Exploiting number theory for dynamic software watermarking
M Dalla Preda, M Ianni - Journal of Computer Virology and Hacking …, 2024 - Springer
Software watermarking is a protection technique which aims at combating software piracy,
thus defending intellectual property, by embedding stegosignatures or watermarks into a …
thus defending intellectual property, by embedding stegosignatures or watermarks into a …
Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities
T Huang, W Kong, J Liang, Z Ding, H Li… - Chinese Conference on …, 2023 - Springer
Human action recognition methods often focus on extracting structural and temporal
information from skeleton-based graphs. However, these approaches struggle with …
information from skeleton-based graphs. However, these approaches struggle with …
GanNoise: Defending against black-box membership inference attacks by countering noise generation
J Liang, T Huang, Z Luo, D Li, Y Li… - … Conference on Data …, 2023 - ieeexplore.ieee.org
In recent years, data privacy in deep learning has seen a notable surge of interest.
Pretrained large-scale data-driven models are potential to be attacked risky with …
Pretrained large-scale data-driven models are potential to be attacked risky with …
MKD: Mutual Knowledge Distillation for Membership Privacy Protection
S Huang, Z Liu, J Yu, Y Tang, Z Luo, Y Rao - International Conference on …, 2023 - Springer
Abstract Machine learning models are susceptible to member inference attacks, which
attempt to determine whether a given sample belongs to the training data set of the target …
attempt to determine whether a given sample belongs to the training data set of the target …
Dynamic Hierarchical Skeleton-Based Network for Human Action Recognition in Video Content
H Yang, X Li, CYC Chen - Available at SSRN 4769522, 2024 - papers.ssrn.com
Human skeleton-based action recognition represents a pivotal field of study, capturing the
intricate interplay between physical dynamics and intentional actions. Current research …
intricate interplay between physical dynamics and intentional actions. Current research …
[PDF][PDF] Effective Code Obfuscation for Python
R Acke - 2023 - documentserver.uhasselt.be
Code obfuscation is a technique that can be used to complicate the process of analyzing
and modifying programs. It transforms a program in a way that maintains its functionality …
and modifying programs. It transforms a program in a way that maintains its functionality …
[PDF][PDF] Головко ІГ
ОС Савенко, ДМ Медзатий… - ВЧЕНІ …, 2024 - tech.vernadskyjournals.in.ua
У статті розглядаються сучасні підходи до обфускації .NET коду з використанням
технологій штучного інтелекту (AI). Обфускація коду є важливим інструментом для …
технологій штучного інтелекту (AI). Обфускація коду є важливим інструментом для …