A survey of malware behavior description and analysis Bo YuYing FangLiu Liu Review 16 July 2018 Pages: 583 - 603
An embedded lightweight GUI component library and ergonomics optimization method for industry process monitoring Da-peng TanShu-ting ChenLi-bin Zhang ReviewPaper 16 July 2018 Pages: 604 - 625
Preserving privacy information flow security in composite service evolution Huan-feng PengZhi-qiu HuangYu-qing Wang ReviewPaper 16 July 2018 Pages: 626 - 638
A new constrained maximum margin approach to discriminative learning of Bayesian classifiers Ke GuoXia-bi LiuZeng-min Geng ReviewPaper 16 July 2018 Pages: 639 - 650
Cross-lingual implicit discourse relation recognition with co-training Yao-jie LuMu XuJin-song Su ReviewPaper 16 July 2018 Pages: 651 - 661
Suboptimal network coding subgraph algorithms for 5G minimum-cost multicast networks Feng WeiWei-xia Zou ReviewPaper 16 July 2018 Pages: 662 - 673
Multi-user rate and power analysis in a cognitive radio network with massive multi-input multi-output Shang LiuIshtiaq AhmadZhi Zhang ReviewPaper 16 July 2018 Pages: 674 - 684
A composite optimization method for separation parameters of large-eccentricity pico-satellites Lai TengZhong-he Jin ReviewPaper 16 July 2018 Pages: 685 - 698