1,660 research outputs found

    Foreword = 前言

    Full text link

    A Lightweight Reliably Quantified Deepfake Detection Approach

    Get PDF
    Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the convolutional neural network backbone and the efficient convolutional attention mechanism, outperforming the state-of-the-art baseline models on each benchmark test dataset. Furthermore, a real-life Deepfake content is usually unknown about the corresponding source dataset or manipulation technique. We conduct a model reliability study using statistical random sampling from the available benchmark datasets to imitate the real-life Deepfake cases. A sufficient number of trials for model evaluation with random sampling derives the 95% and 90% confidence intervals, informing the reliable accuracy information of the proposed model. As a result, the reliably quantified detection model derives satisfactory accuracy and error rate to be applicable at the court for civil cases and provides an informative scheme to analyze future satisfactory approaches for criminal cases at the court

    Measurement of multi-wall carbon nanotube penetration through a screen filter and single-fiber analysis

    Get PDF
    In this study, we carried out experiments to study penetration of airborne carbon nanotubes (CNTs) through a screen filter. An electrospray system was employed to aerosolize suspensions of multi-wall CNTs. The generated airborne CNTs were characterized by electron microscopy, and the length and diameter were measured. In the filtration experiments, the challenging CNTs are classified by a differential mobility analyzer. Monodisperse CNTs with the same electrical mobility were then employed to challenge the screen filter. Penetration was measured for CNTs in the range of 100-400nm mobility diameters. The results showed that the CNT penetration was less than the penetration for a sphere with the same mobility diameter, which was mainly due to the larger interception length of the CNTs. We compared the modeling results using single-fiber filtration efficiency theories with the experimental data, and found that the effective interception length can be approximated by the CNT aerodynamic diameter multiplying a scaling factor. A hypothesis is proposed to understand the observatio

    Deepfake Detection: A Comprehensive Study from the Reliability Perspective

    Full text link
    The mushroomed Deepfake synthetic materials circulated on the internet have raised serious social impact to politicians, celebrities, and every human being on earth. In this paper, we provide a thorough review of the existing models following the development history of the Deepfake detection studies and define the research challenges of Deepfake detection in three aspects, namely, transferability, interpretability, and reliability. While the transferability and interpretability challenges have both been frequently discussed and attempted to solve with quantitative evaluations, the reliability issue has been barely considered, leading to the lack of reliable evidence in real-life usages and even for prosecutions on Deepfake related cases in court. We therefore conduct a model reliability study scheme using statistical random sampling knowledge and the publicly available benchmark datasets to qualitatively validate the detection performance of the existing models on arbitrary Deepfake candidate suspects. A barely remarked systematic data pre-processing procedure is demonstrated along with the fair training and testing experiments on the existing detection models. Case studies are further executed to justify the real-life Deepfake cases including different groups of victims with the help of reliably qualified detection models. The model reliability study provides a workflow for the detection models to act as or assist evidence for Deepfake forensic investigation in court once approved by authentication experts or institutions.Comment: 20 pages for peer revie

    A Theoretical and Strategic Framework for Information Systems Adoption in Supply Chain Management

    Get PDF
    Data, information and knowledge are critical assets to the performance of logistics and supply chain management (SCM), because they provide the basis upon which management can plan logistics operations, organize logistics and supply chain (SC) processes, coordinate and communicate with business partners, conduct functional logistics activities, and perform managerial control of physical flow of goods, information exchange and sharing among SC partners. In this paper, we firstly discuss the theories related to IS/IT adoption, and then we discuss a strategic framework and finally, strategies for IS/IT adoption in SCM context are provided

    Impact of Social Media Management Styles on Willingness to Be a Fan: A Transaction Cost Economics Perspective

    Get PDF
    This study investigates the impacts of different styles of social media management on user’s willingness to be a fan. Six companies’ brand-pages on a social media site are examined. Data are collected using survey and interview with a group of social media users. Qualitative data analyses are conducted based on 30 observation reports and 60 open-ended surveys, with follow-up interviews. Grounded on the theoretical lens of transaction cost economics, we find that companies successful in attracting more fans adopt the bilateral governance structure (with frequent updates and mixed asset specificity) in their social media transactions. They are relatively more dedicated and allocate more amounts of resources in their social media interactions. Practicing the right governance structure is demonstrated to be more preferable to the fans, able to attract more engagement and generate organic media in the long run. This is because it is helpful for creating positive perceptions of a brand-page, and fans find it useful in reducing their efforts in information searching and product procurement and social networking costs; and this in turn shows to positively impact one’s willingness to be a fan of the page, which can possibly create the opportunities to be a potential customer, leading to future purchases from the brand. This study also identifies the key concepts or sub-constructs of (user’s) willingness to be a fan of a brand-page in the context of social media. They are brand-page management style (dedicated, caring, responsive), contents (quality, usefulness, diversity) and product (uniqueness, variety, popularity). Available at: https://aisel.aisnet.org/pajais/vol11/iss2/2

    Weakly-supervised Part-Attention and Mentored Networks for Vehicle Re-Identification

    Full text link
    Vehicle re-identification (Re-ID) aims to retrieve images with the same vehicle ID across different cameras. Current part-level feature learning methods typically detect vehicle parts via uniform division, outside tools, or attention modeling. However, such part features often require expensive additional annotations and cause sub-optimal performance in case of unreliable part mask predictions. In this paper, we propose a weakly-supervised Part-Attention Network (PANet) and Part-Mentored Network (PMNet) for Vehicle Re-ID. Firstly, PANet localizes vehicle parts via part-relevant channel recalibration and cluster-based mask generation without vehicle part supervisory information. Secondly, PMNet leverages teacher-student guided learning to distill vehicle part-specific features from PANet and performs multi-scale global-part feature extraction. During inference, PMNet can adaptively extract discriminative part features without part localization by PANet, preventing unstable part mask predictions. We address this Re-ID issue as a multi-task problem and adopt Homoscedastic Uncertainty to learn the optimal weighing of ID losses. Experiments are conducted on two public benchmarks, showing that our approach outperforms recent methods, which require no extra annotations by an average increase of 3.0% in CMC@5 on VehicleID and over 1.4% in mAP on VeRi776. Moreover, our method can extend to the occluded vehicle Re-ID task and exhibits good generalization ability.Comment: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Deep Convolutional Pooling Transformer for Deepfake Detection

    Full text link
    Recently, Deepfake has drawn considerable public attention due to security and privacy concerns in social media digital forensics. As the wildly spreading Deepfake videos on the Internet become more realistic, traditional detection techniques have failed in distinguishing between real and fake. Most existing deep learning methods mainly focus on local features and relations within the face image using convolutional neural networks as a backbone. However, local features and relations are insufficient for model training to learn enough general information for Deepfake detection. Therefore, the existing Deepfake detection methods have reached a bottleneck to further improve the detection performance. To address this issue, we propose a deep convolutional Transformer to incorporate the decisive image features both locally and globally. Specifically, we apply convolutional pooling and re-attention to enrich the extracted features and enhance efficacy. Moreover, we employ the barely discussed image keyframes in model training for performance improvement and visualize the feature quantity gap between the key and normal image frames caused by video compression. We finally illustrate the transferability with extensive experiments on several Deepfake benchmark datasets. The proposed solution consistently outperforms several state-of-the-art baselines on both within- and cross-dataset experiments.Comment: Accepted to be published in ACM TOM
    • …
    corecore