2020
DOI: 10.3390/app10175976
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Chinese Font Generation System Reflecting Emotions Based on Generative Adversarial Network

Abstract: Manual font design is difficult and requires professional knowledge and skills to perform. Therefore, how to automatically generate the required fonts is a very challenging research task. On the other hand, there are few people who have studied the relationship between fonts and emotions, and common fonts generally cannot reflect emotional information. This paper proposes an Emotional Guidance GAN: an automatic Chinese font generation framework based on Generative Adversarial Network (GAN), which enables the g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…In reference [1], a character convolutional neural network is designed to identify bad URLs containing illegal character content texts, and a deep learning method is used to mine the data features of historical illegal URLs and establish a rapid identification model of illegal URLs, which has a good identification effect. Literature [2] uses CATBL algorithm to extract the global and local features of URL, fuses these features, uses CNN to mine deep-seated local features, uses Attention mechanism to adjust the weight and two-way LSTM to extract global features, which are used to detect malicious URLs in the network. It also compares the similar features of URL files.…”
Section: Introductionmentioning
confidence: 99%
“…In reference [1], a character convolutional neural network is designed to identify bad URLs containing illegal character content texts, and a deep learning method is used to mine the data features of historical illegal URLs and establish a rapid identification model of illegal URLs, which has a good identification effect. Literature [2] uses CATBL algorithm to extract the global and local features of URL, fuses these features, uses CNN to mine deep-seated local features, uses Attention mechanism to adjust the weight and two-way LSTM to extract global features, which are used to detect malicious URLs in the network. It also compares the similar features of URL files.…”
Section: Introductionmentioning
confidence: 99%