[1] |
Yang ZHANG, Jiangbo HAO.
Malicious code detection method based on attention mechanism and residual network
[J]. Journal of Computer Applications, 2022, 42(6): 1708-1715.
|
[2] |
Mo LI, Tianliang LU, Ziheng XIE.
Android malware family classification method based on code image integration
[J]. Journal of Computer Applications, 2022, 42(5): 1490-1499.
|
[3] |
JIANG Kaolin, BAI Wei, ZHANG Lei, CHEN Jun, PAN Zhisong, GUO Shize.
Malicious code detection based on multi-channel image deep learning
[J]. Journal of Computer Applications, 2021, 41(4): 1142-1147.
|
[4] |
JIANG Qianyu, WANG Fengying, JIA Lipeng.
Malware detection method based on perceptual hash algorithm and feature fusion
[J]. Journal of Computer Applications, 2021, 41(3): 780-785.
|
[5] |
OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian.
Intrusion detection method based on variable precision covering rough set
[J]. Journal of Computer Applications, 2020, 40(12): 3465-3470.
|
[6] |
WU Sanzhu, LI Peng, WU Sanbin.
Virus propagation suppression model in mobile wireless sensor networks
[J]. Journal of Computer Applications, 2020, 40(1): 129-135.
|
[7] |
WANG Bo, CAI Honghao, SU Yang.
Classification of malicious code variants based on VGGNet
[J]. Journal of Computer Applications, 2020, 40(1): 162-167.
|
[8] |
LANG Dapeng, DING Wei, JIANG Haocheng, CHEN Zhiyuang.
Malicious code classification algorithm based on multi-feature fusion
[J]. Journal of Computer Applications, 2019, 39(8): 2333-2338.
|
[9] |
YANG Ping, ZHAO Bing, SHU Hui.
Malicious code detection method based on icon similarity analysis
[J]. Journal of Computer Applications, 2019, 39(6): 1728-1734.
|
[10] |
CAO Xiangying, SUN Weimin, ZHU Youxiang, QIAN Xin, LI Xiaoyu, YE Ning.
Plant image recoginiton based on family priority strategy
[J]. Journal of Computer Applications, 2018, 38(11): 3241-3245.
|
[11] |
FENG Liping, HAN Xie, HAN Qi, ZHENG Fang.
Network virus propagation modeling considering social network user behaviors
[J]. Journal of Computer Applications, 2018, 38(10): 2899-2902.
|
[12] |
SU Zhida, ZHU Yuefei, LIU Long.
Android malware application detection using deep learning
[J]. Journal of Computer Applications, 2017, 37(6): 1650-1656.
|
[13] |
BU Junrong, FENG Liping, SHI Qiong, SONG Lipeng.
Analysis of egress detection strategy of Internet service provider based on game theory
[J]. Journal of Computer Applications, 2015, 35(4): 968-971.
|
[14] |
ZHANG Jing, WU Husheng.
Modified binary cuckoo search algorithm for multidimensional knapsack problem
[J]. Journal of Computer Applications, 2015, 35(1): 183-188.
|
[15] |
FENG Liping, SONG Lipeng, WANG Hongbin, ZHAO Qingshan.
Propagation modeling and analysis of peer-to-peer botnet
[J]. Journal of Computer Applications, 2015, 35(1): 68-71.
|