Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(...
详细信息
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and *** ZSFA methods mainly focus on extracting discriminative features between spoofing and living ***,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the ***,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged *** tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing *** method consists of two main components:a two-against-all training strategy and a semantic *** two-against-all training strategy is employed to separate deceptive and discriminative *** address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic *** autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature *** combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known *** results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
Many well-known and effective anomaly detection methods assume that a reasonable decision boundary has a hypersphere shape, which however is difficult to obtain in practice and is not sufficiently compact, especially ...
详细信息
The main goal of web development is to create, build and maintain websites. It is what allows the user to experience seamless performance when accessing a website. The web applications landscape has evolved tremendous...
详细信息
In order to effectively prevent and control accidents, it is essential to trace back the causes of gas explosions in cities. The DT-AR(decision tree-association rule) algorithm is proposed as a quantitative analysis o...
详细信息
In today's era, deep learning neural networks with multiple hidden layers have been widely used in many fields. The deep learning method has more powerful features that enhance the method's performance by a le...
详细信息
Artificial Intelligence (AI) technology is advancing rapidly, driving innovation across various industries while also presenting significant security challenges. These challenges include protecting model ownership, en...
详细信息
Emotion detection is a critical field in AI as well as computer vision, seeking to recognize or detect human emotions from facial expressions. Although this area has been greatly advanced through Convolutional Neural ...
详细信息
Using a cutting-edge neural network framework, 'PulseSync BP' estimates blood pressure without contact. Using photoplethysmogram (PPG) signals and other physiological data, this novel model uses advanced signa...
详细信息
The main aim of this work is to develop an Online Discussion platform for users. The platforms will become more mature while having more users. In the paper, a sophisticated strategy is suggested to tackle a critical ...
详细信息
暂无评论