Zhang, Xin Lu, Siyuan Wang, Shui-Hua Yu, Xiang Wang, Su-Jing Yao, Lun Pan, Yi Zhang, Yu-Dong
Published in
Journal of Computer Science and Technology
COVID-19 is a contagious infection that has severe effects on the global economy and our daily life. Accurate diagnosis of COVID-19 is of importance for consultants, patients, and radiologists. In this study, we use the deep learning network AlexNet as the backbone, and enhance it with the following two aspects: 1) adding batch normalization to hel...
Zhu, Dan-Hao Dai, Xin-Yu Chen, Jia-Jun
Published in
Journal of Computer Science and Technology
Graph neural networks (GNNs) have shown great power in learning on graphs. However, it is still a challenge for GNNs to model information faraway from the source node. The ability to preserve global information can enhance graph representation and hence improve classification precision. In the paper, we propose a new learning framework named G-GNN ...
Shi, Wen-Jun Cao, Qin-Xiang Deng, Yu-Xin Jiang, Han-Ru Feng, Yuan
Published in
Journal of Computer Science and Technology
A quantum circuit is a computational unit that transforms an input quantum state to an output state. A natural way to reason about its behavior is to compute explicitly the unitary matrix implemented by it. However, when the number of qubits increases, the matrix dimension grows exponentially and the computation becomes intractable. In this paper, ...
Xu, Jingwen Huang, Yanhong Shi, Jianqi Qin, Shengchao
Published in
Journal of Computer Science and Technology
To cater for the scenario of coordinated transportation of multiple trucks on the highway, a platoon system for autonomous driving has been extensively explored in the industry. Before such a platoon is deployed, it is necessary to ensure the safety of its driving behavior, whereby each vehicle’s behavior is commanded by the decision-making functio...
Liu, Ke Wang, Jing-Yi Wei, Qiang Zhang, Zhen-Yong Sun, Jun Ma, Rong-Kuan Deng, Rui-Long
Published in
Journal of Computer Science and Technology
Programmable logic controllers (PLCs) play a critical role in many industrial control systems, yet face increasingly serious cyber threats. In this paper, we propose a novel PLC-compatible software-based defense mechanism, called Heterogeneous Redundant Proactive Defense Framework (HRPDF). We propose a heterogeneous PLC architecture in HRPDF, inclu...
Xie, Tao Qin, Shengchao Zhang, Wenhui
Published in
Journal of Computer Science and Technology
Chen, Bo Liu, Liang Ma, Hua-Dong
Published in
Journal of Computer Science and Technology
This paper proposes the Content Diffusion Model (CDM) for modeling the content diffusion process in information-centric networking (ICN). CDM is inspired by the epidemic model and it provides a method of theoretical quantitative analysis for the content diffusion process in ICN. Specifically, CDM introduces the key functions to formalize the key fa...
Zhang, Gen Wang, Peng-Fei Yue, Tai Zhou, Xu Lu, Kai
Published in
Journal of Computer Science and Technology
Allocation, dereferencing, and freeing of memory data in kernels are coherently linked. There widely exist real cases where the correctness of memory is compromised. This incorrectness in kernel memory brings about significant security issues, e.g., information leaking. Though memory allocation, dereferencing, and freeing are closely related, previ...
Wang, Chun-Hui Jin, Zhi Zhang, Wei Zowghi, Didar Zhao, Hai-Yan Jiao, Wen-Pin
Published in
Journal of Computer Science and Technology
Many applications need to meet diverse requirements of a large-scale distributed user group. That challenges the current requirements engineering techniques. Crowd-based requirements engineering was proposed as an umbrella term for dealing with the requirements development in the context of the large-scale user group. However, there are still many ...
Wang, Ying-Jie Yin, Liang-Ze Dong, Wei
Published in
Journal of Computer Science and Technology
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions. If a security-sensitive operation is unchecked, a missing-check issue arises. Missing check is a class of severe bugs in software programs especially in operating system kernels, which may cause a variety o...