Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Mahshad Shariatnasab, Farhad Shirani 0001, S. Sitharama Iyengar |
The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023, pp. 1651-1656, 2023, IEEE, 978-1-6654-7554-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Majd Safi, Brandon Simpson, Eric Clark, Haytham Idriss, Tarek A. Idriss |
Lightweight Random Obfuscation Protocol: A PUF-based Mutual Authentication Protocol for IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIBThings ![In: IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2023, Mount Pleasant, MI, USA, September 16-17, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-2234-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Chenwei Wu 0006, Xiyu Yang, Emil Ghitman Gilkes, Hanwen Cui, Jiheon Choi, Na Sun, Ziqian Liao, Bo Fan, Mauricio Santillana, Leo A. Celi, Paolo Silva, Luis Nakayama |
De-identification and Obfuscation of Gender Attributes from Retinal Scans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLIP/FAIMI/EPIMI@MICCAI ![In: Clinical Image-Based Procedures, Fairness of AI in Medical Imaging, and Ethical and Philosophical Issues in Medical Imaging - 12th International Workshop, CLIP 2023 1st International Workshop, FAIMI 2023 and 2nd International Workshop, EPIMI 2023 Vancouver, BC, Canada, October 8 and October 12, 2023 Proceedings, pp. 91-101, 2023, Springer, 978-3-031-45248-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra-Arnau, Thorsten Strufe |
Analysis and Prevention of Averaging Attacks Against Obfuscation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (1) ![In: Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I, pp. 451-475, 2023, Springer, 978-3-031-33487-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Tongxia Deng, Ping Li 0018, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, Yiyuan Luo |
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings, pp. 419-438, 2023, Springer, 978-3-031-41180-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Xiang Huo, Mingxi Liu |
On Privacy Preservation of Electric Vehicle Charging Control via State Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, December 13-15, 2023, pp. 6564-6569, 2023, IEEE, 979-8-3503-0124-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad |
Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 643-660, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Yifan Yan, Xudong Pan, Mi Zhang 0001, Min Yang 0002 |
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2347-2364, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
Gradient Obfuscation Gives a False Sense of Security in Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6381-6398, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha |
Fairness Properties of Face Recognition and Obfuscation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 7231-7248, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Leo Song, Steven H. H. Ding |
Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 586-594, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Hayato Sato, Hiroshi Inamura, Shigemi Ishida, Yoshitaka Nakamura |
Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 940-945, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Owen Millwood, Meltem Kurt Pehlivanoglu, Aryan Mohammadi Pasikhani, Jack Miskelly, Prosanta Gope, Elif Bilge Kavun |
A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 92-106, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Zekun Hou, Changtong Dong, Ying Shang |
HermHD: Enhancing smart contract security based on code obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: Proceedings of the 2023 11th International Conference on Information Technology: IoT and Smart City, ICIT 2023, Kyoto, Japan, December 14-17, 2023, pp. 96-101, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Christian Catalano, Giorgia Specchia, Nicolò Gianmauro Totaro |
Enhancing Code Obfuscation Techniques: Exploring the Impact of Artificial Intelligence on Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES (2) ![In: Product-Focused Software Process Improvement - 24th International Conference, PROFES 2023, Dornbirn, Austria, December 10-13, 2023, Proceedings, Part II, pp. 80-88, 2023, Springer, 978-3-031-49268-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin 0001 |
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 1420-1432, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Zifan Xie, Ming Wen 0001, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin 0001 |
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 347-359, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Xing, Yuntao Liu 0001, Ankur Srivastava 0001 |
Low Power Logic Obfuscation Through System Level Clock Gating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: IEEE/ACM International Symposium on Low Power Electronics and Design, ISLPED 2023, Vienna, Austria, August 7-8, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1175-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Charlie Dickens, Eric Bax |
Matching Noisy Keys for Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023, pp. 5485-5492, 2023, IEEE, 979-8-3503-2445-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf |
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 443-456, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Gaurav Kumar, Anjum Riaz, Yamuna Prasad, Satyadev Ahlawat |
On Evaluating the Security of Dynamic Scan Obfuscation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, Crete, Greece, July 3-5, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-4135-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Sebastian Simon, Cezara Petrui, Carlos Pinzón, Catuscia Palamidessi |
Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings, pp. 74-90, 2023, Springer, 978-981-99-7031-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Alan Barnett, Matthew Keating, Sean Ahearne |
Architecture for Confidential Digital Asset Transfer on Blockchain Through Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 31st IEEE International Conference on Network Protocols, ICNP 2023, Reykjavik, Iceland, October 10-13, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0322-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Sampsa Rauti, Samuli Laato |
Understanding Software Obfuscation and Diversification as Defensive Measures for the Cybersecurity of Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 6645-6654, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Shuai Tang, Tianshi Mu, Jun Zheng 0007, Yurong Fu, Quanxin Zhang, Jie Yang |
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS&P (1) ![In: Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I, pp. 316-327, 2023, Springer, 978-981-99-9784-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Charan Gudla, Andrew H. Sung |
Host IP Obfuscation and Performance Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICR ![In: Proceedings of the Second International Conference on Innovations in Computing Research (ICR'23), Madrid, Spain, 4-6 September 2023., pp. 245-255, 2023, Springer, 978-3-031-35307-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Alessandro Palumbo, Marco Ottavi, Luca Cassano |
Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023, Juan-Les-Pins, France, October 3-5, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1500-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Anirban Sengupta, Aditya Anshul |
Key-Driven Multi-Layered Structural Obfuscation of IP cores using Reconfigurable Obfuscator based Network Challenge and Switch Control Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iSES ![In: IEEE International Symposium on Smart Electronic Systems, iSES 2023, Ahmedabad, India, December 18-20, 2023, pp. 141-146, 2023, IEEE, 979-8-3503-8324-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Xing, Michael Zuzak, Ankur Srivastava 0001 |
Low Overhead System-Level Obfuscation through Hardware Resource Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 24th International Symposium on Quality Electronic Design, ISQED 2023, San Francisco, CA, USA, April 5-7, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-3475-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yuzhu Wang, Xingbo Wang, Mingwu Zhang |
Homomorphic Witness Encryption from Indistinguishable Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings, pp. 231-250, 2023, Springer, 978-3-031-45512-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl |
Modeling Obfuscation Stealth Through Code Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS Workshops (2) ![In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, pp. 392-408, 2023, Springer, 978-3-031-54128-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Leon Li, Alex Orailoglu |
Thwarting Reverse Engineering Attacks through Keyless Logic Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 41st IEEE VLSI Test Symposium, VTS 2023, San Diego, CA, USA, April 24-26, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-4630-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Giulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro |
ROPfuscator: Robust Obfuscation with ROP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-1236-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Rahul Ilango, Jiatu Li, R. Ryan Williams |
Indistinguishability Obfuscation, Range Avoidance, and Bounded Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pp. 1076-1089, 2023, ACM, 978-1-4503-9913-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa |
Obfuscation of Pseudo-Deterministic Quantum Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pp. 1567-1578, 2023, ACM, 978-1-4503-9913-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Antti Pakonen |
Obfuscation of function block diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: 28th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2023, Sinaia, Romania, September 12-15, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-3991-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Russell Impagliazzo, Valentine Kabanets, Ilya Volkovich |
Synergy Between Circuit Obfuscation and Circuit Minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX/RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2023, September 11-13, 2023, Atlanta, Georgia, USA, pp. 31:1-31:21, 2023, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-296-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Aayush Jain, Huijia Lin, Ji Luo 0002, Daniel Wichs |
The Pseudorandom Oracle Model and Ideal Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (4) ![In: Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV, pp. 233-262, 2023, Springer, 978-3-031-38550-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry |
Computational Wiretap Coding from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (4) ![In: Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV, pp. 263-293, 2023, Springer, 978-3-031-38550-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Tong Zhou 0002, Yukui Luo, Shaolei Ren, Xiaolin Xu |
NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: International Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA., pp. 42614-42624, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Hanlin Gu, Jiahuan Luo, Yan Kang 0001, Lixin Fan, Qiang Yang 0001 |
FedPass: Privacy-Preserving Vertical Federated Deep Learning with Adaptive Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAI ![In: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pp. 3759-3767, 2023, ijcai.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Erik Daniel, Marcel Ebert, Florian Tschorsch |
Improving Bitswap Privacy with Forwarding and Source Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 48th IEEE Conference on Local Computer Networks, LCN 2023, Daytona Beach, FL, USA, October 1-5, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-0074-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Ni Zhang, Wei Dong, Zehong Xia, Zhi Feng, Zhicheng Li |
Analysis on Technique for Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNCIT ![In: Proceedings of the 2nd International Conference on Networks, Communications and Information Technology, CNCIT 2023, Qinghai, China, June 16-18, 2023, pp. 241-245, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kevin Hutto, Vincent John Mooney |
Late Breaking Results: COPPER: Computation Obfuscation by Producing Permutations for Encoding Randomly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 60th ACM/IEEE Design Automation Conference, DAC 2023, San Francisco, CA, USA, July 9-13, 2023, pp. 1-2, 2023, IEEE, 979-8-3503-2348-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yousef Safari, Pooya Aghanoury, Subramanian S. Iyer, Nader Sehatbakhsh, Boris Vaisband |
Hybrid Obfuscation of Chiplet-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 60th ACM/IEEE Design Automation Conference, DAC 2023, San Francisco, CA, USA, July 9-13, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2348-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Zhenyu Yang, Xi Xiao, Bin Zhang 0048, Guangwu Hu, Qing Li, Qixu Liu |
AAP: Defending Against Website Fingerprinting Through Burst Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA (5) ![In: Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part V, pp. 107-121, 2023, Springer, 978-3-031-46676-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yudai Yamamoto, Shingo Yamaguchi |
A Rule Generation Method With High Understandability Against Obfuscated Attack Patterns in Log4Shell for IPS and IDS Based on Given Obfuscation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: 12th IEEE Global Conference on Consumer Electronics, GCCE 2023, Nara, Japan, October 10-13, 2023, pp. 1007-1010, 2023, IEEE, 979-8-3503-4018-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Judita Preiss |
Automatic Named Entity Obfuscation in Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (Findings) ![In: Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, July 9-14, 2023., pp. 615-622, 2023, Association for Computational Linguistics, 978-1-959429-62-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Debora Nozza, Dirk Hovy |
The State of Profanity Obfuscation in Natural Language Processing Scientific Publications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (Findings) ![In: Findings of the Association for Computational Linguistics: ACL 2023, Toronto, Canada, July 9-14, 2023., pp. 3897-3909, 2023, Association for Computational Linguistics, 978-1-959429-62-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Mauro Conti, P. Vinod 0001, Alessio Vitella |
Obfuscation detection in Android applications using deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 70, pp. 103311, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiseung Kim 0001, Changmin Lee 0001 |
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 16(3), pp. 208-219, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Surbhi Chhabra, Kusum Lata |
Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 3(4), pp. 303, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rajesh Datta, Guangwei Zhao, Kanad Basu, Kaveh Shamsi |
A Security Analysis of Circuit Clock Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(3), pp. 43, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | V. Sri Vigna Hema, Ramesh Kesavan |
Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(26), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hani Al-Balasmeh, Maninder Singh, Raman Singh |
Framework of data privacy preservation and location obfuscation in vehicular cloud networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(5), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Surbhi Chhabra, Kusum Lata |
Hardware obfuscation of AES IP core using combinational hardware Trojan circuit for secure data transmission in IoT applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(21), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiang Zhang, Lillian Clark, Matthew A. Clark 0002, Konstantinos Psounis, Peter Kairouz |
Privacy-utility trades in crowdsourced signal map obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 215, pp. 109187, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Geunha You, Gyoosik Kim, Sangchul Han, Minkyu Park, Seong-Je Cho |
Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 61426-61440, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Muhammad Hataba, Ahmed B. T. Sherif, Reem Elkhouly |
Enhanced Obfuscation for Software Protection in Autonomous Vehicular Cloud Computing Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 33943-33953, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed Shaharyar Khwaja, Serhat Erküçük, Alagan Anpalagan, Bala Venkatesh 0001 |
Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 27717-27735, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Anirban Sengupta, Rahul Chaurasia |
Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 50903-50913, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shariq Bashir, Daphne Teck Ching Lai, Owais Ahmed Malik |
Proxy-Terms Based Query Obfuscation Technique for Private Web Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 17845-17863, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Smita Chaudhari, Gandharba Swain |
Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 31607-31625, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Bo Guan, Nazanin Takbiri, Dennis Goeckel, Amir Houmansadr, Hossein Pishro-Nik |
Superstring-Based Sequence Obfuscation to Thwart Pattern Matching Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(23), pp. 23348-23365, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota |
Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(17), pp. 16080-16095, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Theodros Nigussie, Joshua Schabel, Steve Lipa, Lisa G. McIlrath, Robert Patti, Paul D. Franzon |
Design Obfuscation Through 3-D Split Fabrication With Smart Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 30(9), pp. 1230-1243, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rahaf Alharbi, Robin N. Brewer, Sarita Schoenebeck |
Understanding Emerging Obfuscation Technologies in Visual Description Services for Blind and Low Vision People. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 6(CSCW2), pp. 1-33, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhigang Gao, Yucai Huang, Leilei Zheng, Huijuan Lu, Bo Wu 0007, Jianhui Zhang |
Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(9), pp. 6290-6299, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nagaraju Paramarthi, Nallamothu Nagamalleswara Rao |
A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Syst. Technol. ![In: Int. J. Distributed Syst. Technol. 13(5), pp. 1-21, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marco Cominelli, Francesco Gringoli, Renato Lo Cigno |
On the properties of device-free multi-point CSI localization and its obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 189, pp. 67-78, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marco Cominelli, Francesco Gringoli, Renato Lo Cigno |
AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 185, pp. 92-103, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Gilad Asharov, Ilan Komargodski, Rafael Pass, Naomi Sirkin |
On the Complexity of Compressing Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 35(3), pp. 21, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhuojun Chen, Wenshang Lee, Qinghui Hong, Chongyan Gu, Zhenyu Guan, Lin Ding, Jiliang Zhang 0002 |
A Lightweight and Machine-Learning-Resistant PUF Using Obfuscation-Feedback-Shift-Register. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 69(11), pp. 4543-4547, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Umair Nawaz, Muhammad Aleem, Jerry Chun-Wei Lin |
On the evaluation of android malware detectors against code-obfuscation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 8, pp. e1002, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua |
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 64(4), pp. 1077-1100, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ki-Wan Kang, Jung-Taek Seo, Sung Hoon Baek, Chul-Woo Kim, Ki-Woong Park |
SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 16(3), pp. 1063-1075, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Terence E. Taylor, Frank Keane, Yaniv Zigel |
A Speech Obfuscation System to Preserve Data Privacy in 24-Hour Ambulatory Cough Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Top. Signal Process. ![In: IEEE J. Sel. Top. Signal Process. 16(2), pp. 188-196, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pallavi Ahire, Jibi Abraham |
Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 922, pp. 131-149, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Surbhi Chhabra, Kusum Lata |
Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Priv. ![In: Secur. Priv. 5(4), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Abdulrahman Alaql, Saranyu Chattopadhyay, Prabuddha Chakraborty, Tamzidul Hoque, Swarup Bhunia |
LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4), pp. 854-867, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao |
A Neural Network-Based Cognitive Obfuscation Toward Enhanced Logic Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11), pp. 4587-4599, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Naveenkumar R, N. M. Sivamangai, Napolean A, G. Akashraj Nissi |
Hardware Obfuscation for IP Protection of DSP Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 38(1), pp. 9-20, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Gaurav Kolhe, Tyler David Sheaves, Sai Manoj P. D., Hamid Mahmoodi, Setareh Rafatirad, Avesta Sasan, Houman Homayoun |
Breaking the Design and Security Trade-off of Look-up-table-based Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 27(6), pp. 56:1-56:29, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay |
Syfer: Neural Obfuscation for Private Data Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.12406, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Debora Nozza, Dirk Hovy |
The State of Profanity Obfuscation in Natural Language Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.07595, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao |
A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.05799, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang L. D. Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia |
SoK: Use of Cryptography in Malware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.04008, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shilun Li, Zijing Di |
Indistinguishability Obfuscation of Circuits and its Application in Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.14304, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kleber Stangherlin, Zhuanhao Wu, Hiren D. Patel, Manoj Sachdev |
Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.11181, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi |
ERIC: An Efficient and Practical Software Obfuscation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.07407, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Adaku Uchendu, Thai Le, Dongwon Lee 0001 |
Attribution and Obfuscation of Neural Text Authorship: A Data Mining Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.10488, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Guangsheng Yu, Xu Wang 0004, Ping Yu, Caijun Sun, Wei Ni 0001, Ren Ping Liu |
Dataset Obfuscation: Its Applications to and Impacts on Edge Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.03909, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nikola Popovic, Danda Pani Paudel, Thomas Probst, Luc Van Gool |
Gradient Obfuscation Checklist Test Gives a False Sense of Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.01705, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiang Zhang, Lillian Clark, Matthew A. Clark 0002, Konstantinos Psounis, Peter Kairouz |
Privacy-Utility Trades in Crowdsourced Signal Map Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.04782, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Levent Aksoy, Alexander Hepp, Johanna Baehr, Samuel Pagliarini |
Hardware Obfuscation of Digital FIR Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.10022, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
Supervisor Obfuscation Against Covert Actuator Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.02383, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Siddhartha Datta, Nigel Shadbolt |
Hiding Behind Backdoors: Self-Obfuscation Against Generative Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.09774, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Primal Pappachan, Chenxi Qiu, Anna Cinzia Squicciarini, Vishnu Sharma Hunsur Manjunath |
TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.08396, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Benjamin Laufer, Niko A. Grupen |
Collective Obfuscation and Crowdsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.06405, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tong Zhou 0002, Shaolei Ren, Xiaolin Xu |
ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.08569, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|