Volume 31,Issue 5,2020 Table of ContentsDownload Contents

Other Issues:  
  
Contents

  • Malicious Code Classification Method Based on Deep Forest
  • LU Xi-Dong, DUAN Zhe-Min, QIAN Ye-Kui, ZHOU Wei
  • Published May 06, 2020 (11 pages)
  • 2020,31(5):1454-1464 [Abstract(2086)]  [View PDF(3380)1.36 M]
  • Multi-label Crowdsourcing Learning
  • LI Shao-Yuan, JIANG Yuan
  • Published May 06, 2020 (14 pages)
  • 2020,31(5):1497-1510 [Abstract(1582)]  [View PDF(4281)1.46 M]
  • Enhancement and Extension of Feature Selection Using Forest Optimization Algorithm
  • LIU Zhao-Geng, LI Zhan-Shan, WANG Li, WANG Tao, YU Hai-Hong
  • Published May 06, 2020 (14 pages)
  • 2020,31(5):1511-1524 [Abstract(1697)]  [View PDF(3037)1.44 M]
  • Laplacian Ladder Networks
  • HU Cong, WU Xiao-Jun, SHU Zhen-Qiu, CHEN Su-Gen
  • Published May 06, 2020 (11 pages)
  • 2020,31(5):1525-1535 [Abstract(1710)]  [View PDF(2904)1.30 M]
  • Intra-domain Routing Protection Scheme Based on Minimum Intersection Paths
  • GENG Hai-Jun, SHI Xin-Gang, WANG Zhi-Liang, YIN Xia, HU Zhi-Guo
  • Published May 06, 2020 (13 pages)
  • 2020,31(5):1536-1548 [Abstract(1626)]  [View PDF(2249)1.37 M]
  • Detection of LDoS Attacks Based on Wavelet Energy Entropy and Hidden Semi-Markov Models
  • WU Zhi-Jun, LI Hong-JUN, LIU Liang, ZHANG Jing-An, YUE Meng, LEI Jin
  • Published May 06, 2020 (14 pages)
  • 2020,31(5):1549-1562 [Abstract(1820)]  [View PDF(2962)1.52 M]
  • Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption
  • SU Mang, WU Bin, FU An-Min, YU Yan, ZHANG Gong-Xuan
  • Published May 06, 2020 (10 pages)
  • 2020,31(5):1563-1572 [Abstract(2785)]  [View PDF(3643)1.17 M]
  • Contour-guided Hierarchically-fused Multi-task Fully Convolutional Network
  • HE Ke-Lei, SHI Ying-Huan, GAO Yang
  • Published May 06, 2020 (12 pages)
  • 2020,31(5):1573-1584 [Abstract(2128)]  [View PDF(3203)1.47 M]
  • Special Issue's Articles

  • 系统软件构造与验证技术专题前言
  • 赵永望,刘杨,王戟
  • Published May 06, 2020 (2 pages)
  • 2020,31(5):1241-1242 [Abstract(1979)]  [View PDF(2852)293.99 K]
  • Review Articles

  • Progress in Parallelization of Static Program Analysis
  • LU Shen-Ming, ZUO Zhi-Qiang, WANG Lin-Zhang
  • Published May 06, 2020 (12 pages)
  • 2020,31(5):1243-1254 [Abstract(3088)]  [View PDF(5310)1.24 M]
  • Survey on Testing of Deep Neural Networks
  • WANG Zan, YAN Ming, LIU Shuang, CHEN Jun-Jie, ZHANG Dong-Di, WU Zhuo, CHEN Xiang
  • Published May 06, 2020 (21 pages)
  • 2020,31(5):1255-1275 [Abstract(5227)]  [View PDF(13601)1.97 M]
  • Special Issue's Articles

  • Data Flow Analysis for Sequential Storage Structures
  • WANG Shu-Dong, YIN Wen-Jing, DONG Yu-Kun, ZHANG Li, LIU Hao
  • Published May 06, 2020 (18 pages)
  • 2020,31(5):1276-1293 [Abstract(2470)]  [View PDF(4017)1.67 M]
  • Empirical Studies on Deep-learning-based Security Bug Report Prediction Methods
  • ZHENG Wei, CHEN Jun-Zheng, WU Xiao-Xue, CHEN Xiang, XIA Xin
  • Published May 06, 2020 (20 pages)
  • 2020,31(5):1294-1313 [Abstract(4460)]  [View PDF(4732)2.09 M]
  • Parallel Test Case Generation Based on Front and Back End of Web Applications with Genetic Algorithm
  • WANG Wei-Wei, LI Yi-Chao, ZHAO Rui-Lian, LI Zheng
  • Published May 06, 2020 (18 pages)
  • 2020,31(5):1314-1331 [Abstract(2891)]  [View PDF(4665)1.90 M]
  • Specifying and Verifying CRDT Protocols Using TLA+
  • JI Ye, WEI Heng-Feng, HUANG Yu, Lü Jian
  • Published May 06, 2020 (21 pages)
  • 2020,31(5):1332-1352 [Abstract(2533)]  [View PDF(4061)1.96 M]
  • Automated Verification Framework for Mixed Code in Embedded Real Time Operating System Kernel
  • GUO Jian, DING Ji-Zheng, ZHU Xiao-Ran
  • Published May 06, 2020 (21 pages)
  • 2020,31(5):1353-1373 [Abstract(2433)]  [View PDF(4566)1.98 M]
  • Safety Requirements Modeling and Automatic Verification for Zone Controllers
  • LIU Xiao-Shan, YUAN Zheng-Heng, CHEN Xiao-Hong, CHEN Ming-Song, LIU Jing, ZHOU Ting-Liang
  • Published May 06, 2020 (18 pages)
  • 2020,31(5):1374-1391 [Abstract(2398)]  [View PDF(4310)1.79 M]
  • Design and Implementation of TPM/TCM with Active Trust Based on TEE
  • DONG Pan, DING Yan, JIANG Zhe, HUANG Chen-Lin, FAN Guan-Nan
  • Published May 06, 2020 (14 pages)
  • 2020,31(5):1392-1405 [Abstract(2950)]  [View PDF(6698)1.63 M]
  • Review Articles

  • Survey of Research and Practices on Blockchain Privacy Protection
  • ZHANG Ao, BAI Xiao-Ying
  • Published May 06, 2020 (29 pages)
  • 2020,31(5):1406-1434 [Abstract(5921)]  [View PDF(8988)3.18 M]
  • Survey of Intelligent Code Completion
  • YANG Bo, ZHANG Neng, LI Shan-Ping, XIA Xin
  • Published May 06, 2020 (19 pages)
  • 2020,31(5):1435-1453 [Abstract(4190)]  [View PDF(7153)2.06 M]
  • Review of Natural Scene Text Detection and Recognition Based on Deep Learning
  • WANG Jian-Xin, WANG Zi-Ya, TIAN Xuan
  • Published May 06, 2020 (32 pages)
  • 2020,31(5):1465-1496 [Abstract(4136)]  [View PDF(16002)3.90 M]