Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for e...
Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for easy instances and underconfidence for hard instances. The widely used temperature-based strategies to smooth or sharpen the predicted distributions can lead to inconsistencies across instances, causing sensitivity issues. To address this, our approach views a queue of instances as an ensemble rather than treating each instance independently. We propose a novel method that distills historical knowledge from a dimensional perspective, utilizing intra class characteristics and interclass relationships within each ensemble. First, we align each dimension distribution from the current network to the historical output. Second, we ensure each dimension is closer to similar dimensions than dissimilar ones, maintaining consistent attitudes from present and historical perspectives. Our insights reveal that distilling historical knowledge from a dimensional perspective is more effective than the traditional instance-based approach, with potential applications in related tasks. Empirical results on three famous datasets and various network architectures demonstrate the superiority of our proposed method. Our code is available at https://***/WenkeHuang/DimSelfKD.
In response to real-world scenarios,the domain generalization(DG)problem has spurred considerable research in person re-identification(ReID).This challenge arises when the target domain,which is significantly differen...
详细信息
In response to real-world scenarios,the domain generalization(DG)problem has spurred considerable research in person re-identification(ReID).This challenge arises when the target domain,which is significantly different from the source domains,remains ***,the performance of current DG ReID relies heavily on labor-intensive source domain *** the potential of unlabeled data,we investigate unsupervised domain generalization(UDG)in *** goal is to create a model that can generalize from unlabeled source domains to semantically retrieve images in an unseen target *** address this,we propose a new approach that trains a domain-agnostic expert(DaE)for unsupervised domain-generalizable person *** involves independently training multiple experts to account for label space inconsistencies between source *** the same time,the DaE captures domain-generalizable information for *** experiments demonstrate the effectiveness of this method for learning generalizable features under the UDG *** results demonstrate the superiority of our method over state-of-the-art *** will make our code and models available for public use.
We present NNVISR - an open-source filter plugin for the VapourSynth video processing framework, which facilitates the application of neural networks for various kinds of video enhancing tasks, including denoising, su...
详细信息
Graph Neural Networks (GNNs) are widely employed to derive meaningful node representations from graphs. Despite their success, deep GNNs frequently grapple with the oversmoothing issue, where node representations beco...
详细信息
Person re-identification (ReID) is crucial in video surveillance, aiming to match individuals across different camera views while cloth-changing person re-identification (CC-ReID) focuses on pedestrians changing attir...
详细信息
作者:
Li, BoqiLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
详细信息
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and generate a poisoned training set. The neural network (NN), well-trained on the poisoned training set, is able to predict any input with the trigger pattern as the targeted label, while maintaining accurate outputs for clean inputs. However, why the BPAs work remains less explored. To fill this gap, we employ a dirty-label attack and conduct a detailed analysis of BPAs in a two-layer convolutional neural network. We provide theoretical insights and results on the effectiveness of BPAs. Our experimental results on two real-world datasets validate our theoretical findings. Copyright 2024 by the author(s)
In the realm of medical image analysis, self-supervised learning (SSL) techniques have emerged to alleviate labeling demands, while still facing the challenge of training data scarcity owing to escalating resource req...
详细信息
Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
作者:
Ma, XinsongZou, XinLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Out-of-distribution (OOD) detection task plays the key role in reliable and safety-critical applications. Existing researches mainly devote to designing or training the powerful score function but overlook investigati...
Out-of-distribution (OOD) detection task plays the key role in reliable and safety-critical applications. Existing researches mainly devote to designing or training the powerful score function but overlook investigating the decision rule based on the proposed score function. Different from previous work, this paper aims to design a decision rule with rigorous theoretical guarantee and well empirical performance. Specifically, we provide a new insight for the OOD detection task from a hypothesis testing perspective and propose a novel generalized Benjamini Hochberg (g-BH) procedure with empirical p-values to solve the testing problem. Theoretically, the g-BH procedure controls false discovery rate (FDR) at pre-specified level. Furthermore, we derive an upper bound of the expectation of false positive rate (FPR) for the g-BH procedure based on the tailed generalized Gaussian distribution family, indicating that the FPR of g-BH procedure converges to zero in probability. Finally, the extensive experimental results verify the superiority of g-BH procedure over the traditional threshold-based decision rule on several OOD detection benchmarks. Copyright 2024 by the author(s)
作者:
Zhou, ZhengyuLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rat...
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rather than fixing the sample size *** batch tests are generally unsuitable for streaming data, as valid inference after data peeking requires multiple testing corrections, resulting in reduced statistical *** address this issue, we delve into the design of consistent sequential goodness-of-fit *** the principle of testing by betting, we reframe this task as selecting a sequence of payoff functions that maximize the wealth of a fictitious bettor, betting against the null in a repeated *** conduct experiments to demonstrate the adaptability of our sequential test across varying difficulty levels of problems while maintaining control over type-I errors. Copyright 2024 by the author(s)
暂无评论