Sign in

Implementing Indistinguishability Obfuscation Using GGH15.

Zheng ZhangFangguo ZhangHuang Zhang
Published in: Inscrypt (2017)
Keyphrases
  • reverse engineering
  • neural network
  • static analysis
  • efficient implementation
  • control flow
  • malware detection