
Volume 25, Issue 5 (2020)
Research Articles
Improving Semantic Part Features for Person Re-identification with Supervised Non-local Similarity
Yifan Sun, Zhaopeng Dou, Yali Li, and Shengjin Wang
Optimal Data Transmission in Backscatter Communication for Passive Sensing Systems
Jumin Zhao, Ji Li, Dengao Li, and Haizhu Yang
Analysis of a Firm’s Optimal Size Based on Accessible Market Capacity
Xiao Sun, Jun Qian, Yueting Chai, and Yi Liu
An Automatic Analysis Approach Toward Indistinguishability of Sampling on the LWE Problem
Shuaishuai Zhu, Yiliang Han, and Xiaoyuan Yang
BAM: A Block-Based Bayesian Method for Detecting Genome-Wide Associations with Multiple Diseases
Guanying Wu, Xuan Guo, and Baohua Xu
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
Ruizhong Du, Ailun Tan, and Junfeng Tian
A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
Junwei Tang, Ruixuan Li, Kaipeng Wang, Xiwu Gu, and Zhiyong Xu
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
Jinchang Hu, Jinfu Chen, Lin Zhang, Yisong Liu, Qihao Bao, Hilary Ackah-Arthur, and Chi Zhang
Fast Carrier Selection of JPEG Steganography Appropriate for Application
Weixiang Ren, Yibo Xu, Liming Zhai, Lina Wang, and Ju Jia
ePUF: A Lightweight Double Identity Verification in IoT
Bo Zhao, Pengyuan Zhao, and Peiru Fan
Hybrid Structure Reliability Analysis Based on the Damped Newton Method
Hongwei Zheng, Guangwei Meng, Feng Li, Tonghui Wei, Wei Luo, and Yaming Guo
Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching
Xiaoliang Che, Tanping Zhou, Ningbo Li, Haonan Zhou, Zhenhua Chen, and Xiaoyuan Yang
Real-Time Facial Pose Estimation and Tracking by Coarse-to-Fine Iterative Optimization
Xiaolong Yang, Xiaohong Jia, Mengke Yuan, and Dong-Ming Yan