Article Search
    Search by issue
    Select AllDeselectExport
    Display Method:
    2026,37(5):1887-1902, DOI: 10.13328/j.cnki.jos.007542, CSTR: 32375.14.jos.007542
    [Abstract] (949) [HTML] (24) [PDF 2.71 M] (895)
    Abstract:
    Symbolic music understanding (SMU) is a crucial task in multimedia content understanding, aiming to extract multi-dimensional musical attributes such as melody, dynamics, compositional style, emotion, and genre from symbolic representations. Although existing approaches have substantially advanced dependency modeling in musical sequences, two critical challenges remain: (1) Simplified representation: Current methods typically flatten complex musical structures into linear symbolic sequences, overlooking the inherent multi-dimensional hierarchical information; (2) Lack of music-theory integration: Purely data-driven sequence models struggle to incorporate structured music-theory knowledge, limiting deep semantic understanding of music. To address these issues, this study proposes CNN-Midiformer, a high-precision symbolic music understanding model that integrates structured representations of musical knowledge. First, the model constructs structured representations for music theory and musical sequences based on domain knowledge. Second, a complementary music-feature extraction module is devised to employ convolutional neural networks (CNN) for capturing deep local features from structured musical-knowledge representations, while a Transformer encoder with self-attention captures deep semantic features from musical sequences. Finally, a music-knowledge adaptive-enhancement feature-fusion module dynamically integrates the deep musical-knowledge features extracted by CNN with the deep semantic features of the Transformer via an efficient cross-attention mechanism, thus enhancing contextual sequence understanding and representation learning. Comparative experiments conducted on six public symbolic-music datasets (Pop1K7, ASAP, POP909, Pianist8, EMOPIA, and ADL) demonstrate that CNN-Midiformer surpasses state-of-the-art methods across five benchmark downstream tasks: melody recognition, dynamics prediction, composer classification, emotion classification, and genre classification, achieving a precision gain of 0.21–7.14 percentage points over baseline models.
    2026,37(5):1903-1918, DOI: 10.13328/j.cnki.jos.007541, CSTR: 32375.14.jos.007541
    [Abstract] (1026) [HTML] (23) [PDF 1.83 M] (966)
    Abstract:
    The demand for multi-speaker speech transcription and speaker attribution in applications such as meeting minutes and customer service quality inspection is increasing. Recent advances in multimodal large language models have given rise to audio-language models (ALMs) that can simultaneously interpret audio signals and natural-language prompts within a unified autoregressive decoding framework, making them a natural fit for the speaker diarization task and offering a fresh approach to end-to-end multi-speaker audio transcription. This study proposes an end-to-end speaker diarization system based on an ALM and achieves synergistic optimization of speech-recognition capability and speaker-attribution capability via a two-stage training strategy, thus generalizing the capability of ALMs to specific downstream tasks. In the first stage, supervised fine-tuning (SFT) introduces a “speaker loss” into the standard cross-entropy objective to weight and strengthen the learning signal for sparse speaker-label tokens. In the second stage, a reinforcement-learning scheme based on group relative policy optimization (GRPO) is employed, designing a reward function that jointly considers cpCER and SA-CER to break through the performance bottleneck of supervised learning. Experiments in a two-speaker setting compare with the open-source 3D-Speaker toolkit and the Diar Sortformer model, as well as the proprietary speaker diarization APIs from AssemblyAI and Microsoft Azure. Ablation studies are further conducted to validate the training methodology, and experiments are subsequently extended to a four-speaker scenario. Results demonstrate that the two-stage approach significantly improves both ASR and speaker-attribution performance in the two-speaker environment, whereas in the four-speaker setting, conventional SFT already yields substantial improvements. Challenges such as resource consumption, input-length limitations, and cross-domain adaptation are also discussed, and future enhancements are proposed, including streaming audio encoders, curriculum learning, and rejection-sampling strategies. Experimental results show that ALMs hold great promise for multi-speaker diarization tasks but require additional technical advances to handle more complex acoustic scenarios.
    2026,37(5):1919-1935, DOI: 10.13328/j.cnki.jos.007545, CSTR: 32375.14.jos.007545
    [Abstract] (931) [HTML] (26) [PDF 4.51 M] (968)
    Abstract:
    The latest advancements in intelligent driving technology are primarily reflected in the environmental perception layer, where sensor data fusion is critical for enhancing system performance. Although point cloud data provides accurate 3D spatial descriptions, it suffers from unorderedness and sparsity. Image data, with its regular and dense distribution, can compensate for the limitations of single-modality detection when fused with point clouds. However, existing fusion algorithms face challenges such as limited semantic information and insufficient modal interaction, leaving room for improvement in high-precision multi-modal 3D object detection. To address this issue, this study proposes an innovative multi-sensor fusion method: generating pseudo-point clouds via depth completion from RGB images and combining them with real point clouds to identify regions of interest. It introduces three key improvements: (1) deformable attention-based multi-layer feature extraction that adaptively expands the receptive field to target regions; (2) 2D sparse convolution for efficient pseudo-point cloud feature extraction leveraging their regular distribution in the image domain; and (3) a two-stage feedback mechanism employing multi-modal cross-attention at the feature level to solve data alignment issues and an efficient fusion strategy at the decision level for interactive training across different stages. These innovations effectively resolve the trade-off between pseudo-point cloud accuracy and computational load while significantly enhancing both feature extraction efficiency and detection accuracy. Experimental results on the KITTI dataset demonstrate the superior performance of the proposed method in 3D traffic object detection, validating its effectiveness and offering a new approach for multi-modal fusion in autonomous driving environmental perception.
    2026,37(5):1936-1949, DOI: 10.13328/j.cnki.jos.007543, CSTR: 32375.14.jos.007543
    [Abstract] (714) [HTML] (404) [PDF 4.18 M] (938)
    Abstract:
    In large-scale image retrieval tasks, image hashing typically relies on a large amount of manually annotated data to train deep hashing models. However, the high cost of manual annotation limits its practical application. To alleviate this dependency, existing studies attempt to use texts provided by Web users as weak supervision to guide the model in mining semantic information associated with the texts from images. Nevertheless, the inherent noise in user tags often limits model performance. Multimodal pre-trained models such as CLIP exhibit strong image-text alignment capabilities. Inspired by this, this study utilizes CLIP to optimize user tags and proposes a weakly supervised hashing method called CLIP-guided tag refinement hashing (CTRH). The proposed method consists of three key components: a tag replacement module, a tag weighting module, and a tag-balanced loss function. The tag replacement module fine-tunes CLIP to mine potential image-relevant tags. The tag weighting module performs cross-modal global semantic interaction between the optimized text and images to learn discriminative joint representations. To address the imbalance of user tags, a tag-balanced loss is designed, which dynamically reweights hard samples to enhance the model’s representation learning. Experiments on two general datasets, MirFlickr and NUS-WIDE, verify the effectiveness of the proposed method compared to state-of-the-art approaches.
    2026,37(5):1950-1963, DOI: 10.13328/j.cnki.jos.007544, CSTR: 32375.14.jos.007544
    [Abstract] (872) [HTML] (19) [PDF 6.29 M] (918)
    Abstract:
    In recent years, training-free video question answering (VQA) models have become a research hotspot for lightweight multimodal reasoning due to their plug-and-play nature. However, although high frame rate videos contain rich semantic information, their inherent redundancy leads to a balance problem between information density and computational efficiency in the temporal dimension, with traditional sampling strategies being susceptible to noise frame interference. Furthermore, in complex dynamic scenes, background clutter and local body parts, as non-target regions, introduce spatial feature bias, significantly affecting the reliability of answer generation. To address these two issues, this study proposes a dual adaptive redundancy elimination (DARE) framework, which aims to systematically improve the accuracy of video semantic understanding and answer quality in the training-free paradigm through a spatiotemporal redundancy collaborative optimization mechanism. First, a dual-relation temporal sampling method is proposed, based on text-visual alignment and inter-frame semantic consistency. This method selects key frame sequences through bidirectional interactive reasoning, while simultaneously eliminating redundant frames that conflict with the text context. Next, a dynamic spatial sampling method is introduced, which extracts the largest connected semantic region from candidate regions in the prompt-related heatmap, aiming to eliminate scattered non-target regions and enhance the compactness of spatial feature representations. Experiments are conducted on widely used datasets, including MSVD-QA, MSRVTT-QA, TGIF-QA, and ActivityNet-QA. The proposed method is evaluated in a zero-shot setting against 14 state-of-the-art models. The results show that the proposed approach achieves competitive performance with significantly fewer video feature sequences. Visual analysis confirms that the proposed method exhibits more accurate spatiotemporal localization abilities in challenging tasks, such as multi-person interactions and fine-grained action recognition in complex scenes. The proposed DARE-VQA framework achieves significant improvements in video question answering performance by collaboratively optimizing spatiotemporal redundancy. It can generate accurate and high-quality answers within the training-free paradigm, demonstrating its potential in multimodal video understanding.
    2026,37(5):1964-1981, DOI: 10.13328/j.cnki.jos.007537, CSTR: 32375.14.jos.007537
    [Abstract] (836) [HTML] (15) [PDF 2.87 M] (849)
    Abstract:
    The transformation of scientific and technological innovations into practical applications through patent recommendation is of great significance for realizing the economic value of science and technology and promoting socio-economic development. However, existing patent recommendation algorithms often overlook the multimodal information embedded in patents, leading to recommendation results that fail to comprehensively reflect the value and application potential of patents. Consequently, this affects the accuracy of matching patents with the needs of companies. To address this issue, this study proposes a multimodal heterogeneous graph network for patent recommendation (MHGN). The proposed method first utilizes pre-trained models to initialize the representation of multimodal information, including the textual and image attributes of patents as well as company information. Then, a graph attention network is employed to learn the preference representations of companies across different modalities. Based on this, the relationship weights of company-patent interactions are further learned based on the similarity of preference representations, and a graph convolutional network is designed to learn the node preference representations of companies and patents. Finally, to better integrate the multimodal information, an adaptation vector is introduced and an attention mechanism is used to fuse the node preference representations with multimodal representations. In addition, four real-world patent datasets from university-to-company transfers are constructed, and experiments are conducted comparing the proposed model with seven advanced baseline models. The results demonstrate that the proposed model significantly outperforms the baselines across all evaluation metrics.
    2026,37(5):1982-2005, DOI: 10.13328/j.cnki.jos.007539, CSTR: 32375.14.jos.007539
    [Abstract] (717) [HTML] (19) [PDF 5.77 M] (887)
    Abstract:
    The rapid development of generative technologies has revealed their potential for real-world applications. The core objective of pose-guided person image and video generation is to transform a person from inputs into a specified pose while maintaining a high level of appearance consistency. This technology can be widely applied in various fields such as virtual try-on and fashion, advertising video generation and editing, and multimodal content creation, driving advancements in user experience and technological innovation. However, despite significant progress, the technology still faces multiple challenges, including effective extraction and rearrangement of appearance information during pose transfer, generation of unseen information, consistency preservation, and efficient model training and deployment. Based on the existing challenges, this study provides a detailed analysis of the strategies employed by current mainstream pose-guided generation methods to address these issues, discussing their feasibility and limitations in practical applications. Moreover, it explores the commonly used generative models and pose representation methods in pose-guided generation. It also reviews the datasets, their sizes, characteristics, and evaluation benchmarks used in this field. Furthermore, this study discusses the applications of this technology in virtual try-on, video generation and editing, and multimodal content generation. It highlights the remaining challenges, such as the retention of personalized information, generation in complex scenes, and model efficiency and real-time performance. Finally, this study discusses potential future development trends of pose-guided generation technology, aiming to provide researchers with a systematic summary and reference to promote its application and innovation across industries.
    Article Search
    Search by issue
    Select AllDeselectExport
    Display Method:
    Available online:  May 13, 2026 , DOI: 10.13328/j.cnki.jos.007635
    Abstract:
    Existing fuzzer for browser JavaScript engines still have limitations in detecting potential vulnerabilities, especially in identifying non-crashing heap memory errors. This study proposes ToxiHeap, a JavaScript engine fuzzing framework that integrates runtime monitoring based on memory toxic labeling with large language model (LLM)-guided semantic generation as two parallel core components. The detection track instruments heap allocation and access paths in the target engine. Shadow memory and fine-grained toxic labeling provide a unified mechanism for representing multiple heap errors, including use-after-free (UAF), double free, heap out-of-bounds reads and writes (OOB-R/W), memory leak, and uninitialized memory read (UMR). Accesses to freed memory and other illegal states are converted into consumable exception signals, which compensates for the lack of effective detection signals for non-crashing vulnerabilities in approaches that rely solely on crash signals. The generation track employs a two-stage “distill-reward” LLM-based mutator that extracts semantic features from historical proofs of concept (PoCs) and generates state-dependent test cases in a targeted manner, thus overcoming the limitations of purely syntax-based or shallow-semantic mutations in exploring deep execution paths. The two tracks are integrated through a feedback loop driven by coverage gains and non-crashing detection signals. This feedback loop jointly drives sample retention, path weight updates, and knowledge base growth. An isolated replay verification mechanism is also introduced to revalidate anomalies in a clean process, which significantly reduces nondeterministic false positives. Experimental results show that on the JavaScriptCore (JSC) engine, ToxiHeap increases branch coverage from 31.17% to 33.52% in a 24-hour run, and achieves the highest or near-highest branch coverage on other mainstream engines including V8, SpiderMonkey (SM), and ChakraCore (CH). The proportion of valid samples remains above 91%. On a set of 50 PoC references covering multiple vulnerability patterns including UAF, the average detection rate across the four engines reaches 89.18%.
    Available online:  May 13, 2026 , DOI: 10.13328/j.cnki.jos.007644
    Abstract:
    Compiler optimization options serve as a core interface between the compiler and developers, and their proper configuration directly impacts software quality and development efficiency. However, there are a large number of options with complex interrelations, and their optimization effects are dynamically influenced by program features and target machines. The official documentation is also insufficient to provide the configuration guidance needed for practical application scenarios. To address these challenges, this study combines static and dynamic analysis techniques applied to the GCC source code and investigates two types of relationships that affect the effectiveness of compiler options: internal constraint relationships and external environment dependencies. First, 68 pairs of internal constraint relationships (involving 84 options) and 103 pairs of external environment dependencies (including 51 architecture-sensitive options and 52 program feature-sensitive options) are identified through static analysis, and the effectiveness of these options in different external environments is further validated through dynamic analysis. Finally, the analysis results of option relationships are applied to three compiler-related scenarios: 1) improving the effectiveness of compiler auto-tuning by designing a relationship-aware genetic auto-tuning algorithm, which achieves an average performance improvement of 3.65% compared with algorithms that do not consider option relationships, such as the genetic algorithm; 2) improving the effectiveness of compiler testing by proposing a option sequence test case generation method based on option relationships, achieving a 51.7% increase in generation efficiency compared to random methods; 3) providing developers with more effective option configuration schemes to help them use options properly to achieve their desired optimization goals. These three applications demonstrate the key role of compiler option relationships in compiler auto-tuning, compiler testing, and practical configuration.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007645
    Abstract:
    Edge computing has been widely adopted across various domains due to its low latency and high processing efficiency. As core foundational software in edge intelligence scenarios, the runtime reliability of the KubeEdge platform is critically important. However, software on edge systems may experience software aging after prolonged operation, leading to delayed system responses or even service interruptions, which may negatively impact user experience and potentially cause accidents. While rejuvenation operations can mitigate aging effects, current research on aging in edge systems remains relatively limited, and existing rejuvenation methods cannot be directly applied to edge systems. To address these challenges, this study proposes a comprehensive aging state determination and rejuvenation method named GIP-MI for the KubeEdge edge system. The method first employs the GCN-Informer approach to model spatial correlations and temporal dependencies among system metrics, enabling more accurate and stable predictions of future trends in these metrics compared to conventional methods. The predicted data is then fed into the deep learning method ParNet, which leverages multi-timepoint slicing and multi-resolution feature fusion to achieve more precise identification of dynamic aging states of system resources. Finally, a task offloading method based on the multi-objective evolutionary algorithm based on decomposition and information feedback model (MOEA/D-IFM) is introduced as a rejuvenation mechanism, effectively avoiding system downtime and ensuring service continuity. Experimental results demonstrate that GIP-MI outperforms baseline methods in both aging prediction and state identification accuracy. Moreover, compared to traditional rejuvenation approaches, it shows significant advantages in key metrics such as downtime, enabling effective recovery of system states
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007655
    Abstract:
    Graph neural networks (GNNs) have achieved remarkable performance on graph classification tasks, but their black-box nature has raised widespread concerns about the explainability of their prediction process. As a self-explaining mechanism, rationale extraction has received increasing attention in recent years. Its goal is to extract concise subgraph structures from the original graph (i.e., rationale subgraphs) as explanations while generating prediction results. However, existing methods often rely on spurious shortcut features in the data, resulting in explanations that lack faithfulness, which in turn compromises both the interpretability and robustness of the model. To address these issues, this study proposes a complement-aware rationale extraction (CaR) method, which treats the subgraph regions not selected as rationales as complement information. The method enhances counterfactual modeling and interpretability from the following three perspectives. First, a contrastive learning mechanism is introduced to disentangle rationale representations from complement representations, enhancing their semantic independence. Second, an echo-learning strategy is proposed to fully leverage the intermediate representations generated during the message-passing process of GNNs, capturing the structural differences in complement parts across different network depths. Finally, the method combines complement and rationale representations from both current and historical layers to construct counterfactual samples, increasing the diversity of the training data. Extensive experiments on multiple real-world benchmark datasets and a synthetic dataset demonstrate the effectiveness of CaR in producing faithful rationales.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007641
    Abstract:
    Cross-chain asset swaps are a typical mode of asset circulation across blockchains. Existing cross-chain swap solutions, represented by the hashed timelock contract (HTLC) protocol, typically adopt a bind-then-lock mode, in which the follower is bound first and then locks assets. Under this mode, once the bound follower withdraws, the initiator cannot replace the swap counterparty and must wait for the timelock to expire before reclaiming the assets and restarting the swap process, which significantly prolongs the swap duration and incurs high on-chain costs. To address this issue, this study proposes a lock-then-bind mode for cross-chain asset swaps. In this paradigm, the follower is not pre-specified in the contract before the swap starts. Instead, an eligible responder first locks assets and is then bound as the follower. This paradigm avoids repeated retries and long-term asset locking caused by follower withdrawal. Under the new paradigm, this study proposes a cross-chain asset swap protocol based on an address signature lock, namely OpenSwap. OpenSwap designs an address signature lock by embedding the follower’s identity information into the lock structure, enabling it to be synchronized between two blockchains during the asset locking and unlocking process, thus ensuring consistency in follower binding across both chains. In addition, OpenSwap enhances protocol security and execution efficiency through the introduction of a challenge period and an assisted unlocking mechanism. Theoretical analysis and experimental results demonstrate that OpenSwap ensures atomicity while significantly reducing swap latency and lowering on-chain costs in low user response scenarios, providing a more flexible and efficient solution for cross-chain swaps.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007622
    Abstract:
    Federated learning enables numerous clients to collaboratively train a model using their local data without exposing the raw data of individual parties, thereby avoiding data leakage and misuse caused by data migration in traditional machine learning paradigms. However, in practical scenarios, clients often exhibit heterogeneous data distributions and diverse system capabilities, which degrade model performance and training efficiency. Selecting a high-quality subset of clients as participants in federated learning can effectively improve global model performance and accelerate convergence. Nevertheless, existing studies show that malicious adversaries can exploit information such as local training losses or gradients to infer sensitive private data, while current participant selection strategies for heterogeneous federated learning fail to adequately address such privacy leakage risks. To tackle this challenge, this study designs a privacy-preserving participant selection protocol for heterogeneous federated learning based on secure multi-party computation. By leveraging three-party computation (3PC) secret-sharing techniques, the proposed protocol ensures data privacy during training while maintaining the accuracy of the jointly trained model. Furthermore, a secure top-k search protocol is introduced to prevent privacy leakage during the participant selection phase. The security of the proposed protocol is formally analyzed, demonstrating that the required security properties are satisfied. Experimental results indicate that, compared with heterogeneous federated learning schemes without privacy preservation, the proposed approach increases the average computational and communication overhead across all parties by 2.09%.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007625
    Abstract:
    Database systems serve as critical infrastructure for big data, with their performance directly affecting the quality of service (QoS) for upper-layer applications. With the rapid advancement of storage hardware technologies, traditional database systems increasingly exhibit stability challenges under large-scale and high-concurrency workloads. Baseline evaluations reveal severe performance degradation under intensive workloads, characterized by sharp throughput decline and noticeable jitter. Analysis of key operational metrics identifies the root cause of instability in the database I/O read-write model, where delayed dirty page flushing and insufficient candidate pages for backend threads reduce overall system stability. To address these issues, this study abstracts the database I/O mechanism into a producer-consumer model centered on buffer management and identifies inherent functional coupling problems. A novel functionally decoupled I/O model is proposed, featuring optimizations to the dirty page flushing mechanism and candidate page allocation strategy, thereby enhancing the supply of clean pages. Furthermore, the improved NSGA-II algorithm is integrated into the flushing framework for multi-objective white-box parameter tuning. Comprehensive evaluations are conducted using TPC-C and sysbench benchmarks across multiple dimensions, including data scale, testing duration, concurrency levels, and read-write patterns, supplemented by ablation studies. Experimental results demonstrate that the proposed framework achieves significant improvements over baseline approaches and existing optimization approaches in throughput, stability, and latency under high-pressure scenarios.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007571
    Abstract:
    Access control technology is a security mechanism for managing users’ access to resources, which can effectively prevent unauthorized access and resource leakage. In the digital age, how to balance the relationship between information circulation and privacy protection via effective access control technology and ensure the safe and orderly flow of data elements has become a problem to be urgently addressed at present. However, the existing access control technology still has problems such as insufficient integration with trust evaluation, lack of dynamic adjustment capabilities, and difficulty in precise authorization in the research on domain data sharing scenarios. To this end, a trustworthy dynamic access control model scheme based on game theory is proposed, which integrates a three-layer collaborative mechanism of “trustworthy evaluation, dynamic adjustment, and access decision”. Firstly, based on the attribute weight algorithm, a multi-factor trustworthy prediction model is designed to calculate the trust probability of the access subject. Secondly, from the perspective of long-term stability, an evolutionary game dynamic adjustment model between the access subject and the object is built to periodically and dynamically adjust the reward and punishment incentive mechanism and access authorization threshold, thereby achieving the adaptive optimization of access control. Finally, based on Bayesian game theory, an incomplete information real-time decision-making model is built, and access control decisions are made based on the mixed strategy Nash equilibrium, with the trust degree updated by the equilibrium state feedback. The results of simulation experiments and sensitivity analysis verify that the proposed scheme can effectively improve the access control accuracy and achieve dynamic adjustment of access control strategies and accurate authorization.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007535
    Abstract:
    Social network link prediction aims to analyze existing network information to infer future links. This is a highly challenging task because social networks exhibit complex spatio-temporal coupling, characterized by dynamic evolution over time (i.e., temporal dependency) and interdependent correlations across space (i.e., spatial dependency). Existing methods mainly focus on time-domain and space-domain modeling and do not fully utilize the frequency-domain information of graph snapshot sequence data. This study proposes a time-frequency-aware graph convolutional network (TFAGCN) for social network link prediction. The main advantage of TFAGCN is that frequency-, time-, and space-domain information is integrated together in a unified network framework, which captures both global temporal dependencies and local spatio-temporal dependencies in social network data. Specifically, this study introduces a frequency-domain module and a spatio-temporal module. In the frequency-domain module, the fast Fourier transform is used to transform the graph snapshot sequence, and the multilayer perceptron is used to learn the real and imaginary parts of the frequency components in the frequency domain to capture the global dependencies of social networks. In the spatio-temporal module, a graph convolutional neural network and a gated recurrent unit network are jointly used to explore the local topological features and local temporal features of individual graph snapshots, respectively. In addition, a time-frequency bidirectional cross-attention network is designed to adaptively fuse frequency-domain features with time-domain features. To address link prediction for large-scale social networks, a simplified version of TFAGCN, namely TFAGS, is designed. Extensive experiments conducted on six real-world social network datasets show that the proposed method outperforms state-of-the-art baseline methods in link prediction, thus confirming its effectiveness as an efficient new tool for social network information representation. The code of TFAGCN is available in this repository: https://github.com/junlonglai/TFAGCN.
    Available online:  April 29, 2026 , DOI: 10.13328/j.cnki.jos.007548
    Abstract:
    Deep learning models face some security risks, and security breaches in their applications can lead to severe consequences. Enhancing the security of deep learning models is therefore necessary. Existing reinforcement methods include adversarial training against adversarial noise, adversarial noise purification methods, and others. Among them, adversarial training is the most widely used method and provides effective defense against adversarial attacks. However, models trained with adversarial training often suffer from insufficient robust generalization and considerable loss of original accuracy. To address these issues, this study proposes a new adversarial training method called proxy-distribution-based adversarial training (PBAT). The proposed method employs a probabilistic model to capture the distribution patterns of data samples and generate enhanced training samples that balance original accuracy and robustness. The resilience of the model is further enhanced through an adjusted training process. Experiments are conducted using ResNet-20 and GoogLeNet on two benchmark datasets, CIFAR-10 and MNIST. Furthermore, experiments are conducted on the Faster R-CNN model and the PASCAL VOC dataset for object detection tasks. The experimental results demonstrate that PBAT outperforms four representative methods.
    Available online:  April 22, 2026 , DOI: 10.13328/j.cnki.jos.007626
    Abstract:
    In real-world scenarios such as e-commerce platforms and smart-home systems, multiple users often share the same account, resulting in behavioral sequences that mix interactions from different users. Sequential recommendation in shared-account settings has recently attracted increasing research attention but still faces two major challenges: (1) interactions from different latent users are difficult to disentangle accurately, leading to biased representation learning; (2) reliance on static hyperparameters to estimate the number of latent users prevents adaptive determination of user cardinality, which may cause underfitting or introduce noise. To address these challenges, this study proposes PE-GAT (prompt-enhanced graph attention network), an adaptive sequential recommendation framework for shared-account settings. PE-GAT first employs a dynamically-weighted, density-based clustering algorithm to infer the number of latent users and construct user-level sequential graphs that explicitly separate heterogeneous user behaviors. Based on these graphs, a graph attention network pre-training module is employed to disentangle mixed user preferences and learn initial sequence representations. Inspired by the pre-training and prompt-tuning paradigm, a self-attention-based prompt-enhancement module is then designed to refine sequence embeddings via prompt templates during retraining. Finally, account-level representations are fused with prompt-enhanced sequence embeddings to generate personalized recommendations. Extensive experiments on two real-world shared-account datasets (HVIDEO-E and HVIDEO-V) show that PE-GAT outperforms 14 state-of-the-art baselines, achieving maximum improvements of 4.73% and 5.59% in MRR and Recall metrics, respectively.
    Available online:  April 22, 2026 , DOI: 10.13328/j.cnki.jos.007624
    Abstract:
    To address critical challenges in user privacy and transmission data security in cross-domain environments, as well as practical requirements for user portability and lightweight nodes in cross-domain communication system, this study proposes a blockchain-based secure cross-domain data transmission scheme under highly adversarial conditions. The scheme achieves: 1) decentralized public key management and identity authentication; 2) portable system access for users; 3) trusted key negotiation among communication nodes; 4) key-leakage resistant cross-domain data transmission. The security of the proposed scheme is formally analyzed and proven. Furthermore, a system prototype is implemented to evaluate performance. Experimental results indicate that computation, storage, and communication overheads are all efficiently managed, demonstrating the scheme’s practicality and scalability.
    Available online:  April 22, 2026 , DOI: 10.13328/j.cnki.jos.007615
    Abstract:
    With the rapid development of network technology, frequent cyber attacks, especially advanced persistent threats (APTs), seriously affect national security and social stability. Under the continuous evolution of encryption, obfuscation, and camouflage techniques, intelligent analysis of network traffic is considered an effective means to improve threat detection capability. However, when processing massive volumes of network traffic data, existing methods still suffer from high analysis complexity and weak model interpretability. Flow spectrum adopts domain transformation as a unified solution by constructing a more accurate, highly separable, and observable description space for network flow data, thereby enabling efficient characterization, representation and analysis of network behaviors and effectively addressing the above issues. Inspired by the atomic spectrum, this study proposes a novel flow spectrum scheme. The core idea is achieve a concrete representation of network behaviors by mapping network flows into a one-dimensional spectral space, and to detect network traffic threats through flow spectrum comparison, in which the design of an effective flow spectrum decomposer is crucial. In this study, the flow spectrum decomposer is constructed based on a semi-supervised autoencoder and is trained by jointly performing reconstruction and classification tasks, enabling spectral line distributions of different network behaviors to exhibit strong separability. The proposed scheme is validated on the NSL-KDD, UNSW-NB15, and CIC-DDoS2019 datasets. Experimental results show that the proposed scheme achieves high detection accuracy for network threat behaviors while providing differentiated representations for various network traffic behaviors, significantly enhancing network behavior observability and improving the interpretability of threat detection methods. Therefore, the proposed flow spectrum scheme is effective for network traffic threat detection.
    Available online:  April 22, 2026 , DOI: 10.13328/j.cnki.jos.007621
    Abstract:
    As the scale of open-source models and datasets continues to expand, the Hugging Face ecosystem forms a complex heterogeneous dependency network centered on model-dataset relationships. Issues such as missing metadata and high dependency concentration make chain-structured risks more likely to accumulate and propagate. To characterize this underlying risk landscape, this study constructs a resource dependency network of open-source AI resources based on a Hugging Face snapshot and analyzes its structural and evolutionary characteristics from the perspectives of global topology and temporal evolution. Furthermore, a “credibility risk” indicator is proposed by integrating metadata completeness and community feedback, enabling continuous risk quantification and ranking of model and dataset nodes. The results show that the dependency network exhibits a pronounced “spike-and-long-tail” structure, in which dependencies are highly concentrated on a small number of hub nodes, while a large proportion of resources remain isolated or semi-isolated within critical data-flow relationships. Meanwhile, the explosive growth of models, combined with the relatively slow expansion of datasets and contributors, strengthens the ecosystem’s path dependence on a limited set of core data sources, thereby giving rise to structural systemic risks. At the node level, the proposed credibility risk indicator demonstrates robustness to parameter perturbations and effectively distinguishes high-risk from low-risk nodes across multiple risk sources, outperforming baseline methods. Risk-coupling analysis and expert blind evaluation further confirm the clustering and propagation effects of high-risk datasets and high-risk models within local structures. Overall, this study provides a reproducible quantitative basis for risk screening and governance in open-source AI ecosystems.
    Available online:  April 22, 2026 , DOI: 10.13328/j.cnki.jos.007579
    Abstract:
    Graph self-supervised learning aims to acquire effective graph structural representations without manual annotations. Although graph contrastive learning (GCL) enables self-supervised training by generating label-preserving perturbed views and maximizing their similarity to the original view, existing methods predominantly adopt a globally uniform perturbation strategy, which neglects the heterogeneity of node roles in real-world networks. Such indiscriminate random corruption violates the label-invariance assumption. Empirical observations indicate that real-world networks generally exhibit a core-periphery bi-layered topological architecture: core nodes form highly interconnected information hubs, and destructive perturbations applied to them are likely to cause semantic distortion and label shifts. To address these limitations, this study proposes a core-periphery structure-aware graph contrastive learning framework, with the following innovations: (i) instead of global uniform perturbation paradigm, peripheral nodes are accurately identified via a core-periphery detection algorithm, and localized perturbations are applied to preserve the integrity of the core topology, thereby strictly satisfying the principle of label invariance; (ii) augmentation operations such as peripheral node deletion are designed to simulate the dynamic evolution of real-world networks, encouraging the model to capture topological stability and noise robustness; (iii) a core-periphery contrastive loss function is constructed, in which differentiated weights are assigned to nodes with varying structural importance during loss computation, effectively guiding the model to emphasize core information while suppressing potential negative interference from peripheral nodes. Extensive experiments on multiple benchmark datasets demonstrate that the proposed method consistently outperforms state-of-the-art models across various tasks.
    Available online:  April 09, 2026 , DOI: 10.13328/j.cnki.jos.007614
    Abstract:
    TLS protocol plays a critical role in ensuring the privacy, integrity, and reliability of network communications. In recent years, both industry and academia have actively promoted research and development related to TLS protocol, achieving significant progress, particularly in TLS 1.3. However, with the increasing complexity of network environments and the continuous evolution of attack methods, the security of the TLS 1.3 protocol also faces severe challenges, including replay attacks, risks to forward secrecy and vulnerabilities in software implementations such as OpenSSL. These attacks and vulnerabilities not only pose serious threats to user privacy and enterprise data security but also profoundly impact the trust system of the Internet and the broader digital economy. This study first provides a detailed introduction to the development and underlying principles of TLS 1.3. Subsequently, recent security research on the TLS 1.3 protocol is systematically categorized, compared, and analyzed from three aspects: protocol mechanism, software implementation, and application configuration. Finally, the current state and challenges in the TLS 1.3 protocol security research are summarized, and suggestions for future research directions are provided.
    Available online:  April 01, 2026 , DOI: 10.13328/j.cnki.jos.007611
    Abstract:
    Web 3.0 is a new-generation Internet framework based on blockchain technology, which facilitates data assetization and enables the formation of tradable digital assets, thus promoting the development of the digital economy. However, Web 3.0 still faces several challenges in user ecosystem construction and digital asset circulation: (1) The diversity of user trust mechanisms in Web 3.0 poses challenges to digital identity management. (2) The low cost of digital asset infringement and coarse-grained authentication in Web 3.0 hinder the efficient circulation of digital assets. (3) The open and autonomous nature of Web 3.0, together with the diversity of participating entities, leads to difficulties in user ecosystem governance. (4) The openness and transparency of data, along with diverse attack surfaces in Web 3.0, make it difficult to balance privacy protection and security regulation. To address these four challenges, a Web 3.0 technology architecture oriented toward data assetization is proposed. Focusing on the requirements of data assetization in identity management, asset circulation, ecosystem governance, and security regulation, and in combination with the technical characteristics of Web 3.0, relevant Web 3.0 research work at home and abroad is summarized, classified, analyzed, and reviewed. Specifically, this study includes (1) distributed digital identity management mechanisms, including technologies such as digital identity creation, identifier authentication, and privacy protection; (2) Web 3.0 digital asset circulation mechanisms, including technologies such as digital asset ownership confirmation, authentication, and circulation; (3) Web 3.0 ecosystem governance mechanisms, including technologies such as user reputation evaluation and incentive mechanisms; (4) Web 3.0 digital asset security protection and regulation technologies, including proactive regulation, on-chain data monitoring, and application front-end security analysis. Finally, future research directions of Web 3.0 technologies are discussed.
    Available online:  April 01, 2026 , DOI: 10.13328/j.cnki.jos.007612
    Abstract:
    In large-scale online service systems, intricate dependencies among components often cause a single fault to trigger a massive number of correlated alerts, resulting in alert storms. Alert storms not only increase the workload of on-call engineers but also make fault diagnosis and root cause analysis more challenging. To address this issue, this study proposes Alert-CM, a graph representation learning-based alert clustering method that effectively groups alerts caused by the same fault, thereby alleviating engineers’ workloads. In alert management, an alert is typically generated by aggregating various types of underlying system data at the time of a fault, including related applications, metrics, logs, alert rules, and emergency scenarios. Alert-CM assumes that multiple alerts triggered by the same fault usually exhibit tight correlations at the underlying system data level, and that the core underlying system data better represents the abnormal system state associated with the alerts. Based on this assumption, Alert-CM constructs a fine-grained system data dependency graph using alert-related configuration data, abstracting and mapping the dependency relationships between alerts and graph nodes to further expand the alert feature space. On top of the system data dependency graph, a graph neural network model is built to perform graph representation learning, in which the contributions of core underlying system data to alerts are automatically learned, producing accurate alert vector representations. Finally, the DBSCAN algorithm is applied to cluster alerts based on the learned representations. Alert-CM is evaluated on a real-world industrial dataset, with a focus on clustering effectiveness and real-time efficiency. The experimental results demonstrate that Alert-CM significantly outperforms traditional alert aggregation methods in alert clustering tasks. Specifically, Alert-CM achieves an NMI of 0.901 and an ARI of 0.645, corresponding to average improvements of 31.7% and 153.9% over existing methods, respectively. In addition, Alert-CM exhibits strong performance in online real-time clustering tasks.
    Available online:  April 01, 2026 , DOI: 10.13328/j.cnki.jos.007613
    Abstract:
    Large language models (LLMs) demonstrate significant potential in automatic code generation. However, in practical applications, the generated code often suffers from multiple issues, including syntax errors, semantics inconsistencies, security inconsistencies, inefficient runtime performance, and poor maintainability. To address these challenges, constrained code generation techniques are introduced. Drawing inspiration from constrained text generation, these techniques impose explicit constraints at various stages of the code generation process to ensure that the generated code satisfies predefined requirements. This study first reviews the major issues exposed by LLMs in code generation, with a detailed analysis of deficiencies related to code correctness and quality. Subsequently, recent research progress in constrained code generation is summarized, and the strengths and limitations of existing approaches are systematically examined. Furthermore, evaluation methods are discussed, including the construction of benchmark datasets and the design of evaluation metrics, providing valuable references for experimental settings in future research. Finally, the research challenges faced by constrained code generation and its future development trends are outlined.
    Available online:  March 25, 2026 , DOI: 10.13328/j.cnki.jos.007568
    Abstract:
    As a key technology for ensuring the safety and reliability of artificial intelligence (AI) systems, neural network robustness verification can provide formal guarantees for intelligent decision-making. Existing research is generally based on simplified assumptions of isotropic data distributions to develop verification algorithms based on uniform Lp-norm ball neighborhoods. However, this theoretical framework proves inadequate in the face of the real-world complex data characteristics. For instance, different data features exhibit varying influences on model predictions and sensitivities to perturbations; some features are immutable due to physical constraints; complex correlation structures may exist among features. This makes it difficult for verification algorithms based on uniform perturbation domains to accurately model the robustness requirements of the real world for AI systems. To this end, this study proposes a robustness verification framework based on non-uniform perturbation domains. By combining the data distribution characteristics of specific application domains, the study constructs geometrically structured perturbation domains aligned with domain-specific features and model domain-adaptive perturbations. On this basis, it formally defines three novel robustness concepts, including ellipsoidal robustness, masked local robustness, and Mahalanobis distance robustness, and proposes the definition and construction methods for corresponding robustness verification problems. Furthermore, the NNV4RADAP algorithm is designed, which extends existing verification algorithms to neural network robustness verification problems for domain-adaptive perturbations by constructing equivalent uniform Lp-norm ball robustness verification problems. The experimental results demonstrate that the NNV4RADAP algorithm can provide more accurate and datadistribution-aligned robustness guarantees for neural networks. This study expands the existing formal definitions of deep neural network robustness and designs and implements a formal verification algorithm of neural network robustness for domain-adaptive perturbations. Additionally, it researches the problem in data distribution-based robustness definitions and provides guidance for the future implementation and application of formal verification techniques in trustworthy AI technologies.
    Available online:  March 25, 2026 , DOI: 10.13328/j.cnki.jos.007569
    Abstract:
    Image denoising, a fundamental task in computer vision, relies on leveraging effective prior knowledge to restore detailed information corrupted by noise. This study proposes a feature spatial contextual Transformer for image denoising FSCformer to address the performance bottlenecks of traditional convolutional neural network (CNN) caused by fixed weights and the limitation of local receptive fields, and the high computational complexity of Transformer for global modeling. In this method, an efficient receptive field module is introduced to dynamically capture multi-scale contextual information, enhancing spatial perception while significantly reducing computational overhead. Furthermore, a convolutional attention module is adopted to integrate local feature extraction with global dependency modeling, improving the robustness of the model especially in complex scenes. Additionally, a cross-feature fusion mechanism is proposed to preserve image details by promoting the fine-grained interaction of multi-scale features. Extensive experiments demonstrate that the proposed method achieves a favorable trade-off between denoising accuracy and computational efficiency, outperforming several existing image denoising models across multiple benchmark datasets.
    Available online:  March 25, 2026 , DOI: 10.13328/j.cnki.jos.007643
    Abstract:
    Pretrained code models have demonstrated strong capabilities in code understanding and analysis and have become important tools and major research focuses in source code vulnerability detection. However, similar to traditional deep learning models, pretrained code models exhibit robustness vulnerabilities when exposed to carefully crafted adversarial code. Attackers can mislead the model into classifying vulnerable code as non-vulnerable by introducing semantically preserving perturbations, thus posing a significant threat to software security. Therefore, adversarial attacks for pretrained vulnerability detection models not only serve as an effective approach to evaluate the robustness of pretrained code models but also provide critical insights for the development of future vulnerability detection models and defense mechanisms. In the hard-label black-box attack scenario, this study proposes VulBlurrer, a black-box adversarial attack method targeting pretrained vulnerability detection models. VulBlurrer designs a directed synonymous code transformation strategy, prioritizing perturbations on highly sensitive regions adjacent to vulnerabilities and on specific statements. It also introduces an escape score based on feature consistency, semantic consistency, and code fluency, enabling the quantification of the potential attack value of candidate samples without accessing internal information of the target model. Furthermore, this study adopts a genetic-algorithm-based optimization strategy for adversarial code, in which the weights used to compute the escape score are dynamically adjusted and an elite retention mechanism is applied during the iterative process, thus further improving attack accuracy. VulBlurrer and baseline methods are evaluated on pretrained vulnerability detection models based on CodeBERT, GraphCodeBERT, CodeT5, and UniXcoder. The attack success rates of VulBlurrer on the four target models reach 85.51%, 91.47%, 93.14%, and 71.61%, with average query numbers of 12.67, 9.10, 11.07, and 19.44, respectively. Compared with existing methods, VulBlurrer achieves higher attack success rates and a better trade-off between attack success rate and query efficiency, while the generated adversarial code also exhibit superior consistency and fluency. Furthermore, empirical studies are conducted on ChatGPT, DeepSeek, and LLM-based programming assistants, including GitHub Copilot and TRAE, verifying the effectiveness of the proposed method against large language models. These results indicate that pretrained code models still face robustness challenges posed by adversarial attacks in vulnerability detection tasks, and vulnerability detection tools based on pretrained models and large language models require further improvements to enhance robustness against adversarial code.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007566
    Abstract:
    As autonomous driving applications are rapidly popularized, their safety has become the common focus of both academia and industry. Autonomous driving system (ADS) testing is an effective means for solving this problem. Currently, the mainstream testing method is the scenario-based simulation test, which evaluates the decision of ADS to be measured by simulating various elements of driving scenarios, such as roads and pedestrians. However, existing methods mainly focus on the construction and dynamic generation of critical driving scenarios, neglecting the influence of configuration changes of the vehicle itself, such as its weight and torque, on the decision-making of ADS deployed on the vehicle. To address this issue, based on the previous work SAFEVAR, this study proposes SAFEVCS, an efficient search method for safety-critical vehicle configurations. SAFEVCS employs a search algorithm to explore the vehicle configuration setting (VCS) that exposes safety vulnerabilities of ADS. Furthermore, to improve the diversity of the search results, SAFEVCS introduces fuzzing to optimize the conditions and constraints of crossover and mutation operators in search algorithms. To improve search efficiency, SAFEVCS further combines the vehicle dynamics knowledge, which achieves the self-adaption of search termination strategy and deduplication strategy. To evaluate the effectiveness and execution efficiency of SAFEVCS, the study takes SAFEVAR as the baseline for comparison and carries out extensive experiments under three driving scenarios. The experimental results show that VCS generated by SAFEVCS can effectively expose the safety vulnerabilities of ADS. In the two weather conditions of sunny and rainy days, under the simulation scenarios of pedestrians crossing the road, the obtained solution set significantly decreased the safety performance of the ADS under test, and under the same experiment environment, the simulation efficiency is increased by approximately 2.5 times.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007574
    Abstract:
    As the research on audio adversarial attacks advances, improving the transferability of adversarial audio across different models and ensuring its imperceptibility (that is, highly similar to the original audio in auditory perception) at the same time have become a research hotspot. This study proposes a new method called speak information attack (SIAttack) that can simultaneously improve the imperceptibility and transferability of adversarial audio. Specifically, the core idea of this method is to decouple speaker information from content information in the audio, and then apply small perturbations only to the speaker information, thereby achieving efficient attacks on the speaker recognition system under the premise of keeping the content information unchanged. The experiments on four speaker recognition models and three mainstream commercial APIs show that the audio generated by SIAttack is almost indistinguishable from the original audio, and can mislead all test models with a high success rate. Additionally, the transfer success rate on speaker recognition models can reach up to 100%.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007576
    Abstract:
    As a kind of graph structure with timestamps when nodes interact with each other, temporal graphs have more modeling advantages than static graphs. For example, they can detect money laundering, order brushing, equity relationships, financial fraud, and circular guarantees within a certain time interval. The cycle is the modeling of the behavior that forms a cycle in a temporal graph. Existing temporal cycle detection or mining methods mostly focus on the detection of non-decreasing complete cycles in time, but overlook the analysis and discovery of approximate cycles within a certain time interval. The discovery of such approximate cycles can detect fraudulent behavior with stronger cheating techniques. To address the problem of discovering approximate cycles that have already appeared within a certain time interval but are not fully displayed in a single source of data, this study first proposes an approximate cycle detection method based on the depth-first search, which is referred to as the baseline method (Baseline). It first mines complete cycles composed of edges satisfying non-decreasing order in each window, and then employs nodes that meet certain criteria as the start and end points of approximate cycles. In the subsequent windows, paths composed of edges within a certain time interval are mined, namely time-interval approximate cycles. To address the problems of Baseline, this study subsequently proposes an improved method for approximate cycle detection, referred to as the improved method (Improved). It first utilizes the node activity to enhance the possibility of start and end points, then improves the index features by adopting active paths and hotspots, and finally accelerates detection by employing the bidirectional search and connection from start and end points to hotspots. Extensive experiments on real and synthetic data demonstrate the efficiency and effectiveness of the proposed method.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007551
    Abstract:
    In recent years, deep learning has developed rapidly and achieved significant success in computer vision, with model evaluation and improvement remaining central concerns for researchers. However, the commonly used model comparison paradigm relies on training (or validation) and testing on closed datasets, and then identifies hard samples based on discrepancies between predictions and ground-truth labels, which provide feedback on model weaknesses and directions for improvement. This paradigm suffers from two major limitations: 1) the limited size and coverage of datasets often fail to faithfully reflect the true weaknesses of models; 2) procedures such as pretraining may introduce data leakage, resulting in potential biases in the demonstrated performance. To address these issues, this study proposes a general visual hard sample mining algorithm based on maximum discrepancy competition, which automatically mines real hard samples to reveal models’ deficiencies. The proposed algorithm follows the principle of “comparing models through competition” and optimizes the discovery of potential hard samples by jointly exploiting the intra-task and cross-task prediction dissimilarities, aiming to provide new test benchmarks for the field of computer vision in a controllable and efficient manner. Experimental results demonstrate that the constructed benchmark named GHS-CV exposes models’ weaknesses more effectively than single-task hard sample benchmarks (i.e., the semantic segmentation hard sample set SS-C and the salient object detection hard sample set SOD-C). Specifically, compared to DeepLabv3+ on SS-C, the mIoU drops by about 20% on GHS-CV, while compared to VST on SOD-C, the Fβ decreases by about 36%.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007552
    Abstract:
    Fault localization is one of the most expensive, tedious, and time-consuming activities in software debugging, and it is also an indispensable step in software maintenance. Due to the variability of faults, fault localization is even more challenging in software product lines. Although significant progress has been made in fault localization for single-system software, research on fault localization for variability in software product lines is still insufficient. Meanwhile, existing methods face challenges such as low efficiency and poor root cause localization due to the issues of repeated generation and checking of feature interactions, as well as the propagation of faults between program statements. To address this, this study proposes an efficient and accurate fault localization method for software product lines, which performs localization at both the feature level and the statement level. At the feature level, based on observations of inclusion relationships and identical subsets between suspicious feature selection sets, the method identifies suspicious feature interactions more efficiently. At the statement level, a reduced causal model with mediator variables is used, combining causal effects and spectrum-based effects to achieve more precise fault localization. Four advanced fault localization methods for software product lines are selected, and experiments are conducted on six real-world software product line systems for comparison. The results demonstrate that the proposed method significantly outperforms other mainstream methods in terms of localization efficiency and accuracy.
    Available online:  February 11, 2026 , DOI: 10.13328/j.cnki.jos.007553
    Abstract:
    Spatio-temporal logical analysis refers to accurately expressing spatio-temporal relationships between entities using logical symbols. Traditional spatio-temporal logical analysis adopts two paradigms: closed-domain and open-domain approaches. Closed-domain methods predefine symbolic systems for representing spatio-temporal logic and then translate natural language into logical expressions. While ensuring accurate representation of spatio-temporal relationships, such methods face limitations in handling complex relationships due to the constraints of artificial definitions. Open-domain approaches extract keywords to represent spatio-temporal relationships using natural language itself. Although capable of covering complex relationships, these methods suffer from the semantic ambiguity inherent in natural language, resulting in imprecise logical representations. The purpose of this study is to convert natural language expressions of spatio-temporal relationships into logical language, enabling more precise representation of spatio-temporal information. To address the forementioned issues, this study considered the linguistic observation that spatio-temporal relationships in language are primarily expressed through localizers. By defining the semantics of localizers through logical symbols, the proposed framework aims to overcome both the insufficiency of coverage and the lack of precision. Accordingly, a spatio-temporal logical framework for localizers is established, including 1) the design of annotation specifications that define the logical expression scope of localizers and provide detailed annotation guidelines; 2) manual annotation of 6190 samples from the People’s Daily and CTB datasets to construct a task-specific corpus based on the proposed specifications; 3) application of large language models to perform logical reasoning on localizer-triggered spatio-temporal expressions, achieving an accuracy exceeding 70% based on corpus-driven inference.
    Available online:  February 04, 2026 , DOI: 10.13328/j.cnki.jos.007577
    Abstract:
    In recent years, recommender systems based on graph neural network (GNN) have made good use of the interaction structure of interaction data to learn user and item representations. However, existing recommendation models based on GNN often ignore the temporal information of interactions during aggregation, which makes it difficult to model the change characteristics of users’ interests. As a result, this causes overfitting of the recommendation model to data, and a lack of diversity in the recommendation results, thereby making it difficult to satisfy the more diversified needs of users. To this end, a temporal information-enhanced diversified recommendation model is proposed. First, an attention mechanism is employed to capture and fuse temporal information and interaction information from historical user-item interactions. Meanwhile, a feature disentanglement module is designed to disentangle smoothed global features from salient, highly discriminative key signals to reduce feature redundancy and improve representational clarity. Subsequently, neighbour selection is adopted to highlight inter-node differences and conduct graph convolution, with a layer attention mechanism employed to alleviate over smoothing. Finally, the learning of items in the long-tail category is enhanced by reweighting loss to improve the diversity.
    Available online:  February 04, 2026 , DOI: 10.13328/j.cnki.jos.007578
    Abstract:
    As multimodal multiobjective optimization faces challenges of reasonably defining the individual crowdedness and dynamically balancing the decision space and objective space in individual diversity calculation, there is still significant room for performance improvement in existing multimodal multiobjective optimization algorithms. To this end, this study proposes a multimodal multiobjective differential evolution algorithm based on adaptive individual diversity (MMODE-AID). First, based on the average Euclidean distance of individuals’ nearest neighbors in the decision space or objective space, the crowdedness of individuals can be defined by multiplying the relative distances between individuals, which can more reasonably measure the true crowdedness of each individual in the corresponding space. Second, based on the overall crowdedness of the decision space and objective space, the relative crowdedness of individuals in the corresponding space is obtained, which can reasonably and dynamically balance the influence of the current state of the decision space and objective space on individual diversity calculation during the evolution process, and is conducive to the sufficient search of each equivalent Pareto optimal solution set. By employing differential evolution as the basic optimization framework, MMODE-AID evaluates individual fitness based on adaptive individual diversity. Meanwhile, it can obtain a population with excellent performance in decision space distribution, objective space distribution and convergence during offspring generation and environmental selection. MMODE-AID is compared with seven advanced multimodal multiobjective optimization algorithms on 39 benchmark test problems and one real-world application problem to validate the algorithm’s performance. The experimental results demonstrate that MMODE-AID exhibits significant competitive advantages in solving multimodal multiobjective optimization problems. The source code and original experimental data of MMODE-AID are publicly available on GitHub: https://github.com/CIA-SZU/ZQ.
    Available online:  February 04, 2026 , DOI: 10.13328/j.cnki.jos.007575
    Abstract:
    As a widely employed interpreted language, Python faces performance challenges in execution efficiency. Just-in-time (JIT) compilers have been introduced to the Python ecosystem to dynamically compile bytecode into machine code, significantly improving program operation speed. However, the complex optimization strategies of JIT compilers may introduce program defects, thereby affecting program stability and reliability. Existing fuzz testing methods for Python interpreters struggle to effectively detect deep optimization defects and non-crashing defects in JIT compilers. To this end, this study proposes PjitFuzz, a coverage-guided defect detection method for Python JIT compilers. First, PjitFuzz proposes five mutation rules based on JIT optimization strategies to generate program variants that trigger the optimization strategies of Python JIT compilers. Second, a coverage-guided dynamic mutation rule selection method is designed to integrate the advantages of different mutation rules and generate diverse program variants. Third, a checksum-based code block insertion strategy is developed to effectively record changes in variable values during program execution and detect inconsistency in the output. Finally, differential testing is performed by combining different JIT compilation options to effectively detect defects in Python JIT compilers. This study compares PjitFuzz with two state-of-the-art Python interpreter fuzzing methods, FcFuzzer and IFuzzer. The experimental results show that PjitFuzz improves defect detection capability by 150% and 66.7% respectively, and outperforms existing methods in terms of code coverage by 28.23% and 15.68% respectively. For the validity rate of generated test programs, PjitFuzz outperforms the comparative methods by 42.42% and 62.74% respectively. In an eight-month experiment, PjitFuzz has discovered and reported 16 defects, 12 of which have been confirmed by developers.
    Available online:  February 04, 2026 , DOI: 10.13328/j.cnki.jos.007572
    Abstract:
    As a superset of JavaScript, TypeScript provides a rich set of features, such as static type support and object-oriented programming capabilities. It is widely adopted by many mainstream frameworks such as Angular, Vue, and React, and has become a core technology for building large-scale applications. Its compiler is responsible for compiling TypeScript codes into standard JavaScript codes. However, the TypeScript compiler itself may contain bugs, resulting in unexpected errors in the generated JavaScript code. Although numerous studies have been conducted on JavaScript engine testing, there has been no systematic study dedicated to testing the TypeScript compiler. Existing JavaScript engine testing methods have difficulty in generating a large number of TypeScript programs with specific types and effectively mutating these types, thus making it difficult to detect bugs related to complex type systems in the TypeScript compiler. To this end, a TypeScript compiler testing framework based on syntax and type mutation TscFuzz is proposed. To obtain a large number of seed programs containing specific types of TypeScript, TscFuzz designs a set of prompts tailored to the unique type system of TypeScript compared to JavaScript, with the large language model (LLM) guided to generate a series of programs featuring these specific types. Next, a set of type-specific mutation operators are designed to conduct targeted testing on the type system of TypeScript via type mutation. Finally, based on differential testing of the cross-version strategy, TscFuzz compares the outputs of different versions of the TypeScript compiler to detect bugs. Additionally, Node.js is employed to verify the semantic correctness of the JavaScript programs output by the compiler. Experimental results demonstrate that TscFuzz detects five bugs within 72 hours, two and three bugs more than the baseline methods DIE and FuzzJIT, respectively. The bug detection effect of TscFuzz is significantly better than that of the baseline methods. Meanwhile, after three months of testing, TscFuzz successfully identifies 12 real TypeScript bugs, eight of which have been confirmed and seven have been repaired.
    Available online:  January 21, 2026 , DOI: 10.13328/j.cnki.jos.007562
    [Abstract] (197) [HTML] (432) [PDF 3.93 M] (274)
    Abstract:
    The current software market is witnessing an intensified trend of product homogenization, where functional innovation has become a decisive factor in maintaining competitive advantage. This shift has transformed the paradigm of modern requirements engineering from passive requirements extraction to proactive creative requirements capture. Existing approaches to enhancing requirements creativity primarily follow two paths: (1) fostering collaborative innovation in workshops through scenario modeling and facilitation methods, and (2) rapidly generating novel solutions by deconstructing and recombining existing requirements based on combinatorial innovation theory. However, both methods face a core challenge in balancing innovation quality with participation costs. The breakthrough advancements in generative AI technologies offer new opportunities to address this dilemma. This study proposes a business modeling-driven human-AI multi-agent collaborative framework with TRIZ infusion for creative requirements capture (BMHACT). The framework adopts the unified process business modeling collaborative architecture to design prompt-based definitions for five agent roles: business process analyst, business designer, and other relevant roles. The multi-agent team collaboratively generates creative requirements through a structured workflow: system vision collection→process pain point identification→technical contradiction analysis→TRIZ innovation principle matching→requirement solution generation. Domain experts and client representatives then evaluate the requirements for creativity. An empirical study on a portal system for a small-scale mechanical manufacturing enterprise demonstrates that, compared to the requirement reuse-based method and the adversarial-sample-based retrospective requirement generation method, BMHACT reduces iteration cycles by 50% and 28.6%, shortens total process duration by 66.7% and 33.3%, increases the clarity novelty usefulness (CNU) by 22.9% and 10.7%, and achieves a 2.16× and 2.14× higher per-round CNU improvement rate. These results validate BMHACT’s superiority in enhancing requirements innovation quality while reducing collaboration costs.
    Available online:  January 21, 2026 , DOI: 10.13328/j.cnki.jos.007472
    [Abstract] (233) [HTML] (380) [PDF 5.72 M] (321)
    Abstract:
    The heuristic test case generation method that combines machine learning-related technologies can significantly improve the test efficiency. Existing studies focus on building efficient surrogate models with partial test cases, but ignore the influence of both the initial population quality and surrogate models on the multi-path testing efficiency. Therefore, this study proposes a test case reduction and generation method combining K-means and support vector machine regression (SVR). The randomly generated test cases are clustered into several clusters by adopting K-means, and only the test cases that are within a particular distance away from the cluster center are retained, with the path coverage matrix for these test cases constructed. This matrix is employed to evaluate the path coverage potential of test cases and the coverage difficulty of paths. Additionally, based on these two conditions, the test cases are ranked, and several test cases are selected from different clusters to construct the test case reduction set, which is taken as the initial genetic population. This not only increases the diversity of the initial population and reduces its redundancy, but also helps to reduce the iteration number for multi-path coverage test cases. Meanwhile, the test cases before clustering and their fitness are employed as the samples to train the SVR fitness prediction model designed for multi-path coverage, and then the new test cases generated by genetic evolution are utilized to update the model, thus improving the model accuracy and reducing the time consumed due to the instrumentation program execution. In this way, both population quality and test efficiency can be improved. The experimental results show that on fifteen programs, the proposed method has better improvements in terms of indicators such as the coverage rate and average evolutionary generation. Specifically, in terms of the coverage rate, the proposed method demonstrates an improvement of at least 7% and up to 49% compared to three types of baseline methods, and shows the enhancement of approximately 10% to a maximum of 25% compared to five competitive methods. The proposed method provides guidance for the research on multi-path testing that combines machine learning.
    Available online:  January 14, 2026 , DOI: 10.13328/j.cnki.jos.007536
    Abstract:
    Scade is a well-known commercial tool widely used in the development of safety-critical embedded control software, whose modeling language is a synchronous language extended from Lustre, a synchronous data-flow language. Correct compilation of synchronous languages, including Lustre, has attracted much attention in recent years, and has been addressed in many studies through formal verification. To build a formally verified compiler for such a language, it is a common practice to compile the source program into a C-like program first, and then to compile it into low-level machine-dependent code using a formally verified backend compiler such as the CompCert compiler, where the correct compilation of temporal operators is crucial. In this study, the formally verified compilation of Scade-like temporal operators is introduced, which is used in a formally verified compiler projects, where a Lustre-extended synchronous language is translated into the front-end intermediate language Clight in the CompCert compiler. The compilation and formal verification of temporal operators are divided into two key stages, which are implemented in the interactive proof assistant Coq.
    Available online:  January 14, 2026 , DOI: 10.13328/j.cnki.jos.007558
    Abstract:
    K-clique enumeration is an important problem in subgraph matching, and the bitmap algorithm has been proven to be an effective method for solving the K-clique enumeration problem. Currently, state-of-the-art K-clique enumeration algorithms are accelerated by GPU. Previous studies have not investigated the impact of sparsity in real-world graph data on bitmap-based K-clique enumeration algorithms. Instead, static parallelization methods and bitmap construction strategies are commonly used on GPU, which result in low computational efficiency. This study proposes a thread-parallel load-balancing scheduling algorithm for bitmap tasks, which resolves the thread divergence problem while achieving high parallelism in the bitmap algorithm. Furthermore, it introduces a dynamic bitmap construction algorithm, enabling bitmaps to be constructed and activated at appropriate times for efficient execution of the bitmap algorithm. A GPU-friendly K-clique enumeration system, KCMiner, is implemented, which adaptively selects optimization strategies for K-clique enumeration tasks. Experimental results on GPU platforms show that the proposed method achieves up to 7.36 times speedup over the baseline K-clique enumeration algorithm and up to 30.2 times speedup over the baseline subgraph matching system.
    Available online:  January 14, 2026 , DOI: 10.13328/j.cnki.jos.007559
    Abstract:
    The rapid development of quantum computers poses significant threats to existing cryptographic systems. The implementation and migration of post-quantum cryptographic algorithms are therefore of utmost importance. Among these, NTRU lattice-based cryptographic schemes have gained attention due to their simplicity and computational efficiency. The CTRU-Prime scheme, based on NTRU lattices, stands out for its excellent performance in security, bandwidth, and implementation efficiency. Given the powerful capabilities of GPUs in handling large-scale parallel processing tasks, this study presents the first high-throughput implementation of CTRU-Prime using Tensor Core and compute unified device architecture (CUDA) Core. The underlying algebraic structure of CTRU-Prime is large-Galois-group prime-degree prime-ideal number field (LPPNF), which not only resists attacks targeting cyclotomic rings but also presents challenges for the implementation of polynomial multiplication. First, two GPU implementations of polynomial multiplication over LPPNF are proposed. The CUDA Core-based Pseudo-Mersenne incomplete NTT polynomial multiplication uses layer fusion techniques to optimize memory access patterns, achieving a throughput of 256.98 times. The Tensor Core-based schoolbook polynomial multiplication converts polynomial multiplication into matrix operations, leveraging low-precision matrix-multiply-and-accumulate (MMA) operations, achieving a throughput of 177.24 times. Next, an overall architecture for CTRU-Prime on the GPU platform is presented, focusing on throughput. This architecture combines batch mode and single mode, multi-stream technology, and multi-thread techniques. Optimization strategies such as fused kernels, coalesced global memory access, and optimized memory access patterns are employed to accelerate memory access and computation speeds of various kernel functions. Experimental results show that, on the RTX 3060 platform, CTRU-Prime-653, CTRU-Prime-761, and CTRU-Prime-1277 can perform key generation at rates of 63000, 54000, and 16000 times per second, respectively; key encapsulation at rates of 635000, 2745000, and 1601000 times per second, respectively; and key decapsulation at rates of 351000, 2622000, and 1524000 times per second, respectively. These rates are 68.85, 79.78, and 66.84 times higher for key generation, 10.32, 46.57, and 46.81 times higher for key encapsulation, and 11.43, 89.19, and 90.32 times higher for key decapsulation compared to the C implementation. Compared to the latest Kyber implementation, the key encapsulation throughput is 1.46 times higher, and the key decapsulation throughput is 1.74 times higher, making it 26 times more efficient than other high-throughput NTRU lattice-based GPU implementations.
    Available online:  January 07, 2026 , DOI: 10.13328/j.cnki.jos.007502
    [Abstract] (226) [HTML] (387) [PDF 1.16 M] (327)
    Abstract:
    With the rapid development of 5G technology, the 5G-AKA protocol, as the core security mechanism of 5G technology, has caught widespread attention. Although the deployment of the 5G-AKA protocol has promoted the high-speed interconnection of communication networks, it has also raised users’ concerns about privacy leakage. During the protocol interaction, operators will collect a large amount of data, and once the data is leaked, it will pose a serious threat to users. Therefore, this study proposes an anonymous authentication and key agreement protocol based on SM2 to enhance the privacy of the user authentication process and minimize the disclosure of user information. It extends the Chinese cryptographic SM2 digital signature algorithm to achieve the signature of multiple messages, combines the ElGamal algorithm to encrypt the user’s identity, and adopts zero-knowledge proof technology to ensure the anonymity of the user credentials, thereby achieving the anonymous authentication of the user’s identity. The protocol protects the identity privacy of legitimate users in network activities and effectively blocks the illegal acquisition of user information. Additionally, the protocol holds the accountability for malicious users, allowing authorized regulatory agencies to restore the user’s identity in a legal process. Finally, protocol experimental evaluations are conducted, with deployment and implementation carried out on Windows and Raspberry Pi 4B platforms. The evaluation results show that the consumed time of the anonymous authentication and key agreement process is at the millisecond level, fully demonstrating the efficiency and practicality of this protocol.
    Available online:  January 07, 2026 , DOI: 10.13328/j.cnki.jos.007554
    [Abstract] (195) [HTML] (355) [PDF 1.82 M] (310)
    Abstract:
    The popularization of GPS mobile devices and 5G Internet technology has led to the rapid growth of trajectory data. How to efficiently store, manage, and analyze massive trajectory data has become a hot research issue in the current environment. The traditional single-node trajectory index is limited by memory capacity, disk I/O speed, and other factors, and is no longer capable of managing large-scale trajectory data. Spark, as a distributed framework based on in-memory computing, has natural advantages in processing massive data. Therefore, this study proposes a distributed trajectory data indexing and query scheme based on the Spark platform. To improve the data storage capacity of a single node in a distributed cluster and the efficiency of trajectory queries, a trajectory encoding technique, Z-order trajectory encoding (ZTE), is proposed. This technique encodes the minimum adjacent subspaces covered by the trajectory minimum bounding rectangle (MBR), which can represent trajectories of different granularities and their movement directions, and is used to determine the relationship between a trajectory and the query space. Based on this technique, this study further organizes the ZTE codes of trajectories into a partial-order structure and designs a subspace partial-order branch (SPB). Combined with the hash mapping table IDMap, a local index is constructed. This index avoids the inefficiency caused by the dead space formed by the overlapping of minimum bounding rectangles in R-tree-like indexes and enables fast pruning. To support efficient retrieval of massive trajectory data, the study designs a distributed trajectory index named SPBSpark based on the SPB-branch local index. SPBSpark mainly consists of three components: data partition, local index, and global index. The proposed index effectively supports three types of queries: spatiotemporal range query, k-nearest neighbor query, and moving object trajectory query. Finally, the study selects the distributed trajectory indexes TrajSpark and LocationSpark, which are also based on the Spark framework, as comparison systems. Through comparative simulation experiments, the spatial utilization of the SPBSpark index is improved by about 15% compared with LocationSpark. In terms of query performance, SPBSpark achieves a 2–3 times performance improvement compared with TrajSpark and LocationSpark.
    Available online:  January 07, 2026 , DOI: 10.13328/j.cnki.jos.007555
    [Abstract] (165) [HTML] (377) [PDF 5.24 M] (304)
    Abstract:
    Crowd intelligence is a crucial component of the next generation of artificial intelligence. Researching how to stimulate and converge the innovative power of “people” in open-source communities can significantly enhance development efficiency. Community detection, as a technical approach to studying the relationships among developers in open-source projects, plays a vital role in exploring and understanding social networks. However, current research has predominantly focused on large-scale social networks such as Facebook, while systematic studies on community detection in project-level open source software developer social networks (OSS-DSN) remain limited. This study first collects real-world data and analyzes the features of OSS-DSN. Then, it benchmarks several overlapping and non-overlapping community detection algorithms on these real datasets, comparing algorithm performance across multiple metrics and dimensions. Finally, based on synthetic OSS-DSN, it generates networks efficiently and performs algorithm evaluations using ground-truth data for comparative analysis. Differences in characteristics between small- and medium-scale social networks and large-scale networks are identified, and the influence of these differences on community detection metrics and algorithm performance is explored. The study provides a new benchmark and offers important insights into communication and collaboration in open-source software communities.
    Available online:  January 07, 2026 , DOI: 10.13328/j.cnki.jos.007556
    [Abstract] (163) [HTML] (452) [PDF 2.34 M] (361)
    Abstract:
    Many code files become oversized and take on excessive responsibilities as software evolves, which severely affects software maintainability and comprehensibility. Developers often need to refactor such files by decomposing a large code file into several smaller ones. Existing studies mainly focus on class file decomposition and are not fully applicable to decomposing complex header files. This is because header file decomposition faces unique challenges. It needs to consider the build dependencies of the entire software project to reduce compilation cost and ensure that the decomposed files are free of cyclic dependencies. To address these challenges, this study proposes an automated approach for decomposing and refactoring complex header files, HeaderSplit. It first constructs a code element graph that captures multiple types of code relationships, including co-usage relationships that reflect project build dependencies. Then, a node coarsening process and a multi-view graph clustering algorithm are applied to identify clusters of closely related code elements. A heuristic algorithm is further introduced to eliminate cyclic dependencies in the clustering results. After the decomposition plan is confirmed, HeaderSplit automatically performs the refactoring, generating new sub-header files and updating the include statements in all code files that directly or indirectly include the original header file. HeaderSplit is evaluated on both synthetic and real complex header files. The results are as follows. 1) HeaderSplit improves accuracy by 11.5% compared with existing methods and demonstrates higher cross-project stability. 2) The decomposed sub-files have higher Modularity and no cyclic dependencies, indicating better architectural design. 3) Using HeaderSplit to decompose complex header files can reduce recompilation costs in their evolution history by15%–60%. 4) HeaderSplit efficiently performs automated refactoring, completing the decomposition and refactoring of header files in large-scale software projects with millions of lines of code within five minutes, showing high practical value.
    Available online:  December 24, 2025 , DOI: 10.13328/j.cnki.jos.007557
    Abstract:
    In software engineering, eliciting non-functional requirements (NFR) remains a critical yet often overlooked task in requirements engineering practice. Traditional NFR elicitation methods predominantly rely on the experience and manual analysis of requirements engineers, leading to inefficiency, omissions, and inconsistencies. Recent breakthroughs in large language models (LLM) in natural language processing have provided new technological means for the automated NFR elicitation. However, directly employing LLM for NFR generation often faces challenges such as hallucination and insufficient domain expertise. To address these issues, this study proposes an automated NFR elicitation method based on LLM to achieve high-quality NFR generation. A structured and correlated dataset comprising 3856 functional requirements and 5723 NFR is constructed, establishing 22647 FR-NFR association pairs. The proposed method integrates retrieval-augmented generation (RAG) technology through three core modules: a semantic case retrieval module based on the maximum marginal relevance algorithm, a prompt engineering module designed for NFR generation, and an optimized LLM generation module. Through professional evaluation by software engineering experts and automatic metrics including BLEU and ROUGE, experimental results demonstrate that the proposed method outperforms existing approaches in terms of completeness, accuracy, and testability of requirements.
    Available online:  December 24, 2025 , DOI: 10.13328/j.cnki.jos.007534
    Abstract:
    With the rapid advancement of deep learning and computer vision, grayscale image colorization has evolved from traditional handcrafted feature-based methods to data-driven deep neural network paradigms. However, existing evaluation systems for grayscale image colorization models face the following two challenges: First, due to the limitations of evaluation metrics and the highly ill-posed nature of the colorization task, traditional quantitative metrics such as PSNR, SSIM, and FID cannot effectively quantify the performance of grayscale image colorization models. Second, it is time-consuming, laborious, and infeasible to conduct qualitative analyses through large-scale subjective experiments. To address these issues, a new evaluation method for grayscale image colorization models based on hard sample mining is proposed. The method aims to efficiently identify representative samples for model comparison through multi-dimensional evaluation (including image quality, aesthetics epression, and color difference), and then conduct a controlled small-scale subjective experiment to reliably compare different models. Subsequently, the advantages and shortcomings of the models are revealed. Experimental results show that the proposed method can efficiently and accurately find hard samples, and reveal the strengths and weaknesses of the models while drastically reducing the scale of subjective experiments, providing a new paradigm for grayscale image colorization model evaluation and indicating the direction for model optimization.
    Available online:  December 17, 2025 , DOI: 10.13328/j.cnki.jos.007497
    Abstract:
    The widespread adoption of blockchain technology has driven the development of multi-chain applications, creating a need for cross-chain technology to address information isolation across different blockchains. However, when a large number of transactions occur concurrently across blockchains, existing cross-chain technologies are unable to process them in parallel, resulting in low scalability. Blockchain sharding offers a potential solution, but its impact on scalability is limited by inefficient transaction allocation and cross-chain transaction methods. Therefore, this study proposes a two-phase adaptive transaction allocation model for a relay chain sharding environment. In the first phase, the model generates an allocation scheme to reduce cross-shard transactions and balance shard load with performance. In the second phase, it fine-tunes transactions in unstable queues after allocation to mitigate delays caused by load surges. In the first stage, this study also includes a transaction allocation prediction method that leverages historical cross-chain data to forecast transaction size and volume, calculating load based on these predictions and transaction throughput. An inter-shard allocation method further refines transaction distribution. In the second stage, the relay chain directs transactions to specific shards based on the allocation scheme, adapting dynamically if load surges lead to a mismatch between shard load and performance. A stability analysis method assesses transaction queue changes, allowing for fine-tuning across shards to reduce waiting times and increase throughput. Experimental results show that this model significantly improves transaction throughput and reduces processing delays compared to existing methods.
    Available online:  November 26, 2025 , DOI: 10.13328/j.cnki.jos.007503
    Abstract:
    Unlearning has significant application value in safeguarding privacy, mitigating the impact of contaminated samples, and processing redundant data. However, existing unlearning methods are mostly applied to black-box models such as neural networks, while achieving efficient single-class and multi-class unlearning in interpretable TSK fuzzy classification systems remains challenging. To address this, this study proposes a TSK fuzzy unlearning method for classification (TSK-FUC). First, the rule base is divided into three subsets using the normalized activation strengths of rule antecedent parameters on the (single/multi-class) forgotten data: 1) a deleted rule set that is highly relevant to the forgotten data, 2) a retained rule set with low relevance to the forgotten data, and 3) an updated rule set showing overlapping relevance to both the retained and forgotten data. Subsequently, differential processing strategies are applied: the deleted rule set is directly removed to eliminate major information residues and reduce the number of system parameters; the retained rule set is fully preserved to reduce parameter adjustment scope during unlearning; and for the updated rules, class-specific noise is added to the consequent parameters to further eliminate information related to the forgotten data, thus achieving single-class and multi-class unlearning. Experimental results on 16 benchmark datasets demonstrate that TSK-FUC accurately partitions the rule space and exhibits effective single-class and multi-class unlearning performance through differentiated processing in both 0-order and 1-order established TSK fuzzy classification systems. This method maintains the interpretability of the rule base while rendering the TSK fuzzy classification system more lightweight in terms of structure after unlearning.
    Available online:  November 26, 2025 , DOI: 10.13328/j.cnki.jos.007505
    [Abstract] (302) [HTML] (0) [PDF 2.55 M] (1407)
    Abstract:
    HTAP databases are capable of simultaneously supporting OLTP and OLAP workloads within a set of systems. The workload identification is a critical entry point for routing distribution in query execution. The only way to reasonably optimize the queries and allocate resources is to accurately identify whether a query belongs to OLTP or OLAP. Therefore, accurate identification of workload types is a key factor in the performance of HTAP databases. However, existing workload identification methods are mainly based on rules and cost-based measures in SQL statements, as well as machine learning approaches to differentiate workloads. These methods do not consider the inherent characteristics of query statements and utilize structural information in execution plans, resulting in low workload identification accuracy. To improve workload identification accuracy, this study proposes an intelligent method for identifying OLTP and OLAP workloads. This method extracts and encodes features from SQL statements and execution plans, builds the SQL statement encoder based on BERT, and combines the convolutional neural networks and attention mechanisms to construct the encoder of execution plans, with two types of features integrated to build a classifier. The model enables intelligent identification of workloads in HTAP hybrid workloads. Experimental verification shows that the proposed model can accurately identify OLTP and OLAP workloads with high identification accuracy. Additionally, the robustness of the model has been validated across multiple datasets, and the model is integrated into the TiDB database to verify its performance improvement on the database.
    Available online:  November 20, 2025 , DOI: 10.13328/j.cnki.jos.007501
    [Abstract] (181) [HTML] (463) [PDF 671.62 K] (532)
    Abstract:
    With the growing demand for wireless communication quality in high-speed railway (HSR), ensuring communication reliability in high-mobility scenarios has become a critical challenge. Constructing a reliable channel model is the key to addressing this issue. To build a highly general and reliable channel model, composite wireless communication channel modeling requires full consideration of the actual operating environment and channel propagation characteristics. With rigorous mathematical modeling and logical reasoning capabilities, the formal method demonstrates significant advantages in complex wireless channel modeling. Focusing on the typical HSR communication scenario of viaducts, this study proposes a high-order logic model of composite wireless communication channels based on a small-scale fading model using the formal method. To address the long-tail characteristic of composite channels, the theorem proving technique is used to verify that the probability density function (PDF) of the composite wireless communication channel conforms to the distribution of the modified Bessel function of the second kind.
    Available online:  November 05, 2025 , DOI: 10.13328/j.cnki.jos.007489
    [Abstract] (341) [HTML] (480) [PDF 1.36 M] (449)
    Abstract:
    The propositional satisfiability problem (SAT) and the satisfiability modulo theories problem (SMT) are fundamental problems in computer science, with significant applications in circuit design, software analysis and verification, and other fields. At present, extensive research has been conducted on their solving techniques. In practical applications, SAT/SMT solvers often need to solve a series of closely related formulas. Compared to solving each problem from scratch using an independent solver, incremental solving techniques can reuse previously obtained search information, including previous solutions and learned clauses, thus effectively improving solving efficiency. Currently, incremental SAT/SMT solving has received extensive attention and research, and has been successfully applied in fields such as bounded model checking, symbolic execution, and the maximum satisfiability problem (MaxSAT). This study provides a detailed review and categorization of incremental SAT/SMT solving techniques, covering both complete and incomplete algorithms. In addition, the applications of incremental SAT/SMT solving techniques in practical scenarios are comprehensively summarized. Finally, the development directions in this field are summarized and discussed.
    Available online:  October 29, 2025 , DOI: 10.13328/j.cnki.jos.007492
    [Abstract] (217) [HTML] (550) [PDF 1.39 M] (912)
    Abstract:
    The 12-lead electrocardiogram (ECG) is the most commonly used signal source for testing cardiac activity, and its automatic classification and interpretability are crucial for the early screening and diagnosis of cardiovascular diseases. Most ECG classification studies focus on single-label classification, where each ECG record corresponds to only one type of cardiac dysfunction. However, in clinical practice, patients with cardiovascular diseases often have multiple concurrent heart diseases, making multi-label ECG classification more aligned with real-world needs. Existing deep learning-based multi-label ECG classification methods have mostly concentrated on label correlation analyses or neural network modifications, neglecting the fundamental issue in multi-label learning: the inherent imbalance between positive and negative labels. To address this issue, this study proposes a novel strategy that balances positive and negative labels during training by pushing away only one pair of labels each time. Specifically, it maximizes the margin between positive and negative labels and derives a new loss function to mitigate the imbalance issue. Furthermore, to address the insufficiency of interpretability in existing ECG methods, which hinders diagnostic assistance, the study introduces a temporal saliency rescaling method to visualize the experimental results of the proposed method, aiding in the localization and interpretation of different diseases. Experiments conducted on the PhysioNet Challenge 2021 ECG dataset, which includes 8 subsets, demonstrate that the proposed method outperforms state-of-the-art multi-label ECG classification methods.
    Available online:  October 29, 2025 , DOI: 10.13328/j.cnki.jos.007477
    [Abstract] (283) [HTML] (694) [PDF 1.10 M] (1245)
    Abstract:
    With the rapid development of the HarmonyOS ecosystem, security issues related to HarmonyOS applications have gradually become a key research focus. In the Android domain, various mature static analysis frameworks have been widely applied to security detection tasks. However, static analysis frameworks for HarmonyOS applications are still in the early stages of development. The OpenHarmony community is currently working on static analysis based on the source code of HarmonyOS applications using ArkTS. However, in practical security detection tasks, obtaining application source code is often difficult, which limits the applicability of this approach. To address this challenge, this study proposes a static analysis framework for HarmonyOS applications based on the Ark intermediate representation (Panda IR). This framework provides basic information interfaces for Panda IR, designs a field-sensitive pointer analysis algorithm tailored to ArkTS syntax features, and implements extended analysis interfaces that interact with pointer analysis. Specifically, 318 instructions in Panda IR are semantically categorized and processed, and a customized pointer flow graph design is further developed. To support ArkTS syntax features, new propagation rules for pointer sets are introduced, and the semantics of special calls are accurately modeled. In addition, based on the pointer analysis results, inter-procedural data dependencies are optimized, and alias analysis capabilities are provided.The experimental evaluation of HarmonyFlow covers three aspects: ArkTS syntax feature coverage, pointer analysis accuracy, and pointer analysis speed. Experimental results show that HarmonyFlow can correctly handle key ArkTS syntax features. The precision and recall rates for call-edge identification in 9 open-source HarmonyOS applications are 98.33% and 92.22%, respectively, with an average runtime of 96 s for 35 real-world HarmonyOS applications.
    Available online:  September 28, 2025 , DOI: 10.13328/j.cnki.jos.007476
    [Abstract] (309) [HTML] (608) [PDF 900.19 K] (1595)
    Abstract:
    The black-box vulnerability scanner is an essential tool for Web application vulnerability detection, capable of identifying potential security threats effectively before a Web application is launched, thus enhancing the overall security of the application. However, most current black-box scanners primarily collect the attack surface through user operation simulation and regular expression matching. The simulation of user operations is vulnerable to interception by input validation mechanisms and struggles with handling complex event operations, while regular expression matching is ineffective in processing dynamic content. As a result, the scanner cannot effectively address hidden attack surfaces within JavaScript code or dynamically generated attack surfaces, leading to suboptimal vulnerability detection in some Web applications. To resolve these issues, this study proposes a JavaScript Exposure Scanner (JSEScan), a vulnerability scanner enhancement framework based on JavaScript code analysis. The framework integrates static and dynamic code analysis techniques, bypassing form validation and event-triggering restrictions. By extracting attack surface features from JavaScript code, JSEScan identifies attack surfaces and synchronizes them across multiple scanners, enhancing their vulnerability detection capabilities. The experimental results demonstrate that JSEScan increases coverage by 81.02% to 242.15% compared to using a single scanner and uncovers an additional 239 security vulnerabilities when compared to multiple scanners working concurrently, showing superior attack surface collection and vulnerability detection capabilities.
    Available online:  October 18, 2017
    [Abstract] (3395) [HTML] (0) [PDF 525.21 K] (8225)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and the ACM SigSoft Symposium on The Foundations of Software Engineering (ESEC/FSE),ACM,2017年9月,315-325页. 原文链接如下:https://doi.org/10.1145/3106237.3106242, 读者如需引用该文请标引原文出处。
    Available online:  October 18, 2017
    [Abstract] (3341) [HTML] (0) [PDF 352.38 K] (8708)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and the ACM SigSoft Symposium on The Foundations of Software Engineering (ESEC/FSE),ACM,2017年9月,303-314页. 原文链接如下:https://doi.org/10.1145/3106237.3106239, 读者如需引用该文请标引原文出处。
    Available online:  September 11, 2017
    [Abstract] (3948) [HTML] (0) [PDF 276.42 K] (6522)
    Abstract:
    GitHub, a popular social-software-development platform, has fostered a variety of software ecosystems where projects depend on one another and practitioners interact with each other. Projects within an ecosystem often have complex inter-dependencies that impose new challenges in bug reporting and fixing. In this paper, we conduct an empirical study on cross-project correlated bugs, i.e., causally related bugs reported to different projects, focusing on two aspects: 1) how developers track the root causes across projects; and 2) how the downstream developers coordinate to deal with upstream bugs. Through manual inspection of bug reports collected from the scientific Python ecosystem and an online survey with developers, this study reveals the common practices of developers and the various factors in fixing cross-project bugs. These findings provide implications for future software bug analysis in the scope of ecosystem, as well as shed light on the requirements of issue trackers for such bugs.
    Available online:  June 21, 2017
    [Abstract] (3842) [HTML] (0) [PDF 169.43 K] (5294)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在IEEE Transactions on Software Engineering 2017 已录用待发表. 原文链接如下:http://ieeexplore.ieee.org/document/7792694, 读者如需引用该文请标引原文出处。
    Available online:  June 13, 2017
    [Abstract] (5129) [HTML] (2) [PDF 174.91 K] (5595)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在Proceedings of the 39th International Conference on Software Engineering, Pages 27-37, Buenos Aires, Argentina — May 20 - 28, 2017, IEEE Press Piscataway, NJ, USA ?2017, ISBN: 978-1-5386-3868-2 原文链接如下:http://dl.acm.org/citation.cfm?id=3097373, 读者如需引用该文请标引原文出处。
    Available online:  January 25, 2017
    [Abstract] (4051) [HTML] (0) [PDF 254.98 K] (5952)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2016). ACM, New York, NY, USA, 871-882. DOI: https://doi.org/10.1145/2950290.2950364 原文链接如下:http://dl.acm.org/citation.cfm?id=2950364, 读者如需引用该文请标引原文出处。
    Available online:  January 18, 2017
    [Abstract] (4577) [HTML] (0) [PDF 472.29 K] (5555)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Pages 133—143, Seattle WA, USA, November 2016. 原文链接如下:http://dl.acm.org/citation.cfm?id=2950327, 读者如需引用该文请标引原文出处。
    Available online:  January 04, 2017
    [Abstract] (4311) [HTML] (0) [PDF 293.93 K] (5963)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE'16), 810 – 821, November 13 - 18, 2016. 原文链接如下:https://doi.org/10.1145/2950290.2950310, 读者如需引用该文请标引原文出处。
    Available online:  January 04, 2017
    [Abstract] (4678) [HTML] (0) [PDF 244.61 K] (6871)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在FSE 2016, 原文链接如下:http://dl.acm.org/citation.cfm?doid=2950290.2950313, 读者如需引用该文请标引原文出处。
    Available online:  December 12, 2016
    [Abstract] (4100) [HTML] (0) [PDF 358.69 K] (5459)
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在FSE'16会议上Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 原文链接如下:http://dl.acm.org/citation.cfm?id=2950340, 读者如需引用该文请标引原文出处。
    Available online:  September 30, 2016
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 文章发表在ASE2016会议上http://ase2016.org/ 原文链接如下:http://dl.acm.org/citation.cfm?id=2970366 读者如需引用该文请标引原文出处。
    Available online:  September 09, 2016
    Abstract:
    文章由CCF软件工程专业委员会白颖教授推荐。 俊杰的文章发表在ASE2016会议上,http://ase2016.org/。 原文链接如下:http://dl.acm.org/citation.cfm?doid=2970276.2970300 请读者标引时请引注原文出处。
    Available online:  September 07, 2016
    Abstract:
    CCF 软件工程专业委员会白晓颖教授(清华大学)推荐。 原文发表在 ASE 2016 Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering。 全文链接:http://dx.doi.org/10.1145/2970276.2970307。 重要提示:读者如引用该文时请标注原文出处。
    Available online:  August 29, 2016
    Abstract:
    CCF软件工程专业委员会白晓颖教授(清华大学)推荐。 该论文发表在ACM Transactions on Software Engineering and Methodology (TOSEM, Vol. 25, No. 2, Article 13, May 2016),被ICSE 2016主会邀请为“Journal first”报告, 全文参见http://dl.acm.org/citation.cfm?id=2876443。 论文作者包括北京大学的周明辉,马秀娟,张路和梅宏,以及田纳西大学的Audris Mockus。 重要提示:读者如引用该文时请标注原文出处。
  • 全文下载排行(总排行年度排行各期排行)
    摘要点击排行(总排行年度排行各期排行)

  • Article Search
    Search by issue
    Select AllDeselectExport
    Display Method:
    2015,26(6):1356-1372 , DOI: 10.13328/j.cnki.jos.004831
    [Abstract] (2766178) [HTML] (6008) [PDF 877.35 K] (19467)
    Abstract:
    Social recommender systems have recently become one of the hottest topics in the domain of recommender systems. The main task of social recommender system is to alleviate data sparsity and cold-start problems, and improve its performance utilizing users' social attributes. This paper presents an overview of the field of social recommender systems, including trust inference algorithms, key techniques and typical applications. The prospects for future development and suggestions for possible extensions are also discussed.
    2019,30(1):22-32 , DOI: 10.13328/j.cnki.jos.005648
    [Abstract] (599804) [HTML] (5735) [PDF 310.24 K] (9936)
    Abstract:
    This paper presents several new insights into system software, which is one of the basic concepts in computing discipline, from three perspectives of essential features, characteristics of the times, and the future development trend. The first insight is that system software stems theoretically and technically from universal Turing machine and the idea of stored-program, with an essential feature of "manipulating the execution of a computing system". There are two typical manipulation modes:encoding and then loading, executing and controlling. The second insight is that software system is a kind of software, in the Internet age, providing substantial online services continuously, which lay the foundation for the newly emerged "software-as-a-service" paradigm. The final insight is about its development trend:system software will evolve online continuously. Driven by innovations of computing systems, integration of cyber and physical spaces, and intelligence technologies, system software will become the core of future software ecology.
    2016,27(6):1328-1348 , DOI: 10.13328/j.cnki.jos.005004
    [Abstract] (100138) [HTML] (8955) [PDF 816.86 K] (18001)
    Abstract:
    With the rapid development of cloud computing technology, its security issues have become more and more obvious and received much attention in both industry and academia. High security risk is widespread in traditional cloud architecture. Hacking into a virtual machine destroys the availability of cloud services or resources. Un-Trusted cloud storage makes it more difficult to share or search users' private data. The risk of privacy leakage is caused by various outsourcing computation and application requirements. From the perspective of security and privacy preserving technologies in cloud computing, this paper first introduces related research progress of cloud virtualization security, cloud data security and cloud application security. In addition, it analyzes the characteristics and application scopes of typical schemes, and compares their different effectiveness on the security defense and privacy preserving. Finally, the paper discusses current limitations and possible directions for future research.
    2015,26(1):26-39 , DOI: 10.13328/j.cnki.jos.004631
    [Abstract] (44482) [HTML] (5809) [PDF 763.52 K] (24682)
    Abstract:
    In recent years, transfer learning has provoked vast amount of attention and research. Transfer learning is a new machine learning method that applies the knowledge from related but different domains to target domains. It relaxes the two basic assumptions in traditional machine learning: (1) the training (also referred as source domain) and test data (also referred target domain) follow the independent and identically distributed (i.i.d.) condition; (2) there are enough labeled samples to learn a good classification model, aiming to solve the problems that there are few or even not any labeled data in target domains. This paper surveys the research progress of transfer learning and introduces its own works, especially the ones in building transfer learning models by applying generative model on the concept level. Finally, the paper introduces the applications of transfer learning, such as text classification and collaborative filtering, and further suggests the future research direction of transfer learning.
    2015,26(1):62-81 , DOI: 10.13328/j.cnki.jos.004701
    [Abstract] (42766) [HTML] (9284) [PDF 1.04 M] (41580)
    Abstract:
    Network abstraction brings about the naissance of software-defined networking. SDN decouples data plane and control plane, and simplifies network management. The paper starts with a discussion on the background in the naissance and developments of SDN, combing its architecture that includes data layer, control layer and application layer. Then their key technologies are elaborated according to the hierarchical architecture of SDN. The characteristics of consistency, availability, and tolerance are especially analyzed. Moreover, latest achievements for profiled scenes are introduced. The future works are summarized in the end.
    2003,14(7):1282-1291
    [Abstract] (39056) [HTML] (0) [PDF 832.28 K] (87703)
    Abstract:
    Sensor network, which is made by the convergence of sensor, micro-electro-mechanism system and networks technologies, is a novel technology about acquiring and processing information. In this paper, the architecture of wireless sensor network is briefly introduced. Next, some valuable applications are explained and forecasted. Combining with the existing work, the hot spots including power-aware routing and media access control schemes are discussed and presented in detail. Finally, taking account of application requirements, several future research directions are put forward.
    2010,21(3):427-437
    [Abstract] (34492) [HTML] (0) [PDF 308.76 K] (48780)
    Abstract:
    Automatic generation of poetry has always been considered a hard nut in natural language generation.This paper reports some pioneering research on a possible generic algorithm and its automatic generation of SONGCI. In light of the characteristics of Chinese ancient poetry, this paper designed the level and oblique tones-based coding method, the syntactic and semantic weighted function of fitness, the elitism and roulette-combined selection operator, and the partially mapped crossover operator and the heuristic mutation operator. As shown by tests, the system constructed on the basis of the computing model designed in this paper is basically capable of generating Chinese SONGCI with some aesthetic merit. This work represents progress in the field of Chinese poetry automatic generation.
    2016,27(3):691-713 , DOI: 10.13328/j.cnki.jos.004948
    [Abstract] (33954) [HTML] (4983) [PDF 2.43 M] (24644)
    Abstract:
    Learning to rank(L2R) techniques try to solve sorting problems using machine learning methods, and have been well studied and widely used in various fields such as information retrieval, text mining, personalized recommendation, and biomedicine.The main task of L2R based recommendation algorithms is integrating L2R techniques into recommendation algorithms, and studying how to organize a large number of users and features of items, build more suitable user models according to user preferences requirements, and improve the performance and user satisfaction of recommendation algorithms.This paper surveys L2R based recommendation algorithms in recent years, summarizes the problem definition, compares key technologies and analyzes evaluation metrics and their applications.In addition, the paper discusses the future development trend of L2R based recommendation algorithms.
    2013,24(1):91-108 , DOI: 10.3724/SP.J.1001.2013.04292
    [Abstract] (31900) [HTML] (0) [PDF 0.00 Byte] (19202)
    Abstract:
    Mobile recommender systems have recently become one of the hottest topics in the domain of recommender systems. The main task of mobile recommender systems is to improve the performance and accuracy along with user satisfaction utilizing mobile context, mobile social network and other information. This paper presents an overview of the field of mobile recommender systems including key techniques, evaluation and typical applications. The prospects for future development and suggestions for possible extensions are also discussed.
    2011,22(1):71-83 , DOI: 10.3724/SP.J.1001.2011.03958
    [Abstract] (31598) [HTML] (0) [PDF 781.42 K] (65915)
    Abstract:
    Cloud Computing is the fundamental change happening in the field of Information Technology. It is a representation of a movement towards the intensive, large scale specialization. On the other hand, it brings about not only convenience and efficiency problems, but also great challenges in the field of data security and privacy protection. Currently, security has been regarded as one of the greatest problems in the development of Cloud Computing. This paper describes the great requirements in Cloud Computing, security key technology, standard and regulation etc., and provides a Cloud Computing security framework. This paper argues that the changes in the above aspects will result in a technical revolution in the field of information security.
    2018,29(2):340-362 , DOI: 10.13328/j.cnki.jos.005391
    [Abstract] (31342) [HTML] (5862) [PDF 2.44 M] (15942)
    Abstract:
    With the increasing of social network, social recommendation becomes hot research topic in recommendation systems. Matrix factorization based (MF-based) recommendation model gradually becomes the key component of social recommendation due to its high expansibility and flexibility. Thus, this paper focuses on MF-based social recommendation methods. Firstly, it reviews the existing social recommendation models according to the model construction strategies. Next, it conducts a series of experiments on real-world datasets to demonstrate the performance of different social recommendation methods from three perspectives including whole-users, cold start-users, and long-tail items. Finally, the paper analyzes the problems of MF-based social recommendation model, and discusses the possible future research directions and development trends in this research area.
    2016,27(1):45-71 , DOI: 10.13328/j.cnki.jos.004914
    [Abstract] (31320) [HTML] (6597) [PDF 880.96 K] (46055)
    Abstract:
    Android is a modern and most popular software platform for smartphones. According to report, Android accounted for a huge 81% of all smartphones in 2014 and shipped over 1 billion units worldwide for the first time ever. Apple, Microsoft, Blackberry and Firefox trailed a long way behind. At the same time, increased popularity of the Android smartphones has attracted hackers, leading to massive increase of Android malware applications. This paper summarizes and analyzes the latest advances in Android security from multidimensional perspectives, covering Android architecture, design principles, security mechanisms, major security threats, classification and detection of malware, static and dynamic analyses, machine learning approaches, and security extension proposals.
    2008,19(1):48-61
    [Abstract] (30206) [HTML] (0) [PDF 671.39 K] (69395)
    Abstract:
    The research actuality and new progress in clustering algorithm in recent years are summarized in this paper. First, the analysis and induction of some representative clustering algorithms have been made from several aspects, such as the ideas of algorithm, key technology, advantage and disadvantage. On the other hand, several typical clustering algorithms and known data sets are selected, simulation experiments are implemented from both sides of accuracy and running efficiency, and clustering condition of one algorithm with different data sets is analyzed by comparing with the same clustering of the data set under different algorithms. Finally, the research hotspot, difficulty, shortage of the data clustering and some pending problems are addressed by the integration of the aforementioned two aspects information. The above work can give a valuable reference for data clustering and data mining.
    2009,20(5):1337-1348
    [Abstract] (29704) [HTML] (0) [PDF 1.06 M] (51515)
    Abstract:
    This paper surveys the current technologies adopted in cloud computing as well as the systems in enterprises. Cloud computing can be viewed from two different aspects. One is about the cloud infrastructure which is the building block for the up layer cloud application. The other is of course the cloud application. This paper focuses on the cloud infrastructure including the systems and current research. Some attractive cloud applications are also discussed. Cloud computing infrastructure has three distinct characteristics. First, the infrastructure is built on top of large scale clusters which contain a large number of cheap PC servers. Second, the applications are co-designed with the fundamental infrastructure that the computing resources can be maximally utilized. Third, the reliability of the whole system is achieved by software building on top of redundant hardware instead of mere hardware. All these technologies are for the two important goals for distributed system: high scalability and high availability. Scalability means that the cloud infrastructure can be expanded to very large scale even to thousands of nodes. Availability means that the services are available even when quite a number of nodes fail. From this paper, readers will capture the current status of cloud computing as well as its future trends.
    2009,20(2):271-289
    [Abstract] (29468) [HTML] (0) [PDF 675.56 K] (52804)
    Abstract:
    Evolutionary multi-objective optimization (EMO), whose main task is to deal with multi-objective optimization problems by evolutionary computation, has become a hot topic in evolutionary computation community. After summarizing the EMO algorithms before 2003 briefly, the recent advances in EMO are discussed in details. The current research directions are concluded. On the one hand, more new evolutionary paradigms have been introduced into EMO community, such as particle swarm optimization, artificial immune systems, and estimation distribution algorithms. On the other hand, in order to deal with many-objective optimization problems, many new dominance schemes different from traditional Pareto-dominance come forth. Furthermore, the essential characteristics of multi-objective optimization problems are deeply investigated. This paper also gives experimental comparison of several representative algorithms. Finally, several viewpoints for the future research of EMO are proposed.
    2018,29(9):2681-2696 , DOI: 10.13328/j.cnki.jos.005274
    [Abstract] (28984) [HTML] (3249) [PDF 1.66 M] (8446)
    Abstract:
    Recommender systems have been successfully adopted as an effective tool to alleviate information overload and assist users to make decisions. Recently, it has been demonstrated that incorporating social relationships into recommender models can enhance recommendation performance. Despite its remarkable progress, a majority of social recommendation models have overlooked the item relations-a key factor that can also significantly influence recommendation performance. In this paper, a approach is first proposed to acquire item relations by measuring correlations among items. Then, a co-regularized recommendation model is put forward to integrate the item relations with social relationships by introducing co-regularization term in the matrix factorization model. Meanwhile, that the co-regularization term is a case of weighted atomic norm is illustrated. Finally, based on the proposed model a recommendation algorithm named CRMF is constructed. CRMF is compared with existing state-of-the-art recommendation algorithms based on the evaluations over four real-world data sets. The experimental results demonstrate that CRMF is able to not only effectively alleviate the user cold-start problem, but also help obtain more accurate rating predictions of various users.
    2018,29(3):786-798 , DOI: 10.13328/j.cnki.jos.005437
    [Abstract] (28080) [HTML] (4712) [PDF 1.36 M] (11658)
    Abstract:
    Graph embedding is a fundamental technique for graph data mining. The real-world graphs not only consist of complex network structures, but also contain diverse vertex information. How to integrate the network structure and vertex information into the graph embedding procedure is a big challenge. To deal with this challenge, a graph embedding method, which is based on deep leaning technique while taking into account the prior knowledge on vertices information, is proposed in this paper. The basic idea of the proposed method is to regard the vertex features as the prior knowledge, and learn the representation vector through optimizing an objective function that simultaneously keeps the similarity of network structure and vertex features. The time complexity of the proposed method is O(|V|), where|V|is the count of vertices in the graph. This indicates the proposed method is suitable for large-scale graph analysis. Experiments on several data sets demonstrate that, compared with the state-of-art baselines, the proposed method is able to achieve favorable and stable results for the task of node classification.
    2017,28(4):959-992 , DOI: 10.13328/j.cnki.jos.005143
    [Abstract] (27865) [HTML] (10721) [PDF 3.58 M] (36109)
    Abstract:
    The development of mobile internet and the popularity of mobile terminals produce massive trajectory data of moving objects under the era of big data. Trajectory data has spatio-temporal characteristics and rich information. Trajectory data processing techniques can be used to mine the patterns of human activities and behaviors, the moving patterns of vehicles in the city and the changes of atmospheric environment. However, trajectory data also can be exploited to disclose moving objects' privacy information (e.g., behaviors, hobbies and social relationships). Accordingly, attackers can easily access moving objects' privacy information by digging into their trajectory data such as activities and check-in locations. In another front of research, quantum computation presents an important theoretical direction to mine big data due to its scalable and powerful storage and computing capacity. Applying quantum computing approaches to handle trajectory big data could make some complex problem solvable and achieve higher efficiency. This paper reviews the key technologies of processing trajectory data. First the concept and characteristics of trajectory data is introduced, and the pre-processing methods, including noise filtering and data compression, are summarized. Then, the trajectory indexing and querying techniques, and the current achievements of mining trajectory data, such as pattern mining and trajectory classification, are reviewed. Next, an overview of the basic theories and characteristics of privacy preserving with respect to trajectory data is provided. The supporting techniques of trajectory big data mining, such as processing framework and data visualization, are presented in detail. Some possible ways of applying quantum computation into trajectory data processing, as well as the implementation of some core trajectory mining algorithms by quantum computation are also described. Finally, the challenges of trajectory data processing and promising future research directions are discussed.
    2018,29(10):3164-3183 , DOI: 10.13328/j.cnki.jos.005288
    [Abstract] (27856) [HTML] (3421) [PDF 2.31 M] (7795)
    Abstract:
    Group recommender systems have recently become one of the most prevalent topics in recommender systems. As an effective solution to the problem of group recommendation, Group recommender systems have been utilized in news, music, movies, food, and so forth through extending individual recommendation to group recommendation. The existing group recommender systems usually employ aggregating preference strategy or aggregating recommendation strategy, but the effectiveness of both two methods is not well solved yet, and they respectively have their own advantages and disadvantages. Aggregating preference strategy possesses a fairness problem between group members, whereas aggregating recommendation strategy pays less attention to the interaction between group members. This paper proposes an enhanced group recommendation method based on preference aggregation, incorporating simultaneously the advantages of the aforesaid two aggregation methods. Further, the paper demonstrates that group preference and personal preference are similar, which is also considered in the proposed method. Experimental results show that the proposed method outperforms baselines in terms of effectiveness based on Movielens dataset.
    2018,29(10):3134-3149 , DOI: 10.13328/j.cnki.jos.005284
    [Abstract] (27445) [HTML] (2862) [PDF 1.90 M] (8255)
    Abstract:
    Event-Based social networks (EBSNs) have experienced rapid growth in people's daily life. Hence, event recommendation plays an important role in helping people discover interesting online events and attend offline activities face to face in the real world. However, event recommendation is quite different from traditional recommender systems, and there are several challenges:(1) One user can only attend a scarce number of events, leading to a very sparse user-event matrix; (2) The response data of users is implicit feedback; (3) Events have their life cycles, so outdated events should not be recommended to users; (4) A large number of new events which are created every day need to be recommended to users in time. To cope with these challenges, this article proposes to jointly model heterogeneous social and content information for event recommendation. This approach explores both the online and offline social interactions and fuses the content of events to model their joint effect on users' decision-making for events. Extensive experiments are conducted to evaluate the performance of the proposed model on Meetup dataset. The experimental results demonstrate that the proposed model outperforms state-of-the-art methods.
    2019,30(3):822-844 , DOI: 10.13328/j.cnki.jos.005681
    [Abstract] (27332) [HTML] (5129) [PDF 7.87 M] (12176)
    Abstract:
    Since the factorization machine (FM) model can effectively solve the sparsity problem of high-dimensional data feature combination with high prediction accuracy and computational efficiency, it has been widely studied and applied in the field of click-through-rate (CTR) prediction and recommender systems. The review of the progress on the subsequent research on FM and its related models will help to promote the further improvement and application of the model. By comparing the relationship between the FM model and the polynomial regression model and the factorization model, the flexibility and generality of the FM model are described. Considering width extension, the strategies, methods, and key technologies are summarized from the dimensions of high-order feature interaction, field-aware feature interaction and hierarchical feature interaction, as well as feature extraction, combining, intelligent selection and promotion based on feature engineering. The integration approaches and benefits of FM model with other models, especially the combination with deep learning models are compared and analyzed, which provides insights into the in-depth expansion of traditional models. The learning and optimization methods of FM models and the implementation based on different parallel and distributed computing frameworks are summarized, compared, and analyzed. Finally, the authors forecast the difficult points, hot spots and development trends in the FM model that need to be further studied.
    2018,29(12):3747-3763 , DOI: 10.13328/j.cnki.jos.005322
    [Abstract] (25934) [HTML] (2509) [PDF 1.97 M] (5000)
    Abstract:
    The development of Internet has brought convenience to the public, but also troubles users in making choices among enormous data. Thus, recommender systems based on user understanding are urgently in need. Different from the traditional techniques that usually focus on individual users, the social-based recommender systems perform better with integrating social influence modeling to achieve more accurate user profiling. However, current works usually generalize influence in simple mode, while deep discussions on intrinsic mechanism have been largely ignored. To solve this problem, this paper studies the social influence within users who affects both rating and user attributes, and then proposes a novel trust-driven PMF (TPMF) algorithm to merge these two mechanisms. Furthermore, to deal with the task that different user should have personalized parameters, the study clusters users according to rating correlation and then maps them to corresponding weights, thereby achieving the personalized selection of users' model parameters. Comprehensive experiments on open data sets validate that TPMF and its derivation algorithm can effectively predict users' rating compared with several state of the art baselines, which demonstrates the capability of the presented influence mechanism and technical framework.
    2019,30(11):3397-3412 , DOI: 10.13328/j.cnki.jos.005545
    [Abstract] (25770) [HTML] (2889) [PDF 1.76 M] (7231)
    Abstract:
    Recommending valuable and interesting contents for microblog users is an important way to improve the user experience. In this study, tags are considered as the users' interests and a microblog recommendation method based on hypergraph random walk tag Extension and tag probability correlation is proposed via the analysis of characteristics and the existing limitations of microblog recommendation algorithm. Firstly, microblogs are considered as hyperedges, while each term is taken as the hypervertex, and the weighting strategies for both hyperedges and hypervertexes are established. A random walk is conducted on the hypergraph to obtain a number of keywords for the expansion of microblog users. And then the weight of the tag for each user is enhanced based on the relevance weighting scheme and the user tag matrix can be constructed. Probability correlation between tags is calculated to construct the tag similarity matrix, which can be used to update the matrix is updated using the label similarity matrix, which contains both the user interest information and the relationship between tags and tags. Experimental results show that the algorithm is effective in microblog recommendation.
    2020,31(2):421-438 , DOI: 10.13328/j.cnki.jos.005618
    [Abstract] (25500) [HTML] (2836) [PDF 1.65 M] (5744)
    Abstract:
    The newly emerging event-based social network (EBSN) based on the event as the core combines the online relationship with offline activities to promote the formation of real and effective social relationship among users. However, excessive activity information would make users difficult to distinguish and choose. The context-aware local event recommendation is an effective solution for the information overload problem, but most of existing local event recommendation algorithms only learns users' preference for contextual information indirectly from statistics of historical event participation and ignores latent correlations among them, which impacts on recommendation effectiveness. To take full advantage of latent correlations between users' event preference and contextual information, the proposed collective contextual relation learning (CCRL) algorithm models relations among users' participation records and related contextual information such as event organizer, description text, venue, and starting time. Then multi-relational Bayesian personalized ranking (MRBPR) algorithm is adapted for collective contextual relation learning and local event recommendation. Experiment results on Meetup dataset demonstrate that proposed algorithm outperforms state-of-the-art local event recommendation algorithms in terms of many metrics.
    2015,26(1):145-166 , DOI: 10.13328/j.cnki.jos.004688
    [Abstract] (24930) [HTML] (7550) [PDF 1.65 M] (13473)
    Abstract:
    The explosive growth of the digital data brings great challenges to the relational database management systems in addressing issues in areas such as scalability and fault tolerance. The cloud computing techniques have been widely used in many applications and become the standard effective approach to manage large scale data because of their high scalability, high availability and fault tolerance. The existing cloud-based data management systems can't efficiently support complex queries such as multi-dimensional queries and join queries because of lacking of index or view techniques, limiting the application of cloud computing in many respects. This paper conducts an in-depth research on the index techniques for cloud data management to highlight their strengths and weaknesses. This paper also introduces its own preliminary work on the index for massive IOT data in cloud environment. Finally, it points out some challenges in the index techniques for big data in cloud environment.
    2005,16(1):1-7
    [Abstract] (23655) [HTML] (0) [PDF 614.61 K] (28774)
    Abstract:
    The paper gives some thinking according to the following four aspects: 1) from the law of things development, revealing the development history of software engineering technology; 2) from the point of software natural characteristic, analyzing the construction of every abstraction layer of virtual machine; 3) from the point of software development, proposing the research content of software engineering discipline, and research the pattern of industrialized software production; 4) based on the appearance of Internet technology, exploring the development trend of software technology.
    2012,23(1):1-20 , DOI: 10.3724/SP.J.1001.2012.04100
    [Abstract] (23420) [HTML] (0) [PDF 1017.73 K] (41862)
    Abstract:
    Context-Aware recommender systems, aiming to further improve performance accuracy and user satisfaction by fully utilizing contextual information, have recently become one of the hottest topics in the domain of recommender systems. This paper presents an overview of the field of context-aware recommender systems from a process-oriented perspective, including system frameworks, key techniques, main models, evaluation, and typical applications. The prospects for future development and suggestions for possible extensions are also discussed.
    2010,21(8):1834-1848
    [Abstract] (22556) [HTML] (0) [PDF 682.96 K] (65072)
    Abstract:
    This paper surveys the state of the art of sentiment analysis. First, three important tasks of sentiment analysis are summarized and analyzed in detail, including sentiment extraction, sentiment classification, sentiment retrieval and summarization. Then, the evaluation and corpus for sentiment analysis are introduced. Finally, the applications of sentiment analysis are concluded. This paper aims to take a deep insight into the mainstream methods and recent progress in this field, making detailed comparison and analysis.
    2004,15(3):428-442
    [Abstract] (21968) [HTML] (0) [PDF 1009.57 K] (23825)
    Abstract:
    With the rapid development of e-business, web applications based on the Web are developed from localization to globalization, from B2C(business-to-customer) to B2B(business-to-business), from centralized fashion to decentralized fashion. Web service is a new application model for decentralized computing, and it is also an effective mechanism for the data and service integration on the web. Thus, web service has become a solution to e-business. It is important and necessary to carry out the research on the new architecture of web services, on the combinations with other good techniques, and on the integration of services. In this paper, a survey presents on various aspects of the research of web services from the basic concepts to the principal research problems and the underlying techniques, including data integration in web services, web service composition, semantic web service, web service discovery, web service security, the solution to web services in the P2P (Peer-to-Peer) computing environment, and the grid service, etc. This paper also presents a summary of the current art of the state of these techniques, a discussion on the future research topics, and the challenges of the web services.
    2009,20(1):54-66
    [Abstract] (20963) [HTML] (0) [PDF 1.41 M] (58818)
    Abstract:
    Network community structure is one of the most fundamental and important topological properties of complex networks, within which the links between nodes are very dense, but between which they are quite sparse. Network clustering algorithms which aim to discover all natural network communities from given complex networks are fundamentally important for both theoretical researches and practical applications, and can be used to analyze the topological structures, understand the functions, recognize the hidden patterns, and predict the behaviors of complex networks including social networks, biological networks, World Wide Webs and so on. This paper reviews the background, the motivation, the state of arts as well as the main issues of existing works related to discovering network communities, and tries to draw a comprehensive and clear outline for this new and active research area. This work is hopefully beneficial to the researchers from the communities of complex network analysis, data mining, intelligent Web and bioinformatics.
    2017,28(4):860-882 , DOI: 10.13328/j.cnki.jos.005190
    [Abstract] (20941) [HTML] (6993) [PDF 2.49 M] (26614)
    Abstract:
    Information flow analysis is a promising approach for protecting the confidentiality and integrity of information manipulated by computing systems. Taint analysis, as in practice, is widely used in the area of software security assurance. This survey summarizes the latest advances on taint analysis, especially the solutions applied in different platform applications. Firstly, the basic principle of taint analysis is introduced along with the general technology of taint propagation implemented by dynamic and static analyses. Then, the proposals applied in different platform frameworks, including techniques for protecting privacy leakage on Android and finding security vulnerabilities on Web, are analyzed. Lastly, further research directions and future work are discussed.
    2005,16(5):857-868
    [Abstract] (20891) [HTML] (2) [PDF 489.65 K] (38156)
    Abstract:
    Wireless Sensor Networks, a novel technology about acquiring and processing information, have been proposed for a multitude of diverse applications. The problem of self-localization, that is, determining where a given node is physically or relatively located in the networks, is a challenging one, and yet extremely crucial for many applications. In this paper, the evaluation criterion of the performance and the taxonomy for wireless sensor networks self-localization systems and algorithms are described, the principles and characteristics of recent representative localization approaches are discussed and presented, and the directions of research in this area are introduced.
    2012,23(4):962-986 , DOI: 10.3724/SP.J.1001.2012.04175
    [Abstract] (20090) [HTML] (0) [PDF 2.09 M] (39448)
    Abstract:
    Considered as the next generation computing model, cloud computing plays an important role in scientific and commercial computing area and draws great attention from both academia and industry fields. Under cloud computing environment, data center consist of a large amount of computers, usually up to millions, and stores petabyte even exabyte of data, which may easily lead to the failure of the computers or data. The large amount of computers composition not only leads to great challenges to the scalability of the data center and its storage system, but also results in high hardware infrastructure cost and power cost. Therefore, fault-tolerance, scalability, and power consumption of the distributed storage for a data center becomes key part in the technology of cloud computing, in order to ensure the data availability and reliability. In this paper, a survey is made on the state of art of the key technologies in cloud computing in the following aspects: Design of data center network, organization and arrangement of data, strategies to improve fault-tolerance, methods to save storage space, and energy. Firstly, many kinds of classical topologies of data center network are introduced and compared. Secondly, kinds of current fault-tolerant storage techniques are discussed, and data replication and erasure code strategies are especially compared. Thirdly, the main current energy saving technology is addressed and analyzed. Finally, challenges in distributed storage are reviewed as well as future research trends are predicted.
    2014,25(2):400-418 , DOI: 10.13328/j.cnki.jos.004540
    [Abstract] (19882) [HTML] (3377) [PDF 1.24 M] (10034)
    Abstract:
    Cyber-Physical Systems (CPSs) have great potentials in several application domains. Time plays an important role in CPS and should be specified in the very early phase of requirements engineering. This paper proposes a framework to model and verify timing requirements for the CPS. To begin with, a conceptual model is presented for providing basic concepts of timing and functional requirements. Guided by this model, the CPS software timing requirement specification can be obtained from CPS environment properties and constraints. To support formal verification, formal semantics for the conceptual model is provided. Based on the semantics, the consistency properties of the timing requirements specification are defined and expressed as CTL formulas. The timing requirements specification is transformed into a NuSMV model and checked by this well-known model checker.
    2012,23(1):32-45 , DOI: 10.3724/SP.J.1001.2012.04091
    [Abstract] (19754) [HTML] (1) [PDF 408.86 K] (38936)
    Abstract:
    In many areas such as science, simulation, Internet, and e-commerce, the volume of data to be analyzed grows rapidly. Parallel techniques which could be expanded cost-effectively should be invented to deal with the big data. Relational data management technique has gone through a history of nearly 40 years. Now it encounters the tough obstacle of scalability, which relational techniques can not handle large data easily. In the mean time, none relational techniques, such as MapReduce as a typical representation, emerge as a new force, and expand their application from Web search to territories that used to be occupied by relational database systems. They confront relational technique with high availability, high scalability and massive parallel processing capability. Relational technique community, after losing the big deal of Web search, begins to learn from MapReduce. MapReduce also borrows valuable ideas from relational technique community to improve performance. Relational technique and MapReduce compete with each other, and learn from each other; new data analysis platform and new data analysis eco-system are emerging. Finally the two camps of techniques will find their right places in the new eco-system of big data analysis.
    2010,21(5):899-915
    [Abstract] (18740) [HTML] (0) [PDF 972.65 K] (20369)
    Abstract:
    This paper firstly presents a summary of AADL (architecture analysis and design language), including its progress over the years and its modeling elements. Then, it surveys the research and practice of AADL from a model-based perspective, such as AADL modeling, AADL formal semantics, model transformation, verification and code generation. Finally, the potential research directions are discussed.
    2009,20(3):524-545
    [Abstract] (18363) [HTML] (0) [PDF 1.09 M] (32320)
    Abstract:
    Nowadays it has been widely accepted that the quality of software highly depends on the process that iscarried out in an organization. As part of the effort to support software process engineering activities, the researchon software process modeling and analysis is to provide an effective means to represent and analyze a process and,by doing so, to enhance the understanding of the modeled process. In addition, an enactable process model canprovide a direct guidance for the actual development process. Thus, the enforcement of the process model candirectly contribute to the improvement of the software quality. In this paper, a systematic review is carried out tosurvey the recent development in software process modeling. 72 papers from 20 conference proceedings and 7journals are identified as the evidence. The review aims to promote a better understanding of the literature byanswering the following three questions: 1) What kinds of paradigms are existing methods based on? 2) What kinds of purposes does the existing research have? 3) What kinds of new trends are reflected in the current research? Afterproviding the systematic review, we present our software process modeling method based on a multi-dimensionaland integration methodology that is intended to address several core issues facing the community.
    2009,20(1):124-137
    [Abstract] (18212) [HTML] (0) [PDF 1.06 M] (29000)
    Abstract:
    The appearance of plenty of intelligent devices equipped for short-range wireless communications boosts the fast rise of wireless ad hoc networks application. However, in many realistic application environments, nodes form a disconnected network for most of the time due to nodal mobility, low density, lossy link, etc. Conventional communication model of mobile ad hoc network (MANET) requires at least one path existing from source to destination nodes, which results in communication failure in these scenarios. Opportunistic networks utilize the communication opportunities arising from node movement to forward messages in a hop-by-hop way, and implement communications between nodes based on the "store-carry-forward" routing pattern. This networking approach, totally different from the traditional communication model, captures great interests from researchers. This paper first introduces the conceptions and theories of opportunistic networks and some current typical applications. Then it elaborates the popular research problems including opportunistic forwarding mechanism, mobility model and opportunistic data dissemination and retrieval. Some other interesting research points such as communication middleware, cooperation and security problem and new applications are stated briefly. Finally, the paper concludes and looks forward to the possible research focuses for opportunistic networks in the future.
    2009,20(2):350-362
    [Abstract] (17938) [HTML] (1) [PDF 1.39 M] (48755)
    Abstract:
    This paper makes a comprehensive survey of the recommender system research aiming to facilitate readers to understand this field. First the research background is introduced, including commercial application demands, academic institutes, conferences and journals. After formally and informally describing the recommendation problem, a comparison study is conducted based on categorized algorithms. In addition, the commonly adopted benchmarked datasets and evaluation methods are exhibited and most difficulties and future directions are concluded.
    2004,15(8):1208-1219
    [Abstract] (17808) [HTML] (0) [PDF 948.49 K] (21813)
    Abstract:
    With the explosive growth of network applications and complexity, the threat of Internet worms against network security becomes increasingly serious. Especially under the environment of Internet, the variety of the propagation ways and the complexity of the application environment result in worm with much higher frequency of outbreak, much deeper latency and more wider coverage, and Internet worms have been a primary issue faced by malicious code researchers. In this paper, the concept and research situation of Internet worms, exploration function component and execution mechanism are first presented, then the scanning strategies and propagation model are discussed, and finally the critical techniques of Internet worm prevention are given. Some major problems and research trends in this area are also addressed.
    2009,20(11):2965-2976
    [Abstract] (17334) [HTML] (0) [PDF 442.42 K] (22897)
    Abstract:
    This paper studies uncertain graph data mining and especially investigates the problem of mining frequent subgraph patterns from uncertain graph data. A data model is introduced for representing uncertainties in graphs, and an expected support is employed to evaluate the significance of subgraph patterns. By using the apriori property of expected support, a depth-first search-based mining algorithm is proposed with an efficient method for computing expected supports and a technique for pruning search space, which reduces the number of subgraph isomorphism testings needed by computing expected support from the exponential scale to the linear scale. Experimental results show that the proposed algorithm is 3 to 5 orders of magnitude faster than a na?ve depth-first search algorithm, and is efficient and scalable.
    2009,20(5):1226-1240
    [Abstract] (17202) [HTML] (0) [PDF 926.82 K] (23625)
    Abstract:
    This paper introduces the concrete details of combining the automated reasoning techniques with planning methods, which includes planning as satisfiability using propositional logic, Conformant planning using modal logic and disjunctive reasoning, planning as nonmonotonic logic, and Flexible planning as fuzzy description logic. After considering experimental results of International Planning Competition and relevant papers, it concludes that planning methods based on automated reasoning techniques is helpful and can be adopted. It also proposes the challenges and possible hotspots.
    2003,14(10):1717-1727
    [Abstract] (17088) [HTML] (0) [PDF 839.25 K] (23089)
    Abstract:
    Sensor networks are integration of sensor techniques, nested computation techniques, distributed computation techniques and wireless communication techniques. They can be used for testing, sensing, collecting and processing information of monitored objects and transferring the processed information to users. Sensor network is a new research area of computer science and technology and has a wide application future. Both academia and industries are very interested in it. The concepts and characteristics of the sensor networks and the data in the networks are introduced, and the issues of the sensor networks and the data management of sensor networks are discussed. The advance of the research on sensor networks and the data management of sensor networks are also presented.
    2014,25(4):839-862 , DOI: 10.13328/j.cnki.jos.004558
    [Abstract] (16529) [HTML] (5418) [PDF 1.32 M] (28698)
    Abstract:
    Batch computing and stream computing are two important forms of big data computing. The research and discussions on batch computing in big data environment are comparatively sufficient. But how to efficiently deal with stream computing to meet many requirements, such as low latency, high throughput and continuously reliable running, and how to build efficient stream big data computing systems, are great challenges in the big data computing research. This paper provides a research of the data computing architecture and the key issues in stream computing in big data environments. Firstly, the research gives a brief summary of three application scenarios of stream computing in business intelligence, marketing and public service. It also shows distinctive features of the stream computing in big data environment, such as real time, volatility, burstiness, irregularity and infinity. A well-designed stream computing system always optimizes in system structure, data transmission, application interfaces, high-availability, and so on. Subsequently, the research offers detailed analyses and comparisons of five typical and open-source stream computing systems in big data environment. Finally, the research specifically addresses some new challenges of the stream big data systems, such as scalability, fault tolerance, consistency, load balancing and throughput.
    2000,11(11):1460-1466
    [Abstract] (15640) [HTML] (1) [PDF 520.69 K] (17172)
    Abstract:
    Intrusion detection is a highlighted topic of network security research in recent years. In this paper, first the necessity o f intrusion detection is presented, and its concepts and models are described. T hen, many intrusion detection techniques and architectures are summarized. Final ly, the existing problems and the future direction in this field are discussed.
    2013,24(8):1786-1803 , DOI: 10.3724/SP.J.1001.2013.04416
    [Abstract] (15283) [HTML] (0) [PDF 1.04 M] (27960)
    Abstract:
    Many specific application oriented NoSQL database systems are developed for satisfying the new requirement of big data management. This paper surveys researches on typical NoSQL database based on key-value data model. First, the characteristics of big data, and the key technique issues supporting big data management are introduced. Then frontier efforts and research challenges are given, including system architecture, data model, access mode, index, transaction, system elasticity, load balance, replica strategy, data consistency, flash cache, MapReduce based data process and new generation data management system etc. Finally, research prospects are given.
    2012,23(5):1148-1166 , DOI: 10.3724/SP.J.1001.2012.04195
    [Abstract] (15244) [HTML] (0) [PDF 946.37 K] (23815)
    Abstract:
    With the recent development of cloud computing, the importance of cloud databases has been widely acknowledged. Here, the features, influence and related products of cloud databases are first discussed. Then, research issues of cloud databases are presented in detail, which include data model, architecture, consistency, programming model, data security, performance optimization, benchmark, and so on. Finally, some future trends in this area are discussed.
    2009,20(10):2729-2743
    [Abstract] (15238) [HTML] (0) [PDF 1.12 M] (16866)
    Abstract:
    In a multi-hop wireless sensor network (WSN), the sensors closest to the sink tend to deplete their energy faster than other sensors, which is known as an energy hole around the sink. No more data can be delivered to the sink after an energy hole appears, while a considerable amount of energy is wasted and the network lifetime ends prematurely. This paper investigates the energy hole problem, and based on the improved corona model with levels, it concludes that the assignment of transmission ranges of nodes in different coronas is an effective approach for achieving energy-efficient network. It proves that the optimal transmission ranges for all areas is a multi-objective optimization problem (MOP), which is NP hard. The paper proposes an ACO (ant colony optimization)-based distributed algorithm to prolong the network lifetime, which can help nodes in different areas to adaptively find approximate optimal transmission range based on the node distribution. Furthermore, the simulation results indicate that the network lifetime under this solution approximates to that using the optimal list. Compared with existing algorithms, this ACO-based algorithm can not only make the network lifetime be extended more than two times longer, but also have good performance in the non-uniform node distribution.
    2002,13(7):1228-1237
    [Abstract] (15084) [HTML] (0) [PDF 500.04 K] (21199)
    Abstract:
    Software architecture (SA) is emerging as one of the primary research areas in software engineering recently and one of the key technologies to the development of large-scale software-intensive system and software product line system. The history and the major direction of SA are summarized, and the concept of SA is brought up based on analyzing and comparing the several classical definitions about SA. Based on summing up the activities about SA, two categories of study about SA are extracted out, and the advancements of researches on SA are subsequently introduced from seven aspects.Additionally,some disadvantages of study on SA are discussed,and the causes are explained at the same.Finally,it is concluded with some singificantly promising tendency about research on SA.
    2006,17(7):1588-1600
    [Abstract] (14961) [HTML] (0) [PDF 808.73 K] (21638)
    Abstract:
    Routing technology at the network layer is pivotal in the architecture of wireless sensor networks. As an active branch of routing technology, cluster-based routing protocols excel in network topology management, energy minimization, data aggregation and so on. In this paper, cluster-based routing mechanisms for wireless sensor networks are analyzed. Cluster head selection, cluster formation and data transmission are three key techniques in cluster-based routing protocols. As viewed from the three techniques, recent representative cluster-based routing protocols are presented, and their characteristics and application areas are compared. Finally, the future research issues in this area are pointed out.
  • 全文下载排行(总排行年度排行各期排行)
    摘要点击排行(总排行年度排行各期排行)

  • Article Search
    Search by issue
    Select AllDeselectExport
    Display Method:
    2003,14(7):1282-1291
    [Abstract] (39056) [HTML] (0) [PDF 832.28 K] (87703)
    Abstract:
    Sensor network, which is made by the convergence of sensor, micro-electro-mechanism system and networks technologies, is a novel technology about acquiring and processing information. In this paper, the architecture of wireless sensor network is briefly introduced. Next, some valuable applications are explained and forecasted. Combining with the existing work, the hot spots including power-aware routing and media access control schemes are discussed and presented in detail. Finally, taking account of application requirements, several future research directions are put forward.
    2008,19(1):48-61
    [Abstract] (30206) [HTML] (0) [PDF 671.39 K] (69395)
    Abstract:
    The research actuality and new progress in clustering algorithm in recent years are summarized in this paper. First, the analysis and induction of some representative clustering algorithms have been made from several aspects, such as the ideas of algorithm, key technology, advantage and disadvantage. On the other hand, several typical clustering algorithms and known data sets are selected, simulation experiments are implemented from both sides of accuracy and running efficiency, and clustering condition of one algorithm with different data sets is analyzed by comparing with the same clustering of the data set under different algorithms. Finally, the research hotspot, difficulty, shortage of the data clustering and some pending problems are addressed by the integration of the aforementioned two aspects information. The above work can give a valuable reference for data clustering and data mining.
    2011,22(1):71-83 , DOI: 10.3724/SP.J.1001.2011.03958
    [Abstract] (31598) [HTML] (0) [PDF 781.42 K] (65915)
    Abstract:
    Cloud Computing is the fundamental change happening in the field of Information Technology. It is a representation of a movement towards the intensive, large scale specialization. On the other hand, it brings about not only convenience and efficiency problems, but also great challenges in the field of data security and privacy protection. Currently, security has been regarded as one of the greatest problems in the development of Cloud Computing. This paper describes the great requirements in Cloud Computing, security key technology, standard and regulation etc., and provides a Cloud Computing security framework. This paper argues that the changes in the above aspects will result in a technical revolution in the field of information security.
    2010,21(8):1834-1848
    [Abstract] (22556) [HTML] (0) [PDF 682.96 K] (65072)
    Abstract:
    This paper surveys the state of the art of sentiment analysis. First, three important tasks of sentiment analysis are summarized and analyzed in detail, including sentiment extraction, sentiment classification, sentiment retrieval and summarization. Then, the evaluation and corpus for sentiment analysis are introduced. Finally, the applications of sentiment analysis are concluded. This paper aims to take a deep insight into the mainstream methods and recent progress in this field, making detailed comparison and analysis.
    2009,20(1):54-66
    [Abstract] (20963) [HTML] (0) [PDF 1.41 M] (58818)
    Abstract:
    Network community structure is one of the most fundamental and important topological properties of complex networks, within which the links between nodes are very dense, but between which they are quite sparse. Network clustering algorithms which aim to discover all natural network communities from given complex networks are fundamentally important for both theoretical researches and practical applications, and can be used to analyze the topological structures, understand the functions, recognize the hidden patterns, and predict the behaviors of complex networks including social networks, biological networks, World Wide Webs and so on. This paper reviews the background, the motivation, the state of arts as well as the main issues of existing works related to discovering network communities, and tries to draw a comprehensive and clear outline for this new and active research area. This work is hopefully beneficial to the researchers from the communities of complex network analysis, data mining, intelligent Web and bioinformatics.
    2009,20(2):271-289
    [Abstract] (29468) [HTML] (0) [PDF 675.56 K] (52804)
    Abstract:
    Evolutionary multi-objective optimization (EMO), whose main task is to deal with multi-objective optimization problems by evolutionary computation, has become a hot topic in evolutionary computation community. After summarizing the EMO algorithms before 2003 briefly, the recent advances in EMO are discussed in details. The current research directions are concluded. On the one hand, more new evolutionary paradigms have been introduced into EMO community, such as particle swarm optimization, artificial immune systems, and estimation distribution algorithms. On the other hand, in order to deal with many-objective optimization problems, many new dominance schemes different from traditional Pareto-dominance come forth. Furthermore, the essential characteristics of multi-objective optimization problems are deeply investigated. This paper also gives experimental comparison of several representative algorithms. Finally, several viewpoints for the future research of EMO are proposed.
    2009,20(5):1337-1348
    [Abstract] (29704) [HTML] (0) [PDF 1.06 M] (51515)
    Abstract:
    This paper surveys the current technologies adopted in cloud computing as well as the systems in enterprises. Cloud computing can be viewed from two different aspects. One is about the cloud infrastructure which is the building block for the up layer cloud application. The other is of course the cloud application. This paper focuses on the cloud infrastructure including the systems and current research. Some attractive cloud applications are also discussed. Cloud computing infrastructure has three distinct characteristics. First, the infrastructure is built on top of large scale clusters which contain a large number of cheap PC servers. Second, the applications are co-designed with the fundamental infrastructure that the computing resources can be maximally utilized. Third, the reliability of the whole system is achieved by software building on top of redundant hardware instead of mere hardware. All these technologies are for the two important goals for distributed system: high scalability and high availability. Scalability means that the cloud infrastructure can be expanded to very large scale even to thousands of nodes. Availability means that the services are available even when quite a number of nodes fail. From this paper, readers will capture the current status of cloud computing as well as its future trends.
    2014,25(9):1889-1908 , DOI: 10.13328/j.cnki.jos.004674
    [Abstract] (12923) [HTML] (7613) [PDF 550.98 K] (49282)
    Abstract:
    This paper first introduces the key features of big data in different processing modes and their typical application scenarios, as well as corresponding representative processing systems. It then summarizes three development trends of big data processing systems. Next, the paper gives a brief survey on system supported analytic technologies and applications (including deep learning, knowledge computing, social computing, and visualization), and summarizes the key roles of individual technologies in big data analysis and understanding. Finally, the paper lays out three grand challenges of big data processing and analysis, i.e., data complexity, computation complexity, and system complexity. Potential ways for dealing with each complexity are also discussed.
    2010,21(3):427-437
    [Abstract] (34492) [HTML] (0) [PDF 308.76 K] (48780)
    Abstract:
    Automatic generation of poetry has always been considered a hard nut in natural language generation.This paper reports some pioneering research on a possible generic algorithm and its automatic generation of SONGCI. In light of the characteristics of Chinese ancient poetry, this paper designed the level and oblique tones-based coding method, the syntactic and semantic weighted function of fitness, the elitism and roulette-combined selection operator, and the partially mapped crossover operator and the heuristic mutation operator. As shown by tests, the system constructed on the basis of the computing model designed in this paper is basically capable of generating Chinese SONGCI with some aesthetic merit. This work represents progress in the field of Chinese poetry automatic generation.
    2009,20(2):350-362
    [Abstract] (17938) [HTML] (1) [PDF 1.39 M] (48755)
    Abstract:
    This paper makes a comprehensive survey of the recommender system research aiming to facilitate readers to understand this field. First the research background is introduced, including commercial application demands, academic institutes, conferences and journals. After formally and informally describing the recommendation problem, a comparison study is conducted based on categorized algorithms. In addition, the commonly adopted benchmarked datasets and evaluation methods are exhibited and most difficulties and future directions are concluded.
    2021,32(2):349-369 , DOI: 10.13328/j.cnki.jos.006138
    [Abstract] (10751) [HTML] (13747) [PDF 2.36 M] (46082)
    Abstract:
    Few-shot learning is defined as learning models to solve problems from small samples. In recent years, under the trend of training model with big data, machine learning and deep learning have achieved success in many fields. However, in many application scenarios in the real world, there is not a large amount of data or labeled data for model training, and labeling a large number of unlabeled samples will cost a lot of manpower. Therefore, how to use a small number of samples for learning has become a problem that needs to be paid attention to at present. This paper systematically combs the current approaches of few-shot learning. It introduces each kind of corresponding model from the three categories: fine-tune based, data augmentation based, and transfer learning based. Then, the data augmentation based approaches are subdivided into unlabeled data based, data generation based, and feature augmentation based approaches. The transfer learning based approaches are subdivided into metric learning based, meta-learning based, and graph neural network based methods. In the following, the paper summarizes the few-shot datasets and the results in the experiments of the aforementioned models. Next, the paper summarizes the current situation and challenges in few-shot learning. Finally, the future technological development of few-shot learning is prospected.
    2016,27(1):45-71 , DOI: 10.13328/j.cnki.jos.004914
    [Abstract] (31320) [HTML] (6597) [PDF 880.96 K] (46055)
    Abstract:
    Android is a modern and most popular software platform for smartphones. According to report, Android accounted for a huge 81% of all smartphones in 2014 and shipped over 1 billion units worldwide for the first time ever. Apple, Microsoft, Blackberry and Firefox trailed a long way behind. At the same time, increased popularity of the Android smartphones has attracted hackers, leading to massive increase of Android malware applications. This paper summarizes and analyzes the latest advances in Android security from multidimensional perspectives, covering Android architecture, design principles, security mechanisms, major security threats, classification and detection of malware, static and dynamic analyses, machine learning approaches, and security extension proposals.
    2004,15(10):1493-1504
    [Abstract] (9921) [HTML] (2) [PDF 937.72 K] (45295)
    Abstract:
    Graphics processing unit (GPU) has been developing rapidly in recent years at a speed over Moor抯 law, and as a result, various applications associated with computer graphics advance greatly. At the same time, the highly processing power, parallelism and programmability available nowadays on the contemporary GPU provide an ideal platform on which the general-purpose computation could be made. Starting from an introduction to the development history and the architecture of GPU, the technical fundamentals of GPU are described in the paper. Then in the main part of the paper, the development of various applications on general purpose computation on GPU is introduced, and among those applications, fluid dynamics, algebraic computation, database operations, and spectrum analysis are introduced in detail. The experience of our work on fluid dynamics has been also given, and the development of software tools in this area is introduced. Finally, a conclusion is made, and the future development and the new challenge on both hardware and software in this subject are discussed.
    2013,24(11):2476-2497 , DOI: 10.3724/SP.J.1001.2013.04486
    [Abstract] (11687) [HTML] (0) [PDF 1.14 M] (45045)
    Abstract:
    Probabilistic graphical models are powerful tools for compactly representing complex probability distributions, efficiently computing (approximate) marginal and conditional distributions, and conveniently learning parameters and hyperparameters in probabilistic models. As a result, they have been widely used in applications that require some sort of automated probabilistic reasoning, such as computer vision and natural language processing, as a formal approach to deal with uncertainty. This paper surveys the basic concepts and key results of representation, inference and learning in probabilistic graphical models, and demonstrates their uses in two important probabilistic models. It also reviews some recent advances in speeding up classic approximate inference algorithms, followed by a discussion of promising research directions.
    2022,33(7):2464-2481 , DOI: 10.13328/j.cnki.jos.006585
    [Abstract] (1982) [HTML] (4399) [PDF 2.00 M] (44645)
    Abstract:
    Symbolic propagation methods based on linear abstraction play a significant role in neural network verification. This study proposes the notion of multi-path back-propagation for these methods. Existing methods are viewed as using only a single back-propagation path to calculate the upper and lower bounds of each node in a given neural network, being specific instances of the proposed notion. Leveraging multiple back-propagation paths effectively improves the accuracy of this kind of method. For evaluation, the proposed method is quantitatively compared using multiple back-propagation paths with the state-of-the-art tool DeepPoly on benchmarks ACAS Xu, MNIST, and CIFAR10. The experiment results show that the proposed method achieves significant accuracy improvement while introducing only a low extra time cost. In addition, the multi-path back-propagation method is compared with the Optimized LiRPA based on global optimization, on the dataset MNIST. The results show that the proposed method still has an accuracy advantage.
    2018,29(5):1471-1514 , DOI: 10.13328/j.cnki.jos.005519
    [Abstract] (7735) [HTML] (8372) [PDF 4.38 M] (41893)
    Abstract:
    Computer aided detection/diagnosis (CAD) can improve the accuracy of diagnosis,reduce false positive,and provide decision supports for doctors.The main purpose of this paper is to analyze the latest development of computer aided diagnosis tools.Focusing on the top four fatal cancer's incidence positions,major recent publications on CAD applications in different medical imaging areas are reviewed in this survey according to different imaging techniques and diseases.Further more,multidimentional analysis is made on the researches from image data sets,algorithms and evaluation methods.Finally,existing problems,research trend and development direction in the field of medical image CAD system are discussed.
    2012,23(1):1-20 , DOI: 10.3724/SP.J.1001.2012.04100
    [Abstract] (23420) [HTML] (0) [PDF 1017.73 K] (41862)
    Abstract:
    Context-Aware recommender systems, aiming to further improve performance accuracy and user satisfaction by fully utilizing contextual information, have recently become one of the hottest topics in the domain of recommender systems. This paper presents an overview of the field of context-aware recommender systems from a process-oriented perspective, including system frameworks, key techniques, main models, evaluation, and typical applications. The prospects for future development and suggestions for possible extensions are also discussed.
    2020,31(7):2245-2282 , DOI: 10.13328/j.cnki.jos.006037
    [Abstract] (3922) [HTML] (8162) [PDF 967.02 K] (41848)
    Abstract:
    Ultrasonography is the first choice of imaging examination and preoperative evaluation for thyroid and breast cancer. However, ultrasonic characteristics of benign and malignant nodules are commonly overlapped. The diagnosis heavily relies on operator's experience other than quantitative and stable methods. In recent years, medical imaging analysis based on computer technology has developed rapidly, and a series of landmark breakthroughs have been made, which provides effective decision supports for medical imaging diagnosis. In this work, the research progress of computer vision and image recognition technologies in thyroid and breast ultrasound images is studied. A series of key technologies involved in automatic diagnosis of ultrasound images is the main lines of the work. The major algorithms in recent years are summarized and analyzed, such as ultrasound image preprocessing, lesion localization and segmentation, feature extraction and classification. Moreover, multi-dimensional analysis is made on the algorithms, data sets, and evaluation methods. Finally, existing problems related to automatic analysis of those two kinds of ultrasound imaging are discussed, research trend and development direction in the field of ultrasound images analysis are discussed.
    2015,26(1):62-81 , DOI: 10.13328/j.cnki.jos.004701
    [Abstract] (42766) [HTML] (9284) [PDF 1.04 M] (41580)
    Abstract:
    Network abstraction brings about the naissance of software-defined networking. SDN decouples data plane and control plane, and simplifies network management. The paper starts with a discussion on the background in the naissance and developments of SDN, combing its architecture that includes data layer, control layer and application layer. Then their key technologies are elaborated according to the hierarchical architecture of SDN. The characteristics of consistency, availability, and tolerance are especially analyzed. Moreover, latest achievements for profiled scenes are introduced. The future works are summarized in the end.
    2012,23(4):962-986 , DOI: 10.3724/SP.J.1001.2012.04175
    [Abstract] (20090) [HTML] (0) [PDF 2.09 M] (39448)
    Abstract:
    Considered as the next generation computing model, cloud computing plays an important role in scientific and commercial computing area and draws great attention from both academia and industry fields. Under cloud computing environment, data center consist of a large amount of computers, usually up to millions, and stores petabyte even exabyte of data, which may easily lead to the failure of the computers or data. The large amount of computers composition not only leads to great challenges to the scalability of the data center and its storage system, but also results in high hardware infrastructure cost and power cost. Therefore, fault-tolerance, scalability, and power consumption of the distributed storage for a data center becomes key part in the technology of cloud computing, in order to ensure the data availability and reliability. In this paper, a survey is made on the state of art of the key technologies in cloud computing in the following aspects: Design of data center network, organization and arrangement of data, strategies to improve fault-tolerance, methods to save storage space, and energy. Firstly, many kinds of classical topologies of data center network are introduced and compared. Secondly, kinds of current fault-tolerant storage techniques are discussed, and data replication and erasure code strategies are especially compared. Thirdly, the main current energy saving technology is addressed and analyzed. Finally, challenges in distributed storage are reviewed as well as future research trends are predicted.
    2012,23(1):32-45 , DOI: 10.3724/SP.J.1001.2012.04091
    [Abstract] (19754) [HTML] (1) [PDF 408.86 K] (38936)
    Abstract:
    In many areas such as science, simulation, Internet, and e-commerce, the volume of data to be analyzed grows rapidly. Parallel techniques which could be expanded cost-effectively should be invented to deal with the big data. Relational data management technique has gone through a history of nearly 40 years. Now it encounters the tough obstacle of scalability, which relational techniques can not handle large data easily. In the mean time, none relational techniques, such as MapReduce as a typical representation, emerge as a new force, and expand their application from Web search to territories that used to be occupied by relational database systems. They confront relational technique with high availability, high scalability and massive parallel processing capability. Relational technique community, after losing the big deal of Web search, begins to learn from MapReduce. MapReduce also borrows valuable ideas from relational technique community to improve performance. Relational technique and MapReduce compete with each other, and learn from each other; new data analysis platform and new data analysis eco-system are emerging. Finally the two camps of techniques will find their right places in the new eco-system of big data analysis.
    2005,16(5):857-868
    [Abstract] (20891) [HTML] (2) [PDF 489.65 K] (38156)
    Abstract:
    Wireless Sensor Networks, a novel technology about acquiring and processing information, have been proposed for a multitude of diverse applications. The problem of self-localization, that is, determining where a given node is physically or relatively located in the networks, is a challenging one, and yet extremely crucial for many applications. In this paper, the evaluation criterion of the performance and the taxonomy for wireless sensor networks self-localization systems and algorithms are described, the principles and characteristics of recent representative localization approaches are discussed and presented, and the directions of research in this area are introduced.
    2013,24(1):77-90 , DOI: 10.3724/SP.J.1001.2013.04339
    [Abstract] (12134) [HTML] (0) [PDF 0.00 Byte] (37228)
    Abstract:
    Task parallel programming model is a widely used parallel programming model on multi-core platforms. With the intention of simplifying parallel programming and improving the utilization of multiple cores, this paper provides an introduction to the essential programming interfaces and the supporting mechanism used in task parallel programming models and discusses issues and the latest achievements from three perspectives: Parallelism expression, data management and task scheduling. In the end, some future trends in this area are discussed.
    2011,22(1):115-131 , DOI: 10.3724/SP.J.1001.2011.03950
    [Abstract] (14720) [HTML] (0) [PDF 845.91 K] (36349)
    Abstract:
    The Internet traffic model is the key issue for network performance management, Quality of Service management, and admission control. The paper first summarizes the primary characteristics of Internet traffic, as well as the metrics of Internet traffic. It also illustrates the significance and classification of traffic modeling. Next, the paper chronologically categorizes the research activities of traffic modeling into three phases: 1) traditional Poisson modeling; 2) self-similar modeling; and 3) new research debates and new progress. Thorough reviews of the major research achievements of each phase are conducted. Finally, the paper identifies some open research issue and points out possible future research directions in traffic modeling area.
    2017,28(4):959-992 , DOI: 10.13328/j.cnki.jos.005143
    [Abstract] (27865) [HTML] (10721) [PDF 3.58 M] (36109)
    Abstract:
    The development of mobile internet and the popularity of mobile terminals produce massive trajectory data of moving objects under the era of big data. Trajectory data has spatio-temporal characteristics and rich information. Trajectory data processing techniques can be used to mine the patterns of human activities and behaviors, the moving patterns of vehicles in the city and the changes of atmospheric environment. However, trajectory data also can be exploited to disclose moving objects' privacy information (e.g., behaviors, hobbies and social relationships). Accordingly, attackers can easily access moving objects' privacy information by digging into their trajectory data such as activities and check-in locations. In another front of research, quantum computation presents an important theoretical direction to mine big data due to its scalable and powerful storage and computing capacity. Applying quantum computing approaches to handle trajectory big data could make some complex problem solvable and achieve higher efficiency. This paper reviews the key technologies of processing trajectory data. First the concept and characteristics of trajectory data is introduced, and the pre-processing methods, including noise filtering and data compression, are summarized. Then, the trajectory indexing and querying techniques, and the current achievements of mining trajectory data, such as pattern mining and trajectory classification, are reviewed. Next, an overview of the basic theories and characteristics of privacy preserving with respect to trajectory data is provided. The supporting techniques of trajectory big data mining, such as processing framework and data visualization, are presented in detail. Some possible ways of applying quantum computation into trajectory data processing, as well as the implementation of some core trajectory mining algorithms by quantum computation are also described. Finally, the challenges of trajectory data processing and promising future research directions are discussed.
    2010,21(2):344-358
    [Abstract] (9303) [HTML] (0) [PDF 1.01 M] (34417)
    Abstract:
    In this paper, the existing intrusion tolerance and self-destruction technology are integrated into autonomic computing in order to construct an autonomic dependability model based on SM-PEPA (semi-Markov performance evaluation process algebra) which is capable of formal analysis and verification. It can hierarchically anticipate Threats to dependability (TtD) at different levels in a self-management manner to satisfy the special requirements for dependability of mission-critical systems. Based on this model, a quantification approach is proposed on the view of steady-state probability to evaluate autonomic dependability. Finally, this paper analyzes the impacts of parameters of the model on autonomic dependability in a case study, and the experimental results demonstrate that improving the detection rate of TtD as well as the successful rate of self-healing will greatly increase the autonomic dependability.
    2011,22(6):1299-1315 , DOI: 10.3724/SP.J.1001.2011.03993
    [Abstract] (12659) [HTML] (0) [PDF 987.90 K] (32888)
    Abstract:
    Attribute-Based encryption (ABE) scheme takes attributes as the public key and associates the ciphertext and user’s secret key with attributes, so that it can support expressive access control policies. This dramatically reduces the cost of network bandwidth and sending node’s operation in fine-grained access control of data sharing. Therefore, ABE has a broad prospect of application in the area of fine-grained access control. After analyzing the basic ABE system and its two variants, Key-Policy ABE (KP-ABE) and Ciphertext-Policy ABE (CP-ABE), this study elaborates the research problems relating to ABE systems, including access structure design for CP-ABE, attribute key revocation, key abuse and multi-authorities ABE with an extensive comparison of their functionality and performance. Finally, this study discusses the need-to-be solved problems and main research directions in ABE.
    2009,20(3):524-545
    [Abstract] (18363) [HTML] (0) [PDF 1.09 M] (32320)
    Abstract:
    Nowadays it has been widely accepted that the quality of software highly depends on the process that iscarried out in an organization. As part of the effort to support software process engineering activities, the researchon software process modeling and analysis is to provide an effective means to represent and analyze a process and,by doing so, to enhance the understanding of the modeled process. In addition, an enactable process model canprovide a direct guidance for the actual development process. Thus, the enforcement of the process model candirectly contribute to the improvement of the software quality. In this paper, a systematic review is carried out tosurvey the recent development in software process modeling. 72 papers from 20 conference proceedings and 7journals are identified as the evidence. The review aims to promote a better understanding of the literature byanswering the following three questions: 1) What kinds of paradigms are existing methods based on? 2) What kinds of purposes does the existing research have? 3) What kinds of new trends are reflected in the current research? Afterproviding the systematic review, we present our software process modeling method based on a multi-dimensionaland integration methodology that is intended to address several core issues facing the community.
    2014,25(1):37-50 , DOI: 10.13328/j.cnki.jos.004497
    [Abstract] (11671) [HTML] (7167) [PDF 929.87 K] (32186)
    Abstract:
    This paper surveys the state of the art of speech emotion recognition (SER), and presents an outlook on the trend of future SER technology. First, the survey summarizes and analyzes SER in detail from five perspectives, including emotion representation models, representative emotional speech corpora, emotion-related acoustic features extraction, SER methods and applications. Then, based on the survey, the challenges faced by current SER research are concluded. This paper aims to take a deep insight into the mainstream methods and recent progress in this field, and presents detailed comparison and analysis between these methods.
    2018,29(10):2966-2994 , DOI: 10.13328/j.cnki.jos.005551
    [Abstract] (11503) [HTML] (8995) [PDF 610.06 K] (31180)
    Abstract:
    In recent years, the rapid development of Internet technology and Web applications has triggered the explosion of various data on the Internet, which generates a large amount of valuable knowledge. How to organize, represent and analyze these knowledge has attracted much attention. Knowledge graph was thus developed to organize these knowledge in a semantical and visualized manner. Knowledge reasoning over knowledge graph then becomes one of the hot research topics and plays an important role in many applications such as vertical search and intelligent question-answer. The goal of knowledge reasoning over knowledge graph is to infer new facts or identify erroneous facts according to existing ones. Unlike traditional knowledge reasoning, knowledge reasoning over knowledge graph is more diversified, due to the simplicity, intuitiveness, flexibility, and richness of knowledge representation in knowledge graph. Starting with the basic concept of knowledge reasoning, this paper presents a survey on the recently developed methods for knowledge reasoning over knowledge graph. Specifically, the research progress is reviewed in detail from two aspects:One-Step reasoning and multi-step reasoning, each including rule based reasoning, distributed embedding based reasoning, neural network based reasoning and hybrid reasoning. Finally, future research directions and outlook of knowledge reasoning over knowledge graph are discussed.
    2013,24(4):825-842 , DOI: 10.3724/SP.J.1001.2013.04369
    [Abstract] (9893) [HTML] (0) [PDF 1.09 M] (30624)
    Abstract:
    Honeypot is a proactive defense technology, introduced by the defense side to change the asymmetric situation of a network attack and defensive game. Through the deployment of the honeypots, i.e. security resources without any production purpose, the defenders can deceive attackers to illegally take advantage of the honeypots and capture and analyze the attack behaviors to understand the attack tools and methods, and to learn the intentions and motivations. Honeypot technology has won the sustained attention of the security community to make considerable progress and get wide application, and has become one of the main technical means of the Internet security threat monitoring and analysis. In this paper, the origin and evolution process of the honeypot technology are presented first. Next, the key mechanisms of honeypot technology are comprehensively analyzed, the development process of the honeypot deployment structure is also reviewed, and the latest applications of honeypot technology in the directions of Internet security threat monitoring, analysis and prevention are summarized. Finally, the problems of honeypot technology, development trends and further research directions are discussed.
    2018,29(10):3068-3090 , DOI: 10.13328/j.cnki.jos.005607
    [Abstract] (10779) [HTML] (11278) [PDF 2.28 M] (30010)
    Abstract:
    Designing problems are ubiquitous in science research and industry applications. In recent years, Bayesian optimization, which acts as a very effective global optimization algorithm, has been widely applied in designing problems. By structuring the probabilistic surrogate model and the acquisition function appropriately, Bayesian optimization framework can guarantee to obtain the optimal solution under a few numbers of function evaluations, thus it is very suitable to solve the extremely complex optimization problems in which their objective functions could not be expressed, or the functions are non-convex, multimodal and computational expensive. This paper provides a detailed analysis on Bayesian optimization in methodology and application areas, and discusses its research status and the problems in future researches. This work is hopefully beneficial to the researchers from the related communities.
    2004,15(11):1583-1594
    [Abstract] (10216) [HTML] (0) [PDF 1.57 M] (29904)
    Abstract:
    Uncertainty exists widely in the subjective and objective world. In all kinds of uncertainty, randomness and fuzziness are the most important and fundamental. In this paper, the relationship between randomness and fuzziness is discussed. Uncertain states and their changes can be measured by entropy and hyper-entropy respectively. Taken advantage of entropy and hyper-entropy, the uncertainty of chaos, fractal and complex networks by their various evolution and differentiation are further studied. A simple and effective way is proposed to simulate the uncertainty by means of knowledge representation which provides a basis for the automation of both logic and image thinking with uncertainty. The AI (artificial intelligence) with uncertainty is a new cross-discipline, which covers computer science, physics, mathematics, brain science, psychology, cognitive science, biology and philosophy, and results in the automation of representation, process and thinking for uncertain information and knowledge.
    2011,22(3):381-407 , DOI: 10.3724/SP.J.1001.2011.03934
    [Abstract] (11349) [HTML] (0) [PDF 614.69 K] (29647)
    Abstract:
    The popularity of the Internet and the boom of the World Wide Web foster innovative changes in software technology that give birth to a new form of software—networked software, which delivers diversified and personalized on-demand services to the public. With the ever-increasing expansion of applications and users, the scale and complexity of networked software are growing beyond the information processing capability of human beings, which brings software engineers a series of challenges to face. In order to come to a scientific understanding of this kind of ultra-large-scale artificial complex systems, a survey research on the infrastructure, application services, and social interactions of networked software is conducted from a three-dimensional perspective of cyberization, servicesation, and socialization. Interestingly enough, most of them have been found to share the same global characteristics of complex networks such as “Small World” and “Scale Free”. Next, the impact of the empirical study on software engineering research and practice and its implications for further investigations are systematically set forth. The convergence of software engineering and other disciplines will put forth new ideas and thoughts that will breed a new way of thinking and input new methodologies for the study of networked software. This convergence is also expected to achieve the innovations of theories, methods, and key technologies of software engineering to promote the rapid development of software service industry in China.
    2019,30(2):440-468 , DOI: 10.13328/j.cnki.jos.005659
    [Abstract] (10521) [HTML] (10051) [PDF 3.27 M] (29633)
    Abstract:
    Recent years, applying Deep Learning (DL) into Image Semantic Segmentation (ISS) has been widely used due to its state-of-the-art performances and high-quality results. This paper systematically reviews the contribution of DL to the field of ISS. Different methods of ISS based on DL (ISSbDL) are summarized. These methods are divided into ISS based on the Regional Classification (ISSbRC) and ISS based on the Pixel Classification (ISSbPC) according to the image segmentation characteristics and segmentation granularity. Then, the methods of ISSbPC are surveyed from two points of view:ISS based on Fully Supervised Learning (ISSbFSL) and ISS based on Weakly Supervised Learning (ISSbWSL). The representative algorithms of each method are introduced and analyzed, as well as the basic workflow, framework, advantages and disadvantages of these methods are detailedly analyzed and compared. In addition, the related experiments of ISS are analyzed and summarized, and the common data sets and performance evaluation indexes in ISS experiments are introduced. Finally, possible research directions and trends are given and analyzed.
    2010,21(7):1605-1619
    [Abstract] (10740) [HTML] (0) [PDF 856.25 K] (29338)
    Abstract:
    The rapid development of Internet leads to an increase in system complexity and uncertainty. Traditional network management can not meet the requirement, and it shall evolve to fusion based Cyberspace Situational Awareness (CSA). Based on the analysis of function shortage and development requirement, this paper introduces CSA as well as its origin, conception, objective and characteristics. Firstly, a CSA research framework is proposed and the research history is investigated, based on which the main aspects and the existing issues of the research are analyzed. Meanwhile, assessment methods are divided into three categories: Mathematics model, knowledge reasoning and pattern recognition. Then, this paper discusses CSA from three aspects: Model, knowledge representation and assessment methods, and then goes into detail about main idea, assessment process, merits and shortcomings of novel methods. Many typical methods are compared. The current application research of CSA in the fields of security, transmission, survivable, system evaluation and so on is presented. Finally, this paper points the development directions of CSA and offers the conclusions from issue system, technical system and application system.
    2018,29(7):2092-2115 , DOI: 10.13328/j.cnki.jos.005589
    [Abstract] (11823) [HTML] (9034) [PDF 2.52 M] (29182)
    Abstract:
    Blockchain is a distributed public ledger technology that originates from the digital cryptocurrency, bitcoin. Its development has attracted wide attention in industry and academia fields. Blockchain has the advantages of de-centralization, trustworthiness, anonymity and immutability. It breaks through the limitation of traditional center-based technology and has broad development prospect. This paper introduces the research progress of blockchain technology and its application in the field of information security. Firstly, the basic theory and model of blockchain are introduced from five aspects:Basic framework, key technology, technical feature, and application mode and area. Secondly, from the perspective of current research situation of blockchain in the field of information security, this paper summarizes the research progress of blockchain in authentication technology, access control technology and data protection technology, and compares the characteristics of various researches. Finally, the application challenges of blockchain technology are analyzed, and the development outlook of blockchain in the field of information security is highlighted. This study intends to provide certain reference value for future research work.
    2009,20(1):124-137
    [Abstract] (18212) [HTML] (0) [PDF 1.06 M] (29000)
    Abstract:
    The appearance of plenty of intelligent devices equipped for short-range wireless communications boosts the fast rise of wireless ad hoc networks application. However, in many realistic application environments, nodes form a disconnected network for most of the time due to nodal mobility, low density, lossy link, etc. Conventional communication model of mobile ad hoc network (MANET) requires at least one path existing from source to destination nodes, which results in communication failure in these scenarios. Opportunistic networks utilize the communication opportunities arising from node movement to forward messages in a hop-by-hop way, and implement communications between nodes based on the "store-carry-forward" routing pattern. This networking approach, totally different from the traditional communication model, captures great interests from researchers. This paper first introduces the conceptions and theories of opportunistic networks and some current typical applications. Then it elaborates the popular research problems including opportunistic forwarding mechanism, mobility model and opportunistic data dissemination and retrieval. Some other interesting research points such as communication middleware, cooperation and security problem and new applications are stated briefly. Finally, the paper concludes and looks forward to the possible research focuses for opportunistic networks in the future.
    2005,16(1):1-7
    [Abstract] (23655) [HTML] (0) [PDF 614.61 K] (28774)
    Abstract:
    The paper gives some thinking according to the following four aspects: 1) from the law of things development, revealing the development history of software engineering technology; 2) from the point of software natural characteristic, analyzing the construction of every abstraction layer of virtual machine; 3) from the point of software development, proposing the research content of software engineering discipline, and research the pattern of industrialized software production; 4) based on the appearance of Internet technology, exploring the development trend of software technology.
    2014,25(4):839-862 , DOI: 10.13328/j.cnki.jos.004558
    [Abstract] (16529) [HTML] (5418) [PDF 1.32 M] (28698)
    Abstract:
    Batch computing and stream computing are two important forms of big data computing. The research and discussions on batch computing in big data environment are comparatively sufficient. But how to efficiently deal with stream computing to meet many requirements, such as low latency, high throughput and continuously reliable running, and how to build efficient stream big data computing systems, are great challenges in the big data computing research. This paper provides a research of the data computing architecture and the key issues in stream computing in big data environments. Firstly, the research gives a brief summary of three application scenarios of stream computing in business intelligence, marketing and public service. It also shows distinctive features of the stream computing in big data environment, such as real time, volatility, burstiness, irregularity and infinity. A well-designed stream computing system always optimizes in system structure, data transmission, application interfaces, high-availability, and so on. Subsequently, the research offers detailed analyses and comparisons of five typical and open-source stream computing systems in big data environment. Finally, the research specifically addresses some new challenges of the stream big data systems, such as scalability, fault tolerance, consistency, load balancing and throughput.
    2006,17(9):1848-1859
    [Abstract] (13752) [HTML] (0) [PDF 770.40 K] (27989)
    Abstract:
    In recent years, there have been extensive studies and rapid progresses in automatic text categorization, which is one of the hotspots and key techniques in the information retrieval and data mining field. Highlighting the state-of-art challenging issues and research trends for content information processing of Internet and other complex applications, this paper presents a survey on the up-to-date development in text categorization based on machine learning, including model, algorithm and evaluation. It is pointed out that problems such as nonlinearity, skewed data distribution, labeling bottleneck, hierarchical categorization, scalability of algorithms and categorization of Web pages are the key problems to the study of text categorization. Possible solutions to these problems are also discussed respectively. Finally, some future directions of research are given.
    2016,27(11):2855-2869 , DOI: 10.13328/j.cnki.jos.004932
    [Abstract] (3823) [HTML] (4034) [PDF 1.85 M] (27963)
    Abstract:
    With the proliferation of the Chinese social network (especially the rise of weibo), the productivity and lifestyle of the country's society is more and more profoundly influenced by the Chinese internet public events. Due to the lack of the effective technical means, the efficiency of information processing is limited. This paper proposes a public event information entropy calculation method. First, a mathematical modeling of event information content is built. Then, multidimensional random variable information entropy of the public events is calculated based on Shannon information theory. Furthermore, a new technical index of quantitative analysis to the internet public events is put forward, laying out a foundation for further research work.
    2013,24(8):1786-1803 , DOI: 10.3724/SP.J.1001.2013.04416
    [Abstract] (15283) [HTML] (0) [PDF 1.04 M] (27960)
    Abstract:
    Many specific application oriented NoSQL database systems are developed for satisfying the new requirement of big data management. This paper surveys researches on typical NoSQL database based on key-value data model. First, the characteristics of big data, and the key technique issues supporting big data management are introduced. Then frontier efforts and research challenges are given, including system architecture, data model, access mode, index, transaction, system elasticity, load balance, replica strategy, data consistency, flash cache, MapReduce based data process and new generation data management system etc. Finally, research prospects are given.
    2023,34(2):625-654 , DOI: 10.13328/j.cnki.jos.006696
    [Abstract] (4741) [HTML] (7366) [PDF 3.04 M] (27900)
    Abstract:
    Source code bug (vulnerability) detection is a process of judging whether there are unexpected behaviors in the program code. It is widely used in software engineering tasks such as software testing and software maintenance, and plays a vital role in software functional assurance and application security. Traditional vulnerability detection research is based on program analysis, which usually requires strong domain knowledge and complex calculation rules, and faces the problem of state explosion, resulting in limited detection performance, and there is room for greater improvement in the rate of false positives and false negatives. In recent years, the open source community's vigorous development has accumulated massive amounts of data with open source code as the core. In this context, the feature learning capabilities of deep learning can automatically learn semantically rich code representations, thereby providing a new way for vulnerability detection. This study collected the latest high-level papers in this field, systematically summarized and explained the current methods from two aspects:vulnerability code dataset and deep learning vulnerability detection model. Finally, it summarizes the main challenges faced by the research in this field, and looks forward to the possible future research focus.
    2005,16(10):1743-1756
    [Abstract] (11239) [HTML] (0) [PDF 545.62 K] (27803)
    Abstract:
    This paper presents a survey on the theory of provable security and its applications to the design and analysis of security protocols. It clarifies what the provable security is, explains some basic notions involved in the theory of provable security and illustrates the basic idea of random oracle model. It also reviews the development and advances of provably secure public-key encryption and digital signature schemes, in the random oracle model or the standard model, as well as the applications of provable security to the design and analysis of session-key distribution protocols and their advances.
    2012,23(8):2058-2072 , DOI: 10.3724/SP.J.1001.2012.04237
    [Abstract] (11155) [HTML] (0) [PDF 800.05 K] (27774)
    Abstract:
    The Distributed denial of service (DDoS) attack is a major threat to the current network. Based on the attack packet level, the study divides DDoS attacks into network-level DDoS attacks and application-level DDoS attacks. Next, the study analyzes the detection and control methods of these two kinds of DDoS attacks in detail, and it also analyzes the drawbacks of different control methods implemented in different network positions. Finally, the study analyzes the drawbacks of the current detection and control methods, the development trend of the DDoS filter system, and corresponding technological challenges are also proposed.
    2020,31(7):2127-2156 , DOI: 10.13328/j.cnki.jos.006052
    [Abstract] (7714) [HTML] (9459) [PDF 802.56 K] (27722)
    Abstract:
    Machine learning has become a core technology in areas such as big data, Internet of Things, and cloud computing. Training machine learning models requires a large amount of data, which is often collected by means of crowdsourcing and contains a large number of private data including personally identifiable information (such as phone number, id number, etc.) and sensitive information (such as financial data, health care, etc.). How to protect these data with low cost and high efficiency is an important issue. This paper first introduces the concept of machine learning, explains various definitions of privacy in machine learning and demonstrates all kinds of privacy threats encountered in machine learning, then continues to elaborate on the working principle and outstanding features of the mainstream technology of machine learning privacy protection. According to differential privacy, homomorphic encryption, and secure multi-party computing, the research achievements in the field of machine learning privacy protection are summarized respectively. On this basis, the paper comparatively analyzes the main advantages and disadvantages of different mechanisms of privacy preserving for machine learning. Finally, the developing trend of privacy preserving for machine learning is prospected, and the possible research directions in this field are proposed.
    2021,32(2):496-518 , DOI: 10.13328/j.cnki.jos.006140
    [Abstract] (7550) [HTML] (12337) [PDF 2.20 M] (27540)
    Abstract:
    Deep learning has achieved great success in the field of computer vision, surpassing many traditional methods. However, in recent years, deep learning technology has been abused in the production of fake videos, making fake videos represented by Deepfakes flooding on the Internet. This technique produces pornographic movies, fake news, political rumors by tampering or replacing the face information of the original videos and synthesizes fake speech. In order to eliminate the negative effects brought by such forgery technologies, many researchers have conducted in-depth research on the identification of fake videos and proposed a series of detection methods to help institutions or communities to identify such fake videos. Nevertheless, the current detection technology still has many limitations such as specific distribution data, specific compression ratio, and so on, far behind the generation technology of fake video. In addition, different researchers handle the problem from different angles. The data sets and evaluation indicators used are not uniform. So far, the academic community still lacks a unified understanding of deep forgery and detection technology. The architecture of deep forgery and detection technology research is not clear. In this review, the development of deep forgery and detection technologies are reviewed. Besides, existing research works are systematically summarize and scientifically classified. Finally, the social risks posed by the spread of Deepfakes technology are discussed, the limitations of detection technology are analyzed, and the challenges and potential research directions of detection technology are discussed, aiming to provide guidance for follow-up researchers to further promote the development and deployment of Deepfakes detection technology.
    2003,14(9):1621-1628
    [Abstract] (14325) [HTML] (0) [PDF 680.35 K] (27392)
    Abstract:
    Recommendation system is one of the most important technologies in E-commerce. With the development of E-commerce, the magnitudes of users and commodities grow rapidly, resulted in the extreme sparsity of user rating data. Traditional similarity measure methods work poor in this situation, make the quality of recommendation system decreased dramatically. To address this issue a novel collaborative filtering algorithm based on item rating prediction is proposed. This method predicts item ratings that users have not rated by the similarity of items, then uses a new similarity measure to find the target users?neighbors. The experimental results show that this method can efficiently improve the extreme sparsity of user rating data, and provid better recommendation results than traditional collaborative filtering algorithms.
    2013,24(2):295-316 , DOI: 10.3724/SP.J.1001.2013.04336
    [Abstract] (10719) [HTML] (0) [PDF 0.00 Byte] (27391)
    Abstract:
    Under the new application mode, the traditional hierarchy data centers face several limitations in size, bandwidth, scalability, and cost. In order to meet the needs of new applications, data center network should fulfill the requirements with low-cost, such as high scalability, low configuration overhead, robustness and energy-saving. First, the shortcomings of the traditional data center network architecture are summarized, and new requirements are pointed out. Secondly, the existing proposals are divided into two categories, i.e. server-centric and network-centric. Then, several representative architectures of these two categories are overviewed and compared in detail. Finally, the future directions of data center network are discussed.

学术社区

External Links

You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063