Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai |
Gradient Obfuscation Gives a False Sense of Security in Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.04055, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq |
No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.08136, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | M. I. Shiny, M. Nirmala Devi 0001 |
Trustworthy Scan Design and Testability Using Obfuscation and Logic Locking Scheme for Wireless Network Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 27(3), pp. 1000-1018, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Junwei Tang, Ruixuan Li 0001, Yu Jiang, Xiwu Gu, Yuhua Li 0003 |
Android malware obfuscation variants detection method based on multi-granularity opcode features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 129, pp. 141-151, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | William L. Croft, Jörg-Rüdiger Sack, Wei Shi 0001 |
Differentially private facial obfuscation via generative adversarial networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 129, pp. 358-379, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | |
On the Invalidity of Lin16/Lin17 Obfuscation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1301, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Steven D. Galbraith, Trey Li |
Obfuscation of Evasive Algebraic Set Membership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1516, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Sora Suegami |
Smart Contracts Obfuscation from Blockchain-based One-time Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 549, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia |
SoK: Use of Cryptography in Malware Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1699, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai |
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 343, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay |
PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1005, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Shingo Sato, Keita Emura, Atsushi Takayasu |
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 17, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Abhishek Jain 0002, Zhengzhong Jin |
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1430, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs |
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 681, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu |
IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1752, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Aayush Jain, Huijia Lin, Ji Luo 0002, Daniel Wichs |
The Pseudorandom Oracle Model and Ideal Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1204, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Rachit Garg 0001, Kristin Sheridan, Brent Waters, David J. Wu 0001 |
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1760, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 |
COA-Secure Obfuscation and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1781, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Tassos Dimitriou, Khazam Alhamdan |
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 672, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Yaqun Liu, Chang-you Xing, Guomin Zhang, Lihua Song, Hongxiu Lin |
AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 113, pp. 102570, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Parvaneh Nowbakht, Lilian O'Sullivan, Fiona Cawkwell, David P. Wall, Paul Holloway |
A comparison of obfuscation methods used for privacy protection: Exploring the challenges of polygon data in agricultural research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. GIS ![In: Trans. GIS 26(2), pp. 949-979, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Manikandan Thirumalaisamy, Shajahan Basheer, Shitharth Selvarajan, Sara A. Althubiti, Fayadh Alenezi, Gautam Srivastava 0001, Jerry Chun-Wei Lin |
Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(19), pp. 7169, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Leila Benarous, Benamar Kadri |
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 15(1), pp. 461-472, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yuanjing Zhang, Tao Shang, Ranyiliu Chen, Jianwei Liu 0001 |
Instantiation of quantum point obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 21(1), pp. 29, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai |
Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 65(10), pp. 2846, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang |
Model of Execution Trace Obfuscation Between Threads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(6), pp. 4156-4171, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Huaijin Wang, Shuai Wang 0011, Dongpeng Xu 0001, Xiangyu Zhang, Xiao Liu 0025 |
Generating Effective Software Obfuscation Sequences With Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(3), pp. 1900-1917, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Luca Cassano, Mattia Iamundo, Tomas Antonio Lopez, Alessandro Nazzari, Giorgio Di Natale |
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 129, pp. 102592, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev |
One-Way Functions and (Im)perfect Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 51(6), pp. 1769-1795, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fan Yang, Bingyang Wen, Cristina Comaniciu, K. P. Subbalakshmi, Rajarathnam Chandramouli |
TONet: A Fast and Efficient Method for Traffic Obfuscation Using Adversarial Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 26(11), pp. 2537-2541, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hannah Badier, Jean-Christophe Le Lann, Philippe Coussy, Guy Gogniat |
Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behavioral Synthesis for Hardware Security ![In: Behavioral Synthesis for Hardware Security, pp. 71-93, 2022, Springer International Publishing, 978-3-030-78840-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nandeesha Veeranna, Benjamin Carrion Schafer |
Source Code Obfuscation of Behavioral IPs: Challenges and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behavioral Synthesis for Hardware Security ![In: Behavioral Synthesis for Hardware Security, pp. 43-56, 2022, Springer International Publishing, 978-3-030-78840-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pranesh Santikellur, Rajat Subhra Chakraborty, Swarup Bhunia |
Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behavioral Synthesis for Hardware Security ![In: Behavioral Synthesis for Hardware Security, pp. 57-69, 2022, Springer International Publishing, 978-3-030-78840-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Levent Aksoy, Alexander Hepp, Johanna Baehr, Samuel Pagliarini |
Hardware Obfuscation of Digital FIR Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DDECS ![In: 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2022, Prague, Czech Republic, April 6-8, 2022, pp. 68-73, 2022, IEEE, 978-1-6654-9431-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Luca Cassano, Elia Lazzeri, Nikita Litovchenko, Giorgio Di Natale |
On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DDECS ![In: 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2022, Prague, Czech Republic, April 6-8, 2022, pp. 172-177, 2022, IEEE, 978-1-6654-9431-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy |
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022, pp. 368-374, 2022, IEEE, 978-1-6654-8009-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs |
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: 3rd Conference on Information-Theoretic Cryptography, ITC 2022, July 5-7, 2022, Cambridge, MA, USA., pp. 10:1-10:21, 2022, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-238-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed 0001 |
Control Logic Obfuscation Attack in Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2022, Rhodes, Greece, July 27-29, 2022, pp. 227-232, 2022, IEEE, 978-1-6654-9952-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi |
ERIC: An Efficient and Practical Software Obfuscation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022, pp. 466-474, 2022, IEEE, 978-1-6654-1693-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rajvardhan Oak |
Poster - Towards Authorship Obfuscation with Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 3435-3437, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Muhammad Ali, Monem Hamid, Jacob Jasser, Joachim Lerman, Samod Shetty, Fabio Di Troia |
Profile Hidden Markov Model Malware Detection and API Call Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022., pp. 688-695, 2022, SCITEPRESS, 978-989-758-553-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Runsheng Guo 0001, Qichao Liu, Man Zhang 0004, Ning Hu, Hui Lu 0005 |
A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022, pp. 40-47, 2022, IEEE, 978-1-6654-7480-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian |
Evolution of macro VBA obfuscation techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 15th International Conference on Security of Information and Networks, SIN 2022, Sousse, Tunisia, November 11-13, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-5465-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | James Bartusek, Giulio Malavolta |
Indistinguishability Obfuscation of Null Quantum Circuits and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA., pp. 15:1-15:13, 2022, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-217-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shahzad Muzaffar, Ibrahim Abe M. Elfadel |
Logic Locking of Finite-State Machines Using Transition Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: 30th IFIP/IEEE 30th International Conference on Very Large Scale Integration, VLSI-SoC 2022, Patras, Greece, October 3-5, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-9005-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay |
Revisiting Logic Obfuscation Using Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASCAT ![In: Proceedings of First Asian Symposium on Cellular Automata Technology - ASCAT 2022, Kolkata, India, 3-5 March 2022, pp. 27-41, 2022, Springer, 978-981-19-0541-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Leon Li, Alex Orailoglu |
JANUS-HD: Exploiting FSM Sequentiality and Synthesis Flexibility in Logic Obfuscation to Thwart SAT Attack While Offering Strong Corruption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2022 Design, Automation & Test in Europe Conference & Exhibition, DATE 2022, Antwerp, Belgium, March 14-23, 2022, pp. 1323-1328, 2022, IEEE, 978-3-9819263-6-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Rachit Garg 0001, Kristin Sheridan, Brent Waters, David J. Wu 0001 |
Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I, pp. 526-555, 2022, Springer, 978-3-031-22317-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Qifan Yu, Pengcheng Zhang, Hai Dong, Yan Xiao 0002, Shunhui Ji |
Bytecode Obfuscation for Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 29th Asia-Pacific Software Engineering Conference, APSEC 2022, Virtual Event, Japan, December 6-9, 2022, pp. 566-567, 2022, IEEE, 978-1-6654-5537-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Abhishek Jain 0002, Zhengzhong Jin |
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 63rd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2022, Denver, CO, USA, October 31 - November 3, 2022, pp. 1023-1034, 2022, IEEE, 978-1-6654-5519-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yuvin Perera, Nadeem Ahmed, Salil S. Kanhere, Wen Hu, Sanjay K. Jha |
IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2022, Seoul, Korea, May 16-20, 2022, pp. 2954-2959, 2022, IEEE, 978-1-5386-8347-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Fangyu Shen, Shuo Zhang 0011, Yaping Liu, Zhikai Yang |
A Survey of Traffic Obfuscation Technology for Smart Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: 2022 International Wireless Communications and Mobile Computing, IWCMC 2022, Dubrovnik, Croatia, May 30 - June 3, 2022, pp. 997-1002, 2022, IEEE, 978-1-6654-6749-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sying-Jyan Wang, Katherine Shu-Min Li, Chen-Yeh Lin, Song-Kong Chong |
Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATS ![In: IEEE 31st Asian Test Symposium, ATS 2022, Taichung City, Taiwan, November 21-24, 2022, pp. 90-95, 2022, IEEE, 978-1-6654-7227-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Huixian Huang, Xiaole Cui, Shuming Zhang, Ge Li, Xiaoxin Cui |
An obfuscation scheme of scan chain to protect the cryptographic chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATS ![In: IEEE 31st Asian Test Symposium, ATS 2022, Taichung City, Taiwan, November 21-24, 2022, pp. 19-24, 2022, IEEE, 978-1-6654-7227-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik |
Constrained Obfuscation to Thwart Pattern Matching Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 643-648, 2022, IEEE, 978-1-6654-2159-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shingo Sato, Keita Emura, Atsushi Takayasu |
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings, pp. 3-23, 2022, Springer, 978-3-031-09233-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi 0002 |
Loki: Hardening Code Obfuscation Against Automated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 3055-3073, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Roland Meier, Vincent Lenders, Laurent Vanbever |
ditto: WAN Traffic Obfuscation at Line Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022, 2022, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin |
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022, 2022, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Gaofeng He, Xiancai Xiao, Renhong Chen, Haiting Zhu, Zhaowei Zhang, Bingfeng Xu |
Secure and Efficient Traffic Obfuscation for Smart Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2022, Rio de Janeiro, Brazil, December 4-8, 2022, pp. 6073-6078, 2022, IEEE, 978-1-6654-3540-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Lin Yuan, Linguo Liu, Xiao Pu 0002, Zhao Li, Hongbo Li, Xinbo Gao 0001 |
PRO-Face: A Generic Framework for Privacy-preserving Recognizable Obfuscation of Face Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022, pp. 1661-1669, 2022, ACM, 978-1-4503-9203-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nor Zakiah Gorment, Ali Selamat, Ondrej Krejcar |
Anti-Obfuscation Techniques: Recent Analysis of Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoMeT ![In: New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 21st International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2022, Kitakyushu, Japan, 20-22 September, 2022., pp. 181-192, 2022, IOS Press, 978-1-64368-316-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Soroush Shahi, Rawan Alharbi, Yang Gao, Sougata Sen, Aggelos K. Katsaggelos, Josiah D. Hester, Nabil Alshurafa |
Impacts of Image Obfuscation on Fine-grained Activity Recognition in Egocentric Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa, Italy, March 21-25, 2022, pp. 341-346, 2022, IEEE, 978-1-6654-1647-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yueyao Zhao, Baihe Ma, Ziwen Wang, Zhihong Liu, Yong Zeng 0002, Jianfeng Ma 0001 |
Trajectory Obfuscation and Detection in Internet-of-vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: 25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022, Hangzhou, China, May 4-6, 2022, pp. 769-774, 2022, IEEE, 978-1-6654-0527-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mohamed Khamis, Habiba Farzand, Marija Mumm, Karola Marky |
DeepFakes for Privacy: Investigating the Effectiveness of State-of-the-Art Privacy-Enhancing Face Obfuscation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVI ![In: AVI 2022: International Conference on Advanced Visual Interfaces, Frascati, Rome, Italy, June 6 - 10, 2022, pp. 21:1-21:5, 2022, ACM, 978-1-4503-9719-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yifang Li, Kelly Caine |
Obfuscation Remedies Harms Arising from Content Flagging of Photos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, pp. 35:1-35:25, 2022, ACM, 978-1-4503-9157-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Chenxi Qiu, Li Yan 0004, Anna Cinzia Squicciarini, Juanjuan Zhao, Chengzhong Xu 0001, Primal Pappachan |
TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSPATIAL/GIS ![In: Proceedings of the 30th International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2022, Seattle, Washington, November 1-4, 2022, pp. 4:1-4:10, 2022, ACM, 978-1-4503-9529-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kamil Kluczniak |
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II, pp. 69-98, 2022, Springer, 978-3-030-97130-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Michael Zuzak, Yuntao Liu 0001, Isaac McDaniel, Ankur Srivastava 0001 |
A Combined Logical and Physical Attack on Logic Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2022, San Diego, California, USA, 30 October 2022 - 3 November 2022, pp. 68:1-68:9, 2022, ACM, 978-1-4503-9217-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tong Zhou 0002, Shaolei Ren, Xiaolin Xu |
ObfuNAS: A Neural Architecture Search-Based DNN Obfuscation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, ICCAD 2022, San Diego, California, USA, 30 October 2022 - 3 November 2022, pp. 81:1-81:9, 2022, ACM, 978-1-4503-9217-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Baihe Ma, Xiaojie Lin, Xu Wang 0004, Bin Liu 0028, Ying He 0011, Wei Ni 0001, Ren Ping Liu |
New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022, pp. 160-170, 2022, ACM, 978-1-4503-9704-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu 0002, Aiqun Hu |
Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, London, United Kingdom, May 2-5, 2022, pp. 1-10, 2022, IEEE, 978-1-6654-5822-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Cosmin Irimia, Roxana Irimia, Robert Milea, Silviu Ilas, Ana Vasiliu, Adrian Iftene |
Obfuscation of Documents using Randomly Generated Steps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, Verona, Italy and Virtual Event, 7-9 September 2022., pp. 1581-1590, 2022, Elsevier. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Aayush Jain, Huijia Lin, Amit Sahai |
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I, pp. 670-699, 2022, Springer, 978-3-031-06943-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 |
COA-Secure Obfuscation and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I, pp. 731-758, 2022, Springer, 978-3-031-06943-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jakob Sternby, Björn Johansson, Michael Liljenstam |
Neural Network Model Obfuscation through Adversarial Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, Taormina, Italy, May 16-19, 2022, pp. 782-789, 2022, IEEE, 978-1-6654-9956-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou |
Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 547-555, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Isaac McDaniel, Michael Zuzak, Ankur Srivastava 0001 |
A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: IEEE 40th International Conference on Computer Design, ICCD 2022, Olympic Valley, CA, USA, October 23-26, 2022, pp. 239-246, 2022, IEEE, 978-1-6654-6186-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mostafa Abedi, Tiancheng Yang, Yunsi Fei, Aatmesh Shrivastava |
High-Precision Nano-Amp Current Sensor and Obfuscation based Analog Trojan Detection Circuit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 3324-3328, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Maik Fröbe, Nicola Lea Libera, Matthias Hagen |
City of Disguise: A Query Obfuscation Game on the ClueWeb. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIR (2) ![In: Advances in Information Retrieval - 44th European Conference on IR Research, ECIR 2022, Stavanger, Norway, April 10-14, 2022, Proceedings, Part II, pp. 281-287, 2022, Springer, 978-3-030-99738-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sandeep Sunkavilli, Nishanth Goud Chennagouni, Qiaoyan Yu |
DPReDO: Dynamic Partial Reconfiguration enabled Design Obfuscation for FPGA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCC ![In: 35th IEEE International System-on-Chip Conference, SOCC 2022, Belfast, United Kingdom, September 5-8, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5985-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Andrew Wintenberg, Matthew Blischke, Stéphane Lafortune, Necmiye Ozay |
A Dynamic Obfuscation Framework for Security and Utility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCPS ![In: 13th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2022, Milano, Italy, May 4-6, 2022, pp. 236-246, 2022, IEEE, 978-1-6654-0967-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Naruaki Otsuki, Haruaki Tamada |
Overcoming the obfuscation method of the dynamic name resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSIM ![In: ICSIM 2022: The 5th International Conference on Software Engineering and Information Management, Yokohama, Japan, January 21 - 23, 2022, pp. 118-124, 2022, ACM, 978-1-4503-9551-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Doru-Florin Chiper |
An Improved Algorithm for the VLSI Implementation of Type II Generalized DHT that Allows an Efficient Incorporation of Obfuscation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 45th International Conference on Telecommunications and Signal Processing, TSP 2022, Prague, Czech Republic, July 13-15, 2022, pp. 83-86, 2022, IEEE, 978-1-6654-6948-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Brooks Olney, Robert Karam |
Protecting Deep Neural Network Intellectual Property with Architecture-Agnostic Input Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6 - 8, 2022, pp. 111-115, 2022, ACM, 978-1-4503-9322-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Malik H. Altakrori, Thomas Scialom, Benjamin C. M. Fung, Jackie Chi Kit Cheung |
A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP ![In: Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022., pp. 2391-2406, 2022, Association for Computational Linguistics. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor |
Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2022, McLean, VA, USA, June 27-30, 2022, pp. 13-16, 2022, IEEE, 978-1-6654-8532-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marilena Lupascu |
Obfuscation Techniques Based on Random Strings Used in Malicious VBA Scripts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2022, Hagenberg / Linz, Austria, September 12-15, 2022, pp. 347-352, 2022, IEEE, 978-1-6654-6545-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl |
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings, pp. 273-291, 2022, Springer, 978-3-031-22294-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai |
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II, pp. 573-602, 2022, Springer, 978-3-031-15978-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul |
Strategic Attacks on Recommender Systems: An Obfuscation Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022, pp. 1-8, 2022, IEEE, 979-8-3503-1008-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Doru-Florin Chiper, Arcadie Cracan |
A New Integer Algorithm for a VLSI Implementation of DCT Using Obfuscation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMM ![In: 14th International Conference on Communications, COMM 2022, Bucharest, Romania, June 16-18, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-9485-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kaiyu Yang, Jacqueline H. Yau, Li Fei-Fei 0001, Jia Deng 0001, Olga Russakovsky |
A Study of Face Obfuscation in ImageNet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: International Conference on Machine Learning, ICML 2022, 17-23 July 2022, Baltimore, Maryland, USA., pp. 25313-25330, 2022, PMLR. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Haocheng Ma, Qizhi Zhang, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin |
PathFinder: side channel protection through automatic leaky paths identification and obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10 - 14, 2022, pp. 79-84, 2022, ACM, 978-1-4503-9142-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Danushka Bollegala, Tomoya Machide, Ken-ichi Kawarabayashi |
Query Obfuscation by Semantic Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of the Thirteenth Language Resources and Evaluation Conference, LREC 2022, Marseille, France, 20-25 June 2022, pp. 6200-6211, 2022, European Language Resources Association. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Muhammad Usama Saleem, Dominick Reilly, Liyue Fan |
DP-Shield: Face Obfuscation with Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Proceedings of the 25th International Conference on Extending Database Technology, EDBT 2022, Edinburgh, UK, March 29 - April 1, 2022., pp. 2:578-2:581, 2022, OpenProceedings.org, 978-3-89318-086-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac |
A First Look at Code Obfuscation for WebAssembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022, pp. 140-145, 2022, ACM, 978-1-4503-9216-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Lorenzo Ghiro, Marco Cominelli, Francesco Gringoli, Renato Lo Cigno |
On the Implementation of Location Obfuscation in openwifi and Its Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedComNet ![In: 20th Mediterranean Communication and Computer Networking Conference, MedComNet 2022, Pafos, Cyprus, June 1-3, 2022, pp. 64-73, 2022, IEEE, 978-1-6654-8729-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Michael Zuzak |
Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
13 | Roland Meier |
Improving Network Security through Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|