
| index | Title |
| 1 | Discovering optimal features using static analysis and a genetic search based method for Android malware de... Author(s):Ahmad Firdaus, Nor Badrul Anuar, A... Clicked:11443 Download:6147 Cited:0 <Full Text> <PPT> 2595 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.6 P.712-736 DOI:10.1631/FITEE.1601491 |
| 2 | Efficient vulnerability detection based on an optimized rule-checking static analysis technique Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,... Clicked:8832 Download:4386 Cited:0 <Full Text> <PPT> 2611 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.332-345 DOI:10.1631/FITEE.1500379 |
| 3 | A survey of malware behavior description and analysis Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong... Clicked:11188 Download:8276 Cited:0 <Full Text> <PPT> 2236 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.5 P.583-603 DOI:10.1631/FITEE.1601745 |
| 4 | Structural design and analysis of a composite wing with high aspect ratio Author(s):Yu-shan Meng, Li Yan, Wei Huang, T... Clicked:9486 Download:4923 Cited:0 <Full Text> Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.781-793 DOI:10.1631/jzus.A1900271 |
| 5 | Large language model-enhanced probabilistic modeling for effective static analysis alarms Author(s):Xinlong PAN, Jianhua LI, Zhihong Z... Clicked:1655 Download:1855 Cited:0 <Full Text> <PPT> 295 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.10 P.1926-1941 DOI:10.1631/FITEE.2500038 |