
| index | Title |
| 1 | Discovering optimal features using static analysis and a genetic search based method for Android malware de... Author(s):Ahmad Firdaus, Nor Badrul Anuar, A... Clicked:11399 Download:6101 Cited:0 <Full Text> <PPT> 2574 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.6 P.712-736 DOI:10.1631/FITEE.1601491 |
| 2 | Efficient vulnerability detection based on an optimized rule-checking static analysis technique Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,... Clicked:8809 Download:4341 Cited:0 <Full Text> <PPT> 2597 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.332-345 DOI:10.1631/FITEE.1500379 |
| 3 | A survey of malware behavior description and analysis Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong... Clicked:11159 Download:8231 Cited:0 <Full Text> <PPT> 2222 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.5 P.583-603 DOI:10.1631/FITEE.1601745 |
| 4 | Structural design and analysis of a composite wing with high aspect ratio Author(s):Yu-shan Meng, Li Yan, Wei Huang, T... Clicked:9438 Download:4878 Cited:0 <Full Text> Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.781-793 DOI:10.1631/jzus.A1900271 |
| 5 | Large language model-enhanced probabilistic modeling for effective static analysis alarms Author(s):Xinlong PAN, Jianhua LI, Zhihong Z... Clicked:1589 Download:1795 Cited:0 <Full Text> <PPT> 284 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.10 P.1926-1941 DOI:10.1631/FITEE.2500038 |