obfuscating
推荐文章



v.
使模糊,使混乱( obfuscate的现在分词 );使糊涂;
英英释义
obfuscate[ ɔb'fʌskeit, 'ɔbfʌskeit ]
v.make obscure or unclear
双语例句
用作动词(v.)
This message might appear if you obfuscate the solution code.
如果您对解决方案代码进行模糊处理,可能显示此消息。
He delighted in his ability to obfuscate.
他对自己有本事把别人搞得晕头转向感到得意。
The writer often obfuscates the real issues with petty details.
那作家常以细枝末节来混淆实质问题。
权威例句
On obfuscating point functionsOn obfuscating point functions
Securely Obfuscating Re-encryption
Securely Obfuscating Re-encryption
Securely Obfuscating Re-Encryption
Obfuscating Point Functions with Multibit Output
A taxonomy of obfuscating transformations
On the (Im)possibility of Obfuscating Programs
On the (Im)possibility of Obfuscating Programs
Vaikuntanathan: Securely Obfuscating Re-encryption
1. They are obfuscating the issue, as only insurance companies can.
他们在这个问题上混淆视听,也只有保险公司才做得出这种事。
《柯林斯英汉双解大词典》
2. Stop obfuscating the information and embellishing it.
不要再刻意润饰各种一塌糊涂的信息了。
youdao
3. Cards often have multiple USES in the game, further obfuscating an "optimal" sequence.
在游戏中牌通常有不同的用途,造成模糊的最理想顺序。
youdao
4. Cryptography is the process of hiding or obfuscating data so prying eyes can't understand it.
加密是隐藏或混淆数据以避免被偷窥的过程。
youdao
5. For a man who dramatised the obfuscating power of language, these poems ring with a remarkable sincerity.
对一个夸大语言混淆力的人来说,这些诗充满了不同寻常的真挚。
youdao
6. The experiment results show that obfuscating transformation can be used to improve the survivability of the malicious code.
试验结果表明模糊变换技术可以有效地提高恶意代码的生存能力。
youdao
7. We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.
论文从字节码的角度描述了不同的混淆方法,并设计了有效的方法来产生冗余代码。
youdao
8. Some of the annoying detail is stuff the bank is required to provide but Barclays goes much further than it need in offering obfuscating detail.
报告中一些恼人的细节是巴克莱按要求必须提供的东西,但它在提供令人困惑的细节方面做得太过了。
youdao
9. The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
youdao
10. The GWT compiler does a good job at reducing code size but cutting unused methods and obfuscating code to use short variable and function names, but the result is still uncompressed text.
通过去掉未被调用的方法和艰涩的代码、使用简短的变量名和方法名等方式,GWT编译器在减少代码量方面表现得非常出色,但是最后得到的代码文本仍然是未经压缩的。
youdao
11. The CFG generation process can also be attacked by obfuscating the assembly code such that one cannot determine the correct target of a jump instruction, such as using a jump through register.
攻击CFG生成进程也可以是通过混淆汇编代码以致它不能够正确地确定跳转指令的目标,比如使用寄存器指示跳转目标。
youdao
12. The CFG generation process can also be attacked by obfuscating the assembly code such that one cannot determine the correct target of a jump instruction, such as using a jump through register.
攻击CFG生成进程也可以是通过混淆汇编代码以致它不能够正确地确定跳转指令的目标,比如使用寄存器指示跳转目标。
youdao
obfuscating




