-
81
A Note on Perfect Correctness by Derandomization
Published 2022“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
82
Price Competition Reduction Strategies in Chinese B2C E-Commerce Markets: A Case Study
Published 2022“…Evidence shows that firms around the world are practicing price fixing and price obfuscation to reduce price competition for higher profits. …”
Get full text
Thesis -
83
A Note on Perfect Correctness by Derandomization
Published 2021“…We show a general compiler that transforms a large class of erroneous cryptographic schemes (such as public-key encryption, indistinguishability obfuscation, and secure multiparty computation schemes) into perfectly correct ones. …”
Get full text
Article -
84
Logic locking satisfiability evaluation based on machine learning techniques
Published 2024“…This scenario underscores the need for robust logic obfuscation solutions to mitigate these risks. Despite this, Boolean Satisfiability (SAT) attacks and related methods can nearly breach all advanced logic obfuscation techniques. …”
Get full text
Thesis-Master by Coursework -
85
Sustainability assurance as greenwashing
Published 2022“…Our investigation into the sustainability reporting of some of the world’s largest companies revealed deception, obfuscation, and diversion. Senior management and auditing and assurance practices must do better.…”
Journal article -
86
The Magic of ELFs
Published 2021“…In particular, we show how to use ELFs to build secure point function obfuscation with auxiliary input, as well as polynomially many hardcore bits for any one-way function. …”
Get full text
Article -
87
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Published 2021“…We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. …”
Get full text
Article -
88
Lightweight privacy preservation techniques for deep learning and inference in Internet of Things
Published 2022“…This thesis primarily studies data obfuscation as a lightweight method to preserve data privacy for cloud-based collaborative machine learning and inference in IoT. …”
Get full text
Thesis-Doctor of Philosophy -
89
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. It is efficacious to protecting the confidentiality and integrity of communication in Internet of Things (IoT) system. …”
Get full text
Thesis -
90
From “singing bright prospects” to “traversing history’s 'garbage time'”: China struggles with slowing growth
Published 2024“…As China’s growth slows, Beijing is increasingly resorting to strategies of obfuscation and censorship with regard to key economic data and economic propaganda that emphasize positive news regarding growth. …”
Journal article -
91
Securing Android applications via edge assistant third-party library detection
Published 2021“…In order to address the difficulties caused by code obfuscation, shrinkage, and optimization, we identify the invariants that are unchanged during mutation, separate TPLs from the primary code in APPs, and use these invariants to determine the contained TPLs as well as their versions. …”
Get full text
Journal Article -
92
Biologically Inspired Mechanisms for Adversarial Robustness
Published 2020“…We verify that these two mechanisms do not suffer from gradient obfuscation and study their contribution to adversarial robustness through ablation studies.…”
Get full text
Technical Report -
93
Reusable garbled circuits and succinct functional encryption
Published 2014“…Building on our succinct single-key functional encryption scheme, we show several new applications in addition to reusable garbled circuits, such as a paradigm for general function obfuscation which we call token-based obfuscation, homomorphic encryption for a class of Turing machines where the evaluation runs in input-specific time rather than worst-case time, and a scheme for delegating computation which is publicly verifiable and maintains the privacy of the computation.…”
Get full text
Get full text
Get full text
Article -
94
Accelerating scientists’ knowledge turns
Published 2012“…In particular method obfuscation obstructs reproducibility. The exchange of “Re-search Objects” rather than articles proposes a technical solution; however the obstacles are mainly social ones that require the scientific community to rethink its current value systems for scholarship, data, methods and software.…”
Journal article -
95
‘Achieved without ambiguity?’ Memorializing victimhood in Belgrade after the 1999 NATO bombing
Published 2017“…While the competition and overall debates mirror general trends of memorial architecture in the context of European politics of regret and trauma, the limited scope of the memorial and its marginality in the cityscape both reflect and enhance the continuing obfuscation of the past in Serbia.…”
Journal article -
96
Machine Learning Methods for Image-based Personalized Cancer Screening
Published 2022“…In this thesis, I will discuss our contributions in addressing the above challenges in three areas: 1) cancer risk assessment from imaging, 2) personalized screening policy design and 3) private data sharing through neural obfuscation. I have demonstrated that our clinical models offer significant improvements over the current standard of care across globally diverse patient populations. …”
Get full text
Thesis -
97
Navigating by touch: haptic Monte Carlo localization via geometric sensing and terrain classification
Published 2021“…Legged robot navigation in extreme environments can hinder the use of cameras and lidar due to darkness, air obfuscation or sensor damage, whereas proprioceptive sensing will continue to work reliably. …”
Journal article -
98
Short review on metamorphic malware detection in Hidden Markov Models
Published 2017“…In this paper, we present Hidden Markov Model as an efficient metamorphic malware detection tool by exploring the common obfuscation techniques used in malware while reviewing and comparing the different studies that adopt HMM as a detection tool.…”
Get full text
Article -
99
Nonnegative matrix factorization and metamorphic malware detection
Published 2019“…Metamorphic malware change their internal code structure by adopting code obfuscation technique while maintaining their malicious functionality during each infection. …”
Get full text
Article -
100
Machine learning for high-dimensional data analysis in hardware assurance applications
Published 2024“…It develops novel Graph Neural Network (GNN) based machine learning methods to perform circuit analysis tasks in HA, including circuit partitioning, circuit recognition, circuit obfuscation and circuit error correction. The outcome of this thesis work opens new opportunities of AI in HA.…”
Get full text
Thesis-Doctor of Philosophy