News
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
You can create a release to package software, along with release notes and links to binary files, for other people to use. Learn more about releases in our docs.
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
Abstract: Image segmentation is crucial in many fields, but existing image segmentation models based on encoder-decoder networks are constrained by manual parameter tuning and the limited ...
Abstract: Dental caries is a prevalent bacterial infection, and its early and accurate detection is essential for preventing irreversible damage to dental structures. Cone-beam computed tomography ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results