[1] |
REN Haipei, LI Teng.
FaceYoLo algorithm for face detection on mobile platform
[J]. Journal of Computer Applications, 2020, 40(4): 1002-1008.
|
[2] |
SHEN Liang, WANG Xin, CHEN Shuhui.
Structural signature extraction method for mobile application recognition
[J]. Journal of Computer Applications, 2020, 40(4): 1109-1114.
|
[3] |
WEI Shanshan, HU Shengbo, YAN Tingting, MO Jinrong.
Radio wave propagation characteristics and analysis software in troposphere based on split step wavelet method
[J]. Journal of Computer Applications, 2019, 39(6): 1792-1798.
|
[4] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[5] |
BU Tongtong, CAO Tianjie.
Risk assessment method of Android application based on permission
[J]. Journal of Computer Applications, 2019, 39(1): 131-135.
|
[6] |
CHENG Jing, GE Luqi, ZHANG Tao, LIU Ying, ZHANG Yifei.
Research on factors affecting quality of mobile application crowdsourced testing
[J]. Journal of Computer Applications, 2018, 38(9): 2626-2630.
|
[7] |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu.
Dynamic measurement of Android kernel based on ARM virtualization extension
[J]. Journal of Computer Applications, 2018, 38(9): 2644-2649.
|
[8] |
LUO Wenshuang, CAO Tianjie.
Malware detection approach based on non-user operating sequence
[J]. Journal of Computer Applications, 2018, 38(1): 56-60.
|
[9] |
LIU Qiyuan, JIAO Jian, CAO Hongsheng.
Ontology model for detecting Android implicit information flow
[J]. Journal of Computer Applications, 2018, 38(1): 61-66.
|
[10] |
SU Zhida, ZHU Yuefei, LIU Long.
Android malware application detection using deep learning
[J]. Journal of Computer Applications, 2017, 37(6): 1650-1656.
|
[11] |
LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli.
Benchmarks construction and evaluation for resource leak in Android apps
[J]. Journal of Computer Applications, 2017, 37(4): 1129-1134.
|
[12] |
LIU Ying, ZHANG Tao, LI Kun, LI Nan.
Evaluation model of mobile application crowdsourcing testers
[J]. Journal of Computer Applications, 2017, 37(12): 3569-3573.
|
[13] |
JIANG Zhongqing, ZHOU Anmin, JIA Peng.
DEX unpacking technology in ART virtual machine
[J]. Journal of Computer Applications, 2017, 37(11): 3294-3298.
|
[14] |
SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi.
Behavior oriented method of Android malware detection and its effectiveness
[J]. Journal of Computer Applications, 2016, 36(4): 973-978.
|
[15] |
SUN Liangjun, FAN Jianfeng, YANG Wanqi, SHI Yinhuan.
Application of factorization machine in mobile App recommendation based on deep packet inspection
[J]. Journal of Computer Applications, 2016, 36(2): 307-310.
|