based on Two-hop Common Neighbor
  • YU Chong, SI Shuai-Zong, ZHAO Hai, ZHU Jian, SHAO Shi-Liang, LIU Jia-Liang
  • Published November 06, 2020 (12 pages)
  • 2020,31(11):3559-3570 [Abstract(1254)]  [View PDF(2497)1.30 M]
  • Graded Reversible Watermarking Scheme for Relational Data
  • HOU Rui-Tao, XIAN He-Qun, LI Jing, DI Guan-Dong
  • Published November 06, 2020 (17 pages)
  • 2020,31(11):3571-3587 [Abstract(1229)]  [View PDF(2491)1.71 M]
  • ROP Attack Detection Approach Based on Hardware Branch Information
  • LI Wei-Wei, MA Yue, WANG Jun-Jie, GAO Wei-Yi, YANG Qiu-Song, LI Ming-Shu
  • Published November 06, 2020 (15 pages)
  • 2020,31(11):3588-3602 [Abstract(1046)]  [View PDF(2493)1.83 M]
  • Optimized Block-matching Motion Estimation Using Adaptive Zoom Coefficient
  • SONG Chuan-Ming, YAN Xiao-Hong, GE Ming-Bo, WANG Xiang-Hai, YIN Bao-Cai
  • Published November 06, 2020 (18 pages)
  • 2020,31(11):3603-3620 [Abstract(1009)]  [View PDF(2191)1.79 M]
  • Feature Representation Method of Microscopic Sandstone Images Based on Convolutional Neural Network
  • LI Na, GU Qing, JIANG Feng, HAO Hui-Zhen, YU Hua, NI Chao
  • Published November 06, 2020 (19 pages)
  • 2020,31(11):3621-3639 [Abstract(1205)]  [View PDF(2408)2.15 M]
  • Weakly Supervised Image Semantic Segmentation Method Based on Object Location Cues
  • LI Yang, LIU Yang, LIU Guo-Jun, GUO Mao-Zu
  • Published November 06, 2020 (17 pages)
  • 2020,31(11):3640-3656 [Abstract(2474)]  [View PDF(4812)1.95 M]
  • Scheduling Algorithm for Mixed-criticality Jobs Based on Dynamical Demand Boundary
  • ZENG Li-Ning, XU Cheng, LI Ren-Fa, YANG Fan, XU Hong-Zhi
  • Published November 06, 2020 (14 pages)
  • 2020,31(11):3657-3670 [Abstract(1948)]  [View PDF(2856)1.44 M]