Search

Your search keyword '"Obfuscation"' showing total 1,468 results

Search Constraints

Start Over You searched for: Descriptor "Obfuscation" Remove constraint Descriptor: "Obfuscation" Language undetermined Remove constraint Language: undetermined
1,468 results on '"Obfuscation"'

Search Results

1. Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform

2. Defeating Data Plane Attacks With Program Obfuscation

3. Geoprivacy protection of agricultural data

4. Model of Execution Trace Obfuscation Between Threads

5. A Blockchain-Based Dual-Side Privacy-Preserving Multiparty Computation Scheme for Edge-Enabled Smart Grid

6. PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol

7. A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing

8. Maya: Using Formal Control to Obfuscate Power Side Channels

9. Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT

10. Generating Effective Software Obfuscation Sequences With Reinforcement Learning

11. Android decompiler performance on benign and malicious apps: an empirical study

12. LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection

13. Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture

14. A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems

15. Voltage Over-Scaling-Based Lightweight Authentication for IoT Security

16. Privacy-Preserving Distributed Average Observers in Distribution Systems With Grid-Forming Inverters

17. Shared Realities: Avatar Identification and Privacy Concerns in Reconstructed Experiences

18. Asymmetry by Design? Identity Obfuscation, Reputational Pressure, and Consumer Predation in U.S. For-Profit Higher Education

19. Functional encryption for cubic polynomials and implementation

20. A Survey on Statistical, Information, and Estimation—Theoretic Views on Privacy

21. DFSGraph: Data Flow Semantic Model for Intermediate Representation Programs Based on Graph Network

22. Outsourcing Online Education: Predation and Obfuscation in Public University-OPM Contracts

23. Large-scale and Robust Code Authorship Identification with Deep Feature Learning

24. DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social Networks

25. SonicEvasion: a stealthy ultrasound based invasion using covert communication in smart phones and its security

26. DNS Tunneling Detection by Cache-Property-Aware Features

27. Methods and Analysis of Automated Trace Alignment Under Power Obfuscation in Side Channel Attacks

28. A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution

29. 'Demand Side' Health Insurance in India: The Price of Obfuscation

30. A novel method for malware detection based on hardware events using deep neural networks

31. LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing

32. De la logique à l’algorithme : la traduction dans le design de programmes

33. DYNAMIC DATA EXFILTRATION OVER COMMON PROTOCOLS VIA SOCKET LAYER PROTOCOL CUSTOMIZATION

34. Evaluating the Security of Delay-Locked Circuits

35. On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations

36. DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication

37. Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation

38. Adaptive Packet Padding Approach for Smart Home Networks: A Tradeoff Between Privacy and Performance

39. The Asymmetric Effect of Reporting Flexibility on Priced Risk

40. A Generalized Model of Advertised Sales

41. One Size Does Not Fit All

42. Set-Based Obfuscation for Strong PUFs Against Machine Learning Attacks

43. Rumor Source Detection With Multiple Observations Under Adaptive Diffusions

44. Thwarting Bio-IP Theft Through Dummy-Valve-Based Obfuscation

45. Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search

46. Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools

47. A Semantically Sensitive Privacy Protection Method for Trajectory Publishing

48. A New Malware Classification Framework Based on Deep Learning Algorithms

49. DO POOR AND GOOD PERFORMING COMPANIES REPORT DIFFERENTLY? THE READABILITY AND IMPRESSION MANAGEMENT IN CORPORATE NARRATIVE DOCUMENTS: EVIDENCE FROM NORTHERN EUROPE

50. Howling 'A Hot Time': The Paradoxical Anthem of the Progressive Age

Catalog

Books, media, physical & digital resources