• 算法显著地降低快速相关攻击算法译码复杂度

    The new algorithm notably reduces the decoding complexity of the fast correlation attack algorithm.

    youdao

  • 给出了应用该算法具体步骤,并分析了攻击算法计算复杂性

    The concrete step and complexity of the attack algorithm is given.

    youdao

  • 给出了应用算法具体步骤,分析攻击算法计算复杂性。

    Researches on the Algorithm and Software of the Complexity Analysis of Electrical Noise;

    youdao

  • 门限计算降低快速相关攻击算法计算复杂度扩大算法应用范围。

    Computation of thresholds decreases the computing complexity of fast correlation attack, and extends the application of algorithms.

    youdao

  • 不幸的是,这个哈希函数不是非常安全可以通过字典攻击算法被破解类似命令行应用程序

    Unfortunately, this is not a very secure hash function, it can be a dictionary attack to break algorithm similar to the command-line application!

    youdao

  • 寻找尽可能攻击算法有免疫性的半色调图像数字水印方法持续成为研究的主要方向之一

    It would be one of the unremitting research works to seek watermarking methods for halftoned images that could resist as many attack algorithms as possible.

    youdao

  • 分析基于卷积快速相关攻击算法时,提出了快速排序匹配索引算法,用以寻找重量较小的一致校验方程。

    This paper describes a new method of fast arranging and matching and indexing for fast correlation attacks based on convolutional codes.

    youdao

  • 分析了JPEG图像信息隐藏方法各种攻击算法提出一种新的基于支持向量机(SVM)的检测算法

    After introducing some information hiding methods and steganalysis techniques for JPEG images, this paper proposes a new SVM-based blind steganalysis algorithm for JPEG images.

    youdao

  • 基于MIX匿名系统模型,提出一种改进统计命中攻击算法算法基础给出基于填充防御策略

    This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.

    youdao

  • 实现攻击攻击需要使用MD 5算法签署证书CA购买若干ssl证书。

    To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.

    youdao

  • 这种攻击并不意味着整个互联网或者SSL安全已经突破的确意味着厂商应该不再用MD 5作为签名算法

    This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.

    youdao

  • 算法签名抵抗攻击,该攻击基于置换成效率更低算法

    The algorithm names are signed to resist attacks based on the substitution of a weaker algorithm.

    youdao

  • 使用这些校验和算法中的一种可以程序遭受意外破坏机率降低少于十亿分之一(尽管故意攻击可能)。

    Using one of these checksum algorithms reduces the chance of accidental corruption to less than one in a billion (though deliberate attacks are still a possibility, as you'll see).

    youdao

  • 实验结果表明算法JPEG压缩随机噪声攻击剪切噪等具有较高的鲁棒性

    Experiment results show that this algorithm has better robustness in JPEG compression, random noising attacks, cutting and noise adding.

    youdao

  • 因此必要采用一种加密强度比较的加密算法来加密一些重要数据防止合法用户越权操作非法用户恶意攻击

    So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.

    youdao

  • 实验表明算法能够很好抵抗局部剪切攻击

    Experimental results show that, this algorithm is able to resist local cropping attack.

    youdao

  • 图像水印算法设计攻击技术互相促进对立面

    The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    youdao

  • 实验表明算法对于噪声旋转缩放JPEG压缩常见攻击有良好的鲁棒性。

    Experiment shows that the algorithm is resist in common watermarking attacks suck as noise, rotate, resize and JPEG compression.

    youdao

  • 实验结果证明基于奇异值分解水印算法常规图像处理攻击具有好的棒性,尤其是其中的量化水印算法

    The experiment results show that watermarking algorithms based on block SVD are very robust to usual image manipulation attacks, especially the quantization watermarking algorithm.

    youdao

  • 模拟实验表明TVCA算法提高计算效率抵抗恶意攻击方面取得良好效果

    The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.

    youdao

  • 同时,借鉴国内外研究成果基础上,探讨攻击路径自动生成算法以及对攻击图相关的算法之间的优缺点进行了比较。

    It has profited from the domestic and foreign research results, in this foundation, it discussed automatic production of attack path, as well as attack graph algorithm comparison.

    youdao

  • KDDCUP99数据集中进行了对比仿真实验,实验结果表明算法已知攻击未知攻击检测以及算法警率都是理想的

    The simulations on the KDD CUP99 dataset show that the detection rate of known attacks and unknown attacks and the false positive rate of this algorithm are excellent.

    youdao

  • 算法实现简单而且算法抵抗剪切压缩噪声攻击具有好的棒性。

    This scheme carries out easily and it has very good robustness when it is attacked by cut, noise and compression.

    youdao

  • 算法实现简单而且算法抵抗剪切压缩噪声攻击具有好的棒性。

    This scheme carries out easily and it has very good robustness when it is attacked by cut, noise and compression.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定