Algorithm to detect Android malicious behaviors
WANG Zhiqiang;ZHANG Yuqing;LIU Qixu;HUANG Tingpei;State Key Lab.of Integrated Service Networks;Xidian Univ.;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;
..............page:8-14
..............page:15-21+89
..............page:22-25+32
..............page:38-42+96
..............page:48-53+128
..............page:66+72+82+134+147+197
..............page:97-102
..............page:103-108
..............page:109-114
..............page:115-121
..............page:122-128
..............page:129-134
..............page:135-140+191
..............page:141-147
..............page:148-153+204
..............page:154-160
..............page:161-167+172
..............page:168-172
..............page:173-178+185
..............page:179-185
Facial expression recognition based on the binary code of edges
FENG Xiaoyi;LAI Yangming;WANG Wenxing;CUI Shaoxing;PENG Jinye;JIANG Xiaoyu;School of Electronics and Information;Northwestern Polytechnical Univ.;AVIC Aeronautical Science and Technology Key Lab.of Flight Simulation;CFTE;School of Information Science and Technology;Northwest Univ.;
..............page:186-191
..............page:192-197
..............page:198-204