Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Single image shadow removal method based on multistage generative adversarial network
ZHANG Shuping, WU Wen, WAN Yi
Journal of Computer Applications    2020, 40 (8): 2378-2385.   DOI: 10.11772/j.issn.1001-9081.2019122146
Abstract389)      PDF (2308KB)(313)       Save
Traditional deep learning shadow removal methods often change the pixels in non-shadow areas and cannot obtain results with smooth boundary transition. In order to solve these problems, a new multistage shadow removal framework based on Generative Adversarial Network (GAN) was proposed. Firstly, shadow mask and shadow matte of the input image were generated by multitask driven generator via shadow detection subnet and shadow matter generation subnet respectively. Secondly, under the guidance of shadow mask and shadow matte, an umbra module and a penumbra module were designed respectively to remove different types of shadows successively. Thirdly, a new compose loss function dominated by least squares loss was created to obtain a better result. Compared with state-of-the-art shadow removal methods based on deep learning, the proposed method has the Balanced Error Rate (BER) averagely reduced by 4.39%, the Structural SIMilarity index (SSIM) averagely improved by 0.44%, and the Root Mean Square Error (RMSE) averagely reduced by 13.32%. Experimental results show that the boundary transition of shadow removal result of the proposed method is smoother.
Reference | Related Articles | Metrics
Single image shadow detection method based on entropy driven domain adaptive learning
YUAN Yuan, WU Wen, WAN Yi
Journal of Computer Applications    2020, 40 (7): 2131-2136.   DOI: 10.11772/j.issn.1001-9081.2019122068
Abstract314)      PDF (1610KB)(325)       Save
Cross-domain discrepancy frequently hinders deep neural networks to generalize to different datasets. In order to improve the robustness of shadow detection, a novel unsupervised domain adaptive shadow detection framework was proposed. Firstly, in order to reduce the data bias between different domains, a multi-level domain adaptive model was introduced to align the feature distributions of source domain and target domain from low level to high level. Secondly, to improve the model ability of soft shadow detection, a boundary-driven adversarial branch was proposed to guarantee the structured shadow boundary was also able to be obtained by the model on the target dataset. Thirdly, the entropy adversarial branch was combined to further suppress the high uncertainty at shadow boundary of the prediction result, so as to obtain an accurate and smooth shadow mask. Compared with the existing deep learning-based shadow detection methods, the proposed method has the Balance Error Rate (BER) averagely reduced by 10.5% and 18.75% on ISTD dataset and SBU dataset respectively. The experimental results demonstrate that the shadow detection results of the proposed algorithm have better boundary structure.
Reference | Related Articles | Metrics
Single image shadow removal based on attenuated generative adversarial networks
LIAO Bin, TAN Daoqiang, WU Wen
Journal of Computer Applications    2019, 39 (9): 2712-2718.   DOI: 10.11772/j.issn.1001-9081.2019020321
Abstract412)      PDF (1327KB)(262)       Save

Shadow in an image is important visual information of the projective object, but it affects computer vision tasks. Existing single image shadow removal methods cannot obtain good shadow-free results due to the lack of robust shadow features or insufficiency of and errors in training sample data. In order to generate accurately the shadow mask image for describing the illumination attenuation degree and obtain the high quality shadow-free image, a single image shadow removal method based on attenuated generative adversarial network was proposed. Firstly, an attenuator guided by the sensitive parameters was used to augment the training sample data in order to provide shadow sample images agreed with physical illumination model for a subsequent generator and discriminator. Then, with the supervision from the discriminator, the generator combined perceptual loss function to generate the final shadow mask. Compared with related works, the proposed method can effectively recover the illumination information of shadow regions and obtain the more realistic shadow-free image with natural transition of shadow boundary. Shadow removal results were evaluated using objective metric. Experimental results show that the proposed method can remove shadow effectively in various real scenes with a good visual consistency.

Reference | Related Articles | Metrics
Video shadow removal method using region matching guided by illumination transfer
LIAO Bin, WU Wen
Journal of Computer Applications    2019, 39 (2): 556-563.   DOI: 10.11772/j.issn.1001-9081.2018061227
Abstract345)      PDF (1465KB)(247)       Save
In order to solve spatio-temporally incoherent problem of traditional shadow removal methods for videos captured by free moving cameras, a shadow detection and removal approach using region matching guided by illumination transfer was proposed. Firstly, the input video was segmented by using Mean Shift method based on Scale Invariant Feature Transform (SIFT), and the video shadow was detected by Support Vector Machine (SVM) classifier. Secondly, the input video was decomposed into overlapped 2D patches, and a Markov Random Field (MRF) for this video was set up, and the corresponding lit patch for every shadow patch was found via region matching guided by optical flow. Finally, in order to get spatio-temporally coherent results, each shadow patch was processed with its matched lit patch by local illumination transfer operation and global shadow removal. The experimental results show that the proposed algorithm obtains higher accuracy and lower error than the traditional methods based on illumination transfer, the comprehensive evaluation metric is improved by about 6.23%, and the Root Mean Square Error (RMSE) is reduced by about 30.12%. It can obtain better shadow removal results with more spatio-temporal coherence but much less time.
Reference | Related Articles | Metrics
New voting protocol based on homomorphic threshold cryptography
DAI Xiaokang, CHEN Changbo, WU Wenyuan
Journal of Computer Applications    2018, 38 (4): 1036-1040.   DOI: 10.11772/j.issn.1001-9081.2017102400
Abstract405)      PDF (905KB)(427)       Save
A new voting protocol was proposed to solve the problem that most of the existing voting protocols require a trusted management authority. This protocol comprehensively makes use of homomorphic encryption, threshold cryptography, blind signature, ring signature, zero knowledge proof, and so on, to resolves the coexistence problem between robustness and the absence of trusted third party under the assumption that no one abstains from voting or the authority does not cheat conspiracy with other voters when one voter abstains from voting, at the same time, anonymity, eligibility, robustness, verifiability and no trusted third party are also satisfied.
Reference | Related Articles | Metrics
Multi-scale network replication technology for fusion of virtualization and digital simulation
WU Wenyan, JIANG Xin, WANG Xiaofeng, LIU Yuan
Journal of Computer Applications    2018, 38 (3): 746-752.   DOI: 10.11772/j.issn.1001-9081.2017081956
Abstract561)      PDF (1193KB)(398)       Save
The network replication technology has become the cornerstone of the evaluation platform for network security experiments and the system for network emulation. Facing the requirements of fidelity and scalability of network replication, a multi-scale network replication technology based on cloud platform for the fusion of lightweight virtualization, full virtualization and digital simulation was proposed. The architecture of the seamless fusion of these three scales was introduced at the beginning; And then the network construction technology based on the architecture was studied. The emulation experimental results show that the emulation network which is built with the construction technology has the characteristics of flexibility, transparency and concurrency; in addition, the construction technology is capable of emulating networks with high extensibility. At last, communication tests for a variety of protocols and simple network security experiments on the large-scale emulation network were conducted to verify the availability of this large-scale emulation network. The extensive experimental results show that the multi-scale network replication technology for the fusion of virtualization and digital simulation can be used as the powerful support for creating large-scale emulation networks.
Reference | Related Articles | Metrics
Attack graph based risk assessment method for cyber security of cyber-physical system
WU Wenbo, KANG Rui, LI Zi
Journal of Computer Applications    2016, 36 (1): 203-206.   DOI: 10.11772/j.issn.1001-9081.2016.01.0203
Abstract541)      PDF (608KB)(475)       Save
Recent incidents such as the Stuxnet worm have shown that cyber attacks can cause serious physical damage of Cyber-Physical System (CPS). Aiming at this problem, a risk assessment method based on attack graph was proposed. Firstly, the attack behavior of CPS was analyzed and the result showed that the vulnerabilities in physical devices such as Programmable Logic Controller (PLC) were the keys of cross-domain attack. Then the utilization modes and impact of vulnerabilities were described. Secondly, the risk assessment model was proposed as well as the successful-attack-probability index and the attack-impact index. Furthermore, the successful-attack-probability index was calculated considering the intrinsic characteristics of vulnerabilities and the ability of attacker. The attack-impact index was calculated considering the host importance and the utilization mode of vulnerabilities. The method was developed to assess the cyber layer and physical layer as a whole system and the impact of multiple cross-domain attacks on system risk was considered. The numerical examples show that the risk of combined attack is five times the risk of a single attack and the risk value obtained is more accurate.
Reference | Related Articles | Metrics
Adaptive slicing algorithm to retain model characteristics
LI Wenkang, CHEN Changbo, WU Wenyuan
Journal of Computer Applications    2015, 35 (8): 2295-2300.   DOI: 10.11772/j.issn.1001-9081.2015.08.2295
Abstract470)      PDF (941KB)(391)       Save

To resolve the problem that the existing adaptive slicing algorithm in 3D printing cannot retain effectively model characteristics, a new adaptive slicing method for recognizing and retaining model characteristics was proposed. Firstly, the definition of model characteristic was extended, and the concept of loss and offset of model characteristic was introduced. Secondly, a characteristic recognition method was proposed, the key point of which is to make use of the fact that the surface complexity and number of contours must change around the model characteristics. Finally, based on existing adaptive slicing algorithms, this algorithm retained model characteristics by slicing the model with minimum layer thickness near the model characteristics. On the self-developed software Slicer3DP, the following algorithms were implemented: the uniform slicing algorithm, the adaptive slicing algorithm and the proposed slicing algorithm. By comparing these algorithms, it is found that the proposed slicing algorithm resolves effectively the loss and offset of model characteristics while maintaining both slicing precision and efficiency. The result shows that the proposed method can be used for 3D printing with high precision requirement.

Reference | Related Articles | Metrics
Optimal hyperplane modification of support vector machine based on Fisher within-class scatter
YANG Ting MENG Xiangru WEN Xiangxi WU Wen
Journal of Computer Applications    2013, 33 (09): 2553-2556.   DOI: 10.11772/j.issn.1001-9081.2013.09.2553
Abstract542)            Save
The generalization of Support Vector Machines (SVM) will decline when the training data sets get imbalanced distribution. A modification method of the optimal hyperplane based on average divergence ratio according to Fisher within-class scatter was proposed to solve the problem. The normal vector of the optimal hyperplane was got after SVM training. The Fisher within-class scatter was introduced to evaluate the distribution of the two classes. On this basis, the optimal hyperplane was modified by the ratio of the average distribution scatter that was obtained according to the number of samples. The experimental results on benchmarks data sets show that the proposed method improves the classification accuracy of the class with less training data, so as to improve the SVM's generalization.
Related Articles | Metrics
Calculation method for singular solutions of a class of nonlinear equations and its application
JI Zhenyi WU Wenyuan FENG Yong
Journal of Computer Applications    2013, 33 (01): 230-233.   DOI: 10.3724/SP.J.1087.2013.00230
Abstract856)      PDF (561KB)(672)       Save
To resolve the peculiar problem of the Jacobian matrix for a special class of nonlinear equations, an improved Newton mtheod was proposed based on the dual space. This paper proposed an explicit formula to compute the dual space of an ideal in a point through polynomial multiplication, and constructed augmented equations using the dual space. Meanwhile, the Jacobian matrix of augmented equations at initial point was full rank, and then the algorithm recovered quadratical convergence of Newton's iteration. The experimental results show that after three iterations, the accuracy of computation can achieve 10^(-15). The proposed method further enriches the theories of the dual space of ideal in algebra geometry and provides a new method for the numerical calculation in engineering applications.
Reference | Related Articles | Metrics
Strategy selection model for network survivability based on stochastic game
LIANG Xiao MENG Xiang-ru ZHUANG Xu-chun WU Wen
Journal of Computer Applications    2012, 32 (09): 2609-2612.   DOI: 10.3724/SP.J.1087.2012.02609
Abstract877)      PDF (621KB)(557)       Save
To improve the survivability of networks, a strategy selection model based on stochastic game was proposed. According to the damage impact on system made by the attacker behavior, the game process was divided into the resistance phase, the recognition phase, and the recovery phase. The relationship between the transition of system state and strategy selection was depicted from a specific view, based on it, a strategy selection analytical method was presented. A representative network example was provided to verify the feasibility and validity of the proposed method in the prediction of attacker behavior and decision of optimal strategy.
Reference | Related Articles | Metrics
Particle swarm optimization algorithm based on chaos cloud model
ZHANG Chao-long YU Chun-ri JIANG Shan-he LIU Quan-jin WU Wen-jin LI Yan-mei
Journal of Computer Applications    2012, 32 (07): 1951-1954.   DOI: 10.3724/SP.J.1087.2012.01951
Abstract1114)      PDF (623KB)(736)       Save
To deal with the problems of low accuracy and local convergence in conventional Particle Swarm Optimization (PSO) algorithm, the chaos algorithm and cloud model algorithm were introduced into the evolutionary process of PSO algorithm and the chaos cloud model particle swarm optimization (CCMPSO) algorithm was proposed. The particles were divided into excellent particles and normal particles when CCMPSO was in convergent status. To search the global optimum location, the cloud model algorithm as well as excellent particles was applied to local refinement in convergent area, meanwhile chaos algorithm and normal particles were used to global optimization in the outside space of convergent area. The convergence of CCMPSO was analyzed by eigenvalue method. The simulation results prove the CCMPSO has better optimization performance than other main PSO algorithms.
Reference | Related Articles | Metrics