Results 71 to 80 of about 30,154 (232)

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

open access: yesIEEE Access, 2020
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun   +5 more
doaj   +1 more source

Deciphering Intricacies in Directional CO2 Conversion From Electrolysis to CO2 Batteries

open access: yesAdvanced Energy Materials, EarlyView.
This review will delve into the inherent connections and distinctions of CO2‐directed conversion in ECO2RR and CO2 batteries, in terms of product types, catalyst selection, catalytic mechanisms, and electrochemical performances, while proposing a benchmarking framework for the evaluation of CO2 batteries and innovative CO2 battery configurations for ...
Changfan Xu   +5 more
wiley   +1 more source

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

Toward Efficient Deobfuscation via Large Language Models

open access: yesIEEE Access
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi   +3 more
doaj   +1 more source

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry

open access: yesAgribusiness, EarlyView.
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley   +1 more source

Anti-semantic Analysis Script Fusion Technology [PDF]

open access: yesJisuanji kexue
In recent years,script programs have been widely used in the field of computer science.Script programs are increasingly being used in the current network environment due to their powerful functionality and high execution efficiency,simpler writing and ...
TIAN Bowen, YANG Ju, XIONG Xiaobing, DUAN Shuang, WEI Ran
doaj   +1 more source

CrossMatAgent: AI‐Assisted Design of Manufacturable Metamaterial Patterns via Multi‐Agent Generative Framework

open access: yesAdvanced Intelligent Discovery, EarlyView.
CrossMatAgent is a multi‐agent framework that combines large language models and diffusion‐based generative AI to automate metamaterial design. By coordinating task‐specific agents—such as describer, architect, and builder—it transforms user‐provided image prompts into high‐fidelity, printable lattice patterns.
Jie Tian   +12 more
wiley   +1 more source

Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented Reality

open access: yesFuture Internet
As augmented reality (AR) technologies become increasingly integrated into everyday life, privacy-maintenance concerns about their capacity to capture and process sensitive visual data also increase.
Ana Cassia Cruz   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy