Volume 31,Issue 5,2020 Table of Contents

Other Issues:  
  
Contents

  • Malicious Code Classification Method Based on Deep Forest
  • LU Xi-Dong, DUAN Zhe-Min, QIAN Ye-Kui, ZHOU Wei
  • 2020,31(5):1454-1464 [Abstract(149)]  [View PDF(64)1.36 M]
  • Multi-label Crowdsourcing Learning
  • LI Shao-Yuan, JIANG Yuan
  • 2020,31(5):1497-1510 [Abstract(139)]  [View PDF(770)1.46 M]
  • Enhancement and Extension of Feature Selection Using Forest Optimization Algorithm
  • LIU Zhao-Geng, LI Zhan-Shan, WANG Li, WANG Tao, YU Hai-Hong
  • 2020,31(5):1511-1524 [Abstract(144)]  [View PDF(47)1.44 M]
  • Laplacian Ladder Networks
  • HU Cong, WU Xiao-Jun, SHU Zhen-Qiu, CHEN Su-Gen
  • 2020,31(5):1525-1535 [Abstract(139)]  [View PDF(94)1.30 M]
  • Intra-domain Routing Protection Scheme Based on Minimum Intersection Paths
  • GENG Hai-Jun, SHI Xin-Gang, WANG Zhi-Liang, YIN Xia, HU Zhi-Guo
  • 2020,31(5):1536-1548 [Abstract(146)]  [View PDF(43)1.37 M]
  • Detection of LDoS Attacks Based on Wavelet Energy Entropy and Hidden Semi-Markov Models
  • WU Zhi-Jun, LI Hong-JUN, LIU Liang, ZHANG Jing-An, YUE Meng, LEI Jin
  • 2020,31(5):1549-1562 [Abstract(130)]  [View PDF(40)1.52 M]
  • Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption
  • SU Mang, WU Bin, FU An-Min, YU Yan, ZHANG Gong-Xuan
  • 2020,31(5):1563-1572 [Abstract(1043)]  [View PDF(728)1.17 M]
  • Contour-guided Hierarchically-fused Multi-task Fully Convolutional Network
  • HE Ke-Lei, SHI Ying-Huan, GAO Yang
  • 2020,31(5):1573-1584 [Abstract(425)]  [View PDF(411)1.47 M]
  • Special Issue's Articles

  • 系统软件构造与验证技术专题前言
  • 赵永望,刘杨,王戟
  • 2020,31(5):1241-1242 [Abstract(213)]  [View PDF(67)293.99 K]
  • Review Articles

  • Progress in Parallelization of Static Program Analysis
  • LU Shen-Ming, ZUO Zhi-Qiang, WANG Lin-Zhang
  • 2020,31(5):1243-1254 [Abstract(405)]  [View PDF(462)1.24 M]
  • Survey on Testing of Deep Neural Networks
  • WANG Zan, YAN Ming, LIU Shuang, CHEN Jun-Jie, ZHANG Dong-Di, WU Zhuo, CHEN Xiang
  • 2020,31(5):1255-1275 [Abstract(928)]  [View PDF(2589)1.97 M]
  • Special Issue's Articles

  • Data Flow Analysis for Sequential Storage Structures
  • WANG Shu-Dong, YIN Wen-Jing, DONG Yu-Kun, ZHANG Li, LIU Hao
  • 2020,31(5):1276-1293 [Abstract(417)]  [View PDF(458)1.67 M]
  • Empirical Studies on Deep-learning-based Security Bug Report Prediction Methods
  • ZHENG Wei, CHEN Jun-Zheng, WU Xiao-Xue, CHEN Xiang, XIA Xin
  • 2020,31(5):1294-1313 [Abstract(1111)]  [View PDF(275)2.09 M]
  • Parallel Test Case Generation Based on Front and Back End of Web Applications with Genetic Algorithm
  • WANG Wei-Wei, LI Yi-Chao, ZHAO Rui-Lian, LI Zheng
  • 2020,31(5):1314-1331 [Abstract(334)]  [View PDF(923)1.90 M]
  • Specifying and Verifying CRDT Protocols Using TLA+
  • JI Ye, WEI Heng-Feng, HUANG Yu, Lü Jian
  • 2020,31(5):1332-1352 [Abstract(317)]  [View PDF(209)1.96 M]
  • Automated Verification Framework for Mixed Code in Embedded Real Time Operating System Kernel
  • GUO Jian, DING Ji-Zheng, ZHU Xiao-Ran
  • 2020,31(5):1353-1373 [Abstract(328)]  [View PDF(581)1.98 M]
  • Safety Requirements Modeling and Automatic Verification for Zone Controllers
  • LIU Xiao-Shan, YUAN Zheng-Heng, CHEN Xiao-Hong, CHEN Ming-Song, LIU Jing, ZHOU Ting-Liang
  • 2020,31(5):1374-1391 [Abstract(338)]  [View PDF(553)1.79 M]
  • Design and Implementation of TPM/TCM with Active Trust Based on TEE
  • DONG Pan, DING Yan, JIANG Zhe, HUANG Chen-Lin, FAN Guan-Nan
  • 2020,31(5):1392-1405 [Abstract(362)]  [View PDF(502)1.63 M]
  • Review Articles

  • Survey of Research and Practices on Blockchain Privacy Protection
  • ZHANG Ao, BAI Xiao-Ying
  • 2020,31(5):1406-1434 [Abstract(961)]  [View PDF(849)3.18 M]
  • Survey of Intelligent Code Completion
  • YANG Bo, ZHANG Neng, LI Shan-Ping, XIA Xin
  • 2020,31(5):1435-1453 [Abstract(577)]  [View PDF(1654)2.06 M]
  • Review of Natural Scene Text Detection and Recognition Based on Deep Learning
  • WANG Jian-Xin, WANG Zi-Ya, TIAN Xuan
  • 2020,31(5):1465-1496 [Abstract(563)]  [View PDF(7309)3.90 M]