期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Lip-Audio Modality Fusion for Deep Forgery Video Detection
1
作者 Yong Liu Zhiyu Wang +3 位作者 Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng 《Computers, Materials & Continua》 2025年第2期3499-3515,共17页
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC features. Then, these features are processed separately through the two branches of the Siamese network. Finally, the model is trained and optimized through fully connected layers and loss functions. The experimental results show that the testing accuracy of the model in this study on the LRW (Lip Reading in the Wild) dataset reaches 92.3%;the recall rate is 94.3%;the F1 score is 93.3%, significantly better than the results of CNN (Convolutional Neural Networks) and LSTM (Long Short-Term Memory) models. In the validation of multi-resolution image streams, the highest accuracy of dual-resolution image streams reaches 94%. Band-pass filters can effectively improve the signal-to-noise ratio of deep forgery video detection when processing different types of audio signals. The real-time processing performance of the model is also excellent, and it achieves an average score of up to 5 in user research. These data demonstrate that the method proposed in this study can effectively fuse visual and audio information in deep forgery video detection, accurately identify inconsistencies between video and audio, and thus verify the effectiveness of lip-audio modality fusion technology in improving detection performance. 展开更多
关键词 deep forgery video detection lip-audio modality fusion mel frequency cepstrum coefficient siamese neural network band-pass filter
在线阅读 下载PDF
Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections 被引量:1
2
作者 Dmitry Gura Bo Dong +1 位作者 Duaa Mehiar Nidal Al Said 《Computers, Materials & Continua》 SCIE EI 2024年第5期1995-2014,共20页
The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method in... The motivation for this study is that the quality of deep fakes is constantly improving,which leads to the need to develop new methods for their detection.The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection,which is then used as input to the CNN.The customized Convolutional Neural Network method is the date augmented-based CNN model to generate‘fake data’or‘fake images’.This study was carried out using Python and its libraries.We used 242 films from the dataset gathered by the Deep Fake Detection Challenge,of which 199 were made up and the remaining 53 were real.Ten seconds were allotted for each video.There were 318 videos used in all,199 of which were fake and 119 of which were real.Our proposedmethod achieved a testing accuracy of 91.47%,loss of 0.342,and AUC score of 0.92,outperforming two alternative approaches,CNN and MLP-CNN.Furthermore,our method succeeded in greater accuracy than contemporary models such as XceptionNet,Meso-4,EfficientNet-BO,MesoInception-4,VGG-16,and DST-Net.The novelty of this investigation is the development of a new Convolutional Neural Network(CNN)learning model that can accurately detect deep fake face photos. 展开更多
关键词 deep fake detection video analysis convolutional neural network machine learning video dataset collection facial landmark prediction accuracy models
在线阅读 下载PDF
Vehicle Detection Based on Visual Saliency and Deep Sparse Convolution Hierarchical Model 被引量:4
3
作者 CAI Yingfeng WANG Hai +2 位作者 CHEN Xiaobo GAO Li CHEN Long 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2016年第4期765-772,共8页
Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high ... Traditional vehicle detection algorithms use traverse search based vehicle candidate generation and hand crafted based classifier training for vehicle candidate verification.These types of methods generally have high processing times and low vehicle detection performance.To address this issue,a visual saliency and deep sparse convolution hierarchical model based vehicle detection algorithm is proposed.A visual saliency calculation is firstly used to generate a small vehicle candidate area.The vehicle candidate sub images are then loaded into a sparse deep convolution hierarchical model with an SVM-based classifier to perform the final detection.The experimental results demonstrate that the proposed method is with 94.81% correct rate and 0.78% false detection rate on the existing datasets and the real road pictures captured by our group,which outperforms the existing state-of-the-art algorithms.More importantly,high discriminative multi-scale features are generated by deep sparse convolution network which has broad application prospects in target recognition in the field of intelligent vehicle. 展开更多
关键词 vehicle detection visual saliency deep model convolution neural network
在线阅读 下载PDF
Explainable Deep Fake Framework for Images Creation and Classification
4
作者 Majed M. Alwateer 《Journal of Computer and Communications》 2024年第5期86-101,共16页
Deep learning is a practical and efficient technique that has been used extensively in many domains. Using deep learning technology, deepfakes create fake images of a person that people cannot distinguish from the rea... Deep learning is a practical and efficient technique that has been used extensively in many domains. Using deep learning technology, deepfakes create fake images of a person that people cannot distinguish from the real one. Recently, many researchers have focused on understanding how deepkakes work and detecting using deep learning approaches. This paper introduces an explainable deepfake framework for images creation and classification. The framework consists of three main parts: the first approach is called Instant ID which is used to create deepfacke images from the original one;the second approach called Xception classifies the real and deepfake images;the third approach called Local Interpretable Model (LIME) provides a method for interpreting the predictions of any machine learning model in a local and interpretable manner. Our study proposes deepfake approach that achieves 100% precision and 100% accuracy for deepfake creation and classification. Furthermore, the results highlight the superior performance of the proposed model in deep fake creation and classification. 展开更多
关键词 deepfakes Machine Learning deep Learning Fake detection Social Media LIME Technique
在线阅读 下载PDF
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
5
作者 Wasim Khan Shafiqul Abidin +5 位作者 Mohammad Arif Mohammad Ishrat Mohd Haleem Anwar Ahamed Shaikh Nafees Akhtar Farooqui Syed Mohd Faisal 《Data Science and Management》 2024年第2期89-98,共10页
Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence i... Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial intelligence is to identify illustrations that deviate significantly from the main distribution of data or that differ from known cases. Anomalous nodes in node-attributed networks can be identified with greater precision if both graph and node attributes are taken into account. Almost all of the studies in this area focus on supervised techniques for spotting outliers. While supervised algorithms for anomaly detection work well in theory, they cannot be applied to real-world applications owing to a lack of labelled data. Considering the possible data distribution, our model employs a dual variational autoencoder (VAE), while a generative adversarial network (GAN) assures that the model is robust to adversarial training. The dual VAEs are used in another capacity: as a fake-node generator. Adversarial training is used to ensure that our latent codes have a Gaussian or uniform distribution. To provide a fair presentation of the graph, the discriminator instructs the generator to generate latent variables with distributions that are more consistent with the actual distribution of the data. Once the model has been learned, the discriminator is used for anomaly detection via reconstruction loss which has been trained to distinguish between the normal and artificial distributions of data. First, using a dual VAE, our model simultaneously captures cross-modality interactions between topological structure and node characteristics and overcomes the problem of unlabeled anomalies, allowing us to better understand the network sparsity and nonlinearity. Second, the proposed model considers the regularization of the latent codes while solving the issue of unregularized embedding techniques that can quickly lead to unsatisfactory representation. Finally, we use the discriminator reconstruction loss for anomaly detection as the discriminator is well-trained to separate the normal and generated data distributions because reconstruction-based loss does not include the adversarial component. Experiments conducted on attributed networks demonstrate the effectiveness of the proposed model and show that it greatly surpasses the previous methods. The area under the curve scores of our proposed model for the BlogCatalog, Flickr, and Enron datasets are 0.83680, 0.82020, and 0.71180, respectively, proving the effectiveness of the proposed model. The result of the proposed model on the Enron dataset is slightly worse than other models;we attribute this to the dataset’s low dimensionality as the most probable explanation. 展开更多
关键词 Anomaly detection deep learning Attributed networks autoencoder Dual variational-autoencoder Generative adversarial networks
在线阅读 下载PDF
Full-area Exploration Test of Deep Concealed Ore Bodies based on Tunnel Gravity
6
作者 ZENG Youqiang ZENG Gaofu +2 位作者 HUANG Lishan GUO Jianlei WANG Jianchao 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2021年第S01期94-98,共5页
Metal mineral resources are the product of the deep material and energy exchange with its deep power process(Wan,2017).It is the foundation of contemporary national economic development,a priority area for the country... Metal mineral resources are the product of the deep material and energy exchange with its deep power process(Wan,2017).It is the foundation of contemporary national economic development,a priority area for the country’s implementation of strategic development. 展开更多
关键词 tunnel gravity exploration localization exploration in full-area concealed orebodies deep detection
在线阅读 下载PDF
A 4×4 metal-semiconductor-metal rectangular deep-ultraviolet detector array of Ga_(2)O_(3)photoconductor with high photo response 被引量:2
7
作者 Zeng Liu Yu-Song Zhi +8 位作者 Mao-Lin Zhang Li-Li Yang Shan Li Zu-Yong Yan Shao-Hui Zhang Dao-You Guo Pei-Gang Li Yu-Feng Guo Wei-Hua Tang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第8期700-704,共5页
A 4×4 beta-phase gallium oxide(β-Ga_(2)O_(3))deep-ultraviolet(DUV)rectangular 10-fingers interdigital metalsemiconductor-metal(MSM)photodetector array of high photo responsivity is introduced.The Ga2O_(3)thin fi... A 4×4 beta-phase gallium oxide(β-Ga_(2)O_(3))deep-ultraviolet(DUV)rectangular 10-fingers interdigital metalsemiconductor-metal(MSM)photodetector array of high photo responsivity is introduced.The Ga2O_(3)thin film is prepared through the metalorganic chemical vapor deposition technique,then used to construct the photodetector array via photolithography,lift-off,and ion beam sputtering methods.The one photodetector cell shows dark current of 1.94 p A,phototo-dark current ratio of 6×10_(7),photo responsivity of 634.15 A·W^(-1),specific detectivity of 5.93×1011cm·Hz1/2·W^(-1)(Jones),external quantum efficiency of 310000%,and linear dynamic region of 108.94 d B,indicating high performances for DUV photo detection.Furthermore,the 16-cell photodetector array displays uniform performances with decent deviation of 19.6%for photo responsivity. 展开更多
关键词 Ga_(2)O_(3) array photodetector MOCVD deep UV detection
原文传递
A method for detecting the breaking of wind-generated waves in deep water 被引量:1
8
作者 Xu Delun, Lou Shunli, Zhao Meng and Liu WentongOcean University of Qingdao,Qingdao,266003,China 《Acta Oceanologica Sinica》 SCIE CAS CSCD 1991年第2期281-285,共5页
The breaking of wind-generated waves is an important phenomenon in the ocean, having close relation to many aspects of the ocean, such as air-sea interaction, ocean wave dynamics, oceanic remote sensing and ocean engi... The breaking of wind-generated waves is an important phenomenon in the ocean, having close relation to many aspects of the ocean, such as air-sea interaction, ocean wave dynamics, oceanic remote sensing and ocean engineering. The first problem encountered in both its theoretical study and practical measurement is how to detect the breaking of waves. 展开更多
关键词 A method for detecting the breaking of wind-generated waves in deep water deep
在线阅读 下载PDF
A review on deep anomaly detection in blockchain
9
作者 Oussama Mounnan Otman Manad +2 位作者 Larbi Boubchir Abdelkrim El Mouatasim Boubaker Daachi 《Blockchain(Research and Applications)》 2024年第4期175-196,共22页
The last few years have witnessed the widespread use of blockchain technology in several works because of its effectiveness in terms of privacy,security,and trustworthiness.However,the challenges of cyber-attacks repr... The last few years have witnessed the widespread use of blockchain technology in several works because of its effectiveness in terms of privacy,security,and trustworthiness.However,the challenges of cyber-attacks represent a real threat to systems based on this technology.The resort to the systems of anomaly detection focused on deep learning,also called deep anomaly detection,is an appropriate and efficient means to tackle cyber-attacks on the blockchain.This paper provides an overview of the blockchain technology concept,including its characteristics,challenges and limitations,and its system taxonomy.Numerous blockchain cyber-attacks are discussed,such as 51%attacks,selfish mining attacks,double spending attacks,and Sybil attacks.Furthermore,we survey an overview of deep anomaly detection systems with their challenges and unresolved issues.In addition,this article gives a glimpse of various deep learning approaches implemented for anomaly detection in the blockchain environment and presents several methods that enhance the security features of anomaly detection systems.Finally,we discuss the benefits and drawbacks of these recent advanced approaches in light of three categories—discriminative learning,generative learning,and hybrid learning—with other methods based on graphs,and we highlight the ability of the proposed approaches to perform real-time anomaly detection. 展开更多
关键词 Blockchain Cyber security deep anomaly detection deep learning Cyber-attacks Fraud detection
原文传递
Crystal-phase engineering of ε-Ga_(2)O_(3) for high-performance deep UV photodetectors via MOCVD
10
作者 Zhiwei Wang Hong Huang +8 位作者 Xiaohu Hou Keju Han Weiheng Zhong Xiao Feng Haoyan Zhan Weizhen Liu Xiaolong Zhao Nan Gao Shibing Long 《Science China Materials》 2025年第4期1174-1183,共10页
Gallium oxide(Ga_(2)O_(3)),with an ultrawide bandgap corresponding to the deep ultraviolet(DUV)spectra range,provides a potential subversive scheme for the filter-free DUV photodetection.Meanwhile,the various crystal ... Gallium oxide(Ga_(2)O_(3)),with an ultrawide bandgap corresponding to the deep ultraviolet(DUV)spectra range,provides a potential subversive scheme for the filter-free DUV photodetection.Meanwhile,the various crystal phases of Ga_(2)O_(3) provide more substrate options for achieving heteroepitaxy,with the coupling of Ga_(2)O_(3) to SiC substrates conducive to developing integrated Ga_(2)O_(3) DUV photodetectors.Phase engineering ofβ-Ga_(2)O_(3) andε-Ga_(2)O_(3) was achieved on the commercial 4H-SiC substrate via metal-organic chemical vapor deposition.According to the in-depth analysis of different Ga_(2)O_(3) growth stages,it was found thatβ-Ga_(2)O_(3) is easy to form under high-pressure growth conditions,while low-pressure conditions promote the formation ofε-Ga_(2)O_(3) at 500°C.Furthermore,the developedε-phase dominated Ga_(2)O_(3) DUV photodetector exhibits obvious advantages in high responsivity(∼639 A/W),photo-to-dark current ratio(∼2.4×10^(7)),external quantum efficiency(∼3.15×10^(5)%),and specific detectivity(∼9.62×10^(13) Jones)under 254 nm illumination.This work not only reveals the growth mechanism of Ga_(2)O_(3) films under various pressures but also ensures the great potential ofε-Ga_(2)O_(3) for highly sensitive DUV detection on the heterogeneous substrate,which is expected to expand the application of Ga_(2)O_(3) optoelectronic devices. 展开更多
关键词 phase engineering c-Ga_(2)O_(3) β-Ga_(2)O_(3) MOCVD deep ultraviolet detection
原文传递
Droid Detector:Android Malware Characterization and Detection Using Deep Learning 被引量:39
11
作者 Zhenlong Yuan Yongqiang Lu Yibo Xue 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期114-123,共10页
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares a... Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static analysis with features from dynamic analysis of Android apps and characterize malware using deep learning techniques. We implement an online deep-learning-based Android malware detection engine(Droid Detector) that can automatically detect whether an app is a malware or not. With thousands of Android apps, we thoroughly test Droid Detector and perform an indepth analysis on the features that deep learning essentially exploits to characterize malware. The results show that deep learning is suitable for characterizing Android malware and especially effective with the availability of more training data. Droid Detector can achieve 96.76% detection accuracy, which outperforms traditional machine learning techniques. An evaluation of ten popular anti-virus softwares demonstrates the urgency of advancing our capabilities in Android malware detection. 展开更多
关键词 Android security malware detection characterization deep learning association rules mining
原文传递
Deep anomaly detection in horizontal axis wind turbines using GraphConvolutional Autoencoders for Multivariate Time series 被引量:3
12
作者 Eric Stefan Miele Fabrizio Bonacina Alessandro Corsini 《Energy and AI》 2022年第2期79-91,共13页
Wind power is one of the fastest-growing renewable energy sectors instrumental in the ongoing decarbonizationprocess. However, wind turbines are subjected to a wide range of dynamic loads which can cause more frequent... Wind power is one of the fastest-growing renewable energy sectors instrumental in the ongoing decarbonizationprocess. However, wind turbines are subjected to a wide range of dynamic loads which can cause more frequentfailures and downtime periods, leading to ever-increasing attention to effective Condition Monitoring strategies.In this paper, we propose a novel unsupervised deep anomaly detection framework to detect anomalies in windturbines based on SCADA data. We introduce a promising neural architecture, namely a Graph ConvolutionalAutoencoder for Multivariate Time series, to model the sensor network as a dynamical functional graph. Thisstructure improves the unsupervised learning capabilities of Autoencoders by considering individual sensormeasurements together with the nonlinear correlations existing among signals. On this basis, we developeda deep anomaly detection framework that was validated on 12 failure events occurred during 20 months ofoperation of four wind turbines. The results show that the proposed framework successfully detects anomaliesand anticipates SCADA alarms by outperforming other two recent neural approaches. 展开更多
关键词 Wind turbine Condition monitoring deep anomaly detection SCADA data Graph Convolutional Autoencoder Multivariate Time series Early fault detection
在线阅读 下载PDF
Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure
13
作者 Mohammad Hafiz Mohd Yusof Abdullah Mohd Zin Nurhizam Safie Mohd Satar 《Computers, Materials & Continua》 SCIE EI 2022年第8期2445-2466,共22页
Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning re... Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature ofmalware attacks.On the other hand,state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model.This is unlikely to be the case in production network as the dataset is unstructured and has no label.Hence an unsupervised learning is recommended.Behavioral study is one of the techniques to elicit traffic pattern.However,studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common characteristics,namely lack of prior information(p(θ)),and reduced parameters(θ).Therefore,this study aims to utilize the previously built Feature Selection Model subsequently to design a Predictive Analytics Model based on Bayesian Network used to improve the analysis prediction.Feature Selection Model is used to learn significant label as a target and Bayesian Network is a sophisticated probabilistic approach to predict intrusion.Finally,the results are extended to evaluate detection,accuracy and false alarm rate of the model against the subject matter expert model,Support Vector Machine(SVM),k nearest neighbor(k-NN)using simulated and ground-truth dataset.The ground-truth dataset from the production traffic of one of the largest healthcare provider in Malaysia is used to promote realism on the real use case scenario.Results have shown that the proposed model consistently outperformed other models. 展开更多
关键词 Intrusion detection prevention system behavioral malware analysis machine learning in cybersecurity deep learning in intrusion detection system(IDS)and intrusion prevention system(IPS)
暂未订购
Evaluating fine tuned deep learning models for real‑time earthquake damage assessment with drone‑based images
14
作者 Furkan Kizilay Mina R.Narman +3 位作者 Hwapyeong Song Husnu S.Narman Cumhur Cosgun Ammar Alzarrad 《AI in Civil Engineering》 2024年第1期160-177,共18页
Earthquakes pose a significant threat to life and property worldwide.Rapid and accurate assessment of earthquake damage is crucial for effective disaster response efforts.This study investigates the feasibility of emp... Earthquakes pose a significant threat to life and property worldwide.Rapid and accurate assessment of earthquake damage is crucial for effective disaster response efforts.This study investigates the feasibility of employing deep learning models for damage detection using drone imagery.We explore the adaptation of models like VGG16 for object detection through transfer learning and compare their performance to established object detection architectures like YOLOv8(You Only Look Once)and Detectron2.Our evaluation,based on various metrics including mAP,mAP50,and recall,demonstrates the superior performance of YOLOv8 in detecting damaged buildings within drone imagery,particularly for cases with moderate bounding box overlap.This finding suggests its potential suitability for real-world applications due to the balance between accuracy and efficiency.Furthermore,to enhance real-world feasibility,we explore two strategies for enabling the simultaneous operation of multiple deep learning models for video processing:frame splitting and threading.In addition,we optimize model size and computational complexity to facilitate real-time processing on resource-constrained platforms,such as drones.This work contributes to the field of earthquake damage detection by(1)demonstrating the effectiveness of deep learning models,including adapted architectures,for damage detection from drone imagery,(2)highlighting the importance of evaluation metrics like mAP50 for tasks with moderate bounding box overlap requirements,and(3)proposing methods for ensemble model processing and model optimization to enhance real-world feasibility.The potential for real-time damage assessment using drone-based deep learning models offers significant advantages for disaster response by enabling rapid information gathering to support resource allocation,rescue efforts,and recovery operations in the aftermath of earthquakes. 展开更多
关键词 Earthquake damage detection deep learning for object detection Drone imagery analysis Model processing for video analysis Real-time disaster response systems
原文传递
New methods of controlled-source electromagnetic detection in China 被引量:26
15
作者 Qingyun DI Guoqiang XUE +1 位作者 Changchun YIN Xiu LI 《Science China Earth Sciences》 SCIE EI CAS CSCD 2020年第9期1268-1277,共10页
As an important branch of geophysical exploration method,the electromagnetic method with artificial source has advanced rapidly in the past decade.These methods are classified as airborne electromagnetic method,ground... As an important branch of geophysical exploration method,the electromagnetic method with artificial source has advanced rapidly in the past decade.These methods are classified as airborne electromagnetic method,ground-air electromagnetic method,ground electromagnetic method,and marine electromagnetic method.Over the years,researchers in China have made significant improvement to the fundamental theory,forward modeling and inverse for series of electromagnetic detection methods.Conversely,significant progress was made in the development of corresponding equipment.The researched techniques and their developed equipment have been successfully utilized to detect underground targets as deep as 10 km.However,there is increasing need for deep resources exploration,urban subsurface study,and prediction,monitoring and detection of geological hazards.To meet the increasing need and catch up with the advanced international level of exploration technologies and developed equipment,there is urgent necessity and requirement to continue developing geophysical methods and the corresponding equipment. 展开更多
关键词 Controlled-source Electromagnetic method Multiscale deep earth detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部