Distributed ledger technology: Its evolutionary path and the road ahead A Perdana, A Robb, V Balachandran, F Rohde Information & Management 58 (3), 103316, 2021 | 60 | 2021 |
Control flow obfuscation for Android applications V Balachandran, Sufatrio, DJJ Tan, VLL Thing Computers & Security 61, 72-93, 2016 | 58 | 2016 |
Potent and stealthy control flow obfuscation by stack based self-modifying code V Balachandran, S Emmanuel IEEE Transactions on Information Forensics and Security 8 (4), 669-681, 2013 | 41 | 2013 |
Effectiveness of android obfuscation on evading anti-malware M Chua, V Balachandran Proceedings of the eighth ACM conference on data and application security …, 2018 | 30 | 2018 |
Software code obfuscation by hiding control flow information in stack V Balachandran, S Emmanuel 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 30 | 2011 |
Tan, and VLL Thing,“Control flow obfuscation for android applications,” V Balachandran, DJJ Sufatrio Computers & Security 61, 72-93, 2016 | 29 | 2016 |
Function level control flow obfuscation for software security V Balachandran, NW Keong, S Emmanuel 2014 Eighth International Conference on Complex, Intelligent and Software …, 2014 | 26 | 2014 |
Fix-it: An extensible code auto-fix component in review bot V Balachandran 2013 IEEE 13th International Working Conference on Source Code Analysis and …, 2013 | 22 | 2013 |
Software protection with obfuscation and encryption V Balachandran, S Emmanuel International Conference on Information Security Practice and Experience …, 2013 | 21 | 2013 |
Gramac: A graph based android malware classification mechanism D Vij, V Balachandran, T Thomas, R Surendran Proceedings of the tenth ACM conference on data and application security and …, 2020 | 12 | 2020 |
AEON: android encryption based obfuscation D Geethanjali, TL Ying, CWJ Melissa, V Balachandran Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 11 | 2018 |
DRAT: A drone attack tool for vulnerability assessment MS bin Mohammad Fadilah, V Balachandran, P Loh, M Chua Proceedings of the tenth ACM conference on data and application security and …, 2020 | 9 | 2020 |
Obfuscation by code fragmentation to evade reverse engineering V Balachandran, S Emmanuel, NW Keong 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014 | 9 | 2014 |
ABC-Verify: AI-Blockchain integrated framework for tweet misinformation detection THY Zen, CB Hong, PM Mohan, V Balachandran 2021 IEEE International Conference on Service Operations and Logistics, and …, 2021 | 8 | 2021 |
Enhancing decision making with machine learning: The case of aurora crowdlending platform P Jutasompakorn, A Perdana, V Balachandran Journal of Information Technology Teaching Cases 13 (1), 58-66, 2023 | 5 | 2023 |
Incorporating Industry into the Curriculum: Applied Learning in Computer Science R Kirwan, V Balachandran Applied Learning in Higher Education:: Perspective, Pedagogy, and Practice …, 2020 | 5 | 2020 |
Nft-merit: An nft-based module credit management system on ethereum blockchain PM Mohan, V Balachandran, OZ Quan, JPZ Xin, DM Divakaran 2022 IEEE International Conference on Teaching, Assessment and Learning for …, 2022 | 4 | 2022 |
Blockchain-based Proof of Existence (PoE) framework using ethereum smart contracts LWM Shawn, P Murali Mohan, P Loh Kok Keong, V Balachandran Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 4 | 2021 |
Towards Robust Detection of PDF-based Malware KY Tay, S Chua, M Chua, V Balachandran Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 3 | 2022 |
Drat: A penetration testing framework for drones CS Veerappan, PLK Keong, V Balachandran, MSBM Fadilah 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA …, 2021 | 3 | 2021 |