[1] |
XIONG Jian, QIN Renchao, HE Mengyi, LIU Jianlan, TANG Fengyang.
Application of Improved Random Forest Algorithm in Android Malware Detection
[J]. Computer Engineering and Applications, 2021, 57(3): 130-136.
|
[2] |
CHEN Yaoyang, CHEN Wei.
Control Flow Obfuscation Technology Based on Implicit Jump
[J]. Computer Engineering and Applications, 2021, 57(20): 125-132.
|
[3] |
YANG Chunyu, XU Yang, ZHANG Sicong, LI Xiaojian.
Malware Classification Method Based on Fusion of Static Features
[J]. Computer Engineering and Applications, 2021, 57(15): 147-155.
|
[4] |
ZHOU Yu, ZHU Wenhao, FANG Qian, BAI Lei.
Survey of Outlier Detection Methods Based on Clustering
[J]. Computer Engineering and Applications, 2021, 57(12): 37-45.
|
[5] |
QIU Baoxin, ZHOU Wei, CHEN Tinghai.
Software Fault Localization Based on Conditioned Classification Execution Slicing Spectrum
[J]. Computer Engineering and Applications, 2019, 55(19): 253-262.
|
[6] |
ZHANG Minhua, DU Youtian, WANG Qian.
Combination of Static and Dynamic Modeling for Network Event Aggregation
[J]. Computer Engineering and Applications, 2019, 55(18): 15-20.
|
[7] |
LONG Tingyan, WAN Liang, DENG Xunkun.
Detection Approach of Malicious JavaScript Code Based on Convolutional Neural Network
[J]. Computer Engineering and Applications, 2019, 55(18): 89-94.
|
[8] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[9] |
WEI Jiamin1, FENG Jun1, BU Qirong1, GAO Yuan2, ZHAO Yan1.
Off-line Chinese handwriting signature verification with hierarchical classification
[J]. Computer Engineering and Applications, 2018, 54(8): 112-118.
|
[10] |
ZHANG Yuqing, WANG Weiping, WANG Wei.
Identification of changed browser fingerprint
[J]. Computer Engineering and Applications, 2018, 54(7): 102-106.
|
[11] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[12] |
LIU Pengrui, SONG Lipeng.
Using dimension reduction approach to identify malicious JavaScript
[J]. Computer Engineering and Applications, 2018, 54(21): 20-24.
|
[13] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|
[14] |
FENG Jiawen, ZHANG Limin, DENG Xiangyang.
Application of double channel convolution neural network in static gesture recognition
[J]. Computer Engineering and Applications, 2018, 54(14): 148-152.
|
[15] |
YANG Xiaochuan, JIANG Jun, MA Xiaodong, QI Fengbin.
Program slicing technology based on critical variable dataflow analysis algorithm in GCC compiler
[J]. Computer Engineering and Applications, 2017, 53(24): 40-47.
|