INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
Diffusion MRI (dMRI) allows for examining microarchitecture profiles and tissue changes using specific microstructure modeling but depends on advanced acquisition protocol and well-established biological model assumpt...
详细信息
In response to the continuous emergence of novel unknown malicious traffic and the limitations of traditional detection methods, this paper presents an unknown-category malicious traffic detection approach based on co...
详细信息
Human nervous system,which is composed of neuron and synapse networks,is capable of processing information in a plastic,dataparallel,fault-tolerant,and energy-efficient *** by the ingenious working mechanism of this m...
详细信息
Human nervous system,which is composed of neuron and synapse networks,is capable of processing information in a plastic,dataparallel,fault-tolerant,and energy-efficient *** by the ingenious working mechanism of this miraculous biological data processing system,scientists have been devoting great efforts to ar-tificial neural systems based on synaptic devices in recent *** continuous development of bioinspired sensors and synaptic devices in recent years have made it possible that artificial sensory neural systems are capable of capturing and processing stimuli informa-tion in real *** progress of biomimetic sensory neural systems could provide new methods for next-generation humanoid robotics,human-machine interfaces,and other frontier ***,this review summarized the recent progress of synaptic devices and biomimetic sensory neural ***,the opportunities and remaining challenges in the further development of biomimetic sensory neural systems were also outlined.
In the wake of developments in the field of Natural Language Processing, Question Answering (QA) software has penetrated our daily lives. Due to the data-driven programming paradigm, QA software inevitably contains bu...
详细信息
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern ...
详细信息
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern code-reuse attacks like Return-oriented Programming(ROP)***,in these victim programs,most syscall instructions lack the following ret instructions,which prevents attacks to stitch multiple system calls to implement advanced behaviors like launching a remote *** this kind of gadget greatly constrains the capability of code-reuse *** paper proposes a novel code-reuse attack method called Signal Enhanced Blind Return Oriented Programming(SeBROP)to address these *** SeBROP can initiate a successful exploit to server-side programs using only a stack overflow *** leveraging a side-channel that exists in the victim program,we show how to find a variety of gadgets blindly without any pre-knowledges or reading/disassembling the code ***,we propose a technique that exploits the current vulnerable signal checking mechanism to realize the execution flow control even when ret instructions are *** technique can stitch a number of system calls without returns,which is more superior to conventional ROP ***,the SeBROP attack precisely identifies many useful gadgets to constitute a Turing-complete *** attack can defeat almost all state-of-the-art defense *** SeBROP attack is compatible with both modern 64-bit and 32-bit *** validate its effectiveness,We craft three exploits of the SeBROP attack for three real-world applications,i.e.,32-bit Apache 1.3.49,32-bit ProFTPD 1.3.0,and 64-bit Nginx *** results demonstrate that the SeBROP attack can successfully spawn a remote shell on Nginx,ProFTPD,and Apache with less than 8500/4300/2100 requests,respectively.
The increasing adoption of hybrid clouds in organizations stems from their ability to bolster private cloud resources with additional public cloud capacity when required. However, scheduling distributed applications, ...
详细信息
The intelligent interpretation of spaceborne SAR images is an important technical field for future remote sensing applications. However, due to the imaging defects of SAR itself, it is very difficult to divide the ima...
详细信息
Interactive video object segmentation (iVOS), which aims to efficiently produce high-quality segmentation masks of the target object in a video with user interactions. Recently, numerous works are proposed to advance ...
详细信息
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified o...
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified only in the first *** most tracking algorithms have facilitated significant advances in RGB video sequences, object tracking using only RGB information is unreliable under extreme lighting conditions(e.g., dark night, rain, and foggy).
暂无评论