Showing 81 - 100 results of 222 for search '"obfuscation"', query time: 0.05s Refine Results
  1. 81

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2022
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  2. 82

    Price Competition Reduction Strategies in Chinese B2C E-Commerce Markets: A Case Study by Liu, Kaiwen

    Published 2022
    “…Evidence shows that firms around the world are practicing price fixing and price obfuscation to reduce price competition for higher profits. …”
    Get full text
    Thesis
  3. 83

    A Note on Perfect Correctness by Derandomization by Bitansky, Nir, Vaikuntanathan, Vinod

    Published 2021
    “…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
    Get full text
    Article
  4. 84

    Logic locking satisfiability evaluation based on machine learning techniques by Han, Yifei

    Published 2024
    “…This scenario underscores the need for robust logic obfuscation solutions to mitigate these risks. Despite this, Boolean Satisfiability (SAT) attacks and related methods can nearly breach all advanced logic obfuscation techniques. …”
    Get full text
    Thesis-Master by Coursework
  5. 85

    Sustainability assurance as greenwashing by Carmichael, D, Soonawalla, K, Stroehle, JC

    Published 2022
    “…Our investigation into the sustainability reporting of some of the world’s largest companies revealed deception, obfuscation, and diversion. Senior management and auditing and assurance practices must do better.…”
    Journal article
  6. 86

    The Magic of ELFs by Zhandry, Mark

    Published 2021
    “…In particular, we show how to use ELFs to build secure point function obfuscation with auxiliary input, as well as polynomially many hardcore bits for any one-way function. …”
    Get full text
    Article
  7. 87

    GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates by Chen, Yilei, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2021
    “…We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. …”
    Get full text
    Article
  8. 88

    Lightweight privacy preservation techniques for deep learning and inference in Internet of Things by Jiang, Linshan

    Published 2022
    “…This thesis primarily studies data obfuscation as a lightweight method to preserve data privacy for cloud-based collaborative machine learning and inference in IoT. …”
    Get full text
    Thesis-Doctor of Philosophy
  9. 89

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. It is efficacious to protecting the confidentiality and integrity of communication in Internet of Things (IoT) system. …”
    Get full text
    Thesis
  10. 90

    From “singing bright prospects” to “traversing history’s 'garbage time'”: China struggles with slowing growth by Thornton, PM

    Published 2024
    “…As China’s growth slows, Beijing is increasingly resorting to strategies of obfuscation and censorship with regard to key economic data and economic propaganda that emphasize positive news regarding growth. …”
    Journal article
  11. 91

    Securing Android applications via edge assistant third-party library detection by Tang, Zhushou, Xue, Minhui, Meng, Guozhu, Ying, Chengguo, Liu, Yugeng, He, Jianan, Zhu, Haojin, Liu, Yang

    Published 2021
    “…In order to address the difficulties caused by code obfuscation, shrinkage, and optimization, we identify the invariants that are unchanged during mutation, separate TPLs from the primary code in APPs, and use these invariants to determine the contained TPLs as well as their versions. …”
    Get full text
    Journal Article
  12. 92

    Biologically Inspired Mechanisms for Adversarial Robustness by Vuyyuru Reddy, Manish, Banburski, Andrzej, Plant, Nishka, Poggio, Tomaso

    Published 2020
    “…We verify that these two mechanisms do not suffer from gradient obfuscation and study their contribution to adversarial robustness through ablation studies.…”
    Get full text
    Technical Report
  13. 93

    Reusable garbled circuits and succinct functional encryption by Goldwasser, Shafi, Kalai, Yael Tauman, Popa, Raluca Ada, Vaikuntanathan, Vinod, Zeldovich, Nickolai

    Published 2014
    “…Building on our succinct single-key functional encryption scheme, we show several new applications in addition to reusable garbled circuits, such as a paradigm for general function obfuscation which we call token-based obfuscation, homomorphic encryption for a class of Turing machines where the evaluation runs in input-specific time rather than worst-case time, and a scheme for delegating computation which is publicly verifiable and maintains the privacy of the computation.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 94

    Accelerating scientists’ knowledge turns by Goble, C, De Roure, D, Bechhofer, S

    Published 2012
    “…In particular method obfuscation obstructs reproducibility. The exchange of “Re-search Objects” rather than articles proposes a technical solution; however the obstacles are mainly social ones that require the scientific community to rethink its current value systems for scholarship, data, methods and software.…”
    Journal article
  15. 95

    ‘Achieved without ambiguity?’ Memorializing victimhood in Belgrade after the 1999 NATO bombing by Badescu, G

    Published 2017
    “…While the competition and overall debates mirror general trends of memorial architecture in the context of European politics of regret and trauma, the limited scope of the memorial and its marginality in the cityscape both reflect and enhance the continuing obfuscation of the past in Serbia.…”
    Journal article
  16. 96

    Machine Learning Methods for Image-based Personalized Cancer Screening by Yala, Adam

    Published 2022
    “…In this thesis, I will discuss our contributions in addressing the above challenges in three areas: 1) cancer risk assessment from imaging, 2) personalized screening policy design and 3) private data sharing through neural obfuscation. I have demonstrated that our clinical models offer significant improvements over the current standard of care across globally diverse patient populations. …”
    Get full text
    Thesis
  17. 97

    Navigating by touch: haptic Monte Carlo localization via geometric sensing and terrain classification by Buchanan, R, Bednarek, J, Camurri, M, Nowicki, MR, Walas, K, Fallon, M

    Published 2021
    “…Legged robot navigation in extreme environments can hinder the use of cameras and lidar due to darkness, air obfuscation or sensor damage, whereas proprioceptive sensing will continue to work reliably. …”
    Journal article
  18. 98

    Short review on metamorphic malware detection in Hidden Markov Models by Yeong, T. Ling, Mohd Sani, Nor Fazlida

    Published 2017
    “…In this paper, we present Hidden Markov Model as an efficient metamorphic malware detection tool by exploring the common obfuscation techniques used in malware while reviewing and comparing the different studies that adopt HMM as a detection tool.…”
    Get full text
    Article
  19. 99

    Nonnegative matrix factorization and metamorphic malware detection by Ling, Yeong Tyng, Mohd Sani, Nor Fazlida, Abdullah, Mohd Taufik, Abdul Hamid, Nor Asilah Wati

    Published 2019
    “…Metamorphic malware change their internal code structure by adopting code obfuscation technique while maintaining their malicious functionality during each infection. …”
    Get full text
    Article
  20. 100

    Machine learning for high-dimensional data analysis in hardware assurance applications by Hong, Xuenong

    Published 2024
    “…It develops novel Graph Neural Network (GNN) based machine learning methods to perform circuit analysis tasks in HA, including circuit partitioning, circuit recognition, circuit obfuscation and circuit error correction. The outcome of this thesis work opens new opportunities of AI in HA.…”
    Get full text
    Thesis-Doctor of Philosophy