[1] |
Jinhui CAI, Zhongxu YIN, Guoxiao ZONG, Junru LI.
Integrated method of inference and taint analysis for nested branch breakthrough
[J]. Journal of Computer Applications, 2024, 44(12): 3823-3830.
|
[2] |
Jihui LIU, Chengwan HE.
Online detection of SQL injection attacks based on ECA rules and dynamic taint analysis
[J]. Journal of Computer Applications, 2023, 43(5): 1534-1542.
|
[3] |
Shaochen HAO, Zizuan WEI, Yao MA, Dan YU, Yongle CHEN.
Network intrusion detection model based on efficient federated learning algorithm
[J]. Journal of Computer Applications, 2023, 43(4): 1169-1175.
|
[4] |
Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU.
Service function chain deployment optimization method based on node comprehensive importance ranking
[J]. Journal of Computer Applications, 2023, 43(3): 860-868.
|
[5] |
Hongliang TIAN, Ping GE, Mingjie XIAN.
Distribution network operation exception management mechanism based on blockchain
[J]. Journal of Computer Applications, 2023, 43(11): 3504-3509.
|
[6] |
Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG.
Reversible data hiding algorithm in encrypted domain based on secret image sharing
[J]. Journal of Computer Applications, 2022, 42(5): 1480-1489.
|
[7] |
MA Hua, CHEN Yuepeng, TANG Wensheng, LOU Xiaoping, HUANG Zhuoxuan.
Survey of research progress on crowdsourcing task assignment for evaluation of workers’ ability
[J]. Journal of Computer Applications, 2021, 41(8): 2232-2241.
|
[8] |
Gang CHEN, Xiangru MENG, Qiaoyan KANG, Yong YANG.
Virtual software defined network mapping algorithm based on topology segmentation and clustering analysis
[J]. Journal of Computer Applications, 2021, 41(11): 3309-3318.
|
[9] |
ZHAO Jihong, WU Doudou, QU Hua, YIN Zhenyu.
Survivable virtual network embedding guarantee mechanism based on software defined network
[J]. Journal of Computer Applications, 2020, 40(3): 770-776.
|
[10] |
XU Yingxin, SUN Lei, ZHAO Jiancheng, GUO Songhui.
Virtual field programmable gate array placement strategy based on ant colony optimization algorithm
[J]. Journal of Computer Applications, 2020, 40(3): 747-752.
|
[11] |
REN Yuzhu, ZHANG Youwei, AI Chengwei.
Survey on taint analysis technology
[J]. Journal of Computer Applications, 2019, 39(8): 2302-2309.
|
[12] |
XIAO Kai, WANG Meng, TANG Xinyu, JIANG Tonghai.
Public welfare time bank system based on blockchain technology
[J]. Journal of Computer Applications, 2019, 39(7): 2156-2161.
|
[13] |
LUO Xiaofeng, YANG Xingchun, HU Yong.
Improved decision diagram for attribute-based access control policy evaluation and management
[J]. Journal of Computer Applications, 2019, 39(12): 3569-3574.
|
[14] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[15] |
QIN Biao, GUO Fan, TU Fengtao.
Correctness verification of static taint analysis results for Android application
[J]. Journal of Computer Applications, 2019, 39(10): 3018-3027.
|