
| index | Title |
| 1 | Discovering optimal features using static analysis and a genetic search based method for Android malware de... Author(s):Ahmad Firdaus, Nor Badrul Anuar, A... Clicked:11396 Download:6095 Cited:0 <Full Text> <PPT> 2572 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.6 P.712-736 DOI:10.1631/FITEE.1601491 |
| 2 | Efficient vulnerability detection based on an optimized rule-checking static analysis technique Author(s):Deng Chen, Yan-duo Zhang, Wei Wei,... Clicked:8808 Download:4336 Cited:0 <Full Text> <PPT> 2597 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.332-345 DOI:10.1631/FITEE.1500379 |
| 3 | A survey of malware behavior description and analysis Author(s):Bo Yu, Ying Fang, Qiang Yang, Yong... Clicked:11158 Download:8223 Cited:0 <Full Text> <PPT> 2219 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.5 P.583-603 DOI:10.1631/FITEE.1601745 |
| 4 | Structural design and analysis of a composite wing with high aspect ratio Author(s):Yu-shan Meng, Li Yan, Wei Huang, T... Clicked:9433 Download:4874 Cited:0 <Full Text> Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.781-793 DOI:10.1631/jzus.A1900271 |
| 5 | Large language model-enhanced probabilistic modeling for effective static analysis alarms Author(s):Xinlong PAN, Jianhua LI, Zhihong Z... Clicked:1587 Download:1791 Cited:0 <Full Text> <PPT> 284 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.10 P.1926-1941 DOI:10.1631/FITEE.2500038 |