Constrained Obfuscation to Thwart Pattern Matching Attacks | IEEE Conference Publication | IEEE Xplore