期刊
  出版年
  关键词
结果中检索 Open Search
Please wait a minute...
选择: 显示/隐藏图片
1. An Efficient Scheme of Detecting Repackaged Android Applications
QIN Zhongyuan, PAN Wanpeng, XU Ying, FENG Kerong, and YANG Zhongyun
ZTE Communications    2016, 14 (3): 60-66.   DOI: DOI:10.3969/j.issn.1673-5188.2016.03.008
摘要96)      PDF (1465KB)(92)    收藏
The increasing popularity of Android devices gives birth to a large amount of feature-rich applications (or apps) in various Android markets. Since adversaries can easily repackage malicious code into benign apps and spread them, it is urgent to detect the repackaged apps to maintain healthy Android markets. In this paper we propose an efficient detection scheme based on twice context triggered piecewise hash (T-CTPH), in which CTPH process is called twice so as to generate two fingerprints for each app to detect the repackaged Android applications. We also optimize the similarity calculation algorithm to improve the matching efficiency. Experimental results show that there are about 5% repackaged apps in pre-collected 6438 samples of 4 different types. The proposed scheme improves the detection accuracy of the repackaged apps and has positive and practical significance for the ecological system of the Android markets.
相关文章 | 多维度评价
2. Key Technology and Experimental Research in Wireless Mesh Networks
Liu Zhimin , Yang Yi, Xu Yingqing
ZTE Communications    2008, 6 (2): 39-44.  
摘要125)      PDF (2224KB)(212)    收藏
With the increasing popularity and rising demand for high - rate wireless Internet access , traditional wireless access networks such as cellular network and Wireless Local Area Network (WLAN) are facing some challenges . The Wireless Mesh Network (WMN) is emerging as a flexible and low- cost alternative to provide multi- hop communications , supporting applications such as last- mile Internet delivery. The WMN has also become a promising technology in the merging of wireless networks . Some key technologies for the WMN networking , including network configuration , power control, mobility management, access control, and routing protocols , are analyzed ; the routing protocol design in WMN and mobile Ad hoc network are compared . An example of WMN testbed based on WLAN and second - layer switching technology is given .
相关文章 | 多维度评价