Journal 2018

作者 文章名称 期刊名称 卷、期、页码
冯登国, 徐静, 兰晓 5G移动通信网络安全研究 软件学报 29,6,1813-1825
ZHEDONG ZHENG, LIANG ZHENG, YI YANG A Discriminatively Learned CNN Embedding for Person Reidentification ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS 14, 1,
Weifeng Chen, Lei Shi, Wei Chen A Survey of Macroscopic Brain Network Visualization Technology CHINESE JOURNAL OF ELECTRONICS 27,5, 889-899
Y. Liu, L. Zhang, and Z. Zhang A Survey of Test Based Automatic Program Repair Journal of Software 13,  8,  437-452
Jianwen Li, Geguang Pu, Lijun Zhang, Moshe Y. Vardi, Jifeng He Accelerating LTL satisfiability checking by SAT solvers Journal of Logic and Computation 28, 6, 1011-1030
Angsheng Li, Xianchen Yin, Bingxiang Xu, Danyang Wang, Jimin Han, Yi Wei, Yun Deng, Ying Xiong, Zhihua Zhang Decoding topologically associating domains with ultra-low resolution Hi-C data by graph structural entropy NATURE COMMUNICATIONS 9
Ji Guan, Yuan Feng, Mingsheng Ying Decomposition of quantum Markov chains and its applications JOURNAL OF COMPUTER AND SYSTEM SCIENCES 95, , 55-68
Qing Ai, Hui-yuan Li, Zhong-qing Wang Diagonalized Legendre spectral methods using Sobolev orthogonal polynomials for elliptic boundary value problems APPLIED NUMERICAL MATHEMATICS 127, 196-210
G. Barmpalias, R. Elwes and A.E.M. Lewis Digital Morphogenesis via Schelling Segregation Nonlinearity 31, 1593–1638
Bing Su, Xiaoqing Ding, Hao Wang, Ying Wu Discriminative Dimensionality Reduction for Multi-Dimensional Sequences IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 40, 1, 77-91
Wen Zhang, Yuhang Dub, Taketoshi Yoshidac, Qing Wang DRI-RCNN: An approach to deceptive review identification using recurrent convolutional neural network INFORMATION PROCESSING & MANAGEMENT 54, 4, 576-592
Suna Ma, Huiyuan Li, Zhimin Zhang Efficient Spectral Methods for Some Singular Eigenvalue Problems JOURNAL OF SCIENTIFIC COMPUTING 77, 1, 657-688
Guozhen Zhao, Yan Ge, Biying Shen, Xingjie Wei, Hao Wang Emotion Analysis for Personality Inference from EEG Signals IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 9, 3, 362-371
Huang Kai, Jiang Xiaowen, Zhang Xiaomeng, Yan Rongjie, Wang Ke, Xiong Dongliang, Yan Xiaolang Energy-Efficient Fault-Tolerant Mapping and Scheduling on Heterogeneous Multiprocessor Real-Time Systems IEEE ACCESS 6, , 57614-57630
Xiaowen Jiang, Kai Huang, Xiaomeng Zhang, Rongjie Yan, Ke Wang, Dongliang Xiong and Xiaolang Yan Energy-Efficient Scheduling of Periodic Applications on Safety-Critical Time-Triggered Multiprocessor Systems Electronics 6, 57614-57630
Xiaolan Peng, Hui Chen, Lan Wang, Hongan Wang Evaluating a 3-D virtual talking head on pronunciation learning INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES 109, , 26-40
Fu-Jun Liu, Zhong-Qing Wang, Hui-yuan Li FULLY DIAGONALIZED CHEBYSHEV SPECTRAL METHODS FOR SECOND AND FOURTH ORDER ELLIPTIC BOUNDARY VALUE PROBLEMS INTERNATIONAL JOURNAL OF NUMERICAL ANALYSIS AND MODELING 15, 1-2, 243-259
Lei Ma, Yanyun Chen, Yinling Qian, Hanqiu Sun Incremental Voronoi sets for instant stippling The Visual Computer 34(6-8): 863-873
Zhenya Zhang, Peng Wu, Yu Zhang Localization of Linearizability Faults on the Coarse-Grained Level International Journal of Software Engineering and Knowledge Engineering 27(9&10): 1483-1505
G. Barmpalias, R. Elwes and A. Lewis-Pye Minority population in the one-dimensional Schelling model of segregation Journal of Statistical Physics 173(5), (2018) 1408–1458
Xinglong Liu, Fei Hou, Hong Qin, Aimin Hao Multi-view multi-scale CNNs for lung nodule type classification from CT images Pattern Recognition 77, 262-275
George Barmpalias and Andrew Lewis-Pye Optimal redundancy in computations from random oracles Journal of Computer and System Sciences 92 (2018) 1–8.
George Barmpalias, Andrew Lewis-Pye, Angsheng Li Pointed computations and Martin-Loef randomness Computability 7, 2-3, 171-177
Bin Zhang, Chao Xu, Dengguo Feng Practical Cryptanalysis of Bluetooth Encryption with Condition Masking JOURNAL OF CRYPTOLOGY 31, 2, 394-433
Christian Eisentraut, Jens Chr. Godskesen, Holger Hermanns, Lei Song, Lijun Zhang Probabilistic Bisimulation for Realistic Schedulers Acta Informatica 55, 6, 461-488
Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang Protect white-box AES to resist table composition attacks IET INFORMATION SECURITY 12, 4, 305-313
Ting Gan, Mingshuai Chen, Yangjia Li, Bican Xia, Naijun Zhan Reachability analysis for solvable dynamical systems IEEE Transaction on Automatic Control 63, 7, 2003-2018
Wen Zhang, Yuhang Du, Taketoshi Yoshida, Qing Wang, Xiangjun Li SamEn-SVR: using sample entropy and support vector regression for bug number prediction IET SOFTWARE 12, 3, 183-189
Sirui Lu, Shilin Huang, Keren Li, Jun Li, Jianxin Chen, Dawei Lu, Zhengfeng Ji, Yi Shen, Duanlu Zhou, Bei Zeng Separability-entanglement classifier via machine learning PHYSICAL REVIEW A 98, 1,
Peng Zhang, Bin Fu, Linqing Tang Simpler and Better Approximation Algorithms for the Unweighted Minimum Label s-t Cut Problem ALGORITHMICA 80, 1, 398-409
Yi Xu, Jigen Peng, Wencheng Wang, Binhai Zhu The connected disk covering problem Journal of Combinatorial Optimization 35, 2, 538-554
Su Ning, Liang Xinyu, Zhai Fei-Fei, Zhou Li-Xin, Ni Jun, Yao Ming, Tian Feng, Zhang Shu-Yang, Jin Zheng-Yu, Cui Li-Ying, Gong Gaolang, Zhu Yi-Cheng The consequence of cerebral small vessel disease: Linking brain atrophy to motor impairment in the elderly HUMAN BRAIN MAPPING 39,11,4452-4461
ZHIWU XU, PING LU, HAIMING CHEN Towards an effective syntax and a generator for deterministic standard regular expressions The Computer Journal https://doi.org/10.1093/comjnl/bxy110
YING JIANG, JIAN LIU, GILLES DOWEK, KAILIANG JI Towards Combining Model Checking and Proof Checking The Computer Journal http://dx.doi.org/10.1093/comjnl/bxy112
Chao Wang, Yi Lv and Peng Wu TSO-to-TSO linearizability is undecidable Acta Informatica 55, 649–668
Zhiqiang Zeng, Zhihui Li, De Cheng, Huaxiang Zhang, Kun Zhan, Yi Yang Two-Stream Multirate Recurrent Neural Network for Video-Based Pedestrian Reidentification IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 14, 7, 3179-3186
Jiang Tao, Shi Lei, Zhao Ye, Zhang Xiatian, Lu Yao, Huang Congcong Visual Comparison of Customer Stickiness in Retail Stores CHINESE JOURNAL OF ELECTRONICS 27, 5, 951-958
曹巍, 吴恩华 本构模型在基于物理的变形模拟中的应用 郑州大学学报(理学版) , 4, 35-42
李英玲, 王青 持续集成测试用例集优化综述研究 软件学报 29, 10, 3021-3050
赵威 多核模型检测工具CTAV的实现与优化 计算机系统应用 27, 9, 176-181
郑晓琳, 邓玉欣, 付辰, 雷国庆 互模拟准局部验证算法的扩展与实现 软件学报 29,6,1517-1526
张晓航, 石清磊, 王斌, 王炳蔚, 王永吉, 陈力, 吴敬征 机器学习算法在中医诊疗中的研究综述 计算机科学 45, z2, 32-36
姚乃明, 郭清沛, 乔逢春, 陈辉, 王宏安 基于生成式对抗网络的鲁棒人脸表情识别 自动化学报 44,5,865-877
焦迪, 杨猛, 杨刚 基于物理的花开花落与叶片时变动态算法 系统仿真学报 30,6,2076-2085
姬强, 金蓓弘, 崔艳玲, 张扶桑 基于信令流的高速公路车辆实时分类 计算机工程与设计 39, 5, 1439-1505
刘胜航, 陈辉, 朱嘉奇, 武汇岳, 熊金泉, 王宏安 基于语义三角形的自然人机交互模型 中国科学. 信息科学 48,4,466-474
杨克, 贺也平, 马恒太, 王雪飞 精准执行可达性分析:理论与应用 软件学报 29,1,1-22
冯元, 应明生 量子程序验证 软件学报 29,4,1085-1093
张瀚, 李静, 吕品, 徐永志, 刘格林 六角格网的弧线矢量数据量化拟合方法 计算机辅助设计与图形学学报 30,4,557-567
吴文玲 认证加密算法研究进展 密码学报 5,1,70-82
刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 软件与网络安全研究综述 软件学报 29,1,42-68
谢冰, 魏峻, 彭鑫, 孙海龙 数据驱动的软件智能化开发方法与技术专题前言 软件学报 29, 8, 2177-2179
王德鑫, 王青 支持软件过程可信评估的可信证据 软件学报 29, 11, 3412-3434
范俊君, 田丰, 杜一, 刘正捷, 戴国忠 智能时代人机交互的一些思考 中国科学. 信息科学 48,4,361-375