SlideShare a Scribd company logo
Data-driven AI
Security HCI (DASH) Lab
1
Data-driven AI
Security HCI (DASH) Lab
김민하
성균관대학교
July 23, 2020
Data-driven AI
Security HCI (DASH) Lab
HyeonseongJeon1 YoungohBang1 JunyaupKim SimonS.Woo1
Data-driven AI
Security HCI (DASH) Lab
Background
• high-resolution images produced
by the latest GANs
• It’s feasible through few-shot or
single-shot learning
This paper proposes a novel regularization method with self-
training for transfer learning by combining and transforming
regularization, augmentation, self-training
Data-driven AI
Security HCI (DASH) Lab
Limitation
● Relying on Metadata Information
They cannot provide an optimal solution for transfer learning
Data-driven AI
Security HCI (DASH) Lab
Transferable GAN-generated image Detection framework
Data-driven AI
Security HCI (DASH) Lab
Transfer learning framework in more detail.
Calculate the L2 SP using the weights
Data-driven AI
Security HCI (DASH) Lab
L2-SP(L2-Starting Point)
Pre trained weights Of the Conv layers
Eq. 1
Eq. 2 L2-SP
L2-Norm
L2-SP differs in that the starting point from a well pre-trained
source dataset guides the learning process by referring to the
information of the pre-trained source dataset.
Data-driven AI
Security HCI (DASH) Lab
Eq. 3
Eq. 4
Eq. 5
Binary Cross Entropy
Self-training for L2-SP
inversely proportional.
Final loss Function
L2-norm
L2-SP
Self training
Data-driven AI
Security HCI (DASH) Lab
Real + GAN-image GAN-image + GAN-image
A
B
B
B
A B
A1
A2
A2
A2
A1 A2
Data-driven AI
Security HCI (DASH) Lab
Generaltransfer
● It is common practice to freeze
some weights of pre-trained
model from source dataset, and
finetune the model with weight
decay to the target dataset.
Baselines
ForensicTransfer
● ForensicTransfer introduced an
autoencoder for the GAN-image
detection.
● Although the ForensicTransfer
showed promise for model
transferability, its performance
remains mediocre.
Cozzolino, D., Thies, J., R¨ossler, A., Riess, C., Nießner, M., and Verdoliva,
L. Forensictransfer: Weakly-supervised domain adaptation for forgery
detection. arXiv preprint arXiv:1812.02510, 2018.
Data-driven AI
Security HCI (DASH) Lab
Performance Results
As you can see, Even though T-GD did Transfer learning,
it has been confirmed that there is a high probability of performance
even if the data set of different types
Data-driven AI
Security HCI (DASH) Lab
ResNext vs. EfficientNet
Therefore, TGD performance is not directly
related to the number of parameters.
EfficientNet shows better performance in T-GD
even though it has a few parameters.
When comparing T-GD from different base models…
Data-driven AI
Security HCI (DASH) Lab
Non-face GAN-image detection
T-GD is effective not only for GAN-generated face detection,
but also for nonface tasks
Data-driven AI
Security HCI (DASH) Lab
Self-training & Data augmentation effects
intra-class Cutmix, JPEG compression,
Gaussian blur, and random horizontal flip
to avoid over-fitting in transfer learning…
Self-trained and augmentation method’s AUROC is
higher than with out method’s AUROC
Data-driven AI
Security HCI (DASH) Lab
Validation loss in transfer learning
between
Data-driven AI
Security HCI (DASH) Lab
Contribution
● Maintain high performance and Overcoming catastrophic forgetting
during Transfer Learning
● Effectively detecting state-of-the art GAN-images with a small data
without any metadata information.
Data-driven AI
Security HCI (DASH) Lab
Thank you!

More Related Content

What's hot

End-to-End Object Detection with Transformers
End-to-End Object Detection with TransformersEnd-to-End Object Detection with Transformers
End-to-End Object Detection with Transformers
Seunghyun Hwang
 
Region-oriented Convolutional Networks for Object Retrieval
Region-oriented Convolutional Networks for Object RetrievalRegion-oriented Convolutional Networks for Object Retrieval
Region-oriented Convolutional Networks for Object Retrieval
Universitat Politècnica de Catalunya
 
Surveillance scene classification using machine learning
Surveillance scene classification using machine learningSurveillance scene classification using machine learning
Surveillance scene classification using machine learning
Utkarsh Contractor
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
PetteriTeikariPhD
 
Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNN
Jaehyun Jun
 
YolactEdge Review [cdm]
YolactEdge Review [cdm]YolactEdge Review [cdm]
YolactEdge Review [cdm]
Dongmin Choi
 
DuraMat Data Analytics
DuraMat Data AnalyticsDuraMat Data Analytics
DuraMat Data Analytics
Anubhav Jain
 
Adaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom predictionAdaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom prediction
Universitat Politècnica de Catalunya
 
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
Edge AI and Vision Alliance
 
Computing Just What You Need: Online Data Analysis and Reduction at Extreme ...
Computing Just What You Need: Online Data Analysis and Reduction  at Extreme ...Computing Just What You Need: Online Data Analysis and Reduction  at Extreme ...
Computing Just What You Need: Online Data Analysis and Reduction at Extreme ...
Ian Foster
 
Transformer in Computer Vision
Transformer in Computer VisionTransformer in Computer Vision
Transformer in Computer Vision
Dongmin Choi
 
Image Classification Done Simply using Keras and TensorFlow
Image Classification Done Simply using Keras and TensorFlow Image Classification Done Simply using Keras and TensorFlow
Image Classification Done Simply using Keras and TensorFlow
Rajiv Shah
 
SeRanet introduction
SeRanet introductionSeRanet introduction
SeRanet introduction
Kosuke Nakago
 
Deep Learning for Fast Simulation
Deep Learning for Fast SimulationDeep Learning for Fast Simulation
Deep Learning for Fast Simulation
Helix Nebula The Science Cloud
 
Deep recurrent neutral networks for Sequence Learning in Spark
Deep recurrent neutral networks for Sequence Learning in SparkDeep recurrent neutral networks for Sequence Learning in Spark
Deep recurrent neutral networks for Sequence Learning in Spark
DataWorks Summit/Hadoop Summit
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep Learning
Sungjoon Choi
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detection
GauravBiswas9
 
Riding the Elephant - Hadoop 2.0
Riding the Elephant - Hadoop 2.0Riding the Elephant - Hadoop 2.0
Riding the Elephant - Hadoop 2.0
Simon Elliston Ball
 
Auro tripathy - Localizing with CNNs
Auro tripathy -  Localizing with CNNsAuro tripathy -  Localizing with CNNs
Auro tripathy - Localizing with CNNs
Auro Tripathy
 

What's hot (20)

End-to-End Object Detection with Transformers
End-to-End Object Detection with TransformersEnd-to-End Object Detection with Transformers
End-to-End Object Detection with Transformers
 
Region-oriented Convolutional Networks for Object Retrieval
Region-oriented Convolutional Networks for Object RetrievalRegion-oriented Convolutional Networks for Object Retrieval
Region-oriented Convolutional Networks for Object Retrieval
 
Surveillance scene classification using machine learning
Surveillance scene classification using machine learningSurveillance scene classification using machine learning
Surveillance scene classification using machine learning
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
 
Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNN
 
YolactEdge Review [cdm]
YolactEdge Review [cdm]YolactEdge Review [cdm]
YolactEdge Review [cdm]
 
DuraMat Data Analytics
DuraMat Data AnalyticsDuraMat Data Analytics
DuraMat Data Analytics
 
Adaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom predictionAdaptive object detection using adjacency and zoom prediction
Adaptive object detection using adjacency and zoom prediction
 
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
"Designing a Stereo IP Camera From Scratch," a Presentation from ELVEES
 
Computing Just What You Need: Online Data Analysis and Reduction at Extreme ...
Computing Just What You Need: Online Data Analysis and Reduction  at Extreme ...Computing Just What You Need: Online Data Analysis and Reduction  at Extreme ...
Computing Just What You Need: Online Data Analysis and Reduction at Extreme ...
 
Transformer in Computer Vision
Transformer in Computer VisionTransformer in Computer Vision
Transformer in Computer Vision
 
Image Classification Done Simply using Keras and TensorFlow
Image Classification Done Simply using Keras and TensorFlow Image Classification Done Simply using Keras and TensorFlow
Image Classification Done Simply using Keras and TensorFlow
 
SeRanet introduction
SeRanet introductionSeRanet introduction
SeRanet introduction
 
Deep Learning for Fast Simulation
Deep Learning for Fast SimulationDeep Learning for Fast Simulation
Deep Learning for Fast Simulation
 
Deep recurrent neutral networks for Sequence Learning in Spark
Deep recurrent neutral networks for Sequence Learning in SparkDeep recurrent neutral networks for Sequence Learning in Spark
Deep recurrent neutral networks for Sequence Learning in Spark
 
Object Detection Methods using Deep Learning
Object Detection Methods using Deep LearningObject Detection Methods using Deep Learning
Object Detection Methods using Deep Learning
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detection
 
Riding the Elephant - Hadoop 2.0
Riding the Elephant - Hadoop 2.0Riding the Elephant - Hadoop 2.0
Riding the Elephant - Hadoop 2.0
 
Das3 Fjseins
Das3 FjseinsDas3 Fjseins
Das3 Fjseins
 
Auro tripathy - Localizing with CNNs
Auro tripathy -  Localizing with CNNsAuro tripathy -  Localizing with CNNs
Auro tripathy - Localizing with CNNs
 

Similar to Transferable GAN-generated Images Detection Framework.

小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
CHENHuiMei
 
Distributed Deep Learning + others for Spark Meetup
Distributed Deep Learning + others for Spark MeetupDistributed Deep Learning + others for Spark Meetup
Distributed Deep Learning + others for Spark Meetup
Vijay Srinivas Agneeswaran, Ph.D
 
Hw09 Protein Alignment
Hw09   Protein AlignmentHw09   Protein Alignment
Hw09 Protein AlignmentCloudera, Inc.
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
sipij
 
Large Scale Distributed Deep Networks
Large Scale Distributed Deep NetworksLarge Scale Distributed Deep Networks
Large Scale Distributed Deep Networks
Hiroyuki Vincent Yamazaki
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...
IAESIJAI
 
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
Allen Day, PhD
 
最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - 最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に -
Hiroshi Fukui
 
Deep Learning: Chapter 11 Practical Methodology
Deep Learning: Chapter 11 Practical MethodologyDeep Learning: Chapter 11 Practical Methodology
Deep Learning: Chapter 11 Practical Methodology
Jason Tsai
 
A detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning AlgorithmsA detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning Algorithms
NIET Journal of Engineering & Technology (NIETJET)
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled Datasets
Sung Kim
 
Face-GAN project report.pptx
Face-GAN project report.pptxFace-GAN project report.pptx
Face-GAN project report.pptx
AndleebFatima16
 
Face-GAN project report
Face-GAN project reportFace-GAN project report
Face-GAN project report
AndleebFatima16
 
2008.11560v2.pdf
2008.11560v2.pdf2008.11560v2.pdf
2008.11560v2.pdf
BabulMosabber1
 
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & AlluxioUltra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Alluxio, Inc.
 
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Distributed deep learning_over_spark_20_nov_2014_ver_2.8Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Vijay Srinivas Agneeswaran, Ph.D
 
IBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
IBM Cloud Paris Meetup 20180517 - Deep Learning ChallengesIBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
IBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
IBM France Lab
 
Distributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
Distributed Models Over Distributed Data with MLflow, Pyspark, and PandasDistributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
Distributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
Databricks
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1
gauravsc36
 
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictionsDeep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
Valery Tkachenko
 

Similar to Transferable GAN-generated Images Detection Framework. (20)

小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
小數據如何實現電腦視覺,微軟AI研究首席剖析關鍵
 
Distributed Deep Learning + others for Spark Meetup
Distributed Deep Learning + others for Spark MeetupDistributed Deep Learning + others for Spark Meetup
Distributed Deep Learning + others for Spark Meetup
 
Hw09 Protein Alignment
Hw09   Protein AlignmentHw09   Protein Alignment
Hw09 Protein Alignment
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
 
Large Scale Distributed Deep Networks
Large Scale Distributed Deep NetworksLarge Scale Distributed Deep Networks
Large Scale Distributed Deep Networks
 
Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...Statistical performance assessment of supervised machine learning algorithms ...
Statistical performance assessment of supervised machine learning algorithms ...
 
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
20170426 - Deep Learning Applications in Genomics - Vancouver - Simon Fraser ...
 
最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に - 最近の研究情勢についていくために - Deep Learningを中心に -
最近の研究情勢についていくために - Deep Learningを中心に -
 
Deep Learning: Chapter 11 Practical Methodology
Deep Learning: Chapter 11 Practical MethodologyDeep Learning: Chapter 11 Practical Methodology
Deep Learning: Chapter 11 Practical Methodology
 
A detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning AlgorithmsA detailed analysis of the supervised machine Learning Algorithms
A detailed analysis of the supervised machine Learning Algorithms
 
Software Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled DatasetsSoftware Defect Prediction on Unlabeled Datasets
Software Defect Prediction on Unlabeled Datasets
 
Face-GAN project report.pptx
Face-GAN project report.pptxFace-GAN project report.pptx
Face-GAN project report.pptx
 
Face-GAN project report
Face-GAN project reportFace-GAN project report
Face-GAN project report
 
2008.11560v2.pdf
2008.11560v2.pdf2008.11560v2.pdf
2008.11560v2.pdf
 
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & AlluxioUltra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
 
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Distributed deep learning_over_spark_20_nov_2014_ver_2.8Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
 
IBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
IBM Cloud Paris Meetup 20180517 - Deep Learning ChallengesIBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
IBM Cloud Paris Meetup 20180517 - Deep Learning Challenges
 
Distributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
Distributed Models Over Distributed Data with MLflow, Pyspark, and PandasDistributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
Distributed Models Over Distributed Data with MLflow, Pyspark, and Pandas
 
Big data analytics 1
Big data analytics 1Big data analytics 1
Big data analytics 1
 
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictionsDeep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
Deep Learning on nVidia GPUs for QSAR, QSPR and QNAR predictions
 

More from KIMMINHA3

[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
KIMMINHA3
 
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
KIMMINHA3
 
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
KIMMINHA3
 
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
KIMMINHA3
 
[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace
KIMMINHA3
 
Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)
KIMMINHA3
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
KIMMINHA3
 
[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning
KIMMINHA3
 
Methods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networksMethods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networks
KIMMINHA3
 
Meta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot LearningMeta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot Learning
KIMMINHA3
 
Xception mhkim
Xception mhkimXception mhkim
Xception mhkim
KIMMINHA3
 
short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...
KIMMINHA3
 

More from KIMMINHA3 (12)

[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
[ECCV2022] Generative Domain Adaptation for Face Anti-Spoofing
 
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
[AAAI21] Self-Domain Adaptation for Face Anti-Spoofing
 
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
[CVPR'22] Domain Generalization via Shuffled Style Assembly for Face Anti-Spo...
 
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
[TIFS'22] Learning Meta Pattern for Face Anti-Spoofing
 
[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace[AAAI'23]Learning Polysemantic Spoof Trace
[AAAI'23]Learning Polysemantic Spoof Trace
 
Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)Architectures of Super-resolution (AI)
Architectures of Super-resolution (AI)
 
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
[CVPRW2021]FReTAL: Generalizing Deepfake detection using Knowledge Distillati...
 
[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning[NeuralIPS 2020]filter in filter pruning
[NeuralIPS 2020]filter in filter pruning
 
Methods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networksMethods for interpreting and understanding deep neural networks
Methods for interpreting and understanding deep neural networks
 
Meta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot LearningMeta learned Confidence for Few-shot Learning
Meta learned Confidence for Few-shot Learning
 
Xception mhkim
Xception mhkimXception mhkim
Xception mhkim
 
short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...short text large effect measuring the impact of user reviews on android app s...
short text large effect measuring the impact of user reviews on android app s...
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Transferable GAN-generated Images Detection Framework.

  • 1. Data-driven AI Security HCI (DASH) Lab 1 Data-driven AI Security HCI (DASH) Lab 김민하 성균관대학교 July 23, 2020 Data-driven AI Security HCI (DASH) Lab HyeonseongJeon1 YoungohBang1 JunyaupKim SimonS.Woo1
  • 2. Data-driven AI Security HCI (DASH) Lab Background • high-resolution images produced by the latest GANs • It’s feasible through few-shot or single-shot learning This paper proposes a novel regularization method with self- training for transfer learning by combining and transforming regularization, augmentation, self-training
  • 3. Data-driven AI Security HCI (DASH) Lab Limitation ● Relying on Metadata Information They cannot provide an optimal solution for transfer learning
  • 4. Data-driven AI Security HCI (DASH) Lab Transferable GAN-generated image Detection framework
  • 5. Data-driven AI Security HCI (DASH) Lab Transfer learning framework in more detail. Calculate the L2 SP using the weights
  • 6. Data-driven AI Security HCI (DASH) Lab L2-SP(L2-Starting Point) Pre trained weights Of the Conv layers Eq. 1 Eq. 2 L2-SP L2-Norm L2-SP differs in that the starting point from a well pre-trained source dataset guides the learning process by referring to the information of the pre-trained source dataset.
  • 7. Data-driven AI Security HCI (DASH) Lab Eq. 3 Eq. 4 Eq. 5 Binary Cross Entropy Self-training for L2-SP inversely proportional. Final loss Function L2-norm L2-SP Self training
  • 8. Data-driven AI Security HCI (DASH) Lab Real + GAN-image GAN-image + GAN-image A B B B A B A1 A2 A2 A2 A1 A2
  • 9. Data-driven AI Security HCI (DASH) Lab Generaltransfer ● It is common practice to freeze some weights of pre-trained model from source dataset, and finetune the model with weight decay to the target dataset. Baselines ForensicTransfer ● ForensicTransfer introduced an autoencoder for the GAN-image detection. ● Although the ForensicTransfer showed promise for model transferability, its performance remains mediocre. Cozzolino, D., Thies, J., R¨ossler, A., Riess, C., Nießner, M., and Verdoliva, L. Forensictransfer: Weakly-supervised domain adaptation for forgery detection. arXiv preprint arXiv:1812.02510, 2018.
  • 10. Data-driven AI Security HCI (DASH) Lab Performance Results As you can see, Even though T-GD did Transfer learning, it has been confirmed that there is a high probability of performance even if the data set of different types
  • 11. Data-driven AI Security HCI (DASH) Lab ResNext vs. EfficientNet Therefore, TGD performance is not directly related to the number of parameters. EfficientNet shows better performance in T-GD even though it has a few parameters. When comparing T-GD from different base models…
  • 12. Data-driven AI Security HCI (DASH) Lab Non-face GAN-image detection T-GD is effective not only for GAN-generated face detection, but also for nonface tasks
  • 13. Data-driven AI Security HCI (DASH) Lab Self-training & Data augmentation effects intra-class Cutmix, JPEG compression, Gaussian blur, and random horizontal flip to avoid over-fitting in transfer learning… Self-trained and augmentation method’s AUROC is higher than with out method’s AUROC
  • 14. Data-driven AI Security HCI (DASH) Lab Validation loss in transfer learning between
  • 15. Data-driven AI Security HCI (DASH) Lab Contribution ● Maintain high performance and Overcoming catastrophic forgetting during Transfer Learning ● Effectively detecting state-of-the art GAN-images with a small data without any metadata information.
  • 16. Data-driven AI Security HCI (DASH) Lab Thank you!

Editor's Notes

  1. (Hello, I’m glad to be here with you today.) (Let me start off by brifly introducing myself first. My name is minha kim. I am going to transfer from Hanyang University to the Department of Software at Sungkyunkwan University..) The second paper I’m going to talk about is T-GD: Transferable GAN-generated Images Detection Framework It was registered in the ICML in 2020.
  2. Recent advancements(엣벤스먼츠) in Generative Adversarial Networks (GANs) enable the generation of realistic images, which has now become feasible through(뜨루) few-shot or single-shot learning. Even high-resolution images produced by the latest GANs are hardly distinguishable from real images or by human inspection. While many studies on transfer learning have already shown impressive performance, they have not applied for GAN-image detection.
  3. Now I talk about limitations of previous works. First, Some methods rely on detection with the metadata such as GAN-model information. Second, Data augmentation methods such as JPEG compression and Gaussian Blur are not fully explained about the generalized way. Third, they show relatively weak results for transfer learning ability within GAN-image detection. That is, They cannot provide an optimal solution for transfer learning ------------------------------- metadata information??? metadata data is data’s information For example, if data is composed of PGGAN, the meatadata show that it was created as PGGAN
  4. Let me explain the framework of TGD. TGD consists of Teacher Classifier and Student Classifier Teacher Classifier is pre-trained classifier, and Student Classifier is that we will train using L2 SP and Self-training.
  5. Let me explain about transfer learning framework in more detail. First, Calculate the L2 SP using the weights of the pre-trained Teacher Model for self training. Then, apply binary cross entropy and apply self training as suggested in this paper Through this self training, we will adjust the target date while automatically adjusting the regularization learning rate. -------------------------------- Stochastic Depth?
  6. Let me explain about L2-sp for self training breifly. The weight of the pretrained model from the source dataset is used as the SPAR that is (starting point as the reference). we use L2-SP for transfer learning. which regularizes the weight variation of a target model by referring to the weights pre trained on the source dataset L2-SP differs in that the starting point from a well pre-trained source dataset guides the learning process by referring to the information of the pre-trained source dataset. This method does not require freezing the weights of the pre-trained model nor using weight decay. ---------------------------------------------- L2 SP이용하는 이유? This method does not require freezing the weights of the pre-trained model nor using weight decay. This Regularization can lead to a better optimization by preventing over-fitting when learning from scratch; Regularization 하는 이유? Regularization can lead to a better optimization by preventing over-fitting when learning from scratch;
  7. 1. The loss function uses binary cross entropy as shown in equation 3. the input data, ˜ x(틸트)noised i , is from the target dataset with noise injection. Fw(prime) denotes the pre-trained models from the source dataset 2. And for stable self-learning, gamma values can be obtained by inserting the target source into the Teacher model, just like equation 4 As you can see, when you put the target datas in the Teacher model, you can see that the Loss and Gamma values are inversely proportional. This means that if Teacher model considers Target data unfamiliar, it will lower the gamma value so that it can learn more. and the negative value of the result is taken and transformed by the sigmoid function γ in Eq. 4, 3. The final loss function, as shown in Eq. 5, is composed of a cross-entropy term and an L2-SP term for the self training of the student model ---------------------------------------------- *Advantage of self training The proposed method has the advantage of preventing either excessive or minor regularization. --------------------------------------------- Y~ = target data Y = source data W’ = weights of the teacher model Y헷 = Fw’ denotes the pre-trained models from the source dataset ----------------------- Sigma, S ????? And Sigma means a sigmoid function. s is a hyperparameter taking values from 0.1 to 2.0
  8. Next is paper’s proposed intra-class CutMix. This paper introduce a novel augmentation method to solve the over-fitting problem by transforming Cutmix On the left side, the original CutMix, that is inter-class CutMix. Inter-class Cutmix replaces the chosen patch with another image patch in the same location. On the right side is shown this paper proposed Intra-class CutMix. To put it simply, A1 GAN image is cropped to a random size at a random location, then A2 GAN image is changed to the same location and size. this paper found that the inter-class CutMix for a binary classification causes highly unstable training ---------------------------------- What is difference from two methods.
  9. Before I explain the performance comparison results of TGD, I will briefly explain two transfer methods introduced in Baseline. First. It’s a Generaltransfer learning method. It is common practice to freeze some weights of pre-trained model from source dataset, and finetune the model with weight decay to the target dataset. Second. It’s a ForensicTransfer. ForensicTransfer introduced an auto encoder for the GAN-image detection. They apply auto encoder and detect GAN-images through reconstruction error. This learning method has advantages regarding lower data usage, when the model is well trained. Although the ForensicTransfer showed promise for model transferability, its performance remains mediocre
  10. In this paper, GN+WS is applied instead of BN to quickly achieve high Accuracy even in small batches. The disadvantage of BN is that the performance of the model depends on the large batch size because it performs normalization in minibatch units. Various techniques have been proposed to address these issues, such as Group Normalization (GN), but in typical large-batch training situations, the performance of the BN is not as good as that of the BN and is significantly underutilized. The Weight Standardization (WS) proposed in this paper has shown in the 'WS' paper that it achieved better performance than BN in large-batch situations by completely eliminating minibatch dependency, as shown in GN. ----------------- Weight standarzation?
  11. This table is performance Results of Baseline methods and T-GD using EfficientNet and ResNext The evaluation metric is AUROC (%). The Data set column indicates pretrained model from a source data set, and the Data set row indicates the target test set for transfer learning. The Zero-shot category represents the performance of a pre-trained model without any additional training and the Transfer learning category represents each pre-trained model transferred from the source to target dataset. As you can see, Even though T-GD did Transfer learning, it has been confirmed that there is a high probability of performance even if the data set of different types ------------------------------- Auroc는? AUROC is an abbreviation for the Area Under a ROC Curve. It is the area of the ROC curve calculated and graphically represented by TPR and FPR.
  12. In comparison to T-GD from different base models, the results show subtle differences. Although the number of parameters in ResNext is greater than that of EfficientNet, EfficientNet shows better performance in T-GD even though it has a few parameters. Although the number of parameters affects the classification performance, the performance of EfficientNet was superior to that of ResNext in TGD transfer tasks. Therefore, TGD performance is not directly related to the number of parameters. ------------------ EfficientNet have 3million weights, and ResNext have 20million weights ResNet이 depth scaling을 통해 모델의 크기를 조절하는 대표적인 모델
  13. Non-face GAN-image detection. T-GD is effective not only for GAN-generated face detection, but also for nonface tasks. This experimented with transfer learning from non-face GAN-images as the source (PGGAN-images from LSUN-bedroom and LSUN-bird) to face GAN-images as the target. This achieved stable AUROC on both detection tasks as shown in Table. ------------------------------ Auroc는? AUROC is an abbreviation for the Area Under a ROC Curve. It is the area of the ROC curve calculated and graphically represented by TPR and FPR.
  14. I explained why self-training is used for L2-SP. The following table shows Self-training and Data augmentation effects. As you can see, Self-trained method’s AUROC is higher than with out self-trained method’s AUROC To compare the performance of this model with and without self-training, it’s keep all other settings the same. And at Data augmentation effect. to avoid over-fitting in transfer learning, this paper utilized the following data augmentation methods : Using intra-class Cutmix, JPEG compression, Gaussian blur, and random horizontal flip. Despite the small reduction in the target AUROC, the drastic increase in the source AUROC implies that over-fitting can be avoided through these augmentation methods in transfer learning, while preventing catastrophic forgetting. //이까지만 설명 + For the target dataset with augmentation, the AUROC of T-GD dropped from 99.38% to 98.13% (1.25%), but we achieved a 10.04% higher AUROC for the source dataset than that of the same dataset without augmentation (from 85.04% to 95.08%). ------------------------------------------------------------ w augrmentation에서 target auroc가 떨어진거면 더 안좋은 성능인거 아닌가? The target auroc alone does, but it is a small decrease compared to the source auroc’s increasing of about 10 percent. It is relatively more effective when w augmentation is applied. -------------------------- catastrophic forgetting?? (the Neural Network shows excellent performance for Single task, but )there is a problem that learning different kinds of tasks significantly reduces the performance of previously learned tasks. This is called Catastrophic porting.
  15. This is Validation loss in transfer learning between Cutmix and intra-class Cutmix. the validation loss for yellow and red lines, that intra-class Cutmix is considerably lower and more stable than that for Cutmix (green and blue). -------------------------------------------
  16. 1.This paper present T-GD network, a method to maintain high performance on both the source and target datasets for the GAN-image detection during transfer learning. This paper propose the novel regularization and augmentation techniques, the L2-SP self-training and intra-class Cutmix, building upon well-known CNN backbone models. In addition, target AUROC is increased while preserving existing source AUROC using self training and intra cutmix, thus preventing CATASTRHIC FORGETTING. 2. T-GD achieves high performance on the source dataset by overcoming catastrophic forgetting and effectively detecting state-of-the artGAN-images with only a small volume of data without any metadata information. -------------------- catastrophic forgetting?? (the Neural Network shows excellent performance for Single task, but )there is a problem that learning different kinds of tasks significantly reduces the performance of previously learned tasks. This is called Catastrophic porting. ---------------------------------------------- metadata information??? metadata data is data’s information For example, if data is composed of PGGAN, the meatadata show that it was created as PGGAN ------------------------------------------ 이 논문의 장점 단점? Adventage? 1.without any meta, this able to transfer learning 2.this overcome catastrophic forgetting Weakness? If there were comparison results for active cutmix, cutout, mixup, etc. in addition to general cutmix, it would have been possible to objectify the results of intra cutmix.