Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Image copy-move forgery detection based on multi-scale feature extraction and fusion
Juntao CHEN, Ziqi ZHU
Journal of Computer Applications    2023, 43 (9): 2919-2924.   DOI: 10.11772/j.issn.1001-9081.2022081288
Abstract272)   HTML13)    PDF (1303KB)(133)       Save

In the field of image copy-move forgery detection, it is very challenging to locate the boundaries of tampered small objects accurately. Current deep learning-based methods locate forged regions by detecting similar content in images. However, these methods usually just transmit the final features extracted by the encoder to the decoder to generate the mask, and ignore more spatial information of forged regions contained in the high-resolution encoding features, resulting in inaccurate model output prediction results for the boundary identification of small objects. To address this problem, a detection network based on multi-scale feature extraction and fusion called SimiNet was proposed. Firstly, abundant features were extracted by the multi-scale feature extraction module. Secondly, a skip connection was added between the feature extraction module and the decoding module to bridge the gap between the encoding and decoding features, so as to identify the boundaries of small objects accurately. Finally, Log-Cosh Dice Loss function was used to take the place of cross entropy loss to reduce the impact of class-imbalance problem on detection results. Experimental results show that the F1 score of SimiNet on USCISI dataset reaches 72.54%, which is 3.39 percentage points higher than that of the suboptimal method CMSDNet (Copy-Move Similarity Detection Network). It can be seen that SimiNet is more accurate for boundary identification of small objects and has better visualization.

Table and Figures | Reference | Related Articles | Metrics
Searchable encryption scheme based on splittable inverted index
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN
Journal of Computer Applications    2021, 41 (11): 3288-3294.   DOI: 10.11772/j.issn.1001-9081.2021010112
Abstract372)   HTML9)    PDF (639KB)(118)       Save

For retrieving the encrypted data in cloud environment quickly, an efficient searchable encryption scheme for batch data processing scenarios was proposed. Firstly, two inverted indexes were built by the client, one file index was used to store the file-keyword mapping, another empty search index was used to store keyword-file mapping. Then, these two indexes were submitted to the cloud server. The search indexwas gradually updated and constructed according to the search tokens and file indexesduring the user’s search by the cloud, and the search results of the searched keywords were recorded by this search index. In this way, the search index construction time was shared to each retrieval process effectively and the storage space of search index was reduced. A set storage method based on key-value structure was adopted by the indexes, which supported the at-the-same-time merging and splitting of index, which means when adding and deleting files, the corresponding file index and search index were generated by the client according to the file set to be added or deleted, then the server merged or split the indexes, so that the files were able to be added and deleted in batch quickly. Testing results show that the proposed scheme greatly improves the updating efficiency of files and is suitable for batch data processing. Through leakage function, it is proved that the proposed scheme can meet the indistinguishability security standard against adaptive dynamic keyword selection attack.

Table and Figures | Reference | Related Articles | Metrics
High-dimensional data clustering algorithm with subspace optimization
WU Tao CHEN Lifei GUO Gongde
Journal of Computer Applications    2014, 34 (8): 2279-2284.   DOI: 10.11772/j.issn.1001-9081.2014.08.2279
Abstract261)      PDF (968KB)(405)       Save

A new soft subspace clustering algorithm was proposed to address the optimization problem for the projected subspaces, which was generally not considered in most of the existing soft subspace clustering algorithms. Maximizing the deviation of feature weights was proposed as the sub-space optimization goal, and a quantitative formula was presented. Based on the above, a new optimization objective function was designed which aimed at minimizing the within-cluster compactness while optimizing the soft subspace associated with each cluster. A new expression for feature-weight computation was mathematically derived, with which the new clustering algorithm was defined based on the framework of the classical k-means. The experimental results show that the proposed method significantly reduces the probability of trapping in local optimum prematurely and improves the stability of clustering results. And it has good performance and clustering efficiency, which is suitable for high-dimensional data cluster analysis.

Reference | Related Articles | Metrics
Survey of influence in social networks
XIA tao CHEN Yunfang ZHANG Wei LU Youwei
Journal of Computer Applications    2014, 34 (4): 980-985.   DOI: 10.11772/j.issn.1001-9081.2014.04.0980
Abstract433)      PDF (994KB)(587)       Save

In the field of social influence propagation, social network as the media plays a fundamental role in interaction between social individuals and disseminating information or views. First, the definition of social influence and the essential attribute of social influences as the social relevance were discussed. Then, the independent cascade model and the linear threshold model were expounded, as well as greedy algorithm and heuristic algorithms which can confirm the influential people. Finally, the new trend of research on social influence, such as community-based influence maximization algorithm and research on the influence of multiple subjects and multiple behaviors were deeply analyzed.

Reference | Related Articles | Metrics
Distributed time division multiple access scheduling strategy for wireless sensor networks
LIU Tao CHEN Yihong TAN Ying CHEN Yaqian
Journal of Computer Applications    2014, 34 (1): 8-12.   DOI: 10.11772/j.issn.1001-9081.2014.01.0008
Abstract1016)      PDF (705KB)(515)       Save
In a periodic report Wireless Sensor Network (WSN), heavy data traffic very easily leads to serious transmission collisions. This paper proposed a distributed Time Division Multiple Access (TDMA) scheduling strategy, called DTSS, to construct an appropriate transmission schedule that avoided transmission collisions. DTSS took advantage of a distributed competitive algorithm to build the transmission schedule. Each node selected its next-hop forwarding node and competed for a transmission time slot with its contending nodes. After the construction of the schedule, the nodes sent and received the data according to the schedule. The simulation results confirm DTSS avoids transmission collisions, decreases the energy consumption of nodes and significantly improves the network lifetime.
Related Articles | Metrics
Image memorability model based on visual saliency entropy and Object Bank feature
CHEN Changyuan HAN Junwei HU Xintao CHENG Gong GUO Lei
Journal of Computer Applications    2013, 33 (11): 3176-3178.  
Abstract646)      PDF (674KB)(417)       Save
To improve the prediction ability of image memorability, a method for automatically predicting the memorability of an image was proposed by using visual saliency entropy and improved Object Bank feature. The proposed method improved the traditional Object Bank feature and extracted the visual saliency entropy feature. Then a prediction model of image memorability was constructed by using Support Vector Regression (SVR). The experimental results show that the correlation coefficiency of the proposed method is three percentage higher than the state-of-the-art method. The proposed model can be used in image memorability prediction, image retrieval ranking and advertisement assessment analysis.
Related Articles | Metrics
Improved mandatory access control model for Android
JIANG Shaolin WANG Jinshuang YU Han ZHANG Tao CHEN Rong
Journal of Computer Applications    2013, 33 (06): 1630-1636.   DOI: 10.3724/SP.J.1087.2013.01630
Abstract1374)      PDF (1096KB)(846)       Save
In order to protect Android platforms from the application-level privilege escalation attacks, this paper analyzed the XManDroid access control model, which has better ability on fighting these attacks, especially the collusion attack on the covert channel. To address the problem that XManDroid could not detect the multi-application and multi-permissions collusion attacks, this paper proposed an improved mandatory access control model which recorded the communication history of applications by building an IPC links colored diagram. At last, the test result on the prototype system show that the new model can solve the problem in the XManDroid well.
Reference | Related Articles | Metrics
Finite element simulation of implant surgery for vocal cord paralysis
CHEN Weitao CHEN Dongfan HAN Xingqian ZHOU Chen GAO Xiang
Journal of Computer Applications    2013, 33 (03): 896-900.   DOI: 10.3724/SP.J.1087.2013.00896
Abstract729)      PDF (723KB)(427)       Save
As surgeons do not have effective prediction on the the implant surgery for vocal cord paralysis, resulting in high rate of failure, the finite element method was used for preoperative simulation. Through Computed Tomography (CT) data of larynx, the 3D geometric model of vocal cords and glottis trachea was extracted by Mimics, and then imported into ANSYS-Fluent to simulate the vocal vibration mode and airflow dynamic coupling characteristics before and after implanted surgery. The experimental data and clinical statistics data were compared to prove the feasibility of the finite element analysis techniques for implant surgery simulation of vocal cord paralysis. The experimental result can provide support for the design of surgery program.
Reference | Related Articles | Metrics
Fleet elastic load balancing mechanism in cloud environment
DU Yao GUO Tao CHEN Junjie
Journal of Computer Applications    2013, 33 (03): 830-833.   DOI: 10.3724/SP.J.1087.2013.00830
Abstract1309)      PDF (641KB)(519)       Save
In order to overcome the defects of traditional rigid load balancing mechanism that it can not adapt to changing network environment, and to solve the problem of load balancing mechanisms in cloud environment that it can not take full advantage of elastic characteristics and Quality of Service (QoS) would be unstable, this paper proposed a new load balancing mechanism in cloud environment based on green computing resource pool strategy. It quantified the load according to the utilization rate of system resources and the quantization decided distribution of virtual machines. On the basis of the use of the virtual machines, resources would be recycled to improve resource utilization. The experimental results show that the response time stablizes around 2.5 seconds, the overall QoS has been obviously improved with the power consumption reduced, and the effectiveness of the mechanisms has been verified.
Reference | Related Articles | Metrics
Fast collision detection algorithm based on image space
YU Haijun MA Chunyong ZHANG Tao CHEN Ge
Journal of Computer Applications    2013, 33 (02): 530-533.   DOI: 10.3724/SP.J.1087.2013.00530
Abstract1142)      PDF (653KB)(399)       Save
In order to meet the high requirements of real-time collision detection in increasingly complex virtual environment, a fast collision detection algorithm based on image space was proposed. It made efficiently use of the Graphics Processing Unit (GPU). Based on the hierarchical binary tree and the collision detection between Oriented Bounding Boxes (OBB), the algorithm could quickly eliminate disjoint bumps of the virtual scene. With the potential collision set, the efficiency of the algorithm has a significantly improvement on the basis of RECODE algorithm. The experimental results show that the algorithm achieves good results, and has a higher efficiency, especially in a highly complex virtual environment.
Related Articles | Metrics
MAC protocol based on adaptive update in wireless senor networks
LIU Ming-zhu XU Shi-tao CHEN Guang
Journal of Computer Applications    2012, 32 (12): 3508-3511.   DOI: 10.3724/SP.J.1087.2012.03508
Abstract847)      PDF (641KB)(507)       Save
In order to solve the energy limitation problem on wireless sensor network nodes, this paper proposed a new adaptive update asynchronous MAC protocol — AU-MAC protocol. This protocol combined the sleep-work state switching mode, asynchronous mode with adaptive update to effectively extend the network life. AU-MAC protocol improved channel usage efficiency by making use of sender monitoring and receiver activating data transfer. And, it established a neighbor node information table and introduced adaptive updating mechanism, to reduce the free monitor. The functions of AU-MAC protocol had been estimated on NS2 network simulation platform. It shows that, AU-MAC protocol improves the energy efficiency at the basis of maintaining the same throughput and end-end transit delay.
Related Articles | Metrics
Functional description extraction of code based on formal semantics of Clight
WANG Tao CHEN Min-yi QI Jun
Journal of Computer Applications    2012, 32 (08): 2333-2337.   DOI: 10.3724/SP.J.1087.2012.02333
Abstract718)      PDF (767KB)(333)       Save
Code function description extraction is the basic premise of functional integration. To address the problem of common low accuracy rate of extraction of code function, the mechanism of extracting code function description based on formal semantic of Clight was proposed, and it was realized by algorithm of Clight code function description. This mechanism was strictly based on Clight natural semantics inference rules, ignoring the details of code execution in the middle, only concerned with the memory states before and after implementation. And as a functional description of the code feature description, it improved the accuracy of functional extraction and the success rate of the key area in software development.
Reference | Related Articles | Metrics
Model of preventing URL attacks based on artificial immunity
QIN Guo-rong HE Tao CHEN Jian-gang
Journal of Computer Applications    2012, 32 (05): 1400-1403.  
Abstract951)      PDF (2165KB)(692)       Save
For preventing URL (Universal Resource Locator) attacks, this paper proposed a model based on artificial immunity. Applying the self-protection mechanism of biological immune system to network security, through deploying resource safely, avoiding guessing primary key, requesting valid check and business exception check, this model prevented URL attack in different levels while responding to valid request normally and made the applications acquire the secondary immunity. This paper also proposed and analyzed the key technology of implementing the model: the algorithm of avoiding guessing primary key and an enhanced static password algorithm based on random number. This model has been applied to two practical applications. The test results and the practical applications confirm the effectiveness of the model.
Reference | Related Articles | Metrics
Priority-based service differentiation and rate control strategy
LIU Hong-tao CHENG Liang-lun
Journal of Computer Applications    2011, 31 (06): 1458-1460.   DOI: 10.3724/SP.J.1087.2011.01458
Abstract1609)      PDF (478KB)(727)       Save
To support Quality of Service (QoS) requirements for different kinds of network in medium and high rate wireless sensor networks, a priority-based service differentiation and rate control strategy was proposed. The strategy gives high priority to the traffic with strong real-time and reliability requirement for service differentiation, calculates the rate difference using the factor ε, and adjusts the sending rate of its upstream node by using hop-by-hop method. The simulation results show the proposed strategy can guarantee high-priority real-time traffic with high throughput and low latency, and maintain the stability of the network throughput.
Related Articles | Metrics
Cellular automaton model based on fuzzy control rule
Yong-Gang GONG Tao CHEN
Journal of Computer Applications   
Abstract1845)      PDF (647KB)(987)       Save
A cellular automaton model for one-lane highway traffic was proposed in this paper. Based on the classical NS model, the randomization parameter of a vehicle was calculated according to fuzzy control rules. Some basic qualitative results and the fundamental diagram of our new model were got through computer simulations. Compared with other existing single lane cellular automaton models, the experimental results show that our new model is able to reproduce some of the real macroscopic traffic characteristics such as hysteresis.
Related Articles | Metrics