Vol. 63, No. 7, 2020

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Recursive narrative alignment for movie narrating
Han, Zhongyi; Wu, Hongbo; Wei, Benzheng; Yin, Yilong; Li, Shuo
Sci China Inf Sci, 2020, 63(7): 174101
Keywords: Movie Narrating; Visual Captioning; Long Short-Term Memory Networks; Deep Learning; Narrative
Cite as: Han Z Y, Wu H B, Wei B Z, et al. Recursive narrative alignment for movie narrating. Sci China Inf Sci, 2020, 63(7): 174101, doi: 10.1007/s11432-018-9908-4

Vol. 63, No. 6, 2020

MOOP Website SpringerLink Google Scholar Homepage

Detail-preserving smoke simulation using an efficient high-order numerical scheme
Zhu J, Yang Z, Sun H Q, et al
Sci China Inf Sci, 2020, 63(6): 164101
Cite as: Zhu J, Yang Z, Sun H Q, et al. Detail-preserving smoke simulation using an efficient high-order numerical scheme. Sci China Inf Sci, 2020, 63(6): 164101, doi: 10.1007/s11432-018-9889-8

Vol. 63, No. 3, 2020

Special Focus on Security and Privacy in Blockchain-based Applications
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Blockchain-based multiple groups data sharing with anonymity and traceability
Huang, Hui; Chen, Xiaofeng; Wang, Jianfeng
Sci China Inf Sci, 2020, 63(3): 130101
Keywords: multiple groups; data sharing; blockchain; anonymity; traceability
Cite as: Huang H, Chen X F, Wang J F. Blockchain-based multiple groups data sharing with anonymity and traceability. Sci China Inf Sci, 2020, 63(3): 130101, doi: 10.1007/s11432-018-9781-0

Vol. 63, No. 1, 2020

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: fractional Fourier transform; face recognition; convolutional neural networks; deep spatial-frequency feature; illumination
Cite as: Wu X, Tao R, Hong D F, et al. The FrFT convolutional face: toward robust face recognition using the fractional Fourier transform and convolutional neural networks. Sci China Inf Sci, 2020, 63(1): 119103, doi: 10.1007/s11432-018-9862-9

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Effective two-view line segment reconstruction based on structure priors
Wang, Wei; Cui, Hainan; Gao, Wei; Hu, Zhanyi
Sci China Inf Sci, 2020, 63(1): 119102
Keywords: line segment matching; plane fitting; 3D reconstruction; energy optimization; structure prior
Cite as: Wang W, Cui H N, Gao W, et al. Effective two-view line segment reconstruction based on structure priors. Sci China Inf Sci, 2020, 63(1): 119102, doi: 10.1007/s11432-019-9867-9

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Large margin deep embedding for aesthetic image classification
Guo, Guanjun; Wang, Hanzi; Yan, Yan; Zhang, Liming; Li, Bo
Sci China Inf Sci, 2020, 63(1): 119101
Keywords: aesthetic classification; large margin; deep embedding; deep metric learning; joint loss
Cite as: Guo G J, Wang H Z, Yan Y, et al. Large margin deep embedding for aesthetic image classification. Sci China Inf Sci, 2020, 63(1): 119101, doi: 10.1007/s11432-018-9567-8

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Spatiotemporal consistency-based adaptive hand-held video stabilization
Li, Xiao; Li, Shuai; Qin, Hong; Hao, Aimin
Sci China Inf Sci, 2020, 63(1): 114101
Keywords: Hand-held Camera; Adaptive Video Stabilization; Spatial Structure Consistency; Self-Adaptive IMF Selection; Feature-Centric EMD
Cite as: Li X, Li S, Qin H, et al. Spatiotemporal consistency-based adaptive hand-held video stabilization. Sci China Inf Sci, 2020, 63(1): 114101, doi: 10.1007/s11432-018-9764-0

Vol. 62, No. 12, 2019

LETTER Website SpringerLink Google Scholar

Reformulating natural language queries using sequence-to-sequence models
Liu X Y, Pan S D, Zhang Q, et al
Sci China Inf Sci, 2019, 62(12): 229103
Cite as: Liu X Y, Pan S D, Zhang Q, et al. Reformulating natural language queries using sequence-to-sequence models. Sci China Inf Sci, 2019, 62(12): 229103, doi: 10.1007/s11432-018-9479-3

LETTER Website SpringerLink Google Scholar Supplementary

FClassNet: a fingerprint classification network integrated with the domain knowledge
Tang Y, Li R L, Liu Y H, et al
Sci China Inf Sci, 2019, 62(12): 229102
Cite as: Tang Y, Li R L, Liu Y H, et al. FClassNet: a fingerprint classification network integrated with the domain knowledge. Sci China Inf Sci, 2019, 62(12): 229102, doi: 10.1007/s11432-019-9930-4

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Multi-view based neural network for semantic segmentation on 3D scenes
Lu, Yonghua; Zhen, Mingmin; Fang, Tian
Sci China Inf Sci, 2019, 62(12): 229101
Keywords: Multi-view; Semantic Segmentation; CRF; Scene Recognition; 3D scene
Cite as: Lu Y H, Zhen M M, Fang T. Multi-view based neural network for semantic segmentation on 3D scenes. Sci China Inf Sci, 2019, 62(12): 229101, doi: 10.1007/s11432-018-9828-3

NEWS & VIEWS Website SpringerLink Google Scholar

An open-source project for real-time image semantic segmentation
Zhou Q, Wang Y, Liu J, et al
Sci China Inf Sci, 2019, 62(12): 227101
Cite as: Zhou Q, Wang Y, Liu J, et al. An open-source project for real-time image semantic segmentation. Sci China Inf Sci, 2019, 62(12): 227101, doi: 10.1007/s11432-019-2685-1

Special Focus on Deep Learning for Computer Vision
LETTER Website SpringerLink Google Scholar Supplementary

ARPNET: attention region proposal network for 3D object detection
Ye Y Y, Zhang C, Hao X L
Sci China Inf Sci, 2019, 62(12): 220104
Keywords: Attention; Regional Proposal Network; shape-specific proposals; LiDAR-based; 3D object detection
Cite as: Ye Y Y, Zhang C, Hao X L. ARPNET: attention region proposal network for 3D object detection. Sci China Inf Sci, 2019, 62(12): 220104, doi: 10.1007/s11432-019-2636-x

Special Focus on Deep Learning for Computer Vision
RESEARCH PAPER Website SpringerLink Google Scholar

Irregular scene text detection via attention guided border labeling
Chen J, Lian Z H, Wang Y Z, et al
Sci China Inf Sci, 2019, 62(12): 220103
Keywords: scene text detection; weighted border; attention mechanisms; curved text; semantic segmentation
Cite as: Chen J, Lian Z H, Wang Y Z, et al. Irregular scene text detection via attention guided border labeling. Sci China Inf Sci, 2019, 62(12): 220103, doi: 10.1007/s11432-019-2673-8

Special Focus on Deep Learning for Computer Vision
RESEARCH PAPER Website SpringerLink Google Scholar

Uncertainty-optimized deep learning model for small-scale person re-identification
Zhao C R, Chen K, Zang D, et al
Sci China Inf Sci, 2019, 62(12): 220102
Keywords: person re-identification; uncertainty analysis; deep learning
Cite as: Zhao C R, Chen K, Zang D, et al. Uncertainty-optimized deep learning model for small-scale person re-identification. Sci China Inf Sci, 2019, 62(12): 220102, doi: 10.1007/s11432-019-2675-3

Special Focus on Deep Learning for Computer Vision
RESEARCH PAPER Website SpringerLink Google Scholar

Feature context learning for human parsing
Huang T T, Xu Y C, Bai S, et al
Sci China Inf Sci, 2019, 62(12): 220101
Keywords: human parsing; context learning; fully convolutional networks; graph convolutional network; semantic segmentation
Cite as: Huang T T, Xu Y C, Bai S, et al. Feature context learning for human parsing. Sci China Inf Sci, 2019, 62(12): 220101, doi: 10.1007/s11432-019-9935-6

Special Focus on Deep Learning for Computer Vision
EDITORIAL Website SpringerLink Google Scholar

Special focus on deep learning for computer vision
Pang Y W, Bai X, Zhang G F
Sci China Inf Sci, 2019, 62(12): 220100
Cite as: Pang Y W, Bai X, Zhang G F. Special focus on deep learning for computer vision. Sci China Inf Sci, 2019, 62(12): 220100, doi: 10.1007/s11432-019-2701-8

Vol. 62, No. 11, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar

A Kernighan-Lin inspired algorithm for MAX-SAT
Bouhmala N
Sci China Inf Sci, 2019, 62(11): 219106
Cite as: Bouhmala N. A Kernighan-Lin inspired algorithm for MAX-SAT. Sci China Inf Sci, 2019, 62(11): 219106, doi: 10.1007/s11432-018-9786-2

LETTER Website SpringerLink Google Scholar

Toward a K-means clustering approach to adaptive random testing for object-oriented software
Chen J, Zhou M, Tse T H, et al
Sci China Inf Sci, 2019, 62(11): 219105
Cite as: Chen J, Zhou M, Tse T H, et al. Toward a K-means clustering approach to adaptive random testing for object-oriented software. Sci China Inf Sci, 2019, 62(11): 219105, doi: 10.1007/s11432-018-9827-9

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Inferring user profiles in social media by joint modeling of text and networks
Xu, Ruifeng; Du, Jiachen; Zhao, Zhishan; He, Yulan; Gao, Qinghong; Gui, Lin
Sci China Inf Sci, 2019, 62(11): 219104
Keywords: User profiling; Post Content; Linking Graph; Neural Network; Social Media
Cite as: Xu R F, Du J C, Zhao Z S, et al. Inferring user profiles in social media by joint modeling of text and networks. Sci China Inf Sci, 2019, 62(11): 219104, doi: 10.1007/s11432-018-9718-9

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

On the neutrality of two symmetric TSP solvers toward instance specification
Crisan, Gloria Cerasela; Iantovics, Laszlo Barna; Kovacs, Laszlo
Sci China Inf Sci, 2019, 62(11): 219103
Keywords: Solver assessment; Solver neutrality; Combinatorial optimization; Exact methods; Heuristics; Traveling Salesman Problem; Concorde solver; Lin-Kernighan method
Cite as: Crisan G C, Iantovics L B, Kovacs L. On the neutrality of two symmetric TSP solvers toward instance specification. Sci China Inf Sci, 2019, 62(11): 219103, doi: 10.1007/s11432-018-9829-5

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Implicit discourse relation detection using concatenated word embeddings and a gated relevance network
Fu, Jinlan; Zhang, Qi; Chen, Jifan; Peng, Minlong; Gui, Tao; Qiu, Xipeng; Huang, Xuanjing
Sci China Inf Sci, 2019, 62(11): 219102
Keywords: Implicit Discourse Relation Detection; Word Pairs; Concatenated Word Embeddings; Gated Relevance Network; Bilinear Model; Single Layer Network
Cite as: Fu J L, Zhang Q, Chen J F, et al. Implicit discourse relation detection using concatenated word embeddings and a gated relevance network. Sci China Inf Sci, 2019, 62(11): 219102, doi: 10.1007/s11432-018-9528-8

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model
Chen, Xing; Lin, Junxin; Ma, Yun; Lin, Bing; Wang, Haijiang; Huang, Gang
Sci China Inf Sci, 2019, 62(11): 219101
Keywords: Resource Allocation; Software Adaptation; Cloud Computing; Feedback Control; Self-Tuning Control
Cite as: Chen X, Lin J X, Ma Y, et al. Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model. Sci China Inf Sci, 2019, 62(11): 219101, doi: 10.1007/s11432-018-9750-2

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Recommendation over time: a probabilistic model of time-aware recommender systems
Lin, Zuoquan; Chen, Hanxuan
Sci China Inf Sci, 2019, 62(11): 212105
Keywords: recommender system; collaborative filtering; hidden Markov model; precision; cold start
Cite as: Lin Z Q, Chen H X. Recommendation over time: a probabilistic model of time-aware recommender systems. Sci China Inf Sci, 2019, 62(11): 212105, doi: 10.1007/s11432-018-9915-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Accelerating MUS enumeration by inconsistency graph partitioning
Luo, Jie; Liu, Shaofan
Sci China Inf Sci, 2019, 62(11): 212104
Keywords: minimal unsatisfiable subsets; inconsistency graph; graph partition; SAT; UNSAT
Cite as: Luo J, Liu S F. Accelerating MUS enumeration by inconsistency graph partitioning. Sci China Inf Sci, 2019, 62(11): 212104, doi: 10.1007/s11432-019-9881-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

IEA: an answerer recommendation approach on stack overflow
Wang, Liting; Zhang, Li; Jiang, Jing
Sci China Inf Sci, 2019, 62(11): 212103
Keywords: answerer recommendation; activeness; comments; topical interest; topical expertise; stack overflow
Cite as: Wang L T, Zhang L, Jiang J. IEA: an answerer recommendation approach on stack overflow. Sci China Inf Sci, 2019, 62(11): 212103, doi: 10.1007/s11432-018-9848-2

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Accelerating DNN-based 3D point cloud processing for mobile computing
Liu, Bosheng; Chen, Xiaoming; Han, Yinhe; Li, Jiajun; Xu, Haobo; Li, Xiaowei
Sci China Inf Sci, 2019, 62(11): 212102
Keywords: deep neural network acceleration; point cloud data; neighbor point search; mobile robotics; hardware architecture
Cite as: Liu B S, Chen X M, Han Y H, et al. Accelerating DNN-based 3D point cloud processing for mobile computing. Sci China Inf Sci, 2019, 62(11): 212102, doi: 10.1007/s11432-019-9932-3

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Event co-reference resolution via a multi-loss neural network without using argument information
Zuo, Xinyu; Chen, Yubo; Liu, Kang; Zhao, Jun
Sci China Inf Sci, 2019, 62(11): 212101
Keywords: event co-reference resolution; neural network; information extraction; multi-loss function; event extraction
Cite as: Zuo X Y, Chen Y B, Liu K, et al. Event co-reference resolution via a multi-loss neural network without using argument information. Sci China Inf Sci, 2019, 62(11): 212101, doi: 10.1007/s11432-018-9833-1

REVIEW Website SpringerLink Google Scholar Cited in SCI: 0

Haptics-mediated approaches for enhancing sustained attention: framework and challenges
Wang, Dangxiao; Li, Teng; Afzal, Naqash; Zhang, Jicong; Zhang, Yuru
Sci China Inf Sci, 2019, 62(11): 211101
Keywords: sustained attention; attention enhancement; haptic interaction; robotics; electroencephalogram; virtual reality; human-computer interaction
Cite as: Wang D X, Li T, Afzal N, et al. Haptics-mediated approaches for enhancing sustained attention: framework and challenges. Sci China Inf Sci, 2019, 62(11): 211101, doi: 10.1007/s11432-018-9931-1

Vol. 62, No. 10, 2019 Cover Contents

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Rapid and high-quality 3D fusion of heterogeneous CT and MRI data for the human brain
He, Zexue; Zhu, Li; Li, Minjie; Li, Jinyao; Chen, Yiran; Luo, Yanlin
Sci China Inf Sci, 2019, 62(10): 204101
Keywords: Heterogeneous Data; 3D Fusion; Hybrid Transfer Function; Volume Rendering; Layered Display
Cite as: He Z X, Zhu L, Li M J, et al. Rapid and high-quality 3D fusion of heterogeneous CT and MRI data for the human brain. Sci China Inf Sci, 2019, 62(10): 204101, doi: 10.1007/s11432-018-9740-7

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Wave models and dynamical analysis of evolutionary algorithms
Li, Yuanxiang; Xiang, Zhenglong; Ji, Daomin
Sci China Inf Sci, 2019, 62(10): 202101
Keywords: evolutionary algorithm; wave model; convergence analysis; phase transition; dynamical analysis
Cite as: Li Y X, Xiang Z L, Ji D M. Wave models and dynamical analysis of evolutionary algorithms. Sci China Inf Sci, 2019, 62(10): 202101, doi: 10.1007/s11432-018-9852-8

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

AI-boosted software automation: learning from human pair programmers
Peng, Xin; Xing, Zhenchang; Sun, Jun
Sci China Inf Sci, 2019, 62(10): 200104
Keywords: Software Automation; AI; Deep Learning; Pair Programming; Knowledge; Human Machine Cooperation
Cite as: Peng X, Xing Z C, Sun J. AI-boosted software automation: learning from human pair programmers. Sci China Inf Sci, 2019, 62(10): 200104, doi: 10.1007/s11432-018-9854-3

PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 0

Automated program repair: a step towards software automation
Roychoudhury, Abhik; Xiong, Yingfei
Sci China Inf Sci, 2019, 62(10): 200103
Keywords: Program Repair; Software Automation; Bug; Weak Specification; Overfitting; Reference Implementation; Big Data
Cite as: Roychoudhury A, Xiong Y F. Automated program repair: a step towards software automation. Sci China Inf Sci, 2019, 62(10): 200103, doi: 10.1007/S11432-019-9947-6

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A manual inspection of Defects4J bugs and its implications for automatic program repair
Jiang, Jiajun; Xiong, Yingfei; Xia, Xin
Sci China Inf Sci, 2019, 62(10): 200102
Keywords: automatic defect repair; fault localization; manual repair; software maintenance; case study
Cite as: Jiang J J, Xiong Y F, Xia X. A manual inspection of Defects4J bugs and its implications for automatic program repair. Sci China Inf Sci, 2019, 62(10): 200102, doi: 10.1007/s11432-018-1465-6

REVIEW Website SpringerLink Google Scholar Cited in SCI: 0

Evaluation of model checkers by verifying message passing programs
Hong, Weijiang; Chen, Zhenbang; Yu, Hengbiao; Wang, Ji
Sci China Inf Sci, 2019, 62(10): 200101
Keywords: model checker; evaluation; benchmark; MPI; symbolic execution
Cite as: Hong W J, Chen Z B, Yu H B, et al. Evaluation of model checkers by verifying message passing programs. Sci China Inf Sci, 2019, 62(10): 200101, doi: 10.1007/s11432-018-9825-3

EDITORIAL Website SpringerLink Google Scholar Cited in SCI: 0

Special focus on software automation
Mei, Hong; Zhang, Lu
Sci China Inf Sci, 2019, 62(10): 200100
Cite as: Mei H, Zhang L. Special focus on software automation. Sci China Inf Sci, 2019, 62(10): 200100, doi: 10.1007/s11432-019-2627-y

Vol. 62, No. 9, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

A novel approach for recommending semantically linkable issues in GitHub projects
Zhang, Yang; Wu, Yiwen; Wang, Tao; Wang, Huaimin
Sci China Inf Sci, 2019, 62(9): 199105
Keywords: GitHub; Issue; linking; embedding models; information retrieval
Cite as: Zhang Y, Wu Y W, Wang T, et al. A novel approach for recommending semantically linkable issues in GitHub projects. Sci China Inf Sci, 2019, 62(9): 199105, doi: 10.1007/s11432-018-9822-1

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection
Chen, Jinyin; Zheng, Haibin; Xiong, Hui; Wu, Yangyang; Lin, Xiang; Ying, Shiyan; Xuan, Qi
Sci China Inf Sci, 2019, 62(9): 199104
Keywords: deep learning; gene selection; gene co-expression network; automatic module discovery; node2vec
Cite as: Chen J Y, Zheng H B, Xiong H, et al. DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection. Sci China Inf Sci, 2019, 62(9): 199104, doi: 10.1007/s11432-018-9704-7

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Area-efficient memristor spiking neural networks and supervised learning method
Zhou, Errui; Fang, Liang; Liu, Rulin; Tang, Zhensen
Sci China Inf Sci, 2019, 62(9): 199103
Keywords: memristor; spiking neural networks; hardware implementation; supervised learning; error- backpropagation
Cite as: Zhou E R, Fang L, Liu R L, et al. Area-efficient memristor spiking neural networks and supervised learning method. Sci China Inf Sci, 2019, 62(9): 199103, doi: 10.1007/s11432-018-9607-8

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Zoning search using a hyper-heuristic algorithm
Fan, Qinqin; Li, Ning; Zhang, Yilian; Yan, Xuefeng
Sci China Inf Sci, 2019, 62(9): 199102
Keywords: evolutionary computation; differential evolution; hyper-heuristic algorithm; zoning search; high-performance computing
Cite as: Fan Q Q, Li N, Zhang Y L, et al. Zoning search using a hyper-heuristic algorithm. Sci China Inf Sci, 2019, 62(9): 199102, doi: 10.1007/s11432-018-9539-6

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Joint horizontal and vertical deep learning feature for vehicle re-identification
Zhu, Jianqing; Zeng, Huanqiang; Jin, Xin; Du, Yongzhao; Zheng, Lixin; Cai, Canhui
Sci China Inf Sci, 2019, 62(9): 199101
Keywords: vehicle re-identification; feature representation; convolutional neural network; deep learning; artificial intelligence
Cite as: Zhu J Q, Zeng H Q, Jin X, et al. Joint horizontal and vertical deep learning feature for vehicle re-identification. Sci China Inf Sci, 2019, 62(9): 199101, doi: 10.1007/s11432-018-9639-7

PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: Perspective; Software System; Post-Moore's Law Era; Ecosystems; computing ecosystem
Cite as: Zhang X D. Software system research in post-Moore's Law era: a historical perspective for the future. Sci China Inf Sci, 2019, 62(9): 196101, doi: 10.1007/s11432-019-9860-1

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Solving multi-scenario cardinality constrained optimization problems via multi-objective evolutionary algorithms
Zhou, Xing; Wang, Huaimin; Peng, Wei; Ding, Bo; Wang, Rui
Sci China Inf Sci, 2019, 62(9): 192104
Keywords: evolutionary computation; multi-objective optimization; cardinality-constrained optimization problem; multiple scenarios; transformation; p-median problem; portfolio optimization problem
Cite as: Zhou X, Wang H M, Peng W, et al. Solving multi-scenario cardinality constrained optimization problems via multi-objective evolutionary algorithms. Sci China Inf Sci, 2019, 62(9): 192104, doi: 10.1007/s11432-018-9720-6

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Generative API usage code recommendation with parameter concretization
Chen, Chi; Peng, Xin; Sun, Jun; Xing, Zhenchang; Wang, Xin; Zhao, Yifan; Zhang, Hairui; Zhao, Wenyun
Sci China Inf Sci, 2019, 62(9): 192103
Keywords: code recommendation; API; deep learning; data dependency; parameter concretization
Cite as: Chen C, Peng X, Sun J, et al. Generative API usage code recommendation with parameter concretization. Sci China Inf Sci, 2019, 62(9): 192103, doi: 10.1007/s11432-018-9821-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Graph-matching-based character recognition for Chinese seal images
Sun, Bin; Hua, Shaojun; Li, Shutao; Sun, Jun
Sci China Inf Sci, 2019, 62(9): 192102
Keywords: graph model; Chinese seal; character recognition; graph matching
Cite as: Sun B, Hua S J, Li S T, et al. Graph-matching-based character recognition for Chinese seal images. Sci China Inf Sci, 2019, 62(9): 192102, doi: 10.1007/s11432-018-9724-7

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Applying Ricci flow to high dimensional manifold learning
Li, Yangyang; Lu, Ruqian
Sci China Inf Sci, 2019, 62(9): 192101
Keywords: manifold learning; Ricci flow; Ricci curvature; dimension reduction; curvature estimation
Cite as: Li Y Y, Lu R Q. Applying Ricci flow to high dimensional manifold learning. Sci China Inf Sci, 2019, 62(9): 192101, doi: 10.1007/s11432-018-9702-7

REVIEW Website SpringerLink Google Scholar Cited in SCI: 0

Software quality assessment model: a systematic mapping study
Yan, Meng; Xia, Xin; Zhang, Xiaohong; Xu, Ling; Yang, Dan; Li, Shanping
Sci China Inf Sci, 2019, 62(9): 191101
Keywords: software quality; systematic mapping study; quality assessment model; aggregation method
Cite as: Yan M, Xia X, Zhang X H, et al. Software quality assessment model: a systematic mapping study. Sci China Inf Sci, 2019, 62(9): 191101, doi: 10.1007/s11432-018-9608-3

Vol. 62, No. 8, 2019 Cover Contents

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

An adaptive offloading framework for Android applications in mobile edge computing
Chen, Xing; Chen, Shihong; Ma, Yun; Liu, Bichun; Zhang, Ying; Huang, Gang
Sci China Inf Sci, 2019, 62(8): 082102
Keywords: computation offloading; software adaptation; mobile edge computing; application refactoring; Android
Cite as: Chen X, Chen S H, Ma Y, et al. An adaptive offloading framework for Android applications in mobile edge computing. Sci China Inf Sci, 2019, 62(8): 082102, doi: 10.1007/s11432-018-9749-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Real-time intelligent big data processing: technology, platform, and applications
Zheng, Tongya; Chen, Gang; Wang, Xinyu; Chen, Chun; Wang, Xingen; Luo, Sihui
Sci China Inf Sci, 2019, 62(8): 082101
Keywords: batching big data; streaming processing technology; real-time data processing; incremental computation; intelligent data processing system
Cite as: Zheng T Y, Chen G, Wang X Y, et al. Real-time intelligent big data processing: technology, platform, and applications. Sci China Inf Sci, 2019, 62(8): 082101, doi: 10.1007/s11432-018-9834-8

REVIEW Website SpringerLink Google Scholar Cited in SCI: 0

Autonomous driving: cognitive construction and situation understanding
Chen, Shitao; Jian, Zhiqiang; Huang, Yuhao; Chen, Yu; Zhou, Zhuoli; Zheng, Nanning
Sci China Inf Sci, 2019, 62(8): 081101
Keywords: autonomous driving; event-driven mechanism; cognitive construction; situation understanding; intuitive reasoning
Cite as: Chen S T, Jian Z Q, Huang Y H, et al. Autonomous driving: cognitive construction and situation understanding. Sci China Inf Sci, 2019, 62(8): 081101, doi: 10.1007/s11432-018-9850-9

Vol. 62, No. 7, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Single image defogging by gain gradient image filter
Singh, Dilbag; Kumar, Vijay
Sci China Inf Sci, 2019, 62(7): 079101
Keywords: Dark channel prior; Restoration mdoel; Defogging; Visibility restoration; Gradient filter
Cite as: Singh D, Kumar V. Single image defogging by gain gradient image filter. Sci China Inf Sci, 2019, 62(7): 079101, doi: 10.1007/s11432-017-9433-4

PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 0

Abductive learning: towards bridging machine learning and logical reasoning
Zhou, Zhi-Hua
Sci China Inf Sci, 2019, 62(7): 076101
Keywords: Abductive Learning; Machine Learning; Logical Reasoning; arti cial intelligence; Perspective
Cite as: Zhou Z-H. Abductive learning: towards bridging machine learning and logical reasoning. Sci China Inf Sci, 2019, 62(7): 076101, doi: 10.1007/s11432-018-9801-4

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Localizing object parts in 3D from a single image
Yin, Shen; Zhou, Bin; Yang, Mingjia; Zhang, Yu
Sci China Inf Sci, 2019, 62(7): 074101
Keywords: 3d detection; deep learning; CNN; robotic vision
Cite as: Yin S, Zhou B, Yang M J, et al. Localizing object parts in 3D from a single image. Sci China Inf Sci, 2019, 62(7): 074101, doi: 10.1007/s11432-018-9688-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A branching heuristic for SAT solvers based on complete implication graphs
Xiao, Fan; Li, Chu-Min; Luo, Mao; Manya, Felip; Lu, Zhipeng; Li, Yu
Sci China Inf Sci, 2019, 62(7): 072103
Keywords: SAT; branching heuristic; conflict-driven clause learning; implication graph
Cite as: Xiao F, Li C-M, Luo M, et al. A branching heuristic for SAT solvers based on complete implication graphs. Sci China Inf Sci, 2019, 62(7): 072103, doi: 10.1007/s11432-017-9467-7

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Constrained maximum weighted bipartite matching: a novel approach to radio broadcast scheduling
Wang, Shaojiang; Wu, Tianyong; Yao, Yuan; Bu, Dongbo; Cai, Shaowei
Sci China Inf Sci, 2019, 62(7): 072102
Keywords: radio broadcast scheduling; branch-and-bound algorithm; constrained maximum weighted bipartite matching; Kuhn-Munkres algorithm; strategy combinations
Cite as: Wang S J, Wu T Y, Yao Y, et al. Constrained maximum weighted bipartite matching: a novel approach to radio broadcast scheduling. Sci China Inf Sci, 2019, 62(7): 072102, doi: 10.1007/s11432-017-9324-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

LCCFS: a lightweight distributed file system for cloud computing without journaling and metadata services
Wang, Li; Xue, Jingling; Liao, Xiangke; Wen, Yunchuan; Chen, Min
Sci China Inf Sci, 2019, 62(7): 072101
Keywords: cloud computing; distributed file system; journaling; metadata service; garbage collection
Cite as: Wang L, Xue J L, Liao X K, et al. LCCFS: a lightweight distributed file system for cloud computing without journaling and metadata services. Sci China Inf Sci, 2019, 62(7): 072101, doi: 10.1007/s11432-017-9295-4

Vol. 62, No. 6, 2019 Cover Contents

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Predictive analysis for race detection in software-defined networks
Lu, Gongzheng; Xu, Lei; Yang, Yibiao; Xu, Baowen
Sci China Inf Sci, 2019, 62(6): 062101
Keywords: constraint solving; predictive analysis; race detection; software-defined networks
Cite as: Lu G Z, Xu L, Yang Y B, et al. Predictive analysis for race detection in software-defined networks. Sci China Inf Sci, 2019, 62(6): 062101, doi: 10.1007/s11432-018-9826-x

Vol. 62, No. 5, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An efficient iO-based data integrity verification scheme for cloud storage
Sun, Lixue; Xu, Chunxiang; Zhang, Yuan; Chen, Kefei
Sci China Inf Sci, 2019, 62(5): 059101
Keywords: Cloud storage; Public auditing; Homomorphic authenticators; Indistinguishability obfuscation; puncturable pseudorandom function
Cite as: Sun L X, Xu C X, Zhang Y, et al. An efficient iO-based data integrity verification scheme for cloud storage. Sci China Inf Sci, 2019, 62(5): 059101, doi: 10.1007/s11432-018-9500-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Sketch simplification guided by complex agglomeration
Liu, Yue; Li, Xuemei; Bo, Pengbo; Gao, Xifeng
Sci China Inf Sci, 2019, 62(5): 052105
Keywords: sketch; simplification; base complex; iterative merging
Cite as: Liu Y, Li X M, Bo P B, et al. Sketch simplification guided by complex agglomeration. Sci China Inf Sci, 2019, 62(5): 052105, doi: 10.1007/s11432-018-9694-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Anchor-based manifold binary pattern for finger vein recognition
Liu, Haiying; Yang, Gongping; Yang, Lu; Su, Kun; Yin, Yilong
Sci China Inf Sci, 2019, 62(5): 052104
Keywords: finger vein recognition; feature learning; local linear embedding; fusion; manifold learning; anchor
Cite as: Liu H Y, Yang G P, Yang L, et al. Anchor-based manifold binary pattern for finger vein recognition. Sci China Inf Sci, 2019, 62(5): 052104, doi: 10.1007/s11432-018-9651-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Cumulative activation in social networks
Shan, Xiaohan; Chen, Wei; Li, Qiang; Sun, Xiaoming; Zhang, Jialin
Sci China Inf Sci, 2019, 62(5): 052103
Keywords: social networks; cumulative activation; influence maximization; seed minimization
Cite as: Shan X H, Chen W, Li Q, et al. Cumulative activation in social networks. Sci China Inf Sci, 2019, 62(5): 052103, doi: 10.1007/s11432-018-9609-7

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

QE-integrating framework based on Github knowledge and SVM ranking
Huang, Qing; Wu, Huaiguang
Sci China Inf Sci, 2019, 62(5): 052102
Keywords: code search; query expansion; Github knowledge; SVM ranking; crowd knowledge
Cite as: Huang Q, Wu H G. QE-integrating framework based on Github knowledge and SVM ranking. Sci China Inf Sci, 2019, 62(5): 052102, doi: 10.1007/s11432-017-9465-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A trust-aware random walk model for return propensity estimation and consumer anomaly scoring in online shopping
Li, Xiaolin; Zhuang, Yuan; Fu, Yanjie; He, Xiangdong
Sci China Inf Sci, 2019, 62(5): 052101
Keywords: machine learning; return abuse; random walk; collaborative filtering; return pattern
Cite as: Li X L, Zhuang Y, Fu Y J, et al. A trust-aware random walk model for return propensity estimation and consumer anomaly scoring in online shopping. Sci China Inf Sci, 2019, 62(5): 052101, doi: 10.1007/s11432-018-9511-1

Vol. 62, No. 4, 2019 Cover Contents

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 1

Crowd queuing simulation with an improved emotional contagion model
Xue, Junxiao; Yin, Hui; Lv, Pei; Xu, Mingliang; Li, Yafei
Sci China Inf Sci, 2019, 62(4): 044101
Keywords: Crowd queuing; Simulation; Emotional contagion; Individual personality; SIR
Cite as: Xue J X, Yin H, Lv P, et al. Crowd queuing simulation with an improved emotional contagion model. Sci China Inf Sci, 2019, 62(4): 044101, doi: 10.1007/s11432-018-9654-6

Vol. 62, No. 3, 2019 Cover Contents

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Secure key-aggregation authorized searchable encryption
Wang, Haijiang; Dong, Xiaolei; Cao, Zhenfu; Li, Dongmei; Cao, Nanyuan
Sci China Inf Sci, 2019, 62(3): 039111
Keywords: Searchable Encryption; Access Control; Key-Aggregation; Trapdoor privacy ; Data sharing
Cite as: Wang H J, Dong X L, Cao Z F, et al. Secure key-aggregation authorized searchable encryption. Sci China Inf Sci, 2019, 62(3): 039111, doi: 10.1007/s11432-017-9508-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Decomposition of nonlinear feedback shift registers based on Boolean networks
Zhong, Jianghua; Lin, Dongdai
Sci China Inf Sci, 2019, 62(3): 039110
Keywords: Boolean networks; semi-tensor product; Boolean functions; shift registers; stream ciphers
Cite as: Zhong J H, Lin D D. Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci China Inf Sci, 2019, 62(3): 039110, doi: 10.1007/s11432-017-9460-4

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Real-time state recovery attack against MORUS in nonce-misuse setting
Shi, Tairong; Guan, Jie
Sci China Inf Sci, 2019, 62(3): 039109
Keywords: CAESAR competition; MORUS; Nonce-reuse; state recovery; forgery attack
Cite as: Shi T R, Guan J. Real-time state recovery attack against MORUS in nonce-misuse setting. Sci China Inf Sci, 2019, 62(3): 039109, doi: 10.1007/s11432-017-9457-x

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

High-efficient generation algorithm for large random active shield
Xin, Ruishan; Yuan, Yidong; He, Jiaji; Li, Yuehui; Zhao, Yiqiang
Sci China Inf Sci, 2019, 62(3): 039108
Keywords: invasive attacks; active shield; random Hamiltonian path; dynamic programming algorithm; divide-and-conquer algorithm
Cite as: Xin R S, Yuan Y D, He J J, et al. High-efficient generation algorithm for large random active shield. Sci China Inf Sci, 2019, 62(3): 039108, doi: 10.1007/s11432-018-9474-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Finding the best answer: measuring the optimization of public and authoritative DNS
Zhang, Jia; Duan, Haixin; Jiang, Jian; Liang, Jinjin; Wu, Jianping
Sci China Inf Sci, 2019, 62(3): 039107
Keywords: DNS Measurement; DNS Resolution Accuracy; DNS Schedule; ECS; Anycast CDN
Cite as: Zhang J, Duan H X, Jiang J, et al. Finding the best answer: measuring the optimization of public and authoritative DNS. Sci China Inf Sci, 2019, 62(3): 039107, doi: 10.1007/s11432-017-9370-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks
Yan, Chunliu; Ni, Ziyi; Cao, Bin; Lu, Rongxing; Wu, Shaohua; Zhang, Qinyu
Sci China Inf Sci, 2019, 62(3): 039106
Keywords: demand privacy; privacy-preserving; differential privacy; association rules; QoS
Cite as: Yan C L, Ni Z Y, Cao B, et al. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks. Sci China Inf Sci, 2019, 62(3): 039106, doi: 10.1007/s11432-018-9483-x

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Side channel attack of multiplication in GF(q)-application to secure RSA-CRT
Xu, Sen; Wang, Weija; Lu, Xiangjun; Guo, Zheng; Liu, Junrong; Gu, Dawu
Sci China Inf Sci, 2019, 62(3): 039105
Keywords: Side channel attack; Template attack; RSA-CRT; Hidden number problem; Secure implementation
Cite as: Xu S, Wang W J, Lu X J, et al. Side channel attack of multiplication in GF(q)-application to secure RSA-CRT. Sci China Inf Sci, 2019, 62(3): 039105, doi: 10.1007/s11432-018-9488-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Some characteristics of logistic map over the finite field
Yang, Bo; Liao, Xiaofeng
Sci China Inf Sci, 2019, 62(3): 039104
Keywords: Chaos; Logistic map; period analysis; finite field; Galois ring
Cite as: Yang B, Liao X F. Some characteristics of logistic map over the finite field. Sci China Inf Sci, 2019, 62(3): 039104, doi: 10.1007/s11432-017-9438-8

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
Du, Yusong; Wei, Baodian; Zhang, Huang
Sci China Inf Sci, 2019, 62(3): 039103
Keywords: lattice-based cryptography; discrete Gaussian sampling; rejection sampling; discrete Gaussian distributions over integers; binary discrete Gaussian distribution
Cite as: Du Y S, Wei B D, Zhang H. A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers. Sci China Inf Sci, 2019, 62(3): 039103, doi: 10.1007/s11432-017-9409-7

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A revised CVSS-based system to improve the dispersion of vulnerability risk scores
Wu, Chensi; Wen, Tao; Zhang, Yuqing
Sci China Inf Sci, 2019, 62(3): 039102
Keywords: CVSS; Vulnerability; Vulnerability Assessment; Dispersion; VRSS; PCA
Cite as: Wu C S, Wen T, Zhang Y Q. A revised CVSS-based system to improve the dispersion of vulnerability risk scores. Sci China Inf Sci, 2019, 62(3): 039102, doi: 10.1007/s11432-017-9445-4

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A more compact multi-id identity-based FHE scheme in the standard model and its applications
Wang, Xueqing; Wang, Biao; Liang, Bei; Xue, Rui
Sci China Inf Sci, 2019, 62(3): 039101
Keywords: IBE; MIBFHE; DLWE; Single-Hop; Fully-Dynamic
Cite as: Wang X Q, Wang B, Liang B, et al. A more compact multi-id identity-based FHE scheme in the standard model and its applications. Sci China Inf Sci, 2019, 62(3): 039101, doi: 10.1007/s11432-017-9412-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Universally composable secure geographic area verification without pre-shared secret
Zhang, Junwei; Lu, Ning; Ma, Jianfeng; Yang, Chao
Sci China Inf Sci, 2019, 62(3): 032113
Keywords: geographic area verification; pre-shared secret-free; composition security; colluding attacks; provable security
Cite as: Zhang J W, Lu N, Ma J F, et al. Universally composable secure geographic area verification without pre-shared secret. Sci China Inf Sci, 2019, 62(3): 032113, doi: 10.1007/s11432-018-9738-2

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Pseudo random oracle of Merkle-Damgard hash functions revisited
Ammour, Kamel; Wang, Lei; Gu, Dawu
Sci China Inf Sci, 2019, 62(3): 032112
Keywords: Merkle-Damgard; random oracle; indifferentiability; prefix free; length extension attack
Cite as: Ammour K, Wang L, Gu D W. Pseudo random oracle of Merkle-Damgard hash functions revisited. Sci China Inf Sci, 2019, 62(3): 032112, doi: 10.1007/s11432-018-9568-2

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Automatic search method for multiple differentials and its application on MANTIS
Chen, Shiyao; Liu, Ru; Cui, Tingting; Wang, Meiqin
Sci China Inf Sci, 2019, 62(3): 032111
Keywords: multiple differential cryptanalysis; structure attack; automatic search; MANTIS; MILP
Cite as: Chen S Y, Liu R, Cui T T, et al. Automatic search method for multiple differentials and its application on MANTIS. Sci China Inf Sci, 2019, 62(3): 032111, doi: 10.1007/s11432-018-9658-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: zero-knowledge; concurrent zero-knowledge; resettable zero-knowledge; concurrent secure computation; computational complexity
Cite as: Yan Z B, Deng Y. A novel approach to public-coin concurrent zero-knowledge and applications on resettable security. Sci China Inf Sci, 2019, 62(3): 032110, doi: 10.1007/s11432-018-9627-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A regulated digital currency
Wu, Yanbing; Fan, Haining; Wang, Xiaoyun; Zou, Guangnan
Sci China Inf Sci, 2019, 62(3): 032109
Keywords: Blockchain; Bitcoin; anonymous; digital currency; regulated; proof-of-work
Cite as: Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency. Sci China Inf Sci, 2019, 62(3): 032109, doi: 10.1007/s11432-018-9611-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

New observation on the key schedule of RECTANGLE
Yan, Hailun; Luo, Yiyuan; Chen, Mo; Lai, Xuejia
Sci China Inf Sci, 2019, 62(3): 032108
Keywords: lightweight block cipher; RECTANGLE; key schedule; round function; diffusion
Cite as: Yan H L, Luo Y Y, Chen M, et al. New observation on the key schedule of RECTANGLE. Sci China Inf Sci, 2019, 62(3): 032108, doi: 10.1007/s11432-018-9527-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A new discrete Fourier transform randomness test
Chen, Meihui; Chen, Hua; Fan, Limin; Zhu, Shaofeng; Xi, Wei; Feng, Dengguo
Sci China Inf Sci, 2019, 62(3): 032107
Keywords: statistical randomness test; discrete Fourier transform test; NIST SP800-22; two-level test; chi-square distribution
Cite as: Chen M H, Chen H, Fan L M, et al. A new discrete Fourier transform randomness test. Sci China Inf Sci, 2019, 62(3): 032107, doi: 10.1007/s11432-018-9489-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

CATH: an effective method for detecting denial-of-service attacks in software defined networks
Guo, Yi; Miao, Fu; Zhang, Liancheng; Wang, Yu
Sci China Inf Sci, 2019, 62(3): 032106
Keywords: DoS attacks; software defined network; flow features; cusp model; equilibrium surface
Cite as: Guo Y, Miao F, Zhang L C, et al. CATH: an effective method for detecting denial-of-service attacks in software defined networks. Sci China Inf Sci, 2019, 62(3): 032106, doi: 10.1007/s11432-017-9439-7

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Partially known information attack on SM2 key exchange protocol
Wei, Wei; Chen, Jiazhe; Li, Dan; Wang, Beibei
Sci China Inf Sci, 2019, 62(3): 032105
Keywords: SM2 key exchange protocol; cryptanalysis; information leakage; lattice attack; extended hidden number problem
Cite as: Wei W, Chen J Z, Li D, et al. Partially known information attack on SM2 key exchange protocol. Sci China Inf Sci, 2019, 62(3): 032105, doi: 10.1007/s11432-018-9515-9

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
Xue, Jingting; Xu, Chunxiang; Zhao, Jining; Ma, Jianfeng
Sci China Inf Sci, 2019, 62(3): 032104
Keywords: cloud storage; public integrity auditing; identity-based cryptography; blockchain; security analysis
Cite as: Xue J T, Xu C X, Zhao J N, et al. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci China Inf Sci, 2019, 62(3): 032104, doi: 10.1007/s11432-018-9462-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 6

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid
Guan, Zhitao; Zhang, Yue; Zhu, Liehuang; Wu, Longfei; Yu, Shui
Sci China Inf Sci, 2019, 62(3): 032103
Keywords: privacy-preserving; authentication; batch verification; smart grid
Cite as: Guan Z T, Zhang Y, Zhu L H, et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci China Inf Sci, 2019, 62(3): 032103, doi: 10.1007/s11432-018-9451-y

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Zong, Rui; Dong, Xiaoyang; Wang, Xiaoyun
Sci China Inf Sci, 2019, 62(3): 032102
Keywords: related-tweakey impossible differential attack; tweakable block cipher; Deoxys-BC-256; tweakey schedule; MILP
Cite as: Zong R, Dong X Y, Wang X Y. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci China Inf Sci, 2019, 62(3): 032102, doi: 10.1007/s11432-017-9382-2

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Improved impossible differential cryptanalysis of large-block Rijndael
Liu, Ya; Shi, Yifan; Gu, Dawu; Dai, Bo; Zhao, Fengyu; Li, Wei; Liu, Zhiqiang; Zeng, Zhiqiang
Sci China Inf Sci, 2019, 62(3): 032101
Keywords: block cipher; Rijndael; precomputation tables; impossible differentials; multiple impossible differential attacks
Cite as: Liu Y, Shi Y F, Gu D W, et al. Improved impossible differential cryptanalysis of large-block Rijndael. Sci China Inf Sci, 2019, 62(3): 032101, doi: 10.1007/s11432-017-9365-4

Vol. 62, No. 2, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Effectively modeling piecewise planar urban scenes based on structure priors and CNN
Wang, Wei; Gao, Wei; Hu, Zhanyi
Sci China Inf Sci, 2019, 62(2): 029102
Keywords: urban scene; piecewise planar stereo; Markov Random Field; image oversegmentation; Convolutional Neural Network
Cite as: Wang W, Gao W, Hu Z Y. Effectively modeling piecewise planar urban scenes based on structure priors and CNN. Sci China Inf Sci, 2019, 62(2): 029102, doi: 10.1007/s11432-017-9473-5

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Pre-course student performance prediction with multi-instance multi-label learning
Ma, Yuling; Cui, Chaoran; Nie, Xiushan; Yang, Gongping; Shaheed, Kashif; Yin, Yilong
Sci China Inf Sci, 2019, 62(2): 029101
Keywords: pre-course student performance prediction; multi-instance; multi-label; class-imbalanced; academic early warning
Cite as: Ma Y L, Cui C R, Nie X S, et al. Pre-course student performance prediction with multi-instance multi-label learning. Sci China Inf Sci, 2019, 62(2): 029101, doi: 10.1007/s11432-017-9371-y

NEWS & VIEWS Website SpringerLink Google Scholar Cited in SCI: 0

Two open-source projects for image aesthetic quality assessment
Wu, Le; Jin, Xin; Zhao, Geng; Zhou, Xinghui
Sci China Inf Sci, 2019, 62(2): 027101
Keywords: Aesthetic Quality Assessment; Computer Version; Artificial Intelligence; Open Source Code; Pattern Recognition
Cite as: Wu L, Jin X, Zhao G, et al. Two open-source projects for image aesthetic quality assessment. Sci China Inf Sci, 2019, 62(2): 027101, doi: 10.1007/s11432-018-9692-2

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Vehicle tracking by detection in UAV aerial video
Liu, Shaohua; Wang, Suqin; Shi, Wenhao; Liu, Haibo; Li, Zhaoxin; Mao, Tianlu
Sci China Inf Sci, 2019, 62(2): 024101
Keywords: Vehicle Tracking; Tracking by Detection; Convolutional Neural Network; Kalman Filtering; Unmanned Aerial Vehicle
Cite as: Liu S H, Wang S Q, Shi W H, et al. Vehicle tracking by detection in UAV aerial video. Sci China Inf Sci, 2019, 62(2): 024101, doi: 10.1007/s11432-018-9590-5

Vol. 62, No. 1, 2019 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Learning discriminative and invariant representation for fingerprint retrieval
Song, Dehua; Li, Ruilin; Zhang, Fandong; Feng, Jufu
Sci China Inf Sci, 2019, 62(1): 019104
Keywords: fingerprint retrieval; representation learning; deep convolutional neural network; power activation function; distortion
Cite as: Song D H, Li R L, Zhang F D, et al. Learning discriminative and invariant representation for fingerprint retrieval. Sci China Inf Sci, 2019, 62(1): 019104, doi: 10.1007/s11432-018-9512-1

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Identifying RNA-binding proteins using multi-label deep learning
Pan, Xiaoyong; Fan, Yong-Xian; Jia, Jue; Shen, Hong-Bin
Sci China Inf Sci, 2019, 62(1): 019103
Keywords: RNA-protein; deep learning; multi-label learning; long short term memory network; convolutional neural network
Cite as: Pan X Y, Fan Y X, Jia J, et al. Identifying RNA-binding proteins using multi-label deep learning. Sci China Inf Sci, 2019, 62(1): 019103, doi: 10.1007/s11432-018-9558-2

LETTER Website SpringerLink Google Scholar Cited in SCI: 4

How security bugs are fixed and what can be improved: an empirical study with Mozilla
Sun, Xiaobing; Peng, Xin; Zhang, Kai; Liu, Yang; Cai, Yuanfang
Sci China Inf Sci, 2019, 62(1): 019102
Keywords: Security bug; empirical study; bug fix; Mozilla project; bug analysis
Cite as: Sun X B, Peng X, Zhang K, et al. How security bugs are fixed and what can be improved: an empirical study with Mozilla. Sci China Inf Sci, 2019, 62(1): 019102, doi: 10.1007/s11432-017-9459-5

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A clustering-based approach for mining dockerfile evolutionary trajectories
Zhang, Yang; Wang, Huaimin; Filkov, Vladimir
Sci China Inf Sci, 2019, 62(1): 019101
Keywords: Continuous deployment; Dockerfile; Docker Hub; GitHub; Docker
Cite as: Zhang Y, Wang H M, Filkov V. A clustering-based approach for mining dockerfile evolutionary trajectories. Sci China Inf Sci, 2019, 62(1): 019101, doi: 10.1007/s11432-017-9415-3

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A formally verified transformation to unify multiple nested clocks for a Lustre-like language
Shi, Gang; Zhang, Yucheng; Shang, Shu; Wang, Shengyuan; Dong, Yuan; Yew, Pen-Chung
Sci China Inf Sci, 2019, 62(1): 012801
Keywords: synchronous data-flow languages; nested clocks; clock-unifying; certified compilers; Lustre; Coq
Cite as: Shi G, Zhang Y C, Shang S, et al. A formally verified transformation to unify multiple nested clocks for a Lustre-like language. Sci China Inf Sci, 2019, 62(1): 012801, doi: 10.1007/s11432-016-9270-0

RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

A convergence analysis for a class of practical variance-reduction stochastic gradient MCMC
Chen, Changyou; Wang, Wenlin; Zhang, Yizhe; Su, Qinliang; Carin, Lawrence
Sci China Inf Sci, 2019, 62(1): 012101
Keywords: Markov chain Monte Carlo; SG-MCMC; variance reduction; deep neural networks
Cite as: Chen C Y, Wang W L, Zhang Y Z, et al. A convergence analysis for a class of practical variance-reduction stochastic gradient MCMC. Sci China Inf Sci, 2019, 62(1): 012101, doi: 10.1007/s11432-018-9656-y

Vol. 61, No. 12, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Deep learning for steganalysis based on filter diversity selection
Zhong, Kai; Feng, Guorui; Shen, Liquan; Luo, Jun
Sci China Inf Sci, 2018, 61(12): 129105
Keywords: CNN; ensemble; steganalysis; diversity; high-pass filter
Cite as: Zhong K, Feng G R, Shen L Q, et al. Deep learning for steganalysis based on filter diversity selection. Sci China Inf Sci, 2018, 61(12): 129105, doi: 10.1007/s11432-018-9640-7

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

New reachability trees for analyzing unbounded Petri nets with semilinear reachability sets
Wang, Shouguang; You, Dan; Zhou, Mengchu
Sci China Inf Sci, 2018, 61(12): 129104
Keywords: Petri nets; Complex systems; Discrete-event system; reachability tree; Deadlock
Cite as: Wang S G, You D, Zhou M C. New reachability trees for analyzing unbounded Petri nets with semilinear reachability sets. Sci China Inf Sci, 2018, 61(12): 129104, doi: 10.1007/s11432-017-9446-3

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Aircraft conflict resolution method based on hybrid ant colony optimization and artificial potential field
Liu, Huaxian; Liu, Feng; Zhang, Xuejun; Guan, Xiangmin; Chen, Jun; Savinaud, Pascal
Sci China Inf Sci, 2018, 61(12): 129103
Keywords: conflict resolution; ant colony optimization; artificial potential field; evolutionary algorithm; intelligent computation
Cite as: Liu H X, Liu F, Zhang X J, et al. Aircraft conflict resolution method based on hybrid ant colony optimization and artificial potential field. Sci China Inf Sci, 2018, 61(12): 129103, doi: 10.1007/s11432-017-9310-5

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Expressivity issues in SPARQL: monotonicity and two-versus three-valued semantics
Zhang, Xiaowang; Meng, Chenhong; Zou, Lei
Sci China Inf Sci, 2018, 61(12): 129102
Keywords: graph database; RDF; SPARQL; expressivity; monotonicity
Cite as: Zhang X W, Meng C H, Zou L. Expressivity issues in SPARQL: monotonicity and two-versus three-valued semantics. Sci China Inf Sci, 2018, 61(12): 129102, doi: 10.1007/s11432-017-9344-5

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

An event summarizing algorithm based on the timeline relevance model in Sina Weibo
Lei, Kai; Zhang, Lizhu; Liu, Ying; Shen, Ying; Liu, Chenwei; Yu, Qian; Weng, Weitao
Sci China Inf Sci, 2018, 61(12): 129101
Keywords: event summarization; timeline relevance model; event mining; hot topic analysis; weibo
Cite as: Lei K, Zhang L Z, Liu Y, et al. An event summarizing algorithm based on the timeline relevance model in Sina Weibo. Sci China Inf Sci, 2018, 61(12): 129101, doi: 10.1007/s11432-016-9333-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
Gan, Qingqing; Wang, Xiaoming; Fang, Xuefeng
Sci China Inf Sci, 2018, 61(12): 122104
Keywords: dynamic auditing; algebraic signature; XOR-homomorphic function; provable security; cloud storage
Cite as: Gan Q Q, Wang X M, Fang X F. Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud. Sci China Inf Sci, 2018, 61(12): 122104, doi: 10.1007/s11432-017-9410-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Formal modelling of list based dynamic memory allocators
Fang, Bin; Sighireanu, Mihaela; Pu, Geguang; Su, Wen; Abrial, Jean-Raymond; Yang, Mengfei; Qiao, Lei
Sci China Inf Sci, 2018, 61(12): 122103
Keywords: dynamic memory allocators; formal methods; refinement; Event-B; Rodin; model-based design
Cite as: Fang B, Sighireanu M, Pu G G, et al. Formal modelling of list based dynamic memory allocators. Sci China Inf Sci, 2018, 61(12): 122103, doi: 10.1007/s11432-017-9280-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

LionRank: lion algorithm-based metasearch engines for re-ranking of webpages
Vijaya, P.; Chander, Satish
Sci China Inf Sci, 2018, 61(12): 122102
Keywords: web technology; meta-search engine; feature extraction; lion algorithm; FENN classifier
Cite as: Vijaya P, Chander S. LionRank: lion algorithm-based metasearch engines for re-ranking of webpages. Sci China Inf Sci, 2018, 61(12): 122102, doi: 10.1007/s11432-017-9343-5

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 6

Convergence of multi-block Bregman ADMM for nonconvex composite problems
Wang, Fenghui; Cao, Wenfei; Xu, Zongben
Sci China Inf Sci, 2018, 61(12): 122101
Keywords: nonconvex regularization; alternating direction method; subanalytic function; K-L inequality; Bregman distance
Cite as: Wang F H, Cao W F, Xu Z B. Convergence of multi-block Bregman ADMM for nonconvex composite problems. Sci China Inf Sci, 2018, 61(12): 122101, doi: 10.1007/s11432-017-9367-6

Vol. 61, No. 11, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 7

Extracting hidden messages of MLSB steganography based on optimal stego subset
Yang, Chunfang; Luo, Xiangyang; Lu, Jicang; Liu, Fenlin
Sci China Inf Sci, 2018, 61(11): 119103
Keywords: Steganalysis; Steganography; Stego Key; MLSB; Multiple Least Significant Bits; Payload Location
Cite as: Yang C F, Luo X Y, Lu J C, et al. Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci China Inf Sci, 2018, 61(11): 119103, doi: 10.1007/s11432-017-9328-2

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

The lightest 4 × 4 MDS matrices over GL(4, F2)
Bai, Jian; Li, Ting; Sun, Yao; Wang, Dingkang; Lin, Dongdai
Sci China Inf Sci, 2018, 61(11): 119102
Keywords: MDS matrix; lightweight; diffusion layer; symmetric-key ciphers; searching algorithm
Cite as: Bai J, Li T, Sun Y, et al. The lightest 4 × 4 MDS matrices over GL(4, F2). Sci China Inf Sci, 2018, 61(11): 119102, doi: 10.1007/s11432-017-9320-8

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Efficient method to verify the integrity of data with supporting dynamic data in cloud computing
Guo, Cheng; Tang, Xinyu; Jie, Yingmo; Feng, Bin
Sci China Inf Sci, 2018, 61(11): 119101
Keywords: Secure data storage; Public verification; Merkle Hash Tree; Cloud computing; Data integrity
Cite as: Guo C, Tang X Y, Jie Y M, et al. Efficient method to verify the integrity of data with supporting dynamic data in cloud computing. Sci China Inf Sci, 2018, 61(11): 119101, doi: 10.1007/s11432-017-9286-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Trivariate B-spline solid construction by pillow operation and geometric iterative fitting
Lin, Hongwei; Huang, Hao; Hu, Chuanfeng
Sci China Inf Sci, 2018, 61(11): 118103
Keywords: Trivariate B-splines; Positive Jacobian; Geometric iterative fitting; Geometric design; Isogeometric analysis
Cite as: Lin H W, Huang H, Hu C F. Trivariate B-spline solid construction by pillow operation and geometric iterative fitting. Sci China Inf Sci, 2018, 61(11): 118103, doi: 10.1007/s11432-017-9376-8

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

MILP-aided bit-based division property for ARX ciphers
Sun, Ling; Wang, Wei; Liu, Ru; Wang, Meiqin
Sci China Inf Sci, 2018, 61(11): 118102
Keywords: automatic search; division property; ARX; MILP; HIGHT
Cite as: Sun L, Wang W, Liu R, et al. MILP-aided bit-based division property for ARX ciphers. Sci China Inf Sci, 2018, 61(11): 118102, doi: 10.1007/s11432-017-9321-7

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Dual-mode broadcast encryption
Zhu, Yan; Yu, Ruyun; Chen, E.; Huang, Dijiang
Sci China Inf Sci, 2018, 61(11): 118101
Keywords: cryptography; broadcast encryption; provable security; revocation; designation; dual mode
Cite as: Zhu Y, Yu R Y, Chen E, et al. Dual-mode broadcast encryption. Sci China Inf Sci, 2018, 61(11): 118101, doi: 10.1007/s11432-017-9287-6

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

Adaptive narrow band MultiFLIP for efficient two-phase liquid simulation
Lyu, Luan; Ren, Xiaohua; Cao, Wei; Zhu, Jian; Wu, Enhua
Sci China Inf Sci, 2018, 61(11): 114101
Keywords: Narrow band; MultiFLIP; Two-phase liquid simulation; adaptive; FLIP
Cite as: Lyu L, Ren X H, Cao W, et al. Adaptive narrow band MultiFLIP for efficient two-phase liquid simulation. Sci China Inf Sci, 2018, 61(11): 114101, doi: 10.1007/s11432-018-9518-3

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Correlations multiplexing for link prediction in multidimensional network spaces
Xiao, Yunpeng; Li, Xixi; Liu, Yuanni; Liu, Hong; Li, Qian
Sci China Inf Sci, 2018, 61(11): 112103
Keywords: social network; multidimensional network spaces; link prediction; LDA; hidden naive Bayes
Cite as: Xiao Y P, Li X X, Liu Y N, et al. Correlations multiplexing for link prediction in multidimensional network spaces. Sci China Inf Sci, 2018, 61(11): 112103, doi: 10.1007/s11432-017-9334-3

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Fault tolerance on-chip: a reliable computing paradigm using self-test, self-diagnosis, and self-repair (3S) approach
Li, Xiaowei; Yan, Guihai; Ye, Jing; Wang, Ying
Sci China Inf Sci, 2018, 61(11): 112102
Keywords: fault tolerance; on-chip; self-test; self-diagnosis; self-repair
Cite as: Li X W, Yan G H, Ye J, et al. Fault tolerance on-chip: a reliable computing paradigm using self-test, self-diagnosis, and self-repair (3S) approach. Sci China Inf Sci, 2018, 61(11): 112102, doi: 10.1007/s11432-017-9290-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Efficient zonal diagnosis with maximum satisfiability
Liu, Meng; Ouyang, Dantong; Cai, Shaowei; Zhang, Liming
Sci China Inf Sci, 2018, 61(11): 112101
Keywords: model-based diagnosis; MaxSAT; subset-minimal diagnoses; cardinality-minimal diagnoses; zone; propagate-extend
Cite as: Liu M, Ouyang D T, Cai S W, et al. Efficient zonal diagnosis with maximum satisfiability. Sci China Inf Sci, 2018, 61(11): 112101, doi: 10.1007/s11432-017-9273-5

Vol. 61, No. 10, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 4

GlanceNets - efficient convolutional neural networks with adaptive hard example mining
Sun, Hanqing; Pang, Yanwei
Sci China Inf Sci, 2018, 61(10): 109101
Keywords: Convolutional neural network; Image classification; Hard example mining; Information entropy; Loss function
Cite as: Sun H Q, Pang Y W. GlanceNets - efficient convolutional neural networks with adaptive hard example mining. Sci China Inf Sci, 2018, 61(10): 109101, doi: 10.1007/s11432-018-9497-0

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 0

CareerMap: visualizing career trajectory
Wu, Kan; Tang, Jie; Shao, Zhou; Xu, Xinyi; Gao, Bo; Zhao, Shu
Sci China Inf Sci, 2018, 61(10): 104101
Keywords: big scholar data; data mining; career trajectory; factor graph; visualization
Cite as: Wu K, Tang J, Shao Z, et al. CareerMap: visualizing career trajectory. Sci China Inf Sci, 2018, 61(10): 104101, doi: 10.1007/s11432-018-9469-5

Vol. 61, No. 9, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Smooth fractal surfaces derived from bicubic rational fractal interpolation functions
Bao, Fangxun; Yao, Xunxiang; Sun, Qinghua; Zhang, Yunfeng; Zhang, Caiming
Sci China Inf Sci, 2018, 61(9): 099104
Keywords: rational spline; iterated function system; rational fractal interpolation; quasi-locality; stability
Cite as: Bao F X, Yao X X, Sun Q H, et al. Smooth fractal surfaces derived from bicubic rational fractal interpolation functions. Sci China Inf Sci, 2018, 61(9): 099104, doi: 10.1007/s11432-017-9258-5

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Chameleon all-but-one extractable hash proof and its applications
Han, Gang; Li, Hui; Qin, Baodong; Zheng, Dong
Sci China Inf Sci, 2018, 61(9): 099103
Keywords: chosen ciphertext security; public-key encryption; hybrid encryption; extractable hash proof; computational Diffie-Hellman
Cite as: Han G, Li H, Qin B D, et al. Chameleon all-but-one extractable hash proof and its applications. Sci China Inf Sci, 2018, 61(9): 099103, doi: 10.1007/s11432-017-9369-9

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Learned local similarity prior embedding active contour model for choroidal neovascularization segmentation in optical coherence tomography images
Xi, Xiaoming; Meng, Xianjing; Yang, Lu; Nie, Xiushan; Yu, Zhilou; Zhang, Chunyun; Chen, Haoyu; Yin, Yilong; Chen, Xinjian
Sci China Inf Sci, 2018, 61(9): 099102
Keywords: medical image processing; machine learning; image segmentation; active contour model; OCT image
Cite as: Xi X M, Meng X J, Yang L, et al. Learned local similarity prior embedding active contour model for choroidal neovascularization segmentation in optical coherence tomography images. Sci China Inf Sci, 2018, 61(9): 099102, doi: 10.1007/s11432-017-9247-8

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Small sample learning with high order contractive auto-encoders and application in SAR images
Yang, Qianwen; Sun, Fuchun
Sci China Inf Sci, 2018, 61(9): 099101
Keywords: small sample; SAR target; regularized auto-encoder; higher order feature abstraction; generalized regularization
Cite as: Yang Q W, Sun F C. Small sample learning with high order contractive auto-encoders and application in SAR images. Sci China Inf Sci, 2018, 61(9): 099101, doi: 10.1007/s11432-017-9214-8

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Predicting compositional time series via autoregressive Dirichlet estimation
Zhou, Ganbin; Luo, Ping; He, Qing
Sci China Inf Sci, 2018, 61(9): 098106
Keywords: time series analysis; machine learning; aritificial intelligence; regression estimation; probability and statistics
Cite as: Zhou G B, Luo P, He Q. Predicting compositional time series via autoregressive Dirichlet estimation. Sci China Inf Sci, 2018, 61(9): 098106, doi: 10.1007/s11432-017-9335-5

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition
Xiao, Yunpeng; Li, Xiaojuan; Yang, Shasha; Liu, Yanbing
Sci China Inf Sci, 2018, 61(9): 098105
Keywords: social network; hotspot topic; behavior analysis; retweeting prediction; tensor decomposition
Cite as: Xiao Y P, Li X J, Yang S S, et al. Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition. Sci China Inf Sci, 2018, 61(9): 098105, doi: 10.1007/s11432-017-9272-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Efficient beyond-birthday-bound secure authenticated encryption modes
Zhang, Ping; Hu, Honggang; Wang, Peng
Sci China Inf Sci, 2018, 61(9): 098104
Keywords: authenticated encryption; keyed compression function; pseudorandom function; hash function; provable security; beyond-birthday-bound; optimal security
Cite as: Zhang P, Hu H G, Wang P. Efficient beyond-birthday-bound secure authenticated encryption modes. Sci China Inf Sci, 2018, 61(9): 098104, doi: 10.1007/s11432-017-9253-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
Wang, Ning; Wang, Xiaoyun; Jia, Keting; Zhao, Jingyuan
Sci China Inf Sci, 2018, 61(9): 098103
Keywords: SIMON; lightweight block cipher; bit condition; differential attack; dynamic key-guessing
Cite as: Wang N, Wang X Y, Jia K T, et al. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci China Inf Sci, 2018, 61(9): 098103, doi: 10.1007/s11432-017-9231-5

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An advanced operating environment for mathematics education resources
Rao, Yongsheng; Zhang, Jingzhong; Zou, Yu; Sun, Yanchun; Chen, Xiangping; Xu, Songhua
Sci China Inf Sci, 2018, 61(9): 098102
Keywords: operating environment; mathematics education resource; knowledge enhancement; intelligent drawing; automated reasoning; Super Sketchpad
Cite as: Rao Y S, Zhang J Z, Zou Y, et al. An advanced operating environment for mathematics education resources. Sci China Inf Sci, 2018, 61(9): 098102, doi: 10.1007/s11432-017-9235-7

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Fully distributed certificateless threshold signature without random oracles
Yang, Wenjie; Luo, Weiqi; Luo, Xizhao; Weng, Jian; Yang, Anjia
Sci China Inf Sci, 2018, 61(9): 098101
Keywords: full distribution; threshold signature; certificateless setting; malicious key generation center; standard model
Cite as: Yang W J, Luo W Q, Luo X Z, et al. Fully distributed certificateless threshold signature without random oracles. Sci China Inf Sci, 2018, 61(9): 098101, doi: 10.1007/s11432-017-9244-9

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 1

Novel metaballs-driven approach with dynamic constraints for character articulation
Bai, Junxuan; Pan, Junjun; Yang, Yuhan; Qin, Hong
Sci China Inf Sci, 2018, 61(9): 094101
Keywords: Character Articulation; Secondary Deformation; Position-based Dynamics; Computer Animation; Skinning; Metaballs
Cite as: Bai J X, Pan J J, Yang Y H, et al. Novel metaballs-driven approach with dynamic constraints for character articulation. Sci China Inf Sci, 2018, 61(9): 094101, doi: 10.1007/s11432-018-9470-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Asymmetric virtual machine replication for low latency and high available service
Chen, Rong; Chen, Haibo
Sci China Inf Sci, 2018, 61(9): 092110
Keywords: virtualization; fault tolerance; VM replication; memory; CPU scheduling
Cite as: Chen R, Chen H B. Asymmetric virtual machine replication for low latency and high available service. Sci China Inf Sci, 2018, 61(9): 092110, doi: 10.1007/s11432-017-9292-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

GAGMS: a requirement-driven general address generation and management system
Liu, Ying; He, Lin; Ren, Gang
Sci China Inf Sci, 2018, 61(9): 092109
Keywords: IPv6 address generation; IPv6 address management; requirement analysis; DHCPv6; SLAAC
Cite as: Liu Y, He L, Ren G. GAGMS: a requirement-driven general address generation and management system. Sci China Inf Sci, 2018, 61(9): 092109, doi: 10.1007/s11432-017-9298-3

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: complex network; edge weight; graph; node strength; person re-identification; skeleton features
Cite as: Imani Z, Soltanizadeh H. Histogram of the node strength and histogram of the edge weight: two new features for RGB-D person re-identification. Sci China Inf Sci, 2018, 61(9): 092108, doi: 10.1007/s11432-016-9086-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Virtual network function scheduling via multilayer encoding genetic algorithm with distributed bandwidth allocation
Yuan, Quan; Tang, Hongbo; You, Wei; Wang, Xiaolei; Zhao, Yu
Sci China Inf Sci, 2018, 61(9): 092107
Keywords: network function virtualization; virtual network function scheduling; genetic algorithm; bandwidth allocation; convex optimization
Cite as: Yuan Q, Tang H B, You W, et al. Virtual network function scheduling via multilayer encoding genetic algorithm with distributed bandwidth allocation. Sci China Inf Sci, 2018, 61(9): 092107, doi: 10.1007/s11432-017-9357-7

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 4

A language-independent neural network for event detection
Feng, Xiaocheng; Qin, Bing; Liu, Ting
Sci China Inf Sci, 2018, 61(9): 092106
Keywords: nature language processing; event detection; neural networks; representation learning
Cite as: Feng X C, Qin B, Liu T. A language-independent neural network for event detection. Sci China Inf Sci, 2018, 61(9): 092106, doi: 10.1007/s11432-017-9359-x

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Dating ancient paintings of Mogao Grottoes using deeply learnt visual codes
Li, Qingquan; Zou, Qin; Ma, De; Wang, Qian; Wang, Song
Sci China Inf Sci, 2018, 61(9): 092105
Keywords: painting art; art style; painting analysis; deep learning; image classification
Cite as: Li Q Q, Zou Q, Ma D, et al. Dating ancient paintings of Mogao Grottoes using deeply learnt visual codes. Sci China Inf Sci, 2018, 61(9): 092105, doi: 10.1007/s11432-017-9308-x

RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Locality preserving projection on SPD matrix Lie group: algorithm and analysis
Li, Yangyang; Lu, Ruqian
Sci China Inf Sci, 2018, 61(9): 092104
Keywords: manifold learning; SPD matrix Lie group; locally preserving projection; Laplace operator; Log Euclidean metric
Cite as: Li Y Y, Lu R Q. Locality preserving projection on SPD matrix Lie group: algorithm and analysis. Sci China Inf Sci, 2018, 61(9): 092104, doi: 10.1007/s11432-017-9233-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 4

Universal enzymatic numerical P systems with small number of enzymatic variables
Zhang, Zhiqiang; Wu, Tingfang; Paun, Andrei; Pan, Linqiang
Sci China Inf Sci, 2018, 61(9): 092103
Keywords: bio-inspired computing; numerical P system; mobile robot; membrane controller; universality
Cite as: Zhang Z Q, Wu T F, Paun A, et al. Universal enzymatic numerical P systems with small number of enzymatic variables. Sci China Inf Sci, 2018, 61(9): 092103, doi: 10.1007/s11432-017-9103-5

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Building application-specific operating systems: a profile-guided approach
Yuan, Pengfei; Guo, Yao; Zhang, Lu; Chen, Xiangqun; Mei, Hong
Sci China Inf Sci, 2018, 61(9): 092102
Keywords: operating system; Linux kernel; performance; GCC; profile-guided optimization
Cite as: Yuan P F, Guo Y, Zhang L, et al. Building application-specific operating systems: a profile-guided approach. Sci China Inf Sci, 2018, 61(9): 092102, doi: 10.1007/s11432-017-9418-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Inferring diffusion networks with life stage heterogeneity
Zhao, Tong; Song, Guojie; He, Xinran
Sci China Inf Sci, 2018, 61(9): 092101
Keywords: network inference; fife stage heterogeneity; social influence; information diffusion; clustering cascade
Cite as: Zhao T, Song G J, He X R. Inferring diffusion networks with life stage heterogeneity. Sci China Inf Sci, 2018, 61(9): 092101, doi: 10.1007/s11432-016-9122-x

Vol. 61, No. 6, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Evaluation of redundancy-based system: a model checking approach
Fang, Ling; Mu, Chunyan; Cheng, Zhuo; Li, Guoqiang
Sci China Inf Sci, 2018, 61(6): 069101
Keywords: Fault tolerance; multi-version redundancy; qualitative evaluation; quantitative evalutation; probabilistic model checking
Cite as: Fang L, Mu C Y, Cheng Z, et al. Evaluation of redundancy-based system: a model checking approach. Sci China Inf Sci, 2018, 61(6): 069101, doi: 10.1007/s11432-016-9220-5

MOOP Website SpringerLink Google Scholar Supplementary Homepage Cited in SCI: 1

MagicMark: a marking menu using 2D direction and 3D depth information
Lyu, Fei; Xi, Rui; Han, Yuxin; Liu, Yujie
Sci China Inf Sci, 2018, 61(6): 064101
Keywords: large display; depth interaction; freehand gesture input; marking menu; gesture recognition
Cite as: Lyu F, Xi R, Han Y X, et al. MagicMark: a marking menu using 2D direction and 3D depth information. Sci China Inf Sci, 2018, 61(6): 064101, doi: 10.1007/s11432-018-9385-7

Vol. 61, No. 5, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Fingerprint-based access to personally controlled health records in emergency situations
Guan, Shaopeng; Wang, Yongyu; Shen, Jian
Sci China Inf Sci, 2018, 61(5): 059103
Keywords: PCHR; privacy; fingerprint; access authorization; authentication
Cite as: Guan S P, Wang Y Y, Shen J. Fingerprint-based access to personally controlled health records in emergency situations. Sci China Inf Sci, 2018, 61(5): 059103, doi: 10.1007/s11432-017-9188-8

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

New constructions for (multiparty) one-round key exchange with strong security
Yang, Zheng; Lai, Junyu
Sci China Inf Sci, 2018, 61(5): 059102
Keywords: One Round; Key Exchange; Standard Model; DDH; Multilinear Map
Cite as: Yang Z, Lai J Y. New constructions for (multiparty) one-round key exchange with strong security. Sci China Inf Sci, 2018, 61(5): 059102, doi: 10.1007/s11432-017-9177-7

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

A lower dimension lattice attack on NTRU
Yang, Zhichao; Fu, Shaojing; Qu, Longjiang; Li, Chao
Sci China Inf Sci, 2018, 61(5): 059101
Keywords: NTRU; lattice reduction; polynomial ring; Gaussian heuristic; root Hermite factor
Cite as: Yang Z C, Fu S J, Qu L J, et al. A lower dimension lattice attack on NTRU. Sci China Inf Sci, 2018, 61(5): 059101, doi: 10.1007/s11432-017-9175-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face
Qin, Rizhen; Gao, Wei; Xu, Huarong; Hu, Zhanyi
Sci China Inf Sci, 2018, 61(5): 058105
Keywords: modern physiognomy; self-reported personality trait; measured intelligence; the facial feature; the classi cation method; the regression method
Cite as: Qin R Z, Gao W, Xu H R, et al. Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face. Sci China Inf Sci, 2018, 61(5): 058105, doi: 10.1007/s11432-016-9174-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

Spatial image encryption algorithm based on chaotic map and pixel frequency
Ye, Guodong; Huang, Xiaoling
Sci China Inf Sci, 2018, 61(5): 058104
Keywords: Image encryption; pixel frequency; multimedia security; chaotic map; keystream
Cite as: Ye G D, Huang X L. Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inf Sci, 2018, 61(5): 058104, doi: 10.1007/s11432-017-9191-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Securely min and k-th min computations with fully homomorphic encryption
Jiang, Bingbing; Zhang, Yuan
Sci China Inf Sci, 2018, 61(5): 058103
Keywords: secure minimum computation; secure k-th minimum computation; FHE; lattice-based cryptosystem; GSW13 scheme
Cite as: Jiang B B, Zhang Y. Securely min and k-th min computations with fully homomorphic encryption. Sci China Inf Sci, 2018, 61(5): 058103, doi: 10.1007/s11432-017-9205-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Keywords: block cipher; 3D cipher; alternate structure; differential cryptanalysis; practical security; active S-box
Cite as: Wang Q, Jin C H. A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis. Sci China Inf Sci, 2018, 61(5): 058102, doi: 10.1007/s11432-017-9181-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
Wang, Huige; Chen, Kefei; Qin, Baodong; Hu, Ziyuan
Sci China Inf Sci, 2018, 61(5): 058101
Keywords: functional encryption; related randomness attack; RRA; chosen-ciphertext attack; CCA; trapdoor hash proof system; THPS; differing-inputs obfuscation
Cite as: Wang H G, Chen K F, Qin B D, et al. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci China Inf Sci, 2018, 61(5): 058101, doi: 10.1007/s11432-017-9120-4

PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 8

Can big data bring a breakthrough for software automation?
Mei, Hong; Zhang, Lu
Sci China Inf Sci, 2018, 61(5): 056101
Keywords: software automation; big data; program synthesis; software evolution; software reuse
Cite as: Mei H, Zhang L. Can big data bring a breakthrough for software automation?. Sci China Inf Sci, 2018, 61(5): 056101, doi: 10.1007/s11432-017-9355-3

MOOP Website SpringerLink Google Scholar Homepage Cited in SCI: 1

3D shape co-segmentation via sparse and low rank representations
Yin, Liyuan; Guo, Kan; Zhou, Bin; Zhao, Qinping
Sci China Inf Sci, 2018, 61(5): 054101
Keywords: 3D shape co-segmentation; geometry feature; sparse representation; low rank constraint; coefficient weight
Cite as: Yin L Y, Guo K, Zhou B, et al. 3D shape co-segmentation via sparse and low rank representations. Sci China Inf Sci, 2018, 61(5): 054101, doi: 10.1007/s11432-017-9331-9

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Symbolic model checking for discrete real-time systems
Luo, Xiangyu; Wu, Lijun; Chen, Qingliang; Li, Haibo; Zheng, Lixiao; Chen, Zuxi
Sci China Inf Sci, 2018, 61(5): 052106
Keywords: symbolic model checking; temporal tester; real-time temporal logic; just discrete system; OBDD
Cite as: Luo X Y, Wu L J, Chen Q L, et al. Symbolic model checking for discrete real-time systems. Sci China Inf Sci, 2018, 61(5): 052106, doi: 10.1007/s11432-017-9152-x

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Anti-chain based algorithms for timed/probabilistic refinement checking
Wang, Ting; Chen, Tieming; Liu, Yang; Wang, Ye
Sci China Inf Sci, 2018, 61(5): 052105
Keywords: model checking; refinement; anti-chain; timed automata; markov decision process
Cite as: Wang T, Chen T M, Liu Y, et al. Anti-chain based algorithms for timed/probabilistic refinement checking. Sci China Inf Sci, 2018, 61(5): 052105, doi: 10.1007/s11432-017-9133-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Formula for computing knots with minimum stress and stretching energies
Li, Xuemei; Zhang, Fan; Chen, Guoning; Zhang, Caiming
Sci China Inf Sci, 2018, 61(5): 052104
Keywords: parameter; stress and stretching energies; polynomial; precision; curve construction
Cite as: Li X M, Zhang F, Chen G N, et al. Formula for computing knots with minimum stress and stretching energies. Sci China Inf Sci, 2018, 61(5): 052104, doi: 10.1007/s11432-017-9134-6

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 7

Finger vein recognition based on deformation information
Meng, Xianjing; Xi, Xiaoming; Yang, Gongping; Yin, Yilong
Sci China Inf Sci, 2018, 61(5): 052103
Keywords: finger vein recognition; deformation; optimized matching; displacement; texture of uniformity
Cite as: Meng X J, Xi X M, Yang G P, et al. Finger vein recognition based on deformation information. Sci China Inf Sci, 2018, 61(5): 052103, doi: 10.1007/s11432-016-9037-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications
Zhang, Haitao; Cheng, Zhuo; Li, Guoqiang; Liu, Shaoying
Sci China Inf Sci, 2018, 61(5): 052102
Keywords: OSEK/VDX application; deterministic scheduler; software formal method; model checking; sequentialization
Cite as: Zhang H T, Cheng Z, Li G Q, et al. autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications. Sci China Inf Sci, 2018, 61(5): 052102, doi: 10.1007/s11432-016-9039-4

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Learning dynamic dependency network structure with time lag
Du, Sizhen; Song, Guojie; Hong, Haikun; Liu, Dong
Sci China Inf Sci, 2018, 61(5): 052101
Keywords: dependency network; time lag; dynamic network
Cite as: Du S Z, Song G J, Hong H K, et al. Learning dynamic dependency network structure with time lag. Sci China Inf Sci, 2018, 61(5): 052101, doi: 10.1007/s11432-016-9070-4

REVIEW Website SpringerLink Google Scholar Cited in SCI: 5

Survey of recent progress in semantic image segmentation with CNNs
Geng, Qichuan; Zhou, Zhong; Cao, Xiaochun
Sci China Inf Sci, 2018, 61(5): 051101
Keywords: semantic image segmentation; CNN; Pascal VOC 2012 challenge; multi-granularity feature; construction of contextual relationship
Cite as: Geng Q C, Zhou Z, Cao X C. Survey of recent progress in semantic image segmentation with CNNs. Sci China Inf Sci, 2018, 61(5): 051101, doi: 10.1007/s11432-017-9189-6

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Mining API usage change rules for software framework evolution
Yu, Ping; Yang, Fei; Cao, Chun; Hu, Hao; Ma, Xiaoxing
Sci China Inf Sci, 2018, 61(5): 050108
Keywords: software evolution; API usage change; call dependency; frequent itemset mining; text similarity
Cite as: Yu P, Yang F, Cao C, et al. Mining API usage change rules for software framework evolution. Sci China Inf Sci, 2018, 61(5): 050108, doi: 10.1007/s11432-017-9416-1

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar Cited in SCI: 2

LogPruner: detect, analyze and prune logging calls in Android apps
Zhou, Xin; Wu, Kaidong; Cai, Huaqian; Lou, Shuai; Zhang, Ying; Huang, Gang
Sci China Inf Sci, 2018, 61(5): 050107
Keywords: logging call; Android App; log pruner; static analysis; logging class
Cite as: Zhou X, Wu K D, Cai H Q, et al. LogPruner: detect, analyze and prune logging calls in Android apps. Sci China Inf Sci, 2018, 61(5): 050107, doi: 10.1007/s11432-017-9354-x

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 5

Personalized project recommendation on GitHub
Sun, Xiaobing; Xu, Wenyuan; Xia, Xin; Chen, Xiang; Li, Bin
Sci China Inf Sci, 2018, 61(5): 050106
Keywords: software recommendation; developer behavior; GitHub; user feedback; personalized recommendation
Cite as: Sun X B, Xu W Y, Xia X, et al. Personalized project recommendation on GitHub. Sci China Inf Sci, 2018, 61(5): 050106, doi: 10.1007/s11432-017-9419-x

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Toward accurate link between code and software documentation
Cao, Yingkui; Zou, Yanzhen; Luo, Yuxiang; Xie, Bing; Zhao, Junfeng
Sci China Inf Sci, 2018, 61(5): 050105
Keywords: traceability link; code element; software document; contextual code element; salient code element
Cite as: Cao Y K, Zou Y Z, Luo Y X, et al. Toward accurate link between code and software documentation. Sci China Inf Sci, 2018, 61(5): 050105, doi: 10.1007/s11432-017-9402-3

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

IO dependent SSD cache allocation for elastic Hadoop applications
Tang, Zhen; Wang, Wei; Sun, Lei; Huang, Yu; Wu, Heng; Wei, Jun; Huang, Tao
Sci China Inf Sci, 2018, 61(5): 050104
Keywords: Hadoop; SSD; cache; resource management; virtualization
Cite as: Tang Z, Wang W, Sun L, et al. IO dependent SSD cache allocation for elastic Hadoop applications. Sci China Inf Sci, 2018, 61(5): 050104, doi: 10.1007/s11432-017-9401-y

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

NavyDroid: an efficient tool of energy inefficiency problem diagnosis for Android applications
Liu, Yi; Wang, Jue; Xu, Chang; Ma, Xiaoxing; Lu, Jian
Sci China Inf Sci, 2018, 61(5): 050103
Keywords: energy inefficiency; smartphone application; wake lock
Cite as: Liu Y, Wang J, Xu C, et al. NavyDroid: an efficient tool of energy inefficiency problem diagnosis for Android applications. Sci China Inf Sci, 2018, 61(5): 050103, doi: 10.1007/s11432-017-9400-y

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

RoboCloud: augmenting robotic visions for open environment modeling using Internet knowledge
Li, Yiying; Wang, Huaimin; Ding, Bo; Zhou, Wei
Sci China Inf Sci, 2018, 61(5): 050102
Keywords: Internet-augmented; environment modeling; uncertainty; robotic vision; semantic mapping; robotic software; cloud robotics
Cite as: Li Y Y, Wang H M, Ding B, et al. RoboCloud: augmenting robotic visions for open environment modeling using Internet knowledge. Sci China Inf Sci, 2018, 61(5): 050102, doi: 10.1007/s11432-017-9380-5

Special Focus on Internetware: Research Progress and Current Trend
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Situation analytics — at the dawn of a new software engineering paradigm
Chang, Carl K.
Sci China Inf Sci, 2018, 61(5): 050101
Keywords: ultimate agile method; context; intention; Internet of things; paradigm; situation; software engineering; human-embedded computing
Cite as: Chang C K. Situation analytics — at the dawn of a new software engineering paradigm. Sci China Inf Sci, 2018, 61(5): 050101, doi: 10.1007/s11432-017-9372-7

Vol. 61, No. 4, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Visible and infrared image fusion using l0-generalized total variation model
Pan, Han; Jing, Zhongliang; Qiao, Lingfeng; Li, Minzhe
Sci China Inf Sci, 2018, 61(4): 049103
Keywords: image fusion; optimization method; equilibrium constraint; generalized total variation; L0 norm
Cite as: Pan H, Jing Z L, Qiao L F, et al. Visible and infrared image fusion using l0-generalized total variation model. Sci China Inf Sci, 2018, 61(4): 049103, doi: 10.1007/s11432-017-9246-3

LETTER Website SpringerLink Google Scholar Cited in SCI: 5

DESC: enabling secure data exchange based on smart contracts
Liang, Jiao; Han, Weili; Guo, Zeqing; Chen, Yaoliang; Cao, Chang; Wang, Xiaoyang Sean; Li, Fenghua
Sci China Inf Sci, 2018, 61(4): 049102
Keywords: secure data exchange; access control; smart contract; Blockchain 2.0; data rights
Cite as: Liang J, Han W L, Guo Z Q, et al. DESC: enabling secure data exchange based on smart contracts. Sci China Inf Sci, 2018, 61(4): 049102, doi: 10.1007/s11432-017-9245-1

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Nonlocal image denoising using edge-based similarity metric and adaptive parameter selection
Fan, Linwei; Li, Xuemei; Guo, Qiang; Zhang, Caiming
Sci China Inf Sci, 2018, 61(4): 049101
Keywords: image denoising; edge detection; nonlocal denoising; difference operator; two-stage scheme
Cite as: Fan L W, Li X M, Guo Q, et al. Nonlocal image denoising using edge-based similarity metric and adaptive parameter selection. Sci China Inf Sci, 2018, 61(4): 049101, doi: 10.1007/s11432-017-9207-9

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Distribution-dependent concentration inequalities for tighter generalization bounds
Wu, Xinxing; Zhang, Junping
Sci China Inf Sci, 2018, 61(4): 048105
Keywords: learning theory; concentration inequality; distribution-dependent; statistical learning theory; generalization ability
Cite as: Wu X X, Zhang J P. Distribution-dependent concentration inequalities for tighter generalization bounds. Sci China Inf Sci, 2018, 61(4): 048105, doi: 10.1007/s11432-017-9225-2

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Packing unequal circles into a square container based on the narrow action spaces
He, Kun; Dosh, Mohammed; Jin, Yan; Zou, Shenghao
Sci China Inf Sci, 2018, 61(4): 048104
Keywords: global optimization; circle packing; narrow action space; partitioned circle; Quasi-physical
Cite as: He K, Dosh M, Jin Y, et al. Packing unequal circles into a square container based on the narrow action spaces. Sci China Inf Sci, 2018, 61(4): 048104, doi: 10.1007/s11432-017-9223-3

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 13

Cross-cluster asymmetric group key agreement for wireless sensor networks
Zheng, Jiamin; Tan, Yu-An; Zhang, Qikun; Zhang, Xiaosong; Zhu, Liehuang; Zhang, Quanxin
Sci China Inf Sci, 2018, 61(4): 048103
Keywords: wireless sensor network; asymmetric group key agreement; authenticated protocol; key self-confirmation; asymmetric calculation
Cite as: Zheng J M, Tan Y A, Zhang Q K, et al. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61(4): 048103, doi: 10.1007/s11432-017-9212-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Simulation-based security of function-hiding inner product encryption
Zhao, Qingsong; Zeng, Qingkai; Liu, Ximeng; Xu, Huanliang
Sci China Inf Sci, 2018, 61(4): 048102
Keywords: functional encryption; inner product; function privacy; simulation-based security; asymmetric bilinear group
Cite as: Zhao Q S, Zeng Q K, Liu X M, et al. Simulation-based security of function-hiding inner product encryption. Sci China Inf Sci, 2018, 61(4): 048102, doi: 10.1007/s11432-017-9224-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A novel anti-detection criterion for covert storage channel threat estimation
Wang, Chong; Zhang, Changyou; Wu, Bin; Tan, Yu'an; Wang, Yongji
Sci China Inf Sci, 2018, 61(4): 048101
Keywords: covert storage channel; information security; covert channel threat evaluation; anti-detection criterion; covert channel restriction
Cite as: Wang C, Zhang C Y, Wu B, et al. A novel anti-detection criterion for covert storage channel threat estimation. Sci China Inf Sci, 2018, 61(4): 048101, doi: 10.1007/s11432-017-9211-1

MOOP Website SpringerLink Google Scholar Supplementary Homepage Cited in SCI: 1

Modeling a target-selection motion by leveraging an optimal feedback control mechanism
Huang, Jin; Peng, Xiaolan; Tian, Feng; Wang, Hongan; Dai, Guozhong
Sci China Inf Sci, 2018, 61(4): 044101
Keywords: Human computer interaction; target selection; simulation; optimal feedback control; moving target selection
Cite as: Huang J, Peng X L, Tian F, et al. Modeling a target-selection motion by leveraging an optimal feedback control mechanism. Sci China Inf Sci, 2018, 61(4): 044101, doi: 10.1007/s11432-017-9326-8

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Customizing the HPL for China accelerator
Gan, Xinbiao; Hu, Yikun; Liu, Jie; Chi, Lihua; Xu, Han; Gong, Chunye; Li, Shengguo; Yan, Yihui
Sci China Inf Sci, 2018, 61(4): 042102
Keywords: HPL; China accelerator; DPEM; OAMM; OPTVEC
Cite as: Gan X B, Hu Y K, Liu J, et al. Customizing the HPL for China accelerator. Sci China Inf Sci, 2018, 61(4): 042102, doi: 10.1007/s11432-017-9221-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A computational framework for Karl Popper's logic of scientific discovery
Li, Wei; Sui, Yuefei
Sci China Inf Sci, 2018, 61(4): 042101
Keywords: belief revision; logic of scientific discovery; approximate deduction; approximation algorithm; feasible computation
Cite as: Li W, Sui Y F. A computational framework for Karl Popper's logic of scientific discovery. Sci China Inf Sci, 2018, 61(4): 042101, doi: 10.1007/s11432-017-9199-8

Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
Zhao, Xinjie; Zhang, Fan; Guo, Shize; Gong, Zheng
Sci China Inf Sci, 2018, 61(3): 039106
Keywords: optimal fault model; hardware trojan horse; fault injection; algebraic fault analysis; block cipher
Cite as: Zhao X J, Zhang F, Guo S Z, et al. Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers. Sci China Inf Sci, 2018, 61(3): 039106, doi: 10.1007/s11432-017-9179-4

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Verifiable random functions with Boolean function constraints
Wang, Qianwen; Feng, Rongquan; Zhu, Yan
Sci China Inf Sci, 2018, 61(3): 039105
Keywords: Conditionally Verifiable Random Function; Verifiable Random Function; Access Constraints; full-DNF; Provable Security
Cite as: Wang Q W, Feng R Q, Zhu Y. Verifiable random functions with Boolean function constraints. Sci China Inf Sci, 2018, 61(3): 039105, doi: 10.1007/s11432-017-9228-6

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Efficient and secure outsourcing of bilinear pairings with single server
Dong, Min; Ren, Yanli
Sci China Inf Sci, 2018, 61(3): 039104
Keywords: Cloud computing; Bilinear pairings; Outsourcing computation; Verifiable; Single server
Cite as: Dong M, Ren Y L. Efficient and secure outsourcing of bilinear pairings with single server. Sci China Inf Sci, 2018, 61(3): 039104, doi: 10.1007/s11432-017-9161-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Protecting white-box cryptographic implementations with obfuscated round boundaries
Xu, Tao; Wu, Chuankun; Liu, Feng; Zhao, Ruoxin
Sci China Inf Sci, 2018, 61(3): 039103
Keywords: white-box cryptography; block cipher; obfuscated round boundaries; malware; space hardness; code lifting
Cite as: Xu T, Wu C K, Liu F, et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci China Inf Sci, 2018, 61(3): 039103, doi: 10.1007/s11432-016-9171-6

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Efficient flush-reload cache attack on scalar multiplication based signature algorithm
Zhou, Ping; Wang, Tao; Lou, Xiaoxuan; Zhao, Xinjie; Zhang, Fan; Guo, Shize
Sci China Inf Sci, 2018, 61(3): 039102
Keywords: side channel attack; cache timing attack; ECDSA; flush-reload attack; public-key cryptography
Cite as: Zhou P, Wang T, Lou X X, et al. Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci China Inf Sci, 2018, 61(3): 039102, doi: 10.1007/s11432-017-9108-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
Wu, Haiqin; Wang, Liangmin; Jiang, Tao
Sci China Inf Sci, 2018, 61(3): 039101
Keywords: data outsourcing; location privacy; k nearest neighbor query; query efficiency; Hilbert curve
Cite as: Wu H Q, Wang L M, Jiang T. Secure and efficient k-nearest neighbor query for location-based services in outsourced environments. Sci China Inf Sci, 2018, 61(3): 039101, doi: 10.1007/s11432-017-9090-6

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 5

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
Sun, Lixue; Xu, Chunxiang; Zhang, Mingwu; Chen, Kefei; Li, Hongwei
Sci China Inf Sci, 2018, 61(3): 038106
Keywords: Public key encryption with keyword search; Insider keyword guessing attack; Indistinguishability obfuscation; Cloud storage; Signcryption
Cite as: Sun L X, Xu C X, Zhang M W, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61(3): 038106, doi: 10.1007/s11432-017-9124-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved cryptanalysis of step-reduced SM3
Shen, Yanzhao; Bai, Dongxia; Yu, Hongbo
Sci China Inf Sci, 2018, 61(3): 038105
Keywords: SM3; preimage attack; boomerang attack; differential meet-in-the-middle; hash function
Cite as: Shen Y Z, Bai D X, Yu H B. Improved cryptanalysis of step-reduced SM3. Sci China Inf Sci, 2018, 61(3): 038105, doi: 10.1007/s11432-017-9119-6

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

More permutation polynomials with differential uniformity six
Tu, Ziran; Zeng, Xiangyong; Zhang, Zhiyong
Sci China Inf Sci, 2018, 61(3): 038104
Keywords: permutation; differential uniformity; algebraic degree; differential attack; nonlinearity
Cite as: Tu Z R, Zeng X Y, Zhang Z Y. More permutation polynomials with differential uniformity six. Sci China Inf Sci, 2018, 61(3): 038104, doi: 10.1007/s11432-017-9118-5

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
Ding, Yaoling; Wang, Xiaoyun; Wang, Ning; Wang, Wei
Sci China Inf Sci, 2018, 61(3): 038103
Keywords: automatic search; impossible differentials; Camellia; weak key
Cite as: Ding Y L, Wang X Y, Wang N, et al. Improved automatic search of impossible differentials for camellia with FL/FL-1 layers. Sci China Inf Sci, 2018, 61(3): 038103, doi: 10.1007/s11432-016-9104-3

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Several classes of negabent functions over finite fields
Wu, Gaofei; Li, Nian; Zhang, Yuqing; Liu, Xuefeng
Sci China Inf Sci, 2018, 61(3): 038102
Keywords: Finite field; Negabent function; Nega-Hadamard transform; Bent function; Kloosterman sum; Niho exponent
Cite as: Wu G F, Li N, Zhang Y Q, et al. Several classes of negabent functions over finite fields. Sci China Inf Sci, 2018, 61(3): 038102, doi: 10.1007/s11432-017-9096-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Construction of rotation symmetric bent functions with maximum algebraic degree
Zhang, Wenying; Han, Guoyong
Sci China Inf Sci, 2018, 61(3): 038101
Keywords: Cryptography; Boolean function; Bent function; Rotation symmetric function; Algebraic degree
Cite as: Zhang W Y, Han G Y. Construction of rotation symmetric bent functions with maximum algebraic degree. Sci China Inf Sci, 2018, 61(3): 038101, doi: 10.1007/s11432-017-9123-2

Special Issue on Information Security
POSITION PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A systematic framework to under stand central bank digital currency
Yao, Qian
Sci China Inf Sci, 2018, 61(3): 033101
Keywords: digital fiat currency; credit-based currency; crypto-currency; algorithm-based currency; smart currency; central bank digital currency
Cite as: Yao Q. A systematic framework to under stand central bank digital currency. Sci China Inf Sci, 2018, 61(3): 033101, doi: 10.1007/s11432-017-9294-5

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Orthogonalized lattice enumeration for solving SVP
Zheng, Zhongxiang; Wang, Xiaoyun; Xu, Guangwu; Yang, Y. U.
Sci China Inf Sci, 2018, 61(3): 032115
Keywords: lattice-based; SVP; sparse representation; enumeration; BKZ
Cite as: Zheng Z X, Wang X Y, Xu G W, et al. Orthogonalized lattice enumeration for solving SVP. Sci China Inf Sci, 2018, 61(3): 032115, doi: 10.1007/s11432-017-9307-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

An adaptive system for detecting malicious queries in web attacks
Dong, Ying; Zhang, Yuqing; Ma, Hua; Wu, Qianru; Liu, Qixu; Wang, Kai; Wang, Wenjie
Sci China Inf Sci, 2018, 61(3): 032114
Keywords: web attack; adaptive learning; intrusion detection; anomaly detection; SVM
Cite as: Dong Y, Zhang Y Q, Ma H, et al. An adaptive system for detecting malicious queries in web attacks. Sci China Inf Sci, 2018, 61(3): 032114, doi: 10.1007/s11432-017-9288-4

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A real-time inversion attack on the GMR-2 cipher used in the satellite phones
Hu, Jiao; Li, Ruilin; Tang, Chaojing
Sci China Inf Sci, 2018, 61(3): 032113
Keywords: satellite phone; stream cipher; GMR-2; cryptanalysis; inversion attack
Cite as: Hu J, Li R L, Tang C J. A real-time inversion attack on the GMR-2 cipher used in the satellite phones. Sci China Inf Sci, 2018, 61(3): 032113, doi: 10.1007/s11432-017-9230-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
Li, Dongmei; Dong, Xiaolei; Cao, Zhenfu; Wang, Haijiang
Sci China Inf Sci, 2018, 61(3): 032112
Keywords: cloud computing; privacy-preserving; linear equations; encryption; security
Cite as: Li D M, Dong X L, Cao Z F, et al. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci China Inf Sci, 2018, 61(3): 032112, doi: 10.1007/s11432-017-9208-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Similar operation template attack on RSA-CRT as a case study
Xu, Sen; Lu, Xiangjun; Zhang, Kaiyu; Li, Yang; Wang, Lei; Wang, Weijia; Gu, Haihua; Guo, Zheng; Liu, Junrong; Gu, Dawu
Sci China Inf Sci, 2018, 61(3): 032111
Keywords: side channel attack; template attack; RSA-CRT; hidden number problem; prime recovery
Cite as: Xu S, Lu X J, Zhang K Y, et al. Similar operation template attack on RSA-CRT as a case study. Sci China Inf Sci, 2018, 61(3): 032111, doi: 10.1007/s11432-017-9210-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Sci China Inf Sci, 2018, 61(3): 032110
Keywords: VANETs; LED; lightweight cipher; impossible meet-in-the-middle; fault analysis
Cite as: Li W, Rijmen V, Tao Z, et al. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci China Inf Sci, 2018, 61(3): 032110, doi: 10.1007/s11432-017-9209-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A better bound for implicit factorization problem with shared middle bits
Wang, Shixiong; Qu, Longjiang; Li, Chao; Fu, Shaojing
Sci China Inf Sci, 2018, 61(3): 032109
Keywords: RSA; implicit factorization problem; middle bits; lattice; Coppersmith's method
Cite as: Wang S X, Qu L J, Li C, et al. A better bound for implicit factorization problem with shared middle bits. Sci China Inf Sci, 2018, 61(3): 032109, doi: 10.1007/s11432-017-9176-5

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Improved meet-in-the-middle attacks on reduced-round Piccolo
Liu, Ya; Cheng, Liang; Liu, Zhiqiang; Li, Wei; Wang, Qingju; Gu, Dawu
Sci China Inf Sci, 2018, 61(3): 032108
Keywords: block cipher; lightweight; Piccolo; meet-in-the-middle attack; distinguisher
Cite as: Liu Y, Cheng L, Liu Z Q, et al. Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci China Inf Sci, 2018, 61(3): 032108, doi: 10.1007/s11432-016-9157-y

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication
Youn, Taek-Young; Chang, Ku-Young
Sci China Inf Sci, 2018, 61(3): 032107
Keywords: cloud storage; secure de-duplication; data out-source; proof of ownership; bi-directional and concurrent proof
Cite as: Youn T-Y, Chang K-Y. Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication. Sci China Inf Sci, 2018, 61(3): 032107, doi: 10.1007/s11432-017-9116-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Impossible differential attack on Simpira v2
Zong, Rui; Dong, Xiaoyang; Wang, Xiaoyun
Sci China Inf Sci, 2018, 61(3): 032106
Keywords: Simpira-4; impossible differential attack; super S-box; the Even-Mansour construction; security claim
Cite as: Zong R, Dong X Y, Wang X Y. Impossible differential attack on Simpira v2. Sci China Inf Sci, 2018, 61(3): 032106, doi: 10.1007/s11432-016-9075-6

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Attacking OpenSSL ECDSA with a small amount of side-channel information
Wang, Wenbo; Fan, Shuqin
Sci China Inf Sci, 2018, 61(3): 032105
Keywords: ECDSA; OpenSSL; lattice attack; windowed non-adjacent form; hidden number problem; Flush plus Reload attack
Cite as: Wang W B, Fan S Q. Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci China Inf Sci, 2018, 61(3): 032105, doi: 10.1007/s11432-016-9030-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Three new infinite families of bent functions
Wang, Libo; Wu, Baofeng; Liu, Zhuojun; Lin, Dongdai
Sci China Inf Sci, 2018, 61(3): 032104
Keywords: bent function; Hadamard matrix; Kasami function; Gold-like function; Niho exponent
Cite as: Wang L B, Wu B F, Liu Z J, et al. Three new infinite families of bent functions. Sci China Inf Sci, 2018, 61(3): 032104, doi: 10.1007/s11432-016-0624-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Countering JPEG anti-forensics based on noise level estimation
Zeng, Hui; Yu, Jingjing; Kang, Xiangui; Lyu, Siwei
Sci China Inf Sci, 2018, 61(3): 032103
Keywords: game theory; quantization artifact; blocking artifact; JPEG forensics; anti-forensics; noise level estimation
Cite as: Zeng H, Yu J J, Kang X G, et al. Countering JPEG anti-forensics based on noise level estimation. Sci China Inf Sci, 2018, 61(3): 032103, doi: 10.1007/s11432-016-0426-1

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 9

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
Zhang, Kai; Li, Hui; Ma, Jianfeng; Liu, Ximeng
Sci China Inf Sci, 2018, 61(3): 032102
Keywords: attribute-based encryption; multi-authority; ciphertext-policy; traceability; large universe
Cite as: Zhang K, Li H, Ma J F, et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci China Inf Sci, 2018, 61(3): 032102, doi: 10.1007/s11432-016-9019-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
Wang, An; Zhang, Yu; Tian, Weina; Wang, Qian; Zhang, Guoshuang; Zhu, Liehuang
Sci China Inf Sci, 2018, 61(3): 032101
Keywords: fault sensitivity analysis; right or wrong collision rate analysis; masking; collision attack
Cite as: Wang A, Zhang Y, Tian W N, et al. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack. Sci China Inf Sci, 2018, 61(3): 032101, doi: 10.1007/s11432-016-0616-4

Vol. 61, No. 2, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Multi-key FHE for multi-bit messages
Li, Zengpeng; Ma, Chunguang; Zhou, Hongsheng
Sci China Inf Sci, 2018, 61(2): 029101
Keywords: Multi-Key Homomorphic Encryption; Multi-Bit Homomorphic Encryption; Learning with Errors; Linear Combination Procedure; Multiparty Computation
Cite as: Li Z P, Ma C G, Zhou H S. Multi-key FHE for multi-bit messages. Sci China Inf Sci, 2018, 61(2): 029101, doi: 10.1007/s11432-017-9206-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Network topology inference from incomplete observation data
Dou, Peng; Song, Guojie; Zhao, Tong
Sci China Inf Sci, 2018, 61(2): 028102
Keywords: Network inference; Incomplete cascade; Social influence; Information diffusion; Greedy algorithm
Cite as: Dou P, Song G J, Zhao T. Network topology inference from incomplete observation data. Sci China Inf Sci, 2018, 61(2): 028102, doi: 10.1007/s11432-017-9154-1

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

The verification of conversion algorithms between finite automata
Jiang, Dongchen; Li, Wei
Sci China Inf Sci, 2018, 61(2): 028101
Keywords: finite automata; conversion algorithm; algorithm verification; constructive proof; algorithm specification
Cite as: Jiang D C, Li W. The verification of conversion algorithms between finite automata. Sci China Inf Sci, 2018, 61(2): 028101, doi: 10.1007/s11432-017-9155-x

POSITION PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Learning stratified 3D reconstruction
Dong, Qiulei; Shu, Mao; Cui, Hainan; Xu, Huarong; Hu, Zhanyi
Sci China Inf Sci, 2018, 61(2): 023101
Keywords: stratified 3D reconstruction; learning; deep neural network; outlier detector; spatial vision
Cite as: Dong Q L, Shu M, Cui H N, et al. Learning stratified 3D reconstruction. Sci China Inf Sci, 2018, 61(2): 023101, doi: 10.1007/s11432-017-9234-7

Vol. 61, No. 1, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An imporosity message scheduling based on modified genetic algorithm for time-triggered Ethernet
Zhang, Yingjing; He, Feng; Lu, Guangshan; Xiong, Huagang
Sci China Inf Sci, 2018, 61(1): 019102
Keywords: genetic algorithm; schedule; Time-Trigger Ethernet; imporosity; latency
Cite as: Zhang Y J, He F, Lu G S, et al. An imporosity message scheduling based on modified genetic algorithm for time-triggered Ethernet. Sci China Inf Sci, 2018, 61(1): 019102, doi: 10.1007/s11432-017-9121-6

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Integral cryptanalysis of SPN ciphers with binary permutations
Song, Hailong; Wei, Yuechuan
Sci China Inf Sci, 2018, 61(1): 019101
Keywords: integral cryptanalysis; integral branch number; SPN ciphers; ARIA; Permutation
Cite as: Song H L, Wei Y C. Integral cryptanalysis of SPN ciphers with binary permutations. Sci China Inf Sci, 2018, 61(1): 019101, doi: 10.1007/s11432-016-9184-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 5

Two-stage local constrained sparse coding for fine-grained visual categorization
Guo, Lihua; Guo, Chenggang; Li, Lei; Huang, Qinghua; Li, Yanshan; Li, Xuelong
Sci China Inf Sci, 2018, 61(1): 018104
Keywords: Fine-grained visual categorization; Local Constrained Sparse Coding; Deep learning; Pose alignment; Dictionary learning
Cite as: Guo L H, Guo C G, Li L, et al. Two-stage local constrained sparse coding for fine-grained visual categorization. Sci China Inf Sci, 2018, 61(1): 018104, doi: 10.1007/s11432-017-9158-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Robust video denoising with sparse and dense noise modelings
Shen, Guiping; Han, Zhi; Chen, Xi'ai; Tang, Yandong
Sci China Inf Sci, 2018, 61(1): 018103
Keywords: low rank factorization; matrix completion; noise modeling; video denoising; mixture of Gaussians
Cite as: Shen G P, Han Z, Chen X A, et al. Robust video denoising with sparse and dense noise modelings. Sci China Inf Sci, 2018, 61(1): 018103, doi: 10.1007/s11432-017-9200-6

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Model-based variational fusion for reducing spectral distortion
Zhou, Zeming; Chen, Chaoqian; Meng, Yong; Hu, Biao
Sci China Inf Sci, 2018, 61(1): 018102
Keywords: pan-sharpening; variational fusion; model-based fusion; gradient descend flow; MTF
Cite as: Zhou Z M, Chen C Q, Meng Y, et al. Model-based variational fusion for reducing spectral distortion. Sci China Inf Sci, 2018, 61(1): 018102, doi: 10.1007/s11432-016-9085-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Accurate inference of user popularity preference in a large-scale online video streaming system
Tan, Xiaoying; Guo, Yuchun; Chen, Yishuai; Zhu, Wei
Sci China Inf Sci, 2018, 61(1): 018101
Keywords: video popularity; user preference; inference algorithm; recommendation algorithm; online video streaming system
Cite as: Tan X Y, Guo Y C, Chen Y S, et al. Accurate inference of user popularity preference in a large-scale online video streaming system. Sci China Inf Sci, 2018, 61(1): 018101, doi: 10.1007/s11432-016-9078-0

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A study on the changes of dynamic feature code when fixing bugs: towards the benefits and costs of Python dynamic features
Chen, Zhifei; Ma, Wanwangying; Lin, Wei; Chen, Lin; Li, Yanhui; Xu, Baowen
Sci China Inf Sci, 2018, 61(1): 012107
Keywords: Python; fine-grained code changes; change behaviors; dynamic features; bug fixing
Cite as: Chen Z F, Ma W W Y, Lin W, et al. A study on the changes of dynamic feature code when fixing bugs: towards the benefits and costs of Python dynamic features. Sci China Inf Sci, 2018, 61(1): 012107, doi: 10.1007/s11432-017-9153-3

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Mission evaluation: expert evaluation system for large-scale combat tasks of the weapon system of systems
Ding, Jianfei; Si, Guangya; Ma, Jun; Wang, Yanzheng; Wang, Zhe
Sci China Inf Sci, 2018, 61(1): 012106
Keywords: mission evaluation; large-scale tasks; weapon system of system; visual interactive; active learning
Cite as: Ding J F, Si G Y, Ma J, et al. Mission evaluation: expert evaluation system for large-scale combat tasks of the weapon system of systems. Sci China Inf Sci, 2018, 61(1): 012106, doi: 10.1007/s11432-016-9071-5

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Toward multi-programmed workloads with different memory footprints: a self-adaptive last level cache scheduling scheme
Zhang, Jingyu; Guo, Minyi; Wu, Chentao; Chen, Yuanyi
Sci China Inf Sci, 2018, 61(1): 012105
Keywords: 3D-stacking technology; cache architecture; cache scheduling; multi-programmed workloads; memory system; performance optimization
Cite as: Zhang J Y, Guo M Y, Wu C T, et al. Toward multi-programmed workloads with different memory footprints: a self-adaptive last level cache scheduling scheme. Sci China Inf Sci, 2018, 61(1): 012105, doi: 10.1007/s11432-016-0408-1

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Non-uniform EWMA-PCA based cache size allocation scheme in Named Data Networks
Mehran, Narges; Movahhedinia, Naser
Sci China Inf Sci, 2018, 61(1): 012104
Keywords: content centric network; Named Data network; future Internet; NDN cache size; exponential weighted moving average; principal component analysis
Cite as: Mehran N, Movahhedinia N. Non-uniform EWMA-PCA based cache size allocation scheme in Named Data Networks. Sci China Inf Sci, 2018, 61(1): 012104, doi: 10.1007/s11432-016-0501-5

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Decidability of linearizabilities for relaxed data structures
Wang, Chao; Lv, Yi; Wu, Peng
Sci China Inf Sci, 2018, 61(1): 012103
Keywords: concurrent data structures; quantitative relaxation; linearizability; decidability; finite automata
Cite as: Wang C, Lv Y, Wu P. Decidability of linearizabilities for relaxed data structures. Sci China Inf Sci, 2018, 61(1): 012103, doi: 10.1007/s11432-016-9062-x

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Updatable timed automata with one updatable clock
Li, Guoqiang; Wen, Yunqing; Yuen, Shoji
Sci China Inf Sci, 2018, 61(1): 012102
Keywords: updatable timed automata; one counter automata; digiword; reachability problem
Cite as: Li G Q, Wen Y Q, Yuen S. Updatable timed automata with one updatable clock. Sci China Inf Sci, 2018, 61(1): 012102, doi: 10.1007/s11432-016-9027-y

RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Robust sparse representation based face recognition in an adaptive weighted spatial pyramid structure
Ma, Xiao; Zhang, Fandong; Li, Yuelong; Feng, Jufu
Sci China Inf Sci, 2018, 61(1): 012101
Keywords: face recognition; sparse representation; self-adaptive weighted aggregating; spatial pyramid structure; local robust strategies
Cite as: Ma X, Zhang F D, Li Y L, et al. Robust sparse representation based face recognition in an adaptive weighted spatial pyramid structure. Sci China Inf Sci, 2018, 61(1): 012101, doi: 10.1007/s11432-016-9009-6