![An Introduction to Monotonic Stack](/content/images/size/w720/2024/06/mono-stack.png)
![An Introduction to Monotonic Stack](/content/images/size/w720/2024/06/mono-stack.png)
![Buffer Overflow Attack from the Ground-up III: Canary](/content/images/size/w720/2024/06/buffer-overflow-canary.png)
Buffer Overflow Attack from the Ground-up III: Canary
![Binary Indexed Tree: A Data Structure that Can Enhance Query Performance in Arrays](/content/images/size/w720/2024/06/bit.png)
Binary Indexed Tree: A Data Structure that Can Enhance Query Performance in Arrays
![Buffer Overflow Attack from the Ground-up II: Gadget and Shell Code Injection](/content/images/size/w720/2024/06/buffer-overflow-gadget-1.png)
Buffer Overflow Attack from the Ground-up II: Gadget and Shell Code Injection
![Buffer Overflow Attack from the Ground-up I: Simple Overflow](/content/images/size/w720/2024/06/buffer-overflow-1.png)
Buffer Overflow Attack from the Ground-up I: Simple Overflow
![An Introduction to SHA256 Hash Extension Attack](/content/images/size/w720/2024/05/hash-extension.png)
An Introduction to SHA256 Hash Extension Attack
![An Introduction to Kafka and Samza for Stream Data Processing](/content/images/size/w720/2024/05/kafka-samza.png)
An Introduction to Kafka and Samza for Stream Data Processing
![An Introduction of NestJS, a Node.js web/app server framework.](/content/images/size/w720/2024/05/backend-arch.png)
An Introduction of NestJS, a Node.js web/app server framework.
![Prefix Sum with HashMap: Time Complexity Optimization](/content/images/size/w720/2024/05/prefix-sum-hashmap.png)
Prefix Sum with HashMap: Time Complexity Optimization
![Disjoint Set: City Connection Problem](/content/images/size/w720/2024/05/disjoint-set.png)
Disjoint Set: City Connection Problem
![Neural Networks Series II: Forming Vision - How a Convolutional Neural Network Learns](/content/images/size/w720/2024/05/cnn.png)
Neural Networks Series II: Forming Vision - How a Convolutional Neural Network Learns
![Understanding Naïve Bayes Algorithm: Play with Probabilities](/content/images/size/w720/2024/05/naive-bayes.png)
Understanding Naïve Bayes Algorithm: Play with Probabilities
![Gradient Attack: A Brief Explanation on Adversarial Attack](/content/images/size/w720/2024/05/adv-attack.png)
Gradient Attack: A Brief Explanation on Adversarial Attack
![Implementing JPEG Image Compression Algorithm using MATLAB](/content/images/size/w720/2024/05/jpeg.png)
Implementing JPEG Image Compression Algorithm using MATLAB
RSA Digital Signatures and Public-Key Cryptosystems
![Front-end Walkthrough: Web Frameworks, JAMStacks and Native Apps](/content/images/size/w720/2024/05/jamstack.png)
Front-end Walkthrough: Web Frameworks, JAMStacks and Native Apps
![Neural Networks Series I: Loss Optimization - Implementing Neural Networks from Scratch](/content/images/size/w720/2024/05/neural-network.png)
Neural Networks Series I: Loss Optimization - Implementing Neural Networks from Scratch
![Eight Queens Problem: Classical Puzzles](/content/images/size/w720/2024/05/eight-queens.png)
Eight Queens Problem: Classical Puzzles
![Dispatching Oracle: Three Examples in solving Synchronization](/content/images/size/w720/2024/05/synchronization.png)