Our experimental results illustrate the ability of the proposed representation
to preserve the performance of protected systems. Moreover, we demonstrate that the security of
our approach is sufficiently robust to the zero effort and brute force attacks.