Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown ...Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown speaker.Due to its powerful advantages in image generation, Generative Adversarial Networks (GANs) have now beenwidely applied across various fields. The existing Voice2Face methods for voice portraits are primarily based onGANs trained on voice-face paired datasets. However, voice portrait models solely constructed on GANs facelimitations in image generation quality and struggle to maintain facial similarity. Additionally, the training processis relatively unstable, thereby affecting the overall generative performance of the model. To overcome the abovechallenges,wepropose a novel deepGenerativeAdversarialNetworkmodel for audio-visual synthesis, namedAVPGAN(Attention-enhanced Voice Portrait Model using Generative Adversarial Network). This model is based ona convolutional attention mechanism and is capable of generating corresponding facial images from the voice ofan unknown speaker. Firstly, to address the issue of training instability, we integrate convolutional neural networkswith deep GANs. In the network architecture, we apply spectral normalization to constrain the variation of thediscriminator, preventing issues such as mode collapse. Secondly, to enhance the model’s ability to extract relevantfeatures between the two modalities, we propose a voice portrait model based on convolutional attention. Thismodel learns the mapping relationship between voice and facial features in a common space from both channeland spatial dimensions independently. Thirdly, to enhance the quality of generated faces, we have incorporated adegradation removal module and utilized pretrained facial GANs as facial priors to repair and enhance the clarityof the generated facial images. Experimental results demonstrate that our AVP-GAN achieved a cosine similarity of0.511, outperforming the performance of our comparison model, and effectively achieved the generation of highqualityfacial images corresponding to a speaker’s voice.展开更多
Mount Wutai,a place endowed with fine spirits of humanities and prolific remains of Arhats portrait art.The existing Mount Wutai Arhats portrait spans the Ming,Qing,and Republic of China periods,and through the artist...Mount Wutai,a place endowed with fine spirits of humanities and prolific remains of Arhats portrait art.The existing Mount Wutai Arhats portrait spans the Ming,Qing,and Republic of China periods,and through the artistic creation of successive generations of literati painters,exquisite Arhats portraits are painted on different artistic carriers.On the basis of inheriting the traditional Chinese paradigm painting expression,the portrait of Mount Wutai Arhats constantly draws on folk nutrients.It integrates foreign Buddhist culture for refinement and sublimation.The reconstructed portrait pays attention to the image expression of its objects and the shaping of spiritual temperament.The shape is ancient and vivid,and the scene is ethereal and mysterious,which rationally expresses the Buddhist philosophy of generosity,benevolence and kindness,and contains unique oriental aesthetics.展开更多
The Altomani&Sons Collection owns a remarkable newly discovered portrait of Guidobaldo II della Rovere,Duke of Urbino(1514-1574),a historical military figure who was a condottiere,ruler of Urbino,Commander-in-chie...The Altomani&Sons Collection owns a remarkable newly discovered portrait of Guidobaldo II della Rovere,Duke of Urbino(1514-1574),a historical military figure who was a condottiere,ruler of Urbino,Commander-in-chief of the Papal Estate,and Perfect of Rome,as well as a collector and patron of the Fine Arts.Camilla Guerrieri Nati(1628-1694),a seventeenth-century Italian painter from Fossombrone(in the province of Pesaro and Urbino),portrayed this heroic personage surrounded by emblems associated with his military courage and leadership,including his plumed burgonet helmet,metal gilded armor,a necklace with the golden fleece,and batons of secular and religious dominions.This oil painting on copper-considered a precious metal at the time-emphasizes the importance of the commission.The material and technique also reveals a unique artistic achievement in that it provides the painting with a smooth,reflective surface and vibrant coloration,symbolizing precious imagery.展开更多
As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for term...As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals.展开更多
The objective of style transfer is to maintain the content of an image while transferring the style of another image.However,conventional methods face challenges in preserving facial features,especially in Korean port...The objective of style transfer is to maintain the content of an image while transferring the style of another image.However,conventional methods face challenges in preserving facial features,especially in Korean portraits where elements like the“Gat”(a traditional Korean hat)are prevalent.This paper proposes a deep learning network designed to perform style transfer that includes the“Gat”while preserving the identity of the face.Unlike traditional style transfer techniques,the proposed method aims to preserve the texture,attire,and the“Gat”in the style image by employing image sharpening and face landmark,with the GAN.The color,texture,and intensity were extracted differently based on the characteristics of each block and layer of the pre-trained VGG-16,and only the necessary elements during training were preserved using a facial landmark mask.The head area was presented using the eyebrow area to transfer the“Gat”.Furthermore,the identity of the face was retained,and style correlation was considered based on the Gram matrix.To evaluate performance,we introduced a metric using PSNR and SSIM,with an emphasis on median values through new weightings for style transfer in Korean portraits.Additionally,we have conducted a survey that evaluated the content,style,and naturalness of the transferred results,and based on the assessment,we can confidently conclude that our method to maintain the integrity of content surpasses the previous research.Our approach,enriched by landmarks preservation and diverse loss functions,including those related to“Gat”,outperformed previous researches in facial identity preservation.展开更多
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective...With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value.展开更多
针对“校园大数据”累积的海量数据呈现出离散性、稀疏性等问题,如何从基数大、活动广、个性强的校园学生群体中检测出潜在的、有异常行为的学生,已成为学生异常行为分析亟需解决的问题.本文提出了一种大数据环境下基于多模态融合的大...针对“校园大数据”累积的海量数据呈现出离散性、稀疏性等问题,如何从基数大、活动广、个性强的校园学生群体中检测出潜在的、有异常行为的学生,已成为学生异常行为分析亟需解决的问题.本文提出了一种大数据环境下基于多模态融合的大学生异常行为预警方法(early warning method for abnormal behavior of college students based on multi-modal fusion in big data environment,EWMAB).首先,针对学生行为画像的表征不够丰富,行为标签存在时效性、动态性等问题,建立一种基于多模态特征深度学习的跨模态学生行为画像模型;其次,针对学生异常行为预测、预警的时效性和后置性问题,在学生行为画像和学生行为分类预测基础上,提出了一种基于多模态融合的学生异常行为预警方法,通过长短期记忆神经网络(long and short term memory networks,LSTM),结合学生行为多指标数据和文本信息来解决学生异常行为预警问题;最后,本文通过应用实例验证模型以学生学习成绩异常预警为例,与其他预警算法相比,EWMAB方法可以提高预警的准确性,实现学生异常行为预警的时效性和前置性,从而使学生教育工作更具有针对性、个性化和预测性.展开更多
基金the Double First-Class Innovation Research Projectfor People’s Public Security University of China (No. 2023SYL08).
文摘Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown speaker.Due to its powerful advantages in image generation, Generative Adversarial Networks (GANs) have now beenwidely applied across various fields. The existing Voice2Face methods for voice portraits are primarily based onGANs trained on voice-face paired datasets. However, voice portrait models solely constructed on GANs facelimitations in image generation quality and struggle to maintain facial similarity. Additionally, the training processis relatively unstable, thereby affecting the overall generative performance of the model. To overcome the abovechallenges,wepropose a novel deepGenerativeAdversarialNetworkmodel for audio-visual synthesis, namedAVPGAN(Attention-enhanced Voice Portrait Model using Generative Adversarial Network). This model is based ona convolutional attention mechanism and is capable of generating corresponding facial images from the voice ofan unknown speaker. Firstly, to address the issue of training instability, we integrate convolutional neural networkswith deep GANs. In the network architecture, we apply spectral normalization to constrain the variation of thediscriminator, preventing issues such as mode collapse. Secondly, to enhance the model’s ability to extract relevantfeatures between the two modalities, we propose a voice portrait model based on convolutional attention. Thismodel learns the mapping relationship between voice and facial features in a common space from both channeland spatial dimensions independently. Thirdly, to enhance the quality of generated faces, we have incorporated adegradation removal module and utilized pretrained facial GANs as facial priors to repair and enhance the clarityof the generated facial images. Experimental results demonstrate that our AVP-GAN achieved a cosine similarity of0.511, outperforming the performance of our comparison model, and effectively achieved the generation of highqualityfacial images corresponding to a speaker’s voice.
文摘Mount Wutai,a place endowed with fine spirits of humanities and prolific remains of Arhats portrait art.The existing Mount Wutai Arhats portrait spans the Ming,Qing,and Republic of China periods,and through the artistic creation of successive generations of literati painters,exquisite Arhats portraits are painted on different artistic carriers.On the basis of inheriting the traditional Chinese paradigm painting expression,the portrait of Mount Wutai Arhats constantly draws on folk nutrients.It integrates foreign Buddhist culture for refinement and sublimation.The reconstructed portrait pays attention to the image expression of its objects and the shaping of spiritual temperament.The shape is ancient and vivid,and the scene is ethereal and mysterious,which rationally expresses the Buddhist philosophy of generosity,benevolence and kindness,and contains unique oriental aesthetics.
文摘The Altomani&Sons Collection owns a remarkable newly discovered portrait of Guidobaldo II della Rovere,Duke of Urbino(1514-1574),a historical military figure who was a condottiere,ruler of Urbino,Commander-in-chief of the Papal Estate,and Perfect of Rome,as well as a collector and patron of the Fine Arts.Camilla Guerrieri Nati(1628-1694),a seventeenth-century Italian painter from Fossombrone(in the province of Pesaro and Urbino),portrayed this heroic personage surrounded by emblems associated with his military courage and leadership,including his plumed burgonet helmet,metal gilded armor,a necklace with the golden fleece,and batons of secular and religious dominions.This oil painting on copper-considered a precious metal at the time-emphasizes the importance of the commission.The material and technique also reveals a unique artistic achievement in that it provides the painting with a smooth,reflective surface and vibrant coloration,symbolizing precious imagery.
基金supported by the National Key Research and Development Program of China(No.2021YFB2401200)。
文摘As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals.
基金supported by Metaverse Lab Program funded by the Ministry of Science and ICT(MSIT),and the Korea Radio Promotion Association(RAPA).
文摘The objective of style transfer is to maintain the content of an image while transferring the style of another image.However,conventional methods face challenges in preserving facial features,especially in Korean portraits where elements like the“Gat”(a traditional Korean hat)are prevalent.This paper proposes a deep learning network designed to perform style transfer that includes the“Gat”while preserving the identity of the face.Unlike traditional style transfer techniques,the proposed method aims to preserve the texture,attire,and the“Gat”in the style image by employing image sharpening and face landmark,with the GAN.The color,texture,and intensity were extracted differently based on the characteristics of each block and layer of the pre-trained VGG-16,and only the necessary elements during training were preserved using a facial landmark mask.The head area was presented using the eyebrow area to transfer the“Gat”.Furthermore,the identity of the face was retained,and style correlation was considered based on the Gram matrix.To evaluate performance,we introduced a metric using PSNR and SSIM,with an emphasis on median values through new weightings for style transfer in Korean portraits.Additionally,we have conducted a survey that evaluated the content,style,and naturalness of the transferred results,and based on the assessment,we can confidently conclude that our method to maintain the integrity of content surpasses the previous research.Our approach,enriched by landmarks preservation and diverse loss functions,including those related to“Gat”,outperformed previous researches in facial identity preservation.
文摘With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value.
文摘针对“校园大数据”累积的海量数据呈现出离散性、稀疏性等问题,如何从基数大、活动广、个性强的校园学生群体中检测出潜在的、有异常行为的学生,已成为学生异常行为分析亟需解决的问题.本文提出了一种大数据环境下基于多模态融合的大学生异常行为预警方法(early warning method for abnormal behavior of college students based on multi-modal fusion in big data environment,EWMAB).首先,针对学生行为画像的表征不够丰富,行为标签存在时效性、动态性等问题,建立一种基于多模态特征深度学习的跨模态学生行为画像模型;其次,针对学生异常行为预测、预警的时效性和后置性问题,在学生行为画像和学生行为分类预测基础上,提出了一种基于多模态融合的学生异常行为预警方法,通过长短期记忆神经网络(long and short term memory networks,LSTM),结合学生行为多指标数据和文本信息来解决学生异常行为预警问题;最后,本文通过应用实例验证模型以学生学习成绩异常预警为例,与其他预警算法相比,EWMAB方法可以提高预警的准确性,实现学生异常行为预警的时效性和前置性,从而使学生教育工作更具有针对性、个性化和预测性.