Deep search:Searching for "static analysis" in 'ABSTRACT and KEYWORDGot 12 items.
index Title
1Hierarchical closed form solutions for plates bent by localized transverse loadings
Author(s):CARRERA E., GIUNTA G., BRISCHETTO S.  Clicked:6027  Download:3354  Cited:16  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.7 P.1026-1037  DOI:10.1631/jzus.2007.A1026
2Optimum design of large span concrete filled steel tubular arch bridge based on static, stability and modal...
Author(s):ZHAO Chang-jun, HU Jun, XU Xing  Clicked:6792  Download:3216  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.2 P.166-173  DOI:10.1631/jzus.2002.0166
3A power-aware code-compression design for RISC/VLIW architecture
Author(s):Che-Wei Lin, Chang Hong Lin, Wei J...  Clicked:7899  Download:3237  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.8 P.629-637  DOI:10.1631/jzus.C1000321
4Comparison of various procedures for progressive collapse analysis of cable-stayed bridges
Author(s):Jian-guo Cai, Yi-xiang Xu, Li-ping...  Clicked:8170  Download:9872  Cited:12  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.5 P.323-334  DOI:10.1631/jzus.A1100296
5Discovering optimal features using static analysis and a genetic search based method for Android malware de...
Author(s):Ahmad Firdaus, Nor Badrul Anuar, A...  Clicked:8747  Download:4497  Cited:0  <Full Text>  <PPT> 2023
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.6 P.712-736  DOI:10.1631/FITEE.1601491
6A method for the global optimization of the tooth contact pattern and transmission error of spiral bevel an...
Author(s):Yao-bin Zhuo, Xue-yan Xiang, Xiao-...  Clicked:5900  Download:5717  Cited:0  <Full Text>  <PPT> 2202
Journal of Zhejiang University Science A  2017 Vol.18 No.5 P.377-392  DOI:10.1631/jzus.A1600240
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,...  Clicked:7175  Download:2890  Cited:0  <Full Text>  <PPT> 2067
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8A survey of malware behavior description and analysis
Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong...  Clicked:9284  Download:5513  Cited:0  <Full Text>  <PPT> 1797
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.583-603  DOI:10.1631/FITEE.1601745
9Static analysis of a stepped main shaft in a mine hoist by means of the modified 1D higher-order theory
Author(s):Wen-xiang Teng, Zhen-cai Zhu  Clicked:3838  Download:2440  Cited:0  <Full Text>  <PPT> 2023
Journal of Zhejiang University Science A  2018 Vol.19 No.9 P.719-734  DOI:10.1631/jzus.A1700509
10Structural design and analysis of a composite wing with high aspect ratio
Author(s):Yu-shan Meng, Li Yan, Wei Huang, T...  Clicked:6847  Download:3121  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2019 Vol.20 No.10 P.781-793  DOI:10.1631/jzus.A1900271
11Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:7831  Download:8142  Cited:0  <Full Text>  <PPT> 682
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
12LLM-enhanced probabilistic modeling for effective static analysis alarms
Author(s):Xinlong PAN1,2Clicked:150  Download:85  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2500038
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE