This paper presents a machine learning-based approach to detect two major forms of misinformation on social media platforms: deepfake images and social bots. For deepfake image detection, we propose a novel hybrid mod...
详细信息
This paper introduces Enhanced Deep Dehazing (EDD), a novel deep learning model that overcomes the limitations of traditional image dehazing methods. Unlike approaches that rely on complex transmission map estimation,...
详细信息
The goal of (network) intrusion detection systems is to identify unauthorized or malicious activities within a computer network. In this work we consider the following theoretical model for intrusion detection systems...
详细信息
ISBN:
(纸本)9798350386066;9798350386059
The goal of (network) intrusion detection systems is to identify unauthorized or malicious activities within a computer network. In this work we consider the following theoretical model for intrusion detection systems in large data center networks. We assume that the network is modeled as a leaf-spine-architecture with m spine nodes and n leaves. In a sequence of observation periods, each spine node stores a snapshot of the communication graph and accumulates (an approximation of) the number of alerts caused by suspicious behavior. To identify the responsible malicious nodes, we apply a distributed reconstruction algorithm based on quantitative group testing: In quantitative group testing we are given a binary signal sigma of Hamming weight k along with a querying method. Each query pools multiple entries of s together and returns the sum of the entries in the pool. The goal is to reconstruct s using as few queries as possible. Our contributions in this paper are three-fold. First we mathematically analyze a distributed reconstruction algorithm for the quantitative group testing instance induced by our intrusion detection model. In particular, we analyze the performance assuming a communication graph where each leaf sends Geom(p) many packets to the spine nodes in each time interval, where p is a parameter of the model. Second, we prove that our algorithm achieves a performance that is optimal up to logarithmic factors. Finally, we simulate our approach and provide empirical data that show that our approach works well in practice. The main novelty of our analysis is that the test-design is given by the communication graphs that are accumulated in multiple observation periods. This is in contrast to classical group testing where the algorithm is allowed to decide on the test design, and we believe that our analysis of non-standard test designs is of independent interest to the distributed group testing community.
image-to-image synthesis paradigms have been widely used for facial expression synthesis. However, current generators are apt to either produce artifacts for largely posed and non-aligned faces or unduly change the id...
详细信息
ISBN:
(纸本)9781728198354
image-to-image synthesis paradigms have been widely used for facial expression synthesis. However, current generators are apt to either produce artifacts for largely posed and non-aligned faces or unduly change the identity information like AdaIN-based generator. In this work, we suggest to use image style feature to surrogate the expression cues in the generator, and propose a multi-task learning paradigm to explore this style information via the supervision learning and feature disentanglement. While the supervision learning can make the encoded style specifically represent the expression cues and enable the generator to produce correct expression, the feature disentanglement of content and style cues enables the generator to better preserve the identity information in expression synthesis. Experimental results show that the proposed algorithm can well reduce the artifacts for the synthesis of posed and non-aligned expressions, and achieves competitive performances in terms of FID, PNSR and classification accuracy, compared with four publicly available GANs. The code and pre-trained models are available at https://***/lumanxi236/MTSS.
The limitations of edge devices in processing capacity, storage, and memory can constrain the computational complexity of edge computing in extracting information directly from data sources. This information is then f...
详细信息
This research investigates the application of deep learning techniques, including Deep Convolutional Neural Networks (DCNNs) and Conditional Generative Adversarial Networks (CGANs), for enhancing the quality of underw...
详细信息
Compressive sensing (CS) is growing as an effective method for efficient imagine capture and recovery by harnessing the fundamental sparseness of natural images. The paper presents a unique framework for CS of live im...
详细信息
Backscatter communication, which enables a battery-free backscatter tag to transmit information by using incident radio frequency (RF) signal as the carrier, is a promising solution for future green internet of Things...
详细信息
This project introduces an innovative method for enhancing license plate images by employing a blind autoencoder-based denoising and deblurring technique. Unlike conventional approaches that heavily rely on labeled tr...
详细信息
In Block based Progressive Visual Secret Sharing (BPVSS) scheme, secret image will be recovered block by block from noise-like and meaningful shares. It is found that only meaningful shares are user-friendly. But the ...
详细信息
暂无评论