[1] |
Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian.
A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining
[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638.
|
[2] |
Liu Qixu, Liu Xinyu, Luo Cheng, Wang Junnan, Chen Langping, Liu Jiaxi.
Android Browser Fingerprinting Identification Method Based on Bidirectional Recurrent Neural Network
[J]. Journal of Computer Research and Development, 2020, 57(11): 2294-2311.
|
[3] |
Li Zhen, Tang Zhanyong, Li Zhengqiao, Wang Hai, Gong Xiaoqing, Chen Feng, Chen Xiaojiang, Fang Dingyi.
An Automatic Detection Method for Privacy Leakage Across Application Components
[J]. Journal of Computer Research and Development, 2019, 56(6): 1252-1262.
|
[4] |
Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min.
TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329.
|
[5] |
Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei.
A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy
[J]. Journal of Computer Research and Development, 2018, 55(7): 1371-1392.
|
[6] |
Yue Hongzhou, Zhang Yuqing, Wang Wenjie, Liu Qixu.
Android Static Taint Analysis of Dynamic Loading and Reflection Mechanism
[J]. Journal of Computer Research and Development, 2017, 54(2): 313-327.
|
[7] |
Zhang Mi, Yang Li, Zhang Junwei.
FuzzerAPP:The Robustness Test of Application Component Communication in Android
[J]. Journal of Computer Research and Development, 2017, 54(2): 338-347.
|
[8] |
Lu Yemian, Li Yifu, Ying Lingyun, Gu Yacong, Su Purui, Feng Dengguo.
Security Analysis and Enhancement of Third-Party Android Push Service
[J]. Journal of Computer Research and Development, 2016, 53(11): 2431-2445.
|
[9] |
Lu Yemian, Ying Lingyun, Su Purui, Feng Dengguo, Jing Erxia, Gu Yacong.
Security Analysis and Evaluation for the Usage of Settings Mechanism in Android
[J]. Journal of Computer Research and Development, 2016, 53(10): 2248-2261.
|
[10] |
Zhang Huilin, Ding Yu, Zhang Lihua, Duan Lei, Zhang Chao, Wei Tao, Li Guancheng, Han Xinhui.
SQL Injection Prevention Based on Sensitive Characters
[J]. Journal of Computer Research and Development, 2016, 53(10): 2262-2276.
|
[11] |
Chen Tieming, Yang Yimin, Chen Bo.
Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions
[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306.
|
[12] |
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang.
Survey of Android Vulnerability Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2167-2177.
|
[13] |
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen.
Survey of Android OS Security
[J]. Journal of Computer Research and Development, 2014, 51(7): 1385-1396.
|
[14] |
Jiao Sibei, Ying Lingyun, Yang Yi, Cheng Yao, Su Purui, and Feng Dengguo.
An Anti-Obfuscation Method for Detecting Similarity Among Android Applications in Large Scale
[J]. 计算机研究与发展, 2014, 51(7): 1446-1457.
|
[15] |
Li Ting1, Dong Hang2, Yuan Chunyang1, Du Yuejin1, and Xu Guoai2.
Description of Android Malware Feature Based on Dalvik Instructions
[J]. 计算机研究与发展, 2014, 51(7): 1458-1466.
|