他的所有这些风格特征都受到攻击者模仿嘲弄。
All these peculiarities of his style have been parodied by his assailants.
但是,如果系统能接受一个听起来象“病人”一样类似的声音,则会给那些适当模仿系统有效用户的声音的攻击者钻空子。
However, if the system will accept a similar voice that sounds "sick," then it's more likely to fall prey to attackers who can reasonably mimic the voice of valid users of the system.
但是也引起了很多个人操盘的小公司的模仿和攻击。
But also caused a lot of individual small companies hailun imitation and attacks.
舞狮人的动作要协调,因为他们模仿的是狮子接近猎物,步伐要狡猾,要有狩猎的攻击性。
The dancers move in unison as they mimic the animal's approach to a carcass, the slyness of the walk and the aggressiveness of an attack.
虽然部分精神病患者会有直观的攻击性与破坏性,但快乐的成长环境等因素却可以帮助某些患者通过模仿同事以融合在工作环境中。
While some psychopaths are outwardly aggressive and destructive, factors like a happy upbringing can help others to mimic colleagues and fit in at work.
功夫的不少套路都源自动物的动作,各种遮挡、攻击动作和姿式都模仿特定动物的举动。
Quite a number of kungfu styles derive from movements of animals, with various blocks, attacks, and stances derived from and done in imitation of particular animals' movements.
当你的身体认为在与链球菌感染做斗争时,从链球菌到西德纳姆舞蹈症的生物连锁反应就开始了,实际你启动了攻击自身的一个过程,称为分子模仿。
The biological cascade from strep to Sydenham's starts when the body, thinking it is fighting the infection, begins to fight itself in a process known as molecular mimicry.
针对认知无线电网络中出现的模仿主用户攻击和自私行为攻击问题,提出一种基于簇的分布式认知无线电网络安全体系结构。
To solve the primary user emulation attack and selfish misbehaviors in cognitive radio networks, this paper presents cluster-based security architecture for distributed cognitive radio networks.
SVM分类器的学习样本是模仿各种多矢量曲线变换和攻击下,相应产生了由多曲线检测相关值构成的特征向量。
The study samples of SVM classification are imitating all kinds of eigenvector, which are detected from the attacked and transformed curves.
“所有特点已经被他的崇拜者所仿效并被他的攻击者所嘲弄地模仿了”。
All these peculiarities have been imitated by his admirers and parodied by his assailants "."
“所有特点已经被他的崇拜者所仿效并被他的攻击者所嘲弄地模仿了”。
All these peculiarities have been imitated by his admirers and parodied by his assailants "."
应用推荐