• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ji Rongrong, Lin Shaohui, Chao Fei, Wu Yongjian, Huang Feiyue. Deep Neural Network Compression and Acceleration: A Review[J]. Journal of Computer Research and Development, 2018, 55(9): 1871-1888. DOI: 10.7544/issn1000-1239.2018.20180129
Citation: Ji Rongrong, Lin Shaohui, Chao Fei, Wu Yongjian, Huang Feiyue. Deep Neural Network Compression and Acceleration: A Review[J]. Journal of Computer Research and Development, 2018, 55(9): 1871-1888. DOI: 10.7544/issn1000-1239.2018.20180129

Deep Neural Network Compression and Acceleration: A Review

More Information
  • Published Date: August 31, 2018
  • In recent years, deep neural networks (DNNs) have achieved remarkable success in many artificial intelligence (AI) applications, including computer vision, speech recognition and natural language processing. However, such DNNs have been accompanied by significant increase in computational costs and storage services, which prohibits the usages of DNNs on resource-limited environments such as mobile or embedded devices. To this end, the studies of DNN compression and acceleration have recently become more emerging. In this paper, we provide a review on the existing representative DNN compression and acceleration methods, including parameter pruning, parameter sharing, low-rank decomposition, compact filter designed, and knowledge distillation. Specifically, this paper provides an overview of DNNs, describes the details of different DNN compression and acceleration methods, and highlights the properties, advantages and drawbacks. Furthermore, we summarize the evaluation criteria and datasets widely used in DNN compression and acceleration, and also discuss the performance of the representative methods. In the end, we discuss how to choose different compression and acceleration methods to meet the needs of different tasks, and envision future directions on this topic.
  • Related Articles

    [1]Qi Lei, Ren Zihao, Liu Junxi, Geng Xin. Person Re-identification Method Based on Hybrid Real-Synthetic Data[J]. Journal of Computer Research and Development, 2025, 62(2): 418-431. DOI: 10.7544/issn1000-1239.202330718
    [2]Huang Yiwang, Huang Yuxin, Liu Sheng. A Lightweight Noise Label Learning Method Based on Online Distillation[J]. Journal of Computer Research and Development, 2024, 61(12): 3121-3133. DOI: 10.7544/issn1000-1239.202330382
    [3]Liu Weixin, Guan Yewei, Huo Jiarong, Ding Yuanchao, Guo Hua, Li Bo. A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2024, 61(5): 1218-1229. DOI: 10.7544/issn1000-1239.202330966
    [4]Yu Ying, Wei Wei, Tang Hong, Qian Jin. Multi-Stage Training with Multi-Level Knowledge Self-Distillation for Fine-Grained Image Recognition[J]. Journal of Computer Research and Development, 2023, 60(8): 1834-1845. DOI: 10.7544/issn1000-1239.202330262
    [5]Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024
    [6]Wei Xiushen, Xu Shulin, An Peng, Yang Jian. Multi-Instance Learning with Incremental Classes[J]. Journal of Computer Research and Development, 2022, 59(8): 1723-1731. DOI: 10.7544/issn1000-1239.20220071
    [7]Li Xiaocan, Xie Kun, Zhang Dafang, Xie Gaogang. Survey of Network Anomaly Detection Based on Low-Rank Decomposition[J]. Journal of Computer Research and Development, 2022, 59(7): 1589-1609. DOI: 10.7544/issn1000-1239.20210503
    [8]Wang Peiyan, Duan Lei, Guo Zhengshan, Jiang Weipeng, Zhang Yidan. Knowledge Hypergraph Link Prediction Model Based on Tensor Decomposition[J]. Journal of Computer Research and Development, 2021, 58(8): 1599-1611. DOI: 10.7544/issn1000-1239.2021.20210315
    [9]Zhang Pan, Lian Qiusheng. Low-Rank Relaxed Collaborative Representation Combined with Global and Local Features for Face Recognition[J]. Journal of Computer Research and Development, 2014, 51(12): 2663-2670. DOI: 10.7544/issn1000-1239.2014.20131200
    [10]Wu Xiangjun, Bian Rui, Ling Yingbiao, Jiang Yunfei. Research on Decomposition Strategy for Knowledge Tree of Characteristic Predicate[J]. Journal of Computer Research and Development, 2011, 48(2): 186-194.
  • Cited by

    Periodical cited type(4)

    1. 林炼升,郑焕钦,苏申,雷凯,陈晓丰,田志宏. 一种DeFi价格操纵攻击在线防御机制. 计算机研究与发展. 2025(02): 443-457 . 本站查看
    2. 郭春霞. 基于权限验证图的Web访问控制漏洞检测方法. 自动化与仪器仪表. 2024(06): 252-256+260 .
    3. 安洋,李坤,李军怀,王怀军,臧东玲. 基于智能合约和企业信用的访问控制模型. 计算机系统应用. 2022(03): 197-202 .
    4. 孙彬文,陈竟飞,柳絮. 基于UML的智能合约生命周期动态模型. 工业技术创新. 2021(04): 79-88+108 .

    Other cited types(7)

Catalog

    Article views (3610) PDF downloads (2058) Cited by(11)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return