Attack code stream generation method, device and equipment
A code stream and generation strategy technology, applied in the field of data processing, can solve the problems of low security and stability of media products, achieve the effect of solving low security and stability and improving security and stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.
[0026] figure 1 For a schematic flowchart of a method for generating an attack code stream provided by one or more embodiments of this specification, see figure 1 , the method may specifically include the following steps:
[0027] Step 102, acquiring code stream samples to be processed;
[0028] The execution subject of the method for ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


