Alert button
Picture for Hui Guo

Hui Guo

Alert button

FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information

Feb 04, 2023
Chenghong Sun, Weidong Ji, Guohui Zhou, Hui Guo, Zengxiang Yin, Yuqi Yue

Figure 1 for FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information
Figure 2 for FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information
Figure 3 for FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information
Figure 4 for FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information

The main purpose of relation extraction is to extract the semantic relationships between tagged pairs of entities in a sentence, which plays an important role in the semantic understanding of sentences and the construction of knowledge graphs. In this paper, we propose that the key semantic information within a sentence plays a key role in the relationship extraction of entities. We propose the hypothesis that the key semantic information inside the sentence plays a key role in entity relationship extraction. And based on this hypothesis, we split the sentence into three segments according to the location of the entity from the inside of the sentence, and find the fine-grained semantic features inside the sentence through the intra-sentence attention mechanism to reduce the interference of irrelevant noise information. The proposed relational extraction model can make full use of the available positive semantic information. The experimental results show that the proposed relation extraction model improves the accuracy-recall curves and P@N values compared with existing methods, which proves the effectiveness of this model.

Viaarxiv icon

Open-Eye: An Open Platform to Study Human Performance on Identifying AI-Synthesized Faces

May 13, 2022
Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

Figure 1 for Open-Eye: An Open Platform to Study Human Performance on Identifying AI-Synthesized Faces
Figure 2 for Open-Eye: An Open Platform to Study Human Performance on Identifying AI-Synthesized Faces
Figure 3 for Open-Eye: An Open Platform to Study Human Performance on Identifying AI-Synthesized Faces

AI-synthesized faces are visually challenging to discern from real ones. They have been used as profile images for fake social media accounts, which leads to high negative social impacts. Although progress has been made in developing automatic methods to detect AI-synthesized faces, there is no open platform to study the human performance of AI-synthesized faces detection. In this work, we develop an online platform called Open-eye to study the human performance of AI-synthesized face detection. We describe the design and workflow of the Open-eye in this paper.

* Accepted by IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR), 2022 
Viaarxiv icon

GAN-generated Faces Detection: A Survey and New Perspectives

Feb 15, 2022
Xin Wang, Hui Guo, Shu Hu, Ming-Ching Chang, Siwei Lyu

Figure 1 for GAN-generated Faces Detection: A Survey and New Perspectives
Figure 2 for GAN-generated Faces Detection: A Survey and New Perspectives
Figure 3 for GAN-generated Faces Detection: A Survey and New Perspectives

Generative Adversarial Networks (GAN) have led to the generation of very realistic face images, which have been used in fake social media accounts and other disinformation matters that can generate profound impacts. Therefore, the corresponding GAN-face detection techniques are under active development that can examine and expose such fake faces. In this work, we aim to provide a comprehensive review of recent progress in GAN-face detection. We focus on methods that can detect face images that are generated or synthesized from GAN models. We classify the existing detection works into four categories: (1) deep learning-based, (2) physical-based, (3) physiological-based methods, and (4) evaluation and comparison against human visual performance. For each category, we summarize the key ideas and connect them with method implementations. We also discuss open problems and suggest future research directions.

Viaarxiv icon

Robust Attentive Deep Neural Network for Exposing GAN-generated Faces

Sep 05, 2021
Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

Figure 1 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 2 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 3 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 4 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces

GAN-based techniques that generate and synthesize realistic faces have caused severe social concerns and security problems. Existing methods for detecting GAN-generated faces can perform well on limited public datasets. However, images from existing public datasets do not represent real-world scenarios well enough in terms of view variations and data distributions (where real faces largely outnumber synthetic faces). The state-of-the-art methods do not generalize well in real-world problems and lack the interpretability of detection results. Performance of existing GAN-face detection models degrades significantly when facing imbalanced data distributions. To address these shortcomings, we propose a robust, attentive, end-to-end network that can spot GAN-generated faces by analyzing their eye inconsistencies. Specifically, our model learns to identify inconsistent eye components by localizing and comparing the iris artifacts between the two eyes automatically. Our deep network addresses the imbalance learning issues by considering the AUC loss and the traditional cross-entropy loss jointly. Comprehensive evaluations of the FFHQ dataset in terms of both balanced and imbalanced scenarios demonstrate the superiority of the proposed method.

Viaarxiv icon

Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces

Sep 01, 2021
Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

Figure 1 for Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces
Figure 2 for Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces
Figure 3 for Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces
Figure 4 for Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces

Generative adversary network (GAN) generated high-realistic human faces have been used as profile images for fake social media accounts and are visually challenging to discern from real ones. In this work, we show that GAN-generated faces can be exposed via irregular pupil shapes. This phenomenon is caused by the lack of physiological constraints in the GAN models. We demonstrate that such artifacts exist widely in high-quality GAN-generated faces and further describe an automatic method to extract the pupils from two eyes and analysis their shapes for exposing the GAN-generated faces. Qualitative and quantitative evaluations of our method suggest its simplicity and effectiveness in distinguishing GAN-generated faces.

Viaarxiv icon

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

May 12, 2021
Peilun Wu, Shiyi Yang, Hui Guo

Figure 1 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 2 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 3 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Figure 4 for Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

Email threat is a serious issue for enterprise security, which consists of various malicious scenarios, such as phishing, fraud, blackmail and malvertisement. Traditional anti-spam gateway commonly requires to maintain a greylist to filter out unexpected emails based on suspicious vocabularies existed in the mail subject and content. However, the signature-based approach cannot effectively discover novel and unknown suspicious emails that utilize various hot topics at present, such as COVID-19 and US election. To address the problem, in this paper, we present Holmes, an efficient and lightweight semantic based engine for anomalous email detection. Holmes can convert each event log of email to a sentence through word embedding then extract interesting items among them by novelty detection. Based on our observations, we claim that, in an enterprise environment, there is a stable relation between senders and receivers, but suspicious emails are commonly from unusual sources, which can be detected through the rareness selection. We evaluate the performance of Holmes in a real-world enterprise environment, in which it sends and receives around 5,000 emails each day. As a result, Holmes can achieve a high detection rate (output around 200 suspicious emails per day) and maintain a low false alarm rate for anomaly detection.

Viaarxiv icon

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Oct 23, 2020
Shiyi Yang, Peilun Wu, Hui Guo

Figure 1 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 2 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 3 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Figure 4 for DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years. However, traditional ML based network intrusion detection systems (NIDSs) are not effective to recognize unknown threats and their high detection rate often comes with the cost of high false alarms, which leads to the problem of alarm fatigue. To address the above problems, in this paper, we propose a novel neural network based detection system, DualNet, which is constructed with a general feature extraction stage and a crucial feature learning stage. DualNet can rapidly reuse the spatial-temporal features in accordance with their importance to facilitate the entire learning process and simultaneously mitigate several optimization problems occurred in deep learning (DL). We evaluate the DualNet on two benchmark cyber attack datasets, NSL-KDD and UNSW-NB15. Our experiment shows that DualNet outperforms classical ML based NIDSs and is more effective than existing DL methods for NID in terms of accuracy, detection rate and false alarm rate.

Viaarxiv icon