Hardcoded Vulnerability Mining Method in a Simulated Environment Based on Router Backdoor Detection Technology.
Songming HanJieke LuShaofeng MingPublished in: GAIIS (2024)
Keyphrases
- detection method
- experimental evaluation
- segmentation method
- high accuracy
- detection algorithm
- dynamic programming
- support vector machine svm
- real time
- case study
- objective function
- face detection
- object detection
- knowledge discovery
- line detection
- high precision
- dynamic environments
- np complete
- edge detection
- computational cost
- np hard
- evolutionary algorithm
- object recognition
- similarity measure
- computer vision
- neural network