吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (6): 1894-1902.doi: 10.13229/j.cnki.jdxbgxb201706030
• Orginal Article • Previous Articles Next Articles
LUO Yang-xia1, 2, GUO Ye1
CLC Number:
[1] 伍之昂,庄毅,王有权,等. 基于特征选择的推荐系统托攻击检测算法[J]. 电子学报,2012,40(8):1687-1694. Wu Zhi-ang, Zhuang Yi,Wang You-quan,et al. Shilling attack detection based on feature selection for recommendation systems[J]. Acta Electronica Sinica,2012,40(8):1687-1694. [2] 惠战伟,黄松嵇,孟雨. 基于程序特征谱整数溢出错误定位技术研究[J]. 计算机学报,2012,35(10):2206-2217. Hui Zhan-wei, Huang Song-ji, Meng Yu. Research on spectra-based integer bug localization[J] Chinese Journal of Computers,2012,35(10):2206-2217. [3] Park H, Choi S, Lim H, et al. Detecting java theft based on static API trace birthmark[C]//3rd International Workshop on Advances in Information and Computer Security, Kagawa, Japan,2008:121-135. [4] Xie X, Liu F, Lu B, et al. A software birthmark based on weighted n -gram[C]//Proceedings of the Intelligent Computing and Intelligent Systems (ICIS), Zhengzhou,China,2010:400-405. [5] Chan P P F, Hui L C K, Yiu S M. Dynamic software birthmark for Java based on heap memory analysis[C]//IFIP International Conference on Communications and Multimedia Security, Ghent, Belgium,2011:94-107. [6] Myles G, Collberg C. Detecting software theft via whole program path birthmarks[C]//International Conference on Information Security, Palo Alto, USA,2004:27-29. [7] 赵玉洁,房鼎益,顾元祥,等. 代码混淆算法有效性评估[J].软件学报,2012,23(3):700-711. Zhao Yu-jie, Fang Ding-yi, Gu Yuan-xiang,et al. Evaluation of code obfuscating transformation[J]. Chinese Journal of Software,2012,23(3):700-711. [8] Sartipi K, Safyallah H. Dynamic knowledge extraction from software systems using sequential pattern mining[J]. International Journal of Software Engineering and Knowledge Engineering,2010,20(6):100-108. [9] Nagra J, Thomborsonm C. Threading software watermarks[C]//International Workshop on Information Hiding, Toronto,Canada,2004:208-223. [10] 罗养霞. 基于多属性特征胎记的软件盗版检测[J]. 吉林大学学报:工学版,2013,43(5):1359-1366. Luo Yang-xia. Software piracy detection based on birthmarks of multi-attribute features[J]. Journal of Jilin University(Engineering and Technology Edition),2013,43(5):1359-1366. |
[1] | MA Jian, FAN Jian-ping, LIU Feng, LI Hong-hui. The evolution model of objective-oriented software system [J]. 吉林大学学报(工学版), 2018, 48(2): 545-550. |
[2] | YING Huan, WANG Dong-hui, WU Cheng-gang, WANG Zhe, TANG Bo-wen, LI Jian-jun. Efficient deterministic replay technique on commodity system environment [J]. 吉林大学学报(工学版), 2017, 47(1): 208-217. |
[3] | LI Yong, HUANG Zhi-qiu, WANG Yong, FANG Bing-wu. New approach of cross-project defect prediction based on multi-source data [J]. 吉林大学学报(工学版), 2016, 46(6): 2034-2041. |
[4] | WANG Nian-bin, ZHU Guan-wen, ZHOU Lian-ke, WANG Hong-wei. Novel dataspace index for efficient processing of path query [J]. 吉林大学学报(工学版), 2016, 46(3): 911-916. |
[5] | TE Ri-gen, JIANG Sheng, LI Xiong-fei, LI Jun. Document compression scheme based on integer data [J]. 吉林大学学报(工学版), 2016, 46(1): 228-234. |
[6] | CHEN Peng-fei, TIAN Di, YANG Guang. Design and implementation of LIBS software based on MVC architecture [J]. 吉林大学学报(工学版), 2016, 46(1): 242-245. |
[7] | LIU Lei, WANG Yan-yan, SHEN Chun, LI Yu-xiang, LIU Lei. Performance portable GPU parallel optimization technique on Bellman-Ford algorithm [J]. 吉林大学学报(工学版), 2015, 45(5): 1559-1564. |
[8] | FENG Xiao-ning, WANG Zhuo, ZHANG Xu. Formal method for routing protocol of WSN based on L-π calculus [J]. 吉林大学学报(工学版), 2015, 45(5): 1565-1571. |
[9] | LI Ming-zhe, WANG Jin-lin, CHEN Xiao, CHEN Jun. Architecture model of streaming media applications on network processors(VPL) [J]. 吉林大学学报(工学版), 2015, 45(5): 1572-1580. |
[10] | WANG Ke-chao, WANG Tian-tian, SU Xiao-hong, MA Pei-jun. Plagiarism detection in student programs based on frequent closed sequence mining [J]. 吉林大学学报(工学版), 2015, 45(4): 1260-1265. |
[11] | HUANG Hong-tao,WANG Jing,YE Hai-zhi,HUANG Shao-bin. Lazy slicing based method for verifying linear temporal logic property [J]. 吉林大学学报(工学版), 2015, 45(1): 245-251. |
[12] | FAN Da-juan, HUANG Zhi-qiu, XIAO Fang-xiong, ZHU Yi, WANG Jin. Compatibility analysis and adaptor generation for multi-service interaction [J]. 吉林大学学报(工学版), 2014, 44(4): 1094-1103. |
[13] | HE Qin-lu, LI Zhan-huai, WANG Le-xiao, WANG Rui. Testing technology for aggregate bandwidth of cloud storage system [J]. 吉林大学学报(工学版), 2014, 44(4): 1104-1111. |
[14] | LIU Guo-qi, LIU Hui, GAO Yu, LIU Ying, ZHU Zhi-liang. Resource dynamic pricing strategy based on utility in cloud computing [J]. 吉林大学学报(工学版), 2013, 43(06): 1631-1637. |
[15] | DENG Hui, WU Jin-zhao. Approximate bisimulation for linear semi-algebraic transition systems [J]. 吉林大学学报(工学版), 2013, 43(04): 1052-1058. |
|