[1] VITICCHIÉ A, REGANO L, TORCHIANO M, et al. Assessment of source code obfuscation techniques[C/OL]. (2016-11-20). https://ieeexplore.ieee.org/abstract/document/7781792. [2] COLLBERG C, THOMBORSON C, LOW D. A taxonomy of obfuscating transformations[R/OL].[2018-11-19]. https://researchspace.auckland.ac.nz/handle/2292/3491. [3] LIU T, GAO X, YUAN Q. An improved gradient-based NSGA-Ⅱ algorithm by a new chaotic map model[J]. Soft Computing, 2016, 21(23):1-15 [4] 姜惠兰, 安星, 王亚微, 等. 基于改进NSGA2算法的考虑风机接入电能质量的多目标电网规划[J]. 中国电机工程学报, 2015, 35(21):5405-5411 JIANG Huilan, AN Xing, WANG Yawei, et al. Improved NSGA2 algorithm based multi-objective planning of power grid with wind farm considering power quality[J]. Proceedings of the CSEE, 2015, 35(21):5405-5411 [5] 刘士明, 于丹. 基于第二代非支配排序遗传算法(NSGA-Ⅱ)的水资源优化配置[J]. 水资源与水工程学报, 2013, 24(5):185-188 LIU Shiming, YU Dan. Optimal allocation of water resources based on non-dominated sorting genetic algorithm-Ⅱ[J]. Journal of Water Resources & Water Engineering, 2013, 24(5):185-188 [6] 李瑞阳, 孙景明, 卢厚清, 等. 基于改进NSGA2的航空运输优化[J]. 解放军理工大学学报(自然科学版), 2017, 18(1):74-80 LI Ruiyang, SUN Jingming, LU Houqing, et al. Optimization of air transport based on improved NSGA2[J]. Journal of PLA University of Science and Technology (Natural Science Edition), 2017, 18(1):74-80 [7] MARTINEZ S. Source code obfuscation by mean of evolutionary algorithms[DB/OL]. (2012-08-24). https://dumas.ccsd.cnrs.fr/dumas-00725330. [8] BERTHOLON B, VARRETTE S, BOUVRY P. JShadObf:A JavaScript obfuscator based on multi-objective optimization algorithms[C/OL].[2018-11-19]. https://www.lrde.epita.fr/wiki/Publications/newton.17.els. [9] 黄松, 黄玉, 惠战伟. 基于JavaCC的抽象语法树的构建与实现[J]. 计算机工程与设计, 2016, 37(4):938-943 HUANG Song, HUANG Yu, HUI Zhanwei. Construction and realization of abstract syntax tree based on JavaCC[J]. Computer Engineering and Design, 2016, 37(4):938-943 [10] NEWTON J, VERNA D, COLANGE M. Programmatic manipulation of common lisp type specifiers[C/OL]. (2017-02-06). https://www.lrde.epita.fr/wiki/Publications/newton.17.els. [11] 王怀军, 房鼎益, 董浩, 等. 白盒环境中防动态攻击的软件保护方法研究[J]. 电子学报, 2014, 42(3):529-537 WANG Huaijun, FANG Dingyi, DONG Hao, et al. Research on software protection defending dynamic atackin white-box environment[J]. Acta Electronica Sinica, 2014, 42(3):529-537 [12] WIDIARTHA I B K, ANJARWANI S E, BIMANTORO F. Traveling salesman problem using multi-element genetic algorithm[C/OL]. (2017-10-26). https://ieeexplore.ieee.org/abstract/document/8272917. [13] XU M, LI S, GUO J. Optimization of multiple traveling salesman problem based on simulated annealing genetic algorithm[DB/OL].[2018-11-19]. https://www.researchgate.net/publication/315106266_Optimization_of_Multiple_Traveling_Salesman_Problem_Based_on_Simulated_Annealing_Genetic_Algorithm. [14] 苏庆, 孙金田. 基于混沌不透明表达式的不透明谓词混淆技术研究[J]. 计算机科学, 2017, 44(12):114-119 SU Qing, SUN Jintian. Research on opaque predicate obfuscation technique based on chaotic opaque expression[J]. Computer Science, 2017, 44(12):114-119 [15] 吴伟民, 林水明, 林志毅. 一种基于混沌不透明谓词的压扁控制流算法[J]. 计算机科学, 2015, 42(5):178-182 WU Weimin, LIN Shuiming, LIN Zhiyi. Chaotic-based opaque predicate control flow flaten algorithm[J]. Computer Science, 2015, 42(5):178-182 [16] 苏庆, 何凡, 伍乃骐. 基于带抑止弧的Petri网的软件保护技术应用序列构建方法[J]. 工业工程, 2017, 20(6):77-83 SU Qing, HE Fan, WU Naiqi. A method of constructing sequence of software protection technologies based on Petri Net with inhibitor Arcs[J]. Industrial Engineering Journal, 2017, 20(6):77-83 |