Login / Signup
Obfuscation for Evasive Functions.
Boaz Barak
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
Amit Sahai
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
reverse engineering
database
real time
data sets
neural network
search engine
lower bound
evolutionary algorithm
basis functions
static analysis