[1] |
XIONG Jian, QIN Renchao, HE Mengyi, LIU Jianlan, TANG Fengyang.
Application of Improved Random Forest Algorithm in Android Malware Detection
[J]. Computer Engineering and Applications, 2021, 57(3): 130-136.
|
[2] |
WANG Yulian, LU Mingming.
Interpretable Automatic Detection of Android Malware Based on Graph Embedding
[J]. Computer Engineering and Applications, 2021, 57(23): 122-128.
|
[3] |
SU Qing, LIN Huazhi, HUANG Jianfeng, LIN Zhiyi.
Malicious Android Application Detection Combining CNN and Catboost Algorithm
[J]. Computer Engineering and Applications, 2021, 57(15): 140-146.
|
[4] |
GUO Zhihan, LUO Senlin, KE Dongxiang, QIN Xiaonan.
Hierarchical Acquisition Method of Android System Service Information
[J]. Computer Engineering and Applications, 2021, 57(12): 99-104.
|
[5] |
XIA Jipin, ZOU Bin, YANG Zhonglin, LI Shenxin.
Health Route Planning Service for Avoiding Outdoor Air Pollution Exposure
[J]. Computer Engineering and Applications, 2020, 56(3): 266-271.
|
[6] |
ZHAO Yuxin, Nurbol, AI Zhuang.
Android Malware Detection Based on Ensemble Learning Voting Algorithm
[J]. Computer Engineering and Applications, 2020, 56(22): 74-82.
|
[7] |
WANG Jiahe, WEI Songjie, WU Chao.
Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection
[J]. Computer Engineering and Applications, 2020, 56(2): 68-75.
|
[8] |
HOU Min, LIU Qian, YANG Huayong, ZHANG Guo’an.
Data Push System of Marine Observation Based on MQTT Protocol
[J]. Computer Engineering and Applications, 2019, 55(20): 227-231.
|
[9] |
SUN Xiaoyong1,2, WANG Wei1, HUO Wei1,2, ZHOU Jianhua1.
Dynamic event sequence guidance for Android application vulnerability verification technology
[J]. Computer Engineering and Applications, 2018, 54(6): 86-94.
|
[10] |
LI Chuan1, LIU Baoxu2.
ParaIntentFuzz:Android applications parallel fuzzing system
[J]. Computer Engineering and Applications, 2018, 54(4): 110-116.
|
[11] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[12] |
ZHANG Zhen, CAO Tianjie.
Detecting Android malware based on matching sequence of behavioral characteristic value
[J]. Computer Engineering and Applications, 2018, 54(24): 97-102.
|
[13] |
FU Bo, YANG Zhang, ZHAO Xilin, SHAN Zhilei.
Plant leaves recognition method based on dimension reduction local binary pattern and shape features of leaves
[J]. Computer Engineering and Applications, 2018, 54(2): 173-176.
|
[14] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|
[15] |
WANG Wenchong, LING Jie.
Android malware detection approach based on fuzzy Hash
[J]. Computer Engineering and Applications, 2018, 54(18): 133-138.
|