{"title":"Robust Facial Manipulation Detection via Domain Generalization","authors":"Pengxiang Xu, Xue Mei, Yi Wei, Tiancheng Qian","doi":"10.1145/3467707.3467736","DOIUrl":"https://doi.org/10.1145/3467707.3467736","url":null,"abstract":"Face generation and forgery algorithms are available on the Internet, which promotes facial manipulation detection to be an important topic. Recently, many methods have been presented to detect facial manipulation images and videos. Most of which focus on specific datasets and achieve promising results on them. However, it is hard for them to detect the facial images manipulated by unknown face synthesis algorithms. In this paper, we present a method to improve the generalization ability of the detection models using one class domain generalization. Unlike the methods using datasets to train deep neural networks directly, we propose to shape the problem to domain generalization. The images manipulated by different algorithms are regarded as different domains. To obtain domain-invariant features, we take the fake facial images from multiple domains into the domain discriminator for domain adversarial training. The models can discriminate between the real and fake facial images from different domains, even the fake images generated by unknown algorithms. The experiments implemented on FaceForensics++ dataset demonstrate that the proposed method achieves outstanding performance and improves the robustness of the detection models.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Data Mining Method for Class-Imbalanced Financial Distress Prediction","authors":"Tingting Ren, Tongyu Lu, Yuanyuan Yang","doi":"10.1145/3467707.3467754","DOIUrl":"https://doi.org/10.1145/3467707.3467754","url":null,"abstract":"The accurate financial distress prediction model can help enterprises improve their financial performance, provide meaningful investment references to relevant institutions, and protect investors’ interests. However, the class-imbalanced problem exists in predicting financial distress generally, and it always makes the accuracy of the traditional classification model quite low. Therefore, this paper aims to build an efficient model for predicting imbalanced financial distress. First, the double significance test and the principal component analysis are performed to select the indicators. Then, the SMOTE and the cost-sensitive learning methods are implemented respectively to enhance the traditional machine learning algorithms. The empirical results show that these two approaches can significantly improve the classification accuracy of financial distress enterprises, and the cost-sensitive model is relatively better because of its higher suitability for the imbalanced dataset.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128294000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bigraphical Modelling and Design of Multi-Agent Systems","authors":"A. Dib, R. Maamri","doi":"10.1145/3467707.3467762","DOIUrl":"https://doi.org/10.1145/3467707.3467762","url":null,"abstract":"Multi-agent systems are recognized as a major area of distributed artificial intelligence. In fact, MAS have found multiple applications, including the design and development of complex, hierarchical and critical systems. However, ensuring the accuracy of complex interactions and the correct execution of activities of a MAS is becoming a tedious task. In this work, we focus on the formal specification of interaction, holonic and sociotechnical concepts to the BRS-MAS model. The proposed approach, is based on Bigraphical reactive systems. Bigraphs, provide means to specify at same time locality and connectivity of different type of system ranging from soft systems to cyber physical systems. In addition, to its intuitive graphical representation, it provides algebraic definition. This, makes the resulted specifications more precise. Further, it enables the verification of the specified system at the design time (before the implementation) using verification tools.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Thapaliya, Rozaliya Amirova, S. Busechian, Vladimir Ivanov, Sergey Masyagin, Ruslan Shakirov, G. Succi, Herman Tarasau, A. Tormasov, Oydinoy Zufarova
{"title":"Fundamental contemplation on the adequacy of the analysis of brain waves: case of EEG","authors":"A. Thapaliya, Rozaliya Amirova, S. Busechian, Vladimir Ivanov, Sergey Masyagin, Ruslan Shakirov, G. Succi, Herman Tarasau, A. Tormasov, Oydinoy Zufarova","doi":"10.1145/3467707.3467742","DOIUrl":"https://doi.org/10.1145/3467707.3467742","url":null,"abstract":"In recent years, the use of biological signals to understand the operations of software engineers has emerged, although with a limited understanding of its successful application. This paper provides primary evidence that biological signals obtained by electroencephalography (EEG) may provide valuable information from the perspective of software engineers, who then decode the adequacy, consistency, and efficiency of their work. The experimentation with 20 different professional male software engineers has been completed. Two natural situations have been investigated: pair programming and programming with (without) music. The early findings show the methodology’s effectiveness.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Students’ Debugging Behavior Analysis in Game-Based Learning","authors":"Fan Yang, Z. Dong, Zhong Wu","doi":"10.1145/3467707.3467760","DOIUrl":"https://doi.org/10.1145/3467707.3467760","url":null,"abstract":"As programing became more and more important, people are taking a large amount of work to help students to learn programming skills effectively. This paper applies a programming learning game called May's Journey to fit 5 debugging types including syntax, logical, structure, reasoning, and undefined debugging errors into programming levels. Then we can find out the reason why students make mistakes, and which debugging type would cause the mistakes of other debugging types. And we have 6 findings, (1) This paper proposes a student debugging model to describe how students make debugging errors, which is used for further analysis on student debugging behaviors. (2) This paper proposes to use group mean and with-in group variance based on student debugging model, which finds out the common debugging errors and personal debugging errors. (3) This paper proposes to extract student debugging patterns using Random forest, which identifies student debugging behaviors, so that students who have the same debugging pattern can be trained together. (4) This paper also proposes to use student debugging model-based SVM to extract student performance patterns, which identifies student performance changing over programming levels in terms of a specific debugging type. (5) This paper proposes to apply mean decrease accuracy and mean decrease Gini to identify the effectiveness of debugging types; and (6) this paper proposes to use a classification-based LSTM algorithm to predict debugging errors, which improves the predication accuracy a lot. Experiments and results are also provided to prove that our methods are valid and better.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Fire Prediction Algorithm Based on Thermal Infrared Image","authors":"Qijun Wang, Chao Yang, Shujun Duan, Shiqing Wei","doi":"10.1145/3467707.3467739","DOIUrl":"https://doi.org/10.1145/3467707.3467739","url":null,"abstract":"In order to realize the early prediction of fire, it is easy to make timely response to the potential fire accident and reduce the harm. In this paper, using a low-cost thermal infrared image sensor MLX90621 thermal image acquisition target area, first by Hue Saturation Value (HSV) color space transformation, temperature and chromaticity associated form two-dimensional temperature field image, then with the help of image threshold segmentation lock in high temperature area, at last, by calculating temperature field of exponential smoothing value high temperature area, and combining time series prediction model, to predict the temperature value for the future, to predict fire accident probability. The test results show that this algorithm can realize fast and reliable fire identification and prediction in a long distance, large range and all weather. It can be widely used in oil and gas, chemical industry, coal mine and other high-risk environments.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Audio-Visual Speech Separation with Generative Adversarial Training","authors":"Peng Zhang, Jiaming Xu, Yunzhe Hao, Bo Xu","doi":"10.1145/3467707.3467764","DOIUrl":"https://doi.org/10.1145/3467707.3467764","url":null,"abstract":"Audio-visual speech separation has been demonstrated to be effective in solving the cocktail party problem. However, most of the models cannot meet online processing, which limits their application in video communication and human-robot interaction. Besides, SI-SNR, the most popular training loss function in speech separation, results in some artifacts in the separated audio, which would harm downstream applications, such as automatic speech recognition (ASR). In this paper, we propose an online audio-visual speech separation model with generative adversarial training to solve the two problems mentioned above. We build our generator (i.e., audio-visual speech separator) with causal temporal convolutional network block and propose a streaming inference strategy, which allows our model to do speech separation in an online manner. The discriminator is involved in optimizing the generator, which can reduce the negative effects of SI-SNR. Experiments on simulated 2-speaker mixtures based on challenging audio-visual dataset LRS2 show that our model outperforms the state-of-the-art audio-only model Conv-TasNet and audio-visual model advr-AVSS under the same model size. We test the running time of our model on GPU and CPU, and results show that our model meets online processing. The demo and code can be found at https://github.com/aispeech-lab/oavss.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131574246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on UAV Detection of Threat Target around oil Pipeline Based on Deep Learning","authors":"Qiang Wu, Xuegang Wu, Xin Zheng, Bin Yue","doi":"10.1145/3467707.3467714","DOIUrl":"https://doi.org/10.1145/3467707.3467714","url":null,"abstract":"With the development of UAV, UAV has been applied to various projects with its advantages of low construction cost,low safety risk coefficient and convenient operation.In terms of UAV platform, currently composite wing and multi-rotor UAV are typically adopted, which can realize basic flight route. In terms of image detection, neural network is mainly used to classify and recognize the target in the image. In this paper, the YOLOV4 algorithm is improved to make it more suitable for UAV detection of ground targets.In the ground detection of UAV, most of them are small targets, so clustering method is used to redesign anchor for small targets. Because the features of small targets have more details in the shallow feature layer, the shallow feature is superimposed into the feature extraction layer, and the shallow feature and the deep feature are fused.In the data processing, data enhancement, color dithering, flipping, cutting of the data set for expansion. Through the test of the modified network, the following results are obtained: the overall mAP is improved by 9.3%, the detection mAP for small targets such as people is improved by 23.75%, and the detection mAP for working vehicles is improved by 15.4%. The detection efficiency of small targets is improved, and the speed can meet the real-time requirements, and it can be deployed in the UAV for UAV detection.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131749900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Efficient Neural Architecture Search Using Out-net","authors":"Cong Liu, Q. Miao, Min Huang","doi":"10.1145/3467707.3467747","DOIUrl":"https://doi.org/10.1145/3467707.3467747","url":null,"abstract":"∗Over the past years, there are many achievements in neural networks architecture design. The artificial neural architecture search (NAS) becomes a new way to find good architecture. Architecture searching with parameters sharing proposed by Google greatly decrease training time. However, it brings other problems like overfitting and unfair performance evaluation introduced by parameters sharing. To solve these problems, we propose a mechanism that using out-net to help training parameters, and select the best model from several candidate models produced by the controller. Experiments show that our method has a better performance when searching a small network, which got 77.3% accuracy on cifar100 with a lower latency.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Parameter Optimization of Anti-Missile System Combat Network","authors":"Huachao Li, Qingsong Zhao, Jianbin Sun, Boyuan Xia, Junyi Ding","doi":"10.1145/3467707.3467755","DOIUrl":"https://doi.org/10.1145/3467707.3467755","url":null,"abstract":"As a strategic kill weapon, the missile is an important means of modern warfare. Anti-missile system and missile system promote each other, so how to defend missiles is an important task in military research. In recent years, research on anti-missile systems has gradually increased. Judging from the current research, researchers pay less attention to equipment parameter optimization, which has a strong guiding significance for weapon equipment development planning. Therefore, based on the OODA concept and the idea of network modeling, this paper constructs the anti-missile system combat network. By using non-dominated sorting genetic algorithm 2 (NSGAII) and taking cost as constraint, the time and precision of combat activities in the anti-missile process are optimized to meet the attack window time and required precision of incoming targets. Finally, the conclusion will serve for the suggestions of equipment development.","PeriodicalId":145582,"journal":{"name":"2021 7th International Conference on Computing and Artificial Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}