Effective shortcut technique for generative adversarial networks

被引:4
作者
Park, Seung [1 ]
Yoo, Cheol-Hwan [2 ]
Shin, Yong-Goo [3 ]
机构
[1] Chungbuk Natl Univ Hosp, Biomed Engn, 776 Seowon Gu, Cheongju, Chungcheongbuk, South Korea
[2] Elect & Telecommun Res Inst, Artificial Intelligence Res Lab, Daejeon 34129, South Korea
[3] Hannam Univ, Div Smart Interdisciplinary Engn, Daejeon 34430, South Korea
基金
新加坡国家研究基金会;
关键词
Generative adversarial Networks; Image generation; Residual block; Gated shortcut;
D O I
10.1007/s10489-022-03666-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, image generation techniques based on generative adversarial network (GAN) have been used to design their generators by stacking multiple residual blocks. A residual block generally contains a shortcut, that is skip connection, which effectively supports information propagation in the network. In this paper, we propose a novel shortcut method, called the gated shortcut, which not only embraces the strength point of the residual block but also further boosts the GAN performance. Specifically, based on the gating mechanism, the proposed method allows the residual block to maintain (or remove) information that is relevant (or irrelevant) to the image being generated. To demonstrate that the proposed method significantly improves the GAN performance, this paper includes extensive experimental results on various standard datasets such as CIFAR-10, CIFAR-100, LSUN, and tiny-ImageNet. Quantitative evaluations show that the gated shortcut achieves the impressive GAN performance in terms of the Frechet inception distance (FID) and inception score (IS). For instance, the proposed method improves the FID and IS scores on the tiny-ImageNet dataset from 35.13 to 27.90 and 20.23 to 23.42, respectively.
引用
收藏
页码:2055 / 2067
页数:13
相关论文
共 52 条
[1]  
Arjovsky M., 2017, CoRR, Vabs/1701.07875
[2]  
Brock A, 2018, ARXIV 180211096
[3]   StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation [J].
Choi, Yunjey ;
Choi, Minje ;
Kim, Munyoung ;
Ha, Jung-Woo ;
Kim, Sunghun ;
Choo, Jaegul .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :8789-8797
[4]   Detection of Malicious Code Variants Based on Deep Learning [J].
Cui, Zhihua ;
Xue, Fei ;
Cai, Xingjuan ;
Cao, Yang ;
Wang, Gai-ge ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) :3187-3196
[5]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[6]  
Dumoulin V, 2017, LEARNED REPRESENTATI, V2
[7]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[8]   A survey of deep learning techniques for autonomous driving [J].
Grigorescu, Sorin ;
Trasnea, Bogdan ;
Cocias, Tiberiu ;
Macesanu, Gigel .
JOURNAL OF FIELD ROBOTICS, 2020, 37 (03) :362-386
[9]   Identity Mappings in Deep Residual Networks [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
COMPUTER VISION - ECCV 2016, PT IV, 2016, 9908 :630-645
[10]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778