期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections 被引量:1
1
作者 Dmitry Gura Bo Dong +1 位作者 Duaa Mehiar Nidal Al Said 《Computers, Materials & Continua》 SCIE EI 2024年第5期1995-2014,共20页
The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method in... The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos. 展开更多
关键词 deep fake detection video analysis convolutional neural network machine learning video dataset collection facial landmark prediction accuracy models
下载PDF
Vehicle Detection Based on Visual Saliency and Deep Sparse Convolution Hierarchical Model 被引量:4
2
作者 CAI Yingfeng WANG Hai +2 位作者 CHEN Xiaobo GAO Li CHEN Long 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第4期765-772,共8页
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ... Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle. 展开更多
关键词 vehicle detection visual saliency deep model convolution neural network
下载PDF
Explainable Deep Fake Framework for Images Creation and Classification
3
作者 Majed M. Alwateer 《Journal of Computer and Communications》 2024年第5期86-101,共16页
Deep learning is a practical and efficient technique that has been used extensively in many domains. Using deep learning technology, deepfakes create fake images of a person that people cannot distinguish from the rea... Deep learning is a practical and efficient technique that has been used extensively in many domains. Using deep learning technology, deepfakes create fake images of a person that people cannot distinguish from the real one. Recently, many researchers have focused on understanding how deepkakes work and detecting using deep learning approaches. This paper introduces an explainable deepfake framework for images creation and classification. The framework consists of three main parts: the first approach is called Instant ID which is used to create deepfacke images from the original one;the second approach called Xception classifies the real and deepfake images;the third approach called Local Interpretable Model (LIME) provides a method for interpreting the predictions of any machine learning model in a local and interpretable manner. Our study proposes deepfake approach that achieves 100% precision and 100% accuracy for deepfake creation and classification. Furthermore, the results highlight the superior performance of the proposed model in deep fake creation and classification. 展开更多
关键词 deepfakes Machine Learning deep Learning Fake detection Social Media LIME Technique
下载PDF
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
4
作者 Wasim Khan Shafiqul Abidin +5 位作者 Mohammad Arif Mohammad Ishrat Mohd Haleem Anwar Ahamed Shaikh Nafees Akhtar Farooqui Syed Mohd Faisal 《Data Science and Management》 2024年第2期89-98,共10页
Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence i... Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence is to identify illustrations that deviate significantly from the main distribution of data or that differ from known cases. Anomalous nodes in node-attributed networks can be identified with greater precision if both graph and node attributes are taken into account. Almost all of the studies in this area focus on supervised techniques for spotting outliers. While supervised algorithms for anomaly detection work well in theory, they cannot be applied to real-world applications owing to a lack of labelled data. Considering the possible data distribution, our model employs a dual variational autoencoder (VAE), while a generative adversarial network (GAN) assures that the model is robust to adversarial training. The dual VAEs are used in another capacity: as a fake-node generator. Adversarial training is used to ensure that our latent codes have a Gaussian or uniform distribution. To provide a fair presentation of the graph, the discriminator instructs the generator to generate latent variables with distributions that are more consistent with the actual distribution of the data. Once the model has been learned, the discriminator is used for anomaly detection via reconstruction loss which has been trained to distinguish between the normal and artificial distributions of data. First, using a dual VAE, our model simultaneously captures cross-modality interactions between topological structure and node characteristics and overcomes the problem of unlabeled anomalies, allowing us to better understand the network sparsity and nonlinearity. Second, the proposed model considers the regularization of the latent codes while solving the issue of unregularized embedding techniques that can quickly lead to unsatisfactory representation. Finally, we use the discriminator reconstruction loss for anomaly detection as the discriminator is well-trained to separate the normal and generated data distributions because reconstruction-based loss does not include the adversarial component. Experiments conducted on attributed networks demonstrate the effectiveness of the proposed model and show that it greatly surpasses the previous methods. The area under the curve scores of our proposed model for the BlogCatalog, Flickr, and Enron datasets are 0.83680, 0.82020, and 0.71180, respectively, proving the effectiveness of the proposed model. The result of the proposed model on the Enron dataset is slightly worse than other models;we attribute this to the dataset’s low dimensionality as the most probable explanation. 展开更多
关键词 Anomaly detection deep learning Attributed networks autoencoder Dual variational-autoencoder Generative adversarial networks
下载PDF
Full-area Exploration Test of Deep Concealed Ore Bodies based on Tunnel Gravity
5
作者 ZENG Youqiang ZENG Gaofu +2 位作者 HUANG Lishan GUO Jianlei WANG Jianchao 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2021年第S01期94-98,共5页
Metal mineral resources are the product of the deep material and energy exchange with its deep power process(Wan,2017).It is the foundation of contemporary national economic development,a priority area for the country... Metal mineral resources are the product of the deep material and energy exchange with its deep power process(Wan,2017).It is the foundation of contemporary national economic development,a priority area for the country’s implementation of strategic development. 展开更多
关键词 tunnel gravity exploration localization exploration in full-area concealed orebodies deep detection
下载PDF
A 4×4 metal-semiconductor-metal rectangular deep-ultraviolet detector array of Ga_(2)O_(3)photoconductor with high photo response 被引量:2
6
作者 Zeng Liu Yu-Song Zhi +8 位作者 Mao-Lin Zhang Li-Li Yang Shan Li Zu-Yong Yan Shao-Hui Zhang Dao-You Guo Pei-Gang Li Yu-Feng Guo Wei-Hua Tang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第8期700-704,共5页
A 4×4 beta-phase gallium oxide(β-Ga_(2)O_(3))deep-ultraviolet(DUV)rectangular 10-fingers interdigital metalsemiconductor-metal(MSM)photodetector array of high photo responsivity is introduced.The Ga2O_(3)thin fi... A 4×4 beta-phase gallium oxide(β-Ga_(2)O_(3))deep-ultraviolet(DUV)rectangular 10-fingers interdigital metalsemiconductor-metal(MSM)photodetector array of high photo responsivity is introduced.The Ga2O_(3)thin film is prepared through the metalorganic chemical vapor deposition technique,then used to construct the photodetector array via photolithography,lift-off,and ion beam sputtering methods.The one photodetector cell shows dark current of 1.94 p A,phototo-dark current ratio of 6×10_(7),photo responsivity of 634.15 A·W^(-1),specific detectivity of 5.93×1011cm·Hz1/2·W^(-1)(Jones),external quantum efficiency of 310000%,and linear dynamic region of 108.94 d B,indicating high performances for DUV photo detection.Furthermore,the 16-cell photodetector array displays uniform performances with decent deviation of 19.6%for photo responsivity. 展开更多
关键词 Ga_(2)O_(3) array photodetector MOCVD deep UV detection
下载PDF
A method for detecting the breaking of wind-generated waves in deep water 被引量:1
7
作者 Xu Delun, Lou Shunli, Zhao Meng and Liu WentongOcean University of Qingdao,Qingdao,266003,China 《Acta Oceanologica Sinica》 SCIE CAS CSCD 1991年第2期281-285,共5页
The breaking of wind-generated waves is an important phenomenon in the ocean, having close relation to many aspects of the ocean, such as air-sea interaction, ocean wave dynamics, oceanic remote sensing and ocean engi... The breaking of wind-generated waves is an important phenomenon in the ocean, having close relation to many aspects of the ocean, such as air-sea interaction, ocean wave dynamics, oceanic remote sensing and ocean engineering. The first problem encountered in both its theoretical study and practical measurement is how to detect the breaking of waves. 展开更多
关键词 A method for detecting the breaking of wind-generated waves in deep water deep
下载PDF
Droid Detector:Android Malware Characterization and Detection Using Deep Learning 被引量:37
8
作者 Zhenlong Yuan Yongqiang Lu Yibo Xue 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期114-123,共10页
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares a... Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static analysis with features from dynamic analysis of Android apps and characterize malware using deep learning techniques. We implement an online deep-learning-based Android malware detection engine(Droid Detector) that can automatically detect whether an app is a malware or not. With thousands of Android apps, we thoroughly test Droid Detector and perform an indepth analysis on the features that deep learning essentially exploits to characterize malware. The results show that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data. Droid Detector can achieve 96.76% detection accuracy, which outperforms traditional machine learning techniques. An evaluation of ten popular anti-virus softwares demonstrates the urgency of advancing our capabilities in Android malware detection. 展开更多
关键词 Android security malware detection characterization deep learning association rules mining
原文传递
Deep anomaly detection in horizontal axis wind turbines using GraphConvolutional Autoencoders for Multivariate Time series 被引量:3
9
作者 Eric Stefan Miele Fabrizio Bonacina Alessandro Corsini 《Energy and AI》 2022年第2期79-91,共13页
Wind power is one of the fastest-growing renewable energy sectors instrumental in the ongoing decarbonizationprocess. However, wind turbines are subjected to a wide range of dynamic loads which can cause more frequent... Wind power is one of the fastest-growing renewable energy sectors instrumental in the ongoing decarbonizationprocess. However, wind turbines are subjected to a wide range of dynamic loads which can cause more frequentfailures and downtime periods, leading to ever-increasing attention to effective Condition Monitoring strategies.In this paper, we propose a novel unsupervised deep anomaly detection framework to detect anomalies in windturbines based on SCADA data. We introduce a promising neural architecture, namely a Graph ConvolutionalAutoencoder for Multivariate Time series, to model the sensor network as a dynamical functional graph. Thisstructure improves the unsupervised learning capabilities of Autoencoders by considering individual sensormeasurements together with the nonlinear correlations existing among signals. On this basis, we developeda deep anomaly detection framework that was validated on 12 failure events occurred during 20 months ofoperation of four wind turbines. The results show that the proposed framework successfully detects anomaliesand anticipates SCADA alarms by outperforming other two recent neural approaches. 展开更多
关键词 Wind turbine Condition monitoring deep anomaly detection SCADA data Graph Convolutional Autoencoder Multivariate Time series Early fault detection
原文传递
Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure
10
作者 Mohammad Hafiz Mohd Yusof Abdullah Mohd Zin Nurhizam Safie Mohd Satar 《Computers, Materials & Continua》 SCIE EI 2022年第8期2445-2466,共22页
Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning re... Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model.This is unlikely to be the case in production network as the dataset is unstructured and has no label.Hence an unsupervised learning is recommended.Behavioral study is one of the techniques to elicit traffic pattern.However,studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common characteristics,namely lack of prior information(p(θ)),and reduced parameters(θ).Therefore,this study aims to utilize the previously built Feature Selection Model subsequently to design a Predictive Analytics Model based on Bayesian Network used to improve the analysis prediction.Feature Selection Model is used to learn significant label as a target and Bayesian Network is a sophisticated probabilistic approach to predict intrusion.Finally,the results are extended to evaluate detection,accuracy and false alarm rate of the model against the subject matter expert model,Support Vector Machine(SVM),k nearest neighbor(k-NN)using simulated and ground-truth dataset.The ground-truth dataset from the production traffic of one of the largest healthcare provider in Malaysia is used to promote realism on the real use case scenario.Results have shown that the proposed model consistently outperformed other models. 展开更多
关键词 Intrusion detection prevention system behavioral malware analysis machine learning in cybersecurity deep learning in intrusion detection system(IDS)and intrusion prevention system(IPS)
下载PDF
New methods of controlled-source electromagnetic detection in China 被引量:20
11
作者 Qingyun DI Guoqiang XUE +1 位作者 Changchun YIN Xiu LI 《Science China Earth Sciences》 SCIE EI CAS CSCD 2020年第9期1268-1277,共10页
As an important branch of geophysical exploration method,the electromagnetic method with artificial source has advanced rapidly in the past decade.These methods are classified as airborne electromagnetic method,ground... As an important branch of geophysical exploration method,the electromagnetic method with artificial source has advanced rapidly in the past decade.These methods are classified as airborne electromagnetic method,ground-air electromagnetic method,ground electromagnetic method,and marine electromagnetic method.Over the years,researchers in China have made significant improvement to the fundamental theory,forward modeling and inverse for series of electromagnetic detection methods.Conversely,significant progress was made in the development of corresponding equipment.The researched techniques and their developed equipment have been successfully utilized to detect underground targets as deep as 10 km.However,there is increasing need for deep resources exploration,urban subsurface study,and prediction,monitoring and detection of geological hazards.To meet the increasing need and catch up with the advanced international level of exploration technologies and developed equipment,there is urgent necessity and requirement to continue developing geophysical methods and the corresponding equipment. 展开更多
关键词 Controlled-source Electromagnetic method Multiscale deep earth detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部