„Obfuscation“
Suchergebnisse
181 Treffer
-
BitTorrent Traffic Obfuscation – a Chase towards Semantic Traffic Identification
-
Robust Optimization for Adversarial Deep Learning
-
Methods for Improving the Quality of Software Obfuscation for Android Applications
-
Characterizing the Strength of Software Obfuscation Against Automated Attacks
-
Network Traffic Exposed and Concealed
-
Readability of Quarterly Reports on the Frankfurt Stock Exchange
-
A Study in Protocol Obfuscation Techniques and their Effectiveness
-
A Study in Protocol Obfuscation Techniques and their Effectiveness
-
Intrusion detection system based on federated learning using layer-based privacy obfuscation
-
Privacy preservation through makeup transfer for facial feature obfuscation
-
Privacy-Preserving Public Verification via Homomorphic Encryption
-
The Hardware Trojan War – Attacks, Myths, and Defenses
-
Finn Brunton and Helen Nissenbaum: Obfuscation: a user’s guide for privacy and protest – The MIT Press, Cambridge, MA, $19.95, Hbk, ISBN: 978-0262029735
-
Putting on a Tight Leash and Levelling Playing Field: An Experiment in Strategic Obfuscation and Consumer Protection
-
Strategic Obfuscation and Consumer Protection Policy in Financial Markets: Theory and Experimental Evidence
-
Structured-Seed Local Pseudorandom Generators and Their Applications
-
A polymorphic code generation engine with obfuscation techniques for protecting web bot attacks
-
A novel obfuscation method based on majority logic for preventing unauthorized access to binary deep neural networks
-
Logic Locking Based Configurable Obfuscation Cell for Enhanced IC Security
-
Information Security and Cryptology – 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers