1 . When scientists go to a forest to study monkeys and their habits and behaviors, how do they know who’s who?
In the past, scientists had to make marks on each of the animals to distinguish them. But in the future, they may have a much easier way to tell them apart thanks to facial recognition technology.
A research team from China’s Northwest University is using facial recognition technology to identify thousands of snub-nosed monkeys that live on Qinling Mountain in Shaanxi province.
Similar to human facial recognition, the technology that is used to identify monkeys uses their facial features to create a database that includes every monkey, Xinhua reported. “When the system is fully developed, we can connect it with cameras set up in the mountains. The system will automatically recognize the monkeys, name them and analyze their behavior,” said Zhang He, a member of the research team. “For each snub-nosed monkey, we have 700 to 800 image samples, and the recognition success rate is 94 percent,” Zhang added.
“We used mobile phones and portable cameras with the monkeys in tests at distances ranging from about 3 to 10 meters,” said He Gang, a member of the research team and an associate professor in the College of Life Sciences at Northwest University. “There is no need to interfere (干涉) with the monkeys. Such a method of sampling is clearly non-invasive.”
Compared to humans, facial recognition technology for monkeys is more complicated because of their hairier faces. The color of their hair causes them to blend (融入) into their environment. These factors make it harder for computers to identify them.
“Monkeys do not cooperate with researchers in the same way humans do. It is difficult to take high-quality pictures and videos of them, which are needed to improve the system,” said Li Baoguo, leader of the research team.
Currently, there are about 4,000 snub-nosed monkeys living on Qinling Mountain. The team’s goal is to successfully identify every monkey that lives there.
1. What problem do scientists face while studying monkeys according to the text?A.How to mark them. | B.How to tell them apart. |
C.How to understand their behavior. | D.How to observe them clearly. |
A.It is now widely adopted in China. |
B.It works better than human facial recognition. |
C.It will use monkeys’ behavior to create a database. |
D.It can help scientists study monkeys without disturbing them. |
A.Image samples. | B.Hairy bodies. |
C.Hair color. | D.The environment. |
A.To introduce a new way to identify monkeys. |
B.To show the importance of studying monkeys. |
C.To compare different ways to identify monkeys. |
D.To explain difficulties in developing a new system. |
2 . Mobile devices use facial recognition technology to help users quickly and securely unlock their phones, make a financial deal or access medical records. But facial recognition technologies that use a specific user-detection method are highly vulnerable (脆弱的) to deepfake (深度伪造) attacks.
Researchers found that most applications using facial liveness verification (活性验证) don’t always detect digitally processed photos or videos made to look like alive version of someone else, also known as deepfakes. Applications that do use these detection measures are also much less effective at identifying deepfakes than what the app provider has claimed.
“In recent years we have observed rapid development of facial verification technologies,” said TingWang, a principal investigator on the project. “Meanwhile, we have also seen significant advances in deepfake technologies, making it fairly easy to make live-looking facial images and videos at little cost. We thus ask the interesting question: Is it possible for attackers to misuse deepfakes to fool the facial verification systems?”
Wang’s research is the first systematic study on the security of facial liveness verification in real-world settings. Wang and his team developed a new deepfake-powered attack framework, called LiveBugger. They evaluated six leading commercial facial liveness verification applications. The researchers found that all four of the most common verification methods could be easily bypassed, which proved that the development of deepfake technologies raises a great threat to the commonly used technology. Thus Wang suggested matching lip movements with a user’s voice to analyze both audio and video instead of using a static image of a user’s face. “Facial liveness verification has been applied in many important situations, such as online payments, online banking and government services,” said Wang.
“Additionally, an increasing number of cloud platforms have begun to provide facial liveness verification, which significantly reduces the cost and lowers the barrier for companies to use the technology in their products. Therefore, the security of facial liveness verification is highly concerning.”
1. The wide use of facial recognition technology is encouraged by all the facts EXCEPT _______ .A.its convenience to unlock phones | B.its easy access to our medical records |
C.its combination with deepfake technology | D.its security concerning our financial deals |
A.It is a destructive computer virus. |
B.It is a facial liveness verification application. |
C.It creates popular live-looking facial images and videos. |
D.It is a framework testing facial liveness verification applications. |
A.Worried. | B.Negative. | C.Supportive. | D.Doubtful. |
A.LiveBugger: an attack framework powered by deepfakes |
B.A discovery that may cause panic in the world of technology |
C.Deepfakes reveal vulnerabilities in facial recognition technology |
D.Measures have to be taken to improve facial recognition technology |
1.提供了解中国传统艺术的机会;
2.学语言,练口才(eloquence),增自信;
3.相声带来笑声,减轻压力,有利于身心健康;
4.其他理由。
注意:
1.词数80左右;
2.可以适当增加细节, 以使行文连贯。
Dear Headmaster,
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Yours,
Li Hua
Music-lover Mark Goffeney, from San Diego, California, who
Teaching himself the basics, Mark kick-started his life as a musician on the streets — performing for and entertaining both locals and tourists.
Later he went from street to stage and played in a
Mark was raised by a musical family and by the age of nine he was already working on his own music, as well as acting
Musically, Mark started out by playing the trombone (长号) in a school band until his father brought home an old guitar
He said: “Through
1. What does the man think of Lucy’s taking flying lessons?
A.Impractical. | B.Surprising. | C.Interesting. |
A.A nurse. | B.A pilot. | C.A doctor. |
A.Teach in a college. |
B.Start her own restaurant. |
C.Organise an Italian cooking class. |
A.Husband and wife. | B.Brother and sister. | C.Teacher and student. |
1. Why does the man need to get up early?
A.To catch a plane. | B.To take a taxi. | C.To eat breakfast. |
A.At the airport. | B.In a hotel. | C.In a tourist company. |
A.30 minutes. | B.35 minutes. | C.45 minutes. |
1. Where does the conversation take place?
A.In a shop. | B.At home. | C.In the office. |
A.Playing tennis. | B.Taking pictures. | C.Riding bikes. |
A.A TV reporter. | B.A blank clerk. | C.A tennis player. |
1. Who is the newcomer?
A.David Cook. | B.Liam Neeson. | C.Joey Sanders. |
A.He is a film director. |
B.He is a program manager. |
C.He is a department head. |
A.Pay for the shoes. |
B.Go to the shoe shop. |
C.Borrow money from the man. |
A.In the hospital. |
B.At the man’s house. |
C.At her sister’s house. |