Lecture Collection

Distributed ML Yibo Zhu

Major topics of how a distributed machine learning, the main idea is to use the idea of ​​water-related scheduling instructions.

IoT Zhenjiang Li

  1. The card is based on a variety of common PIN for authentication, then the cardholder has not offered himself as long as the password to use.
    The study was designed primarily a tag array of 3 * 3, press human finger, corresponds to a part of the system, change the system of resistors, capacitors, inductors and other parameters, and a portion of the circuit design, one of the human there is a separate parameter mapping space, such that the space between the user's relative verified independently.

  2. Smart watch can sense some of the actions of the human hand (for example, by various actions of the screen), so as to be able to get some private information about the phone, and then if the hacker can hack into a smart watch, then the consequences will be. . .

  3. Some sample design attack, some of the white noise + after the human voice, through the neural network trained and expected results completely different, so as to achieve the purpose of the attack. This article is an attack, as long as create samples on it. The main test the impact of environmental sounds and distance attacks.

Guess you like

Origin www.cnblogs.com/babydragon/p/12083098.html