当前位置:网站首页>Sfod: passive domain adaptation and upgrade optimization, making the detection model easier to adapt to new data (attached with paper Download)
Sfod: passive domain adaptation and upgrade optimization, making the detection model easier to adapt to new data (attached with paper Download)
2022-06-23 15:22:00 【Computer Vision Research Institute】
Pay attention to the parallel stars
Never get lost
Institute of computer vision



official account ID|ComputerVisionGzq
Study Group | Scan the code to get the join mode on the homepage

Address of thesis :https://openaccess.thecvf.com/content/CVPR2022/papers/Li_Source-Free_Object_Detection_by_Learning_To_Overlook_Domain_Style_CVPR_2022_paper.pdf
Computer Vision Institute column
author :Edison_G
Passive target detection (SFOD) It is necessary to adjust the detector pre trained on the marked source domain to the target domain , Only unlabeled training data from the target domain .
01
Technical brief
Passive target detection (SFOD) It is necessary to adjust the detector pre trained on the marked source domain to the target domain , Only unlabeled training data from the target domain . The existing SFOD Methods usually use the pseudo tag paradigm , Model adaptation alternates between predicting false tags and fine-tuning models .

Due to the existence of domain offset and the limited use of target domain training data , The false label accuracy of this method is not satisfactory . As shown in the figure above .
In today's sharing , The researchers proposed a novel Learning to Overlook Domain Style(LODS) Method , This approach addresses these limitations in a principled way . The idea of the researchers is Reduce the domain transfer effect by forcing the model to ignore the target domain style , This simplifies model adaptation and makes it easier .

So , Enhanced the style of each target domain image , The style difference between the original image and the enhanced image is used as the self-monitoring signal for model adaptation . By treating the enhanced image as an auxiliary view , Use the student teacher structure to learn how to ignore the style difference from the original image , It is also characterized by a novel style enhancement algorithm and graph alignment constraints . A lot of experiments show that LODS New state-of-the-art performance has been produced in four benchmarks .
02
Background Overview
at present , About SFOD There is not much research on the problem . The community pays more attention to Passive domain adaptation (SFDA).SFDA The methods of can be roughly divided into two categories .
The first is based on the idea of sample generation :
Because the source data is not accessible , Traditional domain adaptation techniques are not applicable . Generate a marker image with source domain style or target domain style , Or a marker characteristic that obeys the source distribution . The key to success is satisfactory sample generation , This in itself is challenging enough and has not been well resolved .
The other one uses pseudo tags based on self training :
It is not easy to get reliable labels , Especially when there is a big gap in the field , In the process of self-training, only label samples with high confidence are taken .

Obviously , Target domain style ( For example, imaging features ) It makes a great contribution to the migration of the domain relative to the source domain . therefore , Minimizing the impact of the target domain style on the behavior of the model will immediately and effectively reduce domain migration . On the basis of the above , As shown in the figure at the beginning , A new domain adaptation method is proposed (LODS).
It first enhances the target domain style of each target image , While maintaining the original style of the target image . In this way, the auxiliary view based on style enhanced image is constructed . With this auxiliary view , The new method makes the target detector learn to ignore the target domain style . Student - The teacher framework is used to accomplish this task .
03
New framework analysis
Proposed LODS The method consists of two parts . As shown in the figure below , One is style enhancement module; The other is overlooking style module.

style enhancement module( Upper figure (a)) First extract the style of each image , Channel mean and variance . For an image , The enhanced target domain style is calculated as a nonlinear combination of itself and the style of any target image . then , Enhance the style by replacing the enhanced style . By looking at style enhanced images as another area , have access to Mean-Teacher Framework to take advantage of style differences for model adaptation ( chart (b)). The target image and the style enhanced version are input into the teacher and student models respectively . These two models are based on Faster-RCNN And initialize it as the source model of pre training . Class instance level alignment and image level alignment based on graph matching are designed to help teachers and students learn from each other . Pseudo tags are also used to increase the discrimination of student models .

Based on the above inference , The researcher designed a style enhancement module , As shown in the figure above . Two networks F1 and F2 Respectively designed to approximate δ1 and δ2. Each of them consists of two fully connected layers and one ReLU layers , Having the smallest parameter is nonlinear . Feature coder E From pre training VGG-16 Model , And fixed during training and testing . decoder D Is the inverse of the encoder . Because style consistency is limited by the underlying features , Encoder E = E2 ◦E1 Further divided into E1 and E2 part , among ◦ Is a function nesting operator . decoder D = D2 ◦ D1 As D1 and D2 So it is with . say concretely , The first after the first down sampling ReLU Layer is split E Dividing line .D Divided symmetrically into E.
04
Experiment Visualization



THE END
Please contact the official account for authorization.

The learning group of computer vision research institute is waiting for you to join !
ABOUT
Institute of computer vision
The Institute of computer vision is mainly involved in the field of deep learning , Mainly devoted to face detection 、 Face recognition , Multi target detection 、 Target tracking 、 Image segmentation and other research directions . The Research Institute will continue to share the latest paper algorithm new framework , The difference of our reform this time is , We need to focus on ” Research “. After that, we will share the practice process for the corresponding fields , Let us really experience the real scene of getting rid of the theory , Develop the habit of hands-on programming and brain thinking !
VX:2311123606

Previous recommendation
AI Help social security , The latest video abnormal behavior detection method framework
Improved shadow suppression for illumination robust face recognition
Text driven for creating and editing images ( With source code )
Based on hierarchical self - supervised learning, vision Transformer Scale to gigapixel images
YOLOS: Rethink through target detection Transformer( With source code )
Fast YOLO: For real-time embedded target detection ( Attached thesis download )
边栏推荐
- 2021-06-07
- AXI_ Round_ Robin_ Arbiter design - aw and W channels
- [cloud based co creation] intelligent supply chain plan: improve the decision-making level of the supply chain and help enterprises reduce costs and increase efficiency
- Slice() and slice() of JS
- [datahub] LinkedIn datahub learning notes
- idea查看.class文件 idea查看.class文件夹
- Mysql数据库---日志管理、备份与恢复
- 信贷产品额度定价场景下的回归模型效果评估
- 掌舵9年,艾伦研究所创始CEO光荣退休!他曾预言中国AI将领跑世界
- JSR303数据校验
猜你喜欢

The largest IPO of Hong Kong stocks this year, with a net worth of 66billion, is the "King" sitting on the mine

百万奖金等你来拿,首届中国元宇宙创新应用大赛联合创业黑马火热招募中!

基因检测,如何帮助患者对抗疾病?

js遍历数组(用forEach()方法)

信贷产品额度定价场景下的回归模型效果评估

K8s-- deploy stand-alone MySQL and persist it

操作系统底层知识总结(面试)

golang 重要知识:atomic 原子操作

【DataHub】LinkedIn DataHub学习笔记

Raspberry PI installing the wiring pi
随机推荐
Uniswap acquires genie, an NFT transaction aggregator. Will the NFT transaction market change?
golang 重要知识:定时器 timer
MySQL 创建和管理表
golang 重要知识:sync.Once 讲解
详解Redis分布式锁的原理与实现
Google &huggingface| zero sample language model structure with the strongest ability
RF analyzer demo setup
2021-05-22
MySQL高级语句二
微信小程序引导用户添加小程序动画页
volatile~多线程下变量不可见
MySQL advanced statement 2
Sectigo(Comodo)证书的由来
2021-06-07
Error creating bean with name xxx Factory method ‘sqlSessionFactory‘ threw exception; nested excepti
SFOD:无源域适配升级优化,让检测模型更容易适应新数据(附论文下载)
Error creating bean with name xxx Factory method ‘sqlSessionFactory‘ threw exception; nested excepti
Slice() and slice() of JS
Auto - vérification recommandée! Les bogues MySQL ne font pas reculer les transactions, peut - être êtes - vous à risque!
Babbitt | metauniverse daily must read: meta, Microsoft and other technology giants set up the metauniverse Standards Forum. Huawei and Alibaba joined. NVIDIA executives said that they welcomed partic