CGANs
Introducation
1. intruduce the conditional version of GANs, which can be constructed by simply feeding the data , y.
2. the CGANs can be used to learn a multi-modal model.
3.GANs in order to sidestep the difficulty of approximating many intractable probabilistic computations.(为了避免许多难以处理的概率计算的近似困难)
4. Adversarial nets have the advantages that Markov chains are never needed, only backpropagation is used to obtain gradients, no inference is required during learning,
and a wide variety of factors and interactions can easily be incorporated into the model.(多种因素和相互作用可以很容易地纳入模型)
5.马尔可夫链(Markov Chain),描述了一种状态序列,其每个状态值取决于前面有限个状态。一般来说,其核心是满足条件期望和平稳的分布,保证在计算过程中能够得到想要的概率分布。而我们考虑的生成模型恰好可能有以下两种情况:
输入一个随机分布的数据(例如一张黑白像素夹杂的噪音图),输出期望的数据(一张头像)
输入含有噪音的数据(在原有的图像上添加噪点或缺损),输出除去噪点或补完后的数据(完整的原始图像),这种情况下的模型也可以叫做任意去噪的自编码器。
无论是哪种情况,我们都希望从模型输出的数据y的概率分布尽可能逼近训练数据集的概率分布。但是让计算机生成一段音乐,或者一张有意义的图片,这个分布是非常复杂,很难求解的;即使通过马尔可夫链取样,得到了一个生成模型,我们最终也很难对这个模型的效果进行评估,因为生成的音乐到底好不好听,不同的人会得到不同的答案。
6. GANs can produce state of the art log-likehood estimate and realistic samples.
7. but
Related Work
1. the challeage of scaling models to accommodate an extremely large number of predicted output categories (调整模型以适应非常多的预测输出类别的挑战), to adress this problem by leveraging additional information such as using natural language corpora.and even a simple linear mapping from image feature-space to word-representation-space can improve.
2. the challage of focusing on learning one-to-one mapping from input to output,but many interesting problems belong to a probabilistic one-to-many mapping.to adress this challege by using a conditional probabilistic generative model , for example, the input is taken to be the conditioning variable and the one-to-many mapping is instantiated(实例化)as a conditional predictive distribution.
Method
1. to specify that the G can capture the data distribution and the D can estimate the probability that a sample came from the training data rather than G.
2. the input is z, G and D are both trained simultaneously. we adjust the parameters for G to minimize $log(1-D(G(z)))$ and adjust the parameters for D to minimize $log(D(X))$
Import Details -----Conditional Adversarial Nets
The training mechanism of CGANs.
1. GANs can be extended to a conditional model if both the G and D are conditioned on some extra information y.
2. y can be any kind of auxiliary information such as class label or data from other modalities.
3. feeding y into both discriminator and generator as additional input layer.
4. prior input noise and y are combined into joint hidden representation 对抗性训练框架允许在如何组成这种隐藏的表示方面具有相当大的灵活性。
5. In the discriminator and are presented as inputs and to a discriminative function (embodied x y again by a MLP in this case).
The formula of a objective function :
The framework of CGANs:
Experiment
1. this paper trained a CGANs on MNIST images conditioned on their class labels, encoded as one-hot vectors.
For G:
both z and y are mapped to hidden layers with RELU, with layer sizes 200 and 1000 respectively, then combined hidden ReLu layer of dimensionality 1200.
For D:
The discriminator maps to a maxout [6] layer with 240 units and 5 pieces, and to a maxout layer x y with 50 units and 5 pieces. Both of the hidden layers mapped to a joint maxout layer with 240 units and 4 pieces before being fed to the sigmoid layer
For Training:
and best estimate of log-likehood on the validation set was used as stopping point.(并以验证集的对数似然最优估计值作为停止点)。
Summary
CGANs outperforms compared with original GANs, we can combine the class label or data from other modalities into the input of G and D, in order to achieve conditional probabilities distribution and controlling GANs.
CGANs的更多相关文章
- (转)Deep Learning Research Review Week 1: Generative Adversarial Nets
Adit Deshpande CS Undergrad at UCLA ('19) Blog About Resume Deep Learning Research Review Week 1: Ge ...
- Unsupervised Image-to-Image Translation Networks --- Reading Writing
Unsupervised Image-to-Image Translation Networks --- Reading Writing 2017.03.03 Motivations: most ex ...
- Face Aging with Conditional Generative Adversarial Network 论文笔记
Face Aging with Conditional Generative Adversarial Network 论文笔记 2017.02.28 Motivation: 本文是要根据最新的条件产 ...
- #论文笔记# [pix2pixHD] High-Resolution Image Synthesis and Semantic Manipulation with Conditional GANs
Ting-Chun Wang, Ming-Yu Liu, Jun-Yan Zhu, Andrew Tao, Jan Kautz, and Bryan Catanzaro. "High-Res ...
- StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation - 1 - 多个域间的图像翻译论文学习
Abstract 最近在两个领域上的图像翻译研究取得了显著的成果.但是在处理多于两个领域的问题上,现存的方法在尺度和鲁棒性上还是有所欠缺,因为需要为每个图像域对单独训练不同的模型.为了解决该问题,我们 ...
- CSAGAN:LinesToFacePhoto: Face Photo Generation from Lines with Conditional Self-Attention Generative Adversarial Network - 1 - 论文学习
ABSTRACT 在本文中,我们探讨了从线条生成逼真的人脸图像的任务.先前的基于条件生成对抗网络(cGANs)的方法已经证明,当条件图像和输出图像共享对齐良好的结构时,它们能够生成视觉上可信的图像.然 ...
- Learning Face Age Progression: A Pyramid Architecture of GANs-1-实现人脸老化
Learning Face Age Progression: A Pyramid Architecture of GANs Abstract 人脸年龄发展有着两个重要的需求,即老化准确性和身份持久性, ...
- AT指令集之Call
1.//unsolicited result code,URC表示BP->AP+ESIPCPI:<call_id>,<dir>,<sip_msg_type>, ...
- mtk 的conferrence call建立流程
(重点看main_log与) 抓mtk log: 1.*#*#82533284#*#* 进入抓log UI 2.*#*#825364#*#* 进入工程模式 3.进入"Lo ...
随机推荐
- Java基础一篇过(六)Java8--lambda表达式
一.简介 lambda表达式是Java8的一个重要特性,也可以称为闭包,常用于配合Java8的Stream对集合元素进行操作,使得代码更简介紧凑. 二.代码解析 虽说lambda表达式是一个新的特性, ...
- 数据库图形表Navicat Premium
1.什么是数据库? 存储数据,为了方便查询和使用 web时代使用最广泛的关系型数据库 2.历史: 瑞典公司开发,卖给SUN,SUN又卖给ORACLE 开源,免费,支持多平台 3.数据库图形表Navic ...
- 高并发场景-请求合并(二)揭秘HystrixCollapser-利用Queue和线程池异步实现
背景 在互联网的高并发场景下,请求会非常多,但是数据库连接池比较少,或者说需要减少CPU压力,减少处理逻辑的,需要把单个查询,用某些手段,改为批量查询多个后返回. 如:支付宝中,查询"个人信 ...
- nginx 1.12 HTTPS双向认证配置
使用openssl生成相关证书: #生成CA私钥,私钥会被加密,需要设置密码 openssl genrsa -aes256 -out ca.key 2048 #生成CA证书签名请求,需要输入CA私钥密 ...
- k8s下的jenkins如何设置maven
关于k8s环境的jenkins集群 k8s下搭建了jenkins集群后,执行任务时会新建pod,任务完成后pod被销毁,架构如下图所示: 在k8s搭建jenkins集群的步骤请参照<> 关 ...
- Django 联合唯一UniqueConstraint
from django.db import models class UserAttention(models.Model): watcher = models.ForeignKey('user.Us ...
- python数据结构之图深度优先和广度优先实例详解
本文实例讲述了python数据结构之图深度优先和广度优先用法.分享给大家供大家参考.具体如下: 首先有一个概念:回溯 回溯法(探索与回溯法)是一种选优搜索法,按选优条件向前搜索,以达到目标.但当探索到 ...
- C/C++ 中 exit() 函数
参考: https://blog.csdn.net/jjjcainiao/article/details/21935795 知乎上的问题]C/C++ 中 exit() 函数的参数到底有什么意义? C ...
- 【学习笔记】Dirichlet前缀和
题目戳我 \(\text{Solution:}\) 观察到一个\(a_i\)若对\(a_j\)有贡献,则必须\(i\)的所有质因子幂次小于等于\(j\)的质因子幂次. 于是,我们可以枚举质数的倍数并累 ...
- MySQL数据库的完全备份与恢复
前言 在生产环境中,数据的安全性是至关重要的,任何数据的丢失都可能产生严重的后果,正确的数据库操作是实际环境下不可缺少的. 一.数据库备份的分类 1.1 从物理与逻辑的角度,备份的分类 物理备份:对数 ...