SlideShare une entreprise Scribd logo
1  sur  38
Codiax:
Overview of
Generative
Adversarial
Networks (GANs)
1
jakublangr.com
@langrjakub
About me: Currently helping computer vision &
creative startups with their data problems.
● Previously R&D data scientist at Mudano,
previously Data Science Tech Lead at Filtered.com,
Pearson Plc.
● Author of Generative Adversarial Networks in
Action (2019 / Manning).
● Teaches at University of Birmingham, University of
Oxford (AI: Cloud & Edge) and several UK-based
financial companies.
● Was in Entrepreneur First 7th cohort (London)
● Graduated from Oxford, also worked there in
OUCS.
Today’s talk
1) Briefly touch on (Un)supervised ML
2) Talk about why generation is hard
3) Basis of Generative Adversarial Networks (GANs)
4) Popular architectures:
a) CycleGAN
b) BigGAN
5) Adversarial Examples
6) Practical Examples
7) Q & A @langrjakub
Supervised Machine Learning
@langrjakub
What is generative modeling?
(Unsupervised ML)
● Unsupervised ML and especially generative
modelling has been underappreciated until
quite recently
● It is still machine learning—we start with
some bad approximation and improve over
time.
○ But for that we need to know how well
we are doing
● We are trying to generate examples that look
like they came from the original distribution
using some learnable function generate()
@langrjakub
Generation is hard because the
distribution can be complex
● The distribution can be quite
complicated
● Evaluation can be difficult too
○ Automatic evaluation is not
trivial esp. If we cannot
quantify what constitutes a
realistic sample
● GANs allow us to implicitly model
this complicated distribution, but
that also means we don’t get a
closed-form solution @langrjakub
How does ML generation work?
Example of an
autoencoder
1) Sample from a
random seed
2) Run that through
this learnable
function
generate()
3) Get an output
@langrjakub
What are Generative Adversarial Networks?
@langrjakub
Generator Discriminator
Input A vector of random numbers The Discriminator receives input from
two sources:
● Real examples coming from the
training dataset
● Fake examples coming from the
Generator
Output Fake examples that strive to be
as convincing as possible
Likelihood that the input example is
real
Goal Generate fake data that are
indistinguishable from members
of the training dataset
Distinguish between fake examples
coming from the Generator and real
examples coming from the training
dataset
What are the components?
@langrjakub
An analogy: art critic and a forger
Exhibition competition: trying to create the best art exhibit possible.
Source: Dev Nag’s blog on medium.com
GANs learn iteratively
@langrjakub
Training objective: Min-Max
(the game theoretical one)
@langrjakub
Training objective: Min-Max training
Figure 1: The contour diagram
shows how GAN training is an
adversarial process, alternating
between minimizing and
maximizing the joint value
function. The generator G
optimizes for orange, and the
discriminator D optimizes for
purple. If GAN training ends at
(D, G), where G is imperfect
but D is perfect for that G, we
can obtain a new generator G’
that perfectly models the data
distribution by sampling from
the pD distribution.
Figure from Uber Research
(https://eng.uber.com/mh-gan/)
Training objective: Non-Saturating
(the one that people actually use)
@langrjakub
So why is this an interesting problem?
● Generative modelling has been largely
unsolved. We are moving closer to using
unsupervised learning as a workable paradigm.
● Variational autoencoders have been the state
of the art (best performance) until quite
recently.
● There’s lots of applications: semi-supervised
learning, representation learning, data
generation / augmentation etc.
● Many different domains as well. @langrjakub
Why are GANs
so incredible?
16
CycleGAN
17
● Unpaired domains:
cyclical loss
● More complex
architecture, but the
results are worth it
● Extensions already
exist, but e.g.
Progressive CycleGAN
has not been tried yet
CycleGAN: a new approach to domain
transfer
@langrjakub
CycleGAN architecture
@langrjakub
Idea of cyclical loss. Also remember, that because the loss works both ways, we can now reproduce not just
images from summer to winter, but also from winter to summer. In other words if G is our generator from A to B and
F is our generator from B to A, then a = F(G(a)) a.
CycleGAN architecture
@langrjakub
BigGAN
21
Artbreeder
Adversarial
Examples
23
● Adversarial attacks were a
predecessor to GANs (2004-ish)
● Adding specially selected noise to
the image times some tiny fraction
so that for humans it looks the same
● Adversarial Attacks came from the
observation that many deep
learning models are over-confident
even relatively out-of-distribution
Adversarial Attacks: Inspiration for GANs
● Comes from excessive linearity of
the high-dimensional sample space
● Demonstrates the fragility of many
existing classifiers, but in practice
these tend to be less problematic
● “Looks flashy” and is an “interesting
academic problem”
● Many formulations: single pixel
attacks, max-𝝐 attacks, region
attacks
(image from Ian Goodfellow, 2017)
Why do adversarial attacks work at all?
● Modern ML is wrong “almost
everywhere”—except for the thin
manifold around the training data
● Gaussian noise (mean and std on
the side) through InceptionV3
gives:
○ Ran on a state-of-the-art
classifier from 2014
○ Yellow class designation,
orange: confidence
@langrjakub
How bad is it? Does supervised learning
suffer from this?
● Generally, this “imperceptible”
attacks are quite unrealistic setting
1. There are simpler attacks if we have
that level of access—both time-wise
and knowledge wise
2. Even “well performing” models
generally are not perfect in-sample
3. If we have access to even the model
weights, we probably have bigger
problems!
But solving this is also hard, essentially
requires test error = 0!
So is ML doomed? — No, let’s think like attackers.
Practical
Applications
28
Creative Applications: Design at scale
Input (X) Generated F(X) Reconstructed G(F(X))
Domain Adaptation & Movies
@langrjakub
I am not the only one to be excited by this
Source: https://arxiv.org/abs/1910.12713
Practical applications
Many people (incl. myself) are
using these for synthetic data
generation.
● If you have severe class
imbalance, you can use
GANs.
● If you have algorithms that
generalize poorly, you can
use GANs.
● If you do not have enough
data at all, you can use
GANs.
More exotic 3D Applications
● Apple, Google have used in production for
UX studies, better usability or robotics etc.
● Host of applications that would soon lend
themselves to digital asset creation, design,
architecture or even engineering.
● So we can learn pretty complex
distributions conditionally!
● Other interesting purposes include data
augmentation beyond simple transforms or
style transfer. @langrjakub
CycleGAN: practical applications
● “Most interesting idea in ML in the last 10
years” Yann LeCun (Head of AI, Facebook)
● “Pretty much all interesting AI approaches
involve GANs in the middle” (Eric Schmidt,
2019 at Stanford HAI)
● GANs have ~2.5x the cited impact of
Tensorflow
● Business applications are still young
● As with any new technology, there are still
many challenges
In context
@langrjakub
Papers cited
● Kingma, D. P., & Welling, M. (2013). Auto-Encoding Variational Bayes. Retrieved
from http://arxiv.org/abs/1312.6114
● Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive Growing of GANs
for Improved Quality, Stability, and Variation. Retrieved from
http://arxiv.org/abs/1710.10196
● Wu, J., Zhang, C., Xue, T., Freeman, W. T., & Tenenbaum, J. B. (2016). Learning a
Probabilistic Latent Space of Object Shapes via 3D Generative-Adversarial
Modeling. Retrieved from http://arxiv.org/abs/1610.07584
● Shrivastava, A., Pfister, T., Tuzel, O., Susskind, J., Wang, W., & Webb, R. (2016).
Learning from Simulated and Unsupervised Images through Adversarial
Training. Retrieved from http://arxiv.org/abs/1612.07828
● Bousmalis, K., Silberman, N., Dohan, D., Erhan, D., & Krishnan, D. (n.d.).
Unsupervised Pixel–Level Domain Adaptation with Generative Adversarial
Networks. Retrieved from
http://openaccess.thecvf.com/content_cvpr_2017/papers/Bousmalis_Unsuperv
ised_Pixel-Level_Domain_CVPR_2017_paper.pdf
● Goodfellow, I. (2016). Generative Adversarial Networks. In NIPS.
References & links
● Zhu, J.-Y., Park, T., Isola, P., & Efros, A. A. (2017). Cycle-GAN: Unpaired
Image-to-Image Translation using Cycle-Consistent Adversarial
Networks. https://doi.org/10.1109/ICCV.2017.244
● Zhu, J.-Y., Krähenbühl, P., Shechtman, E., Efros, A. A., & Research, A.
(n.d.). Generative Visual Manipulation on the Natural Image Manifold.
Retrieved from https://arxiv.org/pdf/1609.03552v2.pdf
● Brock, A., Deepmind, J. D., & Deepmind, K. S. (n.d.). LARGE SCALE
GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS.
Retrieved from https://arxiv.org/pdf/1809.11096.pdf
Images
● http://www.cvc.uab.es/people/joans/slides_tensorflow/tensorflow_ht
ml/gan.html
● https://jaan.io/images/variational-autoencoder-faces.jpg
● https://github.com/hindupuravinash/the-gan-zoo/blob/master/cumul
ative_gans.jpg
● All animations from the Karras et al. ICLR 2018 presentation are from
the official GitHub repository and are under the CC-NC-4.0 license as
stated here:
https://github.com/tkarras/progressive_growing_of_gans
@langrjakub
Plugs! (... with varying degrees of shame.)
Get the GAN
book!
bit.ly/gan-book
bit.ly/keras-book (by F. Chollet)
If you want to learn more about
using GANs for synthetic data
generation or domain adaptation,
come talk to me
jakub@syntheticlabs.io
Thank you!
Any questions?
38
jakublangr.com
@langrjakub

Contenu connexe

Tendances

Continual Learning with Deep Architectures - Tutorial ICML 2021
Continual Learning with Deep Architectures - Tutorial ICML 2021Continual Learning with Deep Architectures - Tutorial ICML 2021
Continual Learning with Deep Architectures - Tutorial ICML 2021Vincenzo Lomonaco
 
BSSML16 L5. Summary Day 1 Sessions
BSSML16 L5. Summary Day 1 SessionsBSSML16 L5. Summary Day 1 Sessions
BSSML16 L5. Summary Day 1 SessionsBigML, Inc
 
BSSML16 L4. Association Discovery and Topic Modeling
BSSML16 L4. Association Discovery and Topic ModelingBSSML16 L4. Association Discovery and Topic Modeling
BSSML16 L4. Association Discovery and Topic ModelingBigML, Inc
 
BSSML16 L2. Ensembles and Logistic Regressions
BSSML16 L2. Ensembles and Logistic RegressionsBSSML16 L2. Ensembles and Logistic Regressions
BSSML16 L2. Ensembles and Logistic RegressionsBigML, Inc
 
李俊良/Feature Engineering in Machine Learning
李俊良/Feature Engineering in Machine Learning李俊良/Feature Engineering in Machine Learning
李俊良/Feature Engineering in Machine Learning台灣資料科學年會
 
BSSML16 L3. Clusters and Anomaly Detection
BSSML16 L3. Clusters and Anomaly DetectionBSSML16 L3. Clusters and Anomaly Detection
BSSML16 L3. Clusters and Anomaly DetectionBigML, Inc
 
Responsible Machine Learning at Data Science Summit 2020
Responsible Machine Learning at Data Science Summit 2020Responsible Machine Learning at Data Science Summit 2020
Responsible Machine Learning at Data Science Summit 2020Przemek Biecek
 
Introduction to machine learning and applications (1)
Introduction to machine learning and applications (1)Introduction to machine learning and applications (1)
Introduction to machine learning and applications (1)Manjunath Sindagi
 
Why L-3 Data Tactics Data Science?
Why L-3 Data Tactics Data Science?Why L-3 Data Tactics Data Science?
Why L-3 Data Tactics Data Science?Rich Heimann
 
A Blended Approach to Analytics at Data Tactics Corporation
A Blended Approach to Analytics at Data Tactics CorporationA Blended Approach to Analytics at Data Tactics Corporation
A Blended Approach to Analytics at Data Tactics CorporationRich Heimann
 
Machine Learning - Supervised learning
Machine Learning - Supervised learningMachine Learning - Supervised learning
Machine Learning - Supervised learningManeesha Caldera
 
Nautral Langauge Processing - Basics / Non Technical
Nautral Langauge Processing - Basics / Non Technical Nautral Langauge Processing - Basics / Non Technical
Nautral Langauge Processing - Basics / Non Technical Dhruv Gohil
 

Tendances (17)

Agile Deep Learning
Agile Deep LearningAgile Deep Learning
Agile Deep Learning
 
Meta learning tutorial
Meta learning tutorialMeta learning tutorial
Meta learning tutorial
 
Continual Learning with Deep Architectures - Tutorial ICML 2021
Continual Learning with Deep Architectures - Tutorial ICML 2021Continual Learning with Deep Architectures - Tutorial ICML 2021
Continual Learning with Deep Architectures - Tutorial ICML 2021
 
BSSML16 L5. Summary Day 1 Sessions
BSSML16 L5. Summary Day 1 SessionsBSSML16 L5. Summary Day 1 Sessions
BSSML16 L5. Summary Day 1 Sessions
 
BSSML16 L4. Association Discovery and Topic Modeling
BSSML16 L4. Association Discovery and Topic ModelingBSSML16 L4. Association Discovery and Topic Modeling
BSSML16 L4. Association Discovery and Topic Modeling
 
MILA DL & RL summer school highlights
MILA DL & RL summer school highlights MILA DL & RL summer school highlights
MILA DL & RL summer school highlights
 
BSSML16 L2. Ensembles and Logistic Regressions
BSSML16 L2. Ensembles and Logistic RegressionsBSSML16 L2. Ensembles and Logistic Regressions
BSSML16 L2. Ensembles and Logistic Regressions
 
李俊良/Feature Engineering in Machine Learning
李俊良/Feature Engineering in Machine Learning李俊良/Feature Engineering in Machine Learning
李俊良/Feature Engineering in Machine Learning
 
BSSML16 L3. Clusters and Anomaly Detection
BSSML16 L3. Clusters and Anomaly DetectionBSSML16 L3. Clusters and Anomaly Detection
BSSML16 L3. Clusters and Anomaly Detection
 
Plug play language_models
Plug play language_modelsPlug play language_models
Plug play language_models
 
Responsible Machine Learning at Data Science Summit 2020
Responsible Machine Learning at Data Science Summit 2020Responsible Machine Learning at Data Science Summit 2020
Responsible Machine Learning at Data Science Summit 2020
 
Introduction to machine learning and applications (1)
Introduction to machine learning and applications (1)Introduction to machine learning and applications (1)
Introduction to machine learning and applications (1)
 
LDOW15
LDOW15LDOW15
LDOW15
 
Why L-3 Data Tactics Data Science?
Why L-3 Data Tactics Data Science?Why L-3 Data Tactics Data Science?
Why L-3 Data Tactics Data Science?
 
A Blended Approach to Analytics at Data Tactics Corporation
A Blended Approach to Analytics at Data Tactics CorporationA Blended Approach to Analytics at Data Tactics Corporation
A Blended Approach to Analytics at Data Tactics Corporation
 
Machine Learning - Supervised learning
Machine Learning - Supervised learningMachine Learning - Supervised learning
Machine Learning - Supervised learning
 
Nautral Langauge Processing - Basics / Non Technical
Nautral Langauge Processing - Basics / Non Technical Nautral Langauge Processing - Basics / Non Technical
Nautral Langauge Processing - Basics / Non Technical
 

Similaire à Jakub Langr (University of Oxford) - Overview of Generative Adversarial Networks (GANs)

brief Introduction to Different Kinds of GANs
brief Introduction to Different Kinds of GANsbrief Introduction to Different Kinds of GANs
brief Introduction to Different Kinds of GANsParham Zilouchian
 
Introduction to Generative Models.pptx
Introduction to Generative Models.pptxIntroduction to Generative Models.pptx
Introduction to Generative Models.pptxJOBANPREETSINGH62
 
GANs Presentation.pptx
GANs Presentation.pptxGANs Presentation.pptx
GANs Presentation.pptxMAHMOUD729246
 
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...Universitat Politècnica de Catalunya
 
The Incredible Disappearing Data Scientist
The Incredible Disappearing Data ScientistThe Incredible Disappearing Data Scientist
The Incredible Disappearing Data ScientistRebecca Bilbro
 
Strata 2016 - Lessons Learned from building real-life Machine Learning Systems
Strata 2016 -  Lessons Learned from building real-life Machine Learning SystemsStrata 2016 -  Lessons Learned from building real-life Machine Learning Systems
Strata 2016 - Lessons Learned from building real-life Machine Learning SystemsXavier Amatriain
 
Predictive analytics semi-supervised learning with GANs
Predictive analytics   semi-supervised learning with GANsPredictive analytics   semi-supervised learning with GANs
Predictive analytics semi-supervised learning with GANsterek47
 
Reading group gan - 20170417
Reading group   gan - 20170417Reading group   gan - 20170417
Reading group gan - 20170417Shuai Zhang
 
TensorFlow London: Progressive Growing of GANs for increased stability, quali...
TensorFlow London: Progressive Growing of GANs for increased stability, quali...TensorFlow London: Progressive Growing of GANs for increased stability, quali...
TensorFlow London: Progressive Growing of GANs for increased stability, quali...Seldon
 
Deep Generative Modelling
Deep Generative ModellingDeep Generative Modelling
Deep Generative ModellingPetko Nikolov
 
Deep Learning for Computer Vision: Generative models and adversarial training...
Deep Learning for Computer Vision: Generative models and adversarial training...Deep Learning for Computer Vision: Generative models and adversarial training...
Deep Learning for Computer Vision: Generative models and adversarial training...Universitat Politècnica de Catalunya
 
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...Universitat Politècnica de Catalunya
 
Model evaluation in the land of deep learning
Model evaluation in the land of deep learningModel evaluation in the land of deep learning
Model evaluation in the land of deep learningPramit Choudhary
 
Generative Adversarial Networks and Their Applications
Generative Adversarial Networks and Their ApplicationsGenerative Adversarial Networks and Their Applications
Generative Adversarial Networks and Their ApplicationsArtifacia
 
Generative Adversarial Networks : Basic architecture and variants
Generative Adversarial Networks : Basic architecture and variantsGenerative Adversarial Networks : Basic architecture and variants
Generative Adversarial Networks : Basic architecture and variantsananth
 
General introduction to AI ML DL DS
General introduction to AI ML DL DSGeneral introduction to AI ML DL DS
General introduction to AI ML DL DSRoopesh Kohad
 
Gans - Generative Adversarial Nets
Gans - Generative Adversarial NetsGans - Generative Adversarial Nets
Gans - Generative Adversarial NetsSajalRastogi8
 
BIG2016- Lessons Learned from building real-life user-focused Big Data systems
BIG2016- Lessons Learned from building real-life user-focused Big Data systemsBIG2016- Lessons Learned from building real-life user-focused Big Data systems
BIG2016- Lessons Learned from building real-life user-focused Big Data systemsXavier Amatriain
 

Similaire à Jakub Langr (University of Oxford) - Overview of Generative Adversarial Networks (GANs) (20)

brief Introduction to Different Kinds of GANs
brief Introduction to Different Kinds of GANsbrief Introduction to Different Kinds of GANs
brief Introduction to Different Kinds of GANs
 
Introduction to Generative Models.pptx
Introduction to Generative Models.pptxIntroduction to Generative Models.pptx
Introduction to Generative Models.pptx
 
GANs Presentation.pptx
GANs Presentation.pptxGANs Presentation.pptx
GANs Presentation.pptx
 
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...
Generative Adversarial Networks GAN - Xavier Giro - UPC TelecomBCN Barcelona ...
 
The Incredible Disappearing Data Scientist
The Incredible Disappearing Data ScientistThe Incredible Disappearing Data Scientist
The Incredible Disappearing Data Scientist
 
Strata 2016 - Lessons Learned from building real-life Machine Learning Systems
Strata 2016 -  Lessons Learned from building real-life Machine Learning SystemsStrata 2016 -  Lessons Learned from building real-life Machine Learning Systems
Strata 2016 - Lessons Learned from building real-life Machine Learning Systems
 
Predictive analytics semi-supervised learning with GANs
Predictive analytics   semi-supervised learning with GANsPredictive analytics   semi-supervised learning with GANs
Predictive analytics semi-supervised learning with GANs
 
Reading group gan - 20170417
Reading group   gan - 20170417Reading group   gan - 20170417
Reading group gan - 20170417
 
TensorFlow London: Progressive Growing of GANs for increased stability, quali...
TensorFlow London: Progressive Growing of GANs for increased stability, quali...TensorFlow London: Progressive Growing of GANs for increased stability, quali...
TensorFlow London: Progressive Growing of GANs for increased stability, quali...
 
Deep Generative Modelling
Deep Generative ModellingDeep Generative Modelling
Deep Generative Modelling
 
Deep Learning for Computer Vision: Generative models and adversarial training...
Deep Learning for Computer Vision: Generative models and adversarial training...Deep Learning for Computer Vision: Generative models and adversarial training...
Deep Learning for Computer Vision: Generative models and adversarial training...
 
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...
Generative Adversarial Networks (D2L5 Deep Learning for Speech and Language U...
 
Model evaluation in the land of deep learning
Model evaluation in the land of deep learningModel evaluation in the land of deep learning
Model evaluation in the land of deep learning
 
Generative Adversarial Networks and Their Applications
Generative Adversarial Networks and Their ApplicationsGenerative Adversarial Networks and Their Applications
Generative Adversarial Networks and Their Applications
 
Generative Adversarial Networks : Basic architecture and variants
Generative Adversarial Networks : Basic architecture and variantsGenerative Adversarial Networks : Basic architecture and variants
Generative Adversarial Networks : Basic architecture and variants
 
General introduction to AI ML DL DS
General introduction to AI ML DL DSGeneral introduction to AI ML DL DS
General introduction to AI ML DL DS
 
L15.pptx
L15.pptxL15.pptx
L15.pptx
 
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
Deep Generative Models - Kevin McGuinness - UPC Barcelona 2018
 
Gans - Generative Adversarial Nets
Gans - Generative Adversarial NetsGans - Generative Adversarial Nets
Gans - Generative Adversarial Nets
 
BIG2016- Lessons Learned from building real-life user-focused Big Data systems
BIG2016- Lessons Learned from building real-life user-focused Big Data systemsBIG2016- Lessons Learned from building real-life user-focused Big Data systems
BIG2016- Lessons Learned from building real-life user-focused Big Data systems
 

Plus de Codiax

Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Codiax
 
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCostas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCodiax
 
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Codiax
 
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Codiax
 
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Codiax
 
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Codiax
 
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosAdria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosCodiax
 
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Codiax
 
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Codiax
 
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Codiax
 
Matthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroMatthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroCodiax
 
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Codiax
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Codiax
 
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Codiax
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeCodiax
 
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Codiax
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldCodiax
 
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Codiax
 
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Codiax
 
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerAlexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerCodiax
 

Plus de Codiax (20)

Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
Dr. Laura Kerber (NASA’s Jet Propulsion Laboratory) – Exploring Caves on the ...
 
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluationCostas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
Costas Voliotis (CodeWeTrust) – An AI-driven approach to source code evaluation
 
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
Dr. Lobna Karoui (Fortune 500) – Disruption, empathy & Trust for sustainable ...
 
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
Luka Postružin (Superbet) – ‘From zero to hero’ in early life customer segmen...
 
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
Gema Parreno Piqueras (Apium Hub) – Videogames and Interactive Narrative Cont...
 
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
Janos Puskas (Accenture) – Azure IoT Reference Architecture for enterprise Io...
 
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videosAdria Recasens, DeepMind – Multi-modal self-supervised learning from videos
Adria Recasens, DeepMind – Multi-modal self-supervised learning from videos
 
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
Roelof Pieters (Overstory) – Tackling Forest Fires and Deforestation with Sat...
 
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
Javier Fuentes Alonso (Uizard) – Using machine learning to turn you into a de...
 
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
Emeli Dral (Evidently AI) – Analyze it: production monitoring for machine lea...
 
Matthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical IntroMatthias Feys (ML6) – Bias in ML: A Technical Intro
Matthias Feys (ML6) – Bias in ML: A Technical Intro
 
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
Christophe Tallec, Hello Tomorrow – Solving our next decade challenges throug...
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
 
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
Olga Afanasjeva (GoodAI) - Towards general artificial intelligence for common...
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The Trade
 
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
Joanna Bryson (University of Bath) - Intelligence by Design_ Systems engineer...
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
Jair Ribeiro - Defining a Successful Artificial Intelligence Strategy for you...
 
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
Cindy Spelt (Zoom In Zoom Out) - How to beat the face recognition challenges?
 
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network ServerAlexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
Alexey Borisenko (Cisco) - Creating IoT solution using LoRaWAN Network Server
 

Dernier

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Dernier (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Jakub Langr (University of Oxford) - Overview of Generative Adversarial Networks (GANs)

  • 2. About me: Currently helping computer vision & creative startups with their data problems. ● Previously R&D data scientist at Mudano, previously Data Science Tech Lead at Filtered.com, Pearson Plc. ● Author of Generative Adversarial Networks in Action (2019 / Manning). ● Teaches at University of Birmingham, University of Oxford (AI: Cloud & Edge) and several UK-based financial companies. ● Was in Entrepreneur First 7th cohort (London) ● Graduated from Oxford, also worked there in OUCS.
  • 3. Today’s talk 1) Briefly touch on (Un)supervised ML 2) Talk about why generation is hard 3) Basis of Generative Adversarial Networks (GANs) 4) Popular architectures: a) CycleGAN b) BigGAN 5) Adversarial Examples 6) Practical Examples 7) Q & A @langrjakub
  • 5. What is generative modeling? (Unsupervised ML) ● Unsupervised ML and especially generative modelling has been underappreciated until quite recently ● It is still machine learning—we start with some bad approximation and improve over time. ○ But for that we need to know how well we are doing ● We are trying to generate examples that look like they came from the original distribution using some learnable function generate() @langrjakub
  • 6. Generation is hard because the distribution can be complex ● The distribution can be quite complicated ● Evaluation can be difficult too ○ Automatic evaluation is not trivial esp. If we cannot quantify what constitutes a realistic sample ● GANs allow us to implicitly model this complicated distribution, but that also means we don’t get a closed-form solution @langrjakub
  • 7. How does ML generation work? Example of an autoencoder 1) Sample from a random seed 2) Run that through this learnable function generate() 3) Get an output @langrjakub
  • 8. What are Generative Adversarial Networks? @langrjakub
  • 9. Generator Discriminator Input A vector of random numbers The Discriminator receives input from two sources: ● Real examples coming from the training dataset ● Fake examples coming from the Generator Output Fake examples that strive to be as convincing as possible Likelihood that the input example is real Goal Generate fake data that are indistinguishable from members of the training dataset Distinguish between fake examples coming from the Generator and real examples coming from the training dataset What are the components? @langrjakub
  • 10. An analogy: art critic and a forger Exhibition competition: trying to create the best art exhibit possible. Source: Dev Nag’s blog on medium.com
  • 12. Training objective: Min-Max (the game theoretical one) @langrjakub
  • 13. Training objective: Min-Max training Figure 1: The contour diagram shows how GAN training is an adversarial process, alternating between minimizing and maximizing the joint value function. The generator G optimizes for orange, and the discriminator D optimizes for purple. If GAN training ends at (D, G), where G is imperfect but D is perfect for that G, we can obtain a new generator G’ that perfectly models the data distribution by sampling from the pD distribution. Figure from Uber Research (https://eng.uber.com/mh-gan/)
  • 14. Training objective: Non-Saturating (the one that people actually use) @langrjakub
  • 15. So why is this an interesting problem? ● Generative modelling has been largely unsolved. We are moving closer to using unsupervised learning as a workable paradigm. ● Variational autoencoders have been the state of the art (best performance) until quite recently. ● There’s lots of applications: semi-supervised learning, representation learning, data generation / augmentation etc. ● Many different domains as well. @langrjakub
  • 16. Why are GANs so incredible? 16
  • 18. ● Unpaired domains: cyclical loss ● More complex architecture, but the results are worth it ● Extensions already exist, but e.g. Progressive CycleGAN has not been tried yet CycleGAN: a new approach to domain transfer @langrjakub
  • 19. CycleGAN architecture @langrjakub Idea of cyclical loss. Also remember, that because the loss works both ways, we can now reproduce not just images from summer to winter, but also from winter to summer. In other words if G is our generator from A to B and F is our generator from B to A, then a = F(G(a)) a.
  • 24. ● Adversarial attacks were a predecessor to GANs (2004-ish) ● Adding specially selected noise to the image times some tiny fraction so that for humans it looks the same ● Adversarial Attacks came from the observation that many deep learning models are over-confident even relatively out-of-distribution Adversarial Attacks: Inspiration for GANs
  • 25. ● Comes from excessive linearity of the high-dimensional sample space ● Demonstrates the fragility of many existing classifiers, but in practice these tend to be less problematic ● “Looks flashy” and is an “interesting academic problem” ● Many formulations: single pixel attacks, max-𝝐 attacks, region attacks (image from Ian Goodfellow, 2017) Why do adversarial attacks work at all?
  • 26. ● Modern ML is wrong “almost everywhere”—except for the thin manifold around the training data ● Gaussian noise (mean and std on the side) through InceptionV3 gives: ○ Ran on a state-of-the-art classifier from 2014 ○ Yellow class designation, orange: confidence @langrjakub How bad is it? Does supervised learning suffer from this?
  • 27. ● Generally, this “imperceptible” attacks are quite unrealistic setting 1. There are simpler attacks if we have that level of access—both time-wise and knowledge wise 2. Even “well performing” models generally are not perfect in-sample 3. If we have access to even the model weights, we probably have bigger problems! But solving this is also hard, essentially requires test error = 0! So is ML doomed? — No, let’s think like attackers.
  • 29. Creative Applications: Design at scale Input (X) Generated F(X) Reconstructed G(F(X))
  • 30. Domain Adaptation & Movies @langrjakub
  • 31. I am not the only one to be excited by this Source: https://arxiv.org/abs/1910.12713
  • 32. Practical applications Many people (incl. myself) are using these for synthetic data generation. ● If you have severe class imbalance, you can use GANs. ● If you have algorithms that generalize poorly, you can use GANs. ● If you do not have enough data at all, you can use GANs.
  • 33. More exotic 3D Applications ● Apple, Google have used in production for UX studies, better usability or robotics etc. ● Host of applications that would soon lend themselves to digital asset creation, design, architecture or even engineering. ● So we can learn pretty complex distributions conditionally! ● Other interesting purposes include data augmentation beyond simple transforms or style transfer. @langrjakub
  • 35. ● “Most interesting idea in ML in the last 10 years” Yann LeCun (Head of AI, Facebook) ● “Pretty much all interesting AI approaches involve GANs in the middle” (Eric Schmidt, 2019 at Stanford HAI) ● GANs have ~2.5x the cited impact of Tensorflow ● Business applications are still young ● As with any new technology, there are still many challenges In context @langrjakub
  • 36. Papers cited ● Kingma, D. P., & Welling, M. (2013). Auto-Encoding Variational Bayes. Retrieved from http://arxiv.org/abs/1312.6114 ● Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive Growing of GANs for Improved Quality, Stability, and Variation. Retrieved from http://arxiv.org/abs/1710.10196 ● Wu, J., Zhang, C., Xue, T., Freeman, W. T., & Tenenbaum, J. B. (2016). Learning a Probabilistic Latent Space of Object Shapes via 3D Generative-Adversarial Modeling. Retrieved from http://arxiv.org/abs/1610.07584 ● Shrivastava, A., Pfister, T., Tuzel, O., Susskind, J., Wang, W., & Webb, R. (2016). Learning from Simulated and Unsupervised Images through Adversarial Training. Retrieved from http://arxiv.org/abs/1612.07828 ● Bousmalis, K., Silberman, N., Dohan, D., Erhan, D., & Krishnan, D. (n.d.). Unsupervised Pixel–Level Domain Adaptation with Generative Adversarial Networks. Retrieved from http://openaccess.thecvf.com/content_cvpr_2017/papers/Bousmalis_Unsuperv ised_Pixel-Level_Domain_CVPR_2017_paper.pdf ● Goodfellow, I. (2016). Generative Adversarial Networks. In NIPS. References & links ● Zhu, J.-Y., Park, T., Isola, P., & Efros, A. A. (2017). Cycle-GAN: Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks. https://doi.org/10.1109/ICCV.2017.244 ● Zhu, J.-Y., Krähenbühl, P., Shechtman, E., Efros, A. A., & Research, A. (n.d.). Generative Visual Manipulation on the Natural Image Manifold. Retrieved from https://arxiv.org/pdf/1609.03552v2.pdf ● Brock, A., Deepmind, J. D., & Deepmind, K. S. (n.d.). LARGE SCALE GAN TRAINING FOR HIGH FIDELITY NATURAL IMAGE SYNTHESIS. Retrieved from https://arxiv.org/pdf/1809.11096.pdf Images ● http://www.cvc.uab.es/people/joans/slides_tensorflow/tensorflow_ht ml/gan.html ● https://jaan.io/images/variational-autoencoder-faces.jpg ● https://github.com/hindupuravinash/the-gan-zoo/blob/master/cumul ative_gans.jpg ● All animations from the Karras et al. ICLR 2018 presentation are from the official GitHub repository and are under the CC-NC-4.0 license as stated here: https://github.com/tkarras/progressive_growing_of_gans @langrjakub
  • 37. Plugs! (... with varying degrees of shame.) Get the GAN book! bit.ly/gan-book bit.ly/keras-book (by F. Chollet) If you want to learn more about using GANs for synthetic data generation or domain adaptation, come talk to me jakub@syntheticlabs.io