Name: Jian Cao
Type: User
Company: The University of Queensland
Bio: Ph.D. candidate in computer science at The University of Queensland.
Researching high performance computing and machine learning.
Location: Brisbane, Australia
Jian Cao's Projects
CUDA implementation of data clustering using expectation maximization with a Gaussian mixture model. Supports multiple GPUs on a single node and MPI communication between multple nodes.
Parallel Simulated annealing in GPU using CUDA (used for floorplanning problem)
📋 Create your CV(curriculum vitae) at github.
DanceNet -💃💃Dance generator using Autoencoder, LSTM and Mixture Density Network. (Keras)
Android Trojan
Design Patterns for Humans™ - An ultra-simplified explanation
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x
My dot file collection.
A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks ;)
Damn Small SQLi Scanner
:speak_no_evil: Subtle and not-so-subtle shell tweaks that will slowly drive people insane.
Create tar/zip archives that can exploit directory traversal vulnerabilities
Examples files for PyQt5
FALCON: experimental PacBio diploid assembler
A comprehensive scanner for Google Cloud
The Gentoo ebuild repository mirror
A new framework in support of multiple MPI implementations for Gentoo
A `.git` folder disclosure exploit
A collection of useful .gitignore templates
My solutions to Google Code Jam 2018 problems
a simple graph module
Hexo博客搭建全攻略
ransomware open-sources
Python version of programming assignments for "Neural Networks for Machine Learning" Coursera course taught by Geoffrey Hinton.
Homebrew tap for Qt4 and dependent formulae on Sierra
Personal website
This is a part of Asc17 . Our job is to find out way to optimize musnum_wave
A python HTTP weak pass scanner
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
Download all pictures of someone's id