نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

Journal: :The Philosophical Review 2022

If there are fundamental laws of nature, can they fail to be exact? In this paper, I consider the possibility that some vague. call phenomenon nomic vagueness. characterize vagueness as existence borderline lawful worlds and presence several other accompanying features. Under certain assumptions, such prevents physical theory from being completely expressible in mathematical language. Moreover,...

2017
Matthias Hagen Martin Potthast Benno Stein

We report on the second large-scale evaluation of style obfuscation approaches in a shared task on author obfuscation, organized at the PAN 2017 lab on digital text forensics. Author obfuscation means to automatically paraphrase a given text such that state-of-the-art authorship verification approaches misjudge a given pair of documents as having been written by “different authors” if in fact t...

Journal: :Review of Industrial Organization 2019

Journal: :International Journal of Industrial Organization 2010

Journal: :ACM SIGITE Newsletter 2015

Journal: :Lili-zeitschrift Fur Literaturwissenschaft Und Linguistik 2022

Abstract In this paper, we are addressing the relationship between ambiguity and obscurity by comparing political with literary use of language. particular, considering contexts in which ambiguity, deriving from underspecification, is strategically used as a device to establish certain degree obscurity. We suggest that strategy based on an undeclared identification meanings fact distinct, thus ...

Journal: :Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2018

Journal: :International journal of scientific research in computer science, engineering and information technology 2023

In today's environment, a huge and increasing range of unauthorised practises allows hackers to get access devices private information by inserting harmful code. The purpose this research is assess the efficiency obfuscation strategies in safeguarding software against reverse engineering tampering. This study tries evaluate various approaches, such as code obfuscation, control flow data obfusca...

2018
Mahmoud Hammad Joshua Garcia

The Android platform has been the dominant mobile platform in recent years resulting inmillions of apps and security threats against those apps. Anti-malware products aim to protect smartphone users from these threats, especially frommalicious apps. However, malware authors use code obfuscation on their apps to evade detection by anti-malware products. To assess the effects of code obfuscation ...

Journal: :CoRR 2016
Gorjan Alagic Bill Fefferman

Encryption of data is fundamental to secure communication in the modern world. Beyond encryption of data lies obfuscation, i.e., encryption of functionality. It is well-known that the most powerful means of obfuscating classical programs, so-called “black-box obfuscation,” is provably impossible [BGI+01]. For years since, obfuscation was believed to always be either impossible or useless, depen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید