{"title":"An Overview of Face Deep Forgery","authors":"Li Xinwei, Guo Jinlin, Chen Junnan","doi":"10.1109/ICCEA53728.2021.00078","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00078","url":null,"abstract":"With the rise of deep learning and the improvement of computer computing power, many interesting topics have emerged in the field of DeepFake in recent years. Deep forgery includes, but is not limited to, the forgery of human faces, but also the forgery of scenes. Among them, deep forgery of human face has received greater attention due to its importance and sensitivity. At present, various cutting-edge deep forgery methods can easily forge fake faces that are difficult for ordinary people to distinguish, which has already posed a threat to information security and social trust. This paper focuses on face deep forgery, will introduce different types of face deep forgery and its technologies. And we found that deep forgery’ s real-time and robustness are crutial drawbakcs. Finally, the future development trend of deep forgery of human face are proposed.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125280596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relation Path Modeling with Entity Types for Knowledge Graph Completion","authors":"Jimin Wang, Li Zhang, Bin Han","doi":"10.1109/ICCEA53728.2021.00049","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00049","url":null,"abstract":"Considering that existing knowledge representation learning methods fail to make full use of various information to enhance knowledge representation, a knowledge representation learning method that incorporates entity types and relation paths is proposed. Firstly, the type-specific projection matrices is constructed by using the hierarchical type information of entities, which allows entities to have different entity representation based on type. Secondly, the representation of relationships between entities is also enhanced by rich semantic information on the path of relationships between entities. Finally, the entity vector and the relation vector are connected to obtain the final knowledge representation. The link prediction task on FB15K dataset shows that PTRL shows significant improvement in MR and Hits@10 compared to mainstream models such as TransE, TKRL and PTransE.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129825138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chu Xu, Fenggui Wang, Yanbo Zhang, Li Xu, M. Ai, Guang Yan
{"title":"Two-level CFAR Algorithm for Target Detection in MmWave Radar","authors":"Chu Xu, Fenggui Wang, Yanbo Zhang, Li Xu, M. Ai, Guang Yan","doi":"10.1109/ICCEA53728.2021.00055","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00055","url":null,"abstract":"In the classical Constant False Alarm Rate (CFAR) algorithms, each cell participates in the calculation of the background power many times, which leads to low computational efficiency. This paper proposes a two-level CFAR detection algorithm–Order Statistic Convolution-based Cell Averaging CFAR (OSCCA-CFAR) for target detection. The first level CFAR uses the order statistic CFAR (OS-CFAR) algorithm to pre-detect the targets in the distance-dimension of the Range-Doppler Matrix (RDM); Based on the equivalence relationship between convolution and sliding window structure, the second level CFAR detects targets in Doppler-dimension by using convolution-based cell averaging CFAR (CCA-CFAR). Experimental results in mmwave radar imaging show that the proposed algorithm can effectively improve the efficiency of target detection without affecting the detection results.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130901984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Kalman-Correlation Based Siamese Network Tracker for Visual Object Tracking","authors":"Ke Liang, Xiaoying Liao, Guangming Liang","doi":"10.1109/ICCEA53728.2021.00094","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00094","url":null,"abstract":"Object tracking is important in a variety of applications from surveillance to robotic vision and traffic monitoring. Because of its importance, there has recently been a lot of research and developments in this field. Meanwhile, since the deep convolutional neural networks has shown its impressive potential, Siamese networks have also drawn increasing attention. However, the trackers may fail when there are rapid motions, occlusions, and similar objects in the video. To address the limitation and improve the robustness, this paper takes advantages of both the Kalman filter and the correlation filter, and further develop an adaptive Kalman-Correlation based Siamese network (AKC-SiamTracker). AKC-SiamTracker can automatically make different adjustment strategies to adjust the detected position of the original tracker based on the adaptive influence coefficient decider. The fully connected Siamese network (SiamFC) and Siamese region proposal network (SiamRPN) are selected as the baseline models. Evaluation of our method is carried out on OTB dataset. The promising results have shown better performance and robustness compared to the baselines and other state-of-the-art models. To the best of our knowledge, our work is the first time to propose the adaptive Kalman-Correlation based Siamese tracker.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Root of Trust for Embedded Devices based on On-Chip Memory","authors":"Shijun Zhao, Jiangnan Lin, Wei Li, Bing Qi","doi":"10.1109/ICCEA53728.2021.00104","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00104","url":null,"abstract":"Aiming at the problem that embedded devices generally lack hardware trust root and cannot use trusted computing technology to guarantee their operating environment, this paper proposes a method of using on-chip storage to provide trust root and trusted computing services for embedded devices. The physical unclonable function of on-chip memory is used to implement basic security mechanisms such as key storage and random numbers, and then builds a trusted computing environment based on these security mechanisms. The root of trust includes trusted computing primitives such as data sealing and unsealing. The root of trust can provide basic trusted computing services for embedded devices, so that it ensures the security and controllability of the whole embedded device running environment. In this paper, a prototype system is implemented on a hardware embedded device. The test results of prototype system show that the trusted computing root of trust construction method proposed only adds a small amount of basic code lines to the system, and its performance can meet the requirements of embedded applications.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121916124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining Algorithm for Wireless Sensor Networks Based on Subspace Heterogeneous Fusion Matching","authors":"Lizhu Ye, Weirong Xiu, Donghua Zheng","doi":"10.1109/ICCEA53728.2021.00026","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00026","url":null,"abstract":"In order to improve the data mining ability of wireless sensor network communication link, a data mining method of multi-dimensional node combination wireless sensor network communication link based on subspace heterogeneous fusion matching is proposed. The fuzzy information detection model of multi-dimensional node combined wireless sensor network big data is constructed, and the statistical analysis of multi-dimensional node combined wireless sensor network big data is carried out by combining linear balanced scheduling analysis method. According to the feature extraction results of multi-dimensional node combined wireless sensor network big data, the data fusion of multi-dimensional node combined wireless sensor network communication link is carried out by using linear balanced scheduling method, and the feature clustering model of wireless sensor network data is established by combining subspace heterogeneous fusion method. The simulation results show that this method has higher accuracy and better feature resolution, and improves the heterogeneous stability of the multi-dimensional node combination wireless sensor network.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ShuffleNet2MC: A method of light weight fault diagnosis","authors":"Xia Li, Jinhua Li, Zhihan Lv","doi":"10.1109/ICCEA53728.2021.00060","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00060","url":null,"abstract":"Bearing fault diagnosis plays an important role in the field of modern industry. Although convolution neural network achieves good results, large amount of parameters costs a lot of calculation, which brings challenges to the deployment of fault diagnosis tasks in low computational power equipments. To solve the problems, an novel CNN model ShuffleNet2MC based on improved Shufflenetv2 network is proposed. Firstly, Depthwise convolution and Channel Shuffle are used to reduce the computational cost while ensuring the accuracy of diagnosis computation; Secondly, mixed convolution is used to extract the features of different resolutions through multi-scale and multi-channel method, which improves the accuracy of the model; Finally, K-means quantization is applied to the model, which greatly reduces the GFLOPS of the model and further improves the performance of the model while ensuring that the accuracy is basically unchanged. A large number of experiments on the bearing fault dataset of Western Reserve University show that: The times of floating point operation and classification accuracy of ShufflenetV2 are 0.001GFLOPS and 97.9% respectively in the task of fault diagnosis. Compared with other models, it not only reduces the model parameters and compresses the model, but also gets better classification accuracy.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple EffNet/ResNet Architectures for Melanoma Classification","authors":"Jiaqi Xue, Chentian Ma, Li Li, Xuan Wen","doi":"10.1109/ICCEA53728.2021.00061","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00061","url":null,"abstract":"Melanoma is the most malignant skin tumor and usually cancerates from normal moles, which is difficult to distinguish benign from malignant in the early stage. Therefore, many machine learning methods are trying to make auxiliary prediction. However, these methods attach more attention to the image data of suspected tumor, and focus on improving the accuracy of image classification, but ignore the significance of patient-level contextual information for disease diagnosis in actual clinical diagnosis. To make more use of patient information and improve the accuracy of diagnosis, we propose a new melanoma classification model based on EffNet and Resnet. Our model not only uses images within the same patient but also consider patient-level contextual information for better cancer prediction. The experimental results demonstrated that the proposed model achieved 0.981 ACC. Furthermore, we note that the overall ROC value of the model is 0.976 which is better than the previous state-of-the-art approaches.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Arbitration Switch Control Module Based on ARM for Unmanned Helicopter","authors":"Mengnan Li","doi":"10.1109/ICCEA53728.2021.00082","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00082","url":null,"abstract":"An arbitration switch control module based on ARM for unmanned helicopter is introduced in this paper. Heartbeat detection of main and standby flight control computers is realized by RS232 serial port. Communication between the main and standby flight control computers is achieved through CAN bus. ARM judges and outputs control signals to relay to realize switching signals. The experimental results show that this module is feasible, reliable and real-time.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Rigid Point Set Registration Based on Global Prior and Local Structural Constraint","authors":"Xin Chang, Shun Fang, Shiqian Wu","doi":"10.1109/ICCEA53728.2021.00074","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00074","url":null,"abstract":"Coherent point drift (CPD) is a classic non-rigid point set registration algorithm. Inspired by the CPD idea, an improved CPD method is proposed in this paper. Firstly, we establish a global prior based on the graph feature to dynamically allocate Gaussian components. Secondly, a new neighborhood is defined to flexibly adjust the range of unevenly distributed points. Finally, a local structure constraint based on local neighborhood is proposed, which ensures the structure stability of the point sets. Experimental results on synthetic and real data sets show that the proposed method achieves good performance in degraded data, such as deformation, rotation, and noise.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}