[1] |
XIONG Jian, QIN Renchao, HE Mengyi, LIU Jianlan, TANG Fengyang.
Application of Improved Random Forest Algorithm in Android Malware Detection
[J]. Computer Engineering and Applications, 2021, 57(3): 130-136.
|
[2] |
WANG Yulian, LU Mingming.
Interpretable Automatic Detection of Android Malware Based on Graph Embedding
[J]. Computer Engineering and Applications, 2021, 57(23): 122-128.
|
[3] |
SU Qing, LIN Huazhi, HUANG Jianfeng, LIN Zhiyi.
Malicious Android Application Detection Combining CNN and Catboost Algorithm
[J]. Computer Engineering and Applications, 2021, 57(15): 140-146.
|
[4] |
GUO Zhihan, LUO Senlin, KE Dongxiang, QIN Xiaonan.
Hierarchical Acquisition Method of Android System Service Information
[J]. Computer Engineering and Applications, 2021, 57(12): 99-104.
|
[5] |
ZHAO Yuxin, Nurbol, AI Zhuang.
Android Malware Detection Based on Ensemble Learning Voting Algorithm
[J]. Computer Engineering and Applications, 2020, 56(22): 74-82.
|
[6] |
DENG Yinong, LUO Jianxin, ZHANG Qi, LIU Zhen, HU Qi, JIN Fenglin, BI Pengcheng.
Improving YOLOv3 Network to Assess Air Quality in Image
[J]. Computer Engineering and Applications, 2020, 56(20): 232-242.
|
[7] |
WANG Jiahe, WEI Songjie, WU Chao.
Android Apps Traffic Behavior Obfuscation Method Based on Differential Privacy Protection
[J]. Computer Engineering and Applications, 2020, 56(2): 68-75.
|
[8] |
HOU Min, LIU Qian, YANG Huayong, ZHANG Guo’an.
Data Push System of Marine Observation Based on MQTT Protocol
[J]. Computer Engineering and Applications, 2019, 55(20): 227-231.
|
[9] |
REN Cairong1, XIE Gang1,2.
Prediction of PM2.5 Concentration Level Based on Random Forest and Meteorological Parameters
[J]. Computer Engineering and Applications, 2019, 55(2): 213-220.
|
[10] |
SUN Xiaoyong1,2, WANG Wei1, HUO Wei1,2, ZHOU Jianhua1.
Dynamic event sequence guidance for Android application vulnerability verification technology
[J]. Computer Engineering and Applications, 2018, 54(6): 86-94.
|
[11] |
LI Chuan1, LIU Baoxu2.
ParaIntentFuzz:Android applications parallel fuzzing system
[J]. Computer Engineering and Applications, 2018, 54(4): 110-116.
|
[12] |
CHEN Lu, MA Yuanyuan, SHI Congcong, LI Nige, LI Weiwei.
Research on Android application security flaws static analysis technology
[J]. Computer Engineering and Applications, 2018, 54(4): 117-121.
|
[13] |
ZHANG Zhen, CAO Tianjie.
Detecting Android malware based on matching sequence of behavioral characteristic value
[J]. Computer Engineering and Applications, 2018, 54(24): 97-102.
|
[14] |
LU Yueming1, WANG Liang1, QIU Agen1, ZHANG Yongchuan1,2, ZHAO Yangyang1.
Kriging interpolation method based on semi-supervised learning
[J]. Computer Engineering and Applications, 2018, 54(22): 265-270.
|
[15] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|