Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat...
详细信息
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries,we propose an intra-inter network(IIN)for face forgery detection(FFD)in videos with continual *** proposed IIN mainly consists of three modules,i.e.,intra-module,inter-module,and forged trace masking module(FTMM).Specifically,the intra-module is trained for each kind of face forgeries by supervised learning to extract special features,while the inter-module is trained by self-supervised learning to extract the common *** a result,the common and special features of the different forgeries are decoupled by the two feature learning modules,and then the decoupled common features can be utlized to achieve high generalization ability for ***,the FTMM is deployed for contrastive learning to further improve detection *** experimental results on FaceForensic++dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in ***,the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the c...
详细信息
We theoretically investigate chaotic dynamics in an optomechanical system composed of a whispering-gallery-mode(WGM)microresonator and a *** find that tuning the optical phase using a phase shifter and modifying the coupling strength via a unidirectional waveguide(IWG)can induce chaotic *** underlying reason for this phenomenon is that adjusting the phase and coupling strength via the phase shifter and IWG bring the system close to an exceptional point(EP),where field localization dynamically enhances the optomechanical nonlinearity,leading to the generation of chaotic *** addition,due to the sensitivity of chaos to phase in the vicinity of the EP,we propose a theoretical scheme to measure the optical phase perturbations using *** work may offer an alternative approach to chaos generation with current experimental technology and provide theoretical guidance for optical signal processing and chaotic secure communication.
Incomplete spatio-temporal data in the real world has spawned much research. However, existing methods often utilize iterative message-passing across temporal and spatial dimensions, resulting in substantial informati...
Retrieval plays an important role in knowledge-based visual question answering (KB-VQA), which relies on external knowledge to answer questions related to an image. However, not all information in the external knowled...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
The prediction of the Remaining Useful Life (RUL) of stochastically degrading devices is of critical importance for Prognostics and Health Management (PHM). However, most of the existing approaches overlook the inhere...
详细信息
The maintainability of source code is a key quality characteristic for software *** approaches have been proposed to quantitatively measure code *** approaches rely heavily on code metrics,e.g.,the number of Lines of ...
详细信息
The maintainability of source code is a key quality characteristic for software *** approaches have been proposed to quantitatively measure code *** approaches rely heavily on code metrics,e.g.,the number of Lines of Code and McCabe’s Cyclomatic *** employed code metrics are essentially statistics regarding code elements,e.g.,the numbers of tokens,lines,references,and branch ***,natural language in source code,especially identifiers,is rarely exploited by such *** a result,replacing meaningful identifiers with nonsense tokens would not significantly influence their outputs,although the replacement should have significantly reduced code *** this end,in this paper,we propose a novel approach(called DeepM)to measure code maintainability by exploiting the lexical semantics of text in source *** leverages deep learning techniques(e.g.,LSTM and attention mechanism)to exploit these lexical semantics in measuring code *** key rationale of DeepM is that measuring code maintainability is complex and often far beyond the capabilities of statistics or simple ***,DeepM leverages deep learning techniques to automatically select useful features from complex and lengthy inputs and to construct a complex mapping(rather than simple heuristics)from the input to the output(code maintainability index).DeepM is evaluated on a manually-assessed *** evaluation results suggest that DeepM is accurate,and it generates the same rankings of code maintainability as those of experienced programmers on 87.5%of manually ranked pairs of Java classes.
Fine-grained action recognition typically faces challenges with lower inter-class variances and higher intra-class variances. Supervised contrastive learning is inherently suitable for this task, as it can decrease in...
详细信息
The natural forking severely compromises the security and wastes resources of Blockchain. Current analyses of the natural forking are carried out from microscale and macroscale perspectives, each facing challenges in ...
详细信息
NeuroProbe is a simple neural network simulator designed by authors specifically for educational purposes focusing on simulating inference phase on a computationally capable embedded hardware, aiming to provide a deep...
详细信息
暂无评论