Volume 31,Issue 2,2020 Table of Contents

Other Issues:  
  
Contents

  • Attacking Web Browser: ROP Gadget Injection by Using JavaScript Code Blocks
  • YUAN Ping-Hai, ZENG Qing-Kai, ZHANG Yun-Jian and LIU Yao
  • 2020,31(2):247-265 [Abstract(723)]  [View PDF(392)1.84 M]
  • Domain Adaptation Approach for Cross-project Software Defect Prediction
  • CHEN Shu, YE Jun-Min and LIU Tong
  • 2020,31(2):266-281 [Abstract(591)]  [View PDF(470)1.55 M]
  • Integrating Preference in Many-objective Optimal Software Product Selection Algorithm
  • XIANG Yi, ZHOU Yu-Ren and CAI Shao-Wei
  • 2020,31(2):282-301 [Abstract(484)]  [View PDF(601)1.91 M]
  • Survey of Data Annotation
  • CAI Li, WANG Shu-Ting, LIU Jun-Hui and ZHU Yang-Yong
  • 2020,31(2):302-320 [Abstract(1920)]  [View PDF(2246)1.88 M]
  • Macro Discourse Structure Representation Schema and Corpus Construction
  • CHU Xiao-Min, XI Xue-Feng, JIANG Feng, XU Sheng, ZHU Qiao-Ming and ZHOU Guo-Dong
  • 2020,31(2):321-343 [Abstract(977)]  [View PDF(1029)2.01 M]
  • RDFS Schema Extracting Method Based on Analysis of Constraint Dependency
  • ZHAO Xiao-Fei, SHI Zhong-Zhi, TIAN Dong-Ping and LIU Jian-Wei
  • 2020,31(2):344-355 [Abstract(432)]  [View PDF(245)1.27 M]
  • Many-objective Evolutionary Algorithm Based on Decomposition and Coevolution
  • XIE Cheng-Wang, YU Wei-Wei, BI Ying-Zhou, WANG Shen-Wen and HU Yu-Rong
  • 2020,31(2):356-373 [Abstract(734)]  [View PDF(317)1.83 M]
  • Multidimensional Reputation Calculation Method Based on Feedback Reliability in MAS Environment
  • HUO Xing, ZHANG Yang-Yang, JING Yong-Jun and SHAO Kun
  • 2020,31(2):374-394 [Abstract(602)]  [View PDF(1069)2.18 M]
  • Model Counting Methods Based on Configuration Checking
  • HE Fu-Lin, LIU Lei, Lü Shuai, NIU Dang-Dang and WANG Qiang
  • 2020,31(2):395-405 [Abstract(465)]  [View PDF(215)1.06 M]
  • Aggregate Query Processing Algorithm on Incomplete Data Based on Denotational Semantics
  • ZHANG An-Zhen, LI Jian-Zhong and GAO Hong
  • 2020,31(2):406-420 [Abstract(1208)]  [View PDF(575)1.71 M]
  • Local Event Recommendation Algorithm Based on Collective Contextual Relation Learning
  • LAI Yi-An, ZHANG Yu-Jie, DU Yu-Lu and MENG Xiang-Wu
  • 2020,31(2):421-438 [Abstract(548)]  [View PDF(463)1.65 M]
  • Access Control Policy Specification Language Based on Metamodel
  • LUO Yang, SHEN Qing-Ni and WU Zhong-Hai
  • 2020,31(2):439-454 [Abstract(1585)]  [View PDF(760)1.47 M]
  • Verifiable Secure Data Deduplication Method in Cloud Storage
  • XIAN He-Qun, LIU Hong-Yan, ZHANG Shu-Guang and HOU Rui-Tao
  • 2020,31(2):455-470 [Abstract(506)]  [View PDF(463)1.75 M]
  • Location Privacy and Query Privacy Preserving Method for K-nearest Neighbor Query in Road Networks
  • ZHOU Chang-Li, CHEN Yong-Hong, TIAN Hui and CAI Shao-Bin
  • 2020,31(2):471-492 [Abstract(522)]  [View PDF(2019)2.45 M]
  • Semi-supervised KFDA Algorithm Based on Low Density Separation Geometry Distance
  • TAO Xin-Min, CHANG Rui, SHEN Wei, WANG Ruo-Tong and LI Chen-Xi
  • 2020,31(2):493-510 [Abstract(444)]  [View PDF(435)1.98 M]
  • Part-based Object Tracking Based on Multi Collaborative Model
  • LIU Ming-Hua, WANG Chuan-Sheng, HU Qiang, WANG Chuan-Xu and CUI Xue-Hong
  • 2020,31(2):511-530 [Abstract(1243)]  [View PDF(1161)2.27 M]
  • Image Hierarchical Classification Based on Semantic Label Generation and Partial Order Structure
  • GU Guang-Hua, CAO Yu-Yao, LI Gang and ZHAO Yao
  • 2020,31(2):531-543 [Abstract(658)]  [View PDF(425)1.49 M]
  • Microarchitectural Transient Execution Attacks and Defense Methods
  • WU Xiao-Hui, HE Ye-Ping, MA Heng-Tai, ZHOU Qi-Ming and LIN Shao-Feng
  • 2020,31(2):544-563 [Abstract(732)]  [View PDF(675)1.86 M]
  • Quantification Method for Heterogeneity on Web Server with Mimic Construction
  • ZHANG Jie-Xin, PANG Jian-Min and ZHANG Zheng
  • 2020,31(2):564-577 [Abstract(456)]  [View PDF(309)1.41 M]
  • Cloud Auditing Scheme with Dynamic Revocation of Users and Real-time Updates of Data
  • HAN Jing, LI Yan-Ping, YU Yong and DING Yong
  • 2020,31(2):578-596 [Abstract(510)]  [View PDF(589)2.07 M]