Volume 31,Issue 2,2020 Table of Contents

Other Issues:  
  
Contents

  • Attacking Web Browser: ROP Gadget Injection by Using JavaScript Code Blocks
  • YUAN Ping-Hai, ZENG Qing-Kai, ZHANG Yun-Jian and LIU Yao
  • 2020,31(2):247-265 [Abstract(103)]  [View PDF(79)1.84 M]
  • Domain Adaptation Approach for Cross-project Software Defect Prediction
  • CHEN Shu, YE Jun-Min and LIU Tong
  • 2020,31(2):266-281 [Abstract(79)]  [View PDF(102)1.55 M]
  • Integrating Preference in Many-objective Optimal Software Product Selection Algorithm
  • XIANG Yi, ZHOU Yu-Ren and CAI Shao-Wei
  • 2020,31(2):282-301 [Abstract(74)]  [View PDF(81)1.91 M]
  • Survey of Data Annotation
  • CAI Li, WANG Shu-Ting, LIU Jun-Hui and ZHU Yang-Yong
  • 2020,31(2):302-320 [Abstract(1143)]  [View PDF(960)1.88 M]
  • Macro Discourse Structure Representation Schema and Corpus Construction
  • CHU Xiao-Min, XI Xue-Feng, JIANG Feng, XU Sheng, ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2020,31(2):321-343 [Abstract(488)]  [View PDF(316)2.01 M]
  • RDFS Schema Extracting Method Based on Analysis of Constraint Dependency
  • ZHAO Xiao-Fei, SHI Zhong-Zhi, TIAN Dong-Ping and LIU Jian-Wei
  • 2020,31(2):344-355 [Abstract(61)]  [View PDF(62)1.27 M]
  • Many-objective Evolutionary Algorithm Based on Decomposition and Coevolution
  • XIE Cheng-Wang, YU Wei-Wei, BI Ying-Zhou, WANG Shen-Wen and HU Yu-Rong
  • 2020,31(2):356-373 [Abstract(165)]  [View PDF(87)1.83 M]
  • Multidimensional Reputation Calculation Method Based on Feedback Reliability in MAS Environment
  • HUO Xing, ZHANG Yang-Yang, JING Yong-Jun and SHAO Kun
  • 2020,31(2):374-394 [Abstract(131)]  [View PDF(62)2.18 M]
  • Model Counting Methods Based on Configuration Checking
  • HE Fu-Lin, LIU Lei, Lü Shuai, NIU Dang-Dang and WANG Qiang
  • 2020,31(2):395-405 [Abstract(79)]  [View PDF(68)1.06 M]
  • Aggregate Query Processing Algorithm on Incomplete Data Based on Denotational Semantics
  • ZHANG An-Zhen, LI Jian-Zhong and GAO Hong
  • 2020,31(2):406-420 [Abstract(697)]  [View PDF(350)1.71 M]
  • Local Event Recommendation Algorithm Based on Collective Contextual Relation Learning
  • LAI Yi-An, ZHANG Yu-Jie, DU Yu-Lu and MENG Xiang-Wu
  • 2020,31(2):421-438 [Abstract(108)]  [View PDF(107)1.65 M]
  • Access Control Policy Specification Language Based on Metamodel
  • LUO Yang, SHEN Qing-Ni and WU Zhong-Hai
  • 2020,31(2):439-454 [Abstract(395)]  [View PDF(227)1.47 M]
  • Verifiable Secure Data Deduplication Method in Cloud Storage
  • XIAN He-Qun, LIU Hong-Yan, ZHANG Shu-Guang and HOU Rui-Tao
  • 2020,31(2):455-470 [Abstract(65)]  [View PDF(82)1.75 M]
  • Location Privacy and Query Privacy Preserving Method for K-nearest Neighbor Query in Road Networks
  • ZHOU Chang-Li, CHEN Yong-Hong, TIAN Hui and CAI Shao-Bin
  • 2020,31(2):471-492 [Abstract(82)]  [View PDF(103)2.45 M]
  • Semi-supervised KFDA Algorithm Based on Low Density Separation Geometry Distance
  • TAO Xin-Min, CHANG Rui, SHEN Wei, WANG Ruo-Tong and LI Chen-Xi
  • 2020,31(2):493-510 [Abstract(59)]  [View PDF(60)1.98 M]
  • Part-based Object Tracking Based on Multi Collaborative Model
  • LIU Ming-Hua, WANG Chuan-Sheng, HU Qiang, WANG Chuan-Xu and CUI Xue-Hong
  • 2020,31(2):511-530 [Abstract(707)]  [View PDF(486)2.27 M]
  • Image Hierarchical Classification Based on Semantic Label Generation and Partial Order Structure
  • GU Guang-Hua, CAO Yu-Yao, LI Gang and ZHAO Yao
  • 2020,31(2):531-543 [Abstract(171)]  [View PDF(66)1.49 M]
  • Microarchitectural Transient Execution Attacks and Defense Methods
  • WU Xiao-Hui, HE Ye-Ping, MA Heng-Tai, ZHOU Qi-Ming and LIN Shao-Feng
  • 2020,31(2):544-563 [Abstract(175)]  [View PDF(154)1.86 M]
  • Quantification Method for Heterogeneity on Web Server with Mimic Construction
  • ZHANG Jie-Xin, PANG Jian-Min and ZHANG Zheng
  • 2020,31(2):564-577 [Abstract(61)]  [View PDF(73)1.41 M]
  • Cloud Auditing Scheme with Dynamic Revocation of Users and Real-time Updates of Data
  • HAN Jing, LI Yan-Ping, YU Yong and DING Yong
  • 2020,31(2):578-596 [Abstract(79)]  [View PDF(82)2.07 M]