obfuscating

英 [ˈɒbfʌskeɪtɪŋ] 美 [ˈɑːbfʌskeɪtɪŋ]

v.  (故意地)混淆,使困惑,使模糊不清
obfuscate的现在分词



柯林斯词典

  1. VERB (故意地)混淆,使混乱,使困惑
    To obfuscate something means to deliberately make it seem confusing and difficult to understand.
    1. They are obfuscating the issue, as only insurance companies can...
      他们在此问题上混淆视听,这事只有保险公司才做得出来。
    2. Macdonald accepted that such information could be used to manipulate, to obfuscate, and to mislead.
      麦克唐纳相信这样的信息可以用来操纵舆论,蒙蔽误导。

双语例句

  1. They are obfuscating the issue, as only insurance companies can
    他们在此问题上混淆视听,这事只有保险公司才做得出来。
  2. Treasury Department must stop fudging and obfuscating.
    首先,美国财政部应该停止搪塞和糊弄。
  3. Yet China is still obfuscating, questioning the independence of the international inquiry – conducted by South Korea, the US, the UK, Australia and Sweden – and reiterating its tired call for stability on the peninsula.
    然而,中国仍在闪烁其词,质疑国际调查(由韩国、美国、英国、澳大利亚和瑞典联合进行)的独立性,并重申其呼吁朝鲜半岛稳定的套话。
  4. He accused the government of obfuscating the issue.
    他指责政府故意混淆这个问题。
  5. This stage can be attacked by obfuscating the call instruction – say, by using a combination of the push and jump instructions.
    比如,使用进栈指令和跳转指令的一个组合,就可以混淆调用指令而实现对这个阶段的威胁。
  6. Cards often have multiple uses in the game, further obfuscating an "optimal" sequence.
    在游戏中牌通常有不同的用途,造成模糊的最理想顺序。
  7. Obfuscating data is never a good way to build confidence in an economy, whatever its growth rates.
    在数据上遮遮盖盖,从来就不是构建各方对某个经济体信心的上策,无论其增长率是多少。
  8. What sort of knucklehead uses a word like obfuscating?
    什么样的笨蛋会用像“抽象化”这样的词?
  9. Obfuscating goes one step further and involves renaming and rearranging functions and variables so that their names are shorter, making the script very difficult to read.
    混淆不用一步,涉及重新命名和重新安排的函数和变量,以使他们的名字是短,从而使脚本非常难以阅读。
  10. Further obfuscating the situation is the fact that the same phrase can be interpreted in a myriad of different ways depending on who reads it, making it hard for one to judge whether a line is excessive or not.
    事实上,同一种说法,不同的人有不同的解读,因此要判断用词是否有夸张之嫌更是困难,这使得整个情况更是扑朔迷离。
  11. Then a synopsis and a review of following categories of obfuscating transformations are given.
    随后对各种混淆变换作了简要的叙述和评论。
  12. Some of the annoying detail is stuff the bank is required to provide but Barclays goes much further than it need in offering obfuscating detail.
    报告中一些恼人的细节是巴克莱按要求必须提供的东西,但它在提供令人困惑的细节方面做得太过了。
  13. The GWT compiler does a good job at reducing code size but cutting unused methods and obfuscating code to use short variable and function names, but the result is still uncompressed text.
    通过去掉未被调用的方法和艰涩的代码、使用简短的变量名和方法名等方式,GWT编译器在减少代码量方面表现得非常出色,但是最后得到的代码文本仍然是未经压缩的。
  14. In information hiding field, there are three kinds of technologies for software protection: code obfuscating, software watermarking and tamper proofing.
    目前的软件版权保护技术主要有基于加密方法和信息隐藏技术两种。
  15. Abstract In the course of the forming and development of derived financial markets, the rational option pricing is a big problem obfuscating investors.
    在国际衍生金融市场的形成发展过程中,期权的合理定价是困扰投资者的一大难题。
  16. The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
    测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
  17. Survey on Research of Obfuscating Algorithms
    混淆算法研究综述
  18. We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code.
    论文从字节码的角度描述了不同的混淆方法,并设计了有效的方法来产生冗余代码。
  19. And we show that software robustness by obfuscating transform is reflected both by software complexity change and the increase of the code functional obscurity which are relatively independent each other. The corresponding models are constructed: system complexity model and transform obscurity model.
    文中提出迷惑变换导致的鲁棒性表现在软件复杂度变化与代码功能模糊性增加两个相对独立的层面上,并为此建立了相应的度量模型:软件系统复杂度模型与迷惑变换模糊度模型。
  20. Finally, the formal analysis method is demonstrated by considering a well-known data obfuscating transformation& variable encoding.
    最后,以一种典型的数据迷惑变换&变量编码为例,验证了该形式化分析方法的有效性。
  21. The DRM technology based on cryptography and watermark is deeply researched in this thesis, including the DRM protecting modes and the DRM protocols, the software obfuscating technique and its integrating with software watermark.
    本论文基于密码和水印对数字版权保护技术进行了深入的研究,包括数字版权保护模式及其协议研究,软件混淆技术及其与软件水印结合的研究。