- Generative Adversarial Networks and Image Synthesis
- Digital Media Forensic Detection
- Advanced Image Processing Techniques
- Remote Sensing and Land Use
- Face recognition and analysis
- Image Retrieval and Classification Techniques
- Environmental Changes in China
- AI and Big Data Applications
- Business Process Modeling and Analysis
- E-commerce and Technology Innovations
- Educational and Technological Research
- Anomaly Detection Techniques and Applications
- Civil and Geotechnical Engineering Research
- Advanced Computational Techniques and Applications
- Educational Technology and Pedagogy
- 3D Shape Modeling and Analysis
- Image and Signal Denoising Methods
- Advanced Computing and Algorithms
- Image Processing and 3D Reconstruction
- Advanced Image and Video Retrieval Techniques
- Higher Education and Teaching Methods
- Video Analysis and Summarization
- Remote Sensing and LiDAR Applications
- Service-Oriented Architecture and Web Services
- Network Security and Intrusion Detection
Guangxi Normal University
2024
Hunan University
2021-2024
Huangshan University
2023
Nanjing Sport Institute
2022
Hainan University
2019
University of Science and Technology Beijing
2019
China University of Political Science and Law
2012
Sichuan University
2011
The development of technologies that can generate Deepfake videos is expanding rapidly. These are easily synthesized without leaving obvious traces manipulation. Though forensically detection in high-definition video datasets has achieved remarkable results, the forensics compressed worth further exploring. In fact, common social networks, such as from Instagram, Wechat, and Tiktok. Therefore, how to identify becomes a fundamental issue. this paper, we propose two-stream method by analyzing...
Deepfake has ignited hot research interests in both academia and industry due to its potential security threats. Many countermeasures have been proposed mitigate such risks. Current detection methods achieve superior performances dealing with low-visual-quality media which can be distinguished by the obvious visual artifacts. However, development of deep generative models, realism significantly improved becomes tough challenging current models. In this paper, we propose a frame...
As a face manipulation technique, the misuse of Deepfakes poses potential threats to state, society, and individuals. Several countermeasures have been proposed reduce negative effects produced by Deepfakes. Current detection methods achieve satisfactory performance in dealing with uncompressed videos. However, videos are generally compressed when spread over social networks because limited bandwidth storage space, which generates compression artifacts inevitably decreases. Hence, how...
According to the development of real fractional differential and its applications in modern signal processing, authors extend it quaternion body put forward a new concept: (QFD), apply edge detection colour image. This method is called based on QFD. Simulation experiments indicate that this has special advantages. Furthermore, give an indicator evaluate effectiveness different filters. Comparing with Sobel mix edges every channels image, they discover QFD fewer false negatives textured...
Point cloud is an important 3D data structure, but its irregular format brings great challenges to deep learning. The advent of PointNet makes it possible process point by neural networks directly. As extension PointNet, PointNet++ can extract local features, which perform better than in processing data. But practice, common that the density a set usually varies with location, computation overhead very heavy. To deal it, we propose octree grouping-based network structure for PointNet++,...
Deepfake videos are becoming increasingly realistic, showing few tampering traces on facial areas that vary between frames. Consequently, existing detection methods struggle to detect unknown domain while accurately locating the tampered region. To address this limitation, we propose Delocate, a novel model can both recognize and localize videos. Our method consists of two stages named recovering localization. In stage, randomly masks regions interest (ROIs) reconstructs real faces without...
Deepfake techniques have been widely used for malicious purposes, prompting extensive research interest in developing detection methods. manipulations typically involve tampering with facial parts, which can result inconsistencies across different parts of the face. For instance, may change smiling lips to an upset lip, while eyes remain smiling. Existing methods depend on specific indicators forgery, tend disappear as forgery patterns are improved. To address limitation, we propose Mover, a...
Physical education (PE) teaching resources occupy a very important position in the of PE theory. Especially context Internet era, how to effectively extract from is for teachers. However, quality on uneven, if not correctly identified, it will bring harm students' values. Therefore, necessary identify positive psychology. In era artificial intelligence, advanced intelligent algorithms provide solution realization this purpose. study, text sentiment analysis model multi-layer-attention...
Deepfake videos are becoming increasingly realistic, showing subtle tampering traces on facial areasthat vary between frames. Consequently, many existing detection methods struggle to detect unknown domain while accurately locating the tampered region. To address thislimitation, we propose Delocate, a novel model that can both recognize andlocalize videos. Ourmethod consists of two stages named recoveringand localization. In recovering stage, modelrandomly masks regions interest (ROIs) and...
Research on cross-media topic analysis and information retrieval methods, which utilize semantic of multimedia data to describe documents. As the emerging Internet, text based methods cause problem inadequacy semantic, so a uniform presentation different media is very important for system. Cross-media are proposed in this paper. Firstly, generative method visual learning algorithm used construct model map topics. This can solve consistent description data. On basis, tagging integrated search...
Deepfake techniques have been widely used for malicious purposes, prompting extensive research interest in developing detection methods. manipulations typically involve tampering with facial parts, which can result inconsistencies across different parts of the face. For instance, may change smiling lips to an upset lip, while eyes remain smiling. Existing methods depend on specific indicators forgery, tend disappear as forgery patterns are improved. To address limitation, we propose Mover, a...
The exploitation of Deepfake techniques for malicious intentions has driven significant research interest in detection. manipulations frequently introduce random tampered traces, leading to unpredictable outcomes different facial regions. However, existing detection methods heavily rely on specific forgery indicators, and as the mode improves, these traces become increasingly randomized, resulting a decline performance reliant traces. To address limitation, we propose Recap, novel model that...
This paper presents a case study of Yixian Middle School (YMS) in China, discussing the challenges faced by county high schools (CHS) and how it affects education qual-ity resources. The reasons for school predicament (CSP) are analysed, strategies employed YMS to deal with
For the purpose of better communication between ancient and contemporary common language dialect, Yangxiong, linguist from former Han dynasty, designed a set terms for dialect research, Tongyu (common language) Fangyan(dialect) are two most important words. The word ‘Tongyu’ refers to which were uniform throughout country (National or in some specific regions (regional language).BR Using ‘Tongyu’(common as pivot transformation, also by way ‘Zhuanyu’ method, Yangxiong embodied conversion rule...