Ausgabe 2/2022
Inhalt (20 Artikel)
Automated detection on the security of the linked-list operations
Hongyu Kuang, Jian Wang, Ruilin Li, Chao Feng, YunFei Su, Xing Zhang
ForkXplorer: an approach of fork summary generation
Zhang Zhang, Xinjun Mao, Chao Zhang, Yao Lu
Probabilistic synthesis against GR(1) winning condition
Wei Zhao, Rui Li, Wanwei Liu, Wei Dong, Zhiming Liu
DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning
Juntao Chen, Quan Zou, Jing Li
THS-GWNN: a deep learning framework for temporal network link prediction
Xian Mo, Jun Pang, Zhiming Liu
Relation Reconstructive Binarization of word embeddings
Feiyang Pan, Shuokai Li, Xiang Ao, Qing He
An improved branching algorithm for the proper interval edge deletion problem
Wenjun Li, Xiaojing Tang, Yongjie Yang
Cancer classification with data augmentation based on generative adversarial networks
Kaimin Wei, Tianqi Li, Feiran Huang, Jinpeng Chen, Zefan He
A comprehensive study on fault tolerance in stream processing systems
Xiaotong Wang, Chunxi Zhang, Junhua Fang, Rong Zhang, Weining Qian, Aoying Zhou
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption
Yong Xiao, Kaihong Zheng, Supaporn Lonapalawong, Wenjie Lu, Zexian Chen, Bin Qian, Tianye Zhang, Xin Wang, Wei Chen
TransRec++: Translation-based sequential recommendation with heterogeneous feedback
Zhuo-Xin Zhan, Ming-Kai He, Wei-Ke Pan, Zhong Ming
iNet: visual analysis of irregular transition in multivariate dynamic networks
Dongming Han, Jiacheng Pan, Rusheng Pan, Dawei Zhou, Nan Cao, Jingrui He, Mingliang Xu, Wei Chen
Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting
Awais Khan, Aun Irtaza, Ali Javed, Tahira Nazir, Hafiz Malik, Khalid Mahmood Malik, Muhammad Ammar Khan
Return just your search: privacy-preserving homoglyph search for arbitrary languages
Bowen Zhao, Shaohua Tang, Ximeng Liu, Yiming Wu
Semantic and secure search over encrypted outsourcing cloud based on BERT
Zhangjie Fu, Yan Wang, Xingming Sun, Xiaosong Zhang
Improvement on a batch authenticated key agreement scheme
Qingfeng Cheng, Ting Chen, Siqi Ma, Xinghua Li
Robust watermarking of databases in order-preserving encrypted domain
Shijun Xiang, Guanqi Ruan, Hao Li, Jiayong He