[1] |
LIU Shuangyin, LEI Moyixi, WANG Lu, SUN Chuanheng, XU Longqin, CAO Liang, FENG Dachun, ZHENG Jianhua, LI Jingbin.
Survey of Blockchain Key Technologies and Existing Problems
[J]. Computer Engineering and Applications, 2022, 58(3): 66-82.
|
[2] |
YE Qisong, DAI Xuchu.
State of the Art on Adversarial Example Generation Methods for Attacking Classifier
[J]. Computer Engineering and Applications, 2020, 56(5): 34-42.
|
[3] |
LI Hongwei, CHEN Liang, BAI Jingbo.
Projection Pursuit Threat Target Assessment Model Based on Chaotic Moth-Flame Optimization Algorithm
[J]. Computer Engineering and Applications, 2020, 56(2): 152-157.
|
[4] |
WANG Tong, ZHU Minling.
Study on Fast Realization of Serial Test and Approximate Entropy Test
[J]. Computer Engineering and Applications, 2020, 56(15): 113-117.
|
[5] |
DAI Peiwu, PAN Zulie, SHI Fan.
Research on Crash Classification for Vulnerability Types
[J]. Computer Engineering and Applications, 2020, 56(13): 124-130.
|
[6] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[7] |
WANG Yang, WU Jianying, HUANG Jinlei, HU Hao, LIU Yuling.
Network Intrusion Intention Recognition Method Based on Bayesian Attack Graph
[J]. Computer Engineering and Applications, 2019, 55(22): 73-79.
|
[8] |
PENG Jianshan1,2, DING Dazhao1,2, WANG Qingxian1,2.
ASLR Bypassing Method Combining Crash-Resistance and Memory Range Statistics
[J]. Computer Engineering and Applications, 2019, 55(2): 72-78.
|
[9] |
ZHANG Wanying, CAO Xiaomei.
Whitebox Fuzzing Test Based on Taint Analysis Scheme
[J]. Computer Engineering and Applications, 2019, 55(18): 236-240.
|
[10] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[11] |
LI Yuancheng1, CUI Yaqi1, LV Junfeng2, LAI Fenggang2, ZHANG Pan2.
Combined Deep Learning Method for Open Source Software Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 52-59.
|
[12] |
ZHU Jie1, LU Yi2, ZHANG Huiming1.
Path replanning for UAV in emergent threats
[J]. Computer Engineering and Applications, 2018, 54(8): 255-259.
|
[13] |
LV Congdong.
Relation between IP-secure and TA-secure in intransitive non-interference
[J]. Computer Engineering and Applications, 2018, 54(8): 78-84.
|
[14] |
LI Zhipeng, LI Weizhong, DU Ruichao.
Target threat assessment using Elman neural network optimized by adaptive krill herd algorithm
[J]. Computer Engineering and Applications, 2018, 54(7): 226-231.
|
[15] |
XU Guoyu, MIAO Xuna, ZHANG Junfeng, JIANG Tao, MA Xiaofei.
Review of implicit authentication for mobile devices
[J]. Computer Engineering and Applications, 2018, 54(6): 19-25.
|