Obfuscating Simple Functionalities from Knowledge Assumptions.
Ward BeullensHoeteck WeePublished in: Public Key Cryptography (2) (2019)
Keyphrases
- knowledge sharing
- prior knowledge
- knowledge based systems
- knowledge acquisition
- data sets
- knowledge base
- domain knowledge
- higher level
- knowledge extraction
- database
- knowledge sources
- raw data
- data mining techniques
- knowledge management
- knowledge discovery
- user interface
- similarity measure
- computer vision
- artificial intelligence