Home > Research > Browse

Results for Reverse engineering

Publications & Outputs

  1. Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X. & Wang, Z., 05/2018, In: Computers and Security. 74, p. 202-220 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. DexPro: A Bytecode Level Code Protection System for Android Applications

    Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F. & Wang, Z., 21/10/2017, Cyberspace Safety and Security. Wen, S., Wu, W. & Castiglione, A. (eds.). Cham: Springer, p. 367-382 16 p. (Lecture Notes in Computer Science; vol. 10581).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Reverse engineering approach for precise measurement of the physical attributes related to the geometric features of agricultural products

    Celik, H. K., Rennie, A. E. W. & Akinci, I., 03/2017, In: Journal of Food Measurement and Characterization. 11, 1, p. 75-84 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Reverse engineering using close range photogrammetry for additive manufactured reproduction of Egyptian artefacts and other objets d'art

    Kaufman, J., Rennie, A. & Clement, M., 1/03/2015, In: Journal of Computing and Information Science in Engineering. 15, 1, 7 p., 011006.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. A mathematical program to refine gene regulatory networks

    Lulli, G. & Romauch, M., 28/05/2009, In: Discrete Applied Mathematics. 157, 10, p. 2469-2482 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review