Research issues on generative adversarial networks and applications

Toshpulatov Mukhiddin, Wookey Lee, Suan Lee, Tojiboev Rashid

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Generative Adversarial Networks introduces a challenging problem in the field of image generation and computer vision. Generating especially 3D face images is becoming very significant and difficult. This is openings in many interesting applications including Virtual Reality, Augmented Reality, Computer games, teleconferencing, Virtual try-on, Special effect, and so on. This paper contains three sections. The first section describes the Generative Adversarial Networks. The second section describes applications and methods and finally, the last section describes the future research directions of Generative Adversarial Networks.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020
EditorsWookey Lee, Luonan Chen, Yang-Sae Moon, Julien Bourgeois, Mehdi Bennis, Yu-Feng Li, Young-Guk Ha, Hyuk-Yoon Kwon, Alfredo Cuzzocrea
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages487-488
Number of pages2
ISBN (Electronic)9781728160344
DOIs
StatePublished - Feb 2020
Event2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020 - Busan, Korea, Republic of
Duration: 19 Feb 202022 Feb 2020

Publication series

NameProceedings - 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020

Conference

Conference2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020
Country/TerritoryKorea, Republic of
CityBusan
Period19/02/2022/02/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • 3D-face-generation
  • Deep-learning
  • Deep-neural-network
  • Generative-Adversarial-Networks
  • Generator

Fingerprint

Dive into the research topics of 'Research issues on generative adversarial networks and applications'. Together they form a unique fingerprint.

Cite this