Introduction to Convex Optimization

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Convex Optimization Lecture Notes: Introduction to Convex Optimization Changho Suh1 June 4, 2019 1Changho Suh is an Associate Professor in the School of Electrical Engineering at Korea Advanced Institute of Science and Technology, South Korea (Email: chsuh@kaist:ac:kr). EE523 Convex Optimization February 26, 2019 KAIST, Spring 2019 Lecture 1: Logistics and Overview About instructor Welcome to EE523: Convex Optimization! My name is Changho Suh, an instructor of the course. A brief introduction of myself. A long time ago, I was one of the students in KAIST like you. I spent six years at KAIST to obtain the Bachelor and Master degrees all from Electrical Engineering in 2000 and 2002, respectively. And then I left academia, joining Samsung electronics. At Samsung, I worked on the design of wireless communication systems like 4G- LTE systems. Spending four and a half years, I then left industry, joining UC-Berkeley where I obtained the PhD degree in 2011. I then joined MIT as a postdoc, spending around one year. And then I came back to KAIST. My research interests include information theory and machine learning which have something to do with the optimization theory, which I am going to cover in part from this course. Today's lecture In today's lecture, we will cover two very basic stuffs. The first is logistics of this course: details as to how the course is organized and will proceed. The second thing to cover is a brief overview to this course. In the second part, I am going to tell you a story of how convex optimization was developed, as well as what we will cover from this course. My contact information, office hours and TAs' information See syllabus uploaded on the course website. One special note: if you cannot make it neither for my office hours nor for TAs' ones, please send me an email to make an appointment in different time slots. Prerequisite The key prerequisite for this course is to have a good background in linear algebra. In terms of a course, this means that you should have taken the following course: MAS109, which is an introductory-level course on linear algebra. This is the one that is offered in the Department of Mathematical Sciences. Some of you might take a different yet equivalent course from other departments. This is also okay. Taking a somewhat advanced-level course (e.g., MAS212: Linear Algebra) is optional although it is recommended. If you feel a bit uncomfortable although you took the relevant course(s), you may want to review a material (part of a linear algebra course note at Stanford) that I uploaded on the course website. Another prerequisite for the course is a familiarity with the concept on probability. In terms of a course, this means that you are expected to be somewhat comfortable with the contents dealt in EE210, which is an undergraduate-level course on probability. Taking an advanced course like EE528 (Random Processes) is optional. This is not a strong prerequisite. In fact, the convex optimization concept itself has nothing to do with probability. But some problems (especially the ones that arise in recent trending fields like machine learning and artificial intelligence, and I will also touch upon a bit in this course) deal with some quantities which are random and therefore are described with probability distributions. This is the only reason that understanding the concept on probability is needed for this course. Hence, reviewing another material (an easy- 1 level probability course note at MIT) that I uploaded on the course website may suffice. There must be a reason as to why linear algebra is crucial for this course. The reason is related to the definition of optimization, which subsumes convex optimization (which we will study throughout this course) as a special case. A somewhat casual definition of optimization is to make the best choice among many candidates (or alternatives). A more math-oriented definition of optimization (which we should rely on as scientists and/or engineers) is to choose an optimization variable (or decision variable) so as to minimize or maximize a certain quantity of interest possibly given some constraint(s). Here the optimization variable and the certain quantity are the ones that relate the optimization to linear algebra. In many situations, the optimization variable are multiple real values which can be succinctly represented as a vector. Also the certain quantity (which is a function of the optimization variable) can be represented as a function that involves matrix-vector multiplication and/or matrix-matrix multiplication, which are basic operations that arise in linear algebra. In fact, many operations and techniques in linear algebra help formulating an optimization problem in a very succinct manner, and therefore help theorizing the optimization field. This is the very reason that this course requires a good understanding and manipulation techniques on linear algebra. Some of you may not be well trained with expressing an interested quantity with vector/matrix forms. Please don't be offended. You will have lots of chances to be trained via some examples that will be covered in lectures and homeworks as the course progresses. Whenever some advanced techniques are needed, then I will provide detailed explanations and/or materials which serve you to understand the required techniques. If you think that you lack these prerequisites, then come and consult with me so that I can help you as much as possible. Course website We have a course website on the KLMS system. You can simply login with your portal ID. If you want to only sit in this course (or cannot register the course for some reason), please let me or one of TAs know your email address. Upon request, we are willing to distribute course materials to the email address that you sent us. Text The organization of the course will follow mostly but in part by: Prof. Laurent El Ghaoui's livebook (LB for short), titled \Optimization Models and Applications". To access, you need to register at http://livebooklabs.com/keeppies/c5a5868ce26b8125. A good news is that the regis- tration comes for free. I am going to provide you with lecture slides (LS for short) which I will use during lectures, as well as course notes (CN for short) like the one that you are now reading. Most times, these materials will be posted at night on a day before class, but sometimes course notes may be uploaded after lectures. These materials are almost self-contained, and cover the entire contents that will show up in homeworks and exams. So if you want to make a minimal effort to this course (for some personal reason), then these materials may suffice to pass the course with a reasonable grade. For those who have enough energy, passion and time, I recommend you to consult with other references: (1) Calafiore & El Ghaoui, \Optimization Models", Cambridge University Press, Oct. 2014; (2) Boyd & Vandenberghe, \Convex Optimization", Cambridge University Press, 2004 (available online at http://stanford.edu/∼boyd/cvxbook/bv cvxbook.pdf). Sometimes, I will make some homework problems from these references. If so, I will let you know and upload a 2 soft copy of the relevant part of the books. Problem sets There will be weekly or bi-weekly problem sets. So there would be seven to eight problem sets in total. Solutions will be usually available at the end of the due date. This means that in principle, we do not accept any late submission. We encourage you to cooperate with each other in solving the problem sets. However, you should write down your own solutions by yourselves. You are welcome to flag confusing topics in the problem sets; this will not lower your grade. Some problems may require programming like CVX that runs in MATLAB. We will also provide a tutorial for programming when a first related-homework is issued. Exams As usual, there will be two exams: midterm and final. Please see syllabus for the schedule that our institution assigns by default - that is Thursday 9am-noon on an exam week for this course. Please let us know if someone cannot make it for the schedule. If your reason is reasonable, then we can change the schedule or can give a chance for you to take an exam in a different time slot that we will organize individually. Two things to notice. First, for both exams, you are allowed to use one cheating sheet, A4-sized and double-sided. So it is a kind of semi-closed-book exam. Second, for your convenience, we will provide an instruction note for each exam, which contains detailed guidelines as to how to prepare for the exam. Such information includes: (1) how many problems are in the exam; (2) what types of problems are dealt with in what contexts; (3) the best way to prepare for such problems. Course grade Here is a rule for the course grade that you are mostly interested in perhaps. The grade will be decided based on four factors: problem sets (22%); midterm (32%); final (40%); and interaction (6%). Here the interaction means any type of interaction. So it includes attendance, in-class participation, questions, discussion, and any type of interaction with me. Overview Now let's move onto the second part. Here is information for reading materials: Course Note (CN for short) 1 and Chapter 1 in LB. In this part, I will tell you how the theory of convex optimization was developed in which contexts. I will then provide you with specific topics that we will learn about through the course. Optimization To talk about a story of how the theory of convex optimization was developed, we need to first know about the history of optimization which includes convex optimization as a special case.
Recommended publications
  • Xinggan for Person Image Generation
    XingGAN for Person Image Generation Hao Tang1;2, Song Bai2, Li Zhang2, Philip H.S. Torr2, and Nicu Sebe1;3 1University of Trento ([email protected]) 2University of Oxford 3Huawei Research Ireland Abstract. We propose a novel Generative Adversarial Network (Xing- GAN or CrossingGAN) for person image generation tasks, i.e., translat- ing the pose of a given person to a desired one. The proposed Xing gener- ator consists of two generation branches that model the person's appear- ance and shape information, respectively. Moreover, we propose two novel blocks to effectively transfer and update the person's shape and appear- ance embeddings in a crossing way to mutually improve each other, which has not been considered by any other existing GAN-based image genera- tion work. Extensive experiments on two challenging datasets, i.e., Market- 1501 and DeepFashion, demonstrate that the proposed XingGAN ad- vances the state-of-the-art performance both in terms of objective quan- titative scores and subjective visual realness. The source code and trained models are available at https://github.com/Ha0Tang/XingGAN. Keywords: Generative Adversarial Networks (GANs), Person Image Generation, Appearance Cues, Shape Cues 1 Introduction The problem of person image generation aims to generate photo-realistic per- son images conditioned on an input person image and several desired poses. This task has a wide range of applications such as person image/video genera- tion [41,9,2,11,19] and person re-identification [45,28]. Exiting methods such as [21,22,31,45,35] have achieved promising performance on this challenging task.
    [Show full text]
  • Video and Audio Deepfakes: What Lawyers Need to Know by Sharon D
    Video and Audio Deepfakes: What Lawyers Need to Know by Sharon D. Nelson, Esq., and John W. Simek © 2020 Sensei Enterprises, Inc. If some nefarious person has decent photos of your face, you too (like so many unfortunate Hollywood celebrities) could appear to be the star of a pornographic video. If someone has recordings of your voice (from your website videos, CLEs you have presented, speeches you’ve given, etc.), they can do a remarkably good job of simulating your spoken words and, just as an example, call your office manager and authorize a wire transfer – something the office manager may be willing to do because of “recognizing” your voice. Unnerving? Yes, but it is the reality of today. And if you don’t believe how “white hot” deepfakes are, just put a Google alert on that word and you’ll be amazed at the volume of daily results. Political and Legal Implications We have already seen deepfakes used in the political area (the “drunk” Nancy Pelosi deepfake, a reference to which was tweeted by the president), and many commentators worry that deepfake videos will ramp up for the 2020 election. Some of them, including the Pelosi video, are referred to as “cheapfakes” because they are so poorly done (basically running the video at 75 percent speed to simulate drunkenness), but that really doesn’t matter if large numbers of voters believe it’s real. And the days when you could tell a deepfake video by the fact that the person didn’t blink are rapidly vanishing as the algorithms have gotten smarter.
    [Show full text]
  • Neural Rendering and Reenactment of Human Actor Videos
    Neural Rendering and Reenactment of Human Actor Videos LINGJIE LIU, University of Hong Kong, Max Planck Institute for Informatics WEIPENG XU, Max Planck Institute for Informatics MICHAEL ZOLLHÖFER, Stanford University, Max Planck Institute for Informatics HYEONGWOO KIM, FLORIAN BERNARD, and MARC HABERMANN, Max Planck Institute for Informatics WENPING WANG, University of Hong Kong CHRISTIAN THEOBALT, Max Planck Institute for Informatics (real) Driving motion (synth.) Output Fig. 1. We propose a novel learning-based approach for the animation and reenactment of human actor videos. The top row shows some frames of the video from which the source motion is extracted, and the bottom row shows the corresponding synthesized target person imagery reenacting the source motion. We propose a method for generating video-realistic animations of real hu- images are then used to train a conditional generative adversarial network mans under user control. In contrast to conventional human character render- that translates synthetic images of the 3D model into realistic imagery of ing, we do not require the availability of a production-quality photo-realistic the human. We evaluate our method for the reenactment of another person 3D model of the human, but instead rely on a video sequence in conjunction that is tracked in order to obtain the motion data, and show video results with a (medium-quality) controllable 3D template model of the person. With generated from artist-designed skeleton motion. Our results outperform the that, our approach significantly reduces production cost compared to conven- state-of-the-art in learning-based human image synthesis. tional rendering approaches based on production-quality 3D models, and can CCS Concepts: • Computing methodologies → Computer graphics; also be used to realistically edit existing videos.
    [Show full text]
  • Complement the Broken Pose in Human Image Synthesis
    Focus and retain: Complement the Broken Pose in Human Image Synthesis Pu Ge†, Qiushi Huang†, Wei Xiang‡, Xue Jing, Yule Li, Yiyong Li, Zhun Sun Bigo Technology PTE. LTD, Singapore {gepu,huangqiushi,xiangwei1}@bigo.sg Abstract Given a target pose, how to generate an image of a spe- cific style with that target pose remains an ill-posed and thus complicated problem. Most recent works treat the human pose synthesis tasks as an image spatial transformation prob- lem using flow warping techniques. However, we observe that, due to the inherent ill-posed nature of many compli- cated human poses, former methods fail to generate body parts. To tackle this problem, we propose a feature-level flow attention module and an Enhancer Network. The flow attention module produces a flow attention mask to guide the combination of the flow-warped features and the structural pose features. Then, we apply the Enhancer Network to re- fine the coarse image by injecting the pose information. We present our experimental evaluation both qualitatively and quantitatively on DeepFashion, Market-1501, and Youtube dance datasets. Quantitative results show that our method has 12.995 FID at DeepFashion, 25.459 FID at Market-1501, 14.516 FID at Youtube dance datasets, which outperforms some state-of-the-arts including Guide-Pixe2Pixe, Global- Flow-Local-Attn, and CocosNet. 1. Introduction Figure 1: (a) The inputs of the task: a reference image with a target pose. (b) The outputs of the task: a generated human in Conditional image generation and synthesis becomes a the target pose. From left to right: the ground truth, results popular computer vision task recent years [29].
    [Show full text]
  • Unpaired Pose Guided Human Image Generation
    Research Collection Conference Paper Unpaired Pose Guided Human Image Generation Author(s): Chen, Xu; Song, Jie; Hilliges, Otmar Publication Date: 2019 Permanent Link: https://doi.org/10.3929/ethz-b-000396290 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library Unpaired Pose Guided Human Image Generation Xu Chen Jie Song Otmar Hilliges AIT Lab, ETH Zurich {xuchen,jsong,otmarh}@inf.ethz.ch Abstract This paper studies the task of full generative modelling of realistic images of humans, guided only by coarse sketch of the pose, while providing control over the specific instance or type of outfit worn by the user. This is a difficult prob- lem because input and output domain are very different and direct image-to-image translation becomes infeasible. We propose an end-to-end trainable network under the gener- ative adversarial framework, that provides detailed control over the final appearance while not requiring paired train- ing data and hence allows us to forgo the challenging prob- lem of fitting 3D poses to 2D images. The model allows to generate novel samples conditioned on either an image taken from the target domain or a class label indicating the style of clothing (e.g., t-shirt). We thoroughly evaluate the architecture and the contributions of the individual compo- nents experimentally. Finally, we show in a large scale per- ceptual study that our approach can generate realistic look- Figure 1: Generating humans in clothing: Our network ing images and that participants struggle in detecting fake takes a pose sketch as input and generates realistic images, images versus real samples, especially if faces are blurred.
    [Show full text]
  • Generative Adversarial Networks in Human Emotion Synthesis: a Review
    Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.DOI Generative Adversarial Networks in Human Emotion Synthesis: A Review NOUSHIN HAJAROLASVADI1, MIGUEL ARJONA RAMÍREZ2, (Senior Member, IEEE), WESLEY BECCARO2, and HASAN DEMIREL.1, (Senior Member, IEEE) 1Eastern Mediterranean University, Electrical and Electronic Engineering Department, Gazimagusa, 10 Via Mersin, Turkey 2University of São Paulo, Escola Politécnica, Department of Electronic Systems Engineering, São Paulo, Brazil Corresponding author: Miguel Arjona Ramírez (e-mail: [email protected]). ABSTRACT Deep generative models have become an emerging topic in various research areas like computer vision and signal processing. These models allow synthesizing realistic data samples that are of great value for both academic and industrial communities Affective computing, a topic of a broad interest in computer vision society, has been no exception and has benefited from this powerful approach. In fact, affective computing observed a rapid derivation of generative models during the last two decades. Applications of such models include but are not limited to emotion recognition and classification, unimodal emotion synthesis, and cross-modal emotion synthesis. As a result, we conducted a comprehensive survey of recent advances in human emotion synthesis by studying available databases, advantages, and disadvantages of the generative models along with the related training strategies considering two principal human communication modalities, namely audio and video. In this context, facial expression synthesis, speech emotion synthesis, and the audio-visual (cross-modal) emotion synthesis are reviewed extensively under different application scenarios. Gradually, we discuss open research problems to push the boundaries of this research area for future works.
    [Show full text]
  • Successive Image Generation from a Single Sentence Amogh Parab1, Ananya Malik1, Arish Damania1, Arnav Parekhji1, and Pranit Bari1
    ITM Web of Conferences 40, 03017 (2021) https://doi.org/10.1051/itmconf/20214003017 ICACC-2021 Successive Image Generation from a Single Sentence Amogh Parab1, Ananya Malik1, Arish Damania1, Arnav Parekhji1, and Pranit Bari1 1 Dwarkadas J. Sanghvi College of Engineering, Mumbai, India Abstract - Through various examples in history such as the early man’s carving on caves, dependence on diagrammatic representations, the immense popularity of comic books we have seen that vision has a higher reach in communication than written words. In this paper, we analyse and propose a new task of transfer of information from text to image synthesis. Through this paper we aim to generate a story from a single sentence and convert our generated story into a sequence of images. We plan to use state of the art technology to implement this task. With the advent of Generative Adversarial Networks text to image synthesis have found a new awakening. We plan to take this task a step further, in order to automate the entire process. Our system generates a multi-lined story given a single sentence using a deep neural network. This story is then fed into our networks of multiple stage GANs inorder to produce a photorealistic image sequence. Keyword - Deep Learning, Generative Adversarial Networks, Natural Language Processing, Computer Vision, LSTM, CNN, RNN, GRU, GPT-2. 1. INTRODUCTION between images. In order to maintain the intertextuality between the images, the paper Tell me and I will forget, Teach me and I will proposes the use of a Deep Context Encoder that remember, Show me and I will learn.
    [Show full text]
  • Human Synthesis and Scene Compositing
    The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI-20) Human Synthesis and Scene Compositing Mihai Zanfir,3,1 Elisabeta Oneata,3,1 Alin-Ionut Popa,3,1 Andrei Zanfir,1,3 Cristian Sminchisescu1,2 1Google Research 2Department of Mathematics, Faculty of Engineering, Lund University 3Institute of Mathematics of the Romanian Academy {mihai.zanfir, elisabeta.oneata, alin.popa, andrei.zanfir}@imar.ro, [email protected] Abstract contrast, other approaches avoid the 3d modeling pipeline altogether, aiming to achieve realism by directly manipulat- Generating good quality and geometrically plausible syn- ing images and by training using large-scale datasets. While thetic images of humans with the ability to control appear- ance, pose and shape parameters, has become increasingly this is cheap and attractive, offering the advantage of produc- important for a variety of tasks ranging from photo editing, ing outputs with close to real statistics, they are not nearly fashion virtual try-on, to special effects and image compres- as controllable as the 3d graphics ones, and results can be sion. In this paper, we propose a HUSC (HUman Synthesis geometrically inconsistent and often unpredictable. and Scene Compositing) framework for the realistic synthe- In this work we attempt to combine the relatively accessi- sis of humans with different appearance, in novel poses and ble methodology in both domains and propose a framework scenes. Central to our formulation is 3d reasoning for both that is able to realistically synthesize a photograph of a per- people and scenes, in order to produce realistic collages, by correctly modeling perspective effects and occlusion, by tak- son, in any given pose and shape, and blend it veridically ing into account scene semantics and by adequately handling with a new scene, while obeying 3d geometry and appear- relative scales.
    [Show full text]
  • Deep Fake Creation by Deep Learning
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072 Deep Fake Creation by Deep Learning Harshal Vyas -------------------------------------------------------------------------***---------------------------------------------------------------------- Abstract: Machine Learning techniques are escalating technology’s sophistication. Deep Learning is also known as Deep Structured Learning which is a part of the broader family of Machine Learning. Deep Learning architectures such as Deep Neural Networks, Deep Belief Networks, Convolutional Neural Networks(CNN) have been used for computer visions and for language processing. One of those deep learning-powered applications recently emerged is “deep fake”. Deep fake is a technique or technology where one can create fake images and videos which are difficult for humans to detect. This paper deals with how deep fakes are created and what kind of algorithms are used in it. This will help people to get to know about the deep fakes that are being generated on a daily basis, a way for them to know what is real and what isn’t. 1. Introduction: Deep fake (a portmanteau of "deep learning" and "fake") is a technique for human image synthesis based on artificial intelligence. Deep learning models such as Autoencoders and Generative Adversarial Networks have been applied widely in the computer vision domain to solve various problems. All these models have been used by deepfake algorithms to examine facial expressions and moments of an individual person and later synthesize facial images of another person making comparable expressions and moments. Generally, deepfake algorithms require a large amount of image and video data set to train models.
    [Show full text]
  • Deep Fake Detection Using Neural Networks
    Special Issue - 2021 International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 NTASU - 2020 Conference Proceedings Deep Fake Detection using Neural Networks Anuj Badale Chaitanya Darekar Information Technology Information Technology St.Francis Institute of Technology St.Francis Institute of Technology Mumbai, India Mumbai, India Lionel Castelino Joanne Gomes Information Technology Information Technology St.Francis Institute of Technology St.Francis Institute of Technology Mumbai, India Mumbai, India Abstract— Deepfake is a technique for human image synthesis with the body of John Calhoun. The engravings of his head on based on artificial intelligence. Deepfake is used to merge and other bodies appeared quite often after his assassination. superimpose existing images and videos onto source images or videos using machine learning techniques. They are realistic Authors David Guera Edward J. Delp put forth a paper based looking fake videos that cannot be distinguished by naked eyes. on Artificial Intelligence. The topic discussed in the paper is They can be used to spread hate speeches, create political distress, Convolution Neural Network(CNN), Recurrent Neural blackmail someone, etc. Currently, Cryptographic signing of Network(RNN). The author tried to evaluate method against a videos from its source is done to check the authenticity of videos. large set of DeepFake videos collected from multiple video Hashing of a video file into “fingerprints” (small string of text) is websites. Scenarios where these realistic fake videos are used done and reconfirmed with the sample video and thus verified to create political distress, black-mail someone or fake whether the video is the one originally recorded or not. However, terrorism events are easily envisioned.
    [Show full text]
  • Artificial Dummies for Urban Dataset Augmentation
    The Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI-21) Artificial Dummies for Urban Dataset Augmentation Anton´ın Vobecky´1, David Hurych2, Michal Uriˇ cˇa´r,ˇ Patrick Perez´ 2, Josef Sivic1 1Czech Institute of Informatics, Robotics and Cybernetics at the Czech Technical University in Prague 2valeo.ai [email protected], [email protected], [email protected], [email protected], [email protected] Abstract dress these requirements and enable a controlled augmenta- tion of datasets for pedestrian detection in urban settings for Existing datasets for training pedestrian detectors in images automotive applications. While we focus here only on train- suffer from limited appearance and pose variation. The most challenging scenarios are rarely included because they are too ing dataset augmentation as a first, crucial step, the approach difficult to capture due to safety reasons, or they are very un- also aims at generating data for the system validation. Vali- likely to happen. The strict safety requirements in assisted dation on such augmented data could complement track tests and autonomous driving applications call for an extra high with dummy dolls of unrealistic appearance, pose, and mo- detection accuracy also in these rare situations. Having the tion, which are the current industry standard (Fig. 1). By ability to generate people images in arbitrary poses, with ar- analogy, we named our system DummyNet after this iconic bitrary appearances and embedded in different background doll that replaces real humans. scenes with varying illumination and weather conditions, is The key challenge in automotive dataset augmentation is a crucial component for the development and testing of such to enable sufficient control over the generated distributions applications.
    [Show full text]
  • Parallel Multiscale Autoregressive Density Estimation
    Parallel Multiscale Autoregressive Density Estimation Scott Reed 1 Aaron¨ van den Oord 1 Nal Kalchbrenner 1 Sergio Gomez´ Colmenarejo 1 Ziyu Wang 1 Yutian Chen 1 Dan Belov 1 Nando de Freitas 1 Abstract “A yellow bird with a black head, orange eyes and an orange bill.” 4 8 16 32 256 PixelCNN achieves state-of-the-art results in density estimation for natural images. Although training is fast, inference is costly, requiring one 64 128 network evaluation per pixel; O(N) for N pix- els. This can be sped up by caching activations, but still involves generating each pixel sequen- tially. In this work, we propose a parallelized PixelCNN that allows more efficient inference by modeling certain pixel groups as condition- 64 128 256 ally independent. Our new PixelCNN model achieves competitive density estimation and or- ders of magnitude speedup - O(log N) sampling instead of O(N) - enabling the practical genera- tion of 512 512 images. We evaluate the model ⇥ on class-conditional image generation, text-to- Figure 1. Samples from our model at resolutions from 4 4 to ⇥ image synthesis, and action-conditional video 256 256, conditioned on text and bird part locations in the CUB ⇥ generation, showing that our model achieves the data set. See Fig. 4 and the supplement for more examples. best results among non-pixel-autoregressive den- sity models that allow efficient sampling. In the naive case, this requires a full network evaluation per pixel. Caching hidden unit activations can be used to reduce the amount of computation per pixel, as in the 1D 1.
    [Show full text]