Volume 31,Issue 11,2020 Table of Contents

Other Issues:  
  
Contents

  • Optimized Density Peaks Clustering Algorithm Based on Dissimilarity Measure
  • DING Shi-Fei, XU Xiao, WANG Yan-Ru
  • 2020,31(11):3321-3333 [Abstract(169)]  [View PDF(115)1.82 M]
  • Dynamic Gene Regulatory Network Evolution Analysis
  • LIU Zhong-Zhou, HU Wen-Bin, XU Ping-Hua, TANG Chuan-Hui, GAO Kuang, MA Fu-Ying, QIU Zhen-Yu
  • 2020,31(11):3334-3350 [Abstract(82)]  [View PDF(65)1.93 M]
  • Application of PES Algorithm Based on Preferred Collaborative Strategy on Integer Programming
  • WANG Zhan-Zhan, HUANG Zhang-Can, HOU Gai, TANG He-Hua, LI He
  • 2020,31(11):3351-3363 [Abstract(810)]  [View PDF(744)1.43 M]
  • Data-driven Modeling and Prediction of User Acceptance for Mobile Apps
  • LU Xuan, CHEN Zhen-Peng, LIU Xuan-Zhe, MEI Hong
  • 2020,31(11):3364-3379 [Abstract(277)]  [View PDF(240)1.74 M]
  • System Dynamics Simulation Modeling of Software Requirements Change Management
  • KANG Yan-Ni, ZHANG Xuan, WANG Xu, LI Tong, TANG Zi-Qi, NIU Jia-Mei
  • 2020,31(11):3380-3403 [Abstract(867)]  [View PDF(817)3.25 M]
  • Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTM
  • DUAN Xu, WU Jing-Zheng, LUO Tian-Yue, YANG Mu-Tian, WU Yan-Jun
  • 2020,31(11):3404-3420 [Abstract(122)]  [View PDF(244)1.86 M]
  • Function-level Data Dependence Graph and Its Application in Static Vulnerability Analysis
  • CHEN Qian, CHENG Kai, ZHENG Yao-Wen, ZHU Hong-Song, SUN Li-Min
  • 2020,31(11):3421-3435 [Abstract(90)]  [View PDF(83)1.63 M]
  • Malware Detection Method Based on Subgraph Similarity
  • WANG Jie, WANG Chang-Qing
  • 2020,31(11):3436-3447 [Abstract(77)]  [View PDF(80)1.19 M]
  • Fault Localization Approach Using Term Frequency and Inverse Document Frequency
  • ZHANG Zhuo, LEI Yan, MAO Xiao-Guang, CHANG Xi, XUE Jian-Xin, XIONG Qing-Yu
  • 2020,31(11):3448-3460 [Abstract(2984)]  [View PDF(920)1.53 M]
  • Scenario-driven and Bottom-up Microservice Decomposition Method for Monolithic Systems
  • DING Dan, PENG Xin, GUO Xiao-Feng, ZHANG Jian, WU Yi-Jian
  • 2020,31(11):3461-3480 [Abstract(783)]  [View PDF(976)3.17 M]
  • Local Community Discovery Approach Based on Fuzzy Similarity Relation
  • LIU Jing-Lian, WANG Da-Ling, FENG Shi, ZHANG Yi-Fei
  • 2020,31(11):3481-3491 [Abstract(67)]  [View PDF(80)1.14 M]
  • Kernel Subspace Clustering Algorithm for Categorical Data
  • XU Kun-Peng, CHEN Li-Fei, SUN Hao-Jun, WANG Bei-Zhan
  • 2020,31(11):3492-3505 [Abstract(69)]  [View PDF(91)1.67 M]
  • Multi-module TSK Fuzzy System Based on Training Space Reconstruction
  • ZHOU Ta, DENG Zhao-Hong, JIANG Yi-Zhang, WANG Shi-Tong
  • 2020,31(11):3506-3518 [Abstract(48)]  [View PDF(41)1.34 M]
  • Temporal Index and Query Based on Timing Partition
  • YANG Zuo-Xi, TANG Na, TANG Yong, PAN Ming-Ming, LI Ding-Ding, YE Xiao-Ping
  • 2020,31(11):3519-3539 [Abstract(64)]  [View PDF(78)2.23 M]
  • Sampling-based Collection and Updating of Online Big Graph Data
  • YIN Zi-Du, YUE Kun, ZHANG Bin-Bin, LI Jin
  • 2020,31(11):3540-3558 [Abstract(190)]  [View PDF(98)1.82 M]
  • Network Evolution Algorithm of Unmanned Aerial Vehicle Flocking Based on Two-hop Common Neighbor
  • YU Chong, SI Shuai-Zong, ZHAO Hai, ZHU Jian, SHAO Shi-Liang, LIU Jia-Liang
  • 2020,31(11):3559-3570 [Abstract(70)]  [View PDF(73)1.30 M]
  • Graded Reversible Watermarking Scheme for Relational Data
  • HOU Rui-Tao, XIAN He-Qun, LI Jing, DI Guan-Dong
  • 2020,31(11):3571-3587 [Abstract(70)]  [View PDF(58)1.71 M]
  • ROP Attack Detection Approach Based on Hardware Branch Information
  • LI Wei-Wei, MA Yue, WANG Jun-Jie, GAO Wei-Yi, YANG Qiu-Song, LI Ming-Shu
  • 2020,31(11):3588-3602 [Abstract(56)]  [View PDF(45)1.83 M]
  • Optimized Block-matching Motion Estimation Using Adaptive Zoom Coefficient
  • SONG Chuan-Ming, YAN Xiao-Hong, GE Ming-Bo, WANG Xiang-Hai, YIN Bao-Cai
  • 2020,31(11):3603-3620 [Abstract(54)]  [View PDF(53)1.79 M]
  • Feature Representation Method of Microscopic Sandstone Images Based on Convolutional Neural Network
  • LI Na, GU Qing, JIANG Feng, HAO Hui-Zhen, YU Hua, NI Chao
  • 2020,31(11):3621-3639 [Abstract(67)]  [View PDF(63)2.15 M]
  • Weakly Supervised Image Semantic Segmentation Method Based on Object Location Cues
  • LI Yang, LIU Yang, LIU Guo-Jun, GUO Mao-Zu
  • 2020,31(11):3640-3656 [Abstract(949)]  [View PDF(1617)1.95 M]
  • Scheduling Algorithm for Mixed-criticality Jobs Based on Dynamical Demand Boundary
  • ZENG Li-Ning, XU Cheng, LI Ren-Fa, YANG Fan, XU Hong-Zhi
  • 2020,31(11):3657-3670 [Abstract(737)]  [View PDF(470)1.44 M]