[1] |
CHEN Yaoyang, CHEN Wei.
Control Flow Obfuscation Technology Based on Implicit Jump
[J]. Computer Engineering and Applications, 2021, 57(20): 125-132.
|
[2] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[3] |
SHAO Yuan, XIA Shixiong, YAO Rui, NIU Qiang.
Multiresolution minimal barrier and gradient fusion saliency detection algorithm
[J]. Computer Engineering and Applications, 2018, 54(4): 17-24.
|
[4] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[5] |
DANG Xiaochao1,2, MA Rucang1, HAO Zhanjun1,2.
Wireless sensor networks based-on Voronoi barrier coverage strategy
[J]. Computer Engineering and Applications, 2018, 54(2): 91-96.
|
[6] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|
[7] |
LIU Shiyong, CHEN Luo, XIONG Wei, WU Ye, LI Jun.
Parallel raster image tile algorithm based on MPI
[J]. Computer Engineering and Applications, 2018, 54(1): 48-53.
|
[8] |
CHEN Qi1, JIANG Guoping2, XIA Lingling3.
Homology analysis of malware based on function structure
[J]. Computer Engineering and Applications, 2017, 53(14): 93-98.
|
[9] |
XIAO Yujie, JIANG Ailian, FENG Xiufang.
Strong barrier coverage construction algorithm based on overlap-sense ratio
[J]. Computer Engineering and Applications, 2017, 53(11): 114-119.
|
[10] |
LI Nan, PANG Jianmin, SHAN Zheng.
Binary translation of CUDA program for heterogeneous and many-core architecture
[J]. Computer Engineering and Applications, 2016, 52(7): 17-23.
|
[11] |
SUN He1, WU Lifa1, HONG Zheng1, XU Mingfei2, ZHOU Shengli1,3.
Research on function call graph based method for similarity analysis of binary files
[J]. Computer Engineering and Applications, 2016, 52(21): 126-133.
|
[12] |
DONG Yukun.
Illegal computing defect detection by static analysis for C program
[J]. Computer Engineering and Applications, 2016, 52(19): 31-36.
|
[13] |
QIAN Yucun, PENG Guojun, WANG Ying, LIANG Yu.
Homology analysis of malicious code and family clustering
[J]. Computer Engineering and Applications, 2015, 51(18): 76-81.
|
[14] |
YU Jing, CAO Han, JIN Pengfei.
Matrix iteration based parallel algorithm of k-order Voronoi diagram
[J]. Computer Engineering and Applications, 2014, 50(6): 102-105.
|
[15] |
YOU Feng, BIAN Yi, ZHAO Ruilian.
Automatic string test data generation for EFSM model
[J]. Computer Engineering and Applications, 2014, 50(16): 57-61.
|