[1] |
Baoshan YANG, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU.
Analysis of consistency between sensitive behavior and privacy policy of Android applications
[J]. Journal of Computer Applications, 2024, 44(3): 788-796.
|
[2] |
Qun MAO, Weiwei WANG, Feng YOU, Ruilian ZHAO, Zheng LI.
Pattern mining and reuse method for user behaviors of Android applications
[J]. Journal of Computer Applications, 2022, 42(7): 2155-2161.
|
[3] |
Mo LI, Tianliang LU, Ziheng XIE.
Android malware family classification method based on code image integration
[J]. Journal of Computer Applications, 2022, 42(5): 1490-1499.
|
[4] |
REN Haipei, LI Teng.
FaceYoLo algorithm for face detection on mobile platform
[J]. Journal of Computer Applications, 2020, 40(4): 1002-1008.
|
[5] |
SHEN Liang, WANG Xin, CHEN Shuhui.
Structural signature extraction method for mobile application recognition
[J]. Journal of Computer Applications, 2020, 40(4): 1109-1114.
|
[6] |
WEI Shanshan, HU Shengbo, YAN Tingting, MO Jinrong.
Radio wave propagation characteristics and analysis software in troposphere based on split step wavelet method
[J]. Journal of Computer Applications, 2019, 39(6): 1792-1798.
|
[7] |
CAO Zhenhuan, CAI Xiaohai, GU Menghe, GU Xiaozhuo, LI Xiaowei.
Android permission management and control scheme based on access control list mechanism
[J]. Journal of Computer Applications, 2019, 39(11): 3316-3322.
|
[8] |
BU Tongtong, CAO Tianjie.
Risk assessment method of Android application based on permission
[J]. Journal of Computer Applications, 2019, 39(1): 131-135.
|
[9] |
CHENG Jing, GE Luqi, ZHANG Tao, LIU Ying, ZHANG Yifei.
Research on factors affecting quality of mobile application crowdsourced testing
[J]. Journal of Computer Applications, 2018, 38(9): 2626-2630.
|
[10] |
LU Zicong, XU Kaiyong, GUO Song, XIAO Jingxu.
Dynamic measurement of Android kernel based on ARM virtualization extension
[J]. Journal of Computer Applications, 2018, 38(9): 2644-2649.
|
[11] |
LUO Wenshuang, CAO Tianjie.
Malware detection approach based on non-user operating sequence
[J]. Journal of Computer Applications, 2018, 38(1): 56-60.
|
[12] |
LIU Qiyuan, JIAO Jian, CAO Hongsheng.
Ontology model for detecting Android implicit information flow
[J]. Journal of Computer Applications, 2018, 38(1): 61-66.
|
[13] |
SU Zhida, ZHU Yuefei, LIU Long.
Android malware application detection using deep learning
[J]. Journal of Computer Applications, 2017, 37(6): 1650-1656.
|
[14] |
LIU Jierui, WU Xueqing, YAN Jun, YANG Hongli.
Benchmarks construction and evaluation for resource leak in Android apps
[J]. Journal of Computer Applications, 2017, 37(4): 1129-1134.
|
[15] |
LIU Ying, ZHANG Tao, LI Kun, LI Nan.
Evaluation model of mobile application crowdsourcing testers
[J]. Journal of Computer Applications, 2017, 37(12): 3569-3573.
|