Exploiting number theory for dynamic software watermarking

M Dalla Preda, M Ianni - Journal of Computer Virology and Hacking …, 2024 - Springer
Software watermarking is a protection technique which aims at combating software piracy,
thus defending intellectual property, by embedding stegosignatures or watermarks into a …

Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities

T Huang, W Kong, J Liang, Z Ding, H Li… - Chinese Conference on …, 2023 - Springer
Human action recognition methods often focus on extracting structural and temporal
information from skeleton-based graphs. However, these approaches struggle with …

GanNoise: Defending against black-box membership inference attacks by countering noise generation

J Liang, T Huang, Z Luo, D Li, Y Li… - … Conference on Data …, 2023 - ieeexplore.ieee.org
In recent years, data privacy in deep learning has seen a notable surge of interest.
Pretrained large-scale data-driven models are potential to be attacked risky with …

MKD: Mutual Knowledge Distillation for Membership Privacy Protection

S Huang, Z Liu, J Yu, Y Tang, Z Luo, Y Rao - International Conference on …, 2023 - Springer
Abstract Machine learning models are susceptible to member inference attacks, which
attempt to determine whether a given sample belongs to the training data set of the target …

Dynamic Hierarchical Skeleton-Based Network for Human Action Recognition in Video Content

H Yang, X Li, CYC Chen - Available at SSRN 4769522, 2024 - papers.ssrn.com
Human skeleton-based action recognition represents a pivotal field of study, capturing the
intricate interplay between physical dynamics and intentional actions. Current research …

[PDF][PDF] Effective Code Obfuscation for Python

R Acke - 2023 - documentserver.uhasselt.be
Code obfuscation is a technique that can be used to complicate the process of analyzing
and modifying programs. It transforms a program in a way that maintains its functionality …