CN112102808A
|
|
Method and system for constructing deep neural network for voice forgery
|
CN111913834A
|
|
Mimicry integrated processing system and method for biological characteristic task
|
CN111914288A
|
|
Multi-service analysis processing management system based on biological characteristics
|
CN111710031A
|
|
Method for breaking password of intelligent terminal device by counterfeiting portrait
|
CN111710029A
|
|
Method for breaking password of intelligent terminal device by fake fingerprint
|
CN111710030A
|
|
AI-based system and method for resisting deep forgery portrait
|
CN111460493A
|
|
SQ L database construction method based on mimicry structure
|
CN111444537A
|
|
Log processing method and system suitable for mimicry environment
|
CN111444536A
|
|
Database design method and system suitable for mimicry environment
|
CN110177084A
|
|
Distributed memory system meta-service structure, construction method and system architecture for defending against network attacks
|
CN107395414A
|
|
A kind of negative feedback control method and system based on output ruling
|
CN107222494A
|
|
A kind of SQL injection attack defending component and method
|
CN107346272A
|
|
The determination method and apparatus of dynamic heterogeneous redundant system
|
CN107358105A
|
|
Isomery function equivalence body phase opposite sex measuring method, distribution method, device and equipment
|
CN107147751A
|
|
Domain name analytic method and device
|
CN107295116A
|
|
A kind of domain name analytic method, apparatus and system
|
CN106713131A
|
|
Multi-BGP routing instance parallel execution device
|
CN106713263A
|
|
System and method for on-demand dynamic authentication and connection of users in local area network
|
CN106713262A
|
|
Heterogeneous execution body dynamic scheduling device based on credibility and scheduling method thereof
|
CN106603414A
|
|
Routing table fast comparing method
|