Loading…
Loading…
Natural and Effective Obfuscation by Head Inpainting
Sun, Qianru, Ma, Liqian, Joon Oh, Seong, Gool, Luc Van, Schiele, Bernt, Fritz, Mario
Published in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (01.06.2018)
Published in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (01.06.2018)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Obfuscation of Documents using Randomly Generated Steps
Irimia, Cosmin, Irimia, Roxana, Milea, Robert, Ilas, Silviu, Vasiliu, Ana, Iftene, Adrian
Published in Procedia computer science (2022)
Published in Procedia computer science (2022)
Get full text
Journal Article
Loading…
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
Ceccato, Mariano, Di Penta, Massimiliano, Falcarin, Paolo, Ricca, Filippo, Torchiano, Marco, Tonella, Paolo
Published in Empirical software engineering : an international journal (01.08.2014)
Published in Empirical software engineering : an international journal (01.08.2014)
Get full text
Journal Article
Loading…
Loading…
Loading…
Low-dose metabolism of benzene in humans: science and obfuscation
Rappaport, S. M., Kim, S., Thomas, R., Johnson, B. A., Bois, F. Y., Kupper, L. L.
Published in Carcinogenesis (New York) (01.01.2013)
Published in Carcinogenesis (New York) (01.01.2013)
Get full text
Journal Article
Loading…
Aggregation-based obfuscation method for electronic systems design
Ponomarenko, Olha, Gorbachov, Valeriy
Published in Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) (30.09.2024)
Published in Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) (30.09.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
Orencik, Cengiz, Selcuk, Ayse, Savas, Erkay, Kantarcioglu, Murat
Published in International journal of information security (01.06.2016)
Published in International journal of information security (01.06.2016)
Get full text
Journal Article
Loading…
On the Capacity of Scalar Gaussian Channels Subject to State Obfuscation
Lev, Omri, Ho, Matthew, Wang, Ligong, Wornell, Gregory W.
Published in Allerton Conference on Communication, Control, and Computing : proceedings (24.09.2024)
Published in Allerton Conference on Communication, Control, and Computing : proceedings (24.09.2024)
Get full text
Conference Proceeding
Loading…
A Generative Model for Speech Segmentation and Obfuscation for Remote Health Monitoring
Vatanparvar, Korosh, Nathan, Viswam, Nemati, Ebrahim, Rahman, Md Mahbubur, Kuang, Jilong
Published in Proceedings (International Conference on Wearable and Implantable Body Sensor Networks : Print) (01.05.2019)
Published in Proceedings (International Conference on Wearable and Implantable Body Sensor Networks : Print) (01.05.2019)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Efficient chaff-aided obfuscation in resource constrained environments
Ciftcioglu, Ertugrul N., Hardy, Rommie L., Scott, Lisa M., Chan, Kevin S.
Published in MILCOM IEEE Military Communications Conference (01.10.2017)
Published in MILCOM IEEE Military Communications Conference (01.10.2017)
Get full text
Conference Proceeding