In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。
In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。
应用推荐