当前位置:网站首页>Engineering practice behind dall-e 2: ensure that the output of the model complies with the content policy
Engineering practice behind dall-e 2: ensure that the output of the model complies with the content policy
2022-06-29 12:15:00 【Zhiyuan community】
To share with the audience DALL·E 2 The magic of , We need to reduce the risks associated with powerful image generation models . So , We have set up various protective measures , To prevent generated images from violating our content policy . This article focuses on pre training mitigation measures , A subset of these safeguards , Directly modifying DALL·E 2 Data learned from . especially ,DALL·E 2 Use hundreds of millions of subtitle images from the Internet for training , We delete and reweight some of these images to change the learning content of the model . This article is divided into three parts , Each section describes different pre training mitigation measures : In the first part , We described how we started from DALL·E 2 The training data set filters out violent and pornographic images . Without such mitigation measures , The model will learn to generate graphics or explicit images when prompted , You may even inadvertently return these images in response to seemingly harmless prompts . In the second part , We found that filtering training data can magnify the deviation , And describe our technology to mitigate this impact . for example , Without such mitigation measures , We noticed that , Compared with the model trained on the original data set , Models trained on filtered data sometimes produce more images of men and less images of women . In the last part , We turn to the question of memory , Discovery image DALL·E 2 Such models can sometimes reproduce images they have trained , Instead of creating new images . In practice , We found that this image backflow is caused by multiple copies of images in the dataset , And alleviate this problem by deleting images that are visually similar to other images in the dataset .边栏推荐
- Unified exception reporting practice based on bytecode
- 龙书虎书鲸书啃不动?试试豆瓣评分9.5的猴书
- GBase8s数据库select有ORDER BY 子句5
- MATLAB Gui 实现点击按钮,打开文件对话框,导入图片功能
- 联想领像 lenovoimage 部分打印机 驱动 PPD 文件
- Sofaregistry source code | data synchronization module analysis
- 恒泰证券开户安全吗 证券排名
- Numpy's ndarray array Foundation
- RSLO:自监督激光雷达里程计(实时+高精度,ICRA2022)
- Codeforces Round #803 (Div. 2)
猜你喜欢

镜像漏洞扫描工具:Trivy

Information technology application and innovation professionals (database) intermediate training hot enrollment (July 6-10)

Win11 web version

大家有没有觉得学机械的人很可怕?

跟着官方学电机,BLDC两种控制策略,学到即赚到

How to view saved passwords of websites

智能垃圾桶(四)——树莓派pico实现超声波测距(HC-SR04)

年轻就要醒着拼,年轻就要勇于尝试

杰理之关于 TWS 交叉配对的配置【篇】

&4 express框架
随机推荐
每周推荐短视频:爱因斯坦是怎样思考问题的?
Helping the ultimate experience, best practice of volcano engine edge computing
Information technology application and innovation professionals (database) intermediate training hot enrollment (July 6-10)
杰理之关于开机发起回连对耳的位置:【篇】
GBase8s数据库select有ORDER BY 子句
年轻就要醒着拼,年轻就要勇于尝试
黑化的蜜雪冰城,凭营销就想抓牢消费者的心?
GBase8s数据库对 STANDARD 或 RAW 结果表排序
Unified exception reporting practice based on bytecode
地平线开发板配置网段
Easy express: we use Zadig to realize 10000 times of construction and deployment, smart operation and maintenance, and release development productivity
ShanDong Multi-University Training #3
请问股票开户收费吗 网上开户安全吗?
Jerry's about TWS pairing mode configuration [chapter]
东方财富证券开户安全吗 证券开户办理
Numpy's ndarray array Foundation
Windwos10安装sshd服务
Jerry's about TWS channel configuration [chapter]
Jerry's WiFi interferes with Bluetooth [chapter]
基础类型变量声明