共 50 条
- [1] Technique of Source Code Obfuscation Based on Data Flow and Control FLow Tansformations [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1093 - 1097
- [2] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16
- [3] Optimizing Away Java']JavaScript Obfuscation [J]. 2020 20TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2020), 2020, : 215 - 220
- [4] A Method of Java']JavaScript path obfuscation based on Collatz conjecture [J]. 2015 12TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2015, : 330 - 333
- [5] JS']JSOD: Java']JavaScript obfuscation detector [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1092 - 1107
- [6] AN OPTIMIZATION METHOD OF JAVA']JAVASCRIPT REDUNDANT CODE ELIMINATION BASED ON HYBRID ANALYSIS TECHNIQUE [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 300 - 305
- [7] Three control flow obfuscation methods for Java']Java software [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
- [8] Java']JavaScript Code Suggestion Based on Deep Learning [J]. 3RD INTERNATIONAL CONFERENCE ON INNOVATION IN ARTIFICIAL INTELLIGENCE (ICIAI 2019), 2019, : 145 - 149
- [10] Technique of Code Obfuscation Based on Class Structure [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE III, PTS 1 AND 2, 2013, 271-272 : 674 - 678