نتایج جستجو برای: input indistinguishable

تعداد نتایج: 234374  

Journal: :IACR Cryptology ePrint Archive 2017
Lukas Zobernig Steven D. Galbraith Giovanni Russello

Opaque predicates are a commonly used technique in program obfuscation, intended to add complexity to control flow and to insert dummy code or watermarks. We survey a number of methods to remove opaque predicates from obfuscated programs, hence defeating the intentions of the obfuscator. Our main contribution is an obfuscation technique that introduces opaque constant predicates that are provab...

Journal: :IEEE transactions on image processing 2021

Facial expression transfer between two unpaired images is a challenging problem, as fine-grained typically tangled with other facial attributes. Most existing methods treat an application of manipulation, and use predicted global expression, landmarks or action units (AUs) guidance. However, the prediction may be inaccurate, which limits performance transferring expression. Instead using interm...

Journal: :Journal of experimental botany 2006
Timothy E Proseus John S Boyer

Plants enlarge mostly because the walls of certain cells enlarge, with accompanying input of wall constituents and other factors from the cytoplasm. However, the enlargement can occur without input, suggesting an uncertain relationship between cytoplasmic input and plant growth. Therefore, the role of the input was investigated by quantitatively comparing growth in isolated walls (no input) wit...

Journal: :Cerebral cortex 2016
Amir Zarrinpar Edward M Callaway

Pyramidal neurons in layer 5 of the neocortex can be differentiated into 3 cell subtypes: 1) short regular spiking (SH), 2) tall regular spiking (TR), and 3) tall burst spiking (TB), based on their morphological and electrophysiological properties. We characterized the functional excitatory local input to these 3 cell subtypes in rat primary visual cortex using laser-scanning photostimulation. ...

2012
Wen Ming Liu Lingyu Wang Kui Ren Pengsu Cheng Mourad Debbabi

While web-based applications are becoming increasingly ubiquitous, they also present new security and privacy challenges. In particular, recent research revealed that many high profile Web applications might cause private user information to leak from encrypted traffic due to side-channel attacks exploiting packet sizes and timing. Moreover, existing solutions, such as random padding and packet...

2016
Mattia Walschaers Mark Fannes

Mattia Walschaers,1, 2, ∗ Andreas Buchleitner,1 and Mark Fannes2 1Physikalisches Institut, Albert-Ludwigs-Universität Freiburg, Hermann-Herder-Str. 3, D-79104 Freiburg, Germany 2Instituut voor Theoretische Fysica, KU Leuven, Celestijnenlaan 200D, B-3001 Heverlee, Belgium (Dated: June 10, 2016) Abstract We study particle currents for indistinguishable particles driven far from equilibrium. Our g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید