Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Lyu, Xiao"'
Publikováno v:
Jisuanji kexue, Vol 49, Iss 12, Pp 353-361 (2022)
The hijacking attack for software online upgrade is one of the most common methods of network attack.Program ana-lysis is an important method to evaluate the security of software upgrade quickly and automatically.Rapid reverse positioning of upgrade
Externí odkaz:
https://doaj.org/article/9713f775d03b429b994c04b3d9fad281
Publikováno v:
Jisuanji kexue, Vol 49, Iss 11, Pp 141-147 (2022)
Skin detection has been a widely studied computer vision topic for many years,whereas remains a challenging task.Previous methods celebrate their success in various ordinary scenarios but still suffer from fragmentary prediction and poor generalizati
Externí odkaz:
https://doaj.org/article/10559e88cebc44cbb3e4f8b7ff909e45
Publikováno v:
Jisuanji kexue, Vol 49, Iss 11, Pp 326-334 (2022)
Kernel vulnerability attack is a common attack way for operating systems,and the analysis of each attack stage is the key to defend against such attacks.Due to the complexity and variety of kernel vulnerability types,trigger paths,and exploit modes,i
Externí odkaz:
https://doaj.org/article/d1815a885ef84d1faa6b9dd62065afbc
Publikováno v:
Jisuanji kexue, Vol 49, Iss 9, Pp 92-100 (2022)
With the deep integration of computer technology into social life,more and more short text messages are spreaded all over the web platform.Aiming at the problem of data sparsity of short texts,a robust heterogeneous information network framework(HTE)
Externí odkaz:
https://doaj.org/article/79993389f7ac4720aeaaab762a9ab5a2
Publikováno v:
Jisuanji kexue, Vol 49, Iss 4, Pp 174-187 (2022)
In view of the needs of applications such as human-computer interaction(HCI) systems and virtual reality(VR) systems, the study on theories and methods of 3D gesture tracking has become one of the hot issues with widespread concern at home and abroad
Externí odkaz:
https://doaj.org/article/6c34c21683874469bcbf5374d2ab356b