The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for obfuscation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (31) 2004 (18) 2005 (37) 2006 (40) 2007 (50) 2008 (50) 2009 (43) 2010 (39) 2011 (37) 2012 (48) 2013 (56) 2014 (133) 2015 (115) 2016 (153) 2017 (148) 2018 (159) 2019 (139) 2020 (157) 2021 (168) 2022 (152) 2023 (148) 2024 (44)
Publication types (Num. hits)
article(830) book(2) incollection(9) inproceedings(1091) phdthesis(33)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 385 occurrences of 212 keywords

Results
Found 1965 publication records. Showing 1965 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai Gradient Obfuscation Gives a False Sense of Security in Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13M. I. Shiny, M. Nirmala Devi 0001 Trustworthy Scan Design and Testability Using Obfuscation and Logic Locking Scheme for Wireless Network Application. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Junwei Tang, Ruixuan Li 0001, Yu Jiang, Xiwu Gu, Yuhua Li 0003 Android malware obfuscation variants detection method based on multi-granularity opcode features. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13William L. Croft, Jörg-Rüdiger Sack, Wei Shi 0001 Differentially private facial obfuscation via generative adversarial networks. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13 On the Invalidity of Lin16/Lin17 Obfuscation Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Steven D. Galbraith, Trey Li Obfuscation of Evasive Algebraic Set Membership. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Sora Suegami Smart Contracts Obfuscation from Blockchain-based One-time Program. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram 0001, Giang Linh Duc Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia SoK: Use of Cryptography in Malware Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay PUF-COTE: A PUF Construction with Challenge Obfuscation and Throughput Enhancement. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Shingo Sato, Keita Emura, Atsushi Takayasu Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Abhishek Jain 0002, Zhengzhong Jin Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Shaza Elsharief, Lilas Alrahis, Johann Knechtel, Ozgur Sinanoglu IsoLock: Thwarting Link-Prediction Attacks on Routing Obfuscation by Graph Isomorphism. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Aayush Jain, Huijia Lin, Ji Luo 0002, Daniel Wichs The Pseudorandom Oracle Model and Ideal Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Rachit Garg 0001, Kristin Sheridan, Brent Waters, David J. Wu 0001 Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 COA-Secure Obfuscation and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Tassos Dimitriou, Khazam Alhamdan CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Yaqun Liu, Chang-you Xing, Guomin Zhang, Lihua Song, Hongxiu Lin AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Parvaneh Nowbakht, Lilian O'Sullivan, Fiona Cawkwell, David P. Wall, Paul Holloway A comparison of obfuscation methods used for privacy protection: Exploring the challenges of polygon data in agricultural research. Search on Bibsonomy Trans. GIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Manikandan Thirumalaisamy, Shajahan Basheer, Shitharth Selvarajan, Sara A. Althubiti, Fayadh Alenezi, Gautam Srivastava 0001, Jerry Chun-Wei Lin Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Leila Benarous, Benamar Kadri Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuanjing Zhang, Tao Shang, Ranyiliu Chen, Jianwei Liu 0001 Instantiation of quantum point obfuscation. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai Erratum to: MoG: Behavior-Obfuscation Resistance Malware Detection. Search on Bibsonomy Comput. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zihan Sha, Hui Shu, Xiaobing Xiong, Fei Kang Model of Execution Trace Obfuscation Between Threads. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huaijin Wang, Shuai Wang 0011, Dongpeng Xu 0001, Xiangyu Zhang, Xiao Liu 0025 Generating Effective Software Obfuscation Sequences With Reinforcement Learning. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Luca Cassano, Mattia Iamundo, Tomas Antonio Lopez, Alessandro Nazzari, Giorgio Di Natale DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ilan Komargodski, Tal Moran, Moni Naor, Rafael Pass, Alon Rosen, Eylon Yogev One-Way Functions and (Im)perfect Obfuscation. Search on Bibsonomy SIAM J. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fan Yang, Bingyang Wen, Cristina Comaniciu, K. P. Subbalakshmi, Rajarathnam Chandramouli TONet: A Fast and Efficient Method for Traffic Obfuscation Using Adversarial Machine Learning. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hannah Badier, Jean-Christophe Le Lann, Philippe Coussy, Guy Gogniat Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud. Search on Bibsonomy Behavioral Synthesis for Hardware Security The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nandeesha Veeranna, Benjamin Carrion Schafer Source Code Obfuscation of Behavioral IPs: Challenges and Solutions. Search on Bibsonomy Behavioral Synthesis for Hardware Security The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pranesh Santikellur, Rajat Subhra Chakraborty, Swarup Bhunia Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data Flow. Search on Bibsonomy Behavioral Synthesis for Hardware Security The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Levent Aksoy, Alexander Hepp, Johanna Baehr, Samuel Pagliarini Hardware Obfuscation of Digital FIR Filters. Search on Bibsonomy DDECS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Luca Cassano, Elia Lazzeri, Nikita Litovchenko, Giorgio Di Natale On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors. Search on Bibsonomy DDECS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. Search on Bibsonomy EIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. Search on Bibsonomy ITC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed 0001 Control Logic Obfuscation Attack in Industrial Control Systems. Search on Bibsonomy CSR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Alperen Bolat, Seyyid Hikmet Çelik, Ataberk Olgun, Oguz Ergin, Marco Ottavi ERIC: An Efficient and Practical Software Obfuscation Framework. Search on Bibsonomy DSN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rajvardhan Oak Poster - Towards Authorship Obfuscation with Language Models. Search on Bibsonomy CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Muhammad Ali, Monem Hamid, Jacob Jasser, Joachim Lerman, Samod Shetty, Fabio Di Troia Profile Hidden Markov Model Malware Detection and API Call Obfuscation. Search on Bibsonomy ICISSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Runsheng Guo 0001, Qichao Liu, Man Zhang 0004, Ning Hu, Hui Lu 0005 A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian Evolution of macro VBA obfuscation techniques. Search on Bibsonomy SIN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13James Bartusek, Giulio Malavolta Indistinguishability Obfuscation of Null Quantum Circuits and Applications. Search on Bibsonomy ITCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shahzad Muzaffar, Ibrahim Abe M. Elfadel Logic Locking of Finite-State Machines Using Transition Obfuscation. Search on Bibsonomy VLSI-SoC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Akashdeep Saha, Hrivu Banerjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay Revisiting Logic Obfuscation Using Cellular Automata. Search on Bibsonomy ASCAT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Leon Li, Alex Orailoglu JANUS-HD: Exploiting FSM Sequentiality and Synthesis Flexibility in Logic Obfuscation to Thwart SAT Attack While Offering Strong Corruption. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Rachit Garg 0001, Kristin Sheridan, Brent Waters, David J. Wu 0001 Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation. Search on Bibsonomy TCC (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qifan Yu, Pengcheng Zhang, Hai Dong, Yan Xiao 0002, Shunhui Ji Bytecode Obfuscation for Smart Contracts. Search on Bibsonomy APSEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Abhishek Jain 0002, Zhengzhong Jin Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. Search on Bibsonomy FOCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuvin Perera, Nadeem Ahmed, Salil S. Kanhere, Wen Hu, Sanjay K. Jha IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home? Search on Bibsonomy ICC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Fangyu Shen, Shuo Zhang 0011, Yaping Liu, Zhikai Yang A Survey of Traffic Obfuscation Technology for Smart Home. Search on Bibsonomy IWCMC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sying-Jyan Wang, Katherine Shu-Min Li, Chen-Yeh Lin, Song-Kong Chong Intrusion Detection and Obfuscation Mechanism for PUF-Based Authentication. Search on Bibsonomy ATS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Huixian Huang, Xiaole Cui, Shuming Zhang, Ge Li, Xiaoxin Cui An obfuscation scheme of scan chain to protect the cryptographic chips. Search on Bibsonomy ATS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Saeede Enayati, Dennis L. Goeckel, Amir Houmansadr, Hossein Pishro-Nik Constrained Obfuscation to Thwart Pattern Matching Attacks. Search on Bibsonomy ISIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shingo Sato, Keita Emura, Atsushi Takayasu Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi 0002 Loki: Hardening Code Obfuscation Against Automated Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
13Roland Meier, Vincent Lenders, Laurent Vanbever ditto: WAN Traffic Obfuscation at Line Rate. Search on Bibsonomy NDSS The full citation details ... 2022 DBLP  BibTeX  RDF
13Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. Search on Bibsonomy NDSS The full citation details ... 2022 DBLP  BibTeX  RDF
13Gaofeng He, Xiancai Xiao, Renhong Chen, Haiting Zhu, Zhaowei Zhang, Bingfeng Xu Secure and Efficient Traffic Obfuscation for Smart Home. Search on Bibsonomy GLOBECOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lin Yuan, Linguo Liu, Xiao Pu 0002, Zhao Li, Hongbo Li, Xinbo Gao 0001 PRO-Face: A Generic Framework for Privacy-preserving Recognizable Obfuscation of Face Images. Search on Bibsonomy ACM Multimedia The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nor Zakiah Gorment, Ali Selamat, Ondrej Krejcar Anti-Obfuscation Techniques: Recent Analysis of Malware Detection. Search on Bibsonomy SoMeT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Soroush Shahi, Rawan Alharbi, Yang Gao, Sougata Sen, Aggelos K. Katsaggelos, Josiah D. Hester, Nabil Alshurafa Impacts of Image Obfuscation on Fine-grained Activity Recognition in Egocentric Video. Search on Bibsonomy PerCom Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yueyao Zhao, Baihe Ma, Ziwen Wang, Zhihong Liu, Yong Zeng 0002, Jianfeng Ma 0001 Trajectory Obfuscation and Detection in Internet-of-vehicles. Search on Bibsonomy CSCWD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mohamed Khamis, Habiba Farzand, Marija Mumm, Karola Marky DeepFakes for Privacy: Investigating the Effectiveness of State-of-the-Art Privacy-Enhancing Face Obfuscation Methods. Search on Bibsonomy AVI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yifang Li, Kelly Caine Obfuscation Remedies Harms Arising from Content Flagging of Photos. Search on Bibsonomy CHI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Chenxi Qiu, Li Yan 0004, Anna Cinzia Squicciarini, Juanjuan Zhao, Chengzhong Xu 0001, Primal Pappachan TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks. Search on Bibsonomy SIGSPATIAL/GIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kamil Kluczniak Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Michael Zuzak, Yuntao Liu 0001, Isaac McDaniel, Ankur Srivastava 0001 A Combined Logical and Physical Attack on Logic Obfuscation. Search on Bibsonomy ICCAD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Tong Zhou 0002, Shaolei Ren, Xiaolin Xu ObfuNAS: A Neural Architecture Search-Based DNN Obfuscation Approach. Search on Bibsonomy ICCAD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Baihe Ma, Xiaojie Lin, Xu Wang 0004, Bin Liu 0028, Ying He 0011, Wei Ni 0001, Ren Ping Liu New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy. Search on Bibsonomy RAID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Guyue Li, Haiyu Yang, Junqing Zhang, Hongbo Liu 0002, Aiqun Hu Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. Search on Bibsonomy INFOCOM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Cosmin Irimia, Roxana Irimia, Robert Milea, Silviu Ilas, Ana Vasiliu, Adrian Iftene Obfuscation of Documents using Randomly Generated Steps. Search on Bibsonomy KES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Aayush Jain, Huijia Lin, Amit Sahai Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC0. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar 0001, Oxana Poburinnaya, Manoj Prabhakaran 0001 COA-Secure Obfuscation and Applications. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jakob Sternby, Björn Johansson, Michael Liljenstam Neural Network Model Obfuscation through Adversarial Training. Search on Bibsonomy CCGRID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Isaac McDaniel, Michael Zuzak, Ankur Srivastava 0001 A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation. Search on Bibsonomy ICCD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Mostafa Abedi, Tiancheng Yang, Yunsi Fei, Aatmesh Shrivastava High-Precision Nano-Amp Current Sensor and Obfuscation based Analog Trojan Detection Circuit. Search on Bibsonomy ISCAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Maik Fröbe, Nicola Lea Libera, Matthias Hagen City of Disguise: A Query Obfuscation Game on the ClueWeb. Search on Bibsonomy ECIR (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sandeep Sunkavilli, Nishanth Goud Chennagouni, Qiaoyan Yu DPReDO: Dynamic Partial Reconfiguration enabled Design Obfuscation for FPGA Security. Search on Bibsonomy SOCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Andrew Wintenberg, Matthew Blischke, Stéphane Lafortune, Necmiye Ozay A Dynamic Obfuscation Framework for Security and Utility. Search on Bibsonomy ICCPS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Naruaki Otsuki, Haruaki Tamada Overcoming the obfuscation method of the dynamic name resolution. Search on Bibsonomy ICSIM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Doru-Florin Chiper An Improved Algorithm for the VLSI Implementation of Type II Generalized DHT that Allows an Efficient Incorporation of Obfuscation Technique. Search on Bibsonomy TSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Brooks Olney, Robert Karam Protecting Deep Neural Network Intellectual Property with Architecture-Agnostic Input Obfuscation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Malik H. Altakrori, Thomas Scialom, Benjamin C. M. Fung, Jackie Chi Kit Cheung A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques. Search on Bibsonomy EMNLP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kimia Zamiri Azar, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor Warm Up before Circuit De-obfuscation? An Exploration through Bounded-Model-Checkers. Search on Bibsonomy HOST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Marilena Lupascu Obfuscation Techniques Based on Random Strings Used in Malicious VBA Scripts. Search on Bibsonomy SYNASC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. Search on Bibsonomy NordSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation. Search on Bibsonomy CRYPTO (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul Strategic Attacks on Recommender Systems: An Obfuscation Scenario. Search on Bibsonomy AICCSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Doru-Florin Chiper, Arcadie Cracan A New Integer Algorithm for a VLSI Implementation of DCT Using Obfuscation Technique. Search on Bibsonomy COMM The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kaiyu Yang, Jacqueline H. Yau, Li Fei-Fei 0001, Jia Deng 0001, Olga Russakovsky A Study of Face Obfuscation in ImageNet. Search on Bibsonomy ICML The full citation details ... 2022 DBLP  BibTeX  RDF
13Haocheng Ma, Qizhi Zhang, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin PathFinder: side channel protection through automatic leaky paths identification and obfuscation. Search on Bibsonomy DAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Danushka Bollegala, Tomoya Machide, Ken-ichi Kawarabayashi Query Obfuscation by Semantic Decomposition. Search on Bibsonomy LREC The full citation details ... 2022 DBLP  BibTeX  RDF
13Muhammad Usama Saleem, Dominick Reilly, Liyue Fan DP-Shield: Face Obfuscation with Differential Privacy. Search on Bibsonomy EDBT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shrenik Bhansali, Ahmet Aris, Abbas Acar, Harun Oz, A. Selcuk Uluagac A First Look at Code Obfuscation for WebAssembly. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Lorenzo Ghiro, Marco Cominelli, Francesco Gringoli, Renato Lo Cigno On the Implementation of Location Obfuscation in openwifi and Its Performance. Search on Bibsonomy MedComNet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Michael Zuzak Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries. Search on Bibsonomy 2022   RDF
13Roland Meier Improving Network Security through Obfuscation. Search on Bibsonomy 2022   RDF
Displaying result #401 - #500 of 1965 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license