Sun, She Ma, Shuai Song, Jing-He Yue, Wen-Hai Lin, Xue-Lian Ma, Tiejun
Published in
Journal of Computer Science and Technology
With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory data is continuously growing. While large-scale trajectories provide opportunities for various applications, the locations in trajectories pose a threat to individual privacy. Recently, there has been an ...
Chen, Meng-Xin Zhu, Xiao-Dong Zhang, Hao Liu, Zhen Liu, Yuan-Ning
Published in
Journal of Computer Science and Technology
First discovered in Wuhan, China, SARS-CoV-2 is a highly pathogenic novel coronavirus, which rapidly spread globally and became a pandemic with no vaccine and limited distinctive clinical drugs available till March 13th, 2020. Ribonucleic Acid interference (RNAi) technology, a gene-silencing technology that targets mRNA, can cause damage to RNA vir...
Zhang, Xin Lu, Siyuan Wang, Shui-Hua Yu, Xiang Wang, Su-Jing Yao, Lun Pan, Yi Zhang, Yu-Dong
Published in
Journal of Computer Science and Technology
COVID-19 is a contagious infection that has severe effects on the global economy and our daily life. Accurate diagnosis of COVID-19 is of importance for consultants, patients, and radiologists. In this study, we use the deep learning network AlexNet as the backbone, and enhance it with the following two aspects: 1) adding batch normalization to hel...
Zhu, Dan-Hao Dai, Xin-Yu Chen, Jia-Jun
Published in
Journal of Computer Science and Technology
Graph neural networks (GNNs) have shown great power in learning on graphs. However, it is still a challenge for GNNs to model information faraway from the source node. The ability to preserve global information can enhance graph representation and hence improve classification precision. In the paper, we propose a new learning framework named G-GNN ...
Shi, Wen-Jun Cao, Qin-Xiang Deng, Yu-Xin Jiang, Han-Ru Feng, Yuan
Published in
Journal of Computer Science and Technology
A quantum circuit is a computational unit that transforms an input quantum state to an output state. A natural way to reason about its behavior is to compute explicitly the unitary matrix implemented by it. However, when the number of qubits increases, the matrix dimension grows exponentially and the computation becomes intractable. In this paper, ...
Xu, Jingwen Huang, Yanhong Shi, Jianqi Qin, Shengchao
Published in
Journal of Computer Science and Technology
To cater for the scenario of coordinated transportation of multiple trucks on the highway, a platoon system for autonomous driving has been extensively explored in the industry. Before such a platoon is deployed, it is necessary to ensure the safety of its driving behavior, whereby each vehicle’s behavior is commanded by the decision-making functio...
Liu, Ke Wang, Jing-Yi Wei, Qiang Zhang, Zhen-Yong Sun, Jun Ma, Rong-Kuan Deng, Rui-Long
Published in
Journal of Computer Science and Technology
Programmable logic controllers (PLCs) play a critical role in many industrial control systems, yet face increasingly serious cyber threats. In this paper, we propose a novel PLC-compatible software-based defense mechanism, called Heterogeneous Redundant Proactive Defense Framework (HRPDF). We propose a heterogeneous PLC architecture in HRPDF, inclu...
Xie, Tao Qin, Shengchao Zhang, Wenhui
Published in
Journal of Computer Science and Technology
Chen, Bo Liu, Liang Ma, Hua-Dong
Published in
Journal of Computer Science and Technology
This paper proposes the Content Diffusion Model (CDM) for modeling the content diffusion process in information-centric networking (ICN). CDM is inspired by the epidemic model and it provides a method of theoretical quantitative analysis for the content diffusion process in ICN. Specifically, CDM introduces the key functions to formalize the key fa...
Zhang, Gen Wang, Peng-Fei Yue, Tai Zhou, Xu Lu, Kai
Published in
Journal of Computer Science and Technology
Allocation, dereferencing, and freeing of memory data in kernels are coherently linked. There widely exist real cases where the correctness of memory is compromised. This incorrectness in kernel memory brings about significant security issues, e.g., information leaking. Though memory allocation, dereferencing, and freeing are closely related, previ...