×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
THE STATE KEY LA... [1]
Faculty of Arts ... [1]
INSTITUTE OF MIC... [1]
Authors
RUI PAULO DA SIL... [1]
MAK PUI IN [1]
PUN CHI MAN [1]
LAW MAN KAY [1]
CHENGZHONG XU [1]
BENJAMIN IAN WIN... [1]
More...
Document Type
Conference paper [2]
Journal article [1]
Presentation [1]
Date Issued
2024 [2]
2022 [1]
2011 [1]
Language
英語English [3]
Source Publication
GIS: Proceedings... [1]
IEEE Transaction... [1]
Proceedings of t... [1]
Indexed By
CPCI-S [1]
SCIE [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-4 of 4
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Obscurantist Obfuscation
Presentation
会议地点: Lingnan University, 会议日期: September 16th 2024, 报告日期: 2024-09-01
Authors:
BENJAMIN IAN WINOKUR
Favorite
|
|
Submit date:2024/09/19
Obfuscation
Obscurantism
Pseudoprofundity
Epistemology
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks
Journal article
Xu, Chongyao, Zhang, Litao, Mak, Pui In, Martins, Rui P., Law, Man Kay. Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 3927-3942.
Authors:
Xu, Chongyao
;
Zhang, Litao
;
Mak, Pui In
;
Martins, Rui P.
;
Law, Man Kay
Favorite
|
TC[WOS]:
2
TC[Scopus]:
4
IF:
6.3
/
7.3
|
Submit date:2024/05/16
Physical Unclonable Function (Puf)
Machine Learning (Ml)
Modeling Attack
Symmetrical Obfuscated Interconnection (Soi)
Challenge Obfuscation
Reverse Engineering (Re)
TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks
Conference paper
Qiu, Chenxi, Yan, Li, Squicciarini, Anna, Zhao, Juanjuan, Xu, Chengzhong, Pappachan, Primal. TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks[C], 2022, 1-10.
Authors:
Qiu, Chenxi
;
Yan, Li
;
Squicciarini, Anna
;
Zhao, Juanjuan
;
Xu, Chengzhong
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
4
|
Submit date:2023/01/31
Location Obfuscation
Location Privacy
Traffic Flow
A robust anti-tamper protection scheme
Conference paper
Tsang H.-C., Lee M.-C., Pun C.-M.. A robust anti-tamper protection scheme[C], 2011, 109-118.
Authors:
Tsang H.-C.
;
Lee M.-C.
;
Pun C.-M.
Favorite
|
TC[Scopus]:
5
|
Submit date:2019/02/14
Anit-tamper
N-version Functions
Obfuscation
Protectors
Software Protection