Volume 16, Number 6, December 2022
A structural variation genotyping algorithm enhanced by CNV quantitative transfer.

Tian Zheng Xinyang Qian Jiayin Wang

On the hardness of NTRU problems.

Yang Wang Mingqiang Wang

An approach for detecting LDoS attack based on cloud model.

Wei Shi Dan Tang Sijia Zhan Zheng Qin Xiyin Wang

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.

Qingqing Gan Joseph K. Liu Xiaoming Wang Xingliang Yuan Shi-Feng Sun Daxin Huang Cong Zuo Jianfeng Wang

Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand.

Yuyou Yao Wenming Wu Gaofeng Zhang Benzhu Xu Liping Zheng

Instance-sequence reasoning for video question answering.

Rui Liu Yahong Han

CrowdDesigner: information-rich and personalized product description generation.

Qiuyun Zhang Bin Guo Sicong Liu Jiaqi Liu Zhiwen Yu

Data fusing and joint training for learning with noisy labels.

Yi Wei Mei Xue Xin Liu Pengxiang Xu

Super solutions of the model RB.

Guangyan Zhou Wei Xu

Referring image segmentation with attention guided cross modal fusion for semantic oriented languages.

Qianli Zhou Rong Wang Hai-Miao Hu Quange Tan Wenjin Zhang

Defense against local model poisoning attacks to byzantine-robust federated learning.

Shiwei Lu Ruihu Li Xuan Chen Yuena Ma

Revenue-maximizing online stable task assignment on taxi-dispatching platforms.

Jingwei Lv Ze Zhao Shuzhen Yao Weifeng Lv

String kernels construction and fusion: a survey with bioinformatics application.

Ren Qi Fei Guo Quan Zou

Graph convolution machine for context-aware recommender system.

Jiancan Wu Xiangnan He Xiang Wang Qifan Wang Weijian Chen Jianxun Lian Xing Xie

Distant supervised relation extraction based on residual attention.

Zhiyun Zheng Yun Liu Dun Li Xingjin Zhang

A survey of music emotion recognition.

Donghong Han Yanru Kong Jiayi Han Guoren Wang

ResLNet: deep residual LSTM network with longer input for action recognition.

Tian Wang Jiakun Li Huai-Ning Wu Ce Li Hichem Snoussi Yang Wu

Exploiting comments information to improve legal public opinion news abstractive summarization.

Yuxin Huang Zhengtao Yu Yan Xiang Zhiqiang Yu Junjun Guo

Effort-aware cross-project just-in-time defect prediction framework for mobile apps.

Tian Cheng Kunsong Zhao Song Sun Muhammad Mateen Junhao Wen

Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities.

Rong Zeng Xiaofeng Hou Lu Zhang Chao Li Wenli Zheng Minyi Guo


Volume 16, Number 5, October 2022
Metric learning for domain adversarial network.

Haifeng Hu Yan Yang Yueming Yin Jiansheng Wu

Endowing rotation invariance for 3D finger shape and vein verification.

Hongbin Xu Weili Yang Qiuxia Wu Wenxiong Kang

A mobile edge computing-based applications execution framework for Internet of Vehicles.

Libing Wu Rui Zhang Qingan Li Chao Ma Xiaochuan Shi

A survey of discourse parsing.

Jiaqi Li Ming Liu Bing Qin Ting Liu

Towards a better prediction of subcellular location of long non-coding RNA.

Zhao-Yue Zhang Zi-Jie Sun Yu-He Yang Hao Lin

Line drawing via saliency map and ETF.

Shiguang Liu Ziqi Liu

Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network.

Pengpai Wang Mingliang Wang Yueying Zhou Ziming Xu Daoqiang Zhang

Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers.

Sijing Cheng Chao Chen Shenle Pan Hongyu Huang Wei Zhang Yuming Feng

Informative and diverse emotional conversation generation with variational recurrent pointer-generator.

Weichao Wang Shi Feng Kaisong Song Daling Wang Shifeng Li

Exploiting natural language services: a polarity based black-box attack.

Fatma Gumus Mehmet Fatih Amasyali

Challenges and future directions of secure federated learning: a survey.

Kaiyue Zhang Xuan Song Chenhan Zhang Shui Yu

Self-corrected unsupervised domain adaptation.

Yunyun Wang Chao Wang Hui Xue Songcan Chen


Volume 16, Number 4, August 2022
Disk based pay-as-you-go record linkage.

Chenchen Sun Derong Shen

SeBROP: blind ROP attacks without returns.

Tianning Zhang Miao Cai Diming Zhang Hao Huang

Disclosing incoherent sparse and low-rank patterns inside homologous GPCR tasks for better modelling of ligand bioactivities.

Jiansheng Wu Chuangchuang Lan Xuelin Ye Jiale Deng Wanqing Huang Xueni Yang Yanxiang Zhu Haifeng Hu

Flexibility and rigidity index for chromosome packing, flexibility and dynamics analysis.

Jiajie Peng Jinjin Yang D. Vijay Anand Xuequn Shang Kelin Xia

Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication.

Xianxian Li Bing Cai Li-e Wang Lei Lei

An efficient and authenticated key establishment scheme based on fog computing for healthcare system.

Xinghua Li Ting Chen Qingfeng Cheng Jian-Feng Ma

Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images.

Guoshuai Zhou Xiuxia Tian Aoying Zhou

Demystifying Ethereum account diversity: observations, models and analysis.

Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin

The parametric complexity of bisimulation equivalence of normed pushdown automata.

Wenbo Zhang

DRPS: efficient disk-resident parameter servers for distributed machine learning.

Zhen Song Yu Gu Zhigang Wang Ge Yu

Improving deep reinforcement learning by safety guarding model via hazardous experience planning.

Pai Peng Fei Zhu Xinghong Ling Peiyao Zhao Quan Liu

Polynomial stacked-attention network for nationality classification.

Kunyan Li Jie Zhang Shiguang Shan

Controllable data synthesis method for grammatical error correction.

Liner Yang Chengcheng Wang Yun Chen Yongping Du Erhong Yang

Pusher: an augmented fuzzer based on the connection between input and comparison operand.

Bin Zhang Jiaxi Ye Ruilin Li Chao Feng Yunfei Su Chaojing Tang

Handling class imbalance problem in software maintainability prediction: an empirical investigation.

Ruchika Malhotra Kusum Lata

Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy.

Bo Wang Li Hu Bowen Wei Zitong Kang Chongyi Li

Accelerating temporal action proposal generation via high performance computing.

Tian Wang Shiye Lei Youyou Jiang Chang Choi Hichem Snoussi Guangcun Shan Yao Fu

Exploring associations between streetscape factors and crime behaviors using Google Street View images.

Mingyu Deng Wei Yang Chao Chen Chenxi Liu

SCARE and power attack on AES-like block ciphers with secret S-box.

Xin Liu An Wang Liehuang Zhu Yaoling Ding Zeyuan Lyu Zongyue Wang

Monotonicity and nonmonotonicity in L3-valued propositional logic.

Wei Li Yuefei Sui


Volume 16, Number 3, June 2022
Biomedical entity linking based on less labeled data.

Yu Hu Derong Shen Tiezheng Nie Yue Kou Ge Yu

K-ary search tree revisited: improving construction and intersection efficiency.

Xingshen Song Jinsheng Deng Fengcai Qiao Kun Jiang

Exploiting user behavior learning for personalized trajectory recommendations.

Xiao Pan Lei Wu Fenjie Long Ma Ang

Collaborative eye tracking based code review through real-time shared gaze visualization.

Shiwei Cheng Jialing Wang Xiaoquan Shen Yijian Chen Anind K. Dey

SCENERY: a lightweight block cipher based on Feistel structure.

Jingya Feng Lang Li

Transferring priors from virtual data for crowd counting in real world.

Xiaoheng Jiang Hao Liu Li Zhang Geyang Li Mingliang Xu Pei Lv Bing Zhou

On the learning dynamics of two-layer quadratic neural networks for understanding deep learning.

Zhenghao Tan Songcan Chen

Mask guided diverse face image synthesis.

Sun Song Bo Zhao Muhammad Mateen Xin Chen Junhao Wen

Model-based automated testing of JavaScript Web applications via longer test sequences.

Pengfei Gao Yongjie Xu Fu Song Taolue Chen

Compressed page walk cache.

Dunbo Zhang Chaoyang Jia Li Shen

On the use of formal methods to model and verify neuronal archetypes.

Elisabetta De Maria Abdorrahim Bahrami Thibaud L'Yvonnet Amy P. Felty Daniel Gaffé Annie Ressouche Franck Grammont

An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network.

Lei Nie Bo Liu Peng Li Heng He Libing Wu

Full friendly index sets of mCn.

Yurong Ji Jinmeng Liu Yujie Bai Shufei Wu

Accelerating the cryo-EM structure determination in RELION on GPU cluster.

Xin You Hailong Yang Zhongzhi Luan Depei Qian

Towards better entity linking.

Mingyang Li Yuqing Xing Fang Kong Guodong Zhou

Probabilistic synthesis against GR(1) winning condition.

Wei Zhao Rui Li Wanwei Liu Wei Dong Zhiming Liu

ForkXplorer: an approach of fork summary generation.

Zhang Zhang Xinjun Mao Chao Zhang Yao Lu

A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor.

Lei Wu Fuyou Miao Keju Meng Xu Wang

A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.

Zhusen Liu Zhenfu Cao Xiaolei Dong Xiaopeng Zhao Haiyong Bao Jiachen Shen

Multi-key FHE without ciphertext-expansion in two-server model.

Bingbing Jiang

Dynamic road crime risk prediction with urban open data.

Binbin Zhou Longbiao Chen Fangxun Zhou Shijian Li Sha Zhao Gang Pan

An optimal differentially private data release mechanism with constrained error.

Hao Wang Zhengquan Xu Xiaoshan Zhang Xiao Peng Kaiju Li

Mean estimation over numeric data with personalized local differential privacy.

Qiao Xue Youwen Zhu Jian Wang

New construction of highly nonlinear resilient S-boxes via linear codes.

Haixia Zhao Yongzhuang Wei

Speech-driven facial animation with spectral gathering and temporal attention.

Yujin Chai Yanlin Weng Lvdi Wang Kun Zhou

A subgraph matching algorithm based on subgraph index for knowledge graph.

Yunhao Sun Guanyu Li Jingjing Du Bo Ning Heng Chen

Similarity-based privacy protection for publishing k-anonymous trajectories.

Shuai Wang Chunyi Chen Guijie Zhang

Local feature aggregation algorithm based on graph convolutional network.

Hao Wang Liyan Dong Minghui Sun

A bi-metric autoscaling approach for n-tier web applications on kubernetes.

Changpeng Zhu Bo Han Yinliang Zhao


Volume 16, Number 2, April 2022
TransRec++: Translation-based sequential recommendation with heterogeneous feedback.

Zhuoxin Zhan Mingkai He Weike Pan Zhong Ming

Robust watermarking of databases in order-preserving encrypted domain.

Shijun Xiang Guanqi Ruan Hao Li Jiayong He

Improvement on a batch authenticated key agreement scheme.

Qingfeng Cheng Ting Chen Siqi Ma Xinghua Li

Semantic and secure search over encrypted outsourcing cloud based on BERT.

Zhangjie Fu Yan Wang Xingming Sun Xiaosong Zhang

Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting.

Awais Khan Aun Irtaza Ali Javed Tahira Nazir Hafiz Malik Khalid Mahmood Malik Muhammad Ammar Khan

iNet: visual analysis of irregular transition in multivariate dynamic networks.

Dongming Han Jiacheng Pan Rusheng Pan Dawei Zhou Nan Cao Jingrui He Mingliang Xu Wei Chen

EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption.

Yong Xiao Kaihong Zheng Supaporn Lonapalawong Wenjie Lu Zexian Chen Bin Qian Tianye Zhang Xin Wang Wei Chen

A comprehensive study on fault tolerance in stream processing systems.

Xiaotong Wang Chunxi Zhang Junhua Fang Rong Zhang Weining Qian Aoying Zhou

Spatio-temporal keyword query in semantic trajectories.

Xia Wu Jiankun Yu Xiaoming Zhao

An improved branching algorithm for the proper interval edge deletion problem.

Wenjun Li Xiaojing Tang Yongjie Yang

Relation Reconstructive Binarization of word embeddings.

Feiyang Pan Shuokai Li Xiang Ao Qing He

THS-GWNN: a deep learning framework for temporal network link prediction.

Xian Mo Jun Pang Zhiming Liu

Automated detection on the security of the linked-list operations.

Hongyu Kuang Jian Wang Ruilin Li Chao Feng Yunfei Su Xing Zhang

Return just your search: privacy-preserving homoglyph search for arbitrary languages.

Bowen Zhao Shaohua Tang Ximeng Liu Yiming Wu

Cancer classification with data augmentation based on generative adversarial networks.

Kaimin Wei Tianqi Li Feiran Huang Jinpeng Chen Zefan He

Side-channel analysis attacks based on deep learning network.

Yu Ou Lang Li

DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning.

Juntao Chen Quan Zou Jing Li


Volume 16, Number 1, February 2022
A framework combines supervised learning and dense subgraphs discovery to predict protein complexes.

Suyu Mei

Implementing a sidechain-based asynchronous DPKI.

Ziyuan Li Huimei Wang Jian Liu Ming Xian

IP-geolocater: a more reliable IP geolocation algorithm based on router error training.

Shuodi Zu Xiangyang Luo Fan Zhang

LIDAR: learning from imperfect demonstrations with advantage rectification.

Xiaoqin Zhang Huimin Ma Xiong Luo Jian Yuan

Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm.

Xiaolong Liu Jinchao Liang De-Yu Liu Riqing Chen Shyan-Ming Yuan

MSDA: multi-subset data aggregation scheme without trusted third party.

Zhixin Zeng Xiaodi Wang Yi-Ning Liu Liang Chang

A novel threshold changeable secret sharing scheme.

Lein Harn Chingfang Hsu Zhe Xia

An efficient memory data organization strategy for application-characteristic graph processing.

Peng Fang Fang Wang Zhan Shi Dan Feng Qianxu Yi Xianghao Xu Yongxuan Zhang

Cross-scene passive human activity recognition using commodity WiFi.

Yuanrun Fang Fu Xiao Biyun Sheng Letian Sha Lijuan Sun

Improving accuracy of automatic optical inspection with machine learning.

Xinyu Tong Ziao Yu Xiaohua Tian Houdong Ge Xinbing Wang

OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering.

Arpita Biswas Abhishek Majumdar Soumyabrata Das Krishna Lal Baishnab

The LP-rounding plus greed approach for partial optimization revisited.

Peng Zhang

Label distribution for multimodal machine learning.

Yi Ren Ning Xu Miaogen Ling Xin Geng

Understanding the role of human-inspired heuristics for retrieval models.

Xiangsheng Li Yiqun Liu Jiaxin Mao

GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding.

Huiqun Wang Di Huang Yunhong Wang