-
-
PSMNet代码
... with convolutional neural networks (CNNs). However, current architectures rely on patch-based Siamese networks, lacking the means to exploit context information for finding correspondence in illposed regions. To tackle this problem, we propose PSMNet, a ...
-
Denoising based new Noise model
... the problem of the joint denoising of a number of raw-
data images from a digital imaging sensor. In particular, we exploit
a recently proposed image modeling [8] that incorporates both the
signal-dependent nature of noise and the clipping of the data ...
-
-
-
-
Adaptive Identification of Acoustic Multichannel Systems
Efficient adaptive filtering algorithms that exploit the sparsity in the transform domains are presented and the relation between the signal- and the system-based sparse representations is emphasized. The presented approach in this book to acoustic echo ...
-
python灰帽子包含高清扫描和可复制两个版本.zip
... 5.1 安装Immunity Debugger
5.2 Immunity Debugger l01
5.2.1 PyCommand命令
5.2.2 PyHooks
5.3 Exploit(漏洞利用程序)开发
5.3.1 搜寻exploit友好指令
5.3.2“坏”字符过滤
5.3.3 绕过Windows下的DEP机制
5.4 破除恶意软件中的反调试例程
...
-
How to build AutoML from scratch – Alexander Mamaev – Medium.pdf
... languages rather focused on notational aspects. Thus, MDE techniques and tools cannot be deployed for such languages preventing to exploit the full potential of MDE in terms of standardised storage, exchange and transformation of models. The WebML web ...
-
Passino Biomimicry Op Con Auto Springer OSU.pdf
Biomimicry uses our scientific understanding of biological systems to exploit ideas from nature in order to construct some technology. In this book, we focus on how to use biomimicry of the functional operation of the “hardware and software”of biological ...
-
Packt.Kali.Linux.2018.2nd.Edition
...
Discover new advances and improvements to the Kali operating system
Map and enumerate your Windows network
Exploit several common Windows network vulnerabilities
Attack and defeat password schemes on Windows
Debug and reverse engineer ...
-