论文梳理:Associating Inter-Image Salient Instances for Weakly Supervised Semantic Segmentation

这篇ECCV2018论文提出了一种新的弱监督语义分割方法,通过S4Net提取显著实例,并利用注意力模块和语义特征提取器进行类别概率预测和特征学习。通过构建相似性图并应用图划分算法,解决了实例级别的分割问题。这种方法首次在弱监督框架中使用显著实例,简化了对象识别,并在没有像素级标签的情况下实现了实例分割。

论文标题:Associating Inter-Image Salient Instances for Weakly Supervised Semantic Segmentation
论文来源:ECCV 2018

研究内容:使用图像标记进行弱监督语义分割

1. 弱监督语义分割存在问题及本文创新

大部分state-of-the-art方法通过利用底层的的线索检测器来从原始图像获取像素级的信息。比如,使用saliency detector[4, 20, 22, 42]或注意力模型[4, 42]。因为此类方法只能给出像素级的saliency/attention 信息,从生成的启发线索中难以区分语义对象的不同种类。因此,判别不同语义实例的能力成为必要。

一些诸如MSRNet[24]和S4Net[12]等saliency检测器不仅能给出灰度级的显著目标,也能提供实例级的mask。

所提方法包含:

  • 注意力模块:基于salient instance的固有特征,预测其属于特定类别的概率
  • 语义特征提取器:为每一个salient instance预测一个语义特征,共享相似语义信息的salient instance具有相近的语义特征
  • 基于语义特征,构件相似性图,每一节点表示一个salient instance,边上的权重记录一对salient instance的语义相似性
  • 使用图划分算法将图划分为子图,每一子图表示某一特定类别。

主要创新:

  • the first use of salient instances in a weakly supervised segmentation framework, significantly simplifying object discrimination, and performing instance-level seg- mentation under weak supervision.
  • a weakly supervised segmentation framework exploiting not only the information inside salient instances but also the relationships between all objects in the whole dataset.

2. Overv and Network Structure

  • Given training images labelled only with keywords, we use an instance-level saliency segmentation network, S4Net [12], to extract salient instances from every image. 尽管salient instance包含能用以训练segmentation mask的ground-truth mask,训练分割网络时存在两方面的限制,但可以通过解决一个tag-assignmnet问题得到解决(为每一实例关联一个存在的tag或noisy tag):
    1. 图像有可能包含多个关键词
    2. S4Net检测出来的salient instance可能不包含在训练集中的类别集合中

2.1 Attention Module

一些符号:

  • C:训练集中背景除外的类别数
  • I:输入图像
  • Attention Module预测C个attention maps
nl80211: Connect request send successfully 行 64558: 09-27 10:51:47.823 3399 3400 W C05200/wpa_supplicant: nl80211: Connect request send successfully 行 64560: 09-27 10:51:47.823 3399 3400 D C05200/wpa_supplicant: wlan0: Setting authentication timeout: 10 sec 0 usec 行 64561: 09-27 10:51:47.823 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - EAP success=0 行 64562: 09-27 10:51:47.823 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - EAP fail=0 行 64563: 09-27 10:51:47.823 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - portControl=Auto 行 67765: 09-27 10:51:47.973 3399 3400 D C05200/wpa_supplicant: RTM_NEWLINK: ifi_index=32 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) 行 67776: 09-27 10:51:47.974 3399 3400 D C05200/wpa_supplicant: nl80211: Event message available 行 67780: 09-27 10:51:47.975 3399 3400 I C05200/wpa_supplicant: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0 行 67781: 09-27 10:51:47.975 3399 3400 D C05200/wpa_supplicant: nl80211: Connect event (status=0 ignore_next_local_disconnect=0) 行 67789: 09-27 10:51:47.977 3399 3400 D C05200/wpa_supplicant: nl80211: Associated on 2412 MHz 行 67790: 09-27 10:51:47.977 3399 3400 D C05200/wpa_supplicant: nl80211: Associated with 02:6c:26:35:2e:d9 行 67791: 09-27 10:51:47.977 3399 3400 D C05200/wpa_supplicant: nl80211: Operating frequency for the associated BSS from scan results: 2412 MHz 行 67893: 09-27 10:51:47.978 3399 3400 D C05200/wpa_supplicant: nl80211: Associated on 2412 MHz 行 67897: 09-27 10:51:47.979 3399 3400 D C05200/wpa_supplicant: nl80211: Associated with 02:6c:26:35:2e:d9 行 67904: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: nl80211: Set drv->ssid based on scan res info to 'yangshilun' 行 67904: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: nl80211: Set drv->ssid based on scan res info to 'yangshilun' 行 67909: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=0 send_len=24 行 67912: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 67921: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: wlan0: Association info event 行 67923: 09-27 10:51:47.980 3399 3400 D C05200/wpa_supplicant: req_ies - hexdump(len=178): 00 0a 79 61 6e 67 73 68 69 6c 75 6e 01 08 82 84 8b 96 0c 12 18 24 21 02 0a 14 32 04 30 48 60 行 67926: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: resp_ies - hexdump(len=166): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 2d 1a ad 09 17 ff ff 00 00 00 00 00 00 00 00 行 67928: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: unknown vendor specific information element ignored (vendor OUI 8c:fd:f0 len=11) 行 67929: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: unknown vendor specific information element ignored (vendor OUI 8c:fd:f0 len=11) 行 67931: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: wlan0: freq=2412 MHz 行 67932: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: unknown vendor specific information element ignored (vendor OUI 40:45:da len=6) 行 67935: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: unknown vendor specific information element ignored (vendor OUI 8c:fd:f0 len=11) 行 67937: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: VHT operation CBW: 11 行 67938: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: overall operation CBW: 1 行 67939: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00 行 67940: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: wlan0: RSN: clearing own RSNXE 行 67941: 09-27 10:51:47.981 3399 3400 I C05200/wpa_supplicant: wlan0: State: ASSOCIATING -> ASSOCIATED 行 67942: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=0 send_len=32 行 67943: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 67944: 09-27 10:51:47.981 3399 3400 D C05200/wpa_supplicant: nl80211: Set wlan0 operstate 0->0 (DORMANT) 行 67946: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: netlink: Operstate: ifindex=32 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) 行 67947: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=0 send_len=76 行 67948: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 67949: 09-27 10:51:47.982 872 3401 D C01560/WifiWpaHal: wpa recv buf: IFNAME=wlan0 <3>CTRL-EVENT-STATE-CHANGE id=0 state=6 BSSID=00:00:00:00:00:00 SSID=yangshilun! 行 67950: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: prepare call onEventStateChanged 行 67952: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: wlan0: Shared frequencies (len=1): completed iteration 行 67953: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: wlan0: freq[0]: 2412, flags=0x1 行 67954: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 81 行 67956: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 行 67957: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 115 行 67958: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=4): 24 28 2c 30 行 67959: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 116 行 67960: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=2): 24 2c 行 67962: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=2): 28 30 行 67963: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 124 行 67966: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5 行 67967: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 126 行 67968: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=2): 95 9d 行 67969: 09-27 10:51:47.982 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 127 行 67970: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=2): 99 a1 行 67972: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 128 行 67974: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1 行 67976: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Add operating class 130 行 67977: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1 行 67978: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: Update channel list 行 67979: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,1 行 67981: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: P2P: cli_channels: 行 67982: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: Associated to a new BSS: BSSID=02:6c:26:35:2e:d9 行 67989: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 67990: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: WPA: Update cipher suite selection based on IEs in driver-generated WPA/RSNE in AssocReq - hexdump(len=49): 30 14 01 00 0 行 67992: 09-27 10:51:47.983 3399 3400 I C05200/wpa_supplicant: wlan0: WPA: AP key_mgmt 0x2 network key_mgmt 0x2; available key_mgmt 0x2 行 67994: 09-27 10:51:47.983 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=768 send_len=65 行 67998: 09-27 10:51:47.984 3399 3400 I C05200/wpa_supplicant: wlan0: WPA: using KEY_MGMT WPA2-PSK and proto 2 行 67999: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=1536 send_len=40 行 68000: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 68001: 09-27 10:51:47.984 3399 3400 I C05200/wpa_supplicant: wlan0: WPA: AP pairwise cipher 0x10 network pairwise cipher 0x18; available pairwise cipher 0x10 行 68003: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=2304 send_len=89 行 68004: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 68006: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: using PTK CCMP 行 68010: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: using GTK CCMP 行 68011: 09-27 10:51:47.984 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: AP mgmt_group_cipher 0x20 network mgmt_group_cipher 0x0; available mgmt_group_cipher 0x20 行 68022: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: clearing AP RSNXE 行 68023: 09-27 10:51:47.985 3399 3400 I C05200/wpa_supplicant: wlan0: Associated with 02:6c:26:35:2e:d9 行 68025: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=9 sndbuf=229376 outq=3072 send_len=33 行 68027: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/service/el1/public/wifi/wpa_ctrl_872-108\x00 行 68029: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: Association event - clear replay counter 行 68031: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: wlan0: WPA: Clear old PTK 行 68034: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - portValid=0 行 68035: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - EAP success=0 行 68036: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: External notification - portEnabled=1 行 68037: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: SUPP_PAE entering state CONNECTING 行 68038: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: enable timer tick 行 68039: 09-27 10:51:47.985 3399 3400 D C05200/wpa_supplicant: EAPOL: SUPP_BE entering state IDLE 行 68049: 09-27 10:51:47.986 3399 3400 I C05200/wpa_supplicant: wlan0: Cancelling scan request 上面是正常连接wpa2的日志,和错误日志对比有什么差异,问题点出现在那
最新发布
09-28
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值