-
1
An obfuscate implementation for Android resources index table
Published 2016-10-01Subjects: Get full text
Article -
2
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01Subjects: “…code obfuscation…”
Get full text
Article -
3
-
4
Anti-obfuscation Android application similarity detection method based on API call
Published 2018-01-01Subjects: Get full text
Article -
5
Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme
Published 2019-10-01Subjects: Get full text
Article -
6
Software watermarking scheme with cloud computing constraints
Published 2016-09-01Subjects: “…non-equivalent semantic obfuscation…”
Get full text
Article -
7
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01Subjects: Get full text
Article -
8
DNNobfus: a study on obfuscation-based edge-side model protection framework
Published 2024-04-01Subjects: Get full text
Article -
9
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01Subjects: Get full text
Article -
10
Research on deception defense techniques based on network characteristics obfuscation
Published 2021-08-01Subjects: Get full text
Article -
11
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01Subjects: Get full text
Article -
12
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01Subjects: “…code obfuscation…”
Get full text
Article -
13
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
Published 2019-08-01Subjects: Get full text
Article -
14
Research on construction of conditional exception code used in branch obfuscation
Published 2020-12-01Subjects: Get full text
Article -
15
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: Get full text
Article -
16
Obfuscation of combination circuits of digital devices from unauthorized access
Published 2019-09-01Subjects: Get full text
Article -
17
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01Subjects: Get full text
Article -
18
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01Subjects: “…obfuscation…”
Get full text
Article