UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Obscurantist Obfuscation Presentation
会议地点: Lingnan University, 会议日期: September 16th 2024, 报告日期: 2024-09-01
Authors:  BENJAMIN IAN WINOKUR
Favorite |  | Submit date:2024/09/19
Obfuscation  Obscurantism  Pseudoprofundity  Epistemology  
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks Journal article
Xu, Chongyao, Zhang, Litao, Mak, Pui In, Martins, Rui P., Law, Man Kay. Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling Attacks[J]. IEEE Transactions on Information Forensics and Security, 2024, 19, 3927-3942.
Authors:  Xu, Chongyao;  Zhang, Litao;  Mak, Pui In;  Martins, Rui P.;  Law, Man Kay
Favorite | TC[WOS]:2 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2024/05/16
Physical Unclonable Function (Puf)  Machine Learning (Ml)  Modeling Attack  Symmetrical Obfuscated Interconnection (Soi)  Challenge Obfuscation  Reverse Engineering (Re)  
TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks Conference paper
Qiu, Chenxi, Yan, Li, Squicciarini, Anna, Zhao, Juanjuan, Xu, Chengzhong, Pappachan, Primal. TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks[C], 2022, 1-10.
Authors:  Qiu, Chenxi;  Yan, Li;  Squicciarini, Anna;  Zhao, Juanjuan;  Xu, Chengzhong; et al.
Favorite | TC[WOS]:0 TC[Scopus]:4 | Submit date:2023/01/31
Location Obfuscation  Location Privacy  Traffic Flow  
A robust anti-tamper protection scheme Conference paper
Tsang H.-C., Lee M.-C., Pun C.-M.. A robust anti-tamper protection scheme[C], 2011, 109-118.
Authors:  Tsang H.-C.;  Lee M.-C.;  Pun C.-M.
Favorite | TC[Scopus]:5 | Submit date:2019/02/14
Anit-tamper  N-version Functions  Obfuscation  Protectors  Software Protection