Facial expression editing has a wide range of applications, such as emotion detection, human-computer interaction, and social entertainment. However, existing expression editing methods either fail to allow for fine-g...
Facial expression editing has a wide range of applications, such as emotion detection, human-computer interaction, and social entertainment. However, existing expression editing methods either fail to allow for fine-grained editing, resulting in unnatural and unrealistic facial expressions, or generate artifacts and blurs, leading to poor image quality. In this paper, we propose a novel framework called StyleAU, which is based on StyleGAN and facial action units, to address these problems. Our framework leverages the pre-trained StyleGAN prior knowledge to enable action unit editing of the face in the StyleGAN latent space, allowing precise expression editing. In addition, we use an encoder to extract multi-scale content features to achieve high-fidelity image reconstruction. Our approach qualitatively and quantitatively outperforms competing methods for action unit manipulation and expression editing.
Sending and receiving SMS is very ordinary thing for any individual’s daily life. But when at the moment, we receive undesirable SMS frequently that waste our time and money as well and consequently this moment gives...
详细信息
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
ISBN:
(纸本)9798331314385
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversarial perturbation (UAP) have not been thoroughly investigated yet. In this paper, we propose DarkSAM, the first prompt-free universal attack framework against SAM, including a semantic decoupling-based spatial attack and a texture distortion-based frequency attack. We first divide the output of SAM into foreground and background. Then, we design a shadow target strategy to obtain the semantic blueprint of the image as the attack target. DarkSAM is dedicated to fooling SAM by extracting and destroying crucial object features from images in both spatial and frequency domains. In the spatial domain, we disrupt the semantics of both the foreground and background in the image to confuse SAM. In the frequency domain, we further enhance the attack effectiveness by distorting the high-frequency components (i.e., texture information) of the image. Consequently, with a single UAP, DarkSAM renders SAM incapable of segmenting objects across diverse images with varying prompts. Experimental results on four datasets for SAM and its two variant models demonstrate the powerful attack capability and transferability of DarkSAM. Our codes are available at: https://***/CGCL-codes/DarkSAM.
Since the classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2n/2 times and their success probability are not high. To solve this problem, the corresponding qu...
详细信息
The data representation and division for finite real number in computers has always been a hot topic in the fields of scientific research and engineeringtechnology. With the research of existing real number division ...
详细信息
As a three-terminal collaborative architecture of terminal, edge and cloud, end-edge-cloud is jointly participated by multiple institutions or organizations, and has the characteristics of a hybrid trust architecture ...
As a three-terminal collaborative architecture of terminal, edge and cloud, end-edge-cloud is jointly participated by multiple institutions or organizations, and has the characteristics of a hybrid trust architecture of “partially trustworthy, globally untrustworthy”. Traditional consensus algorithm designs are mostly used in relatively unified trust model environments and do not provide a mechanism for cross-organizational cooperation. Therefore, they cannot effectively solve the trust and consensus issues between organizations. We propose an improved DPoS-PBFT consensus mechanism based on reputation scoring (mRS-DBFT). The core idea of the mRS-DBFT is to add a reputation scoring mechanism based on the DPOS-PBFT consensus algorithm. The reputation score is calculated based on factors such as the node’s historical behavior, contribution, and credibility. Nodes with higher reputation score have greater influence and decision-making power in the consensus process. This mechanism can solve the problem of mutual distrust among nodes of different organizations in the end-edge-cloud architecture, and each node participates in the consensus process based on its reputation score, thus forming a credible and consistent system, achieving cross-organizational consensus, and ensuring node trust and data consistency in an open end-edge-cloud environment. The experimental results demonstrate that the mRS-DBFT consensus algorithm helps select nodes with higher stability to participate in the consensus by evaluating the reputation of computing devices, it can reduce fluctuations in delay and improve the stability of the consensus process.
With the rapid increment of multiple users for data offloading and computation, it is challenging to guarantee the quality of service (QoS) in remote areas. To deal with the challenge, it is promising to combine aeria...
详细信息
With recent fast development of artificial intelligence and related techniques, computer-aided diagnosis is increasingly emerging. During the process of automated diagnosis, the importance of explainable decision maki...
详细信息
ISBN:
(数字)9798350373257
ISBN:
(纸本)9798350373264
With recent fast development of artificial intelligence and related techniques, computer-aided diagnosis is increasingly emerging. During the process of automated diagnosis, the importance of explainable decision making has grown significantly. Traditional black-box models have often hindered the practical implementation of automated diagnosis algorithms. To address these challenges, we propose a novel framework that seamlessly integrates prototype learning with Graph Neural Networks (GNN) while also providing post-hoc explanations. On one hand, our model achieves intrinsic interpretability by reasoning based on the similarity calculations with prototypes for each disease. On the other hand, it employs counterfactual reasoning on graphs to pinpoint the most significant features for post-hoc explanations, supporting the diagnosis process. Building on these strengths, we integrate vision-language models to effectively harness multimodal patient information, thereby capturing a more detailed understanding of their medical condition. Our experiments on real Chinese EMRs of Pulmonary diseases demonstrate that our method not only delivers precise diagnoses but also accurately identifies medical findings substantiating the diagnoses.
作者:
Fen, Li FenLei, ZhouTing, ChenHuaiyin Institute of Technology
Faculty of Computer and Software Engineering Research Center for Logic and Intelligent Computation National-Local Joint Engineering Lab of System Credibility Automatic Verification Huaian China
Aiming at the problem of low accuracy of simple classification model, based on the drinking water data set of kaggle official website, integrated learning models is proposed, which improves the precision and accuracy ...
详细信息
Most recently much effort has been made to address Internet “ossification” by exploiting network virtualization technique. It allows multiple virtual networks to share the physical substrate for delivering customize...
详细信息
Most recently much effort has been made to address Internet “ossification” by exploiting network virtualization technique. It allows multiple virtual networks to share the physical substrate for delivering customized services via heterogenous protocols or mechanisms. Recent advances enable virtual routers to flexibly migrate across multiple physical routers without interrupting network operation. With this recognition, this paper takes a further step by proposing a novel algorithmic approach to optimize network load balancing as well as resource utilization. The suggested approach is assessed through extensive simulation experiments against two other algorithmic solutions for a range of network scenarios (e.g. dense and sparse networks). The numerical result shows its effectiveness in providing the best trade-off of network load balancing and resource utilization whilst minimizing the communication overheads.
暂无评论