Results 61 to 70 of about 19,819 (285)
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis +5 more
doaj +1 more source
DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps
The Android packing techniques were originally used to pack and conceal important information of the apps to prevent malicious developers from deconstructing the software logic.
Caijun Sun +5 more
doaj +1 more source
A reconfigurable physical unclonable function is developed using CMOS‐integrated SOT‐MRAM chips, leveraging a dual‐pulse strategy and offering enhanced environmental robustness. A temperature‐compensation effect arising from the CMOS transistor and SOT‐MTJ is revealed and established as a key prerequisite for thermal resilience.
Min Wang +7 more
wiley +1 more source
On the Activity Privacy of Blockchain for IoT
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali +3 more
core +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
A note on the concept of obfuscation.
In this paper we address the issue of defining security of program obfuscation. We argue that requirements to obfuscated programs may be different and are dependent on potential applications. Therefore three distinct models are suggested for studying the
N.P. Varnovsky
doaj
Diversified Compilation Method Based on LLVM [PDF]
When diversifying projects composed of multiple C/C++ source files, most of the existing software diversification tools adopt the same diversification method for all functions in a single C/C++ source file, which leads to a single diversification method ...
CHEN Yingchao, WANG Junchao, PANG Jianmin, YUE Feng
doaj +1 more source
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee +7 more
wiley +1 more source
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya +3 more
wiley +1 more source
Obfuscation-Resilient Software Plagiarism Detection with JPlag
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Sağlam +3 more
openaire +3 more sources

