Login / Signup
Obfuscation using Tensor Products.
Craig Gentry
Charanjit S. Jutla
Published in:
Electron. Colloquium Comput. Complex. (2018)
Keyphrases
</>
higher order
reverse engineering
control flow
neural network
high order
diffusion tensor
dimensionality reduction
static analysis
malware detection
face recognition
optical flow
anisotropic diffusion
data transformation
structure tensor
dt mri
tensor space