[1] |
CHEN Yaoyang, CHEN Wei.
Control Flow Obfuscation Technology Based on Implicit Jump
[J]. Computer Engineering and Applications, 2021, 57(20): 125-132.
|
[2] |
LIANG Tian, CAO Dexin.
Improved and Simplified Particle Swarm Optimization Algorithm Based on Levy Flight
[J]. Computer Engineering and Applications, 2021, 57(20): 188-196.
|
[3] |
WANG Jian, MAO Liming, YIN Aijun.
Multi-dimensional DTW Combined with Shape Feature and Context Information
[J]. Computer Engineering and Applications, 2020, 56(22): 42-47.
|
[4] |
WANG Gongshu, REN Zunxiao, LI Dandan, XIANG Jie, WANG Bin.
Analysis and Application Research of Brain Activation Task Differentiation
[J]. Computer Engineering and Applications, 2020, 56(21): 272-278.
|
[5] |
LIN Hongyang, PENG Jianshan, ZHAO Shibin, ZHU Junhu, XU Hang.
Survey on JavaScript Engine Vulnerability Detection
[J]. Computer Engineering and Applications, 2019, 55(11): 16-24.
|
[6] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[7] |
WANG Haiyan1,2, YUAN Xueqin1, SONG Chao1, ZHANG Zhengyong1,2, LIU Jun1,2, SHA Min1,2.
Identification of apple essences based on similarity analysis and artificial neural network
[J]. Computer Engineering and Applications, 2018, 54(4): 141-147.
|
[8] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|
[9] |
CHEN Qi1, JIANG Guoping2, XIA Lingling3.
Homology analysis of malware based on function structure
[J]. Computer Engineering and Applications, 2017, 53(14): 93-98.
|
[10] |
DONG Yukun.
Illegal computing defect detection by static analysis for C program
[J]. Computer Engineering and Applications, 2016, 52(19): 31-36.
|
[11] |
QIAN Yucun, PENG Guojun, WANG Ying, LIANG Yu.
Homology analysis of malicious code and family clustering
[J]. Computer Engineering and Applications, 2015, 51(18): 76-81.
|
[12] |
YOU Feng, BIAN Yi, ZHAO Ruilian.
Automatic string test data generation for EFSM model
[J]. Computer Engineering and Applications, 2014, 50(16): 57-61.
|
[13] |
WU Xiaojing.
Data mining based on intelligent knowledge map for financial crisis early warning
[J]. Computer Engineering and Applications, 2013, 49(24): 116-121.
|
[14] |
JIN Jing1,2, LI Meng1,2, HUA Zhebang1,2, SONG Huaida1,2, ZHAO Junfeng1,2, XIE Bing1,2.
Code function recognition approach based on LDA and static analysis
[J]. Computer Engineering and Applications, 2013, 49(15): 27-31.
|
[15] |
SI Haiping1, QIAO Hongbo1, HU Xiaohong1, CHEN Baogang1, CAO Yongsheng2.
Study on program comprehension method based on use case diagram
[J]. Computer Engineering and Applications, 2013, 49(14): 51-55.
|