Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the...
详细信息
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the generated counterfeit facial images have become increasingly challenging to distinguish. There is an urgent need for a more robust and convincing detection method. Current detection methods mainly operate in the spatial domain and transform the spatial domain into other domains for analysis. With the emergence of transformers, some researchers have also combined traditional convolutional networks with transformers for detection. This paper explores the artifacts left by Deepfakes in various domains and, based on this exploration, proposes a detection method that utilizes the steganalysis rich model to extract high-frequency noise to complement spatial features. We have designed two main modules to fully leverage the interaction between these two aspects based on traditional convolutional neural networks. The first is the multi-scale mixed feature attention module, which introduces artifacts from high-frequency noise into spatial textures, thereby enhancing the model's learning of spatial texture features. The second is the multi-scale channel attention module, which reduces the impact of background noise by weighting the features. Our proposed method was experimentally evaluated on mainstream datasets, and a significant amount of experimental results demonstrate the effectiveness of our approach in detecting Deepfake forged faces, outperforming the majority of existing methods.
Spreadsheets contain a lot of valuable data and have many practical *** key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identifying cell fu...
详细信息
Spreadsheets contain a lot of valuable data and have many practical *** key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identifying cell function types and discovering relationships between cell *** existing methods for understanding the semantic structure of spreadsheets do not make use of the semantic information of cells.A few studies do,but they ignore the layout structure information of spreadsheets,which affects the performance of cell function classification and the discovery of different relationship types of cell *** this paper,we propose a Heuristic algorithm for Understanding the Semantic Structure of spreadsheets(HUSS).Specifically,for improving the cell function classification,we propose an error correction mechanism(ECM)based on an existing cell function classification model[11]and the layout features of *** improving the table structure analysis,we propose five types of heuristic rules to extract four different types of cell pairs,based on the cell style and spatial location *** experimental results on five real-world datasets demonstrate that HUSS can effectively understand the semantic structure of spreadsheets and outperforms corresponding baselines.
Previous traffic control models were usually developed on small or medium sized road *** traffic control models applicable to large-scale road networks have received growing *** this study,we develop a new mobility fi...
详细信息
Previous traffic control models were usually developed on small or medium sized road *** traffic control models applicable to large-scale road networks have received growing *** this study,we develop a new mobility field and gradient-based traffic signal control approach applicable to large road ***,we introduce an emerging analytical technique,the mobility field approach,to generate the mobility field of urban travels and measure the gradients of the mobility ***,a gradient-based approach is proposed to identify the signalized intersections for implementing traffic ***,a gradient-based traffic control model is developed to alleviate traffic congestion during mass events.A new solution algorithm,termed DBSCAN-FW-GA,is proposed to solve the developed traffic control *** developed mobility field and gradient-based traffic signal control approach is validated using actual road network data and travel demand *** indicate that the proposed new traffic control approach can reduce by 17.97%the travel time compared with the widely used perimeter control approach.
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information *** enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover *** this paper,a novel encrypted communication scheme for image SWE is *** reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer *** employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be *** receiver can restore the secretmessage fromthe received image using only the list header position *** scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover *** boasts high concealment and security,along with a complete message restoration rate,making it resistant to ***,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of *** validate the proposed framework,practical tests and comparisons are conducted using multiple *** results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
The proliferation of Internet of Things(IoT)systems has resulted in the generation of substantial data,presenting new challenges in reliable storage and trustworthy *** distributed storage systems are hindered by cent...
详细信息
The proliferation of Internet of Things(IoT)systems has resulted in the generation of substantial data,presenting new challenges in reliable storage and trustworthy *** distributed storage systems are hindered by centralized management and lack traceability,while blockchain systems are limited by low capacity and high *** address these challenges,the present study investigates the reliable storage and trustworthy sharing of IoT data,and presents a novel system architecture that integrates on-chain and off-chain data manage *** architecture,integrating blockchain and distributed storage technologies,provides high-capacity,high-performance,traceable,and verifiable data storage and *** on-chain system,built on Hyperledger Fabric,manages metadata,verification data,and permission information of the raw *** off-chain system,implemented using IPFS Cluster,ensures the reliable storage and efficient access to massive files.A collaborative storage server is designed to integrate on-chain and off-chain operation interfaces,facilitating comprehensive data *** provide a unified access interface for user-friendly system *** testing validates the system’s reliability and stable *** proposed approach significantly enhances storage capacity compared to standalone blockchain *** reliability tests consistently yield positive *** average upload and download throughputs of roughly 20 and 30 MB/s,respectively,the system’s throughput surpasses the blockchain system by a factor of 4 to 18.
Continuous development of remote sensing technology can rapidly and accurately extract secondary disaster information,such as the area of various ***,in the extraction process,some disasters should be initially classi...
详细信息
Continuous development of remote sensing technology can rapidly and accurately extract secondary disaster information,such as the area of various ***,in the extraction process,some disasters should be initially classified and *** view of this concept,a lightweight fully Convolutional Neural Network(CNN)model Earthquake-Flood-Fire-Cyclone(EFFC)-Net is *** modules,EFFC_Block and EFFC_Tran_Block,which are used for feature extraction and feature transformation,respectively,are *** EFFC-Net network model is reconstructed through the EFFC_Block and EFFC_Tran_Block ***,EFFC-Net is compared with CNN and transformer *** show that the EFFC-Net network model performs effectively in precision,recall,F1_score,and parameters,outperforming the more advanced CNN and transformer ***,the test time of the Cifar_10 and Cifar_100 datasets was compared,and the results indicate that the EFFC-Net algorithm has the shortest running time and achieves the lightweight ***,the EFFC-Net lightweight fully CNN has high disaster classification application value and good portability.
A benchmark experiment on^(238)U slab samples was conducted using a deuterium-tritium neutron source at the China Institute of Atomic *** leakage neutron spectra within energy levels of 0.8-16 MeV at 60°and 120&#...
详细信息
A benchmark experiment on^(238)U slab samples was conducted using a deuterium-tritium neutron source at the China Institute of Atomic *** leakage neutron spectra within energy levels of 0.8-16 MeV at 60°and 120°were measured using the time-of-flight *** samples were prepared as rectangular slabs with a 30 cm square base and thicknesses of 3,6,and 9 *** leakage neutron spectra were also calculated using the MCNP-4C program based on the latest evaluated files of^(238)U evaluated neutron data from CENDL-3.2,ENDF/B-Ⅷ.0,JENDL-5.0,and *** on the comparison,the deficiencies and improvements in^(238)U evaluated nuclear data were *** results showed the following.(1)The calculated results for CENDL-3.2 significantly overestimated the measurements in the energy interval of elastic scattering at 60°and 120°.(2)The calculated results of CENDL-3.2 overestimated the measurements in the energy interval of inelastic scattering at 120°.(3)The calculated results for CENDL-3.2 significantly overestimated the measurements in the 3-8.5 MeV energy interval at 60°and 120°.(4)The calculated results with JENDL-5.0 were generally consistent with the measurement results.
Starting from the multi-soliton solutions obtained by the Hirota bilinear method,the soli ton molecule structures for the combined mKdV-type bilinear equation(Dt+∑n=1NαnDx2n+1)f*·f=0 are investigated using the ...
详细信息
Starting from the multi-soliton solutions obtained by the Hirota bilinear method,the soli ton molecule structures for the combined mKdV-type bilinear equation(Dt+∑n=1NαnDx2n+1)f*·f=0 are investigated using the velocity resonance *** two-soliton molecules of the mKdV-35 equation and the three-soliton molecules of the mKdV-357 equation are specifically demonstrated in this *** particular selections of the involved arbitrary parameters,especially the wave numbers,it is confirmed that,besides the usual multi-bright soliton molecules,the multi-dark soliton molecules and the mixed multibright-dark soliton molecules can also be *** addition,we discuss the existence of the multi-soliton molecules for the combined mKdV-type bilinear equation with more higher order nonlinear terms and *** results demonstrate that when N≥4,the combined mKdVtype bilinear equation no longer admits soliton molecules comprising more than four solitons.
On-line transaction processing(OLTP)systems rely on transaction logging and quorum-based consensus protocol to guarantee durability,high availability and strong *** makes the log manager a key component of distributed...
详细信息
On-line transaction processing(OLTP)systems rely on transaction logging and quorum-based consensus protocol to guarantee durability,high availability and strong *** makes the log manager a key component of distributed database management systems(DDBMSs).The leader of DDBMSs commonly adopts a centralized logging method to writing log entries into a stable storage device and uses a constant log replication strategy to periodically synchronize its state to *** the advent of new hardware and high parallelism of transaction processing,the traditional centralized design of logging limits scalability,and the constant trigger condition of replication can not always maintain optimal performance under dynamic *** this paper,we propose a new log manager named Salmo with scalable logging and adaptive replication for distributed database *** scalable logging eliminates centralized contention by utilizing a highly concurrent data structure and speedy log hole *** kernel of adaptive replication is an adaptive log shipping method,which dynamically adjusts the number of log entries transmitted between leader and followers based on the real-time *** implemented and evaluated Salmo in the open-sourced transaction processing systems Cedar and *** results show that Salmo scales well by increasing the number of working threads,improves peak throughput by 1.56×and reduces latency by more than 4×over log replication of Raft,and maintains efficient and stable performance under dynamic workloads all the time.
暂无评论