Login / Signup
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation.
Dongxue Pan
Hongda Li
Peifang Ni
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
reverse engineering
malware detection
control flow
static analysis
data transformation
artificial neural networks
input data
relational databases
database
case study
business processes
data quality
website
artificial intelligence
learning algorithm
neural network
databases