Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Machine Learning»Why Generalization in Flow Matching Models Comes from Approximation, Not Stochasticity

    Why Generalization in Flow Matching Models Comes from Approximation, Not Stochasticity

    June 21, 2025

    Introduction: Understanding Generalization in Deep Generative Models

    Deep generative models, including diffusion and flow matching, have shown outstanding performance in synthesizing realistic multi-modal content across images, audio, video, and text. However, the generalization capabilities and underlying mechanisms of these models are challenging in deep generative modeling. The core challenge includes understanding whether generative models truly generalize or simply memorize training data. Current research reveals conflicting evidence: some studies show that large diffusion models memorize individual samples from training sets, while others show clear signs of generalization when trained on large datasets. This contradiction points to a sharp phase transition between memorization and generalization.

    Existing Literature on Flow Matching and Generalization Mechanisms

    Existing research includes the utilization of closed-form solutions, studying memorization versus generalization, and characterizing different phases of generating dynamics. Methods like closed-form velocity field regression and a smoothed version of optimal velocity generation have been proposed. Studies on memorization relate the transition to generalization with training dataset size through geometric interpretations, while others focus on stochasticity in target objectives. Temporal regime analysis identifies distinct phases in generative dynamics, which show reliance on dimension and sample numbers. But validation methods depend on backward process stochasticity, which doesn’t apply to flow matching models, leaving significant gaps in understanding.

    New Findings: Early Trajectory Failures Drive Generalization

    Researchers from Université Jean Monnet Saint-Etienne and Université Claude Bernard Lyon provide an answer to whether training on noisy or stochastic targets improves flow matching generalization and identify the main sources of generalization. The method reveals that generalization emerges when limited-capacity neural networks fail to approximate the exact velocity field during critical time intervals at early and late phases. The researchers identify that generalization arises mainly early along flow matching trajectories, corresponding to the transition from stochastic to deterministic behaviour. Moreover, they propose a learning algorithm that explicitly regresses against the exact velocity field, showing enhanced generalization capabilities on standard image datasets.

    Investigating the Sources of Generalization in Flow Matching

    Researchers investigate the key sources of generalization. First, they challenge target stochasticity assumptions by using closed-form optimal velocity field formulations, showing that after small time values, the weighted average of conditional flow matching targets equals single expectation values. Second, they analyze the approximate quality between learned velocity fields and optimal velocity fields through systematic experiments on subsampled CIFAR-10 datasets ranging from 10 to 10,000 samples. Third, they construct hybrid models using piecewise trajectories governed by optimal velocity fields for early time intervals and learned velocity fields for later intervals, with adjustable threshold parameters to determine critical periods.

    Empirical Flow Matching: A Learning Algorithm for Deterministic Targets

    Researchers implement a learning algorithm that regresses against more deterministic targets using closed-form formulas. It compares vanilla conditional flow matching, optimal transport flow matching, and empirical flow matching across CIFAR-10 and CelebA datasets using multiple samples to estimate empirical means. Moreover, evaluation metrics include Fréchet Inception Distance with Inception-V3 and DINOv2 embeddings for a less biased assessment. The computational architecture operates with complexity O(M × |B| × d). Training configurations demonstrate that increasing sample numbers M for empirical mean computation creates less stochastic targets, leading to more stable performance improvements with modest computational overhead when M equals the batch size.

    Conclusion: Velocity Field Approximation as the Core of Generalization

    In this paper, researchers challenge the assumption that stochasticity in loss functions drives generalization in flow matching models, clarifying the critical role of exact velocity field approximation instead. While research provides empirical insights into practical learned models, precise characterization of learned velocity fields outside optimal trajectories remains an open challenge, suggesting future work to use architectural inductive biases. The broader implications include concerns about potential misuse of improved generative models for creating deepfakes, privacy violations, and synthetic content generation. So, it is necessary to give careful consideration to ethical applications.

    Why This Research Matters?

    This research is significant because it challenges a prevailing assumption in generative modeling—that stochasticity in training objectives is a key driver of generalization in flow matching models. By demonstrating that generalization instead arises from the failure of neural networks to precisely approximate the closed-form velocity field, especially during early trajectory phases, the study reframes our understanding of what enables models to produce novel data. This insight has direct implications for designing more efficient and interpretable generative systems, reducing computational overhead while maintaining or even enhancing generalization. It also informs better training protocols that avoid unnecessary stochasticity, improving reliability and reproducibility in real-world applications.


    Check out the Paper. All credit for this research goes to the researchers of this project. Also, feel free to follow us on Twitter and don’t forget to join our 100k+ ML SubReddit and Subscribe to our Newsletter.

    The post Why Generalization in Flow Matching Models Comes from Approximation, Not Stochasticity appeared first on MarkTechPost.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuilding Event-Driven AI Agents with UAgents and Google Gemini: A Modular Python Implementation Guide
    Next Article Busca Maquinaria

    Related Posts

    Machine Learning

    How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark

    July 22, 2025
    Machine Learning

    Boolformer: Symbolic Regression of Logic Functions with Transformers

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2021-47664 – Cisco Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)
    Multi-LLM routing strategies for generative AI applications on AWS

    Multi-LLM routing strategies for generative AI applications on AWS

    Machine Learning

    Crafting SEO Content That Readers Love

    Web Development

    Choosing the Right AI Partner for Natural Language Processing(NLP) Projects💬

    Web Development

    Highlights

    CVE-2025-27889 – Wing FTP Server URL Parameter Injection

    July 10, 2025

    CVE ID : CVE-2025-27889

    Published : July 10, 2025, 5:15 p.m. | 2 hours, 3 minutes ago

    Description : Wing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker.

    Severity: 3.4 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Windows 11 is getting a secret weapon for boot failures – how it works

    April 1, 2025

    Want to Customise GNOME Shell Notifications? Try This Extension

    July 11, 2025

    Learn Interactive Data Visualization with Svelte and D3

    July 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.