[1] |
ZHANG Fuliang, LIANG Yiwen, TAN Chengyu.
Artificial Natural Killer Cell Detection Model for Android Malware
[J]. Computer Engineering and Applications, 2021, 57(6): 74-80.
|
[2] |
WANG Yulian, LU Mingming.
Interpretable Automatic Detection of Android Malware Based on Graph Embedding
[J]. Computer Engineering and Applications, 2021, 57(23): 122-128.
|
[3] |
CHEN Xiaohan, WEI Shuning, QIN Zhengze.
Malware Family Classification Based on Deep Learning Visualization
[J]. Computer Engineering and Applications, 2021, 57(22): 131-138.
|
[4] |
YANG Chunyu, XU Yang, ZHANG Sicong, LI Xiaojian.
Malware Classification Method Based on Fusion of Static Features
[J]. Computer Engineering and Applications, 2021, 57(15): 147-155.
|
[5] |
ZHANG Bohan, LING Jie.
Improved Malware Detection Method Based on DNN
[J]. Computer Engineering and Applications, 2021, 57(10): 81-87.
|
[6] |
REN Yichen, XIAO Da.
Similarity Analysis of Malicious Programs Based on Two Dimensional Characteristics of Programs
[J]. Computer Engineering and Applications, 2021, 57(1): 118-125.
|
[7] |
HUO Lin, LU Yinli.
Improved Particle Swarm Optimization for Android Malware Detection
[J]. Computer Engineering and Applications, 2020, 56(7): 96-101.
|
[8] |
ZHU Shiqi, Nurbol.
Bibliometric Analysis of Current Studies and Developing Trends on Phishing Sites Detection
[J]. Computer Engineering and Applications, 2020, 56(15): 92-100.
|
[9] |
JIN Bingchu, WEN Hui, SHI Zhiqiang, ZHANG Zhiyuan, CHEN Junjie.
Malware Classification Method Based on Path Tree of Behavior
[J]. Computer Engineering and Applications, 2020, 56(11): 98-104.
|
[10] |
WANG Peng, Nurbol, SU Rui.
Bibliometric Analysis of Current Studies and Developing Trends on Malicious Code Research
[J]. Computer Engineering and Applications, 2019, 55(8): 92-101.
|
[11] |
NIU Dandan1, DUAN Zongtao1,2, CHEN Zhe1,2, KANG Jun1,2, ZHU Yishui1,2, TANG Lei1,2, GE Jiandong3, JIANG Hua3.
Visualization Analysis Method of Urban Taxi Passenger Travel Characteristics
[J]. Computer Engineering and Applications, 2019, 55(6): 237-243.
|
[12] |
HUANG Cheng1,2, LIU Jiayong1, LIU Liang1, HE Xiang1, TANG Dianhua2.
Research on extraction model of malicious domain corpus based on context semantics
[J]. Computer Engineering and Applications, 2018, 54(9): 101-108.
|
[13] |
ZHANG Zhen, CAO Tianjie.
Detecting Android malware based on matching sequence of behavioral characteristic value
[J]. Computer Engineering and Applications, 2018, 54(24): 97-102.
|
[14] |
ZHAO Wei1,4, WANG Nan2, SU Xin3,4, ZHANG Boyun1.
Android malware detection approach based on deep belief network
[J]. Computer Engineering and Applications, 2018, 54(18): 125-132.
|
[15] |
WANG Wenchong, LING Jie.
Android malware detection approach based on fuzzy Hash
[J]. Computer Engineering and Applications, 2018, 54(18): 133-138.
|