搜索资源列表
ufogame
- 用java实现的UFO攻击游戏,里面有代码和可执行文件,操作简单,用鼠标左键单击UFO, 每击落10架之后,就会增加一架。-used to achieve the UFO attack game, and they code and executable files, simple operation, using the left mouse button click UFO, each downed 10, will be an increase.
watermark-MATLAB
- 数字水印技术是当前比较流行的防盗版技术,本程序包括水印的嵌入,一般攻击,水印提取,水印的检测-digital watermarking technology is currently more popular anti-piracy technology, the process includes the embedded watermark, the general attack Extraction watermark, watermark detection
imlogpolar
- 实现图像的对数极坐标变换,具有旋转不变性,可用于数字水印的抗几何攻击-achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
n-Queen
- 算法设计:著名的n后问题:在nXn的棋盘上放彼此不受攻击的n个皇后,按国际象棋的规则,任何2个皇后不在同一行或同一列或同一斜线上. 本算法才用回朔法来解决.-algorithm design : n after the famous question : In nXn put on the chessboard of each other against attack n empress, according to the international rules of chess, any
AeroModelHighAlpha
- 一段用于飞行器大攻角情况的matlab源程序,希望对从事航空工程设计的人员有一些用途.-aircraft for a large angle of attack of the Matlab source, hope to engage in aeronautical engineering design of some use.
adhi
- 国际象棋中,如果把八个皇后放到8*8的国际象棋棋盘上 ,并且使得任何两个皇后之间都不能互相攻击,请问一共有多少种方法,你能把这些方法找出来吗? -international chess, if the Queen's decentralization 8 8 8 * The International Chess chessboard, and makes between any two Queen's not attack each other, ask a number of
jiaxajw
- 国际象棋中,如果把八个皇后放到8*8的国际象棋棋盘上 ,并且使得任何两个皇后之间都不能互相攻击,请问一共有多少种方法,你能把这些方法找出来吗?-international chess, if the Queen's decentralization 8 8 8 * The International Chess chessboard, and makes between any two Queen's not attack each other, ask a number of
040320161
- 在n×n 格的棋盘上放置彼此不受攻击的车。按照国际象棋的规则,车可以攻击与之处 在同一行或同一列上的棋子。在棋盘上的若干个格中设置了堡垒,战车无法穿越堡垒攻击别 的战车。对于给定的设置了堡垒的n×n格棋盘,设法放置尽可能多彼此不受攻击的车。用概率算法实现的!-n n grid placed on the chessboard of each other against attack vehicles. According to the rules of chess, with cars can
attack
- 一套由matlab编程的基于小波的水印应用图片例子-A set of matlab programming applications based on wavelet image watermark example
fn_collusion_attack
- Matlab Function of Collusion Attack
attack.m.tar
- Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
chi-square
- chi square attack for steganogrpahy
Research-on-Side-Channl-Attack
- 旁道攻击是一种针对密码设备的新型攻击技术。本文介绍旁道攻击技术,描述了旁道攻击技术的发展概况,给出和分析了一种可防旁道攻击的模指算法。-Side channel attack is an attack against the password for the new equipment technology. This article describes the technical side channel attack, describes the technology development
gongji
- 数字水印图像的攻击测试 包括滤波、剪切、添加噪声、jepg压缩攻击-Attack test digital watermarking images, including filtering, cropping, adding noise, jepg compression attack, etc.
attack
- 虚拟机器人足球比赛的源程序代码,能攻善守-Virtual robot soccer game source code, can be good defensive attack
Attack-location
- To locate attack in WIFI
Attack-location
- To locate attack in WIFI
SinglePiexelAttack
- 基于foolbox的单像素攻击,使用MNIST数据集(Single pixel attack based on foolbox and using MNIST data set)
one-pixel-attack-keras-master
- 深度学习中的对抗样本攻防方向的单像素攻击keras代码(Keas Code Against Sample Single Pixel Attacks)