A Review on Generative Adversarial Networks: Algorithms, Theory, and Applications

被引:619
作者
Gui, Jie [1 ,2 ,3 ]
Sun, Zhenan [4 ]
Wen, Yonggang [5 ]
Tao, Dacheng [6 ,7 ]
Ye, Jieping [8 ,9 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211100, Jiangsu, Peoples R China
[2] Purple Mt Labs, Nanjing 210000, Peoples R China
[3] Univ Michigan, Dept Computat Med & Bioinformat, Ann Arbor, MI USA
[4] Chinese Acad Sci, Ctr Res Intelligent Percept & Comp, Beijing 100190, Peoples R China
[5] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[6] JD Explore Acad, Hong Kong, Peoples R China
[7] Univ Sydney, Sch Comp Sci, Sydney, Australia
[8] Beike, Beijing, Peoples R China
[9] Univ Michigan, Ann Arbor, MI 48109 USA
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
Generators; Generative adversarial networks; Data models; Linear programming; Natural language processing; Machine learning algorithms; Inference algorithms; Deep learning; generative adversarial networks; algorithm; theory; applications; IMAGE SYNTHESIS; LEARNING ALGORITHM; GAN; TEXT;
D O I
10.1109/TKDE.2021.3130191
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generative adversarial networks (GANs) have recently become a hot research topic; however, they have been studied since 2014, and a large number of algorithms have been proposed. Nevertheless, few comprehensive studies explain the connections among different GAN variants and how they have evolved. In this paper, we attempt to provide a review of the various GAN methods from the perspectives of algorithms, theory, and applications. First, the motivations, mathematical representations, and structures of most GAN algorithms are introduced in detail, and we compare their commonalities and differences. Second, theoretical issues related to GANs are investigated. Finally, typical applications of GANs in image processing and computer vision, natural language processing, music, speech and audio, the medical field, and data science are discussed.
引用
收藏
页码:3313 / 3332
页数:20
相关论文
共 331 条
[1]  
Rusu AA, 2016, Arxiv, DOI [arXiv:1606.04671, DOI 10.43550/ARXIV:1606.04671, DOI 10.48550/ARXIV.1606.04671]
[2]  
Abadi M., 2016, Learning to protect communications with adversarial neural cryptography, DOI DOI 10.48550/ARXIV.1610.06918
[3]  
ACKLEY DH, 1985, COGNITIVE SCI, V9, P147
[4]  
Adler J, 2018, ADV NEUR IN, V31
[5]   Detecting Deceptive Reviews using Generative Adversarial Networks [J].
Aghakhani, Hojjat ;
Machiry, Aravind ;
Nilizadeh, Shirin ;
Kruegel, Christopher ;
Vigna, Giovanni .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :89-95
[6]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[7]   Plug & Play Generative Networks: Conditional Iterative Generation of Images in Latent Space [J].
Anh Nguyen ;
Clune, Jeff ;
Bengio, Yoshua ;
Dosovitskiy, Alexey ;
Yosinski, Jason .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :3510-3520
[8]  
[Anonymous], 2016, P ADV NEURAL INFORM
[9]  
[Anonymous], 2018, P BRIT MACH VIS C NE
[10]  
[Anonymous], 2016, ICLR, DOI DOI 10.48550/ARXIV.1605.09782