Tsinghua Science and Technology最新文献

筛选
英文 中文
Effective Application of IoT Power Electronics Technology and Power System Optimization Control 物联网电力电子技术的有效应用与电力系统的优化控制
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010124
Libo Yang;Bin Ma;Long Yuan;Bingxiang Wu
{"title":"Effective Application of IoT Power Electronics Technology and Power System Optimization Control","authors":"Libo Yang;Bin Ma;Long Yuan;Bingxiang Wu","doi":"10.26599/TST.2023.9010124","DOIUrl":"https://doi.org/10.26599/TST.2023.9010124","url":null,"abstract":"With the development of society, the power system plays an important role in the global energy structure. However, facing increasing energy demand and environmental pressure, improving power system efficiency, reducing costs, and ensuring reliability and safety have become key issues. The Internet of Things (IoT) power electronics technology, as one of the research hotspots, integrates IoT and power electronics technology to achieve intelligent and optimized control of power systems through sensors, communication, and control technologies. In order to meet current and future needs, it is necessary to optimize the operation and management of power systems using IoT power electronics technology. By analyzing the application of Internet of Things power electronics technology and the optimal dispatch of power systems, support vector machine algorithms are used to analyze and process equipment data, and perform data monitoring and anomaly detection to promote energy waste reduction and energy saving, and then start from operation and maintenance respectively. Comparative simulation experiments were conducted in five aspects: efficiency, effectiveness of power load prediction and optimization control, effectiveness of intelligent monitoring, operating costs, and data security. The experimental results show that the operation and maintenance efficiency of the power system using IoT power electronics technology has been improved to only 18 h for equipment fault handling. The accuracy of load forecasting optimization control based on IoT power electronics technology reaches 94%. The fault detection accuracy of intelligent monitoring of power equipment based on the power electronics technology of the Internet of Things has reached 96%. At the same time, the Internet of Things power electronics technology was used to improve the power operation mode, so as to promote the monthly electricity sales revenue of 2.77 million RMB. In addition, the effectiveness of IoT power electronics technology in power data security management has reached 95%. In summary, IoT power electronics technology can improve the stability, reliability, and security of power systems, reduce costs, improve efficiency and management level, and has broad application and promotion prospects.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1763-1775"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10565997","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZKP Protocols for Usowan, Herugolf, and Five Cells 乌索万、赫鲁戈夫和五细胞的 ZKP 协议
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010153
Daiki Miyahara;Léo Robert;Pascal Lafourcade;Takaaki Mizuki
{"title":"ZKP Protocols for Usowan, Herugolf, and Five Cells","authors":"Daiki Miyahara;Léo Robert;Pascal Lafourcade;Takaaki Mizuki","doi":"10.26599/TST.2023.9010153","DOIUrl":"https://doi.org/10.26599/TST.2023.9010153","url":null,"abstract":"A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a line of research proposing physical instances of ZKP protocols. Up to now, many card-based ZKP protocols for pen-and-pencil puzzles, like Sudoku, have been designed. Those games, mostly edited by Nikoli, have simple rules, yet designing them in card-based ZKP protocols is non-trivial. In this work, we propose a card-based ZKP protocol for Usowan, a Nikoli game. In Usowan, for each room of a puzzle instance, there is exactly one piece of false information. The goal of the game is to detect this wrong data amongst the correct data and also to satisfy the other rules. Designing a card-based ZKP protocol to deal with the property of detecting a liar has never been done. In some sense, we propose a physical ZKP for hiding of a liar. This work extends a previous paper appearing in Ref. [1]. In this extension, we propose two other protocols, for Herugolf and Five Cells. The puzzles are specifically chosen because each of those three puzzles shares a common constraint, connectivity. However, showing the connected configuration cannot be done with generic approach and brings new construction to the existing connectivity ZKP protocol. Indeed, in Herugolf, the connectivity is handled with a given length of cell which is decremental (i.e., the length of each connected cell decreases by one at each step). For Five Cells, there is an additional step in the setup allowing to encode all the information needed to ensure a valid ZKP protocol.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1651-1666"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Concept Lattices for Numberings 论编号的概念网格
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010102
Nikolay Bazhenov;Manat Mustafa;Anvar Nurakunov
{"title":"On Concept Lattices for Numberings","authors":"Nikolay Bazhenov;Manat Mustafa;Anvar Nurakunov","doi":"10.26599/TST.2023.9010102","DOIUrl":"https://doi.org/10.26599/TST.2023.9010102","url":null,"abstract":"The theory of numberings studies uniform computations for families of mathematical objects. In this area, computability-theoretic properties of at most countable families of sets \u0000<tex>$mathcal{S}$</tex>\u0000 are typically classified via the corresponding Rogers upper semilattices. In most cases, a Rogers semilattice cannot be a lattice. Working within the framework of Formal Concept Analysis, we develop two new approaches to the classification of families \u0000<tex>$mathcal{S}$</tex>\u0000. Similarly to the classical theory of numberings, each of the approaches assigns to a family \u0000<tex>$mathcal{S}$</tex>\u0000 its own concept lattice. The first approach captures the cardinality of a family \u0000<tex>$mathcal{S}$</tex>\u0000: if \u0000<tex>$mathcal{S}$</tex>\u0000 contains more than 2 elements, then the corresponding concept lattice FC\u0000<inf>1</inf>\u0000(\u0000<tex>$mathcal{S}$</tex>\u0000) is a modular lattice of height 3, such that the number of its atoms to the cardinality of \u0000<tex>$mathcal{S}$</tex>\u0000. Our second approach gives a much richer environment. We prove that for any countable poset \u0000<tex>$P$</tex>\u0000, there exists a family \u0000<tex>$mathcal{S}$</tex>\u0000 such that the induced concept lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) is isomorphic to the Dedekind-MacNeille completion of \u0000<tex>$P$</tex>\u0000. We also establish connections with the class of enumerative lattices introduced by Hoyrup and Rojas in their studies of algorithmic randomness. We show that every lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) is anti-isomorphic to an enumerative lattice. In addition, every enumerative lattice is anti-isomorphic to a sublattice of the lattice FC2 (\u0000<tex>$mathcal{S}$</tex>\u0000) for some family \u0000<tex>$mathcal{S}$</tex>\u0000.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1642-1650"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Transportation System Performance Analysis of Indoor and Outdoor Internet of Vehicle (IoV) Applications Towards 5G 面向 5G 的室内外车联网 (IoV) 应用的智能交通系统性能分析
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010119
Preeti Rani;Rohit Sharma
{"title":"Intelligent Transportation System Performance Analysis of Indoor and Outdoor Internet of Vehicle (IoV) Applications Towards 5G","authors":"Preeti Rani;Rohit Sharma","doi":"10.26599/TST.2023.9010119","DOIUrl":"https://doi.org/10.26599/TST.2023.9010119","url":null,"abstract":"The Internet of Vehicles (IoVs) has seen rapid development due to advances in advanced communication technologies. The 5-th Generation (5G) systems will be integrated into next-generation vehicles, enabling them to operate more efficiently by cooperating with the environment. The millimeter Wave (mmWave) technology is projected to provide a large bandwidth to meet future needs for more effective data rate communications. A viable approach for transferring raw sensor data among autonomous vehicles would be to use mmWave communication. This paper attracts various research interests in academic, indoor, and outdoor mmWave operations. This paper presents mmWave propagation measurements for indoor and outdoor at 66 GHz frequency for IoVs scenarios. The proposed model examines the equivalent path loss using Free-Space Path Loss (FSPL) based on the transmitter and receiver distances for indoor and outdoor communications of the vehicles. In the indoor scenario, path loss propagation has the lowest penetration loss, but it is ineffective in the outdoor scenario because distance increases as free space path loss increases. The probability of error is increased, concerning the transmitter and receiver distances due to propagation effect, packet collisions, busy receiver, and sensing threshold. The proposed methodology shows a higher packet delivery ratio and average throughput with less delay in the connection during transmission.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1785-1795"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10565999","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment 面向 5G 通信环境中网络设备能效和人工智能自动化的智能计算模型
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2024.9010005
Ashish Bagwari;Jaganathan Logeshwaran;M. Raja;P. Devisivasankari;Jyotshana Bagwari;Vikas Rathi;Asma Mohammed Elbashir Saad
{"title":"Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment","authors":"Ashish Bagwari;Jaganathan Logeshwaran;M. Raja;P. Devisivasankari;Jyotshana Bagwari;Vikas Rathi;Asma Mohammed Elbashir Saad","doi":"10.26599/TST.2024.9010005","DOIUrl":"https://doi.org/10.26599/TST.2024.9010005","url":null,"abstract":"Currently, the 4G network service has caused massive digital growth in high use. Video calling has become the go-to Internet application for many people, downloading even huge files in minutes. Everyone is looking for and buying only 4G Subscriber Identity Module (SIM)-capable mobiles. In this case, the expectation of 5G has increased in line with 2G, 3G, and 4G, where the G stands for generation, and it does not indicate Internet or Internet speed. 5G includes next-generation features that are more advanced than those available in 4G network services. The main objective of 5G is uninterrupted telecommunication service in hybrid energy storage system. This paper proposes an intelligent networking model to obtain the maximum energy efficiency and Artificial Intelligence (AI) automation of 5G networks. There is currently an issue where the signal cuts out when crossing an area with one tower and traveling to an area with another tower. The problem of “call drop”, where the call is disconnected while talking, is not present in 5G. The proposed Intelligent Computational Model (ICM) model obtained 96.31% network speed management, 90.63% battery capacity management, 92.27% network device management, 93.57% energy efficiency, and 88.41% AI automation.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1728-1751"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Submodular Maximization Under Knapsack Problem Knapsack 问题下的两阶段次模态最大化
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010107
Zhicheng Liu;Jing Jin;Donglei Du;Xiaoyan Zhang
{"title":"Two-Stage Submodular Maximization Under Knapsack Problem","authors":"Zhicheng Liu;Jing Jin;Donglei Du;Xiaoyan Zhang","doi":"10.26599/TST.2023.9010107","DOIUrl":"https://doi.org/10.26599/TST.2023.9010107","url":null,"abstract":"Two-stage submodular maximization problem under cardinality constraint has been widely studied in machine learning and combinatorial optimization. In this paper, we consider knapsack constraint. In this problem, we give \u0000<tex>$n$</tex>\u0000 articles and \u0000<tex>$m$</tex>\u0000 categories, and the goal is to select a subset of articles that can maximize the function \u0000<tex>$F(S)$</tex>\u0000. Function \u0000<tex>$F(S)$</tex>\u0000 consists of \u0000<tex>$m$</tex>\u0000 monotone submodular functions \u0000<tex>$f_{j}, j=1,2, ldots, m$</tex>\u0000, and each \u0000<tex>$f_{j}$</tex>\u0000 measures the similarity of each article in category \u0000<tex>$j$</tex>\u0000. We present a constant-approximation algorithm for this problem.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1703-1708"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Algorithms for Maximization of $k$-Submodular Function Under a Matroid Constraint 矩阵约束条件下 $k$ 次模态函数最大化的近似算法
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010122
Yuezhu Liu;Yunjing Sun;Min Li
{"title":"Approximation Algorithms for Maximization of $k$-Submodular Function Under a Matroid Constraint","authors":"Yuezhu Liu;Yunjing Sun;Min Li","doi":"10.26599/TST.2023.9010122","DOIUrl":"https://doi.org/10.26599/TST.2023.9010122","url":null,"abstract":"In this paper, we design a deterministic 1/3-approximation algorithm for the problem of maximizing non-monotone \u0000<tex>$k$</tex>\u0000-submodular function under a matroid constraint. In order to reduce the complexity of this algorithm, we also present a randomized 1/3-approximation algorithm with the probability of \u0000<tex>$1-varepsilon$</tex>\u0000, where \u0000<tex>$varepsilon$</tex>\u0000 is the probability of algorithm failure. Moreover, we design a streaming algorithm for both monotone and non-monotone objective \u0000<tex>$k$</tex>\u0000-submodular functions.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1633-1641"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566024","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models 人工智能支持未来无线电动汽车的多模型学习和决策模型
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010094
Gajula Ramesh;Anil Kumar Budati;Shayla Islam;Louai A. Maghrabi;Abdullah Al-Atwai
{"title":"Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models","authors":"Gajula Ramesh;Anil Kumar Budati;Shayla Islam;Louai A. Maghrabi;Abdullah Al-Atwai","doi":"10.26599/TST.2023.9010094","DOIUrl":"https://doi.org/10.26599/TST.2023.9010094","url":null,"abstract":"In the contemporary era, driverless vehicles are a reality due to the proliferation of distributed technologies, sensing technologies, and Machine to Machine (M2M) communications. However, the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy efficient. From existing methods, it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy efficiency. However, the models focus on different aspects separately. There is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence (AI) on autonomous driving and energy efficiency. Towards this end, we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision making. It focuses on both safe driving in highway scenarios and energy efficiency. The deep learning based framework is realized with many models used for localization, path planning at high level, path planning at low level, reinforcement learning, transfer learning, power control, and speed control. With reinforcement learning, state-action-feedback play important role in decision making. Our simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1776-1784"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages 部分积压短缺情况下梯形需求的最优定价和订购政策
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2023.9010040
Chunming Xu;Mingfei Bai;Chenchen Wu;Qiyue Wang;Yiwei Wang
{"title":"An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages","authors":"Chunming Xu;Mingfei Bai;Chenchen Wu;Qiyue Wang;Yiwei Wang","doi":"10.26599/TST.2023.9010040","DOIUrl":"https://doi.org/10.26599/TST.2023.9010040","url":null,"abstract":"Based on the retail inventory operation of Heilan Home, this study incorporates the price factor into inventory environment involving trapezoidal time-varying products. A joint pricing and ordering issue with deteriorating items under partial backlogged shortages is firstly explored in a fixed selling cycle. The corresponding optimization model aiming at maximizing profit performance of inventory system is developed, the theoretical analysis of solving the model is further provided, and the modelling frame generalizes some inventory models in the existing studies. Then, a solving algorithm for the model is designed to determine the optimal price, initial ordering quantity, shortage time point, and the maximum inventory level. Finally, numerical examples are presented to illustrate the model, and the results show the robustness of the proposed model.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1709-1727"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IIN-FFD: Intra-Inter Network for Face Forgery Detection IIN-FFD:用于人脸伪造检测的内部网络
IF 6.6 1区 计算机科学
Tsinghua Science and Technology Pub Date : 2024-06-20 DOI: 10.26599/TST.2024.9010022
Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu
{"title":"IIN-FFD: Intra-Inter Network for Face Forgery Detection","authors":"Qihua Zhou;Zhili Zhou;Zhipeng Bao;Weina Niu;Yuling Liu","doi":"10.26599/TST.2024.9010022","DOIUrl":"https://doi.org/10.26599/TST.2024.9010022","url":null,"abstract":"Since different kinds of face forgeries leave similar forgery traces in videos, learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery detection. Therefore, to accurately detect known forgeries while ensuring high generalization ability of detecting unknown forgeries, we propose an intra-inter network (IIN) for face forgery detection (FFD) in videos with continual learning. The proposed IIN mainly consists of three modules, i.e., intra-module, inter-module, and forged trace masking module (FTMM). Specifically, the intra-module is trained for each kind of face forgeries by supervised learning to extract special features, while the inter-module is trained by self-supervised learning to extract the common features. As a result, the common and special features of the different forgeries are decoupled by the two feature learning modules, and then the decoupled common features can be utlized to achieve high generalization ability for FFD. Moreover, the FTMM is deployed for contrastive learning to further improve detection accuracy. The experimental results on FaceForensic++ dataset demonstrate that the proposed IIN outperforms the state-of-the-arts in FFD. Also, the generalization ability of the IIN verified on DFDC and Celeb-DF datasets demonstrates that the proposed IIN significantly improves the generalization ability for FFD.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"29 6","pages":"1839-1850"},"PeriodicalIF":6.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10566006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141435251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信