[1] |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Analysis of consistency between sensitive behavior and privacy policy of Android applications
[J]. Journal of Computer Applications, 2024, 44(3): 788-796.
|
[2] |
Qun MAO, Weiwei WANG, Feng YOU, Ruilian ZHAO, Zheng LI.
Pattern mining and reuse method for user behaviors of Android applications
[J]. Journal of Computer Applications, 2022, 42(7): 2155-2161.
|
[3] |
Mo LI, Tianliang LU, Ziheng XIE.
Android malware family classification method based on code image integration
[J]. Journal of Computer Applications, 2022, 42(5): 1490-1499.
|
[4] |
REN Haipei, LI Teng.
FaceYoLo algorithm for face detection on mobile platform
[J]. Journal of Computer Applications, 2020, 40(4): 1002-1008.
|
[5] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[6] |
BU Tongtong, CAO Tianjie.
Risk assessment method of Android application based on permission
[J]. Journal of Computer Applications, 2019, 39(1): 131-135.
|
[7] |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu.
Dynamic measurement of Android kernel based on ARM virtualization extension
[J]. Journal of Computer Applications, 2018, 38(9): 2644-2649.
|
[8] |
LUO Wenshuang, CAO Tianjie.
Malware detection approach based on non-user operating sequence
[J]. Journal of Computer Applications, 2018, 38(1): 56-60.
|
[9] |
LIU Qiyuan, JIAO Jian, CAO Hongsheng.
Ontology model for detecting Android implicit information flow
[J]. Journal of Computer Applications, 2018, 38(1): 61-66.
|
[10] |
SU Zhida, ZHU Yuefei, LIU Long.
Android malware application detection using deep learning
[J]. Journal of Computer Applications, 2017, 37(6): 1650-1656.
|
[11] |
LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli.
Benchmarks construction and evaluation for resource leak in Android apps
[J]. Journal of Computer Applications, 2017, 37(4): 1129-1134.
|
[12] |
JIANG Zhongqing, ZHOU Anmin, JIA Peng.
DEX unpacking technology in ART virtual machine
[J]. Journal of Computer Applications, 2017, 37(11): 3294-3298.
|
[13] |
SUN Runkang, PENG Guojun, LI Jingwen, SHEN Shiqi.
Behavior oriented method of Android malware detection and its effectiveness
[J]. Journal of Computer Applications, 2016, 36(4): 973-978.
|
[14] |
ZHANG Shengqiao, YIN Qing, CHANG Rui, ZHU Xiaodong.
APK-based automatic method for GUI traversal of Android applications
[J]. Journal of Computer Applications, 2016, 36(11): 3178-3182.
|
[15] |
WANG Haipeng, WANG Zhengliang, XU Weiwei, FAN Ran.
Real-time face pose estimation system based on 3D face model on Android mobile platform
[J]. Journal of Computer Applications, 2015, 35(8): 2321-2326.
|