Bertrand Anckaert

According to our database1, Bertrand Anckaert authored at least 15 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Document Understanding Dataset and Evaluation (DUDE).
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Benchmarking Scalable Predictive Uncertainty in Text Classification.
IEEE Access, 2022

2009
Runtime Protection via Dataflow Flattening.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Towards Tamper Resistant Code Encryption: Practice and Experience.
Proceedings of the Information Security Practice and Experience, 2008

Instruction Set Limitation in Support of Software Diversity.
Proceedings of the Information Security and Cryptology, 2008

2007
Run-Time Randomization to Mitigate Tampering.
Proceedings of the Advances in Information and Computer Security, 2007

Program obfuscation: a quantitative approach.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
On the Effectiveness of Source Code Transformations for Binary Obfuscation.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

A Model for Self-Modifying Code.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Proteus: virtualization for diversified tamper-resistance.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Software Protection Through Dynamic Code Mutation.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Hybrid static-dynamic attacks against software protection mechanisms.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

2004
Steganography for Executables and Code Transformation Signatures.
Proceedings of the Information Security and Cryptology, 2004

Link-Time Optimization of IA64 Binaries.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

Software piracy prevention through diversity.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004


  Loading...