吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (05): 1359-1366.doi: 10.7964/jdxbgxb201305034
• paper • Previous Articles Next Articles
LUO Yang-xia1,2, FANG Ding-yi1
CLC Number:
[1] Aiken A, Schleimer S, Auslander J, et al. Method and apparatus for indexing document content and content comparison with World Wide Web search service[P]. US Patents:6757675,2004-06-29.[2] University of California-Berkeley. Moss: a system for detecting software plagiarism[M/OL].[2005-09-22] www cs berkeley edu/aiken/moss html.[3] Tamada H, Nakamura M, Monden A, et al. Design and evaluation of birthmarks for detecting theft of java programs[C]//Proceedings of the International Conference on Software Engineering. Austria:ACTA,2004.[4] Myles G, Collberg C. Detecting software theft via whole program path birthmarks[J].Information Security, 2004, 3225(9): 404-415.[5] Tamada H, Okamoto K, Nakamura M, et al. Dynamic software birthmarks to detect the theft of win-dows applications[C]//Proceedings of the 8th International Symposium on Future Software Technology, Xi'an, China,2004.[6] Park Heewan, Lim Hyun-Il, Choi Seokwoo, et al. A static java birthmark based on oper and stack behaviors[C]//Proceedings of the 2008 International Conference on Information Security and Assurance, Washington, USA,2008.[7] Myles G, Collberg C. K-gram based software birthmarks[C]//Proceedings of the the Symposium on Applied Computing New York, USA,2005.[8] Lim H, Park H, Choi S, et al. A static java birthmark based on control flow edges[C]//Proceedings of the IEEE 33rd Computer Software and Applications Conference, 2009.[9] Zhou X, Sun X, Sun G, et al. A combined static and dynamic software birthmark based on component dependence graph[C]//Proceedings of the IEEE 2008 Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China,2008.[10] 赵玉洁, 房鼎益, 顾元祥, 等. 代码混淆算法有效性评估[J].软件学报, 2012, 23(3): 700-711. Zhao Yu-jie, Fang Ding-yi, Gu Yuan-xiang,et al. Evaluation of code obfuscating transformation[J].Chinese Journal of Software, 2012, 23(3): 700-711.[11] Proietti M, Pettorossi A. Semantics preserving transformation rules for Prolog[C]//Proceedings of Partial Evaluation and Semantics-based Program Evaluation,ACM,1991. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | DONG Sa, LIU Da-you, OUYANG Ruo-chuan, ZHU Yun-gang, LI Li-na. Logistic regression classification in networked data with heterophily based on second-order Markov assumption [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1571-1577. |
[8] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[9] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[10] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[11] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[12] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[13] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[14] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[15] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
|