Login / Signup
Transient Key-based Obfuscation for HLS in an Untrusted Cloud Environment.
Hannah Badier
Jean-Christophe Le Lann
Philippe Coussy
Guy Gogniat
Published in:
DATE (2019)
Keyphrases
</>
third party
neural network
real world
artificial intelligence
similarity measure
steady state
reverse engineering
information retrieval
learning algorithm
information systems
decision trees
object oriented
static analysis