Journal of Computer Science and Technology

ISSN 1000-9000 e-ISSN 1860-4749 CN 11-2296/TP
Editor-in-Chief: Zhi-Wei Xu
Journal Home > Previous Issue
Previous Issue
Volume 37
Issue 2, March 2022
pp.277-504 14 articles
Artificial Intelligence and Pattern Recognition
Regular Paper
DG-CNN: Introducing Margin Information into Convolutional Neural Networks for Breast Cancer Diagnosis in Ultrasound Images
https://doi.org/10.1007/s11390-020-0192-0
Published: 31 March 2022
2022, 37 (2): 277-294
Regular Paper
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context
https://doi.org/10.1007/s11390-021-0286-3
Published: 31 March 2022
2022, 37 (2): 295-308
Regular Paper
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling
https://doi.org/10.1007/s11390-020-0326-4
Published: 31 March 2022
2022, 37 (2): 309-319
Regular Paper
Imputing DNA Methylation by Transferred Learning Based Neural Network
https://doi.org/10.1007/s11390-021-1174-6
Published: 31 March 2022
2022, 37 (2): 320-329
Regular Paper
Diagnosis of COVID-19 Pneumonia via a Novel Deep Learning Architecture
https://doi.org/10.1007/s11390-020-0679-8
Published: 31 March 2022
2022, 37 (2): 330-343
Computer Networks and Distributed Computing
Survey
Quality of Service Support in RPL Networks: Standing State and Future Prospects
https://doi.org/10.1007/s11390-022-1027-y
Published: 31 March 2022
2022, 37 (2): 344-368
Regular Paper
Differential Privacy via a Truncated and Normalized Laplace Mechanism
https://doi.org/10.1007/s11390-020-0193-z
Published: 31 March 2022
2022, 37 (2): 369-388
Software Systems
Regular Paper
Test-Driven Feature Extraction of Web Components
https://doi.org/10.1007/s11390-022-0673-4
Published: 31 March 2022
2022, 37 (2): 389-404
Regular Paper
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference
https://doi.org/10.1007/s11390-021-1600-9
Published: 31 March 2022
2022, 37 (2): 405-422
Theory and Algorithms
Regular Paper
Byte Frequency Based Indicators for Crypto-Ransomware Detection from Empirical Analysis
https://doi.org/10.1007/s11390-021-0263-x
Published: 31 March 2022
2022, 37 (2): 423-442
Survey
Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results
https://doi.org/10.1007/s11390-022-0878-6
Published: 31 March 2022
2022, 37 (2): 443-458
Regular Paper
Generalized Goldwasser and Micali's Type Cryptosystem
https://doi.org/10.1007/s11390-021-0806-1
Published: 31 March 2022
2022, 37 (2): 459-467
Regular Paper
Regular Paper
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures
https://doi.org/10.1007/s11390-021-1083-8
Published: 31 March 2022
2022, 37 (2): 468-486
Regular Paper
Conjugate-Gradient Progressive-Iterative Approximation for Loop and Catmull-Clark Subdivision Surface Interpolation
https://doi.org/10.1007/s11390-020-0183-1
Published: 31 March 2022
2022, 37 (2): 487-504