当前位置:网站首页>Nips18 (AD) - unsupervised anomaly detection using geometric transformations using geometric augmentation
Nips18 (AD) - unsupervised anomaly detection using geometric transformations using geometric augmentation
2022-07-28 19:27:00 【I'm Mr. rhubarb】
List of articles
Original address
Original text and additional materials
Thesis reading methods
First time to know
But from the summary and introduction , In this paper, the idea It's simple and novel ( After all 18 Conference articles in ), The core is to perform various geometric augmentations on the input image to get different versions . Then construct a multi classification model , Let the model predict the expanded categories ( Like rotation 、 Flip or pan, and so on ).
By performing such a task , The author observed that the model can learn some about anomaly detection ( Image semantic level ) Useful features . At testing time , The test image is also augmented and predicted , According to the model softmax Probability vector to calculate the abnormal score , So as to carry out anomaly detection .
Know each other
The core technology
In fact, the previous section has basically summarized , For a training set containing only normal samples S, Different geometric changes are used for each training sample , Each geometric change represents a certain kind , It should be noted that it also includes identity transformation ( That is to do nothing , The kind that outputs the original picture ).
Train a multi classification model , The goal is to predict each input image ( It has been expanded by some geometry ) Geometric transformation category of , The loss function is the common cross entropy loss .( In the process , Any image classification trick Both can be used. ).
Abnormal score
About abnormal scores , The original Xiaoxiao Sasa describes a large paragraph , There is no lack of a lot of statistical reasoning , But in the end, a simple version was adopted , It is shown in the following formula :
among ,y(Tj(x)) That is, the input sample adopts j After geometric transformation, it is sent into the trained classification model , And then you get softmax vector , Take the second one j dimension ( This is also the model prediction Tj(x) by j The probability of a class ).k Two transformations (0~k-1), Get the corresponding softmax probability , Make a weighted average , The final value is taken as the anomaly score .
It's not difficult to understand. , In this way, the score of normal samples is generally higher than that of abnormal samples , Abnormal samples may also score well in some form of amplification , but k There are always some changes that stretch , So the score is different from the normal sample .
This is just an intuitive understanding , The specific original text gives reasoning .
experiment
The classification model adopts Wide ResNet, Experiments were carried out on different data sets . See the experimental results in the figure below in detail , It can be seen that the benchmark level has been greatly improved .
among CIFAR-100 Is aimed at 20 Experiments done by subclasses , It shows the effect of the model on multi class distribution anomaly detection .
For multi class distribution , Two classification heads are constructed during training , One is the classification of categories , The other is the classification of geometric transformation ; However, only geometrically varied softmax Calculate the exception score .

There are also some interesting experiments , You can read the original . Including the use of gradient ascent Carry out visual reconstruction to verify the effectiveness of the model , And with 8 and 3 The example of shows the detection effect under different augmentation .
Geometric transformation
This paper is mainly based on Flip horizontal + translation + rotate constructed 72 There are different types of geometric augmentation , The original text did not elaborate , I found the corresponding content from the supporting materials :
among b Indicates whether to use horizontal flipping ,sw,sh Indicates whether translation is applied in both directions ( translation 25%, Front and back directions ),k Indicates the angle of rotation ( In steps of 90°).
So we end up with 2x3x3x4=72 Two geometric transformation methods .
About why geometric transformation is used , The author really shows that some non geometric transformations were used in the early stage , The effect is not good , So only geometric transformation is preserved . Doubt is non geometric transformation ( Gaussian smoothing 、 Sharpen, etc ) It makes the image lose effective features .
review
Published in Nips2018, At that time, self supervision was not on fire , In fact, it is also a self-monitoring task , By constructing a proxy task, Learn useful features for downstream tasks . Look at the full text , It's really two words , Simple 、 It works , A simple idea, Go with a sota Result .
The article is very interesting , The author also mentioned some improvements , I agree with one thing very much . It is currently used for all categories 72 Species augmentation , Is there a way to learn appropriate augmentation for a given data set , There is also the application of this idea to other tasks .
Open source code
Official tf Code :
https://github.com/izikgo/AnomalyDetectionTransformations
边栏推荐
- 软件测试开发基础|测开中的几个工具开发实战
- Asp net MVC web development tutorial
- 当CNN遇见Transformer《CMT:Convolutional Neural Networks Meet Vision Transformers》
- RTC clock: a calendar
- JDBC简单封装
- 可转债概念表 x Notion 给你方便快捷的体验!
- [深入研究4G/5G/6G专题-44]: URLLC-15-《3GPP URLLC相关协议、规范、技术原理深度解读》-9-低延时技术-3-非时隙调度Mini slot
- ES6 conversion of new data type set and arr set map
- Youqilin system installation beyondcomare
- The mystery of ID number
猜你喜欢

MES生产管理系统对设备的应用价值

Kotlin Android development novice tutorial

Pyg builds heterogeneous graph attention network han to realize DBLP node prediction

ACM warm-up exercise 3 in 2022 summer vacation (detailed)

VAE:变分自编码器的理解与实现

Cvpr21 unsupervised anomaly detection cutpaste:self supervised learning for anomaly detection and localization

Share several coding code receiving verification code platforms, which will be updated in February 2022

Method of win7 system anti ARP attack

Bm11 list addition (II)

Swing事件处理的过程是怎样的?
随机推荐
【笔记】《结网:互联网产品经理改变世界》
Swing事件处理的过程是怎样的?
Libgdx learning path 01: libgdx introduction and running tutorial
2022年中总结
Share several coding code receiving verification code platforms, which will be updated in February 2022
Get to know nodejs for the first time (with cases)
Cv5200 wireless WiFi communication module, wireless video image transmission, real-time wireless communication technology
SRS4.0安装步骤
Pandownload revival tutorial
JDBC简单封装
Mid 2022 summary
Smart contract security - overflow vulnerability
SaltStack系统初始化
力扣 1331. 数组序号转换
Avoidance Adjusted Climbrate
【已解决】AC86U ML改版固件虚拟内存创建失败,提示USB磁盘读写速度不满足要求
SaltStack入门
WPF 实现带蒙版的 MessageBox 消息提示框
架构实战营第8模块作业
Application of time series database in bridge monitoring field