id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2307.03254 | Clayton Fields | Clayton Fields, Casey Kennington | Vision Language Transformers: A Survey | null | null | null | null | cs.CV cs.AI cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Vision language tasks, such as answering questions about or generating
captions that describe an image, are difficult tasks for computers to perform.
A relatively recent body of research has adapted the pretrained transformer
architecture introduced in \citet{vaswani2017attention} to vision language
modeling. Transformer models have greatly improved performance and versatility
over previous vision language models. They do so by pretraining models on a
large generic datasets and transferring their learning to new tasks with minor
changes in architecture and parameter values. This type of transfer learning
has become the standard modeling practice in both natural language processing
and computer vision. Vision language transformers offer the promise of
producing similar advancements in tasks which require both vision and language.
In this paper, we provide a broad synthesis of the currently available research
on vision language transformer models and offer some analysis of their
strengths, limitations and some open questions that remain.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 19:08:56 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Fields",
"Clayton",
""
],
[
"Kennington",
"Casey",
""
]
] | TITLE: Vision Language Transformers: A Survey
ABSTRACT: Vision language tasks, such as answering questions about or generating
captions that describe an image, are difficult tasks for computers to perform.
A relatively recent body of research has adapted the pretrained transformer
architecture introduced in \citet{vaswani2017attention} to vision language
modeling. Transformer models have greatly improved performance and versatility
over previous vision language models. They do so by pretraining models on a
large generic datasets and transferring their learning to new tasks with minor
changes in architecture and parameter values. This type of transfer learning
has become the standard modeling practice in both natural language processing
and computer vision. Vision language transformers offer the promise of
producing similar advancements in tasks which require both vision and language.
In this paper, we provide a broad synthesis of the currently available research
on vision language transformer models and offer some analysis of their
strengths, limitations and some open questions that remain.
| no_new_dataset | 0.708994 |
2307.03274 | Enfa George | Enfa George, Mihai Surdeanu | It is not Sexually Suggestive, It is Educative. Separating Sex Education
from Suggestive Content on TikTok Videos | Accepted to ACL Findings 2023. 10 pages, 3 figures, 5 tables . Please
refer to https://github.com/enfageorge/SexTok for dataset and related details | null | null | null | cs.CV cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | We introduce SexTok, a multi-modal dataset composed of TikTok videos labeled
as sexually suggestive (from the annotator's point of view), sex-educational
content, or neither. Such a dataset is necessary to address the challenge of
distinguishing between sexually suggestive content and virtual sex education
videos on TikTok. Children's exposure to sexually suggestive videos has been
shown to have adversarial effects on their development. Meanwhile, virtual sex
education, especially on subjects that are more relevant to the LGBTQIA+
community, is very valuable. The platform's current system removes or penalizes
some of both types of videos, even though they serve different purposes. Our
dataset contains video URLs, and it is also audio transcribed. To validate its
importance, we explore two transformer-based models for classifying the videos.
Our preliminary results suggest that the task of distinguishing between these
types of videos is learnable but challenging. These experiments suggest that
this dataset is meaningful and invites further study on the subject.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 20:23:17 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"George",
"Enfa",
""
],
[
"Surdeanu",
"Mihai",
""
]
] | TITLE: It is not Sexually Suggestive, It is Educative. Separating Sex Education
from Suggestive Content on TikTok Videos
ABSTRACT: We introduce SexTok, a multi-modal dataset composed of TikTok videos labeled
as sexually suggestive (from the annotator's point of view), sex-educational
content, or neither. Such a dataset is necessary to address the challenge of
distinguishing between sexually suggestive content and virtual sex education
videos on TikTok. Children's exposure to sexually suggestive videos has been
shown to have adversarial effects on their development. Meanwhile, virtual sex
education, especially on subjects that are more relevant to the LGBTQIA+
community, is very valuable. The platform's current system removes or penalizes
some of both types of videos, even though they serve different purposes. Our
dataset contains video URLs, and it is also audio transcribed. To validate its
importance, we explore two transformer-based models for classifying the videos.
Our preliminary results suggest that the task of distinguishing between these
types of videos is learnable but challenging. These experiments suggest that
this dataset is meaningful and invites further study on the subject.
| new_dataset | 0.716188 |
2307.03276 | S. Isaac Geronimo Anderson | S. Isaac Geronimo Anderson and Keita Teranishi and Daniel M. Dunlavy
and Jee Choi | Analyzing the Performance Portability of Tensor Decomposition | 28 pages, 19 figures | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We employ pressure point analysis and roofline modeling to identify
performance bottlenecks and determine an upper bound on the performance of the
Canonical Polyadic Alternating Poisson Regression Multiplicative Update (CP-APR
MU) algorithm in the SparTen software library. Our analyses reveal that a
particular matrix computation, $\Phi^{(n)}$, is the critical performance
bottleneck in the SparTen CP-APR MU implementation. Moreover, we find that
atomic operations are not a critical bottleneck while higher cache reuse can
provide a non-trivial performance improvement. We also utilize grid search on
the Kokkos library parallel policy parameters to achieve 2.25x average speedup
over the SparTen default for $\Phi^{(n)}$ computation on CPU and 1.70x on GPU.
We conclude our investigations by comparing Kokkos implementations of the
STREAM benchmark and the matricized tensor times Khatri-Rao product (MTTKRP)
benchmark from the Parallel Sparse Tensor Algorithm (PASTA) benchmark suite to
implementations using vendor libraries. We show that with a single
implementation Kokkos achieves performance comparable to hand-tuned code for
fundamental operations that make up tensor decomposition kernels on a wide
range of CPU and GPU systems. Overall, we conclude that Kokkos demonstrates
good performance portability for simple data-intensive operations but requires
tuning for algorithms with more complex dependencies and data access patterns.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 20:25:19 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Anderson",
"S. Isaac Geronimo",
""
],
[
"Teranishi",
"Keita",
""
],
[
"Dunlavy",
"Daniel M.",
""
],
[
"Choi",
"Jee",
""
]
] | TITLE: Analyzing the Performance Portability of Tensor Decomposition
ABSTRACT: We employ pressure point analysis and roofline modeling to identify
performance bottlenecks and determine an upper bound on the performance of the
Canonical Polyadic Alternating Poisson Regression Multiplicative Update (CP-APR
MU) algorithm in the SparTen software library. Our analyses reveal that a
particular matrix computation, $\Phi^{(n)}$, is the critical performance
bottleneck in the SparTen CP-APR MU implementation. Moreover, we find that
atomic operations are not a critical bottleneck while higher cache reuse can
provide a non-trivial performance improvement. We also utilize grid search on
the Kokkos library parallel policy parameters to achieve 2.25x average speedup
over the SparTen default for $\Phi^{(n)}$ computation on CPU and 1.70x on GPU.
We conclude our investigations by comparing Kokkos implementations of the
STREAM benchmark and the matricized tensor times Khatri-Rao product (MTTKRP)
benchmark from the Parallel Sparse Tensor Algorithm (PASTA) benchmark suite to
implementations using vendor libraries. We show that with a single
implementation Kokkos achieves performance comparable to hand-tuned code for
fundamental operations that make up tensor decomposition kernels on a wide
range of CPU and GPU systems. Overall, we conclude that Kokkos demonstrates
good performance portability for simple data-intensive operations but requires
tuning for algorithms with more complex dependencies and data access patterns.
| no_new_dataset | 0.707354 |
2307.03286 | Souma Chowdhury | Manaswin Oddiraju, Divyang Amin, Michael Piedmonte, Souma Chowdhury | Physics-Infused Machine Learning Based Prediction of VTOL Aerodynamics
with Sparse Datasets | This paper was presented at the AIAA Aviation 2023 Forum | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex optimal design and control processes often require repeated
evaluations of expensive objective functions and consist of large design
spaces. Data-driven surrogates such as neural networks and Gaussian processes
provide an attractive alternative to simulations and are utilized frequently to
represent these objective functions in optimization. However, pure data-driven
models, due to a lack of adherence to basic physics laws and constraints, are
often poor at generalizing and extrapolating. This is particularly the case,
when training occurs over sparse high-fidelity datasets. A class of
Physics-infused machine learning (PIML) models integrate ML models with
low-fidelity partial physics models to improve generalization performance while
retaining computational efficiency. This paper presents two potential
approaches for Physics infused modelling of aircraft aerodynamics which
incorporate Artificial Neural Networks with a low-fidelity Vortex Lattice
Method model with blown wing effects (BLOFI) to improve prediction performance
while also keeping the computational cost tractable. This paper also develops
an end-to-end auto differentiable open-source framework that enables efficient
training of such hybrid models. These two PIML modelling approaches are then
used to predict the aerodynamic coefficients of a 6 rotor eVTOL aircraft given
its control parameters and flight conditions. The models are trained on a
sparse high-fidelity dataset generated using a CHARM model. The trained models
are then compared against the vanilla low-fidelity model and a standard pure
data-driven ANN. Our results show that one of the proposed architectures
outperforms all the other models at a nominal increase in run time. These
results are promising and pave way for PIML frameworks which can generalize
over different aircraft and configurations thereby significantly reducing costs
of design and control.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 20:48:17 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Oddiraju",
"Manaswin",
""
],
[
"Amin",
"Divyang",
""
],
[
"Piedmonte",
"Michael",
""
],
[
"Chowdhury",
"Souma",
""
]
] | TITLE: Physics-Infused Machine Learning Based Prediction of VTOL Aerodynamics
with Sparse Datasets
ABSTRACT: Complex optimal design and control processes often require repeated
evaluations of expensive objective functions and consist of large design
spaces. Data-driven surrogates such as neural networks and Gaussian processes
provide an attractive alternative to simulations and are utilized frequently to
represent these objective functions in optimization. However, pure data-driven
models, due to a lack of adherence to basic physics laws and constraints, are
often poor at generalizing and extrapolating. This is particularly the case,
when training occurs over sparse high-fidelity datasets. A class of
Physics-infused machine learning (PIML) models integrate ML models with
low-fidelity partial physics models to improve generalization performance while
retaining computational efficiency. This paper presents two potential
approaches for Physics infused modelling of aircraft aerodynamics which
incorporate Artificial Neural Networks with a low-fidelity Vortex Lattice
Method model with blown wing effects (BLOFI) to improve prediction performance
while also keeping the computational cost tractable. This paper also develops
an end-to-end auto differentiable open-source framework that enables efficient
training of such hybrid models. These two PIML modelling approaches are then
used to predict the aerodynamic coefficients of a 6 rotor eVTOL aircraft given
its control parameters and flight conditions. The models are trained on a
sparse high-fidelity dataset generated using a CHARM model. The trained models
are then compared against the vanilla low-fidelity model and a standard pure
data-driven ANN. Our results show that one of the proposed architectures
outperforms all the other models at a nominal increase in run time. These
results are promising and pave way for PIML frameworks which can generalize
over different aircraft and configurations thereby significantly reducing costs
of design and control.
| no_new_dataset | 0.710377 |
2307.03313 | Vivek Gupta | Siddharth Khincha, Chelsi Jain, Vivek Gupta, Tushar Kataria, Shuo
Zhang | InfoSync: Information Synchronization across Multilingual
Semi-structured Tables | 22 pages, 7 figures, 20 tables, ACL 2023 (Toronto, Canada) | null | null | null | cs.CL cs.CY cs.IR | http://creativecommons.org/licenses/by/4.0/ | Information Synchronization of semi-structured data across languages is
challenging. For instance, Wikipedia tables in one language should be
synchronized across languages. To address this problem, we introduce a new
dataset InfoSyncC and a two-step method for tabular synchronization. InfoSync
contains 100K entity-centric tables (Wikipedia Infoboxes) across 14 languages,
of which a subset (3.5K pairs) are manually annotated. The proposed method
includes 1) Information Alignment to map rows and 2) Information Update for
updating missing/outdated information for aligned tables across multilingual
tables. When evaluated on InfoSync, information alignment achieves an F1 score
of 87.91 (en <-> non-en). To evaluate information updation, we perform
human-assisted Wikipedia edits on Infoboxes for 603 table pairs. Our approach
obtains an acceptance rate of 77.28% on Wikipedia, showing the effectiveness of
the proposed method.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 21:55:15 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Khincha",
"Siddharth",
""
],
[
"Jain",
"Chelsi",
""
],
[
"Gupta",
"Vivek",
""
],
[
"Kataria",
"Tushar",
""
],
[
"Zhang",
"Shuo",
""
]
] | TITLE: InfoSync: Information Synchronization across Multilingual
Semi-structured Tables
ABSTRACT: Information Synchronization of semi-structured data across languages is
challenging. For instance, Wikipedia tables in one language should be
synchronized across languages. To address this problem, we introduce a new
dataset InfoSyncC and a two-step method for tabular synchronization. InfoSync
contains 100K entity-centric tables (Wikipedia Infoboxes) across 14 languages,
of which a subset (3.5K pairs) are manually annotated. The proposed method
includes 1) Information Alignment to map rows and 2) Information Update for
updating missing/outdated information for aligned tables across multilingual
tables. When evaluated on InfoSync, information alignment achieves an F1 score
of 87.91 (en <-> non-en). To evaluate information updation, we perform
human-assisted Wikipedia edits on Infoboxes for 603 table pairs. Our approach
obtains an acceptance rate of 77.28% on Wikipedia, showing the effectiveness of
the proposed method.
| new_dataset | 0.712795 |
2307.03315 | Hanyang Liu | Bing Xue, Ahmed Sameh Said, Ziqi Xu, Hanyang Liu, Neel Shah, Hanqing
Yang, Philip Payne, Chenyang Lu | Assisting Clinical Decisions for Scarcely Available Treatment via
Disentangled Latent Representation | null | null | 10.1145/3580305.3599774 | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Extracorporeal membrane oxygenation (ECMO) is an essential life-supporting
modality for COVID-19 patients who are refractory to conventional therapies.
However, the proper treatment decision has been the subject of significant
debate and it remains controversial about who benefits from this scarcely
available and technically complex treatment option. To support clinical
decisions, it is a critical need to predict the treatment need and the
potential treatment and no-treatment responses. Targeting this clinical
challenge, we propose Treatment Variational AutoEncoder (TVAE), a novel
approach for individualized treatment analysis. TVAE is specifically designed
to address the modeling challenges like ECMO with strong treatment selection
bias and scarce treatment cases. TVAE conceptualizes the treatment decision as
a multi-scale problem. We model a patient's potential treatment assignment and
the factual and counterfactual outcomes as part of their intrinsic
characteristics that can be represented by a deep latent variable model. The
factual and counterfactual prediction errors are alleviated via a
reconstruction regularization scheme together with semi-supervision, and the
selection bias and the scarcity of treatment cases are mitigated by the
disentangled and distribution-matched latent space and the label-balancing
generative strategy. We evaluate TVAE on two real-world COVID-19 datasets: an
international dataset collected from 1651 hospitals across 63 countries, and a
institutional dataset collected from 15 hospitals. The results show that TVAE
outperforms state-of-the-art treatment effect models in predicting both the
propensity scores and factual outcomes on heterogeneous COVID-19 datasets.
Additional experiments also show TVAE outperforms the best existing models in
individual treatment effect estimation on the synthesized IHDP benchmark
dataset.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 22:02:33 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Xue",
"Bing",
""
],
[
"Said",
"Ahmed Sameh",
""
],
[
"Xu",
"Ziqi",
""
],
[
"Liu",
"Hanyang",
""
],
[
"Shah",
"Neel",
""
],
[
"Yang",
"Hanqing",
""
],
[
"Payne",
"Philip",
""
],
[
"Lu",
"Chenyang",
""
]
] | TITLE: Assisting Clinical Decisions for Scarcely Available Treatment via
Disentangled Latent Representation
ABSTRACT: Extracorporeal membrane oxygenation (ECMO) is an essential life-supporting
modality for COVID-19 patients who are refractory to conventional therapies.
However, the proper treatment decision has been the subject of significant
debate and it remains controversial about who benefits from this scarcely
available and technically complex treatment option. To support clinical
decisions, it is a critical need to predict the treatment need and the
potential treatment and no-treatment responses. Targeting this clinical
challenge, we propose Treatment Variational AutoEncoder (TVAE), a novel
approach for individualized treatment analysis. TVAE is specifically designed
to address the modeling challenges like ECMO with strong treatment selection
bias and scarce treatment cases. TVAE conceptualizes the treatment decision as
a multi-scale problem. We model a patient's potential treatment assignment and
the factual and counterfactual outcomes as part of their intrinsic
characteristics that can be represented by a deep latent variable model. The
factual and counterfactual prediction errors are alleviated via a
reconstruction regularization scheme together with semi-supervision, and the
selection bias and the scarcity of treatment cases are mitigated by the
disentangled and distribution-matched latent space and the label-balancing
generative strategy. We evaluate TVAE on two real-world COVID-19 datasets: an
international dataset collected from 1651 hospitals across 63 countries, and a
institutional dataset collected from 15 hospitals. The results show that TVAE
outperforms state-of-the-art treatment effect models in predicting both the
propensity scores and factual outcomes on heterogeneous COVID-19 datasets.
Additional experiments also show TVAE outperforms the best existing models in
individual treatment effect estimation on the synthesized IHDP benchmark
dataset.
| no_new_dataset | 0.681714 |
2307.03322 | Abhirut Gupta | Abhirut Gupta, Ananya B. Sai, Richard Sproat, Yuri Vasilevski, James
S. Ren, Ambarish Jash, Sukhdeep S. Sodhi, and Aravindan Raghuveer | BiPhone: Modeling Inter Language Phonetic Influences in Text | Accepted at ACL 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | A large number of people are forced to use the Web in a language they have
low literacy in due to technology asymmetries. Written text in the second
language (L2) from such users often contains a large number of errors that are
influenced by their native language (L1). We propose a method to mine phoneme
confusions (sounds in L2 that an L1 speaker is likely to conflate) for pairs of
L1 and L2. These confusions are then plugged into a generative model (Bi-Phone)
for synthetically producing corrupted L2 text. Through human evaluations, we
show that Bi-Phone generates plausible corruptions that differ across L1s and
also have widespread coverage on the Web. We also corrupt the popular language
understanding benchmark SuperGLUE with our technique (FunGLUE for Phonetically
Noised GLUE) and show that SoTA language understating models perform poorly. We
also introduce a new phoneme prediction pre-training task which helps byte
models to recover performance close to SuperGLUE. Finally, we also release the
FunGLUE benchmark to promote further research in phonetically robust language
models. To the best of our knowledge, FunGLUE is the first benchmark to
introduce L1-L2 interactions in text.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 22:31:55 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Gupta",
"Abhirut",
""
],
[
"Sai",
"Ananya B.",
""
],
[
"Sproat",
"Richard",
""
],
[
"Vasilevski",
"Yuri",
""
],
[
"Ren",
"James S.",
""
],
[
"Jash",
"Ambarish",
""
],
[
"Sodhi",
"Sukhdeep S.",
""
],
[
"Raghuveer",
"Aravindan",
""
]
] | TITLE: BiPhone: Modeling Inter Language Phonetic Influences in Text
ABSTRACT: A large number of people are forced to use the Web in a language they have
low literacy in due to technology asymmetries. Written text in the second
language (L2) from such users often contains a large number of errors that are
influenced by their native language (L1). We propose a method to mine phoneme
confusions (sounds in L2 that an L1 speaker is likely to conflate) for pairs of
L1 and L2. These confusions are then plugged into a generative model (Bi-Phone)
for synthetically producing corrupted L2 text. Through human evaluations, we
show that Bi-Phone generates plausible corruptions that differ across L1s and
also have widespread coverage on the Web. We also corrupt the popular language
understanding benchmark SuperGLUE with our technique (FunGLUE for Phonetically
Noised GLUE) and show that SoTA language understating models perform poorly. We
also introduce a new phoneme prediction pre-training task which helps byte
models to recover performance close to SuperGLUE. Finally, we also release the
FunGLUE benchmark to promote further research in phonetically robust language
models. To the best of our knowledge, FunGLUE is the first benchmark to
introduce L1-L2 interactions in text.
| no_new_dataset | 0.580174 |
2307.03323 | Diane Tuyizere | Diane Tuyizere and Remy Ihabwikuzo | Machine Learning to detect cyber-attacks and discriminating the types of
power system disturbances | 4 pages , 6 figures | null | null | null | cs.LG cs.SY eess.SY | http://creativecommons.org/licenses/by/4.0/ | This research proposes a machine learning-based attack detection model for
power systems, specifically targeting smart grids. By utilizing data and logs
collected from Phasor Measuring Devices (PMUs), the model aims to learn system
behaviors and effectively identify potential security boundaries. The proposed
approach involves crucial stages including dataset pre-processing, feature
selection, model creation, and evaluation. To validate our approach, we used a
dataset used, consist of 15 separate datasets obtained from different PMUs,
relay snort alarms and logs. Three machine learning models: Random Forest,
Logistic Regression, and K-Nearest Neighbour were built and evaluated using
various performance metrics. The findings indicate that the Random Forest model
achieves the highest performance with an accuracy of 90.56% in detecting power
system disturbances and has the potential in assisting operators in
decision-making processes.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 22:32:06 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Tuyizere",
"Diane",
""
],
[
"Ihabwikuzo",
"Remy",
""
]
] | TITLE: Machine Learning to detect cyber-attacks and discriminating the types of
power system disturbances
ABSTRACT: This research proposes a machine learning-based attack detection model for
power systems, specifically targeting smart grids. By utilizing data and logs
collected from Phasor Measuring Devices (PMUs), the model aims to learn system
behaviors and effectively identify potential security boundaries. The proposed
approach involves crucial stages including dataset pre-processing, feature
selection, model creation, and evaluation. To validate our approach, we used a
dataset used, consist of 15 separate datasets obtained from different PMUs,
relay snort alarms and logs. Three machine learning models: Random Forest,
Logistic Regression, and K-Nearest Neighbour were built and evaluated using
various performance metrics. The findings indicate that the Random Forest model
achieves the highest performance with an accuracy of 90.56% in detecting power
system disturbances and has the potential in assisting operators in
decision-making processes.
| no_new_dataset | 0.69517 |
2307.03347 | Qing Xu | Qing Xu, Min Wu, Xiaoli Li, Kezhi Mao, Zhenghua Chen | Distilling Universal and Joint Knowledge for Cross-Domain Model
Compression on Time Series Data | Accepted by IJCAI 2023 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For many real-world time series tasks, the computational complexity of
prevalent deep leaning models often hinders the deployment on resource-limited
environments (e.g., smartphones). Moreover, due to the inevitable domain shift
between model training (source) and deploying (target) stages, compressing
those deep models under cross-domain scenarios becomes more challenging.
Although some of existing works have already explored cross-domain knowledge
distillation for model compression, they are either biased to source data or
heavily tangled between source and target data. To this end, we design a novel
end-to-end framework called Universal and joint knowledge distillation (UNI-KD)
for cross-domain model compression. In particular, we propose to transfer both
the universal feature-level knowledge across source and target domains and the
joint logit-level knowledge shared by both domains from the teacher to the
student model via an adversarial learning scheme. More specifically, a
feature-domain discriminator is employed to align teacher's and student's
representations for universal knowledge transfer. A data-domain discriminator
is utilized to prioritize the domain-shared samples for joint knowledge
transfer. Extensive experimental results on four time series datasets
demonstrate the superiority of our proposed method over state-of-the-art (SOTA)
benchmarks.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 01:48:02 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Xu",
"Qing",
""
],
[
"Wu",
"Min",
""
],
[
"Li",
"Xiaoli",
""
],
[
"Mao",
"Kezhi",
""
],
[
"Chen",
"Zhenghua",
""
]
] | TITLE: Distilling Universal and Joint Knowledge for Cross-Domain Model
Compression on Time Series Data
ABSTRACT: For many real-world time series tasks, the computational complexity of
prevalent deep leaning models often hinders the deployment on resource-limited
environments (e.g., smartphones). Moreover, due to the inevitable domain shift
between model training (source) and deploying (target) stages, compressing
those deep models under cross-domain scenarios becomes more challenging.
Although some of existing works have already explored cross-domain knowledge
distillation for model compression, they are either biased to source data or
heavily tangled between source and target data. To this end, we design a novel
end-to-end framework called Universal and joint knowledge distillation (UNI-KD)
for cross-domain model compression. In particular, we propose to transfer both
the universal feature-level knowledge across source and target domains and the
joint logit-level knowledge shared by both domains from the teacher to the
student model via an adversarial learning scheme. More specifically, a
feature-domain discriminator is employed to align teacher's and student's
representations for universal knowledge transfer. A data-domain discriminator
is utilized to prioritize the domain-shared samples for joint knowledge
transfer. Extensive experimental results on four time series datasets
demonstrate the superiority of our proposed method over state-of-the-art (SOTA)
benchmarks.
| no_new_dataset | 0.710069 |
2307.03353 | Zhonghan Zhao | Zhonghan Zhao, Wenhao Chai, Shengyu Hao, Wenhao Hu, Guanhong Wang,
Shidong Cao, Mingli Song, Jenq-Neng Hwang, Gaoang Wang | A Survey of Deep Learning in Sports Applications: Perception,
Comprehension, and Decision | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning has the potential to revolutionize sports performance, with
applications ranging from perception and comprehension to decision. This paper
presents a comprehensive survey of deep learning in sports performance,
focusing on three main aspects: algorithms, datasets and virtual environments,
and challenges. Firstly, we discuss the hierarchical structure of deep learning
algorithms in sports performance which includes perception, comprehension and
decision while comparing their strengths and weaknesses. Secondly, we list
widely used existing datasets in sports and highlight their characteristics and
limitations. Finally, we summarize current challenges and point out future
trends of deep learning in sports. Our survey provides valuable reference
material for researchers interested in deep learning in sports applications.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 02:22:17 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Zhao",
"Zhonghan",
""
],
[
"Chai",
"Wenhao",
""
],
[
"Hao",
"Shengyu",
""
],
[
"Hu",
"Wenhao",
""
],
[
"Wang",
"Guanhong",
""
],
[
"Cao",
"Shidong",
""
],
[
"Song",
"Mingli",
""
],
[
"Hwang",
"Jenq-Neng",
""
],
[
"Wang",
"Gaoang",
""
]
] | TITLE: A Survey of Deep Learning in Sports Applications: Perception,
Comprehension, and Decision
ABSTRACT: Deep learning has the potential to revolutionize sports performance, with
applications ranging from perception and comprehension to decision. This paper
presents a comprehensive survey of deep learning in sports performance,
focusing on three main aspects: algorithms, datasets and virtual environments,
and challenges. Firstly, we discuss the hierarchical structure of deep learning
algorithms in sports performance which includes perception, comprehension and
decision while comparing their strengths and weaknesses. Secondly, we list
widely used existing datasets in sports and highlight their characteristics and
limitations. Finally, we summarize current challenges and point out future
trends of deep learning in sports. Our survey provides valuable reference
material for researchers interested in deep learning in sports applications.
| no_new_dataset | 0.712632 |
2307.03359 | Ling Chen | Ling Chen, Chaodu Song, Xu Wang, Dachao Fu, and Feifei Li | CSCLog: A Component Subsequence Correlation-Aware Log Anomaly Detection
Method | submitted to TKDD, 18 pages and 7 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anomaly detection based on system logs plays an important role in intelligent
operations, which is a challenging task due to the extremely complex log
patterns. Existing methods detect anomalies by capturing the sequential
dependencies in log sequences, which ignore the interactions of subsequences.
To this end, we propose CSCLog, a Component Subsequence Correlation-Aware Log
anomaly detection method, which not only captures the sequential dependencies
in subsequences, but also models the implicit correlations of subsequences.
Specifically, subsequences are extracted from log sequences based on components
and the sequential dependencies in subsequences are captured by Long Short-Term
Memory Networks (LSTMs). An implicit correlation encoder is introduced to model
the implicit correlations of subsequences adaptively. In addition, Graph
Convolution Networks (GCNs) are employed to accomplish the information
interactions of subsequences. Finally, attention mechanisms are exploited to
fuse the embeddings of all subsequences. Extensive experiments on four publicly
available log datasets demonstrate the effectiveness of CSCLog, outperforming
the best baseline by an average of 7.41% in Macro F1-Measure.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 02:55:04 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Chen",
"Ling",
""
],
[
"Song",
"Chaodu",
""
],
[
"Wang",
"Xu",
""
],
[
"Fu",
"Dachao",
""
],
[
"Li",
"Feifei",
""
]
] | TITLE: CSCLog: A Component Subsequence Correlation-Aware Log Anomaly Detection
Method
ABSTRACT: Anomaly detection based on system logs plays an important role in intelligent
operations, which is a challenging task due to the extremely complex log
patterns. Existing methods detect anomalies by capturing the sequential
dependencies in log sequences, which ignore the interactions of subsequences.
To this end, we propose CSCLog, a Component Subsequence Correlation-Aware Log
anomaly detection method, which not only captures the sequential dependencies
in subsequences, but also models the implicit correlations of subsequences.
Specifically, subsequences are extracted from log sequences based on components
and the sequential dependencies in subsequences are captured by Long Short-Term
Memory Networks (LSTMs). An implicit correlation encoder is introduced to model
the implicit correlations of subsequences adaptively. In addition, Graph
Convolution Networks (GCNs) are employed to accomplish the information
interactions of subsequences. Finally, attention mechanisms are exploited to
fuse the embeddings of all subsequences. Extensive experiments on four publicly
available log datasets demonstrate the effectiveness of CSCLog, outperforming
the best baseline by an average of 7.41% in Macro F1-Measure.
| no_new_dataset | 0.71086 |
2307.03376 | Jing Zhang | Yunqiu Lv, Jing Zhang, Nick Barnes, Yuchao Dai | Weakly-supervised Contrastive Learning for Unsupervised Object Discovery | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unsupervised object discovery (UOD) refers to the task of discriminating the
whole region of objects from the background within a scene without relying on
labeled datasets, which benefits the task of bounding-box-level localization
and pixel-level segmentation. This task is promising due to its ability to
discover objects in a generic manner. We roughly categorise existing techniques
into two main directions, namely the generative solutions based on image
resynthesis, and the clustering methods based on self-supervised models. We
have observed that the former heavily relies on the quality of image
reconstruction, while the latter shows limitations in effectively modeling
semantic correlations. To directly target at object discovery, we focus on the
latter approach and propose a novel solution by incorporating weakly-supervised
contrastive learning (WCL) to enhance semantic information exploration. We
design a semantic-guided self-supervised learning model to extract high-level
semantic features from images, which is achieved by fine-tuning the feature
encoder of a self-supervised model, namely DINO, via WCL. Subsequently, we
introduce Principal Component Analysis (PCA) to localize object regions. The
principal projection direction, corresponding to the maximal eigenvalue, serves
as an indicator of the object region(s). Extensive experiments on benchmark
unsupervised object discovery datasets demonstrate the effectiveness of our
proposed solution. The source code and experimental results are publicly
available via our project page at https://github.com/npucvr/WSCUOD.git.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 04:03:48 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Lv",
"Yunqiu",
""
],
[
"Zhang",
"Jing",
""
],
[
"Barnes",
"Nick",
""
],
[
"Dai",
"Yuchao",
""
]
] | TITLE: Weakly-supervised Contrastive Learning for Unsupervised Object Discovery
ABSTRACT: Unsupervised object discovery (UOD) refers to the task of discriminating the
whole region of objects from the background within a scene without relying on
labeled datasets, which benefits the task of bounding-box-level localization
and pixel-level segmentation. This task is promising due to its ability to
discover objects in a generic manner. We roughly categorise existing techniques
into two main directions, namely the generative solutions based on image
resynthesis, and the clustering methods based on self-supervised models. We
have observed that the former heavily relies on the quality of image
reconstruction, while the latter shows limitations in effectively modeling
semantic correlations. To directly target at object discovery, we focus on the
latter approach and propose a novel solution by incorporating weakly-supervised
contrastive learning (WCL) to enhance semantic information exploration. We
design a semantic-guided self-supervised learning model to extract high-level
semantic features from images, which is achieved by fine-tuning the feature
encoder of a self-supervised model, namely DINO, via WCL. Subsequently, we
introduce Principal Component Analysis (PCA) to localize object regions. The
principal projection direction, corresponding to the maximal eigenvalue, serves
as an indicator of the object region(s). Extensive experiments on benchmark
unsupervised object discovery datasets demonstrate the effectiveness of our
proposed solution. The source code and experimental results are publicly
available via our project page at https://github.com/npucvr/WSCUOD.git.
| no_new_dataset | 0.709636 |
2307.03377 | Angel Felipe Magnoss\~ao de Paula | Angel Felipe Magnoss\~ao de Paula, Paolo Rosso and Damiano Spina | Mitigating Negative Transfer with Task Awareness for Sexism, Hate
Speech, and Toxic Language Detection | 8 pages, 2 figures, 5 tables, IJCNN 2023 conference | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | This paper proposes a novelty approach to mitigate the negative transfer
problem. In the field of machine learning, the common strategy is to apply the
Single-Task Learning approach in order to train a supervised model to solve a
specific task. Training a robust model requires a lot of data and a significant
amount of computational resources, making this solution unfeasible in cases
where data are unavailable or expensive to gather. Therefore another solution,
based on the sharing of information between tasks, has been developed:
Multi-Task Learning (MTL). Despite the recent developments regarding MTL, the
problem of negative transfer has still to be solved. Negative transfer is a
phenomenon that occurs when noisy information is shared between tasks,
resulting in a drop in performance. This paper proposes a new approach to
mitigate the negative transfer problem based on the task awareness concept. The
proposed approach results in diminishing the negative transfer together with an
improvement of performance over classic MTL solution. Moreover, the proposed
approach has been implemented in two unified architectures to detect Sexism,
Hate Speech, and Toxic Language in text comments. The proposed architectures
set a new state-of-the-art both in EXIST-2021 and HatEval-2019 benchmarks.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 04:10:37 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"de Paula",
"Angel Felipe Magnossão",
""
],
[
"Rosso",
"Paolo",
""
],
[
"Spina",
"Damiano",
""
]
] | TITLE: Mitigating Negative Transfer with Task Awareness for Sexism, Hate
Speech, and Toxic Language Detection
ABSTRACT: This paper proposes a novelty approach to mitigate the negative transfer
problem. In the field of machine learning, the common strategy is to apply the
Single-Task Learning approach in order to train a supervised model to solve a
specific task. Training a robust model requires a lot of data and a significant
amount of computational resources, making this solution unfeasible in cases
where data are unavailable or expensive to gather. Therefore another solution,
based on the sharing of information between tasks, has been developed:
Multi-Task Learning (MTL). Despite the recent developments regarding MTL, the
problem of negative transfer has still to be solved. Negative transfer is a
phenomenon that occurs when noisy information is shared between tasks,
resulting in a drop in performance. This paper proposes a new approach to
mitigate the negative transfer problem based on the task awareness concept. The
proposed approach results in diminishing the negative transfer together with an
improvement of performance over classic MTL solution. Moreover, the proposed
approach has been implemented in two unified architectures to detect Sexism,
Hate Speech, and Toxic Language in text comments. The proposed architectures
set a new state-of-the-art both in EXIST-2021 and HatEval-2019 benchmarks.
| no_new_dataset | 0.71 |
2307.03378 | Bruce W. Lee | Bruce W. Lee, BongSeok Yang, Jason Hyung-Jong Lee | A Side-by-side Comparison of Transformers for English Implicit Discourse
Relation Classification | TrustNLP @ ACL 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Though discourse parsing can help multiple NLP fields, there has been no wide
language model search done on implicit discourse relation classification. This
hinders researchers from fully utilizing public-available models in discourse
analysis. This work is a straightforward, fine-tuned discourse performance
comparison of seven pre-trained language models. We use PDTB-3, a popular
discourse relation annotated dataset. Through our model search, we raise SOTA
to 0.671 ACC and obtain novel observations. Some are contrary to what has been
reported before (Shi and Demberg, 2019b), that sentence-level pre-training
objectives (NSP, SBO, SOP) generally fail to produce the best performing model
for implicit discourse relation classification. Counterintuitively,
similar-sized PLMs with MLM and full attention led to better performance.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 04:12:25 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Lee",
"Bruce W.",
""
],
[
"Yang",
"BongSeok",
""
],
[
"Lee",
"Jason Hyung-Jong",
""
]
] | TITLE: A Side-by-side Comparison of Transformers for English Implicit Discourse
Relation Classification
ABSTRACT: Though discourse parsing can help multiple NLP fields, there has been no wide
language model search done on implicit discourse relation classification. This
hinders researchers from fully utilizing public-available models in discourse
analysis. This work is a straightforward, fine-tuned discourse performance
comparison of seven pre-trained language models. We use PDTB-3, a popular
discourse relation annotated dataset. Through our model search, we raise SOTA
to 0.671 ACC and obtain novel observations. Some are contrary to what has been
reported before (Shi and Demberg, 2019b), that sentence-level pre-training
objectives (NSP, SBO, SOP) generally fail to produce the best performing model
for implicit discourse relation classification. Counterintuitively,
similar-sized PLMs with MLM and full attention led to better performance.
| no_new_dataset | 0.705981 |
2307.03379 | Rodrigue de Schaetzen | Rodrigue de Schaetzen, Alessandro Sestini | Efficient Ground Vehicle Path Following in Game AI | 4 pages, 3 figures, to be published in IEEE Conference on Games 2023 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short paper presents an efficient path following solution for ground
vehicles tailored to game AI. Our focus is on adapting established techniques
to design simple solutions with parameters that are easily tunable for an
efficient benchmark path follower. Our solution pays particular attention to
computing a target speed which uses quadratic Bezier curves to estimate the
path curvature. The performance of the proposed path follower is evaluated
through a variety of test scenarios in a first-person shooter game,
demonstrating its effectiveness and robustness in handling different types of
paths and vehicles. We achieved a 70% decrease in the total number of stuck
events compared to an existing path following solution.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 04:20:07 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"de Schaetzen",
"Rodrigue",
""
],
[
"Sestini",
"Alessandro",
""
]
] | TITLE: Efficient Ground Vehicle Path Following in Game AI
ABSTRACT: This short paper presents an efficient path following solution for ground
vehicles tailored to game AI. Our focus is on adapting established techniques
to design simple solutions with parameters that are easily tunable for an
efficient benchmark path follower. Our solution pays particular attention to
computing a target speed which uses quadratic Bezier curves to estimate the
path curvature. The performance of the proposed path follower is evaluated
through a variety of test scenarios in a first-person shooter game,
demonstrating its effectiveness and robustness in handling different types of
paths and vehicles. We achieved a 70% decrease in the total number of stuck
events compared to an existing path following solution.
| no_new_dataset | 0.712026 |
2307.03401 | Takahiro Yabe | Takahiro Yabe, Kota Tsubouchi, Toru Shimizu, Yoshihide Sekimoto, Kaoru
Sezaki, Esteban Moro, Alex Pentland | Metropolitan Scale and Longitudinal Dataset of Anonymized Human Mobility
Trajectories | Data descriptor for the Human Mobility Prediction Challenge (HuMob
Challenge) 2023 | null | null | null | cs.SI physics.soc-ph | http://creativecommons.org/licenses/by/4.0/ | Modeling and predicting human mobility trajectories in urban areas is an
essential task for various applications. The recent availability of large-scale
human movement data collected from mobile devices have enabled the development
of complex human mobility prediction models. However, human mobility prediction
methods are often trained and tested on different datasets, due to the lack of
open-source large-scale human mobility datasets amid privacy concerns, posing a
challenge towards conducting fair performance comparisons between methods. To
this end, we created an open-source, anonymized, metropolitan scale, and
longitudinal (90 days) dataset of 100,000 individuals' human mobility
trajectories, using mobile phone location data. The location pings are
spatially and temporally discretized, and the metropolitan area is undisclosed
to protect users' privacy. The 90-day period is composed of 75 days of
business-as-usual and 15 days during an emergency. To promote the use of the
dataset, we will host a human mobility prediction data challenge (`HuMob
Challenge 2023') using the human mobility dataset, which will be held in
conjunction with ACM SIGSPATIAL 2023.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 05:57:58 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Yabe",
"Takahiro",
""
],
[
"Tsubouchi",
"Kota",
""
],
[
"Shimizu",
"Toru",
""
],
[
"Sekimoto",
"Yoshihide",
""
],
[
"Sezaki",
"Kaoru",
""
],
[
"Moro",
"Esteban",
""
],
[
"Pentland",
"Alex",
""
]
] | TITLE: Metropolitan Scale and Longitudinal Dataset of Anonymized Human Mobility
Trajectories
ABSTRACT: Modeling and predicting human mobility trajectories in urban areas is an
essential task for various applications. The recent availability of large-scale
human movement data collected from mobile devices have enabled the development
of complex human mobility prediction models. However, human mobility prediction
methods are often trained and tested on different datasets, due to the lack of
open-source large-scale human mobility datasets amid privacy concerns, posing a
challenge towards conducting fair performance comparisons between methods. To
this end, we created an open-source, anonymized, metropolitan scale, and
longitudinal (90 days) dataset of 100,000 individuals' human mobility
trajectories, using mobile phone location data. The location pings are
spatially and temporally discretized, and the metropolitan area is undisclosed
to protect users' privacy. The 90-day period is composed of 75 days of
business-as-usual and 15 days during an emergency. To promote the use of the
dataset, we will host a human mobility prediction data challenge (`HuMob
Challenge 2023') using the human mobility dataset, which will be held in
conjunction with ACM SIGSPATIAL 2023.
| new_dataset | 0.717247 |
2307.03413 | Shuaikai Shi | Shuaikai Shi, Lijun Zhang, Yoann Altmann, Jie Chen | Unsupervised Hyperspectral and Multispectral Images Fusion Based on the
Cycle Consistency | null | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral images (HSI) with abundant spectral information reflected
materials property usually perform low spatial resolution due to the hardware
limits. Meanwhile, multispectral images (MSI), e.g., RGB images, have a high
spatial resolution but deficient spectral signatures. Hyperspectral and
multispectral image fusion can be cost-effective and efficient for acquiring
both high spatial resolution and high spectral resolution images. Many of the
conventional HSI and MSI fusion algorithms rely on known spatial degradation
parameters, i.e., point spread function, spectral degradation parameters,
spectral response function, or both of them. Another class of deep
learning-based models relies on the ground truth of high spatial resolution HSI
and needs large amounts of paired training images when working in a supervised
manner. Both of these models are limited in practical fusion scenarios. In this
paper, we propose an unsupervised HSI and MSI fusion model based on the cycle
consistency, called CycFusion. The CycFusion learns the domain transformation
between low spatial resolution HSI (LrHSI) and high spatial resolution MSI
(HrMSI), and the desired high spatial resolution HSI (HrHSI) are considered to
be intermediate feature maps in the transformation networks. The CycFusion can
be trained with the objective functions of marginal matching in single
transform and cycle consistency in double transforms. Moreover, the estimated
PSF and SRF are embedded in the model as the pre-training weights, which
further enhances the practicality of our proposed model. Experiments conducted
on several datasets show that our proposed model outperforms all compared
unsupervised fusion methods. The codes of this paper will be available at this
address: https: //github.com/shuaikaishi/CycFusion for reproducibility.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 06:47:15 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Shi",
"Shuaikai",
""
],
[
"Zhang",
"Lijun",
""
],
[
"Altmann",
"Yoann",
""
],
[
"Chen",
"Jie",
""
]
] | TITLE: Unsupervised Hyperspectral and Multispectral Images Fusion Based on the
Cycle Consistency
ABSTRACT: Hyperspectral images (HSI) with abundant spectral information reflected
materials property usually perform low spatial resolution due to the hardware
limits. Meanwhile, multispectral images (MSI), e.g., RGB images, have a high
spatial resolution but deficient spectral signatures. Hyperspectral and
multispectral image fusion can be cost-effective and efficient for acquiring
both high spatial resolution and high spectral resolution images. Many of the
conventional HSI and MSI fusion algorithms rely on known spatial degradation
parameters, i.e., point spread function, spectral degradation parameters,
spectral response function, or both of them. Another class of deep
learning-based models relies on the ground truth of high spatial resolution HSI
and needs large amounts of paired training images when working in a supervised
manner. Both of these models are limited in practical fusion scenarios. In this
paper, we propose an unsupervised HSI and MSI fusion model based on the cycle
consistency, called CycFusion. The CycFusion learns the domain transformation
between low spatial resolution HSI (LrHSI) and high spatial resolution MSI
(HrMSI), and the desired high spatial resolution HSI (HrHSI) are considered to
be intermediate feature maps in the transformation networks. The CycFusion can
be trained with the objective functions of marginal matching in single
transform and cycle consistency in double transforms. Moreover, the estimated
PSF and SRF are embedded in the model as the pre-training weights, which
further enhances the practicality of our proposed model. Experiments conducted
on several datasets show that our proposed model outperforms all compared
unsupervised fusion methods. The codes of this paper will be available at this
address: https: //github.com/shuaikaishi/CycFusion for reproducibility.
| no_new_dataset | 0.713407 |
2307.03416 | Tianqi Li | Tianqi Li, Guansong Pang, Xiao Bai, Jin Zheng, Lei Zhou, Xin Ning | Learning Adversarial Semantic Embeddings for Zero-Shot Recognition in
Open Worlds | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes
with only their side semantic information presented during training. It cannot
handle real-life, open-world scenarios where there are test samples of unknown
classes for which neither samples (e.g., images) nor their side semantic
information is known during training. Open-Set Recognition (OSR) is dedicated
to addressing the unknown class issue, but existing OSR methods are not
designed to model the semantic information of the unseen classes. To tackle
this combined ZSL and OSR problem, we consider the case of "Zero-Shot Open-Set
Recognition" (ZS-OSR), where a model is trained under the ZSL setting but it is
required to accurately classify samples from the unseen classes while being
able to reject samples from the unknown classes during inference. We perform
large experiments on combining existing state-of-the-art ZSL and OSR models for
the ZS-OSR task on four widely used datasets adapted from the ZSL task, and
reveal that ZS-OSR is a non-trivial task as the simply combined solutions
perform badly in distinguishing the unseen-class and unknown-class samples. We
further introduce a novel approach specifically designed for ZS-OSR, in which
our model learns to generate adversarial semantic embeddings of the unknown
classes to train an unknowns-informed ZS-OSR classifier. Extensive empirical
results show that our method 1) substantially outperforms the combined
solutions in detecting the unknown classes while retaining the classification
accuracy on the unseen classes and 2) achieves similar superiority under
generalized ZS-OSR settings.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 06:54:21 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Li",
"Tianqi",
""
],
[
"Pang",
"Guansong",
""
],
[
"Bai",
"Xiao",
""
],
[
"Zheng",
"Jin",
""
],
[
"Zhou",
"Lei",
""
],
[
"Ning",
"Xin",
""
]
] | TITLE: Learning Adversarial Semantic Embeddings for Zero-Shot Recognition in
Open Worlds
ABSTRACT: Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes
with only their side semantic information presented during training. It cannot
handle real-life, open-world scenarios where there are test samples of unknown
classes for which neither samples (e.g., images) nor their side semantic
information is known during training. Open-Set Recognition (OSR) is dedicated
to addressing the unknown class issue, but existing OSR methods are not
designed to model the semantic information of the unseen classes. To tackle
this combined ZSL and OSR problem, we consider the case of "Zero-Shot Open-Set
Recognition" (ZS-OSR), where a model is trained under the ZSL setting but it is
required to accurately classify samples from the unseen classes while being
able to reject samples from the unknown classes during inference. We perform
large experiments on combining existing state-of-the-art ZSL and OSR models for
the ZS-OSR task on four widely used datasets adapted from the ZSL task, and
reveal that ZS-OSR is a non-trivial task as the simply combined solutions
perform badly in distinguishing the unseen-class and unknown-class samples. We
further introduce a novel approach specifically designed for ZS-OSR, in which
our model learns to generate adversarial semantic embeddings of the unknown
classes to train an unknowns-informed ZS-OSR classifier. Extensive empirical
results show that our method 1) substantially outperforms the combined
solutions in detecting the unknown classes while retaining the classification
accuracy on the unseen classes and 2) achieves similar superiority under
generalized ZS-OSR settings.
| no_new_dataset | 0.711268 |
2307.03423 | Shuaikai Shi | Shuaikai Shi, Lijun Zhang, Jie Chen | Hyperspectral and Multispectral Image Fusion Using the Conditional
Denoising Diffusion Probabilistic Model | null | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hyperspectral images (HSI) have a large amount of spectral information
reflecting the characteristics of matter, while their spatial resolution is low
due to the limitations of imaging technology. Complementary to this are
multispectral images (MSI), e.g., RGB images, with high spatial resolution but
insufficient spectral bands. Hyperspectral and multispectral image fusion is a
technique for acquiring ideal images that have both high spatial and high
spectral resolution cost-effectively. Many existing HSI and MSI fusion
algorithms rely on known imaging degradation models, which are often not
available in practice. In this paper, we propose a deep fusion method based on
the conditional denoising diffusion probabilistic model, called DDPM-Fus.
Specifically, the DDPM-Fus contains the forward diffusion process which
gradually adds Gaussian noise to the high spatial resolution HSI (HrHSI) and
another reverse denoising process which learns to predict the desired HrHSI
from its noisy version conditioning on the corresponding high spatial
resolution MSI (HrMSI) and low spatial resolution HSI (LrHSI). Once the
training is completes, the proposed DDPM-Fus implements the reverse process on
the test HrMSI and LrHSI to generate the fused HrHSI. Experiments conducted on
one indoor and two remote sensing datasets show the superiority of the proposed
model when compared with other advanced deep learningbased fusion methods. The
codes of this work will be opensourced at this address:
https://github.com/shuaikaishi/DDPMFus for reproducibility.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 07:08:52 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Shi",
"Shuaikai",
""
],
[
"Zhang",
"Lijun",
""
],
[
"Chen",
"Jie",
""
]
] | TITLE: Hyperspectral and Multispectral Image Fusion Using the Conditional
Denoising Diffusion Probabilistic Model
ABSTRACT: Hyperspectral images (HSI) have a large amount of spectral information
reflecting the characteristics of matter, while their spatial resolution is low
due to the limitations of imaging technology. Complementary to this are
multispectral images (MSI), e.g., RGB images, with high spatial resolution but
insufficient spectral bands. Hyperspectral and multispectral image fusion is a
technique for acquiring ideal images that have both high spatial and high
spectral resolution cost-effectively. Many existing HSI and MSI fusion
algorithms rely on known imaging degradation models, which are often not
available in practice. In this paper, we propose a deep fusion method based on
the conditional denoising diffusion probabilistic model, called DDPM-Fus.
Specifically, the DDPM-Fus contains the forward diffusion process which
gradually adds Gaussian noise to the high spatial resolution HSI (HrHSI) and
another reverse denoising process which learns to predict the desired HrHSI
from its noisy version conditioning on the corresponding high spatial
resolution MSI (HrMSI) and low spatial resolution HSI (LrHSI). Once the
training is completes, the proposed DDPM-Fus implements the reverse process on
the test HrMSI and LrHSI to generate the fused HrHSI. Experiments conducted on
one indoor and two remote sensing datasets show the superiority of the proposed
model when compared with other advanced deep learningbased fusion methods. The
codes of this work will be opensourced at this address:
https://github.com/shuaikaishi/DDPMFus for reproducibility.
| no_new_dataset | 0.713007 |
2307.03425 | Yuanjie Gu | Yinghan Guan, Haoran Dai, Zekuan Yu, Shouyu Wang and Yuanjie Gu | Registration-Free Hybrid Learning Empowers Simple Multimodal Imaging
System for High-quality Fusion Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multimodal fusion detection always places high demands on the imaging system
and image pre-processing, while either a high-quality pre-registration system
or image registration processing is costly. Unfortunately, the existing fusion
methods are designed for registered source images, and the fusion of
inhomogeneous features, which denotes a pair of features at the same spatial
location that expresses different semantic information, cannot achieve
satisfactory performance via these methods. As a result, we propose IA-VFDnet,
a CNN-Transformer hybrid learning framework with a unified high-quality
multimodal feature matching module (AKM) and a fusion module (WDAF), in which
AKM and DWDAF work in synergy to perform high-quality infrared-aware visible
fusion detection, which can be applied to smoke and wildfire detection.
Furthermore, experiments on the M3FD dataset validate the superiority of the
proposed method, with IA-VFDnet achieving the best detection performance than
other state-of-the-art methods under conventional registered conditions. In
addition, the first unregistered multimodal smoke and wildfire detection
benchmark is openly available in this letter.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 07:11:37 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Guan",
"Yinghan",
""
],
[
"Dai",
"Haoran",
""
],
[
"Yu",
"Zekuan",
""
],
[
"Wang",
"Shouyu",
""
],
[
"Gu",
"Yuanjie",
""
]
] | TITLE: Registration-Free Hybrid Learning Empowers Simple Multimodal Imaging
System for High-quality Fusion Detection
ABSTRACT: Multimodal fusion detection always places high demands on the imaging system
and image pre-processing, while either a high-quality pre-registration system
or image registration processing is costly. Unfortunately, the existing fusion
methods are designed for registered source images, and the fusion of
inhomogeneous features, which denotes a pair of features at the same spatial
location that expresses different semantic information, cannot achieve
satisfactory performance via these methods. As a result, we propose IA-VFDnet,
a CNN-Transformer hybrid learning framework with a unified high-quality
multimodal feature matching module (AKM) and a fusion module (WDAF), in which
AKM and DWDAF work in synergy to perform high-quality infrared-aware visible
fusion detection, which can be applied to smoke and wildfire detection.
Furthermore, experiments on the M3FD dataset validate the superiority of the
proposed method, with IA-VFDnet achieving the best detection performance than
other state-of-the-art methods under conventional registered conditions. In
addition, the first unregistered multimodal smoke and wildfire detection
benchmark is openly available in this letter.
| no_new_dataset | 0.708767 |
2307.03476 | Yi Wen | Yi Wen, Siwei Wang, Qing Liao, Weixuan Liang, Ke Liang, Xinhang Wan,
Xinwang Liu | Unpaired Multi-View Graph Clustering with Cross-View Structure Matching | 15 pages | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-view clustering (MVC), which effectively fuses information from
multiple views for better performance, has received increasing attention. Most
existing MVC methods assume that multi-view data are fully paired, which means
that the mappings of all corresponding samples between views are pre-defined or
given in advance. However, the data correspondence is often incomplete in
real-world applications due to data corruption or sensor differences, referred
as the data-unpaired problem (DUP) in multi-view literature. Although several
attempts have been made to address the DUP issue, they suffer from the
following drawbacks: 1) Most methods focus on the feature representation while
ignoring the structural information of multi-view data, which is essential for
clustering tasks; 2) Existing methods for partially unpaired problems rely on
pre-given cross-view alignment information, resulting in their inability to
handle fully unpaired problems; 3) Their inevitable parameters degrade the
efficiency and applicability of the models. To tackle these issues, we propose
a novel parameter-free graph clustering framework termed Unpaired Multi-view
Graph Clustering framework with Cross-View Structure Matching (UPMGC-SM).
Specifically, unlike the existing methods, UPMGC-SM effectively utilizes the
structural information from each view to refine cross-view correspondences.
Besides, our UPMGC-SM is a unified framework for both the fully and partially
unpaired multi-view graph clustering. Moreover, existing graph clustering
methods can adopt our UPMGC-SM to enhance their ability for unpaired scenarios.
Extensive experiments demonstrate the effectiveness and generalization of our
proposed framework for both paired and unpaired datasets.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 09:29:44 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Wen",
"Yi",
""
],
[
"Wang",
"Siwei",
""
],
[
"Liao",
"Qing",
""
],
[
"Liang",
"Weixuan",
""
],
[
"Liang",
"Ke",
""
],
[
"Wan",
"Xinhang",
""
],
[
"Liu",
"Xinwang",
""
]
] | TITLE: Unpaired Multi-View Graph Clustering with Cross-View Structure Matching
ABSTRACT: Multi-view clustering (MVC), which effectively fuses information from
multiple views for better performance, has received increasing attention. Most
existing MVC methods assume that multi-view data are fully paired, which means
that the mappings of all corresponding samples between views are pre-defined or
given in advance. However, the data correspondence is often incomplete in
real-world applications due to data corruption or sensor differences, referred
as the data-unpaired problem (DUP) in multi-view literature. Although several
attempts have been made to address the DUP issue, they suffer from the
following drawbacks: 1) Most methods focus on the feature representation while
ignoring the structural information of multi-view data, which is essential for
clustering tasks; 2) Existing methods for partially unpaired problems rely on
pre-given cross-view alignment information, resulting in their inability to
handle fully unpaired problems; 3) Their inevitable parameters degrade the
efficiency and applicability of the models. To tackle these issues, we propose
a novel parameter-free graph clustering framework termed Unpaired Multi-view
Graph Clustering framework with Cross-View Structure Matching (UPMGC-SM).
Specifically, unlike the existing methods, UPMGC-SM effectively utilizes the
structural information from each view to refine cross-view correspondences.
Besides, our UPMGC-SM is a unified framework for both the fully and partially
unpaired multi-view graph clustering. Moreover, existing graph clustering
methods can adopt our UPMGC-SM to enhance their ability for unpaired scenarios.
Extensive experiments demonstrate the effectiveness and generalization of our
proposed framework for both paired and unpaired datasets.
| no_new_dataset | 0.707998 |
2307.03535 | Xiaoyu Bai | Xiaoyu Bai, Fan Bai, Xiaofei Huo, Jia Ge, Tony C. W. Mok, Zi Li,
Minfeng Xu, Jingren Zhou, Le Lu, Dakai Jin, Xianghua Ye, Jingjing Lu, Ke Yan | Matching in the Wild: Learning Anatomical Embeddings for Multi-Modality
Images | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Radiotherapists require accurate registration of MR/CT images to effectively
use information from both modalities. In a typical registration pipeline, rigid
or affine transformations are applied to roughly align the fixed and moving
images before proceeding with the deformation step. While recent learning-based
methods have shown promising results in the rigid/affine step, these methods
often require images with similar field-of-view (FOV) for successful alignment.
As a result, aligning images with different FOVs remains a challenging task.
Self-supervised landmark detection methods like self-supervised Anatomical
eMbedding (SAM) have emerged as a useful tool for mapping and cropping images
to similar FOVs. However, these methods are currently limited to intra-modality
use only. To address this limitation and enable cross-modality matching, we
propose a new approach called Cross-SAM. Our approach utilizes a novel
iterative process that alternates between embedding learning and CT-MRI
registration. We start by applying aggressive contrast augmentation on both CT
and MRI images to train a SAM model. We then use this SAM to identify
corresponding regions on paired images using robust grid-points matching,
followed by a point-set based affine/rigid registration, and a deformable
fine-tuning step to produce registered paired images. We use these registered
pairs to enhance the matching ability of SAM, which is then processed
iteratively. We use the final model for cross-modality matching tasks. We
evaluated our approach on two CT-MRI affine registration datasets and found
that Cross-SAM achieved robust affine registration on both datasets,
significantly outperforming other methods and achieving state-of-the-art
performance.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 11:49:06 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Bai",
"Xiaoyu",
""
],
[
"Bai",
"Fan",
""
],
[
"Huo",
"Xiaofei",
""
],
[
"Ge",
"Jia",
""
],
[
"Mok",
"Tony C. W.",
""
],
[
"Li",
"Zi",
""
],
[
"Xu",
"Minfeng",
""
],
[
"Zhou",
"Jingren",
""
],
[
"Lu",
"Le",
""
],
[
"Jin",
"Dakai",
""
],
[
"Ye",
"Xianghua",
""
],
[
"Lu",
"Jingjing",
""
],
[
"Yan",
"Ke",
""
]
] | TITLE: Matching in the Wild: Learning Anatomical Embeddings for Multi-Modality
Images
ABSTRACT: Radiotherapists require accurate registration of MR/CT images to effectively
use information from both modalities. In a typical registration pipeline, rigid
or affine transformations are applied to roughly align the fixed and moving
images before proceeding with the deformation step. While recent learning-based
methods have shown promising results in the rigid/affine step, these methods
often require images with similar field-of-view (FOV) for successful alignment.
As a result, aligning images with different FOVs remains a challenging task.
Self-supervised landmark detection methods like self-supervised Anatomical
eMbedding (SAM) have emerged as a useful tool for mapping and cropping images
to similar FOVs. However, these methods are currently limited to intra-modality
use only. To address this limitation and enable cross-modality matching, we
propose a new approach called Cross-SAM. Our approach utilizes a novel
iterative process that alternates between embedding learning and CT-MRI
registration. We start by applying aggressive contrast augmentation on both CT
and MRI images to train a SAM model. We then use this SAM to identify
corresponding regions on paired images using robust grid-points matching,
followed by a point-set based affine/rigid registration, and a deformable
fine-tuning step to produce registered paired images. We use these registered
pairs to enhance the matching ability of SAM, which is then processed
iteratively. We use the final model for cross-modality matching tasks. We
evaluated our approach on two CT-MRI affine registration datasets and found
that Cross-SAM achieved robust affine registration on both datasets,
significantly outperforming other methods and achieving state-of-the-art
performance.
| no_new_dataset | 0.711406 |
2307.03536 | Chenping Fu | Chenping Fu, Wanqi Yuan, Jiewen Xiao, Risheng Liu, and Xin Fan | Joint Perceptual Learning for Enhancement and Object Detection in
Underwater Scenarios | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Underwater degraded images greatly challenge existing algorithms to detect
objects of interest. Recently, researchers attempt to adopt attention
mechanisms or composite connections for improving the feature representation of
detectors. However, this solution does \textit{not} eliminate the impact of
degradation on image content such as color and texture, achieving minimal
improvements. Another feasible solution for underwater object detection is to
develop sophisticated deep architectures in order to enhance image quality or
features. Nevertheless, the visually appealing output of these enhancement
modules do \textit{not} necessarily generate high accuracy for deep detectors.
More recently, some multi-task learning methods jointly learn underwater
detection and image enhancement, accessing promising improvements. Typically,
these methods invoke huge architecture and expensive computations, rendering
inefficient inference. Definitely, underwater object detection and image
enhancement are two interrelated tasks. Leveraging information coming from the
two tasks can benefit each task. Based on these factual opinions, we propose a
bilevel optimization formulation for jointly learning underwater object
detection and image enhancement, and then unroll to a dual perception network
(DPNet) for the two tasks. DPNet with one shared module and two task subnets
learns from the two different tasks, seeking a shared representation. The
shared representation provides more structural details for image enhancement
and rich content information for object detection. Finally, we derive a
cooperative training strategy to optimize parameters for DPNet. Extensive
experiments on real-world and synthetic underwater datasets demonstrate that
our method outputs visually favoring images and higher detection accuracy.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 11:54:06 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Fu",
"Chenping",
""
],
[
"Yuan",
"Wanqi",
""
],
[
"Xiao",
"Jiewen",
""
],
[
"Liu",
"Risheng",
""
],
[
"Fan",
"Xin",
""
]
] | TITLE: Joint Perceptual Learning for Enhancement and Object Detection in
Underwater Scenarios
ABSTRACT: Underwater degraded images greatly challenge existing algorithms to detect
objects of interest. Recently, researchers attempt to adopt attention
mechanisms or composite connections for improving the feature representation of
detectors. However, this solution does \textit{not} eliminate the impact of
degradation on image content such as color and texture, achieving minimal
improvements. Another feasible solution for underwater object detection is to
develop sophisticated deep architectures in order to enhance image quality or
features. Nevertheless, the visually appealing output of these enhancement
modules do \textit{not} necessarily generate high accuracy for deep detectors.
More recently, some multi-task learning methods jointly learn underwater
detection and image enhancement, accessing promising improvements. Typically,
these methods invoke huge architecture and expensive computations, rendering
inefficient inference. Definitely, underwater object detection and image
enhancement are two interrelated tasks. Leveraging information coming from the
two tasks can benefit each task. Based on these factual opinions, we propose a
bilevel optimization formulation for jointly learning underwater object
detection and image enhancement, and then unroll to a dual perception network
(DPNet) for the two tasks. DPNet with one shared module and two task subnets
learns from the two different tasks, seeking a shared representation. The
shared representation provides more structural details for image enhancement
and rich content information for object detection. Finally, we derive a
cooperative training strategy to optimize parameters for DPNet. Extensive
experiments on real-world and synthetic underwater datasets demonstrate that
our method outputs visually favoring images and higher detection accuracy.
| no_new_dataset | 0.707657 |
2307.03586 | Mattia Giovanni Campana | Mattia Giovanni Campana, Franca Delmastro | ContextLabeler Dataset: physical and virtual sensors data collected from
smartphone usage in-the-wild | null | Elsevier Data in Brief, Volume 37, 2021 | 10.1016/j.dib.2021.107164 | null | cs.HC cs.LG eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes a data collection campaign and the resulting dataset
derived from smartphone sensors characterizing the daily life activities of 3
volunteers in a period of two weeks. The dataset is released as a collection of
CSV files containing more than 45K data samples, where each sample is composed
by 1332 features related to a heterogeneous set of physical and virtual
sensors, including motion sensors, running applications, devices in proximity,
and weather conditions. Moreover, each data sample is associated with a ground
truth label that describes the user activity and the situation in which she was
involved during the sensing experiment (e.g., working, at restaurant, and doing
sport activity). To avoid introducing any bias during the data collection, we
performed the sensing experiment in-the-wild, that is, by using the volunteers'
devices, and without defining any constraint related to the user's behavior.
For this reason, the collected dataset represents a useful source of real data
to both define and evaluate a broad set of novel context-aware solutions (both
algorithms and protocols) that aim to adapt their behavior according to the
changes in the user's situation in a mobile environment.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 13:28:29 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Campana",
"Mattia Giovanni",
""
],
[
"Delmastro",
"Franca",
""
]
] | TITLE: ContextLabeler Dataset: physical and virtual sensors data collected from
smartphone usage in-the-wild
ABSTRACT: This paper describes a data collection campaign and the resulting dataset
derived from smartphone sensors characterizing the daily life activities of 3
volunteers in a period of two weeks. The dataset is released as a collection of
CSV files containing more than 45K data samples, where each sample is composed
by 1332 features related to a heterogeneous set of physical and virtual
sensors, including motion sensors, running applications, devices in proximity,
and weather conditions. Moreover, each data sample is associated with a ground
truth label that describes the user activity and the situation in which she was
involved during the sensing experiment (e.g., working, at restaurant, and doing
sport activity). To avoid introducing any bias during the data collection, we
performed the sensing experiment in-the-wild, that is, by using the volunteers'
devices, and without defining any constraint related to the user's behavior.
For this reason, the collected dataset represents a useful source of real data
to both define and evaluate a broad set of novel context-aware solutions (both
algorithms and protocols) that aim to adapt their behavior according to the
changes in the user's situation in a mobile environment.
| new_dataset | 0.715418 |
2307.03595 | Sitan Yang | Sitan Yang, Malcolm Wolff, Shankar Ramasubramanian, Vincent
Quenneville-Belair, Ronak Metha, Michael W. Mahoney | GEANN: Scalable Graph Augmentations for Multi-Horizon Time Series
Forecasting | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Encoder-decoder deep neural networks have been increasingly studied for
multi-horizon time series forecasting, especially in real-world applications.
However, to forecast accurately, these sophisticated models typically rely on a
large number of time series examples with substantial history. A rapidly
growing topic of interest is forecasting time series which lack sufficient
historical data -- often referred to as the ``cold start'' problem. In this
paper, we introduce a novel yet simple method to address this problem by
leveraging graph neural networks (GNNs) as a data augmentation for enhancing
the encoder used by such forecasters. These GNN-based features can capture
complex inter-series relationships, and their generation process can be
optimized end-to-end with the forecasting task. We show that our architecture
can use either data-driven or domain knowledge-defined graphs, scaling to
incorporate information from multiple very large graphs with millions of nodes.
In our target application of demand forecasting for a large e-commerce
retailer, we demonstrate on both a small dataset of 100K products and a large
dataset with over 2 million products that our method improves overall
performance over competitive baseline models. More importantly, we show that it
brings substantially more gains to ``cold start'' products such as those newly
launched or recently out-of-stock.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 13:38:16 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Yang",
"Sitan",
""
],
[
"Wolff",
"Malcolm",
""
],
[
"Ramasubramanian",
"Shankar",
""
],
[
"Quenneville-Belair",
"Vincent",
""
],
[
"Metha",
"Ronak",
""
],
[
"Mahoney",
"Michael W.",
""
]
] | TITLE: GEANN: Scalable Graph Augmentations for Multi-Horizon Time Series
Forecasting
ABSTRACT: Encoder-decoder deep neural networks have been increasingly studied for
multi-horizon time series forecasting, especially in real-world applications.
However, to forecast accurately, these sophisticated models typically rely on a
large number of time series examples with substantial history. A rapidly
growing topic of interest is forecasting time series which lack sufficient
historical data -- often referred to as the ``cold start'' problem. In this
paper, we introduce a novel yet simple method to address this problem by
leveraging graph neural networks (GNNs) as a data augmentation for enhancing
the encoder used by such forecasters. These GNN-based features can capture
complex inter-series relationships, and their generation process can be
optimized end-to-end with the forecasting task. We show that our architecture
can use either data-driven or domain knowledge-defined graphs, scaling to
incorporate information from multiple very large graphs with millions of nodes.
In our target application of demand forecasting for a large e-commerce
retailer, we demonstrate on both a small dataset of 100K products and a large
dataset with over 2 million products that our method improves overall
performance over competitive baseline models. More importantly, we show that it
brings substantially more gains to ``cold start'' products such as those newly
launched or recently out-of-stock.
| no_new_dataset | 0.708988 |
2307.03610 | Xiao Liang | Kareem A. Eltouny, Wansong Liu, Sibo Tian, Minghui Zheng, and Xiao
Liang | DE-TGN: Uncertainty-Aware Human Motion Forecasting using Deep Ensembles | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ensuring the safety of human workers in a collaborative environment with
robots is of utmost importance. Although accurate pose prediction models can
help prevent collisions between human workers and robots, they are still
susceptible to critical errors. In this study, we propose a novel approach
called deep ensembles of temporal graph neural networks (DE-TGN) that not only
accurately forecast human motion but also provide a measure of prediction
uncertainty. By leveraging deep ensembles and employing stochastic Monte-Carlo
dropout sampling, we construct a volumetric field representing a range of
potential future human poses based on covariance ellipsoids. To validate our
framework, we conducted experiments using three motion capture datasets
including Human3.6M, and two human-robot interaction scenarios, achieving
state-of-the-art prediction error. Moreover, we discovered that deep ensembles
not only enable us to quantify uncertainty but also improve the accuracy of our
predictions.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 14:05:35 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Eltouny",
"Kareem A.",
""
],
[
"Liu",
"Wansong",
""
],
[
"Tian",
"Sibo",
""
],
[
"Zheng",
"Minghui",
""
],
[
"Liang",
"Xiao",
""
]
] | TITLE: DE-TGN: Uncertainty-Aware Human Motion Forecasting using Deep Ensembles
ABSTRACT: Ensuring the safety of human workers in a collaborative environment with
robots is of utmost importance. Although accurate pose prediction models can
help prevent collisions between human workers and robots, they are still
susceptible to critical errors. In this study, we propose a novel approach
called deep ensembles of temporal graph neural networks (DE-TGN) that not only
accurately forecast human motion but also provide a measure of prediction
uncertainty. By leveraging deep ensembles and employing stochastic Monte-Carlo
dropout sampling, we construct a volumetric field representing a range of
potential future human poses based on covariance ellipsoids. To validate our
framework, we conducted experiments using three motion capture datasets
including Human3.6M, and two human-robot interaction scenarios, achieving
state-of-the-art prediction error. Moreover, we discovered that deep ensembles
not only enable us to quantify uncertainty but also improve the accuracy of our
predictions.
| no_new_dataset | 0.709667 |
2307.03659 | Annie Xie | Annie Xie, Lisa Lee, Ted Xiao, Chelsea Finn | Decomposing the Generalization Gap in Imitation Learning for Visual
Robotic Manipulation | Project webpage at https://sites.google.com/view/generalization-gap | null | null | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | What makes generalization hard for imitation learning in visual robotic
manipulation? This question is difficult to approach at face value, but the
environment from the perspective of a robot can often be decomposed into
enumerable factors of variation, such as the lighting conditions or the
placement of the camera. Empirically, generalization to some of these factors
have presented a greater obstacle than others, but existing work sheds little
light on precisely how much each factor contributes to the generalization gap.
Towards an answer to this question, we study imitation learning policies in
simulation and on a real robot language-conditioned manipulation task to
quantify the difficulty of generalization to different (sets of) factors. We
also design a new simulated benchmark of 19 tasks with 11 factors of variation
to facilitate more controlled evaluations of generalization. From our study, we
determine an ordering of factors based on generalization difficulty, that is
consistent across simulation and our real robot setup.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 15:26:03 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Xie",
"Annie",
""
],
[
"Lee",
"Lisa",
""
],
[
"Xiao",
"Ted",
""
],
[
"Finn",
"Chelsea",
""
]
] | TITLE: Decomposing the Generalization Gap in Imitation Learning for Visual
Robotic Manipulation
ABSTRACT: What makes generalization hard for imitation learning in visual robotic
manipulation? This question is difficult to approach at face value, but the
environment from the perspective of a robot can often be decomposed into
enumerable factors of variation, such as the lighting conditions or the
placement of the camera. Empirically, generalization to some of these factors
have presented a greater obstacle than others, but existing work sheds little
light on precisely how much each factor contributes to the generalization gap.
Towards an answer to this question, we study imitation learning policies in
simulation and on a real robot language-conditioned manipulation task to
quantify the difficulty of generalization to different (sets of) factors. We
also design a new simulated benchmark of 19 tasks with 11 factors of variation
to facilitate more controlled evaluations of generalization. From our study, we
determine an ordering of factors based on generalization difficulty, that is
consistent across simulation and our real robot setup.
| new_dataset | 0.708011 |
2307.03662 | Baoru Huang | Baoru Huang, Yicheng Hu, Anh Nguyen, Stamatia Giannarou, Daniel S.
Elson | Detecting the Sensing Area of A Laparoscopic Probe in Minimally Invasive
Cancer Surgery | Accepted by MICCAI 2023 | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | In surgical oncology, it is challenging for surgeons to identify lymph nodes
and completely resect cancer even with pre-operative imaging systems like PET
and CT, because of the lack of reliable intraoperative visualization tools.
Endoscopic radio-guided cancer detection and resection has recently been
evaluated whereby a novel tethered laparoscopic gamma detector is used to
localize a preoperatively injected radiotracer. This can both enhance the
endoscopic imaging and complement preoperative nuclear imaging data. However,
gamma activity visualization is challenging to present to the operator because
the probe is non-imaging and it does not visibly indicate the activity
origination on the tissue surface. Initial failed attempts used segmentation or
geometric methods, but led to the discovery that it could be resolved by
leveraging high-dimensional image features and probe position information. To
demonstrate the effectiveness of this solution, we designed and implemented a
simple regression network that successfully addressed the problem. To further
validate the proposed solution, we acquired and publicly released two datasets
captured using a custom-designed, portable stereo laparoscope system. Through
intensive experimentation, we demonstrated that our method can successfully and
effectively detect the sensing area, establishing a new performance benchmark.
Code and data are available at
https://github.com/br0202/Sensing_area_detection.git
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 15:33:49 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Huang",
"Baoru",
""
],
[
"Hu",
"Yicheng",
""
],
[
"Nguyen",
"Anh",
""
],
[
"Giannarou",
"Stamatia",
""
],
[
"Elson",
"Daniel S.",
""
]
] | TITLE: Detecting the Sensing Area of A Laparoscopic Probe in Minimally Invasive
Cancer Surgery
ABSTRACT: In surgical oncology, it is challenging for surgeons to identify lymph nodes
and completely resect cancer even with pre-operative imaging systems like PET
and CT, because of the lack of reliable intraoperative visualization tools.
Endoscopic radio-guided cancer detection and resection has recently been
evaluated whereby a novel tethered laparoscopic gamma detector is used to
localize a preoperatively injected radiotracer. This can both enhance the
endoscopic imaging and complement preoperative nuclear imaging data. However,
gamma activity visualization is challenging to present to the operator because
the probe is non-imaging and it does not visibly indicate the activity
origination on the tissue surface. Initial failed attempts used segmentation or
geometric methods, but led to the discovery that it could be resolved by
leveraging high-dimensional image features and probe position information. To
demonstrate the effectiveness of this solution, we designed and implemented a
simple regression network that successfully addressed the problem. To further
validate the proposed solution, we acquired and publicly released two datasets
captured using a custom-designed, portable stereo laparoscope system. Through
intensive experimentation, we demonstrated that our method can successfully and
effectively detect the sensing area, establishing a new performance benchmark.
Code and data are available at
https://github.com/br0202/Sensing_area_detection.git
| new_dataset | 0.718616 |
2307.03679 | Shreyanth S | Shreyanth S | Undecimated Wavelet Transform for Word Embedded Semantic Marginal
Autoencoder in Security improvement and Denoising different Languages | null | International Journal of Research and Innovation in Engineering
Technology (IJRIET), Vol. 05, No. 12, October 2019, pp. 18-28 | null | null | cs.CL cs.CR cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By combining the undecimated wavelet transform within a Word Embedded
Semantic Marginal Autoencoder (WESMA), this research study provides a novel
strategy for improving security measures and denoising multiple languages. The
incorporation of these strategies is intended to address the issues of
robustness, privacy, and multilingualism in data processing applications. The
undecimated wavelet transform is used as a feature extraction tool to identify
prominent language patterns and structural qualities in the input data. The
proposed system may successfully capture significant information while
preserving the temporal and geographical links within the data by employing
this transform. This improves security measures by increasing the system's
ability to detect abnormalities, discover hidden patterns, and distinguish
between legitimate content and dangerous threats. The Word Embedded Semantic
Marginal Autoencoder also functions as an intelligent framework for
dimensionality and noise reduction. The autoencoder effectively learns the
underlying semantics of the data and reduces noise components by exploiting
word embeddings and semantic context. As a result, data quality and accuracy
are increased in following processing stages. The suggested methodology is
tested using a diversified dataset that includes several languages and security
scenarios. The experimental results show that the proposed approach is
effective in attaining security enhancement and denoising capabilities across
multiple languages. The system is strong in dealing with linguistic variances,
producing consistent outcomes regardless of the language used. Furthermore,
incorporating the undecimated wavelet transform considerably improves the
system's ability to efficiently address complex security concerns
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 04:10:40 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"S",
"Shreyanth",
""
]
] | TITLE: Undecimated Wavelet Transform for Word Embedded Semantic Marginal
Autoencoder in Security improvement and Denoising different Languages
ABSTRACT: By combining the undecimated wavelet transform within a Word Embedded
Semantic Marginal Autoencoder (WESMA), this research study provides a novel
strategy for improving security measures and denoising multiple languages. The
incorporation of these strategies is intended to address the issues of
robustness, privacy, and multilingualism in data processing applications. The
undecimated wavelet transform is used as a feature extraction tool to identify
prominent language patterns and structural qualities in the input data. The
proposed system may successfully capture significant information while
preserving the temporal and geographical links within the data by employing
this transform. This improves security measures by increasing the system's
ability to detect abnormalities, discover hidden patterns, and distinguish
between legitimate content and dangerous threats. The Word Embedded Semantic
Marginal Autoencoder also functions as an intelligent framework for
dimensionality and noise reduction. The autoencoder effectively learns the
underlying semantics of the data and reduces noise components by exploiting
word embeddings and semantic context. As a result, data quality and accuracy
are increased in following processing stages. The suggested methodology is
tested using a diversified dataset that includes several languages and security
scenarios. The experimental results show that the proposed approach is
effective in attaining security enhancement and denoising capabilities across
multiple languages. The system is strong in dealing with linguistic variances,
producing consistent outcomes regardless of the language used. Furthermore,
incorporating the undecimated wavelet transform considerably improves the
system's ability to efficiently address complex security concerns
| new_dataset | 0.713394 |
2307.03685 | Jian Song | Jian Song and Guanjun Liu | Model Checking ofWorkflow Nets with Tables and Constraints | null | null | null | null | cs.LO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many operations in workflow systems are dependent on database tables. The
classical workflow net and its extensions (e.g., worflow net with data) cannot
model these operations so that some related errors cannot be found by them.
Recently, workflow nets with tables (WFT-nets) were proposed to remedy such a
flaw. However, when the reachability graph of a WFT-net is constructed by their
method, some pseudo states are possibly generated since it does not consider
the guards that constrain the enabling and firing of transitions. Additionally,
they only considered the soundness property that just represents a single
design requirement, so that many other requirements, especially those related
to tables, cannot be analyzed. In this paper, therefore, we re-define the
WFT-net by augmenting constraints of guards to it and re-name it as workflow
net with tables and constraints (WFTC-net). We propose a new method to generate
the state reachability graphs (SRG) of WFTC-nets such that SRG can avoid pseudo
states, due to the consideration of the guards in it. To represent design
requirements related to database operations, we define database-oriented
computation tree logic (DCTL), to represent more design requirements. We design
the model checking algorithms of DCTL based on the SRG of WFTC-nets and develop
a tool. Experiments on a number of public benchmarks show the usefulness of our
methods.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 11:18:13 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Song",
"Jian",
""
],
[
"Liu",
"Guanjun",
""
]
] | TITLE: Model Checking ofWorkflow Nets with Tables and Constraints
ABSTRACT: Many operations in workflow systems are dependent on database tables. The
classical workflow net and its extensions (e.g., worflow net with data) cannot
model these operations so that some related errors cannot be found by them.
Recently, workflow nets with tables (WFT-nets) were proposed to remedy such a
flaw. However, when the reachability graph of a WFT-net is constructed by their
method, some pseudo states are possibly generated since it does not consider
the guards that constrain the enabling and firing of transitions. Additionally,
they only considered the soundness property that just represents a single
design requirement, so that many other requirements, especially those related
to tables, cannot be analyzed. In this paper, therefore, we re-define the
WFT-net by augmenting constraints of guards to it and re-name it as workflow
net with tables and constraints (WFTC-net). We propose a new method to generate
the state reachability graphs (SRG) of WFTC-nets such that SRG can avoid pseudo
states, due to the consideration of the guards in it. To represent design
requirements related to database operations, we define database-oriented
computation tree logic (DCTL), to represent more design requirements. We design
the model checking algorithms of DCTL based on the SRG of WFTC-nets and develop
a tool. Experiments on a number of public benchmarks show the usefulness of our
methods.
| no_new_dataset | 0.706589 |
2307.03692 | Melisa Russak | Waseem AlShikh and Manhal Daaboul and Kirk Goddard and Brock Imel and
Kiran Kamble and Parikshith Kulkarni and Melisa Russak | Becoming self-instruct: introducing early stopping criteria for minimal
instruct tuning | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce the Instruction Following Score (IFS), a metric
that detects language models' ability to follow instructions. The metric has a
dual purpose. First, IFS can be used to distinguish between base and instruct
models. We benchmark publicly available base and instruct models, and show that
the ratio of well formatted responses to partial and full sentences can be an
effective measure between those two model classes. Secondly, the metric can be
used as an early stopping criteria for instruct tuning. We compute IFS for
Supervised Fine-Tuning (SFT) of 7B and 13B LLaMA models, showing that models
learn to follow instructions relatively early in the training process, and the
further finetuning can result in changes in the underlying base model
semantics. As an example of semantics change we show the objectivity of model
predictions, as defined by an auxiliary metric ObjecQA. We show that in this
particular case, semantic changes are the steepest when the IFS tends to
plateau. We hope that decomposing instruct tuning into IFS and semantic factors
starts a new trend in better controllable instruct tuning and opens
possibilities for designing minimal instruct interfaces querying foundation
models.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 09:42:25 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"AlShikh",
"Waseem",
""
],
[
"Daaboul",
"Manhal",
""
],
[
"Goddard",
"Kirk",
""
],
[
"Imel",
"Brock",
""
],
[
"Kamble",
"Kiran",
""
],
[
"Kulkarni",
"Parikshith",
""
],
[
"Russak",
"Melisa",
""
]
] | TITLE: Becoming self-instruct: introducing early stopping criteria for minimal
instruct tuning
ABSTRACT: In this paper, we introduce the Instruction Following Score (IFS), a metric
that detects language models' ability to follow instructions. The metric has a
dual purpose. First, IFS can be used to distinguish between base and instruct
models. We benchmark publicly available base and instruct models, and show that
the ratio of well formatted responses to partial and full sentences can be an
effective measure between those two model classes. Secondly, the metric can be
used as an early stopping criteria for instruct tuning. We compute IFS for
Supervised Fine-Tuning (SFT) of 7B and 13B LLaMA models, showing that models
learn to follow instructions relatively early in the training process, and the
further finetuning can result in changes in the underlying base model
semantics. As an example of semantics change we show the objectivity of model
predictions, as defined by an auxiliary metric ObjecQA. We show that in this
particular case, semantic changes are the steepest when the IFS tends to
plateau. We hope that decomposing instruct tuning into IFS and semantic factors
starts a new trend in better controllable instruct tuning and opens
possibilities for designing minimal instruct interfaces querying foundation
models.
| no_new_dataset | 0.704173 |
2307.03694 | Shuai Tang | Martin Bertran, Shuai Tang, Michael Kearns, Jamie Morgenstern, Aaron
Roth, Zhiwei Steven Wu | Scalable Membership Inference Attacks via Quantile Regression | null | null | null | null | cs.LG cs.AI cs.CR | http://creativecommons.org/licenses/by/4.0/ | Membership inference attacks are designed to determine, using black box
access to trained models, whether a particular example was used in training or
not. Membership inference can be formalized as a hypothesis testing problem.
The most effective existing attacks estimate the distribution of some test
statistic (usually the model's confidence on the true label) on points that
were (and were not) used in training by training many \emph{shadow models} --
i.e. models of the same architecture as the model being attacked, trained on a
random subsample of data. While effective, these attacks are extremely
computationally expensive, especially when the model under attack is large.
We introduce a new class of attacks based on performing quantile regression
on the distribution of confidence scores induced by the model under attack on
points that are not used in training. We show that our method is competitive
with state-of-the-art shadow model attacks, while requiring substantially less
compute because our attack requires training only a single model. Moreover,
unlike shadow model attacks, our proposed attack does not require any knowledge
of the architecture of the model under attack and is therefore truly
``black-box". We show the efficacy of this approach in an extensive series of
experiments on various datasets and model architectures.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 16:07:00 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Bertran",
"Martin",
""
],
[
"Tang",
"Shuai",
""
],
[
"Kearns",
"Michael",
""
],
[
"Morgenstern",
"Jamie",
""
],
[
"Roth",
"Aaron",
""
],
[
"Wu",
"Zhiwei Steven",
""
]
] | TITLE: Scalable Membership Inference Attacks via Quantile Regression
ABSTRACT: Membership inference attacks are designed to determine, using black box
access to trained models, whether a particular example was used in training or
not. Membership inference can be formalized as a hypothesis testing problem.
The most effective existing attacks estimate the distribution of some test
statistic (usually the model's confidence on the true label) on points that
were (and were not) used in training by training many \emph{shadow models} --
i.e. models of the same architecture as the model being attacked, trained on a
random subsample of data. While effective, these attacks are extremely
computationally expensive, especially when the model under attack is large.
We introduce a new class of attacks based on performing quantile regression
on the distribution of confidence scores induced by the model under attack on
points that are not used in training. We show that our method is competitive
with state-of-the-art shadow model attacks, while requiring substantially less
compute because our attack requires training only a single model. Moreover,
unlike shadow model attacks, our proposed attack does not require any knowledge
of the architecture of the model under attack and is therefore truly
``black-box". We show the efficacy of this approach in an extensive series of
experiments on various datasets and model architectures.
| no_new_dataset | 0.71103 |
2307.03719 | Jonathan Yang | Jonathan Yang, Dorsa Sadigh, Chelsea Finn | Polybot: Training One Policy Across Robots While Embracing Variability | 17 pages, 11 figures | null | null | null | cs.RO cs.LG | http://creativecommons.org/licenses/by/4.0/ | Reusing large datasets is crucial to scale vision-based robotic manipulators
to everyday scenarios due to the high cost of collecting robotic datasets.
However, robotic platforms possess varying control schemes, camera viewpoints,
kinematic configurations, and end-effector morphologies, posing significant
challenges when transferring manipulation skills from one platform to another.
To tackle this problem, we propose a set of key design decisions to train a
single policy for deployment on multiple robotic platforms. Our framework first
aligns the observation and action spaces of our policy across embodiments via
utilizing wrist cameras and a unified, but modular codebase. To bridge the
remaining domain shift, we align our policy's internal representations across
embodiments through contrastive learning. We evaluate our method on a dataset
collected over 60 hours spanning 6 tasks and 3 robots with varying joint
configurations and sizes: the WidowX 250S, the Franka Emika Panda, and the
Sawyer. Our results demonstrate significant improvements in success rate and
sample efficiency for our policy when using new task data collected on a
different robot, validating our proposed design decisions. More details and
videos can be found on our anonymized project website:
https://sites.google.com/view/polybot-multirobot
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 17:21:16 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Yang",
"Jonathan",
""
],
[
"Sadigh",
"Dorsa",
""
],
[
"Finn",
"Chelsea",
""
]
] | TITLE: Polybot: Training One Policy Across Robots While Embracing Variability
ABSTRACT: Reusing large datasets is crucial to scale vision-based robotic manipulators
to everyday scenarios due to the high cost of collecting robotic datasets.
However, robotic platforms possess varying control schemes, camera viewpoints,
kinematic configurations, and end-effector morphologies, posing significant
challenges when transferring manipulation skills from one platform to another.
To tackle this problem, we propose a set of key design decisions to train a
single policy for deployment on multiple robotic platforms. Our framework first
aligns the observation and action spaces of our policy across embodiments via
utilizing wrist cameras and a unified, but modular codebase. To bridge the
remaining domain shift, we align our policy's internal representations across
embodiments through contrastive learning. We evaluate our method on a dataset
collected over 60 hours spanning 6 tasks and 3 robots with varying joint
configurations and sizes: the WidowX 250S, the Franka Emika Panda, and the
Sawyer. Our results demonstrate significant improvements in success rate and
sample efficiency for our policy when using new task data collected on a
different robot, validating our proposed design decisions. More details and
videos can be found on our anonymized project website:
https://sites.google.com/view/polybot-multirobot
| no_new_dataset | 0.705798 |
2307.03734 | Krishnapriya Vishnubhotla | Krishnapriya Vishnubhotla, Frank Rudzicz, Graeme Hirst, Adam Hammond | Improving Automatic Quotation Attribution in Literary Novels | Accepted to ACL 2023, short paper | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Current models for quotation attribution in literary novels assume varying
levels of available information in their training and test data, which poses a
challenge for in-the-wild inference. Here, we approach quotation attribution as
a set of four interconnected sub-tasks: character identification, coreference
resolution, quotation identification, and speaker attribution. We benchmark
state-of-the-art models on each of these sub-tasks independently, using a large
dataset of annotated coreferences and quotations in literary novels (the
Project Dialogism Novel Corpus). We also train and evaluate models for the
speaker attribution task in particular, showing that a simple sequential
prediction model achieves accuracy scores on par with state-of-the-art models.
| [
{
"version": "v1",
"created": "Fri, 7 Jul 2023 17:37:01 GMT"
}
] | 2023-07-10T00:00:00 | [
[
"Vishnubhotla",
"Krishnapriya",
""
],
[
"Rudzicz",
"Frank",
""
],
[
"Hirst",
"Graeme",
""
],
[
"Hammond",
"Adam",
""
]
] | TITLE: Improving Automatic Quotation Attribution in Literary Novels
ABSTRACT: Current models for quotation attribution in literary novels assume varying
levels of available information in their training and test data, which poses a
challenge for in-the-wild inference. Here, we approach quotation attribution as
a set of four interconnected sub-tasks: character identification, coreference
resolution, quotation identification, and speaker attribution. We benchmark
state-of-the-art models on each of these sub-tasks independently, using a large
dataset of annotated coreferences and quotations in literary novels (the
Project Dialogism Novel Corpus). We also train and evaluate models for the
speaker attribution task in particular, showing that a simple sequential
prediction model achieves accuracy scores on par with state-of-the-art models.
| no_new_dataset | 0.703906 |
2103.09118 | Joseph Robinson | Joseph P Robinson and Can Qin and Yann Henon and Samson Timoner and
Yun Fu | Balancing Biases and Preserving Privacy on Balanced Faces in the Wild | arXiv admin note: text overlap with arXiv:2102.08941 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are demographic biases present in current facial recognition (FR)
models. To measure these biases across different ethnic and gender subgroups,
we introduce our Balanced Faces in the Wild (BFW) dataset. This dataset allows
for the characterization of FR performance per subgroup. We found that relying
on a single score threshold to differentiate between genuine and imposters
sample pairs leads to suboptimal results. Additionally, performance within
subgroups often varies significantly from the global average. Therefore,
specific error rates only hold for populations that match the validation data.
To mitigate imbalanced performances, we propose a novel domain adaptation
learning scheme that uses facial features extracted from state-of-the-art
neural networks. This scheme boosts the average performance and preserves
identity information while removing demographic knowledge. Removing demographic
knowledge prevents potential biases from affecting decision-making and protects
privacy by eliminating demographic information. We explore the proposed method
and demonstrate that subgroup classifiers can no longer learn from features
projected using our domain adaptation scheme. For access to the source code and
data, please visit https://github.com/visionjo/facerec-bias-bfw.
| [
{
"version": "v1",
"created": "Tue, 16 Mar 2021 15:05:49 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jun 2021 12:21:18 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Jun 2022 21:11:08 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Nov 2022 20:27:31 GMT"
},
{
"version": "v5",
"created": "Wed, 5 Jul 2023 20:06:22 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Robinson",
"Joseph P",
""
],
[
"Qin",
"Can",
""
],
[
"Henon",
"Yann",
""
],
[
"Timoner",
"Samson",
""
],
[
"Fu",
"Yun",
""
]
] | TITLE: Balancing Biases and Preserving Privacy on Balanced Faces in the Wild
ABSTRACT: There are demographic biases present in current facial recognition (FR)
models. To measure these biases across different ethnic and gender subgroups,
we introduce our Balanced Faces in the Wild (BFW) dataset. This dataset allows
for the characterization of FR performance per subgroup. We found that relying
on a single score threshold to differentiate between genuine and imposters
sample pairs leads to suboptimal results. Additionally, performance within
subgroups often varies significantly from the global average. Therefore,
specific error rates only hold for populations that match the validation data.
To mitigate imbalanced performances, we propose a novel domain adaptation
learning scheme that uses facial features extracted from state-of-the-art
neural networks. This scheme boosts the average performance and preserves
identity information while removing demographic knowledge. Removing demographic
knowledge prevents potential biases from affecting decision-making and protects
privacy by eliminating demographic information. We explore the proposed method
and demonstrate that subgroup classifiers can no longer learn from features
projected using our domain adaptation scheme. For access to the source code and
data, please visit https://github.com/visionjo/facerec-bias-bfw.
| new_dataset | 0.715778 |
2111.11976 | Zhen Cao | Zhen Cao, Wenxiao Zhang, Xin Wen, Zhen Dong, Yu-shen Liu, Xiongwu
Xiao, Bisheng Yang | KTNet: Knowledge Transfer for Unpaired 3D Shape Completion | null | AAAI2023 | 10.1609/aaai.v37i1.25101 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unpaired 3D object completion aims to predict a complete 3D shape from an
incomplete input without knowing the correspondence between the complete and
incomplete shapes. In this paper, we propose the novel KTNet to solve this task
from the new perspective of knowledge transfer. KTNet elaborates a
teacher-assistant-student network to establish multiple knowledge transfer
processes. Specifically, the teacher network takes complete shape as input and
learns the knowledge of complete shape. The student network takes the
incomplete one as input and restores the corresponding complete shape. And the
assistant modules not only help to transfer the knowledge of complete shape
from the teacher to the student, but also judge the learning effect of the
student network. As a result, KTNet makes use of a more comprehensive
understanding to establish the geometric correspondence between complete and
incomplete shapes in a perspective of knowledge transfer, which enables more
detailed geometric inference for generating high-quality complete shapes. We
conduct comprehensive experiments on several datasets, and the results show
that our method outperforms previous methods of unpaired point cloud completion
by a large margin.
| [
{
"version": "v1",
"created": "Tue, 23 Nov 2021 16:10:06 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jul 2022 10:54:54 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Aug 2022 08:46:16 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Cao",
"Zhen",
""
],
[
"Zhang",
"Wenxiao",
""
],
[
"Wen",
"Xin",
""
],
[
"Dong",
"Zhen",
""
],
[
"Liu",
"Yu-shen",
""
],
[
"Xiao",
"Xiongwu",
""
],
[
"Yang",
"Bisheng",
""
]
] | TITLE: KTNet: Knowledge Transfer for Unpaired 3D Shape Completion
ABSTRACT: Unpaired 3D object completion aims to predict a complete 3D shape from an
incomplete input without knowing the correspondence between the complete and
incomplete shapes. In this paper, we propose the novel KTNet to solve this task
from the new perspective of knowledge transfer. KTNet elaborates a
teacher-assistant-student network to establish multiple knowledge transfer
processes. Specifically, the teacher network takes complete shape as input and
learns the knowledge of complete shape. The student network takes the
incomplete one as input and restores the corresponding complete shape. And the
assistant modules not only help to transfer the knowledge of complete shape
from the teacher to the student, but also judge the learning effect of the
student network. As a result, KTNet makes use of a more comprehensive
understanding to establish the geometric correspondence between complete and
incomplete shapes in a perspective of knowledge transfer, which enables more
detailed geometric inference for generating high-quality complete shapes. We
conduct comprehensive experiments on several datasets, and the results show
that our method outperforms previous methods of unpaired point cloud completion
by a large margin.
| no_new_dataset | 0.710867 |
2111.14517 | Weixiao Liu | Weixiao Liu, Yuwei Wu, Sipu Ruan, Gregory S. Chirikjian | Robust and Accurate Superquadric Recovery: a Probabilistic Approach | Accepted to CVPR2022 Oral | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interpreting objects with basic geometric primitives has long been studied in
computer vision. Among geometric primitives, superquadrics are well known for
their ability to represent a wide range of shapes with few parameters. However,
as the first and foremost step, recovering superquadrics accurately and
robustly from 3D data still remains challenging. The existing methods are
subject to local optima and sensitive to noise and outliers in real-world
scenarios, resulting in frequent failure in capturing geometric shapes. In this
paper, we propose the first probabilistic method to recover superquadrics from
point clouds. Our method builds a Gaussian-uniform mixture model (GUM) on the
parametric surface of a superquadric, which explicitly models the generation of
outliers and noise. The superquadric recovery is formulated as a Maximum
Likelihood Estimation (MLE) problem. We propose an algorithm, Expectation,
Maximization, and Switching (EMS), to solve this problem, where: (1) outliers
are predicted from the posterior perspective; (2) the superquadric parameter is
optimized by the trust-region reflective algorithm; and (3) local optima are
avoided by globally searching and switching among parameters encoding similar
superquadrics. We show that our method can be extended to the
multi-superquadrics recovery for complex objects. The proposed method
outperforms the state-of-the-art in terms of accuracy, efficiency, and
robustness on both synthetic and real-world datasets. The code is at
http://github.com/bmlklwx/EMS-superquadric_fitting.git.
| [
{
"version": "v1",
"created": "Mon, 29 Nov 2021 13:17:17 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Mar 2022 15:05:49 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jul 2023 19:24:27 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Liu",
"Weixiao",
""
],
[
"Wu",
"Yuwei",
""
],
[
"Ruan",
"Sipu",
""
],
[
"Chirikjian",
"Gregory S.",
""
]
] | TITLE: Robust and Accurate Superquadric Recovery: a Probabilistic Approach
ABSTRACT: Interpreting objects with basic geometric primitives has long been studied in
computer vision. Among geometric primitives, superquadrics are well known for
their ability to represent a wide range of shapes with few parameters. However,
as the first and foremost step, recovering superquadrics accurately and
robustly from 3D data still remains challenging. The existing methods are
subject to local optima and sensitive to noise and outliers in real-world
scenarios, resulting in frequent failure in capturing geometric shapes. In this
paper, we propose the first probabilistic method to recover superquadrics from
point clouds. Our method builds a Gaussian-uniform mixture model (GUM) on the
parametric surface of a superquadric, which explicitly models the generation of
outliers and noise. The superquadric recovery is formulated as a Maximum
Likelihood Estimation (MLE) problem. We propose an algorithm, Expectation,
Maximization, and Switching (EMS), to solve this problem, where: (1) outliers
are predicted from the posterior perspective; (2) the superquadric parameter is
optimized by the trust-region reflective algorithm; and (3) local optima are
avoided by globally searching and switching among parameters encoding similar
superquadrics. We show that our method can be extended to the
multi-superquadrics recovery for complex objects. The proposed method
outperforms the state-of-the-art in terms of accuracy, efficiency, and
robustness on both synthetic and real-world datasets. The code is at
http://github.com/bmlklwx/EMS-superquadric_fitting.git.
| no_new_dataset | 0.710465 |
2201.07856 | Ben Glocker | M\'elanie Bernhardt, Charles Jones, Ben Glocker | Potential sources of dataset bias complicate investigation of
underdiagnosis by machine learning algorithms | Published as Matters Arising in Nature Medicine | null | 10.1038/s41591-022-01846-8 | null | cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | An increasing number of reports raise concerns about the risk that machine
learning algorithms could amplify health disparities due to biases embedded in
the training data. Seyyed-Kalantari et al. find that models trained on three
chest X-ray datasets yield disparities in false-positive rates (FPR) across
subgroups on the 'no-finding' label (indicating the absence of disease). The
models consistently yield higher FPR on subgroups known to be historically
underserved, and the study concludes that the models exhibit and potentially
even amplify systematic underdiagnosis. We argue that the experimental setup in
the study is insufficient to study algorithmic underdiagnosis. In the absence
of specific knowledge (or assumptions) about the extent and nature of the
dataset bias, it is difficult to investigate model bias. Importantly, their use
of test data exhibiting the same bias as the training data (due to random
splitting) severely complicates the interpretation of the reported disparities.
| [
{
"version": "v1",
"created": "Wed, 19 Jan 2022 20:51:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 06:01:08 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Bernhardt",
"Mélanie",
""
],
[
"Jones",
"Charles",
""
],
[
"Glocker",
"Ben",
""
]
] | TITLE: Potential sources of dataset bias complicate investigation of
underdiagnosis by machine learning algorithms
ABSTRACT: An increasing number of reports raise concerns about the risk that machine
learning algorithms could amplify health disparities due to biases embedded in
the training data. Seyyed-Kalantari et al. find that models trained on three
chest X-ray datasets yield disparities in false-positive rates (FPR) across
subgroups on the 'no-finding' label (indicating the absence of disease). The
models consistently yield higher FPR on subgroups known to be historically
underserved, and the study concludes that the models exhibit and potentially
even amplify systematic underdiagnosis. We argue that the experimental setup in
the study is insufficient to study algorithmic underdiagnosis. In the absence
of specific knowledge (or assumptions) about the extent and nature of the
dataset bias, it is difficult to investigate model bias. Importantly, their use
of test data exhibiting the same bias as the training data (due to random
splitting) severely complicates the interpretation of the reported disparities.
| no_new_dataset | 0.711036 |
2203.00126 | Xiucai Ding | Xiucai Ding and Rong Ma | Learning Low-Dimensional Nonlinear Structures from High-Dimensional
Noisy Data: An Integral Operator Approach | Accepted to the Annals of Statistics | null | null | null | stat.ML cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | We propose a kernel-spectral embedding algorithm for learning low-dimensional
nonlinear structures from high-dimensional and noisy observations, where the
datasets are assumed to be sampled from an intrinsically low-dimensional
manifold and corrupted by high-dimensional noise. The algorithm employs an
adaptive bandwidth selection procedure which does not rely on prior knowledge
of the underlying manifold. The obtained low-dimensional embeddings can be
further utilized for downstream purposes such as data visualization, clustering
and prediction. Our method is theoretically justified and practically
interpretable. Specifically, we establish the convergence of the final
embeddings to their noiseless counterparts when the dimension and size of the
samples are comparably large, and characterize the effect of the
signal-to-noise ratio on the rate of convergence and phase transition. We also
prove convergence of the embeddings to the eigenfunctions of an integral
operator defined by the kernel map of some reproducing kernel Hilbert space
capturing the underlying nonlinear structures. Numerical simulations and
analysis of three real datasets show the superior empirical performance of the
proposed method, compared to many existing methods, on learning various
manifolds in diverse applications.
| [
{
"version": "v1",
"created": "Mon, 28 Feb 2022 22:46:34 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 06:34:13 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ding",
"Xiucai",
""
],
[
"Ma",
"Rong",
""
]
] | TITLE: Learning Low-Dimensional Nonlinear Structures from High-Dimensional
Noisy Data: An Integral Operator Approach
ABSTRACT: We propose a kernel-spectral embedding algorithm for learning low-dimensional
nonlinear structures from high-dimensional and noisy observations, where the
datasets are assumed to be sampled from an intrinsically low-dimensional
manifold and corrupted by high-dimensional noise. The algorithm employs an
adaptive bandwidth selection procedure which does not rely on prior knowledge
of the underlying manifold. The obtained low-dimensional embeddings can be
further utilized for downstream purposes such as data visualization, clustering
and prediction. Our method is theoretically justified and practically
interpretable. Specifically, we establish the convergence of the final
embeddings to their noiseless counterparts when the dimension and size of the
samples are comparably large, and characterize the effect of the
signal-to-noise ratio on the rate of convergence and phase transition. We also
prove convergence of the embeddings to the eigenfunctions of an integral
operator defined by the kernel map of some reproducing kernel Hilbert space
capturing the underlying nonlinear structures. Numerical simulations and
analysis of three real datasets show the superior empirical performance of the
proposed method, compared to many existing methods, on learning various
manifolds in diverse applications.
| no_new_dataset | 0.709849 |
2206.04779 | Cong Lu | Cong Lu, Philip J. Ball, Tim G. J. Rudner, Jack Parker-Holder, Michael
A. Osborne, Yee Whye Teh | Challenges and Opportunities in Offline Reinforcement Learning from
Visual Observations | Published at TMLR, 2023 | null | null | null | cs.LG cs.AI cs.CV stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Offline reinforcement learning has shown great promise in leveraging large
pre-collected datasets for policy learning, allowing agents to forgo
often-expensive online data collection. However, offline reinforcement learning
from visual observations with continuous action spaces remains under-explored,
with a limited understanding of the key challenges in this complex domain. In
this paper, we establish simple baselines for continuous control in the visual
domain and introduce a suite of benchmarking tasks for offline reinforcement
learning from visual observations designed to better represent the data
distributions present in real-world offline RL problems and guided by a set of
desiderata for offline RL from visual observations, including robustness to
visual distractions and visually identifiable changes in dynamics. Using this
suite of benchmarking tasks, we show that simple modifications to two popular
vision-based online reinforcement learning algorithms, DreamerV2 and DrQ-v2,
suffice to outperform existing offline RL methods and establish competitive
baselines for continuous control in the visual domain. We rigorously evaluate
these algorithms and perform an empirical evaluation of the differences between
state-of-the-art model-based and model-free offline RL methods for continuous
control from visual observations. All code and data used in this evaluation are
open-sourced to facilitate progress in this domain.
| [
{
"version": "v1",
"created": "Thu, 9 Jun 2022 22:08:47 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Aug 2022 19:45:26 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Jul 2023 16:46:11 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Lu",
"Cong",
""
],
[
"Ball",
"Philip J.",
""
],
[
"Rudner",
"Tim G. J.",
""
],
[
"Parker-Holder",
"Jack",
""
],
[
"Osborne",
"Michael A.",
""
],
[
"Teh",
"Yee Whye",
""
]
] | TITLE: Challenges and Opportunities in Offline Reinforcement Learning from
Visual Observations
ABSTRACT: Offline reinforcement learning has shown great promise in leveraging large
pre-collected datasets for policy learning, allowing agents to forgo
often-expensive online data collection. However, offline reinforcement learning
from visual observations with continuous action spaces remains under-explored,
with a limited understanding of the key challenges in this complex domain. In
this paper, we establish simple baselines for continuous control in the visual
domain and introduce a suite of benchmarking tasks for offline reinforcement
learning from visual observations designed to better represent the data
distributions present in real-world offline RL problems and guided by a set of
desiderata for offline RL from visual observations, including robustness to
visual distractions and visually identifiable changes in dynamics. Using this
suite of benchmarking tasks, we show that simple modifications to two popular
vision-based online reinforcement learning algorithms, DreamerV2 and DrQ-v2,
suffice to outperform existing offline RL methods and establish competitive
baselines for continuous control in the visual domain. We rigorously evaluate
these algorithms and perform an empirical evaluation of the differences between
state-of-the-art model-based and model-free offline RL methods for continuous
control from visual observations. All code and data used in this evaluation are
open-sourced to facilitate progress in this domain.
| no_new_dataset | 0.709655 |
2206.04832 | Tsun Hin Cheung | Tsun-Hin Cheung, Kin-Man Lam | Unifying Multimodal Source and Propagation Graph for Rumour Detection on
Social Media with Missing Features | null | null | null | null | cs.MM cs.SI | http://creativecommons.org/licenses/by/4.0/ | With the rapid development of online social media platforms, the spread of
rumours has become a critical societal concern. Current methods for rumour
detection can be categorized into image-text pair classification and
source-reply graph classification. In this paper, we propose a novel approach
that combines multimodal source and propagation graph features for rumour
classification. We introduce the Unified Multimodal Graph Transformer Network
(UMGTN) which integrates Transformer encoders to fuse these features. Given
that not every message in social media is associated with an image and
community responses in propagation graphs do not immediately follow source
messages, our aim is to build a network architecture that handles missing
features such as images or replies. To enhance the model's robustness to data
with missing features, we adopt a multitask learning framework that
simultaneously learns representations between samples with complete and missing
features. We evaluate our proposed method on four real-world datasets,
augmenting them by recovering images and replies from Twitter and Weibo.
Experimental results demonstrate that our UMGTN with multitask learning
achieves state-of-the-art performance, improving F1-score by 1.0% to 4.0%,
while maintaining detection robustness to missing features within 2% accuracy
and F1-score compared to models trained without the multitask learning
framework. We have made our models and datasets publicly available at:
https://thcheung.github.io/umgtn/.
| [
{
"version": "v1",
"created": "Fri, 10 Jun 2022 01:30:15 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 12:46:49 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Cheung",
"Tsun-Hin",
""
],
[
"Lam",
"Kin-Man",
""
]
] | TITLE: Unifying Multimodal Source and Propagation Graph for Rumour Detection on
Social Media with Missing Features
ABSTRACT: With the rapid development of online social media platforms, the spread of
rumours has become a critical societal concern. Current methods for rumour
detection can be categorized into image-text pair classification and
source-reply graph classification. In this paper, we propose a novel approach
that combines multimodal source and propagation graph features for rumour
classification. We introduce the Unified Multimodal Graph Transformer Network
(UMGTN) which integrates Transformer encoders to fuse these features. Given
that not every message in social media is associated with an image and
community responses in propagation graphs do not immediately follow source
messages, our aim is to build a network architecture that handles missing
features such as images or replies. To enhance the model's robustness to data
with missing features, we adopt a multitask learning framework that
simultaneously learns representations between samples with complete and missing
features. We evaluate our proposed method on four real-world datasets,
augmenting them by recovering images and replies from Twitter and Weibo.
Experimental results demonstrate that our UMGTN with multitask learning
achieves state-of-the-art performance, improving F1-score by 1.0% to 4.0%,
while maintaining detection robustness to missing features within 2% accuracy
and F1-score compared to models trained without the multitask learning
framework. We have made our models and datasets publicly available at:
https://thcheung.github.io/umgtn/.
| no_new_dataset | 0.711205 |
2206.08137 | Jorge Mariscal Harana | Jorge Mariscal-Harana (1), Clint Asher (1,2), Vittoria Vergani (1),
Maleeha Rizvi (1,2), Louise Keehn (3), Raymond J. Kim (4), Robert M. Judd
(4), Steffen E. Petersen (5,6,7,8), Reza Razavi (1,2), Andrew King (1), Bram
Ruijsink (1,2,9), Esther Puyol-Ant\'on (1) ((1) School of Biomedical
Engineering and Imaging Sciences, King's College London, London, UK, (2)
Department of Adult and Paediatric Cardiology, Guy's and St Thomas' NHS
Foundation Trust, London, UK, (3) Department of Clinical Pharmacology, King's
College London British Heart Foundation Centre, St Thomas' Hospital, London,
UK, (4) Division of Cardiology, Department of Medicine, Duke University,
Durham, North Carolina, USA, (5) National Institute for Health Research
(NIHR) Barts Biomedical Research Centre, William Harvey Research Institute,
Queen Mary University London, London, UK, (6) Barts Heart Centre, St
Bartholomew's Hospital, Barts Health NHS Trust, London, UK, (7) Health Data
Research UK, London, UK, (8) Alan Turing Institute, London, UK, (9)
Department of Cardiology, Heart and Lung Division, University Medical Center
Utrecht, Utrecht, The Netherlands) | An AI tool for automated analysis of large-scale unstructured clinical
cine CMR databases | Accepted at EHJ Digital Health; Bram Ruijsink and Esther
Puyol-Ant\'on are shared last authors | null | null | null | eess.IV cs.LG q-bio.QM | http://creativecommons.org/licenses/by/4.0/ | Artificial intelligence (AI) techniques have been proposed for automating
analysis of short axis (SAX) cine cardiac magnetic resonance (CMR), but no CMR
analysis tool exists to automatically analyse large (unstructured) clinical CMR
datasets. We develop and validate a robust AI tool for start-to-end automatic
quantification of cardiac function from SAX cine CMR in large clinical
databases. Our pipeline for processing and analysing CMR databases includes
automated steps to identify the correct data, robust image pre-processing, an
AI algorithm for biventricular segmentation of SAX CMR and estimation of
functional biomarkers, and automated post-analysis quality control to detect
and correct errors. The segmentation algorithm was trained on 2793 CMR scans
from two NHS hospitals and validated on additional cases from this dataset
(n=414) and five external datasets (n=6888), including scans of patients with a
range of diseases acquired at 12 different centres using CMR scanners from all
major vendors. Median absolute errors in cardiac biomarkers were within the
range of inter-observer variability: <8.4mL (left ventricle volume), <9.2mL
(right ventricle volume), <13.3g (left ventricular mass), and <5.9% (ejection
fraction) across all datasets. Stratification of cases according to phenotypes
of cardiac disease and scanner vendors showed good performance across all
groups. We show that our proposed tool, which combines image pre-processing
steps, a domain-generalisable AI algorithm trained on a large-scale
multi-domain CMR dataset and quality control steps, allows robust analysis of
(clinical or research) databases from multiple centres, vendors, and cardiac
diseases. This enables translation of our tool for use in fully-automated
processing of large multi-centre databases.
| [
{
"version": "v1",
"created": "Wed, 15 Jun 2022 11:54:51 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2023 20:32:16 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Mariscal-Harana",
"Jorge",
""
],
[
"Asher",
"Clint",
""
],
[
"Vergani",
"Vittoria",
""
],
[
"Rizvi",
"Maleeha",
""
],
[
"Keehn",
"Louise",
""
],
[
"Kim",
"Raymond J.",
""
],
[
"Judd",
"Robert M.",
""
],
[
"Petersen",
"Steffen E.",
""
],
[
"Razavi",
"Reza",
""
],
[
"King",
"Andrew",
""
],
[
"Ruijsink",
"Bram",
""
],
[
"Puyol-Antón",
"Esther",
""
]
] | TITLE: An AI tool for automated analysis of large-scale unstructured clinical
cine CMR databases
ABSTRACT: Artificial intelligence (AI) techniques have been proposed for automating
analysis of short axis (SAX) cine cardiac magnetic resonance (CMR), but no CMR
analysis tool exists to automatically analyse large (unstructured) clinical CMR
datasets. We develop and validate a robust AI tool for start-to-end automatic
quantification of cardiac function from SAX cine CMR in large clinical
databases. Our pipeline for processing and analysing CMR databases includes
automated steps to identify the correct data, robust image pre-processing, an
AI algorithm for biventricular segmentation of SAX CMR and estimation of
functional biomarkers, and automated post-analysis quality control to detect
and correct errors. The segmentation algorithm was trained on 2793 CMR scans
from two NHS hospitals and validated on additional cases from this dataset
(n=414) and five external datasets (n=6888), including scans of patients with a
range of diseases acquired at 12 different centres using CMR scanners from all
major vendors. Median absolute errors in cardiac biomarkers were within the
range of inter-observer variability: <8.4mL (left ventricle volume), <9.2mL
(right ventricle volume), <13.3g (left ventricular mass), and <5.9% (ejection
fraction) across all datasets. Stratification of cases according to phenotypes
of cardiac disease and scanner vendors showed good performance across all
groups. We show that our proposed tool, which combines image pre-processing
steps, a domain-generalisable AI algorithm trained on a large-scale
multi-domain CMR dataset and quality control steps, allows robust analysis of
(clinical or research) databases from multiple centres, vendors, and cardiac
diseases. This enables translation of our tool for use in fully-automated
processing of large multi-centre databases.
| no_new_dataset | 0.711675 |
2206.13102 | Niki Kilbertus | Jiri Hron, Karl Krauth, Michael I. Jordan, Niki Kilbertus, Sarah Dean | Modeling Content Creator Incentives on Algorithm-Curated Platforms | presented at ICLR 2023 (top 5%) | null | null | null | cs.GT cs.CY cs.IR cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Content creators compete for user attention. Their reach crucially depends on
algorithmic choices made by developers on online platforms. To maximize
exposure, many creators adapt strategically, as evidenced by examples like the
sprawling search engine optimization industry. This begets competition for the
finite user attention pool. We formalize these dynamics in what we call an
exposure game, a model of incentives induced by algorithms, including modern
factorization and (deep) two-tower architectures. We prove that seemingly
innocuous algorithmic choices, e.g., non-negative vs. unconstrained
factorization, significantly affect the existence and character of (Nash)
equilibria in exposure games. We proffer use of creator behavior models, like
exposure games, for an (ex-ante) pre-deployment audit. Such an audit can
identify misalignment between desirable and incentivized content, and thus
complement post-hoc measures like content filtering and moderation. To this
end, we propose tools for numerically finding equilibria in exposure games, and
illustrate results of an audit on the MovieLens and LastFM datasets. Among
else, we find that the strategically produced content exhibits strong
dependence between algorithmic exploration and content diversity, and between
model expressivity and bias towards gender-based user and creator groups.
| [
{
"version": "v1",
"created": "Mon, 27 Jun 2022 08:16:59 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 07:24:25 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Hron",
"Jiri",
""
],
[
"Krauth",
"Karl",
""
],
[
"Jordan",
"Michael I.",
""
],
[
"Kilbertus",
"Niki",
""
],
[
"Dean",
"Sarah",
""
]
] | TITLE: Modeling Content Creator Incentives on Algorithm-Curated Platforms
ABSTRACT: Content creators compete for user attention. Their reach crucially depends on
algorithmic choices made by developers on online platforms. To maximize
exposure, many creators adapt strategically, as evidenced by examples like the
sprawling search engine optimization industry. This begets competition for the
finite user attention pool. We formalize these dynamics in what we call an
exposure game, a model of incentives induced by algorithms, including modern
factorization and (deep) two-tower architectures. We prove that seemingly
innocuous algorithmic choices, e.g., non-negative vs. unconstrained
factorization, significantly affect the existence and character of (Nash)
equilibria in exposure games. We proffer use of creator behavior models, like
exposure games, for an (ex-ante) pre-deployment audit. Such an audit can
identify misalignment between desirable and incentivized content, and thus
complement post-hoc measures like content filtering and moderation. To this
end, we propose tools for numerically finding equilibria in exposure games, and
illustrate results of an audit on the MovieLens and LastFM datasets. Among
else, we find that the strategically produced content exhibits strong
dependence between algorithmic exploration and content diversity, and between
model expressivity and bias towards gender-based user and creator groups.
| no_new_dataset | 0.709868 |
2207.02911 | Can Chen | Can Chen, Yang-Yu Liu | A Survey on Hyperlink Prediction | 15 pages, 4 figures, 6 tables | IEEE Transactions on Neural Networks and Learning Systems, 2023 | 10.1109/TNNLS.2023.3286280 | null | cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a natural extension of link prediction on graphs, hyperlink prediction
aims for the inference of missing hyperlinks in hypergraphs, where a hyperlink
can connect more than two nodes. Hyperlink prediction has applications in a
wide range of systems, from chemical reaction networks, social communication
networks, to protein-protein interaction networks. In this paper, we provide a
systematic and comprehensive survey on hyperlink prediction. We propose a new
taxonomy to classify existing hyperlink prediction methods into four
categories: similarity-based, probability-based, matrix optimization-based, and
deep learning-based methods. To compare the performance of methods from
different categories, we perform a benchmark study on various hypergraph
applications using representative methods from each category. Notably, deep
learning-based methods prevail over other methods in hyperlink prediction.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2022 18:36:35 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chen",
"Can",
""
],
[
"Liu",
"Yang-Yu",
""
]
] | TITLE: A Survey on Hyperlink Prediction
ABSTRACT: As a natural extension of link prediction on graphs, hyperlink prediction
aims for the inference of missing hyperlinks in hypergraphs, where a hyperlink
can connect more than two nodes. Hyperlink prediction has applications in a
wide range of systems, from chemical reaction networks, social communication
networks, to protein-protein interaction networks. In this paper, we provide a
systematic and comprehensive survey on hyperlink prediction. We propose a new
taxonomy to classify existing hyperlink prediction methods into four
categories: similarity-based, probability-based, matrix optimization-based, and
deep learning-based methods. To compare the performance of methods from
different categories, we perform a benchmark study on various hypergraph
applications using representative methods from each category. Notably, deep
learning-based methods prevail over other methods in hyperlink prediction.
| no_new_dataset | 0.710019 |
2207.06225 | Xin Chen | Xin Chen, Alex Reibman, Sanjay Arora | Sequential Recommendation Model for Next Purchase Prediction | 18 pages, 9 figures | Computer Science & Information Technology (CS & IT), 13(10), 2013,
141-158 | 10.5121/csit.2023.1310013 | null | cs.IR cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Timeliness and contextual accuracy of recommendations are increasingly
important when delivering contemporary digital marketing experiences.
Conventional recommender systems (RS) suggest relevant but time-invariant items
to users by accounting for their past purchases. These recommendations only map
to customers' general preferences rather than a customer's specific needs
immediately preceding a purchase. In contrast, RSs that consider the order of
transactions, purchases, or experiences to measure evolving preferences can
offer more salient and effective recommendations to customers: Sequential RSs
not only benefit from a better behavioral understanding of a user's current
needs but also better predictive power. In this paper, we demonstrate and rank
the effectiveness of a sequential recommendation system by utilizing a
production dataset of over 2.7 million credit card transactions for 46K
cardholders. The method first employs an autoencoder on raw transaction data
and submits observed transaction encodings to a GRU-based sequential model. The
sequential model produces a MAP@1 metric of 47% on the out-of-sample test set,
in line with existing research. We also discuss implications for embedding
real-time predictions using the sequential RS into Nexus, a scalable,
low-latency, event-based digital experience architecture.
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2022 17:42:58 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2023 13:00:46 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chen",
"Xin",
""
],
[
"Reibman",
"Alex",
""
],
[
"Arora",
"Sanjay",
""
]
] | TITLE: Sequential Recommendation Model for Next Purchase Prediction
ABSTRACT: Timeliness and contextual accuracy of recommendations are increasingly
important when delivering contemporary digital marketing experiences.
Conventional recommender systems (RS) suggest relevant but time-invariant items
to users by accounting for their past purchases. These recommendations only map
to customers' general preferences rather than a customer's specific needs
immediately preceding a purchase. In contrast, RSs that consider the order of
transactions, purchases, or experiences to measure evolving preferences can
offer more salient and effective recommendations to customers: Sequential RSs
not only benefit from a better behavioral understanding of a user's current
needs but also better predictive power. In this paper, we demonstrate and rank
the effectiveness of a sequential recommendation system by utilizing a
production dataset of over 2.7 million credit card transactions for 46K
cardholders. The method first employs an autoencoder on raw transaction data
and submits observed transaction encodings to a GRU-based sequential model. The
sequential model produces a MAP@1 metric of 47% on the out-of-sample test set,
in line with existing research. We also discuss implications for embedding
real-time predictions using the sequential RS into Nexus, a scalable,
low-latency, event-based digital experience architecture.
| no_new_dataset | 0.695584 |
2208.05282 | Fahri Wisnu Murti | Fahri Wisnu Murti, Samad Ali, George Iosifidis, Matti Latva-aho | Deep Reinforcement Learning for Orchestrating Cost-Aware
Reconfigurations of vRANs | This article has been accepted for publication in IEEE Transactions
on Network and Service Management | null | 10.1109/TNSM.2023.3292713 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Virtualized Radio Access Networks (vRANs) are fully configurable and can be
implemented at a low cost over commodity platforms to enable network management
flexibility. In this paper, a novel vRAN reconfiguration problem is formulated
to jointly reconfigure the functional splits of the base stations (BSs),
locations of the virtualized central units (vCUs) and distributed units (vDUs),
their resources, and the routing for each BS data flow. The objective is to
minimize the long-term total network operation cost while adapting to the
varying traffic demands and resource availability. Testbed measurements are
performed to study the relationship between the traffic demands and computing
resources, which reveals high variance and depends on the platform and its
load. Consequently, finding the perfect model of the underlying system is
non-trivial. Therefore, to solve the proposed problem, a deep reinforcement
learning (RL)-based framework is proposed and developed using model-free RL
approaches. Moreover, the problem consists of multiple BSs sharing the same
resources, which results in a multi-dimensional discrete action space and leads
to a combinatorial number of possible actions. To overcome this curse of
dimensionality, action branching architecture, which is an action decomposition
method with a shared decision module followed by neural network is combined
with Dueling Double Deep Q-network (D3QN) algorithm. Simulations are carried
out using an O-RAN compliant model and real traces of the testbed. Our
numerical results show that the proposed framework successfully learns the
optimal policy that adaptively selects the vRAN configurations, where its
learning convergence can be further expedited through transfer learning even in
different vRAN systems. It offers significant cost savings by up to 59\% of a
static benchmark, 35\% of DDPG with discretization, and 76\% of non-branching
D3QN.
| [
{
"version": "v1",
"created": "Wed, 10 Aug 2022 11:30:31 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2022 02:15:27 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 18:43:22 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Murti",
"Fahri Wisnu",
""
],
[
"Ali",
"Samad",
""
],
[
"Iosifidis",
"George",
""
],
[
"Latva-aho",
"Matti",
""
]
] | TITLE: Deep Reinforcement Learning for Orchestrating Cost-Aware
Reconfigurations of vRANs
ABSTRACT: Virtualized Radio Access Networks (vRANs) are fully configurable and can be
implemented at a low cost over commodity platforms to enable network management
flexibility. In this paper, a novel vRAN reconfiguration problem is formulated
to jointly reconfigure the functional splits of the base stations (BSs),
locations of the virtualized central units (vCUs) and distributed units (vDUs),
their resources, and the routing for each BS data flow. The objective is to
minimize the long-term total network operation cost while adapting to the
varying traffic demands and resource availability. Testbed measurements are
performed to study the relationship between the traffic demands and computing
resources, which reveals high variance and depends on the platform and its
load. Consequently, finding the perfect model of the underlying system is
non-trivial. Therefore, to solve the proposed problem, a deep reinforcement
learning (RL)-based framework is proposed and developed using model-free RL
approaches. Moreover, the problem consists of multiple BSs sharing the same
resources, which results in a multi-dimensional discrete action space and leads
to a combinatorial number of possible actions. To overcome this curse of
dimensionality, action branching architecture, which is an action decomposition
method with a shared decision module followed by neural network is combined
with Dueling Double Deep Q-network (D3QN) algorithm. Simulations are carried
out using an O-RAN compliant model and real traces of the testbed. Our
numerical results show that the proposed framework successfully learns the
optimal policy that adaptively selects the vRAN configurations, where its
learning convergence can be further expedited through transfer learning even in
different vRAN systems. It offers significant cost savings by up to 59\% of a
static benchmark, 35\% of DDPG with discretization, and 76\% of non-branching
D3QN.
| no_new_dataset | 0.709573 |
2209.06890 | Gyan Tatiya | Gyan Tatiya and Jonathan Francis and Jivko Sinapov | Transferring Implicit Knowledge of Non-Visual Object Properties Across
Heterogeneous Robot Morphologies | In proceedings of the IEEE International Conference on Robotics and
Automation (ICRA), May 29 - June 2, 2023 , ExCeL London, UK | null | 10.1109/icra48891.2023.10160811 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Humans leverage multiple sensor modalities when interacting with objects and
discovering their intrinsic properties. Using the visual modality alone is
insufficient for deriving intuition behind object properties (e.g., which of
two boxes is heavier), making it essential to consider non-visual modalities as
well, such as the tactile and auditory. Whereas robots may leverage various
modalities to obtain object property understanding via learned exploratory
interactions with objects (e.g., grasping, lifting, and shaking behaviors),
challenges remain: the implicit knowledge acquired by one robot via object
exploration cannot be directly leveraged by another robot with different
morphology, because the sensor models, observed data distributions, and
interaction capabilities are different across these different robot
configurations. To avoid the costly process of learning interactive object
perception tasks from scratch, we propose a multi-stage projection framework
for each new robot for transferring implicit knowledge of object properties
across heterogeneous robot morphologies. We evaluate our approach on the
object-property recognition and object-identity recognition tasks, using a
dataset containing two heterogeneous robots that perform 7,600 object
interactions. Results indicate that knowledge can be transferred across robots,
such that a newly-deployed robot can bootstrap its recognition models without
exhaustively exploring all objects. We also propose a data augmentation
technique and show that this technique improves the generalization of models.
We release our code and datasets, here:
https://github.com/gtatiya/Implicit-Knowledge-Transfer.
| [
{
"version": "v1",
"created": "Wed, 14 Sep 2022 19:28:32 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 12:52:06 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Tatiya",
"Gyan",
""
],
[
"Francis",
"Jonathan",
""
],
[
"Sinapov",
"Jivko",
""
]
] | TITLE: Transferring Implicit Knowledge of Non-Visual Object Properties Across
Heterogeneous Robot Morphologies
ABSTRACT: Humans leverage multiple sensor modalities when interacting with objects and
discovering their intrinsic properties. Using the visual modality alone is
insufficient for deriving intuition behind object properties (e.g., which of
two boxes is heavier), making it essential to consider non-visual modalities as
well, such as the tactile and auditory. Whereas robots may leverage various
modalities to obtain object property understanding via learned exploratory
interactions with objects (e.g., grasping, lifting, and shaking behaviors),
challenges remain: the implicit knowledge acquired by one robot via object
exploration cannot be directly leveraged by another robot with different
morphology, because the sensor models, observed data distributions, and
interaction capabilities are different across these different robot
configurations. To avoid the costly process of learning interactive object
perception tasks from scratch, we propose a multi-stage projection framework
for each new robot for transferring implicit knowledge of object properties
across heterogeneous robot morphologies. We evaluate our approach on the
object-property recognition and object-identity recognition tasks, using a
dataset containing two heterogeneous robots that perform 7,600 object
interactions. Results indicate that knowledge can be transferred across robots,
such that a newly-deployed robot can bootstrap its recognition models without
exhaustively exploring all objects. We also propose a data augmentation
technique and show that this technique improves the generalization of models.
We release our code and datasets, here:
https://github.com/gtatiya/Implicit-Knowledge-Transfer.
| new_dataset | 0.558809 |
2210.14896 | Zijie Wang | Zijie J. Wang, Evan Montoya, David Munechika, Haoyang Yang, Benjamin
Hoover, Duen Horng Chau | DiffusionDB: A Large-scale Prompt Gallery Dataset for Text-to-Image
Generative Models | Accepted to ACL 2023 (nominated for best paper, top 1.6% of
submissions, oral presentation). 17 pages, 11 figures. The dataset is
available at https://huggingface.co/datasets/poloclub/diffusiondb. The code
is at https://github.com/poloclub/diffusiondb. The interactive visualization
demo is at https://poloclub.github.io/diffusiondb/explorer/ | null | null | null | cs.CV cs.AI cs.HC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With recent advancements in diffusion models, users can generate high-quality
images by writing text prompts in natural language. However, generating images
with desired details requires proper prompts, and it is often unclear how a
model reacts to different prompts or what the best prompts are. To help
researchers tackle these critical challenges, we introduce DiffusionDB, the
first large-scale text-to-image prompt dataset totaling 6.5TB, containing 14
million images generated by Stable Diffusion, 1.8 million unique prompts, and
hyperparameters specified by real users. We analyze the syntactic and semantic
characteristics of prompts. We pinpoint specific hyperparameter values and
prompt styles that can lead to model errors and present evidence of potentially
harmful model usage, such as the generation of misinformation. The
unprecedented scale and diversity of this human-actuated dataset provide
exciting research opportunities in understanding the interplay between prompts
and generative models, detecting deepfakes, and designing human-AI interaction
tools to help users more easily use these models. DiffusionDB is publicly
available at: https://poloclub.github.io/diffusiondb.
| [
{
"version": "v1",
"created": "Wed, 26 Oct 2022 17:54:20 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Nov 2022 17:31:08 GMT"
},
{
"version": "v3",
"created": "Mon, 22 May 2023 02:42:48 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Jul 2023 11:53:19 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Wang",
"Zijie J.",
""
],
[
"Montoya",
"Evan",
""
],
[
"Munechika",
"David",
""
],
[
"Yang",
"Haoyang",
""
],
[
"Hoover",
"Benjamin",
""
],
[
"Chau",
"Duen Horng",
""
]
] | TITLE: DiffusionDB: A Large-scale Prompt Gallery Dataset for Text-to-Image
Generative Models
ABSTRACT: With recent advancements in diffusion models, users can generate high-quality
images by writing text prompts in natural language. However, generating images
with desired details requires proper prompts, and it is often unclear how a
model reacts to different prompts or what the best prompts are. To help
researchers tackle these critical challenges, we introduce DiffusionDB, the
first large-scale text-to-image prompt dataset totaling 6.5TB, containing 14
million images generated by Stable Diffusion, 1.8 million unique prompts, and
hyperparameters specified by real users. We analyze the syntactic and semantic
characteristics of prompts. We pinpoint specific hyperparameter values and
prompt styles that can lead to model errors and present evidence of potentially
harmful model usage, such as the generation of misinformation. The
unprecedented scale and diversity of this human-actuated dataset provide
exciting research opportunities in understanding the interplay between prompts
and generative models, detecting deepfakes, and designing human-AI interaction
tools to help users more easily use these models. DiffusionDB is publicly
available at: https://poloclub.github.io/diffusiondb.
| new_dataset | 0.714777 |
2211.04750 | Jan Butora | Jan Butora, Pauline Puteaux, Patrick Bas | Errorless Robust JPEG Steganography using Outputs of JPEG Coders | 13 pages, 13 figures, 5 tables, submitted to IEEE Transactions on
Dependable and Secure Computing | null | null | null | cs.MM cs.CR eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Robust steganography is a technique of hiding secret messages in images so
that the message can be recovered after additional image processing. One of the
most popular processing operations is JPEG recompression. Unfortunately, most
of today's steganographic methods addressing this issue only provide a
probabilistic guarantee of recovering the secret and are consequently not
errorless. That is unacceptable since even a single unexpected change can make
the whole message unreadable if it is encrypted. We propose to create a robust
set of DCT coefficients by inspecting their behavior during recompression,
which requires access to the targeted JPEG compressor. This is done by dividing
the DCT coefficients into 64 non-overlapping lattices because one embedding
change can potentially affect many other coefficients from the same DCT block
during recompression. The robustness is then combined with standard
steganographic costs creating a lattice embedding scheme robust against JPEG
recompression. Through experiments, we show that the size of the robust set and
the scheme's security depends on the ordering of lattices during embedding. We
verify the validity of the proposed method with three typical JPEG compressors
and the {\it Slack} instant messaging application. We benchmark its security
for various embedding payloads, three different ways of ordering the lattices,
and a range of Quality Factors. Finally, this method is errorless by
construction, meaning the embedded message will always be readable.
| [
{
"version": "v1",
"created": "Wed, 9 Nov 2022 09:01:19 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 06:14:17 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Butora",
"Jan",
""
],
[
"Puteaux",
"Pauline",
""
],
[
"Bas",
"Patrick",
""
]
] | TITLE: Errorless Robust JPEG Steganography using Outputs of JPEG Coders
ABSTRACT: Robust steganography is a technique of hiding secret messages in images so
that the message can be recovered after additional image processing. One of the
most popular processing operations is JPEG recompression. Unfortunately, most
of today's steganographic methods addressing this issue only provide a
probabilistic guarantee of recovering the secret and are consequently not
errorless. That is unacceptable since even a single unexpected change can make
the whole message unreadable if it is encrypted. We propose to create a robust
set of DCT coefficients by inspecting their behavior during recompression,
which requires access to the targeted JPEG compressor. This is done by dividing
the DCT coefficients into 64 non-overlapping lattices because one embedding
change can potentially affect many other coefficients from the same DCT block
during recompression. The robustness is then combined with standard
steganographic costs creating a lattice embedding scheme robust against JPEG
recompression. Through experiments, we show that the size of the robust set and
the scheme's security depends on the ordering of lattices during embedding. We
verify the validity of the proposed method with three typical JPEG compressors
and the {\it Slack} instant messaging application. We benchmark its security
for various embedding payloads, three different ways of ordering the lattices,
and a range of Quality Factors. Finally, this method is errorless by
construction, meaning the embedded message will always be readable.
| no_new_dataset | 0.698856 |
2211.14144 | Can Chen | Can Chen, Scott T. Weiss, Yang-Yu Liu | Graph Convolutional Network-based Feature Selection for High-dimensional
and Low-sample Size Data | 24 pages, 4 figures, 4 tables | Bioinformatics 39 (4), p. btad135, 2023 | 10.1093/bioinformatics/btad135 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Feature selection is a powerful dimension reduction technique which selects a
subset of relevant features for model construction. Numerous feature selection
methods have been proposed, but most of them fail under the high-dimensional
and low-sample size (HDLSS) setting due to the challenge of overfitting. In
this paper, we present a deep learning-based method - GRAph Convolutional
nEtwork feature Selector (GRACES) - to select important features for HDLSS
data. We demonstrate empirical evidence that GRACES outperforms other feature
selection methods on both synthetic and real-world datasets.
| [
{
"version": "v1",
"created": "Fri, 25 Nov 2022 14:46:36 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chen",
"Can",
""
],
[
"Weiss",
"Scott T.",
""
],
[
"Liu",
"Yang-Yu",
""
]
] | TITLE: Graph Convolutional Network-based Feature Selection for High-dimensional
and Low-sample Size Data
ABSTRACT: Feature selection is a powerful dimension reduction technique which selects a
subset of relevant features for model construction. Numerous feature selection
methods have been proposed, but most of them fail under the high-dimensional
and low-sample size (HDLSS) setting due to the challenge of overfitting. In
this paper, we present a deep learning-based method - GRAph Convolutional
nEtwork feature Selector (GRACES) - to select important features for HDLSS
data. We demonstrate empirical evidence that GRACES outperforms other feature
selection methods on both synthetic and real-world datasets.
| no_new_dataset | 0.712876 |
2211.16342 | Xi Jia | Xi Jia, Joseph Bartlett, Wei Chen, Siyang Song, Tianyang Zhang,
Xinxing Cheng, Wenqi Lu, Zhaowen Qiu, Jinming Duan | Fourier-Net: Fast Image Registration with Band-limited Deformation | Copyright belongs to AAAI | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Unsupervised image registration commonly adopts U-Net style networks to
predict dense displacement fields in the full-resolution spatial domain. For
high-resolution volumetric image data, this process is however
resource-intensive and time-consuming. To tackle this problem, we propose the
Fourier-Net, replacing the expansive path in a U-Net style network with a
parameter-free model-driven decoder. Specifically, instead of our Fourier-Net
learning to output a full-resolution displacement field in the spatial domain,
we learn its low-dimensional representation in a band-limited Fourier domain.
This representation is then decoded by our devised model-driven decoder
(consisting of a zero padding layer and an inverse discrete Fourier transform
layer) to the dense, full-resolution displacement field in the spatial domain.
These changes allow our unsupervised Fourier-Net to contain fewer parameters
and computational operations, resulting in faster inference speeds. Fourier-Net
is then evaluated on two public 3D brain datasets against various
state-of-the-art approaches. For example, when compared to a recent
transformer-based method, named TransMorph, our Fourier-Net, which only uses
2.2\% of its parameters and 6.66\% of the multiply-add operations, achieves a
0.5\% higher Dice score and an 11.48 times faster inference speed. Code is
available at \url{https://github.com/xi-jia/Fourier-Net}.
| [
{
"version": "v1",
"created": "Tue, 29 Nov 2022 16:24:06 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 13:46:06 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Jia",
"Xi",
""
],
[
"Bartlett",
"Joseph",
""
],
[
"Chen",
"Wei",
""
],
[
"Song",
"Siyang",
""
],
[
"Zhang",
"Tianyang",
""
],
[
"Cheng",
"Xinxing",
""
],
[
"Lu",
"Wenqi",
""
],
[
"Qiu",
"Zhaowen",
""
],
[
"Duan",
"Jinming",
""
]
] | TITLE: Fourier-Net: Fast Image Registration with Band-limited Deformation
ABSTRACT: Unsupervised image registration commonly adopts U-Net style networks to
predict dense displacement fields in the full-resolution spatial domain. For
high-resolution volumetric image data, this process is however
resource-intensive and time-consuming. To tackle this problem, we propose the
Fourier-Net, replacing the expansive path in a U-Net style network with a
parameter-free model-driven decoder. Specifically, instead of our Fourier-Net
learning to output a full-resolution displacement field in the spatial domain,
we learn its low-dimensional representation in a band-limited Fourier domain.
This representation is then decoded by our devised model-driven decoder
(consisting of a zero padding layer and an inverse discrete Fourier transform
layer) to the dense, full-resolution displacement field in the spatial domain.
These changes allow our unsupervised Fourier-Net to contain fewer parameters
and computational operations, resulting in faster inference speeds. Fourier-Net
is then evaluated on two public 3D brain datasets against various
state-of-the-art approaches. For example, when compared to a recent
transformer-based method, named TransMorph, our Fourier-Net, which only uses
2.2\% of its parameters and 6.66\% of the multiply-add operations, achieves a
0.5\% higher Dice score and an 11.48 times faster inference speed. Code is
available at \url{https://github.com/xi-jia/Fourier-Net}.
| no_new_dataset | 0.712057 |
2212.08490 | Xiaoxiang Han | Xiaoxiang Han, Yiman Liu, Gang Liu, Yuanjie Lin, Qiaohong Liu | LOANet: A Lightweight Network Using Object Attention for Extracting
Buildings and Roads from UAV Aerial Remote Sensing Images | 16 pages, 7 tables, 7 figures, Published in PeerJ Computer Science | PeerJ Comput. Sci. 9:e1467 (2023) | 10.7717/peerj-cs.1467 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic segmentation for extracting buildings and roads from uncrewed aerial
vehicle (UAV) remote sensing images by deep learning becomes a more efficient
and convenient method than traditional manual segmentation in surveying and
mapping fields. In order to make the model lightweight and improve the model
accuracy, a Lightweight Network Using Object Attention (LOANet) for Buildings
and Roads from UAV Aerial Remote Sensing Images is proposed. The proposed
network adopts an encoder-decoder architecture in which a Lightweight Densely
Connected Network (LDCNet) is developed as the encoder. In the decoder part,
the dual multi-scale context modules which consist of the Atrous Spatial
Pyramid Pooling module (ASPP) and the Object Attention Module (OAM) are
designed to capture more context information from feature maps of UAV remote
sensing images. Between ASPP and OAM, a Feature Pyramid Network (FPN) module is
used to fuse multi-scale features extracted from ASPP. A private dataset of
remote sensing images taken by UAV which contains 2431 training sets, 945
validation sets, and 475 test sets is constructed. The proposed basic model
performs well on this dataset, with only 1.4M parameters and 5.48G floating
point operations (FLOPs), achieving excellent mean Intersection-over-Union
(mIoU). Further experiments on the publicly available LoveDA and CITY-OSM
datasets have been conducted to further validate the effectiveness of the
proposed basic and large model, and outstanding mIoU results have been
achieved. All codes are available on https://github.com/GtLinyer/LOANet.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2022 14:02:12 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Dec 2022 15:55:28 GMT"
},
{
"version": "v3",
"created": "Sun, 19 Feb 2023 15:47:10 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Feb 2023 10:36:58 GMT"
},
{
"version": "v5",
"created": "Tue, 4 Apr 2023 15:22:07 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Jul 2023 12:06:26 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Han",
"Xiaoxiang",
""
],
[
"Liu",
"Yiman",
""
],
[
"Liu",
"Gang",
""
],
[
"Lin",
"Yuanjie",
""
],
[
"Liu",
"Qiaohong",
""
]
] | TITLE: LOANet: A Lightweight Network Using Object Attention for Extracting
Buildings and Roads from UAV Aerial Remote Sensing Images
ABSTRACT: Semantic segmentation for extracting buildings and roads from uncrewed aerial
vehicle (UAV) remote sensing images by deep learning becomes a more efficient
and convenient method than traditional manual segmentation in surveying and
mapping fields. In order to make the model lightweight and improve the model
accuracy, a Lightweight Network Using Object Attention (LOANet) for Buildings
and Roads from UAV Aerial Remote Sensing Images is proposed. The proposed
network adopts an encoder-decoder architecture in which a Lightweight Densely
Connected Network (LDCNet) is developed as the encoder. In the decoder part,
the dual multi-scale context modules which consist of the Atrous Spatial
Pyramid Pooling module (ASPP) and the Object Attention Module (OAM) are
designed to capture more context information from feature maps of UAV remote
sensing images. Between ASPP and OAM, a Feature Pyramid Network (FPN) module is
used to fuse multi-scale features extracted from ASPP. A private dataset of
remote sensing images taken by UAV which contains 2431 training sets, 945
validation sets, and 475 test sets is constructed. The proposed basic model
performs well on this dataset, with only 1.4M parameters and 5.48G floating
point operations (FLOPs), achieving excellent mean Intersection-over-Union
(mIoU). Further experiments on the publicly available LoveDA and CITY-OSM
datasets have been conducted to further validate the effectiveness of the
proposed basic and large model, and outstanding mIoU results have been
achieved. All codes are available on https://github.com/GtLinyer/LOANet.
| new_dataset | 0.630031 |
2301.13166 | Kaiwen Zhou | Kaiwen Zhou, Kaizhi Zheng, Connor Pryor, Yilin Shen, Hongxia Jin, Lise
Getoor, Xin Eric Wang | ESC: Exploration with Soft Commonsense Constraints for Zero-shot Object
Navigation | null | null | null | null | cs.AI cs.CV cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to accurately locate and navigate to a specific object is a
crucial capability for embodied agents that operate in the real world and
interact with objects to complete tasks. Such object navigation tasks usually
require large-scale training in visual environments with labeled objects, which
generalizes poorly to novel objects in unknown environments. In this work, we
present a novel zero-shot object navigation method, Exploration with Soft
Commonsense constraints (ESC), that transfers commonsense knowledge in
pre-trained models to open-world object navigation without any navigation
experience nor any other training on the visual environments. First, ESC
leverages a pre-trained vision and language model for open-world prompt-based
grounding and a pre-trained commonsense language model for room and object
reasoning. Then ESC converts commonsense knowledge into navigation actions by
modeling it as soft logic predicates for efficient exploration. Extensive
experiments on MP3D, HM3D, and RoboTHOR benchmarks show that our ESC method
improves significantly over baselines, and achieves new state-of-the-art
results for zero-shot object navigation (e.g., 288% relative Success Rate
improvement than CoW on MP3D).
| [
{
"version": "v1",
"created": "Mon, 30 Jan 2023 18:37:32 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Mar 2023 08:33:40 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Jul 2023 06:25:33 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Zhou",
"Kaiwen",
""
],
[
"Zheng",
"Kaizhi",
""
],
[
"Pryor",
"Connor",
""
],
[
"Shen",
"Yilin",
""
],
[
"Jin",
"Hongxia",
""
],
[
"Getoor",
"Lise",
""
],
[
"Wang",
"Xin Eric",
""
]
] | TITLE: ESC: Exploration with Soft Commonsense Constraints for Zero-shot Object
Navigation
ABSTRACT: The ability to accurately locate and navigate to a specific object is a
crucial capability for embodied agents that operate in the real world and
interact with objects to complete tasks. Such object navigation tasks usually
require large-scale training in visual environments with labeled objects, which
generalizes poorly to novel objects in unknown environments. In this work, we
present a novel zero-shot object navigation method, Exploration with Soft
Commonsense constraints (ESC), that transfers commonsense knowledge in
pre-trained models to open-world object navigation without any navigation
experience nor any other training on the visual environments. First, ESC
leverages a pre-trained vision and language model for open-world prompt-based
grounding and a pre-trained commonsense language model for room and object
reasoning. Then ESC converts commonsense knowledge into navigation actions by
modeling it as soft logic predicates for efficient exploration. Extensive
experiments on MP3D, HM3D, and RoboTHOR benchmarks show that our ESC method
improves significantly over baselines, and achieves new state-of-the-art
results for zero-shot object navigation (e.g., 288% relative Success Rate
improvement than CoW on MP3D).
| no_new_dataset | 0.711067 |
2302.06685 | Jonathan Kelly | Philippe Nadeau, Matthew Giamou, Jonathan Kelly | The Sum of Its Parts: Visual Part Segmentation for Inertial Parameter
Identification of Manipulated Objects | In Proceedings of the IEEE International Conference on Robotics and
Automation (ICRA'23), London, UK, May 29 - Jun. 2, 2023 | null | 10.1109/ICRA48891.2023.10160394 | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To operate safely and efficiently alongside human workers, collaborative
robots (cobots) require the ability to quickly understand the dynamics of
manipulated objects. However, traditional methods for estimating the full set
of inertial parameters rely on motions that are necessarily fast and unsafe (to
achieve a sufficient signal-to-noise ratio). In this work, we take an
alternative approach: by combining visual and force-torque measurements, we
develop an inertial parameter identification algorithm that requires slow or
'stop-and-go' motions only, and hence is ideally tailored for use around
humans. Our technique, called Homogeneous Part Segmentation (HPS), leverages
the observation that man-made objects are often composed of distinct,
homogeneous parts. We combine a surface-based point clustering method with a
volumetric shape segmentation algorithm to quickly produce a part-level
segmentation of a manipulated object; the segmented representation is then used
by HPS to accurately estimate the object's inertial parameters. To benchmark
our algorithm, we create and utilize a novel dataset consisting of realistic
meshes, segmented point clouds, and inertial parameters for 20 common workshop
tools. Finally, we demonstrate the real-world performance and accuracy of HPS
by performing an intricate 'hammer balancing act' autonomously and online with
a low-cost collaborative robotic arm. Our code and dataset are open source and
freely available.
| [
{
"version": "v1",
"created": "Mon, 13 Feb 2023 20:53:15 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 02:18:21 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Nadeau",
"Philippe",
""
],
[
"Giamou",
"Matthew",
""
],
[
"Kelly",
"Jonathan",
""
]
] | TITLE: The Sum of Its Parts: Visual Part Segmentation for Inertial Parameter
Identification of Manipulated Objects
ABSTRACT: To operate safely and efficiently alongside human workers, collaborative
robots (cobots) require the ability to quickly understand the dynamics of
manipulated objects. However, traditional methods for estimating the full set
of inertial parameters rely on motions that are necessarily fast and unsafe (to
achieve a sufficient signal-to-noise ratio). In this work, we take an
alternative approach: by combining visual and force-torque measurements, we
develop an inertial parameter identification algorithm that requires slow or
'stop-and-go' motions only, and hence is ideally tailored for use around
humans. Our technique, called Homogeneous Part Segmentation (HPS), leverages
the observation that man-made objects are often composed of distinct,
homogeneous parts. We combine a surface-based point clustering method with a
volumetric shape segmentation algorithm to quickly produce a part-level
segmentation of a manipulated object; the segmented representation is then used
by HPS to accurately estimate the object's inertial parameters. To benchmark
our algorithm, we create and utilize a novel dataset consisting of realistic
meshes, segmented point clouds, and inertial parameters for 20 common workshop
tools. Finally, we demonstrate the real-world performance and accuracy of HPS
by performing an intricate 'hammer balancing act' autonomously and online with
a low-cost collaborative robotic arm. Our code and dataset are open source and
freely available.
| new_dataset | 0.714416 |
2302.09844 | Pedro Miguel Sanchez Sanchez | Pedro Miguel S\'anchez S\'anchez, Alberto Huertas Celdr\'an, Ning Xie,
G\'er\^ome Bovet, Gregorio Mart\'inez P\'erez, Burkhard Stiller | FederatedTrust: A Solution for Trustworthy Federated Learning | null | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by/4.0/ | The rapid expansion of the Internet of Things (IoT) and Edge Computing has
presented challenges for centralized Machine and Deep Learning (ML/DL) methods
due to the presence of distributed data silos that hold sensitive information.
To address concerns regarding data privacy, collaborative and
privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged.
However, ensuring data privacy and performance alone is insufficient since
there is a growing need to establish trust in model predictions. Existing
literature has proposed various approaches on trustworthy ML/DL (excluding data
privacy), identifying robustness, fairness, explainability, and accountability
as important pillars. Nevertheless, further research is required to identify
trustworthiness pillars and evaluation metrics specifically relevant to FL
models, as well as to develop solutions that can compute the trustworthiness
level of FL models. This work examines the existing requirements for evaluating
trustworthiness in FL and introduces a comprehensive taxonomy consisting of six
pillars (privacy, robustness, fairness, explainability, accountability, and
federation), along with over 30 metrics for computing the trustworthiness of FL
models. Subsequently, an algorithm named FederatedTrust is designed based on
the pillars and metrics identified in the taxonomy to compute the
trustworthiness score of FL models. A prototype of FederatedTrust is
implemented and integrated into the learning process of FederatedScope, a
well-established FL framework. Finally, five experiments are conducted using
different configurations of FederatedScope to demonstrate the utility of
FederatedTrust in computing the trustworthiness of FL models. Three experiments
employ the FEMNIST dataset, and two utilize the N-BaIoT dataset considering a
real-world IoT security use case.
| [
{
"version": "v1",
"created": "Mon, 20 Feb 2023 09:02:24 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 11:35:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Sánchez",
"Pedro Miguel Sánchez",
""
],
[
"Celdrán",
"Alberto Huertas",
""
],
[
"Xie",
"Ning",
""
],
[
"Bovet",
"Gérôme",
""
],
[
"Pérez",
"Gregorio Martínez",
""
],
[
"Stiller",
"Burkhard",
""
]
] | TITLE: FederatedTrust: A Solution for Trustworthy Federated Learning
ABSTRACT: The rapid expansion of the Internet of Things (IoT) and Edge Computing has
presented challenges for centralized Machine and Deep Learning (ML/DL) methods
due to the presence of distributed data silos that hold sensitive information.
To address concerns regarding data privacy, collaborative and
privacy-preserving ML/DL techniques like Federated Learning (FL) have emerged.
However, ensuring data privacy and performance alone is insufficient since
there is a growing need to establish trust in model predictions. Existing
literature has proposed various approaches on trustworthy ML/DL (excluding data
privacy), identifying robustness, fairness, explainability, and accountability
as important pillars. Nevertheless, further research is required to identify
trustworthiness pillars and evaluation metrics specifically relevant to FL
models, as well as to develop solutions that can compute the trustworthiness
level of FL models. This work examines the existing requirements for evaluating
trustworthiness in FL and introduces a comprehensive taxonomy consisting of six
pillars (privacy, robustness, fairness, explainability, accountability, and
federation), along with over 30 metrics for computing the trustworthiness of FL
models. Subsequently, an algorithm named FederatedTrust is designed based on
the pillars and metrics identified in the taxonomy to compute the
trustworthiness score of FL models. A prototype of FederatedTrust is
implemented and integrated into the learning process of FederatedScope, a
well-established FL framework. Finally, five experiments are conducted using
different configurations of FederatedScope to demonstrate the utility of
FederatedTrust in computing the trustworthiness of FL models. Three experiments
employ the FEMNIST dataset, and two utilize the N-BaIoT dataset considering a
real-world IoT security use case.
| no_new_dataset | 0.708855 |
2303.02216 | Yuyang Wang | Yuyang Wang, Changwen Xu, Zijie Li, Amir Barati Farimani | Denoise Pretraining on Nonequilibrium Molecules for Accurate and
Transferable Neural Potentials | Published in Journal of Chemical Theory and Computation. 32 pages, 5
figures, 2 tables | null | 10.1021/acs.jctc.3c00289 | null | cs.LG cs.AI physics.chem-ph | http://creativecommons.org/licenses/by/4.0/ | Recent advances in equivariant graph neural networks (GNNs) have made deep
learning amenable to developing fast surrogate models to expensive ab initio
quantum mechanics (QM) approaches for molecular potential predictions. However,
building accurate and transferable potential models using GNNs remains
challenging, as the data is greatly limited by the expensive computational
costs and level of theory of QM methods, especially for large and complex
molecular systems. In this work, we propose denoise pretraining on
nonequilibrium molecular conformations to achieve more accurate and
transferable GNN potential predictions. Specifically, atomic coordinates of
sampled nonequilibrium conformations are perturbed by random noises and GNNs
are pretrained to denoise the perturbed molecular conformations which recovers
the original coordinates. Rigorous experiments on multiple benchmarks reveal
that pretraining significantly improves the accuracy of neural potentials.
Furthermore, we show that the proposed pretraining approach is model-agnostic,
as it improves the performance of different invariant and equivariant GNNs.
Notably, our models pretrained on small molecules demonstrate remarkable
transferability, improving performance when fine-tuned on diverse molecular
systems, including different elements, charged molecules, biomolecules, and
larger systems. These results highlight the potential for leveraging denoise
pretraining approaches to build more generalizable neural potentials for
complex molecular systems.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2023 21:15:22 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 03:53:17 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Wang",
"Yuyang",
""
],
[
"Xu",
"Changwen",
""
],
[
"Li",
"Zijie",
""
],
[
"Farimani",
"Amir Barati",
""
]
] | TITLE: Denoise Pretraining on Nonequilibrium Molecules for Accurate and
Transferable Neural Potentials
ABSTRACT: Recent advances in equivariant graph neural networks (GNNs) have made deep
learning amenable to developing fast surrogate models to expensive ab initio
quantum mechanics (QM) approaches for molecular potential predictions. However,
building accurate and transferable potential models using GNNs remains
challenging, as the data is greatly limited by the expensive computational
costs and level of theory of QM methods, especially for large and complex
molecular systems. In this work, we propose denoise pretraining on
nonequilibrium molecular conformations to achieve more accurate and
transferable GNN potential predictions. Specifically, atomic coordinates of
sampled nonequilibrium conformations are perturbed by random noises and GNNs
are pretrained to denoise the perturbed molecular conformations which recovers
the original coordinates. Rigorous experiments on multiple benchmarks reveal
that pretraining significantly improves the accuracy of neural potentials.
Furthermore, we show that the proposed pretraining approach is model-agnostic,
as it improves the performance of different invariant and equivariant GNNs.
Notably, our models pretrained on small molecules demonstrate remarkable
transferability, improving performance when fine-tuned on diverse molecular
systems, including different elements, charged molecules, biomolecules, and
larger systems. These results highlight the potential for leveraging denoise
pretraining approaches to build more generalizable neural potentials for
complex molecular systems.
| no_new_dataset | 0.70939 |
2303.03108 | Xingxuan Zhang | Xingxuan Zhang and Renzhe Xu and Han Yu and Hao Zou and Peng Cui | Gradient Norm Aware Minimization Seeks First-Order Flatness and Improves
Generalization | CVPR2023 highlight paper | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, flat minima are proven to be effective for improving generalization
and sharpness-aware minimization (SAM) achieves state-of-the-art performance.
Yet the current definition of flatness discussed in SAM and its follow-ups are
limited to the zeroth-order flatness (i.e., the worst-case loss within a
perturbation radius). We show that the zeroth-order flatness can be
insufficient to discriminate minima with low generalization error from those
with high generalization error both when there is a single minimum or multiple
minima within the given perturbation radius. Thus we present first-order
flatness, a stronger measure of flatness focusing on the maximal gradient norm
within a perturbation radius which bounds both the maximal eigenvalue of
Hessian at local minima and the regularization function of SAM. We also present
a novel training procedure named Gradient norm Aware Minimization (GAM) to seek
minima with uniformly small curvature across all directions. Experimental
results show that GAM improves the generalization of models trained with
current optimizers such as SGD and AdamW on various datasets and networks.
Furthermore, we show that GAM can help SAM find flatter minima and achieve
better generalization.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2023 16:58:53 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2023 17:23:58 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Jul 2023 04:17:43 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Zhang",
"Xingxuan",
""
],
[
"Xu",
"Renzhe",
""
],
[
"Yu",
"Han",
""
],
[
"Zou",
"Hao",
""
],
[
"Cui",
"Peng",
""
]
] | TITLE: Gradient Norm Aware Minimization Seeks First-Order Flatness and Improves
Generalization
ABSTRACT: Recently, flat minima are proven to be effective for improving generalization
and sharpness-aware minimization (SAM) achieves state-of-the-art performance.
Yet the current definition of flatness discussed in SAM and its follow-ups are
limited to the zeroth-order flatness (i.e., the worst-case loss within a
perturbation radius). We show that the zeroth-order flatness can be
insufficient to discriminate minima with low generalization error from those
with high generalization error both when there is a single minimum or multiple
minima within the given perturbation radius. Thus we present first-order
flatness, a stronger measure of flatness focusing on the maximal gradient norm
within a perturbation radius which bounds both the maximal eigenvalue of
Hessian at local minima and the regularization function of SAM. We also present
a novel training procedure named Gradient norm Aware Minimization (GAM) to seek
minima with uniformly small curvature across all directions. Experimental
results show that GAM improves the generalization of models trained with
current optimizers such as SGD and AdamW on various datasets and networks.
Furthermore, we show that GAM can help SAM find flatter minima and achieve
better generalization.
| no_new_dataset | 0.710465 |
2303.03789 | Kota Nakamura | Kota Nakamura, Yasuko Matsubara, Koki Kawabata, Yuhei Umeda, Yuichiro
Wada and Yasushi Sakurai | Fast and Multi-aspect Mining of Complex Time-stamped Event Streams | Accepted by WWW 2023 | null | 10.1145/3543507.3583370 | null | cs.LG cs.AI cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | Given a huge, online stream of time-evolving events with multiple attributes,
such as online shopping logs: (item, price, brand, time), and local mobility
activities: (pick-up and drop-off locations, time), how can we summarize large,
dynamic high-order tensor streams? How can we see any hidden patterns, rules,
and anomalies? Our answer is to focus on two types of patterns, i.e.,
''regimes'' and ''components'', for which we present CubeScope, an efficient
and effective method over high-order tensor streams. Specifically, it
identifies any sudden discontinuity and recognizes distinct dynamical patterns,
''regimes'' (e.g., weekday/weekend/holiday patterns). In each regime, it also
performs multi-way summarization for all attributes (e.g., item, price, brand,
and time) and discovers hidden ''components'' representing latent groups (e.g.,
item/brand groups) and their relationship. Thanks to its concise but effective
summarization, CubeScope can also detect the sudden appearance of anomalies and
identify the types of anomalies that occur in practice. Our proposed method has
the following properties: (a) Effective: it captures dynamical multi-aspect
patterns, i.e., regimes and components, and statistically summarizes all the
events; (b) General: it is practical for successful application to data
compression, pattern discovery, and anomaly detection on various types of
tensor streams; (c) Scalable: our algorithm does not depend on the length of
the data stream and its dimensionality. Extensive experiments on real datasets
demonstrate that CubeScope finds meaningful patterns and anomalies correctly,
and consistently outperforms the state-of-the-art methods as regards accuracy
and execution speed.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2023 10:52:59 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 02:49:12 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Nakamura",
"Kota",
""
],
[
"Matsubara",
"Yasuko",
""
],
[
"Kawabata",
"Koki",
""
],
[
"Umeda",
"Yuhei",
""
],
[
"Wada",
"Yuichiro",
""
],
[
"Sakurai",
"Yasushi",
""
]
] | TITLE: Fast and Multi-aspect Mining of Complex Time-stamped Event Streams
ABSTRACT: Given a huge, online stream of time-evolving events with multiple attributes,
such as online shopping logs: (item, price, brand, time), and local mobility
activities: (pick-up and drop-off locations, time), how can we summarize large,
dynamic high-order tensor streams? How can we see any hidden patterns, rules,
and anomalies? Our answer is to focus on two types of patterns, i.e.,
''regimes'' and ''components'', for which we present CubeScope, an efficient
and effective method over high-order tensor streams. Specifically, it
identifies any sudden discontinuity and recognizes distinct dynamical patterns,
''regimes'' (e.g., weekday/weekend/holiday patterns). In each regime, it also
performs multi-way summarization for all attributes (e.g., item, price, brand,
and time) and discovers hidden ''components'' representing latent groups (e.g.,
item/brand groups) and their relationship. Thanks to its concise but effective
summarization, CubeScope can also detect the sudden appearance of anomalies and
identify the types of anomalies that occur in practice. Our proposed method has
the following properties: (a) Effective: it captures dynamical multi-aspect
patterns, i.e., regimes and components, and statistically summarizes all the
events; (b) General: it is practical for successful application to data
compression, pattern discovery, and anomaly detection on various types of
tensor streams; (c) Scalable: our algorithm does not depend on the length of
the data stream and its dimensionality. Extensive experiments on real datasets
demonstrate that CubeScope finds meaningful patterns and anomalies correctly,
and consistently outperforms the state-of-the-art methods as regards accuracy
and execution speed.
| no_new_dataset | 0.709856 |
2303.08262 | Yonghui Wu | Cheng Peng, Xi Yang, Zehao Yu, Jiang Bian, William R. Hogan, Yonghui
Wu | Clinical Concept and Relation Extraction Using Prompt-based Machine
Reading Comprehension | null | null | 10.1093/jamia/ocad107 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Objective: To develop a natural language processing system that solves both
clinical concept extraction and relation extraction in a unified prompt-based
machine reading comprehension (MRC) architecture with good generalizability for
cross-institution applications.
Methods: We formulate both clinical concept extraction and relation
extraction using a unified prompt-based MRC architecture and explore
state-of-the-art transformer models. We compare our MRC models with existing
deep learning models for concept extraction and end-to-end relation extraction
using two benchmark datasets developed by the 2018 National NLP Clinical
Challenges (n2c2) challenge (medications and adverse drug events) and the 2022
n2c2 challenge (relations of social determinants of health [SDoH]). We also
evaluate the transfer learning ability of the proposed MRC models in a
cross-institution setting. We perform error analyses and examine how different
prompting strategies affect the performance of MRC models.
Results and Conclusion: The proposed MRC models achieve state-of-the-art
performance for clinical concept and relation extraction on the two benchmark
datasets, outperforming previous non-MRC transformer models. GatorTron-MRC
achieves the best strict and lenient F1-scores for concept extraction,
outperforming previous deep learning models on the two datasets by 1%~3% and
0.7%~1.3%, respectively. For end-to-end relation extraction, GatorTron-MRC and
BERT-MIMIC-MRC achieve the best F1-scores, outperforming previous deep learning
models by 0.9%~2.4% and 10%-11%, respectively. For cross-institution
evaluation, GatorTron-MRC outperforms traditional GatorTron by 6.4% and 16% for
the two datasets, respectively. The proposed method is better at handling
nested/overlapped concepts, extracting relations, and has good portability for
cross-institute applications.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2023 22:37:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Peng",
"Cheng",
""
],
[
"Yang",
"Xi",
""
],
[
"Yu",
"Zehao",
""
],
[
"Bian",
"Jiang",
""
],
[
"Hogan",
"William R.",
""
],
[
"Wu",
"Yonghui",
""
]
] | TITLE: Clinical Concept and Relation Extraction Using Prompt-based Machine
Reading Comprehension
ABSTRACT: Objective: To develop a natural language processing system that solves both
clinical concept extraction and relation extraction in a unified prompt-based
machine reading comprehension (MRC) architecture with good generalizability for
cross-institution applications.
Methods: We formulate both clinical concept extraction and relation
extraction using a unified prompt-based MRC architecture and explore
state-of-the-art transformer models. We compare our MRC models with existing
deep learning models for concept extraction and end-to-end relation extraction
using two benchmark datasets developed by the 2018 National NLP Clinical
Challenges (n2c2) challenge (medications and adverse drug events) and the 2022
n2c2 challenge (relations of social determinants of health [SDoH]). We also
evaluate the transfer learning ability of the proposed MRC models in a
cross-institution setting. We perform error analyses and examine how different
prompting strategies affect the performance of MRC models.
Results and Conclusion: The proposed MRC models achieve state-of-the-art
performance for clinical concept and relation extraction on the two benchmark
datasets, outperforming previous non-MRC transformer models. GatorTron-MRC
achieves the best strict and lenient F1-scores for concept extraction,
outperforming previous deep learning models on the two datasets by 1%~3% and
0.7%~1.3%, respectively. For end-to-end relation extraction, GatorTron-MRC and
BERT-MIMIC-MRC achieve the best F1-scores, outperforming previous deep learning
models by 0.9%~2.4% and 10%-11%, respectively. For cross-institution
evaluation, GatorTron-MRC outperforms traditional GatorTron by 6.4% and 16% for
the two datasets, respectively. The proposed method is better at handling
nested/overlapped concepts, extracting relations, and has good portability for
cross-institute applications.
| no_new_dataset | 0.711017 |
2303.13752 | Evelyn Chee | Evelyn Chee, Mong Li Lee, Wynne Hsu | Leveraging Old Knowledge to Continually Learn New Classes in Medical
Images | Accepted to AAAI23 | null | 10.1609/aaai.v37i12.26659 | null | cs.LG cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Class-incremental continual learning is a core step towards developing
artificial intelligence systems that can continuously adapt to changes in the
environment by learning new concepts without forgetting those previously
learned. This is especially needed in the medical domain where continually
learning from new incoming data is required to classify an expanded set of
diseases. In this work, we focus on how old knowledge can be leveraged to learn
new classes without catastrophic forgetting. We propose a framework that
comprises of two main components: (1) a dynamic architecture with expanding
representations to preserve previously learned features and accommodate new
features; and (2) a training procedure alternating between two objectives to
balance the learning of new features while maintaining the model's performance
on old classes. Experiment results on multiple medical datasets show that our
solution is able to achieve superior performance over state-of-the-art
baselines in terms of class accuracy and forgetting.
| [
{
"version": "v1",
"created": "Fri, 24 Mar 2023 02:10:53 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chee",
"Evelyn",
""
],
[
"Lee",
"Mong Li",
""
],
[
"Hsu",
"Wynne",
""
]
] | TITLE: Leveraging Old Knowledge to Continually Learn New Classes in Medical
Images
ABSTRACT: Class-incremental continual learning is a core step towards developing
artificial intelligence systems that can continuously adapt to changes in the
environment by learning new concepts without forgetting those previously
learned. This is especially needed in the medical domain where continually
learning from new incoming data is required to classify an expanded set of
diseases. In this work, we focus on how old knowledge can be leveraged to learn
new classes without catastrophic forgetting. We propose a framework that
comprises of two main components: (1) a dynamic architecture with expanding
representations to preserve previously learned features and accommodate new
features; and (2) a training procedure alternating between two objectives to
balance the learning of new features while maintaining the model's performance
on old classes. Experiment results on multiple medical datasets show that our
solution is able to achieve superior performance over state-of-the-art
baselines in terms of class accuracy and forgetting.
| no_new_dataset | 0.709466 |
2304.01502 | Tianchen Zhou | Tianchen Zhou, Zhanyi Hu, Bingzhe Wu, Cen Chen | SLPerf: a Unified Framework for Benchmarking Split Learning | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data privacy concerns has made centralized training of data, which is
scattered across silos, infeasible, leading to the need for collaborative
learning frameworks. To address that, two prominent frameworks emerged, i.e.,
federated learning (FL) and split learning (SL). While FL has established
various benchmark frameworks and research libraries,SL currently lacks a
unified library despite its diversity in terms of label sharing, model
aggregation, and cut layer choice. This lack of standardization makes comparing
SL paradigms difficult. To address this, we propose SLPerf, a unified research
framework and open research library for SL, and conduct extensive experiments
on four widely-used datasets under both IID and Non-IID data settings. Our
contributions include a comprehensive survey of recently proposed SL paradigms,
a detailed benchmark comparison of different SL paradigms in different
situations, and rich engineering take-away messages and research insights for
improving SL paradigms. SLPerf can facilitate SL algorithm development and fair
performance comparisons. The code is available at
https://github.com/Rainysponge/Split-learning-Attacks .
| [
{
"version": "v1",
"created": "Tue, 4 Apr 2023 03:27:54 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 17:21:40 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Zhou",
"Tianchen",
""
],
[
"Hu",
"Zhanyi",
""
],
[
"Wu",
"Bingzhe",
""
],
[
"Chen",
"Cen",
""
]
] | TITLE: SLPerf: a Unified Framework for Benchmarking Split Learning
ABSTRACT: Data privacy concerns has made centralized training of data, which is
scattered across silos, infeasible, leading to the need for collaborative
learning frameworks. To address that, two prominent frameworks emerged, i.e.,
federated learning (FL) and split learning (SL). While FL has established
various benchmark frameworks and research libraries,SL currently lacks a
unified library despite its diversity in terms of label sharing, model
aggregation, and cut layer choice. This lack of standardization makes comparing
SL paradigms difficult. To address this, we propose SLPerf, a unified research
framework and open research library for SL, and conduct extensive experiments
on four widely-used datasets under both IID and Non-IID data settings. Our
contributions include a comprehensive survey of recently proposed SL paradigms,
a detailed benchmark comparison of different SL paradigms in different
situations, and rich engineering take-away messages and research insights for
improving SL paradigms. SLPerf can facilitate SL algorithm development and fair
performance comparisons. The code is available at
https://github.com/Rainysponge/Split-learning-Attacks .
| no_new_dataset | 0.71 |
2304.13242 | Robin Karlsson | Robin Karlsson, Alexander Carballo, Francisco Lepe-Salazar, Keisuke
Fujii, Kento Ohtani, Kazuya Takeda | Learning to Predict Navigational Patterns from Partial Observations | Accepted to IEEE Robotics and Automation Letters (RA-L) 2023 | null | 10.1109/LRA.2023.3291924 | null | cs.CV cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human beings cooperatively navigate rule-constrained environments by adhering
to mutually known navigational patterns, which may be represented as
directional pathways or road lanes. Inferring these navigational patterns from
incompletely observed environments is required for intelligent mobile robots
operating in unmapped locations. However, algorithmically defining these
navigational patterns is nontrivial. This paper presents the first
self-supervised learning (SSL) method for learning to infer navigational
patterns in real-world environments from partial observations only. We explain
how geometric data augmentation, predictive world modeling, and an
information-theoretic regularizer enables our model to predict an unbiased
local directional soft lane probability (DSLP) field in the limit of infinite
data. We demonstrate how to infer global navigational patterns by fitting a
maximum likelihood graph to the DSLP field. Experiments show that our SSL model
outperforms two SOTA supervised lane graph prediction models on the nuScenes
dataset. We propose our SSL method as a scalable and interpretable continual
learning paradigm for navigation by perception. Code is available at
https://github.com/robin-karlsson0/dslp.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 02:08:46 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 00:46:50 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Karlsson",
"Robin",
""
],
[
"Carballo",
"Alexander",
""
],
[
"Lepe-Salazar",
"Francisco",
""
],
[
"Fujii",
"Keisuke",
""
],
[
"Ohtani",
"Kento",
""
],
[
"Takeda",
"Kazuya",
""
]
] | TITLE: Learning to Predict Navigational Patterns from Partial Observations
ABSTRACT: Human beings cooperatively navigate rule-constrained environments by adhering
to mutually known navigational patterns, which may be represented as
directional pathways or road lanes. Inferring these navigational patterns from
incompletely observed environments is required for intelligent mobile robots
operating in unmapped locations. However, algorithmically defining these
navigational patterns is nontrivial. This paper presents the first
self-supervised learning (SSL) method for learning to infer navigational
patterns in real-world environments from partial observations only. We explain
how geometric data augmentation, predictive world modeling, and an
information-theoretic regularizer enables our model to predict an unbiased
local directional soft lane probability (DSLP) field in the limit of infinite
data. We demonstrate how to infer global navigational patterns by fitting a
maximum likelihood graph to the DSLP field. Experiments show that our SSL model
outperforms two SOTA supervised lane graph prediction models on the nuScenes
dataset. We propose our SSL method as a scalable and interpretable continual
learning paradigm for navigation by perception. Code is available at
https://github.com/robin-karlsson0/dslp.
| no_new_dataset | 0.710239 |
2304.13407 | Songze Li | Songze Li, Duanyi Yao, Jin Liu | FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated
Learning for Split Models | Accepted to ICML 2023 | null | null | null | cs.LG cs.CR cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In a vertical federated learning (VFL) system consisting of a central server
and many distributed clients, the training data are vertically partitioned such
that different features are privately stored on different clients. The problem
of split VFL is to train a model split between the server and the clients. This
paper aims to address two major challenges in split VFL: 1) performance
degradation due to straggling clients during training; and 2) data and model
privacy leakage from clients' uploaded data embeddings. We propose FedVS to
simultaneously address these two challenges. The key idea of FedVS is to design
secret sharing schemes for the local data and models, such that
information-theoretical privacy against colluding clients and curious server is
guaranteed, and the aggregation of all clients' embeddings is reconstructed
losslessly, via decrypting computation shares from the non-straggling clients.
Extensive experiments on various types of VFL datasets (including tabular, CV,
and multi-view) demonstrate the universal advantages of FedVS in straggler
mitigation and privacy protection over baseline protocols.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 09:41:38 GMT"
},
{
"version": "v2",
"created": "Sun, 28 May 2023 22:30:52 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Jul 2023 07:59:17 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Li",
"Songze",
""
],
[
"Yao",
"Duanyi",
""
],
[
"Liu",
"Jin",
""
]
] | TITLE: FedVS: Straggler-Resilient and Privacy-Preserving Vertical Federated
Learning for Split Models
ABSTRACT: In a vertical federated learning (VFL) system consisting of a central server
and many distributed clients, the training data are vertically partitioned such
that different features are privately stored on different clients. The problem
of split VFL is to train a model split between the server and the clients. This
paper aims to address two major challenges in split VFL: 1) performance
degradation due to straggling clients during training; and 2) data and model
privacy leakage from clients' uploaded data embeddings. We propose FedVS to
simultaneously address these two challenges. The key idea of FedVS is to design
secret sharing schemes for the local data and models, such that
information-theoretical privacy against colluding clients and curious server is
guaranteed, and the aggregation of all clients' embeddings is reconstructed
losslessly, via decrypting computation shares from the non-straggling clients.
Extensive experiments on various types of VFL datasets (including tabular, CV,
and multi-view) demonstrate the universal advantages of FedVS in straggler
mitigation and privacy protection over baseline protocols.
| no_new_dataset | 0.709667 |
2305.00127 | Lei Lei | Jiaju Qi, Lei Lei, Kan Zheng, Simon X. Yang, Xuemin (Sherman) Shen | Optimal Scheduling in IoT-Driven Smart Isolated Microgrids Based on Deep
Reinforcement Learning | null | null | 10.1109/JIOT.2023.3267625 | null | cs.LG cs.AI cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the scheduling issue of diesel generators (DGs)
in an Internet of Things (IoT)-Driven isolated microgrid (MG) by deep
reinforcement learning (DRL). The renewable energy is fully exploited under the
uncertainty of renewable generation and load demand. The DRL agent learns an
optimal policy from history renewable and load data of previous days, where the
policy can generate real-time decisions based on observations of past renewable
and load data of previous hours collected by connected sensors. The goal is to
reduce operating cost on the premise of ensuring supply-demand balance. In
specific, a novel finite-horizon partial observable Markov decision process
(POMDP) model is conceived considering the spinning reserve. In order to
overcome the challenge of discrete-continuous hybrid action space due to the
binary DG switching decision and continuous energy dispatch (ED) decision, a
DRL algorithm, namely the hybrid action finite-horizon RDPG (HAFH-RDPG), is
proposed. HAFH-RDPG seamlessly integrates two classical DRL algorithms, i.e.,
deep Q-network (DQN) and recurrent deterministic policy gradient (RDPG), based
on a finite-horizon dynamic programming (DP) framework. Extensive experiments
are performed with real-world data in an IoT-driven MG to evaluate the
capability of the proposed algorithm in handling the uncertainty due to
inter-hour and inter-day power fluctuation and to compare its performance with
those of the benchmark algorithms.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 23:52:50 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Qi",
"Jiaju",
"",
"Sherman"
],
[
"Lei",
"Lei",
"",
"Sherman"
],
[
"Zheng",
"Kan",
"",
"Sherman"
],
[
"Yang",
"Simon X.",
"",
"Sherman"
],
[
"Xuemin",
"",
"",
"Sherman"
],
[
"Shen",
"",
""
]
] | TITLE: Optimal Scheduling in IoT-Driven Smart Isolated Microgrids Based on Deep
Reinforcement Learning
ABSTRACT: In this paper, we investigate the scheduling issue of diesel generators (DGs)
in an Internet of Things (IoT)-Driven isolated microgrid (MG) by deep
reinforcement learning (DRL). The renewable energy is fully exploited under the
uncertainty of renewable generation and load demand. The DRL agent learns an
optimal policy from history renewable and load data of previous days, where the
policy can generate real-time decisions based on observations of past renewable
and load data of previous hours collected by connected sensors. The goal is to
reduce operating cost on the premise of ensuring supply-demand balance. In
specific, a novel finite-horizon partial observable Markov decision process
(POMDP) model is conceived considering the spinning reserve. In order to
overcome the challenge of discrete-continuous hybrid action space due to the
binary DG switching decision and continuous energy dispatch (ED) decision, a
DRL algorithm, namely the hybrid action finite-horizon RDPG (HAFH-RDPG), is
proposed. HAFH-RDPG seamlessly integrates two classical DRL algorithms, i.e.,
deep Q-network (DQN) and recurrent deterministic policy gradient (RDPG), based
on a finite-horizon dynamic programming (DP) framework. Extensive experiments
are performed with real-world data in an IoT-driven MG to evaluate the
capability of the proposed algorithm in handling the uncertainty due to
inter-hour and inter-day power fluctuation and to compare its performance with
those of the benchmark algorithms.
| no_new_dataset | 0.710446 |
2305.01645 | Junmo Kang | Junmo Kang, Wei Xu, Alan Ritter | Distill or Annotate? Cost-Efficient Fine-Tuning of Compact Models | Accepted at ACL 2023 main conference | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Fine-tuning large models is highly effective, however, inference can be
expensive and produces carbon emissions. Knowledge distillation has been shown
to be a practical solution to reduce inference costs, but the distillation
process itself requires significant computational resources. Rather than buying
or renting GPUs to fine-tune, then distill a large model, an NLP practitioner
might instead choose to allocate the available budget to hire annotators and
manually label additional fine-tuning data. In this paper, we investigate how
to most efficiently use a fixed budget to build a compact model. Through
extensive experiments on six diverse tasks, we show that distilling from T5-XXL
(11B) to T5-Small (60M) is almost always a cost-efficient strategy compared to
annotating more data to directly train a compact model (T5-Small). We further
investigate how the optimal budget allocated towards computation varies across
scenarios. We will make our code, datasets, annotation cost estimates, and
baseline models available as a benchmark to support further work on
cost-efficient training of compact models.
| [
{
"version": "v1",
"created": "Tue, 2 May 2023 17:56:16 GMT"
},
{
"version": "v2",
"created": "Wed, 3 May 2023 00:36:38 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jul 2023 20:41:59 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Kang",
"Junmo",
""
],
[
"Xu",
"Wei",
""
],
[
"Ritter",
"Alan",
""
]
] | TITLE: Distill or Annotate? Cost-Efficient Fine-Tuning of Compact Models
ABSTRACT: Fine-tuning large models is highly effective, however, inference can be
expensive and produces carbon emissions. Knowledge distillation has been shown
to be a practical solution to reduce inference costs, but the distillation
process itself requires significant computational resources. Rather than buying
or renting GPUs to fine-tune, then distill a large model, an NLP practitioner
might instead choose to allocate the available budget to hire annotators and
manually label additional fine-tuning data. In this paper, we investigate how
to most efficiently use a fixed budget to build a compact model. Through
extensive experiments on six diverse tasks, we show that distilling from T5-XXL
(11B) to T5-Small (60M) is almost always a cost-efficient strategy compared to
annotating more data to directly train a compact model (T5-Small). We further
investigate how the optimal budget allocated towards computation varies across
scenarios. We will make our code, datasets, annotation cost estimates, and
baseline models available as a benchmark to support further work on
cost-efficient training of compact models.
| no_new_dataset | 0.710007 |
2305.07719 | Anna Lueber | Anna Lueber, Daniel Kitzmann, Chloe E. Fisher, Brendan P. Bowler, Adam
J. Burgasser, Mark Marley, Kevin Heng | Intercomparison of Brown Dwarf Model Grids and Atmospheric Retrieval
Using Machine Learning | Accepted for publication in The Astrophysical Journal | null | null | null | astro-ph.SR astro-ph.EP astro-ph.IM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding differences between sub-stellar spectral data and models has
proven to be a major challenge, especially for self-consistent model grids that
are necessary for a thorough investigation of brown dwarf atmospheres. Using
the supervised machine learning method of the random forest, we study the
information content of 14 previously published model grids of brown dwarfs
(from 1997 to 2021). The random forest method allows us to analyze the
predictive power of these model grids, as well as interpret data within the
framework of Approximate Bayesian Computation (ABC). Our curated dataset
includes 3 benchmark brown dwarfs (Gl 570D, {\epsilon} Indi Ba and Bb) as well
as a sample of 19 L and T dwarfs; this sample was previously analyzed in Lueber
et al. (2022) using traditional Bayesian methods (nested sampling). We find
that the effective temperature of a brown dwarf can be robustly predicted
independent of the model grid chosen for the interpretation. However, inference
of the surface gravity is model-dependent. Specifically, the BT-Settl, Sonora
Bobcat and Sonora Cholla model grids tend to predict logg ~3-4 (cgs units) even
after data blueward of 1.2 {\mu}m have been disregarded to mitigate for our
incomplete knowledge of the shapes of alkali lines. Two major, longstanding
challenges associated with understanding the influence of clouds in brown dwarf
atmospheres remain: our inability to model them from first principles and also
to robustly validate these models.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 18:20:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 06:28:43 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Lueber",
"Anna",
""
],
[
"Kitzmann",
"Daniel",
""
],
[
"Fisher",
"Chloe E.",
""
],
[
"Bowler",
"Brendan P.",
""
],
[
"Burgasser",
"Adam J.",
""
],
[
"Marley",
"Mark",
""
],
[
"Heng",
"Kevin",
""
]
] | TITLE: Intercomparison of Brown Dwarf Model Grids and Atmospheric Retrieval
Using Machine Learning
ABSTRACT: Understanding differences between sub-stellar spectral data and models has
proven to be a major challenge, especially for self-consistent model grids that
are necessary for a thorough investigation of brown dwarf atmospheres. Using
the supervised machine learning method of the random forest, we study the
information content of 14 previously published model grids of brown dwarfs
(from 1997 to 2021). The random forest method allows us to analyze the
predictive power of these model grids, as well as interpret data within the
framework of Approximate Bayesian Computation (ABC). Our curated dataset
includes 3 benchmark brown dwarfs (Gl 570D, {\epsilon} Indi Ba and Bb) as well
as a sample of 19 L and T dwarfs; this sample was previously analyzed in Lueber
et al. (2022) using traditional Bayesian methods (nested sampling). We find
that the effective temperature of a brown dwarf can be robustly predicted
independent of the model grid chosen for the interpretation. However, inference
of the surface gravity is model-dependent. Specifically, the BT-Settl, Sonora
Bobcat and Sonora Cholla model grids tend to predict logg ~3-4 (cgs units) even
after data blueward of 1.2 {\mu}m have been disregarded to mitigate for our
incomplete knowledge of the shapes of alkali lines. Two major, longstanding
challenges associated with understanding the influence of clouds in brown dwarf
atmospheres remain: our inability to model them from first principles and also
to robustly validate these models.
| new_dataset | 0.637482 |
2305.10457 | Jorge Marco-Blanco | Jorge Marco-Blanco, Rub\'en Cuevas | Time Series Clustering With Random Convolutional Kernels | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Time series data, spanning applications ranging from climatology to finance
to healthcare, presents significant challenges in data mining due to its size
and complexity. One open issue lies in time series clustering, which is crucial
for processing large volumes of unlabeled time series data and unlocking
valuable insights. Traditional and modern analysis methods, however, often
struggle with these complexities. To address these limitations, we introduce
R-Clustering, a novel method that utilizes convolutional architectures with
randomly selected parameters. Through extensive evaluations, R-Clustering
demonstrates superior performance over existing methods in terms of clustering
accuracy, computational efficiency and scalability. Empirical results obtained
using the UCR archive demonstrate the effectiveness of our approach across
diverse time series datasets. The findings highlight the significance of
R-Clustering in various domains and applications, contributing to the
advancement of time series data mining.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 06:25:22 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 13:36:47 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Marco-Blanco",
"Jorge",
""
],
[
"Cuevas",
"Rubén",
""
]
] | TITLE: Time Series Clustering With Random Convolutional Kernels
ABSTRACT: Time series data, spanning applications ranging from climatology to finance
to healthcare, presents significant challenges in data mining due to its size
and complexity. One open issue lies in time series clustering, which is crucial
for processing large volumes of unlabeled time series data and unlocking
valuable insights. Traditional and modern analysis methods, however, often
struggle with these complexities. To address these limitations, we introduce
R-Clustering, a novel method that utilizes convolutional architectures with
randomly selected parameters. Through extensive evaluations, R-Clustering
demonstrates superior performance over existing methods in terms of clustering
accuracy, computational efficiency and scalability. Empirical results obtained
using the UCR archive demonstrate the effectiveness of our approach across
diverse time series datasets. The findings highlight the significance of
R-Clustering in various domains and applications, contributing to the
advancement of time series data mining.
| no_new_dataset | 0.710622 |
2305.12263 | Wen Wu | Wen Wu, Chao Zhang, Philip C. Woodland | Self-supervised representations in speech-based depression detection | null | null | 10.1109/ICASSP49357.2023.10094910 | null | cs.CL cs.SD eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper proposes handling training data sparsity in speech-based automatic
depression detection (SDD) using foundation models pre-trained with
self-supervised learning (SSL). An analysis of SSL representations derived from
different layers of pre-trained foundation models is first presented for SDD,
which provides insight to suitable indicator for depression detection.
Knowledge transfer is then performed from automatic speech recognition (ASR)
and emotion recognition to SDD by fine-tuning the foundation models. Results
show that the uses of oracle and ASR transcriptions yield similar SDD
performance when the hidden representations of the ASR model is incorporated
along with the ASR textual information. By integrating representations from
multiple foundation models, state-of-the-art SDD results based on real ASR were
achieved on the DAIC-WOZ dataset.
| [
{
"version": "v1",
"created": "Sat, 20 May 2023 18:41:13 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 13:43:56 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Wu",
"Wen",
""
],
[
"Zhang",
"Chao",
""
],
[
"Woodland",
"Philip C.",
""
]
] | TITLE: Self-supervised representations in speech-based depression detection
ABSTRACT: This paper proposes handling training data sparsity in speech-based automatic
depression detection (SDD) using foundation models pre-trained with
self-supervised learning (SSL). An analysis of SSL representations derived from
different layers of pre-trained foundation models is first presented for SDD,
which provides insight to suitable indicator for depression detection.
Knowledge transfer is then performed from automatic speech recognition (ASR)
and emotion recognition to SDD by fine-tuning the foundation models. Results
show that the uses of oracle and ASR transcriptions yield similar SDD
performance when the hidden representations of the ASR model is incorporated
along with the ASR textual information. By integrating representations from
multiple foundation models, state-of-the-art SDD results based on real ASR were
achieved on the DAIC-WOZ dataset.
| no_new_dataset | 0.708168 |
2305.14818 | Raunak Shah | Koyel Mukherjee, Raunak Shah, Shiv Kumar Saini, Karanpreet Singh,
Khushi, Harsh Kesarwani, Kavya Barnwal, Ayush Chauhan | Towards Optimizing Storage Costs on the Cloud | The first two authors contributed equally. 12 pages, Accepted to the
International Conference on Data Engineering (ICDE) 2023 | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of optimizing data storage and access costs on the cloud
while ensuring that the desired performance or latency is unaffected. We first
propose an optimizer that optimizes the data placement tier (on the cloud) and
the choice of compression schemes to apply, for given data partitions with
temporal access predictions. Secondly, we propose a model to learn the
compression performance of multiple algorithms across data partitions in
different formats to generate compression performance predictions on the fly,
as inputs to the optimizer. Thirdly, we propose to approach the data
partitioning problem fundamentally differently than the current default in most
data lakes where partitioning is in the form of ingestion batches. We propose
access pattern aware data partitioning and formulate an optimization problem
that optimizes the size and reading costs of partitions subject to access
patterns.
We study the various optimization problems theoretically as well as
empirically, and provide theoretical bounds as well as hardness results. We
propose a unified pipeline of cost minimization, called SCOPe that combines the
different modules. We extensively compare the performance of our methods with
related baselines from the literature on TPC-H data as well as enterprise
datasets (ranging from GB to PB in volume) and show that SCOPe substantially
improves over the baselines. We show significant cost savings compared to
platform baselines, of the order of 50% to 83% on enterprise Data Lake datasets
that range from terabytes to petabytes in volume.
| [
{
"version": "v1",
"created": "Wed, 24 May 2023 07:12:25 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 05:01:04 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Mukherjee",
"Koyel",
""
],
[
"Shah",
"Raunak",
""
],
[
"Saini",
"Shiv Kumar",
""
],
[
"Singh",
"Karanpreet",
""
],
[
"Khushi",
"",
""
],
[
"Kesarwani",
"Harsh",
""
],
[
"Barnwal",
"Kavya",
""
],
[
"Chauhan",
"Ayush",
""
]
] | TITLE: Towards Optimizing Storage Costs on the Cloud
ABSTRACT: We study the problem of optimizing data storage and access costs on the cloud
while ensuring that the desired performance or latency is unaffected. We first
propose an optimizer that optimizes the data placement tier (on the cloud) and
the choice of compression schemes to apply, for given data partitions with
temporal access predictions. Secondly, we propose a model to learn the
compression performance of multiple algorithms across data partitions in
different formats to generate compression performance predictions on the fly,
as inputs to the optimizer. Thirdly, we propose to approach the data
partitioning problem fundamentally differently than the current default in most
data lakes where partitioning is in the form of ingestion batches. We propose
access pattern aware data partitioning and formulate an optimization problem
that optimizes the size and reading costs of partitions subject to access
patterns.
We study the various optimization problems theoretically as well as
empirically, and provide theoretical bounds as well as hardness results. We
propose a unified pipeline of cost minimization, called SCOPe that combines the
different modules. We extensively compare the performance of our methods with
related baselines from the literature on TPC-H data as well as enterprise
datasets (ranging from GB to PB in volume) and show that SCOPe substantially
improves over the baselines. We show significant cost savings compared to
platform baselines, of the order of 50% to 83% on enterprise Data Lake datasets
that range from terabytes to petabytes in volume.
| no_new_dataset | 0.710622 |
2305.16797 | Loukas Ilias | Loukas Ilias, Spiros Mouzakitis, Dimitris Askounis | Calibration of Transformer-based Models for Identifying Stress and
Depression in Social Media | IEEE Transactions on Computational Social Systems (Accepted) | null | 10.1109/TCSS.2023.3283009 | null | cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In today's fast-paced world, the rates of stress and depression present a
surge. Social media provide assistance for the early detection of mental health
conditions. Existing methods mainly introduce feature extraction approaches and
train shallow machine learning classifiers. Other researches use deep neural
networks or transformers. Despite the fact that transformer-based models
achieve noticeable improvements, they cannot often capture rich factual
knowledge. Although there have been proposed a number of studies aiming to
enhance the pretrained transformer-based models with extra information or
additional modalities, no prior work has exploited these modifications for
detecting stress and depression through social media. In addition, although the
reliability of a machine learning model's confidence in its predictions is
critical for high-risk applications, there is no prior work taken into
consideration the model calibration. To resolve the above issues, we present
the first study in the task of depression and stress detection in social media,
which injects extra linguistic information in transformer-based models, namely
BERT and MentalBERT. Specifically, the proposed approach employs a Multimodal
Adaptation Gate for creating the combined embeddings, which are given as input
to a BERT (or MentalBERT) model. For taking into account the model calibration,
we apply label smoothing. We test our proposed approaches in three publicly
available datasets and demonstrate that the integration of linguistic features
into transformer-based models presents a surge in the performance. Also, the
usage of label smoothing contributes to both the improvement of the model's
performance and the calibration of the model. We finally perform a linguistic
analysis of the posts and show differences in language between stressful and
non-stressful texts, as well as depressive and non-depressive posts.
| [
{
"version": "v1",
"created": "Fri, 26 May 2023 10:19:04 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2023 21:45:29 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ilias",
"Loukas",
""
],
[
"Mouzakitis",
"Spiros",
""
],
[
"Askounis",
"Dimitris",
""
]
] | TITLE: Calibration of Transformer-based Models for Identifying Stress and
Depression in Social Media
ABSTRACT: In today's fast-paced world, the rates of stress and depression present a
surge. Social media provide assistance for the early detection of mental health
conditions. Existing methods mainly introduce feature extraction approaches and
train shallow machine learning classifiers. Other researches use deep neural
networks or transformers. Despite the fact that transformer-based models
achieve noticeable improvements, they cannot often capture rich factual
knowledge. Although there have been proposed a number of studies aiming to
enhance the pretrained transformer-based models with extra information or
additional modalities, no prior work has exploited these modifications for
detecting stress and depression through social media. In addition, although the
reliability of a machine learning model's confidence in its predictions is
critical for high-risk applications, there is no prior work taken into
consideration the model calibration. To resolve the above issues, we present
the first study in the task of depression and stress detection in social media,
which injects extra linguistic information in transformer-based models, namely
BERT and MentalBERT. Specifically, the proposed approach employs a Multimodal
Adaptation Gate for creating the combined embeddings, which are given as input
to a BERT (or MentalBERT) model. For taking into account the model calibration,
we apply label smoothing. We test our proposed approaches in three publicly
available datasets and demonstrate that the integration of linguistic features
into transformer-based models presents a surge in the performance. Also, the
usage of label smoothing contributes to both the improvement of the model's
performance and the calibration of the model. We finally perform a linguistic
analysis of the posts and show differences in language between stressful and
non-stressful texts, as well as depressive and non-depressive posts.
| no_new_dataset | 0.708616 |
2305.18486 | Md Tahmid Rahman Laskar | Md Tahmid Rahman Laskar, M Saiful Bari, Mizanur Rahman, Md Amran
Hossen Bhuiyan, Shafiq Joty, Jimmy Xiangji Huang | A Systematic Study and Comprehensive Evaluation of ChatGPT on Benchmark
Datasets | Accepted by ACL 2023 Findings. The first three authors contributed
equally | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The development of large language models (LLMs) such as ChatGPT has brought a
lot of attention recently. However, their evaluation in the benchmark academic
datasets remains under-explored due to the difficulty of evaluating the
generative outputs produced by this model against the ground truth. In this
paper, we aim to present a thorough evaluation of ChatGPT's performance on
diverse academic datasets, covering tasks like question-answering, text
summarization, code generation, commonsense reasoning, mathematical
problem-solving, machine translation, bias detection, and ethical
considerations. Specifically, we evaluate ChatGPT across 140 tasks and analyze
255K responses it generates in these datasets. This makes our work the largest
evaluation of ChatGPT in NLP benchmarks. In short, our study aims to validate
the strengths and weaknesses of ChatGPT in various tasks and provide insights
for future research using LLMs. We also report a new emergent ability to follow
multi-query instructions that we mostly found in ChatGPT and other
instruction-tuned models. Our extensive evaluation shows that even though
ChatGPT is capable of performing a wide variety of tasks, and may obtain
impressive performance in several benchmark datasets, it is still far from
achieving the ability to reliably solve many challenging tasks. By providing a
thorough assessment of ChatGPT's performance across diverse NLP tasks, this
paper sets the stage for a targeted deployment of ChatGPT-like LLMs in
real-world applications.
| [
{
"version": "v1",
"created": "Mon, 29 May 2023 12:37:21 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2023 16:21:40 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Jun 2023 03:27:16 GMT"
},
{
"version": "v4",
"created": "Wed, 5 Jul 2023 16:19:38 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Laskar",
"Md Tahmid Rahman",
""
],
[
"Bari",
"M Saiful",
""
],
[
"Rahman",
"Mizanur",
""
],
[
"Bhuiyan",
"Md Amran Hossen",
""
],
[
"Joty",
"Shafiq",
""
],
[
"Huang",
"Jimmy Xiangji",
""
]
] | TITLE: A Systematic Study and Comprehensive Evaluation of ChatGPT on Benchmark
Datasets
ABSTRACT: The development of large language models (LLMs) such as ChatGPT has brought a
lot of attention recently. However, their evaluation in the benchmark academic
datasets remains under-explored due to the difficulty of evaluating the
generative outputs produced by this model against the ground truth. In this
paper, we aim to present a thorough evaluation of ChatGPT's performance on
diverse academic datasets, covering tasks like question-answering, text
summarization, code generation, commonsense reasoning, mathematical
problem-solving, machine translation, bias detection, and ethical
considerations. Specifically, we evaluate ChatGPT across 140 tasks and analyze
255K responses it generates in these datasets. This makes our work the largest
evaluation of ChatGPT in NLP benchmarks. In short, our study aims to validate
the strengths and weaknesses of ChatGPT in various tasks and provide insights
for future research using LLMs. We also report a new emergent ability to follow
multi-query instructions that we mostly found in ChatGPT and other
instruction-tuned models. Our extensive evaluation shows that even though
ChatGPT is capable of performing a wide variety of tasks, and may obtain
impressive performance in several benchmark datasets, it is still far from
achieving the ability to reliably solve many challenging tasks. By providing a
thorough assessment of ChatGPT's performance across diverse NLP tasks, this
paper sets the stage for a targeted deployment of ChatGPT-like LLMs in
real-world applications.
| no_new_dataset | 0.706836 |
2306.10077 | Sathya Krishnan Suresh | Sathya Krishnan TS, S. Lakshmana Pandian and P. Shunmugapriya | Stacking of Hyperparameter Tuned Models for Tagging Coding Problems | Error corrections have to be made for certain metrics | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Coding problems are problems that require a solution in the form of a
computer program. Coding problems are popular among students and professionals
as it enhances their skills and career opportunities. An AI system that would
help those who practice coding problems would be highly useful and there is a
huge potential for such a system. In this work, we propose a model which uses
stacking of hyperparameter tuned boosting models to achieve impressive metric
scores of 77.8% accuracy and 0.815 PR-AUC on the dataset that was scraped from
Codeforces and Leetcode. We open source the dataset and the models developed
for this work.
| [
{
"version": "v1",
"created": "Fri, 16 Jun 2023 03:45:48 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 10:03:35 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"TS",
"Sathya Krishnan",
""
],
[
"Pandian",
"S. Lakshmana",
""
],
[
"Shunmugapriya",
"P.",
""
]
] | TITLE: Stacking of Hyperparameter Tuned Models for Tagging Coding Problems
ABSTRACT: Coding problems are problems that require a solution in the form of a
computer program. Coding problems are popular among students and professionals
as it enhances their skills and career opportunities. An AI system that would
help those who practice coding problems would be highly useful and there is a
huge potential for such a system. In this work, we propose a model which uses
stacking of hyperparameter tuned boosting models to achieve impressive metric
scores of 77.8% accuracy and 0.815 PR-AUC on the dataset that was scraped from
Codeforces and Leetcode. We open source the dataset and the models developed
for this work.
| no_new_dataset | 0.69681 |
2306.10239 | Zhiyuan Ning | Zhiyuan Ning, Zhangxun Li, Zhengliang Guo, Zile Wang, Liang Song | Multi-scale Spatial-temporal Interaction Network for Video Anomaly
Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video Anomaly Detection (VAD) is an essential yet challenging task in signal
processing. Since certain anomalies cannot be detected by isolated analysis of
either temporal or spatial information, the interaction between these two types
of data is considered crucial for VAD. However, current dual-stream
architectures either confine this integral interaction to the bottleneck of the
autoencoder or introduce anomaly-irrelevant background pixels into the
interactive process, hindering the accuracy of VAD. To address these
deficiencies, we propose a Multi-scale Spatial-Temporal Interaction Network
(MSTI-Net) for VAD. First, to prioritize the detection of moving objects in the
scene and harmonize the substantial semantic discrepancies between the two
types of data, we propose an Attention-based Spatial-Temporal Fusion Module
(ASTFM) as a substitute for the conventional direct fusion. Furthermore, we
inject multi-ASTFM-based connections that bridge the appearance and motion
streams of the dual-stream network, thus fostering multi-scale spatial-temporal
interaction. Finally, to bolster the delineation between normal and abnormal
activities, our system records the regular information in a memory module.
Experimental results on three benchmark datasets validate the effectiveness of
our approach, which achieves AUCs of 96.8%, 87.6%, and 73.9% on the UCSD Ped2,
CUHK Avenue, and ShanghaiTech datasets, respectively.
| [
{
"version": "v1",
"created": "Sat, 17 Jun 2023 02:40:29 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 04:38:44 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ning",
"Zhiyuan",
""
],
[
"Li",
"Zhangxun",
""
],
[
"Guo",
"Zhengliang",
""
],
[
"Wang",
"Zile",
""
],
[
"Song",
"Liang",
""
]
] | TITLE: Multi-scale Spatial-temporal Interaction Network for Video Anomaly
Detection
ABSTRACT: Video Anomaly Detection (VAD) is an essential yet challenging task in signal
processing. Since certain anomalies cannot be detected by isolated analysis of
either temporal or spatial information, the interaction between these two types
of data is considered crucial for VAD. However, current dual-stream
architectures either confine this integral interaction to the bottleneck of the
autoencoder or introduce anomaly-irrelevant background pixels into the
interactive process, hindering the accuracy of VAD. To address these
deficiencies, we propose a Multi-scale Spatial-Temporal Interaction Network
(MSTI-Net) for VAD. First, to prioritize the detection of moving objects in the
scene and harmonize the substantial semantic discrepancies between the two
types of data, we propose an Attention-based Spatial-Temporal Fusion Module
(ASTFM) as a substitute for the conventional direct fusion. Furthermore, we
inject multi-ASTFM-based connections that bridge the appearance and motion
streams of the dual-stream network, thus fostering multi-scale spatial-temporal
interaction. Finally, to bolster the delineation between normal and abnormal
activities, our system records the regular information in a memory module.
Experimental results on three benchmark datasets validate the effectiveness of
our approach, which achieves AUCs of 96.8%, 87.6%, and 73.9% on the UCSD Ped2,
CUHK Avenue, and ShanghaiTech datasets, respectively.
| no_new_dataset | 0.711588 |
2306.11182 | Wenqi Jiang | Wenqi Jiang and Shigang Li and Yu Zhu and Johannes de Fine Licht and
Zhenhao He and Runbin Shi and Cedric Renggli and Shuai Zhang and Theodoros
Rekatsinas and Torsten Hoefler and Gustavo Alonso | Co-design Hardware and Algorithm for Vector Search | 11 pages | null | null | null | cs.LG cs.DB cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Vector search has emerged as the foundation for large-scale information
retrieval and machine learning systems, with search engines like Google and
Bing processing tens of thousands of queries per second on petabyte-scale
document datasets by evaluating vector similarities between encoded query texts
and web documents. As performance demands for vector search systems surge,
accelerated hardware offers a promising solution in the post-Moore's Law era.
We introduce \textit{FANNS}, an end-to-end and scalable vector search framework
on FPGAs. Given a user-provided recall requirement on a dataset and a hardware
resource budget, \textit{FANNS} automatically co-designs hardware and
algorithm, subsequently generating the corresponding accelerator. The framework
also supports scale-out by incorporating a hardware TCP/IP stack in the
accelerator. \textit{FANNS} attains up to 23.0$\times$ and 37.2$\times$ speedup
compared to FPGA and CPU baselines, respectively, and demonstrates superior
scalability to GPUs, achieving 5.5$\times$ and 7.6$\times$ speedup in median
and 95\textsuperscript{th} percentile (P95) latency within an eight-accelerator
configuration. The remarkable performance of \textit{FANNS} lays a robust
groundwork for future FPGA integration in data centers and AI supercomputers.
| [
{
"version": "v1",
"created": "Mon, 19 Jun 2023 22:12:37 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2023 10:37:34 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Jul 2023 13:52:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Jiang",
"Wenqi",
""
],
[
"Li",
"Shigang",
""
],
[
"Zhu",
"Yu",
""
],
[
"Licht",
"Johannes de Fine",
""
],
[
"He",
"Zhenhao",
""
],
[
"Shi",
"Runbin",
""
],
[
"Renggli",
"Cedric",
""
],
[
"Zhang",
"Shuai",
""
],
[
"Rekatsinas",
"Theodoros",
""
],
[
"Hoefler",
"Torsten",
""
],
[
"Alonso",
"Gustavo",
""
]
] | TITLE: Co-design Hardware and Algorithm for Vector Search
ABSTRACT: Vector search has emerged as the foundation for large-scale information
retrieval and machine learning systems, with search engines like Google and
Bing processing tens of thousands of queries per second on petabyte-scale
document datasets by evaluating vector similarities between encoded query texts
and web documents. As performance demands for vector search systems surge,
accelerated hardware offers a promising solution in the post-Moore's Law era.
We introduce \textit{FANNS}, an end-to-end and scalable vector search framework
on FPGAs. Given a user-provided recall requirement on a dataset and a hardware
resource budget, \textit{FANNS} automatically co-designs hardware and
algorithm, subsequently generating the corresponding accelerator. The framework
also supports scale-out by incorporating a hardware TCP/IP stack in the
accelerator. \textit{FANNS} attains up to 23.0$\times$ and 37.2$\times$ speedup
compared to FPGA and CPU baselines, respectively, and demonstrates superior
scalability to GPUs, achieving 5.5$\times$ and 7.6$\times$ speedup in median
and 95\textsuperscript{th} percentile (P95) latency within an eight-accelerator
configuration. The remarkable performance of \textit{FANNS} lays a robust
groundwork for future FPGA integration in data centers and AI supercomputers.
| no_new_dataset | 0.709988 |
2306.14422 | Wen-Chin Huang | Wen-Chin Huang, Lester Phillip Violeta, Songxiang Liu, Jiatong Shi,
Tomoki Toda | The Singing Voice Conversion Challenge 2023 | null | null | null | null | cs.SD cs.CL eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the latest iteration of the voice conversion challenge (VCC)
series, a bi-annual scientific event aiming to compare and understand different
voice conversion (VC) systems based on a common dataset. This year we shifted
our focus to singing voice conversion (SVC), thus named the challenge the
Singing Voice Conversion Challenge (SVCC). A new database was constructed for
two tasks, namely in-domain and cross-domain SVC. The challenge was run for two
months, and in total we received 26 submissions, including 2 baselines. Through
a large-scale crowd-sourced listening test, we observed that for both tasks,
although human-level naturalness was achieved by the top system, no team was
able to obtain a similarity score as high as the target speakers. Also, as
expected, cross-domain SVC is harder than in-domain SVC, especially in the
similarity aspect. We also investigated whether existing objective measurements
were able to predict perceptual performance, and found that only few of them
could reach a significant correlation.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2023 05:04:58 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 08:17:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Huang",
"Wen-Chin",
""
],
[
"Violeta",
"Lester Phillip",
""
],
[
"Liu",
"Songxiang",
""
],
[
"Shi",
"Jiatong",
""
],
[
"Toda",
"Tomoki",
""
]
] | TITLE: The Singing Voice Conversion Challenge 2023
ABSTRACT: We present the latest iteration of the voice conversion challenge (VCC)
series, a bi-annual scientific event aiming to compare and understand different
voice conversion (VC) systems based on a common dataset. This year we shifted
our focus to singing voice conversion (SVC), thus named the challenge the
Singing Voice Conversion Challenge (SVCC). A new database was constructed for
two tasks, namely in-domain and cross-domain SVC. The challenge was run for two
months, and in total we received 26 submissions, including 2 baselines. Through
a large-scale crowd-sourced listening test, we observed that for both tasks,
although human-level naturalness was achieved by the top system, no team was
able to obtain a similarity score as high as the target speakers. Also, as
expected, cross-domain SVC is harder than in-domain SVC, especially in the
similarity aspect. We also investigated whether existing objective measurements
were able to predict perceptual performance, and found that only few of them
could reach a significant correlation.
| new_dataset | 0.696771 |
2307.00692 | Sharif Ahmed | Sharif Ahmed and Nasir U. Eisty | Exploring the Advances in Identifying Useful Code Review Comments | This paper has been accepted for inclusion in the Proceedings of the
17th ACM/IEEE International Symposium on Empirical Software Engineering and
Measurement (ESEM 2023) | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Effective peer code review in collaborative software development necessitates
useful reviewer comments and supportive automated tools. Code review comments
are a central component of the Modern Code Review process in the industry and
open-source development. Therefore, it is important to ensure these comments
serve their purposes. This paper reflects the evolution of research on the
usefulness of code review comments. It examines papers that define the
usefulness of code review comments, mine and annotate datasets, study
developers' perceptions, analyze factors from different aspects, and use
machine learning classifiers to automatically predict the usefulness of code
review comments. Finally, it discusses the open problems and challenges in
recognizing useful code review comments for future research.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 00:41:20 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 16:10:14 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ahmed",
"Sharif",
""
],
[
"Eisty",
"Nasir U.",
""
]
] | TITLE: Exploring the Advances in Identifying Useful Code Review Comments
ABSTRACT: Effective peer code review in collaborative software development necessitates
useful reviewer comments and supportive automated tools. Code review comments
are a central component of the Modern Code Review process in the industry and
open-source development. Therefore, it is important to ensure these comments
serve their purposes. This paper reflects the evolution of research on the
usefulness of code review comments. It examines papers that define the
usefulness of code review comments, mine and annotate datasets, study
developers' perceptions, analyze factors from different aspects, and use
machine learning classifiers to automatically predict the usefulness of code
review comments. Finally, it discusses the open problems and challenges in
recognizing useful code review comments for future research.
| no_new_dataset | 0.711425 |
2307.00711 | Deyi Ji | Deyi Ji, Feng Zhao, Hongtao Lu | Guided Patch-Grouping Wavelet Transformer with Spatial Congruence for
Ultra-High Resolution Segmentation | Accepted to IJCAI 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most existing ultra-high resolution (UHR) segmentation methods always
struggle in the dilemma of balancing memory cost and local characterization
accuracy, which are both taken into account in our proposed Guided
Patch-Grouping Wavelet Transformer (GPWFormer) that achieves impressive
performances. In this work, GPWFormer is a Transformer ($\mathcal{T}$)-CNN
($\mathcal{C}$) mutual leaning framework, where $\mathcal{T}$ takes the whole
UHR image as input and harvests both local details and fine-grained long-range
contextual dependencies, while $\mathcal{C}$ takes downsampled image as input
for learning the category-wise deep context. For the sake of high inference
speed and low computation complexity, $\mathcal{T}$ partitions the original UHR
image into patches and groups them dynamically, then learns the low-level local
details with the lightweight multi-head Wavelet Transformer (WFormer) network.
Meanwhile, the fine-grained long-range contextual dependencies are also
captured during this process, since patches that are far away in the spatial
domain can also be assigned to the same group. In addition, masks produced by
$\mathcal{C}$ are utilized to guide the patch grouping process, providing a
heuristics decision. Moreover, the congruence constraints between the two
branches are also exploited to maintain the spatial consistency among the
patches. Overall, we stack the multi-stage process in a pyramid way.
Experiments show that GPWFormer outperforms the existing methods with
significant improvements on five benchmark datasets.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 02:19:48 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 02:54:16 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ji",
"Deyi",
""
],
[
"Zhao",
"Feng",
""
],
[
"Lu",
"Hongtao",
""
]
] | TITLE: Guided Patch-Grouping Wavelet Transformer with Spatial Congruence for
Ultra-High Resolution Segmentation
ABSTRACT: Most existing ultra-high resolution (UHR) segmentation methods always
struggle in the dilemma of balancing memory cost and local characterization
accuracy, which are both taken into account in our proposed Guided
Patch-Grouping Wavelet Transformer (GPWFormer) that achieves impressive
performances. In this work, GPWFormer is a Transformer ($\mathcal{T}$)-CNN
($\mathcal{C}$) mutual leaning framework, where $\mathcal{T}$ takes the whole
UHR image as input and harvests both local details and fine-grained long-range
contextual dependencies, while $\mathcal{C}$ takes downsampled image as input
for learning the category-wise deep context. For the sake of high inference
speed and low computation complexity, $\mathcal{T}$ partitions the original UHR
image into patches and groups them dynamically, then learns the low-level local
details with the lightweight multi-head Wavelet Transformer (WFormer) network.
Meanwhile, the fine-grained long-range contextual dependencies are also
captured during this process, since patches that are far away in the spatial
domain can also be assigned to the same group. In addition, masks produced by
$\mathcal{C}$ are utilized to guide the patch grouping process, providing a
heuristics decision. Moreover, the congruence constraints between the two
branches are also exploited to maintain the spatial consistency among the
patches. Overall, we stack the multi-stage process in a pyramid way.
Experiments show that GPWFormer outperforms the existing methods with
significant improvements on five benchmark datasets.
| no_new_dataset | 0.710478 |
2307.00968 | Cheng Chen | Cheng Chen, Yong Wang, Lizi Liao, Yueguo Chen, Xiaoyong Du | REAL: A Representative Error-Driven Approach for Active Learning | Accepted by ECML/PKDD 2023 | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Given a limited labeling budget, active learning (AL) aims to sample the most
informative instances from an unlabeled pool to acquire labels for subsequent
model training. To achieve this, AL typically measures the informativeness of
unlabeled instances based on uncertainty and diversity. However, it does not
consider erroneous instances with their neighborhood error density, which have
great potential to improve the model performance. To address this limitation,
we propose $REAL$, a novel approach to select data instances with
$\underline{R}$epresentative $\underline{E}$rrors for $\underline{A}$ctive
$\underline{L}$earning. It identifies minority predictions as \emph{pseudo
errors} within a cluster and allocates an adaptive sampling budget for the
cluster based on estimated error density. Extensive experiments on five text
classification datasets demonstrate that $REAL$ consistently outperforms all
best-performing baselines regarding accuracy and F1-macro scores across a wide
range of hyperparameter settings. Our analysis also shows that $REAL$ selects
the most representative pseudo errors that match the distribution of
ground-truth errors along the decision boundary. Our code is publicly available
at https://github.com/withchencheng/ECML_PKDD_23_Real.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 12:39:26 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 01:36:59 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chen",
"Cheng",
""
],
[
"Wang",
"Yong",
""
],
[
"Liao",
"Lizi",
""
],
[
"Chen",
"Yueguo",
""
],
[
"Du",
"Xiaoyong",
""
]
] | TITLE: REAL: A Representative Error-Driven Approach for Active Learning
ABSTRACT: Given a limited labeling budget, active learning (AL) aims to sample the most
informative instances from an unlabeled pool to acquire labels for subsequent
model training. To achieve this, AL typically measures the informativeness of
unlabeled instances based on uncertainty and diversity. However, it does not
consider erroneous instances with their neighborhood error density, which have
great potential to improve the model performance. To address this limitation,
we propose $REAL$, a novel approach to select data instances with
$\underline{R}$epresentative $\underline{E}$rrors for $\underline{A}$ctive
$\underline{L}$earning. It identifies minority predictions as \emph{pseudo
errors} within a cluster and allocates an adaptive sampling budget for the
cluster based on estimated error density. Extensive experiments on five text
classification datasets demonstrate that $REAL$ consistently outperforms all
best-performing baselines regarding accuracy and F1-macro scores across a wide
range of hyperparameter settings. Our analysis also shows that $REAL$ selects
the most representative pseudo errors that match the distribution of
ground-truth errors along the decision boundary. Our code is publicly available
at https://github.com/withchencheng/ECML_PKDD_23_Real.
| no_new_dataset | 0.710597 |
2307.01148 | Salman Ul Hassan Dar | Salman Ul Hassan Dar, Arman Ghanaat, Jannik Kahmann, Isabelle Ayx,
Theano Papavassiliu, Stefan O. Schoenberg, Sandy Engelhardt | Investigating Data Memorization in 3D Latent Diffusion Models for
Medical Image Synthesis | null | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generative latent diffusion models have been established as state-of-the-art
in data generation. One promising application is generation of realistic
synthetic medical imaging data for open data sharing without compromising
patient privacy. Despite the promise, the capacity of such models to memorize
sensitive patient training data and synthesize samples showing high resemblance
to training data samples is relatively unexplored. Here, we assess the
memorization capacity of 3D latent diffusion models on photon-counting coronary
computed tomography angiography and knee magnetic resonance imaging datasets.
To detect potential memorization of training samples, we utilize
self-supervised models based on contrastive learning. Our results suggest that
such latent diffusion models indeed memorize training data, and there is a dire
need for devising strategies to mitigate memorization.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 16:39:28 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 09:09:55 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Dar",
"Salman Ul Hassan",
""
],
[
"Ghanaat",
"Arman",
""
],
[
"Kahmann",
"Jannik",
""
],
[
"Ayx",
"Isabelle",
""
],
[
"Papavassiliu",
"Theano",
""
],
[
"Schoenberg",
"Stefan O.",
""
],
[
"Engelhardt",
"Sandy",
""
]
] | TITLE: Investigating Data Memorization in 3D Latent Diffusion Models for
Medical Image Synthesis
ABSTRACT: Generative latent diffusion models have been established as state-of-the-art
in data generation. One promising application is generation of realistic
synthetic medical imaging data for open data sharing without compromising
patient privacy. Despite the promise, the capacity of such models to memorize
sensitive patient training data and synthesize samples showing high resemblance
to training data samples is relatively unexplored. Here, we assess the
memorization capacity of 3D latent diffusion models on photon-counting coronary
computed tomography angiography and knee magnetic resonance imaging datasets.
To detect potential memorization of training samples, we utilize
self-supervised models based on contrastive learning. Our results suggest that
such latent diffusion models indeed memorize training data, and there is a dire
need for devising strategies to mitigate memorization.
| no_new_dataset | 0.7116 |
2307.01848 | Zhenyu Wu | Zhenyu Wu, Ziwei Wang, Xiuwei Xu, Jiwen Lu, Haibin Yan | Embodied Task Planning with Large Language Models | Project Page: https://gary3410.github.io/TaPA | null | null | null | cs.CV cs.AI cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Equipping embodied agents with commonsense is important for robots to
successfully complete complex human instructions in general environments.
Recent large language models (LLM) can embed rich semantic knowledge for agents
in plan generation of complex tasks, while they lack the information about the
realistic world and usually yield infeasible action sequences. In this paper,
we propose a TAsk Planing Agent (TaPA) in embodied tasks for grounded planning
with physical scene constraint, where the agent generates executable plans
according to the existed objects in the scene by aligning LLMs with the visual
perception models. Specifically, we first construct a multimodal dataset
containing triplets of indoor scenes, instructions and action plans, where we
provide the designed prompts and the list of existing objects in the scene for
GPT-3.5 to generate a large number of instructions and corresponding planned
actions. The generated data is leveraged for grounded plan tuning of
pre-trained LLMs. During inference, we discover the objects in the scene by
extending open-vocabulary object detectors to multi-view RGB images collected
in different achievable locations. Experimental results show that the generated
plan from our TaPA framework can achieve higher success rate than LLaVA and
GPT-3.5 by a sizable margin, which indicates the practicality of embodied task
planning in general and complex environments.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 17:58:25 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Wu",
"Zhenyu",
""
],
[
"Wang",
"Ziwei",
""
],
[
"Xu",
"Xiuwei",
""
],
[
"Lu",
"Jiwen",
""
],
[
"Yan",
"Haibin",
""
]
] | TITLE: Embodied Task Planning with Large Language Models
ABSTRACT: Equipping embodied agents with commonsense is important for robots to
successfully complete complex human instructions in general environments.
Recent large language models (LLM) can embed rich semantic knowledge for agents
in plan generation of complex tasks, while they lack the information about the
realistic world and usually yield infeasible action sequences. In this paper,
we propose a TAsk Planing Agent (TaPA) in embodied tasks for grounded planning
with physical scene constraint, where the agent generates executable plans
according to the existed objects in the scene by aligning LLMs with the visual
perception models. Specifically, we first construct a multimodal dataset
containing triplets of indoor scenes, instructions and action plans, where we
provide the designed prompts and the list of existing objects in the scene for
GPT-3.5 to generate a large number of instructions and corresponding planned
actions. The generated data is leveraged for grounded plan tuning of
pre-trained LLMs. During inference, we discover the objects in the scene by
extending open-vocabulary object detectors to multi-view RGB images collected
in different achievable locations. Experimental results show that the generated
plan from our TaPA framework can achieve higher success rate than LLaVA and
GPT-3.5 by a sizable margin, which indicates the practicality of embodied task
planning in general and complex environments.
| new_dataset | 0.714647 |
2307.01896 | Young Min Kim | Young Min Kim, Kalvin Chang, Chenxuan Cui and David Mortensen | Transformed Protoform Reconstruction | Accepted at ACL 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Protoform reconstruction is the task of inferring what morphemes or words
appeared like in the ancestral languages of a set of daughter languages. Meloni
et al. (2021) achieved the state-of-the-art on Latin protoform reconstruction
with an RNN-based encoder-decoder with attention model. We update their model
with the state-of-the-art seq2seq model: the Transformer. Our model outperforms
their model on a suite of different metrics on two different datasets: their
Romance data of 8,000 cognates spanning 5 languages and a Chinese dataset (Hou
2004) of 800+ cognates spanning 39 varieties. We also probe our model for
potential phylogenetic signal contained in the model. Our code is publicly
available at https://github.com/cmu-llab/acl-2023.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 19:40:20 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 03:51:57 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Kim",
"Young Min",
""
],
[
"Chang",
"Kalvin",
""
],
[
"Cui",
"Chenxuan",
""
],
[
"Mortensen",
"David",
""
]
] | TITLE: Transformed Protoform Reconstruction
ABSTRACT: Protoform reconstruction is the task of inferring what morphemes or words
appeared like in the ancestral languages of a set of daughter languages. Meloni
et al. (2021) achieved the state-of-the-art on Latin protoform reconstruction
with an RNN-based encoder-decoder with attention model. We update their model
with the state-of-the-art seq2seq model: the Transformer. Our model outperforms
their model on a suite of different metrics on two different datasets: their
Romance data of 8,000 cognates spanning 5 languages and a Chinese dataset (Hou
2004) of 800+ cognates spanning 39 varieties. We also probe our model for
potential phylogenetic signal contained in the model. Our code is publicly
available at https://github.com/cmu-llab/acl-2023.
| no_new_dataset | 0.685923 |
2307.02472 | Zayne Sprague | Zayne Sprague, Kaj Bostrom, Swarat Chaudhuri, Greg Durrett | Deductive Additivity for Planning of Natural Language Proofs | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Current natural language systems designed for multi-step claim validation
typically operate in two phases: retrieve a set of relevant premise statements
using heuristics (planning), then generate novel conclusions from those
statements using a large language model (deduction). The planning step often
requires expensive Transformer operations and does not scale to arbitrary
numbers of premise statements. In this paper, we investigate whether an
efficient planning heuristic is possible via embedding spaces compatible with
deductive reasoning. Specifically, we evaluate whether embedding spaces exhibit
a property we call deductive additivity: the sum of premise statement
embeddings should be close to embeddings of conclusions based on those
premises. We explore multiple sources of off-the-shelf dense embeddings in
addition to fine-tuned embeddings from GPT3 and sparse embeddings from BM25. We
study embedding models both intrinsically, evaluating whether the property of
deductive additivity holds, and extrinsically, using them to assist planning in
natural language proof generation. Lastly, we create a dataset, Single-Step
Reasoning Contrast (SSRC), to further probe performance on various reasoning
types. Our findings suggest that while standard embedding methods frequently
embed conclusions near the sums of their premises, they fall short of being
effective heuristics and lack the ability to model certain categories of
reasoning.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 17:45:48 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2023 02:16:33 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Sprague",
"Zayne",
""
],
[
"Bostrom",
"Kaj",
""
],
[
"Chaudhuri",
"Swarat",
""
],
[
"Durrett",
"Greg",
""
]
] | TITLE: Deductive Additivity for Planning of Natural Language Proofs
ABSTRACT: Current natural language systems designed for multi-step claim validation
typically operate in two phases: retrieve a set of relevant premise statements
using heuristics (planning), then generate novel conclusions from those
statements using a large language model (deduction). The planning step often
requires expensive Transformer operations and does not scale to arbitrary
numbers of premise statements. In this paper, we investigate whether an
efficient planning heuristic is possible via embedding spaces compatible with
deductive reasoning. Specifically, we evaluate whether embedding spaces exhibit
a property we call deductive additivity: the sum of premise statement
embeddings should be close to embeddings of conclusions based on those
premises. We explore multiple sources of off-the-shelf dense embeddings in
addition to fine-tuned embeddings from GPT3 and sparse embeddings from BM25. We
study embedding models both intrinsically, evaluating whether the property of
deductive additivity holds, and extrinsically, using them to assist planning in
natural language proof generation. Lastly, we create a dataset, Single-Step
Reasoning Contrast (SSRC), to further probe performance on various reasoning
types. Our findings suggest that while standard embedding methods frequently
embed conclusions near the sums of their premises, they fall short of being
effective heuristics and lack the ability to model certain categories of
reasoning.
| new_dataset | 0.715213 |
2307.02491 | Sang-Chul Lee | Seung-eon Lee and Sang-Chul Lee | TablEye: Seeing small Tables through the Lens of Images | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The exploration of few-shot tabular learning becomes imperative. Tabular data
is a versatile representation that captures diverse information, yet it is not
exempt from limitations, property of data and model size. Labeling extensive
tabular data can be challenging, and it may not be feasible to capture every
important feature. Few-shot tabular learning, however, remains relatively
unexplored, primarily due to scarcity of shared information among independent
datasets and the inherent ambiguity in defining boundaries within tabular data.
To the best of our knowledge, no meaningful and unrestricted few-shot tabular
learning techniques have been developed without imposing constraints on the
dataset. In this paper, we propose an innovative framework called TablEye,
which aims to overcome the limit of forming prior knowledge for tabular data by
adopting domain transformation. It facilitates domain transformation by
generating tabular images, which effectively conserve the intrinsic semantics
of the original tabular data. This approach harnesses rigorously tested
few-shot learning algorithms and embedding functions to acquire and apply prior
knowledge. Leveraging shared data domains allows us to utilize this prior
knowledge, originally learned from the image domain. Specifically, TablEye
demonstrated a superior performance by outstripping the TabLLM in a 4-shot task
with a maximum 0.11 AUC and a STUNT in a 1- shot setting, where it led on
average by 3.17% accuracy.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 02:45:59 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Lee",
"Seung-eon",
""
],
[
"Lee",
"Sang-Chul",
""
]
] | TITLE: TablEye: Seeing small Tables through the Lens of Images
ABSTRACT: The exploration of few-shot tabular learning becomes imperative. Tabular data
is a versatile representation that captures diverse information, yet it is not
exempt from limitations, property of data and model size. Labeling extensive
tabular data can be challenging, and it may not be feasible to capture every
important feature. Few-shot tabular learning, however, remains relatively
unexplored, primarily due to scarcity of shared information among independent
datasets and the inherent ambiguity in defining boundaries within tabular data.
To the best of our knowledge, no meaningful and unrestricted few-shot tabular
learning techniques have been developed without imposing constraints on the
dataset. In this paper, we propose an innovative framework called TablEye,
which aims to overcome the limit of forming prior knowledge for tabular data by
adopting domain transformation. It facilitates domain transformation by
generating tabular images, which effectively conserve the intrinsic semantics
of the original tabular data. This approach harnesses rigorously tested
few-shot learning algorithms and embedding functions to acquire and apply prior
knowledge. Leveraging shared data domains allows us to utilize this prior
knowledge, originally learned from the image domain. Specifically, TablEye
demonstrated a superior performance by outstripping the TabLLM in a 4-shot task
with a maximum 0.11 AUC and a STUNT in a 1- shot setting, where it led on
average by 3.17% accuracy.
| no_new_dataset | 0.709221 |
2307.02493 | Eunju Yang | Eunju Yang, Gyusang Cho, Chan-Hyun Youn | FREEDOM: Target Label & Source Data & Domain Information-Free
Multi-Source Domain Adaptation for Unsupervised Personalization | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | From a service perspective, Multi-Source Domain Adaptation (MSDA) is a
promising scenario to adapt a deployed model to a client's dataset. It can
provide adaptation without a target label and support the case where a source
dataset is constructed from multiple domains. However, it is impractical,
wherein its training heavily relies on prior domain information of the
multi-source dataset -- how many domains exist and the domain label of each
data sample. Moreover, MSDA requires both source and target datasets
simultaneously (physically), causing storage limitations on the client device
or data privacy issues by transferring client data to a server. For a more
practical scenario of model adaptation from a service provider's point of view,
we relax these constraints and present a novel problem scenario of Three-Free
Domain Adaptation, namely TFDA, where 1) target labels, 2) source dataset, and
mostly 3) source domain information (domain labels + the number of domains) are
unavailable. Under the problem scenario, we propose a practical adaptation
framework called FREEDOM. It leverages the power of the generative model,
disentangling data into class and style aspects, where the style is defined as
the class-independent information from the source data and designed with a
nonparametric Bayesian approach. In the adaptation stage, FREEDOM aims to match
the source class distribution with the target's under the philosophy that class
distribution is consistent even if the style is different; after then, only
part of the classification model is deployed as a personalized network. As a
result, FREEDOM achieves state-of-the-art or comparable performance even
without domain information, with reduced final model size on the target side,
independent of the number of source domains.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 05:56:44 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Yang",
"Eunju",
""
],
[
"Cho",
"Gyusang",
""
],
[
"Youn",
"Chan-Hyun",
""
]
] | TITLE: FREEDOM: Target Label & Source Data & Domain Information-Free
Multi-Source Domain Adaptation for Unsupervised Personalization
ABSTRACT: From a service perspective, Multi-Source Domain Adaptation (MSDA) is a
promising scenario to adapt a deployed model to a client's dataset. It can
provide adaptation without a target label and support the case where a source
dataset is constructed from multiple domains. However, it is impractical,
wherein its training heavily relies on prior domain information of the
multi-source dataset -- how many domains exist and the domain label of each
data sample. Moreover, MSDA requires both source and target datasets
simultaneously (physically), causing storage limitations on the client device
or data privacy issues by transferring client data to a server. For a more
practical scenario of model adaptation from a service provider's point of view,
we relax these constraints and present a novel problem scenario of Three-Free
Domain Adaptation, namely TFDA, where 1) target labels, 2) source dataset, and
mostly 3) source domain information (domain labels + the number of domains) are
unavailable. Under the problem scenario, we propose a practical adaptation
framework called FREEDOM. It leverages the power of the generative model,
disentangling data into class and style aspects, where the style is defined as
the class-independent information from the source data and designed with a
nonparametric Bayesian approach. In the adaptation stage, FREEDOM aims to match
the source class distribution with the target's under the philosophy that class
distribution is consistent even if the style is different; after then, only
part of the classification model is deployed as a personalized network. As a
result, FREEDOM achieves state-of-the-art or comparable performance even
without domain information, with reduced final model size on the target side,
independent of the number of source domains.
| no_new_dataset | 0.711418 |
2307.02499 | Anwen Hu | Jiabo Ye, Anwen Hu, Haiyang Xu, Qinghao Ye, Ming Yan, Yuhao Dan,
Chenlin Zhao, Guohai Xu, Chenliang Li, Junfeng Tian, Qian Qi, Ji Zhang, Fei
Huang | mPLUG-DocOwl: Modularized Multimodal Large Language Model for Document
Understanding | 10 pages, 8 figures | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Document understanding refers to automatically extract, analyze and
comprehend information from various types of digital documents, such as a web
page. Existing Multi-model Large Language Models (MLLMs), including mPLUG-Owl,
have demonstrated promising zero-shot capabilities in shallow OCR-free text
recognition, indicating their potential for OCR-free document understanding.
Nevertheless, without in-domain training, these models tend to ignore
fine-grained OCR features, such as sophisticated tables or large blocks of
text, which are essential for OCR-free document understanding. In this paper,
we propose mPLUG-DocOwl based on mPLUG-Owl for OCR-free document understanding.
Specifically, we first construct a instruction tuning dataset featuring a wide
range of visual-text understanding tasks. Then, we strengthen the OCR-free
document understanding ability by jointly train the model on language-only,
general vision-and-language, and document instruction tuning dataset with our
unified instruction tuning strategy. We also build an OCR-free document
instruction understanding evaluation set LLMDoc to better compare models'
capabilities on instruct compliance and document understanding. Experimental
results show that our model outperforms existing multi-modal models,
demonstrating its strong ability of document understanding. Besides, without
specific fine-tuning, mPLUG-DocOwl generalizes well on various downstream
tasks. Our code, models, training data and evaluation set are available at
https://github.com/X-PLUG/mPLUG-DocOwl.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 11:28:07 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ye",
"Jiabo",
""
],
[
"Hu",
"Anwen",
""
],
[
"Xu",
"Haiyang",
""
],
[
"Ye",
"Qinghao",
""
],
[
"Yan",
"Ming",
""
],
[
"Dan",
"Yuhao",
""
],
[
"Zhao",
"Chenlin",
""
],
[
"Xu",
"Guohai",
""
],
[
"Li",
"Chenliang",
""
],
[
"Tian",
"Junfeng",
""
],
[
"Qi",
"Qian",
""
],
[
"Zhang",
"Ji",
""
],
[
"Huang",
"Fei",
""
]
] | TITLE: mPLUG-DocOwl: Modularized Multimodal Large Language Model for Document
Understanding
ABSTRACT: Document understanding refers to automatically extract, analyze and
comprehend information from various types of digital documents, such as a web
page. Existing Multi-model Large Language Models (MLLMs), including mPLUG-Owl,
have demonstrated promising zero-shot capabilities in shallow OCR-free text
recognition, indicating their potential for OCR-free document understanding.
Nevertheless, without in-domain training, these models tend to ignore
fine-grained OCR features, such as sophisticated tables or large blocks of
text, which are essential for OCR-free document understanding. In this paper,
we propose mPLUG-DocOwl based on mPLUG-Owl for OCR-free document understanding.
Specifically, we first construct a instruction tuning dataset featuring a wide
range of visual-text understanding tasks. Then, we strengthen the OCR-free
document understanding ability by jointly train the model on language-only,
general vision-and-language, and document instruction tuning dataset with our
unified instruction tuning strategy. We also build an OCR-free document
instruction understanding evaluation set LLMDoc to better compare models'
capabilities on instruct compliance and document understanding. Experimental
results show that our model outperforms existing multi-modal models,
demonstrating its strong ability of document understanding. Besides, without
specific fine-tuning, mPLUG-DocOwl generalizes well on various downstream
tasks. Our code, models, training data and evaluation set are available at
https://github.com/X-PLUG/mPLUG-DocOwl.
| new_dataset | 0.716442 |
2307.02514 | Xiang Li | Hongmin Cai, Xiaoke Huang, Zhengliang Liu, Wenxiong Liao, Haixing Dai,
Zihao Wu, Dajiang Zhu, Hui Ren, Quanzheng Li, Tianming Liu, and Xiang Li | Exploring Multimodal Approaches for Alzheimer's Disease Detection Using
Patient Speech Transcript and Audio Data | null | null | null | null | eess.AS cs.AI cs.SD | http://creativecommons.org/licenses/by/4.0/ | Alzheimer's disease (AD) is a common form of dementia that severely impacts
patient health. As AD impairs the patient's language understanding and
expression ability, the speech of AD patients can serve as an indicator of this
disease. This study investigates various methods for detecting AD using
patients' speech and transcripts data from the DementiaBank Pitt database. The
proposed approach involves pre-trained language models and Graph Neural Network
(GNN) that constructs a graph from the speech transcript, and extracts features
using GNN for AD detection. Data augmentation techniques, including synonym
replacement, GPT-based augmenter, and so on, were used to address the small
dataset size. Audio data was also introduced, and WavLM model was used to
extract audio features. These features were then fused with text features using
various methods. Finally, a contrastive learning approach was attempted by
converting speech transcripts back to audio and using it for contrastive
learning with the original audio. We conducted intensive experiments and
analysis on the above methods. Our findings shed light on the challenges and
potential solutions in AD detection using speech and audio data.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 12:40:11 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Cai",
"Hongmin",
""
],
[
"Huang",
"Xiaoke",
""
],
[
"Liu",
"Zhengliang",
""
],
[
"Liao",
"Wenxiong",
""
],
[
"Dai",
"Haixing",
""
],
[
"Wu",
"Zihao",
""
],
[
"Zhu",
"Dajiang",
""
],
[
"Ren",
"Hui",
""
],
[
"Li",
"Quanzheng",
""
],
[
"Liu",
"Tianming",
""
],
[
"Li",
"Xiang",
""
]
] | TITLE: Exploring Multimodal Approaches for Alzheimer's Disease Detection Using
Patient Speech Transcript and Audio Data
ABSTRACT: Alzheimer's disease (AD) is a common form of dementia that severely impacts
patient health. As AD impairs the patient's language understanding and
expression ability, the speech of AD patients can serve as an indicator of this
disease. This study investigates various methods for detecting AD using
patients' speech and transcripts data from the DementiaBank Pitt database. The
proposed approach involves pre-trained language models and Graph Neural Network
(GNN) that constructs a graph from the speech transcript, and extracts features
using GNN for AD detection. Data augmentation techniques, including synonym
replacement, GPT-based augmenter, and so on, were used to address the small
dataset size. Audio data was also introduced, and WavLM model was used to
extract audio features. These features were then fused with text features using
various methods. Finally, a contrastive learning approach was attempted by
converting speech transcripts back to audio and using it for contrastive
learning with the original audio. We conducted intensive experiments and
analysis on the above methods. Our findings shed light on the challenges and
potential solutions in AD detection using speech and audio data.
| no_new_dataset | 0.710057 |
2307.02518 | Walid Hariri | Walid Hariri | Analyzing the Performance of ChatGPT in Cardiology and Vascular
Pathologies | null | null | null | null | cs.CL cs.CY | http://creativecommons.org/licenses/by/4.0/ | The article aims to analyze the performance of ChatGPT, a large language
model developed by OpenAI, in the context of cardiology and vascular
pathologies. The study evaluated the accuracy of ChatGPT in answering
challenging multiple-choice questions (QCM) using a dataset of 190 questions
from the Siamois-QCM platform. The goal was to assess ChatGPT potential as a
valuable tool in medical education compared to two well-ranked students of
medicine. The results showed that ChatGPT outperformed the students, scoring
175 out of 190 correct answers with a percentage of 92.10\%, while the two
students achieved scores of 163 and 159 with percentages of 85.78\% and
82.63\%, respectively. These results showcase how ChatGPT has the potential to
be highly effective in the fields of cardiology and vascular pathologies by
providing accurate answers to relevant questions.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 20:08:48 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Hariri",
"Walid",
""
]
] | TITLE: Analyzing the Performance of ChatGPT in Cardiology and Vascular
Pathologies
ABSTRACT: The article aims to analyze the performance of ChatGPT, a large language
model developed by OpenAI, in the context of cardiology and vascular
pathologies. The study evaluated the accuracy of ChatGPT in answering
challenging multiple-choice questions (QCM) using a dataset of 190 questions
from the Siamois-QCM platform. The goal was to assess ChatGPT potential as a
valuable tool in medical education compared to two well-ranked students of
medicine. The results showed that ChatGPT outperformed the students, scoring
175 out of 190 correct answers with a percentage of 92.10\%, while the two
students achieved scores of 163 and 159 with percentages of 85.78\% and
82.63\%, respectively. These results showcase how ChatGPT has the potential to
be highly effective in the fields of cardiology and vascular pathologies by
providing accurate answers to relevant questions.
| no_new_dataset | 0.709265 |
2307.02578 | Maarten Sukel | Maarten Sukel, Stevan Rudinac, Marcel Worring | Multimodal Temporal Fusion Transformers Are Good Product Demand
Forecasters | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multimodal demand forecasting aims at predicting product demand utilizing
visual, textual, and contextual information. This paper proposes a method for
multimodal product demand forecasting using convolutional, graph-based, and
transformer-based architectures. Traditional approaches to demand forecasting
rely on historical demand, product categories, and additional contextual
information such as seasonality and events. However, these approaches have
several shortcomings, such as the cold start problem making it difficult to
predict product demand until sufficient historical data is available for a
particular product, and their inability to properly deal with category
dynamics. By incorporating multimodal information, such as product images and
textual descriptions, our architecture aims to address the shortcomings of
traditional approaches and outperform them. The experiments conducted on a
large real-world dataset show that the proposed approach effectively predicts
demand for a wide range of products. The multimodal pipeline presented in this
work enhances the accuracy and reliability of the predictions, demonstrating
the potential of leveraging multimodal information in product demand
forecasting.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 18:23:13 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Sukel",
"Maarten",
""
],
[
"Rudinac",
"Stevan",
""
],
[
"Worring",
"Marcel",
""
]
] | TITLE: Multimodal Temporal Fusion Transformers Are Good Product Demand
Forecasters
ABSTRACT: Multimodal demand forecasting aims at predicting product demand utilizing
visual, textual, and contextual information. This paper proposes a method for
multimodal product demand forecasting using convolutional, graph-based, and
transformer-based architectures. Traditional approaches to demand forecasting
rely on historical demand, product categories, and additional contextual
information such as seasonality and events. However, these approaches have
several shortcomings, such as the cold start problem making it difficult to
predict product demand until sufficient historical data is available for a
particular product, and their inability to properly deal with category
dynamics. By incorporating multimodal information, such as product images and
textual descriptions, our architecture aims to address the shortcomings of
traditional approaches and outperform them. The experiments conducted on a
large real-world dataset show that the proposed approach effectively predicts
demand for a wide range of products. The multimodal pipeline presented in this
work enhances the accuracy and reliability of the predictions, demonstrating
the potential of leveraging multimodal information in product demand
forecasting.
| no_new_dataset | 0.71 |
2307.02610 | Tomer Ezra | Tomer Ezra and Tamar Garbuz | The Importance of Knowing the Arrival Order in Combinatorial Bayesian
Settings | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the measure of order-competitive ratio introduced by Ezra et al.
[2023] for online algorithms in Bayesian combinatorial settings. In our
setting, a decision-maker observes a sequence of elements that are associated
with stochastic rewards that are drawn from known priors, but revealed one by
one in an online fashion. The decision-maker needs to decide upon the arrival
of each element whether to select it or discard it (according to some
feasibility constraint), and receives the associated rewards of the selected
elements. The order-competitive ratio is defined as the worst-case ratio (over
all distribution sequences) between the performance of the best order-unaware
and order-aware algorithms, and quantifies the loss incurred due to the lack of
knowledge of the arrival order.
Ezra et al. [2023] showed how to design algorithms that achieve better
approximations with respect to the new benchmark (order-competitive ratio) in
the single-choice setting, which raises the natural question of whether the
same can be achieved in combinatorial settings. In particular, whether it is
possible to achieve a constant approximation with respect to the best online
algorithm for downward-closed feasibility constraints, whether
$\omega(1/n)$-approximation is achievable for general (non-downward-closed)
feasibility constraints, or whether a convergence rate to $1$ of
$o(1/\sqrt{k})$ is achievable for the multi-unit setting. We show, by devising
novel constructions that may be of independent interest, that for all three
scenarios, the asymptotic lower bounds with respect to the old benchmark, also
hold with respect to the new benchmark.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 19:08:43 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ezra",
"Tomer",
""
],
[
"Garbuz",
"Tamar",
""
]
] | TITLE: The Importance of Knowing the Arrival Order in Combinatorial Bayesian
Settings
ABSTRACT: We study the measure of order-competitive ratio introduced by Ezra et al.
[2023] for online algorithms in Bayesian combinatorial settings. In our
setting, a decision-maker observes a sequence of elements that are associated
with stochastic rewards that are drawn from known priors, but revealed one by
one in an online fashion. The decision-maker needs to decide upon the arrival
of each element whether to select it or discard it (according to some
feasibility constraint), and receives the associated rewards of the selected
elements. The order-competitive ratio is defined as the worst-case ratio (over
all distribution sequences) between the performance of the best order-unaware
and order-aware algorithms, and quantifies the loss incurred due to the lack of
knowledge of the arrival order.
Ezra et al. [2023] showed how to design algorithms that achieve better
approximations with respect to the new benchmark (order-competitive ratio) in
the single-choice setting, which raises the natural question of whether the
same can be achieved in combinatorial settings. In particular, whether it is
possible to achieve a constant approximation with respect to the best online
algorithm for downward-closed feasibility constraints, whether
$\omega(1/n)$-approximation is achievable for general (non-downward-closed)
feasibility constraints, or whether a convergence rate to $1$ of
$o(1/\sqrt{k})$ is achievable for the multi-unit setting. We show, by devising
novel constructions that may be of independent interest, that for all three
scenarios, the asymptotic lower bounds with respect to the old benchmark, also
hold with respect to the new benchmark.
| no_new_dataset | 0.7114 |
2307.02614 | Asaf Shabtai | Yarin Ozery, Asaf Nadler, Asaf Shabtai | Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration
Detection and Prevention | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data exfiltration over the DNS protocol and its detection have been
researched extensively in recent years. Prior studies focused on offline
detection methods, which although capable of detecting attacks, allow a large
amount of data to be exfiltrated before the attack is detected and dealt with.
In this paper, we introduce Information-based Heavy Hitters (ibHH), a real-time
detection method which is based on live estimations of the amount of
information transmitted to registered domains. ibHH uses constant-size memory
and supports constant-time queries, which makes it suitable for deployment on
recursive DNS servers to further reduce detection and response time. In our
evaluation, we compared the performance of the proposed method to that of
leading state-of-the-art DNS exfiltration detection methods on real-world
datasets comprising over 250 billion DNS queries. The evaluation demonstrates
ibHH's ability to successfully detect exfiltration rates as slow as 0.7B/s,
with a false positive alert rate of less than 0.004, with significantly lower
resource consumption compared to other methods.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 19:33:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ozery",
"Yarin",
""
],
[
"Nadler",
"Asaf",
""
],
[
"Shabtai",
"Asaf",
""
]
] | TITLE: Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration
Detection and Prevention
ABSTRACT: Data exfiltration over the DNS protocol and its detection have been
researched extensively in recent years. Prior studies focused on offline
detection methods, which although capable of detecting attacks, allow a large
amount of data to be exfiltrated before the attack is detected and dealt with.
In this paper, we introduce Information-based Heavy Hitters (ibHH), a real-time
detection method which is based on live estimations of the amount of
information transmitted to registered domains. ibHH uses constant-size memory
and supports constant-time queries, which makes it suitable for deployment on
recursive DNS servers to further reduce detection and response time. In our
evaluation, we compared the performance of the proposed method to that of
leading state-of-the-art DNS exfiltration detection methods on real-world
datasets comprising over 250 billion DNS queries. The evaluation demonstrates
ibHH's ability to successfully detect exfiltration rates as slow as 0.7B/s,
with a false positive alert rate of less than 0.004, with significantly lower
resource consumption compared to other methods.
| no_new_dataset | 0.708364 |
2307.02626 | Xiaoze Liu | Jiaqi Wang, Tianyi Li, Anni Wang, Xiaoze Liu, Lu Chen, Jie Chen,
Jianye Liu, Junyang Wu, Feifei Li, Yunjun Gao | Real-time Workload Pattern Analysis for Large-scale Cloud Databases | Proceedings of the VLDB Volume 16 (VLDB 2023) | null | null | null | cs.DB cs.AI | http://creativecommons.org/licenses/by/4.0/ | Hosting database services on cloud systems has become a common practice. This
has led to the increasing volume of database workloads, which provides the
opportunity for pattern analysis. Discovering workload patterns from a business
logic perspective is conducive to better understanding the trends and
characteristics of the database system. However, existing workload pattern
discovery systems are not suitable for large-scale cloud databases which are
commonly employed by the industry. This is because the workload patterns of
large-scale cloud databases are generally far more complicated than those of
ordinary databases. In this paper, we propose Alibaba Workload Miner (AWM), a
real-time system for discovering workload patterns in complicated large-scale
workloads. AWM encodes and discovers the SQL query patterns logged from user
requests and optimizes the querying processing based on the discovered
patterns. First, Data Collection & Preprocessing Module collects streaming
query logs and encodes them into high-dimensional feature embeddings with rich
semantic contexts and execution features. Next, Online Workload Mining Module
separates encoded queries by business groups and discovers the workload
patterns for each group. Meanwhile, Offline Training Module collects labels and
trains the classification model using the labels. Finally, Pattern-based
Optimizing Module optimizes query processing in cloud databases by exploiting
discovered patterns. Extensive experimental results on one synthetic dataset
and two real-life datasets (extracted from Alibaba Cloud databases) show that
AWM enhances the accuracy of pattern discovery by 66% and reduce the latency of
online inference by 22%, compared with the state-of-the-arts.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 19:57:33 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Wang",
"Jiaqi",
""
],
[
"Li",
"Tianyi",
""
],
[
"Wang",
"Anni",
""
],
[
"Liu",
"Xiaoze",
""
],
[
"Chen",
"Lu",
""
],
[
"Chen",
"Jie",
""
],
[
"Liu",
"Jianye",
""
],
[
"Wu",
"Junyang",
""
],
[
"Li",
"Feifei",
""
],
[
"Gao",
"Yunjun",
""
]
] | TITLE: Real-time Workload Pattern Analysis for Large-scale Cloud Databases
ABSTRACT: Hosting database services on cloud systems has become a common practice. This
has led to the increasing volume of database workloads, which provides the
opportunity for pattern analysis. Discovering workload patterns from a business
logic perspective is conducive to better understanding the trends and
characteristics of the database system. However, existing workload pattern
discovery systems are not suitable for large-scale cloud databases which are
commonly employed by the industry. This is because the workload patterns of
large-scale cloud databases are generally far more complicated than those of
ordinary databases. In this paper, we propose Alibaba Workload Miner (AWM), a
real-time system for discovering workload patterns in complicated large-scale
workloads. AWM encodes and discovers the SQL query patterns logged from user
requests and optimizes the querying processing based on the discovered
patterns. First, Data Collection & Preprocessing Module collects streaming
query logs and encodes them into high-dimensional feature embeddings with rich
semantic contexts and execution features. Next, Online Workload Mining Module
separates encoded queries by business groups and discovers the workload
patterns for each group. Meanwhile, Offline Training Module collects labels and
trains the classification model using the labels. Finally, Pattern-based
Optimizing Module optimizes query processing in cloud databases by exploiting
discovered patterns. Extensive experimental results on one synthetic dataset
and two real-life datasets (extracted from Alibaba Cloud databases) show that
AWM enhances the accuracy of pattern discovery by 66% and reduce the latency of
online inference by 22%, compared with the state-of-the-arts.
| no_new_dataset | 0.713076 |
2307.02640 | Alexandrea Ramnarine | Alexandrea K. Ramnarine | Unsupervised Sentiment Analysis of Plastic Surgery Social Media Posts | 8 pages, 3 figures, 3 tables, 8 supplemental figures | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The massive collection of user posts across social media platforms is
primarily untapped for artificial intelligence (AI) use cases based on the
sheer volume and velocity of textual data. Natural language processing (NLP) is
a subfield of AI that leverages bodies of documents, known as corpora, to train
computers in human-like language understanding. Using a word ranking method,
term frequency-inverse document frequency (TF-IDF), to create features across
documents, it is possible to perform unsupervised analytics, machine learning
(ML) that can group the documents without a human manually labeling the data.
For large datasets with thousands of features, t-distributed stochastic
neighbor embedding (t-SNE), k-means clustering and Latent Dirichlet allocation
(LDA) are employed to learn top words and generate topics for a Reddit and
Twitter combined corpus. Using extremely simple deep learning models, this
study demonstrates that the applied results of unsupervised analysis allow a
computer to predict either negative, positive, or neutral user sentiment
towards plastic surgery based on a tweet or subreddit post with almost 90%
accuracy. Furthermore, the model is capable of achieving higher accuracy on the
unsupervised sentiment task than on a rudimentary supervised document
classification task. Therefore, unsupervised learning may be considered a
viable option in labeling social media documents for NLP tasks.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 20:16:20 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Ramnarine",
"Alexandrea K.",
""
]
] | TITLE: Unsupervised Sentiment Analysis of Plastic Surgery Social Media Posts
ABSTRACT: The massive collection of user posts across social media platforms is
primarily untapped for artificial intelligence (AI) use cases based on the
sheer volume and velocity of textual data. Natural language processing (NLP) is
a subfield of AI that leverages bodies of documents, known as corpora, to train
computers in human-like language understanding. Using a word ranking method,
term frequency-inverse document frequency (TF-IDF), to create features across
documents, it is possible to perform unsupervised analytics, machine learning
(ML) that can group the documents without a human manually labeling the data.
For large datasets with thousands of features, t-distributed stochastic
neighbor embedding (t-SNE), k-means clustering and Latent Dirichlet allocation
(LDA) are employed to learn top words and generate topics for a Reddit and
Twitter combined corpus. Using extremely simple deep learning models, this
study demonstrates that the applied results of unsupervised analysis allow a
computer to predict either negative, positive, or neutral user sentiment
towards plastic surgery based on a tweet or subreddit post with almost 90%
accuracy. Furthermore, the model is capable of achieving higher accuracy on the
unsupervised sentiment task than on a rudimentary supervised document
classification task. Therefore, unsupervised learning may be considered a
viable option in labeling social media documents for NLP tasks.
| no_new_dataset | 0.711243 |
2307.02647 | Andrea Mannocci Dr | Miriam Baglioni, Andrea Mannocci, Gina Pavone, Michele De Bonis and
Paolo Manghi | (Semi)automated disambiguation of scholarly repositories | 13 pages, 3 figures, 1 table | null | null | null | cs.DL | http://creativecommons.org/licenses/by/4.0/ | The full exploitation of scholarly repositories is pivotal in modern Open
Science, and scholarly repository registries are kingpins in enabling
researchers and research infrastructures to list and search for suitable
repositories. However, since multiple registries exist, repository managers are
keen on registering multiple times the repositories they manage to maximise
their traction and visibility across different research communities,
disciplines, and applications. These multiple registrations ultimately lead to
information fragmentation and redundancy on the one hand and, on the other,
force registries' users to juggle multiple registries, profiles and identifiers
describing the same repository. Such problems are known to registries, which
claim equivalence between repository profiles whenever possible by
cross-referencing their identifiers across different registries. However, as we
will see, this ``claim set'' is far from complete and, therefore, many replicas
slip under the radar, possibly creating problems downstream. In this work, we
combine such claims to create duplicate sets and extend them with the results
of an automated clustering algorithm run over repository metadata descriptions.
Then we manually validate our results to produce an ``as accurate as possible''
de-duplicated dataset of scholarly repositories.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 20:38:45 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Baglioni",
"Miriam",
""
],
[
"Mannocci",
"Andrea",
""
],
[
"Pavone",
"Gina",
""
],
[
"De Bonis",
"Michele",
""
],
[
"Manghi",
"Paolo",
""
]
] | TITLE: (Semi)automated disambiguation of scholarly repositories
ABSTRACT: The full exploitation of scholarly repositories is pivotal in modern Open
Science, and scholarly repository registries are kingpins in enabling
researchers and research infrastructures to list and search for suitable
repositories. However, since multiple registries exist, repository managers are
keen on registering multiple times the repositories they manage to maximise
their traction and visibility across different research communities,
disciplines, and applications. These multiple registrations ultimately lead to
information fragmentation and redundancy on the one hand and, on the other,
force registries' users to juggle multiple registries, profiles and identifiers
describing the same repository. Such problems are known to registries, which
claim equivalence between repository profiles whenever possible by
cross-referencing their identifiers across different registries. However, as we
will see, this ``claim set'' is far from complete and, therefore, many replicas
slip under the radar, possibly creating problems downstream. In this work, we
combine such claims to create duplicate sets and extend them with the results
of an automated clustering algorithm run over repository metadata descriptions.
Then we manually validate our results to produce an ``as accurate as possible''
de-duplicated dataset of scholarly repositories.
| no_new_dataset | 0.695131 |
2307.02658 | Thomas Walker | Thomas Walker, Varun Anand, Pavlos Andreadis | Spherical Feature Pyramid Networks For Semantic Segmentation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Semantic segmentation for spherical data is a challenging problem in machine
learning since conventional planar approaches require projecting the spherical
image to the Euclidean plane. Representing the signal on a fundamentally
different topology introduces edges and distortions which impact network
performance. Recently, graph-based approaches have bypassed these challenges to
attain significant improvements by representing the signal on a spherical mesh.
Current approaches to spherical segmentation exclusively use variants of the
UNet architecture, meaning more successful planar architectures remain
unexplored. Inspired by the success of feature pyramid networks (FPNs) in
planar image segmentation, we leverage the pyramidal hierarchy of graph-based
spherical CNNs to design spherical FPNs. Our spherical FPN models show
consistent improvements over spherical UNets, whilst using fewer parameters. On
the Stanford 2D-3D-S dataset, our models achieve state-of-the-art performance
with an mIOU of 48.75, an improvement of 3.75 IoU points over the previous best
spherical CNN.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 21:19:13 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Walker",
"Thomas",
""
],
[
"Anand",
"Varun",
""
],
[
"Andreadis",
"Pavlos",
""
]
] | TITLE: Spherical Feature Pyramid Networks For Semantic Segmentation
ABSTRACT: Semantic segmentation for spherical data is a challenging problem in machine
learning since conventional planar approaches require projecting the spherical
image to the Euclidean plane. Representing the signal on a fundamentally
different topology introduces edges and distortions which impact network
performance. Recently, graph-based approaches have bypassed these challenges to
attain significant improvements by representing the signal on a spherical mesh.
Current approaches to spherical segmentation exclusively use variants of the
UNet architecture, meaning more successful planar architectures remain
unexplored. Inspired by the success of feature pyramid networks (FPNs) in
planar image segmentation, we leverage the pyramidal hierarchy of graph-based
spherical CNNs to design spherical FPNs. Our spherical FPN models show
consistent improvements over spherical UNets, whilst using fewer parameters. On
the Stanford 2D-3D-S dataset, our models achieve state-of-the-art performance
with an mIOU of 48.75, an improvement of 3.75 IoU points over the previous best
spherical CNN.
| no_new_dataset | 0.712026 |
2307.02689 | Subhajit Chaudhury | Subhajit Chaudhury, Sarathkrishna Swaminathan, Daiki Kimura,
Prithviraj Sen, Keerthiram Murugesan, Rosario Uceda-Sosa, Michiaki Tatsubori,
Achille Fokoue, Pavan Kapanipathi, Asim Munawar and Alexander Gray | Learning Symbolic Rules over Abstract Meaning Representations for
Textual Reinforcement Learning | ACL 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Text-based reinforcement learning agents have predominantly been neural
network-based models with embeddings-based representation, learning
uninterpretable policies that often do not generalize well to unseen games. On
the other hand, neuro-symbolic methods, specifically those that leverage an
intermediate formal representation, are gaining significant attention in
language understanding tasks. This is because of their advantages ranging from
inherent interpretability, the lesser requirement of training data, and being
generalizable in scenarios with unseen data. Therefore, in this paper, we
propose a modular, NEuro-Symbolic Textual Agent (NESTA) that combines a generic
semantic parser with a rule induction system to learn abstract interpretable
rules as policies. Our experiments on established text-based game benchmarks
show that the proposed NESTA method outperforms deep reinforcement
learning-based techniques by achieving better generalization to unseen test
games and learning from fewer training interactions.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 23:21:05 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Chaudhury",
"Subhajit",
""
],
[
"Swaminathan",
"Sarathkrishna",
""
],
[
"Kimura",
"Daiki",
""
],
[
"Sen",
"Prithviraj",
""
],
[
"Murugesan",
"Keerthiram",
""
],
[
"Uceda-Sosa",
"Rosario",
""
],
[
"Tatsubori",
"Michiaki",
""
],
[
"Fokoue",
"Achille",
""
],
[
"Kapanipathi",
"Pavan",
""
],
[
"Munawar",
"Asim",
""
],
[
"Gray",
"Alexander",
""
]
] | TITLE: Learning Symbolic Rules over Abstract Meaning Representations for
Textual Reinforcement Learning
ABSTRACT: Text-based reinforcement learning agents have predominantly been neural
network-based models with embeddings-based representation, learning
uninterpretable policies that often do not generalize well to unseen games. On
the other hand, neuro-symbolic methods, specifically those that leverage an
intermediate formal representation, are gaining significant attention in
language understanding tasks. This is because of their advantages ranging from
inherent interpretability, the lesser requirement of training data, and being
generalizable in scenarios with unseen data. Therefore, in this paper, we
propose a modular, NEuro-Symbolic Textual Agent (NESTA) that combines a generic
semantic parser with a rule induction system to learn abstract interpretable
rules as policies. Our experiments on established text-based game benchmarks
show that the proposed NESTA method outperforms deep reinforcement
learning-based techniques by achieving better generalization to unseen test
games and learning from fewer training interactions.
| no_new_dataset | 0.708811 |
2307.02716 | Min Xiao | Min Xiao, Junnan Zhu, Haitao Lin, Yu Zhou, Chengqing Zong | CFSum: A Coarse-to-Fine Contribution Network for Multimodal
Summarization | acl2023 | null | null | null | cs.CL cs.CV | http://creativecommons.org/licenses/by/4.0/ | Multimodal summarization usually suffers from the problem that the
contribution of the visual modality is unclear. Existing multimodal
summarization approaches focus on designing the fusion methods of different
modalities, while ignoring the adaptive conditions under which visual
modalities are useful. Therefore, we propose a novel Coarse-to-Fine
contribution network for multimodal Summarization (CFSum) to consider different
contributions of images for summarization. First, to eliminate the interference
of useless images, we propose a pre-filter module to abandon useless images.
Second, to make accurate use of useful images, we propose two levels of visual
complement modules, word level and phrase level. Specifically, image
contributions are calculated and are adopted to guide the attention of both
textual and visual modalities. Experimental results have shown that CFSum
significantly outperforms multiple strong baselines on the standard benchmark.
Furthermore, the analysis verifies that useful images can even help generate
non-visual words which are implicitly represented in the image.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 01:46:00 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Xiao",
"Min",
""
],
[
"Zhu",
"Junnan",
""
],
[
"Lin",
"Haitao",
""
],
[
"Zhou",
"Yu",
""
],
[
"Zong",
"Chengqing",
""
]
] | TITLE: CFSum: A Coarse-to-Fine Contribution Network for Multimodal
Summarization
ABSTRACT: Multimodal summarization usually suffers from the problem that the
contribution of the visual modality is unclear. Existing multimodal
summarization approaches focus on designing the fusion methods of different
modalities, while ignoring the adaptive conditions under which visual
modalities are useful. Therefore, we propose a novel Coarse-to-Fine
contribution network for multimodal Summarization (CFSum) to consider different
contributions of images for summarization. First, to eliminate the interference
of useless images, we propose a pre-filter module to abandon useless images.
Second, to make accurate use of useful images, we propose two levels of visual
complement modules, word level and phrase level. Specifically, image
contributions are calculated and are adopted to guide the attention of both
textual and visual modalities. Experimental results have shown that CFSum
significantly outperforms multiple strong baselines on the standard benchmark.
Furthermore, the analysis verifies that useful images can even help generate
non-visual words which are implicitly represented in the image.
| no_new_dataset | 0.71 |
2307.02720 | Gene-Ping Yang | Gene-Ping Yang, Yue Gu, Qingming Tang, Dongsu Du, Yuzong Liu | On-Device Constrained Self-Supervised Speech Representation Learning for
Keyword Spotting via Knowledge Distillation | Accepted to Interspeech 2023 | null | null | null | cs.CL cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large self-supervised models are effective feature extractors, but their
application is challenging under on-device budget constraints and biased
dataset collection, especially in keyword spotting. To address this, we
proposed a knowledge distillation-based self-supervised speech representation
learning (S3RL) architecture for on-device keyword spotting. Our approach used
a teacher-student framework to transfer knowledge from a larger, more complex
model to a smaller, light-weight model using dual-view cross-correlation
distillation and the teacher's codebook as learning objectives. We evaluated
our model's performance on an Alexa keyword spotting detection task using a
16.6k-hour in-house dataset. Our technique showed exceptional performance in
normal and noisy conditions, demonstrating the efficacy of knowledge
distillation methods in constructing self-supervised models for keyword
spotting tasks while working within on-device resource constraints.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 02:03:31 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Yang",
"Gene-Ping",
""
],
[
"Gu",
"Yue",
""
],
[
"Tang",
"Qingming",
""
],
[
"Du",
"Dongsu",
""
],
[
"Liu",
"Yuzong",
""
]
] | TITLE: On-Device Constrained Self-Supervised Speech Representation Learning for
Keyword Spotting via Knowledge Distillation
ABSTRACT: Large self-supervised models are effective feature extractors, but their
application is challenging under on-device budget constraints and biased
dataset collection, especially in keyword spotting. To address this, we
proposed a knowledge distillation-based self-supervised speech representation
learning (S3RL) architecture for on-device keyword spotting. Our approach used
a teacher-student framework to transfer knowledge from a larger, more complex
model to a smaller, light-weight model using dual-view cross-correlation
distillation and the teacher's codebook as learning objectives. We evaluated
our model's performance on an Alexa keyword spotting detection task using a
16.6k-hour in-house dataset. Our technique showed exceptional performance in
normal and noisy conditions, demonstrating the efficacy of knowledge
distillation methods in constructing self-supervised models for keyword
spotting tasks while working within on-device resource constraints.
| no_new_dataset | 0.702951 |
2307.02726 | Nima Shahbazi | Nima Shahbazi, Nikola Danevski, Fatemeh Nargesian, Abolfazl Asudeh,
Divesh Srivastava | Through the Fairness Lens: Experimental Analysis and Evaluation of
Entity Matching | Accepted to VLDB'23 | null | null | null | cs.DB cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity matching (EM) is a challenging problem studied by different
communities for over half a century. Algorithmic fairness has also become a
timely topic to address machine bias and its societal impacts. Despite
extensive research on these two topics, little attention has been paid to the
fairness of entity matching.
Towards addressing this gap, we perform an extensive experimental evaluation
of a variety of EM techniques in this paper. We generated two social datasets
from publicly available datasets for the purpose of auditing EM through the
lens of fairness. Our findings underscore potential unfairness under two common
conditions in real-world societies: (i) when some demographic groups are
overrepresented, and (ii) when names are more similar in some groups compared
to others. Among our many findings, it is noteworthy to mention that while
various fairness definitions are valuable for different settings, due to EM's
class imbalance nature, measures such as positive predictive value parity and
true positive rate parity are, in general, more capable of revealing EM
unfairness.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 02:21:08 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Shahbazi",
"Nima",
""
],
[
"Danevski",
"Nikola",
""
],
[
"Nargesian",
"Fatemeh",
""
],
[
"Asudeh",
"Abolfazl",
""
],
[
"Srivastava",
"Divesh",
""
]
] | TITLE: Through the Fairness Lens: Experimental Analysis and Evaluation of
Entity Matching
ABSTRACT: Entity matching (EM) is a challenging problem studied by different
communities for over half a century. Algorithmic fairness has also become a
timely topic to address machine bias and its societal impacts. Despite
extensive research on these two topics, little attention has been paid to the
fairness of entity matching.
Towards addressing this gap, we perform an extensive experimental evaluation
of a variety of EM techniques in this paper. We generated two social datasets
from publicly available datasets for the purpose of auditing EM through the
lens of fairness. Our findings underscore potential unfairness under two common
conditions in real-world societies: (i) when some demographic groups are
overrepresented, and (ii) when names are more similar in some groups compared
to others. Among our many findings, it is noteworthy to mention that while
various fairness definitions are valuable for different settings, due to EM's
class imbalance nature, measures such as positive predictive value parity and
true positive rate parity are, in general, more capable of revealing EM
unfairness.
| new_dataset | 0.700895 |
2307.02732 | Henry Gouk | Lu\'isa Shimabucoro, Timothy Hospedales, Henry Gouk | Evaluating the Evaluators: Are Current Few-Shot Learning Benchmarks Fit
for Purpose? | Accepted at the ICML 2023 workshop on Data-centric Machine Learning | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Numerous benchmarks for Few-Shot Learning have been proposed in the last
decade. However all of these benchmarks focus on performance averaged over many
tasks, and the question of how to reliably evaluate and tune models trained for
individual tasks in this regime has not been addressed. This paper presents the
first investigation into task-level evaluation -- a fundamental step when
deploying a model. We measure the accuracy of performance estimators in the
few-shot setting, consider strategies for model selection, and examine the
reasons for the failure of evaluators usually thought of as being robust. We
conclude that cross-validation with a low number of folds is the best choice
for directly estimating the performance of a model, whereas using bootstrapping
or cross validation with a large number of folds is better for model selection
purposes. Overall, we find that existing benchmarks for few-shot learning are
not designed in such a way that one can get a reliable picture of how
effectively methods can be used on individual tasks.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 02:31:38 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Shimabucoro",
"Luísa",
""
],
[
"Hospedales",
"Timothy",
""
],
[
"Gouk",
"Henry",
""
]
] | TITLE: Evaluating the Evaluators: Are Current Few-Shot Learning Benchmarks Fit
for Purpose?
ABSTRACT: Numerous benchmarks for Few-Shot Learning have been proposed in the last
decade. However all of these benchmarks focus on performance averaged over many
tasks, and the question of how to reliably evaluate and tune models trained for
individual tasks in this regime has not been addressed. This paper presents the
first investigation into task-level evaluation -- a fundamental step when
deploying a model. We measure the accuracy of performance estimators in the
few-shot setting, consider strategies for model selection, and examine the
reasons for the failure of evaluators usually thought of as being robust. We
conclude that cross-validation with a low number of folds is the best choice
for directly estimating the performance of a model, whereas using bootstrapping
or cross validation with a large number of folds is better for model selection
purposes. Overall, we find that existing benchmarks for few-shot learning are
not designed in such a way that one can get a reliable picture of how
effectively methods can be used on individual tasks.
| no_new_dataset | 0.709818 |
2307.02733 | Ruiyang Xia | Ruiyang Xia, Decheng Liu, Jie Li, Lin Yuan, Nannan Wang, Xinbo Gao | MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential
Deepfake Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advanced manipulation techniques have provided criminals with opportunities
to make social panic or gain illicit profits through the generation of
deceptive media, such as forged face images. In response, various deepfake
detection methods have been proposed to assess image authenticity. Sequential
deepfake detection, which is an extension of deepfake detection, aims to
identify forged facial regions with the correct sequence for recovery.
Nonetheless, due to the different combinations of spatial and sequential
manipulations, forged face images exhibit substantial discrepancies that
severely impact detection performance. Additionally, the recovery of forged
images requires knowledge of the manipulation model to implement inverse
transformations, which is difficult to ascertain as relevant techniques are
often concealed by attackers. To address these issues, we propose
Multi-Collaboration and Multi-Supervision Network (MMNet) that handles various
spatial scales and sequential permutations in forged face images and achieve
recovery without requiring knowledge of the corresponding manipulation method.
Furthermore, existing evaluation metrics only consider detection accuracy at a
single inferring step, without accounting for the matching degree with
ground-truth under continuous multiple steps. To overcome this limitation, we
propose a novel evaluation metric called Complete Sequence Matching (CSM),
which considers the detection accuracy at multiple inferring steps, reflecting
the ability to detect integrally forged sequences. Extensive experiments on
several typical datasets demonstrate that MMNet achieves state-of-the-art
detection performance and independent recovery performance.
| [
{
"version": "v1",
"created": "Thu, 6 Jul 2023 02:32:08 GMT"
}
] | 2023-07-07T00:00:00 | [
[
"Xia",
"Ruiyang",
""
],
[
"Liu",
"Decheng",
""
],
[
"Li",
"Jie",
""
],
[
"Yuan",
"Lin",
""
],
[
"Wang",
"Nannan",
""
],
[
"Gao",
"Xinbo",
""
]
] | TITLE: MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential
Deepfake Detection
ABSTRACT: Advanced manipulation techniques have provided criminals with opportunities
to make social panic or gain illicit profits through the generation of
deceptive media, such as forged face images. In response, various deepfake
detection methods have been proposed to assess image authenticity. Sequential
deepfake detection, which is an extension of deepfake detection, aims to
identify forged facial regions with the correct sequence for recovery.
Nonetheless, due to the different combinations of spatial and sequential
manipulations, forged face images exhibit substantial discrepancies that
severely impact detection performance. Additionally, the recovery of forged
images requires knowledge of the manipulation model to implement inverse
transformations, which is difficult to ascertain as relevant techniques are
often concealed by attackers. To address these issues, we propose
Multi-Collaboration and Multi-Supervision Network (MMNet) that handles various
spatial scales and sequential permutations in forged face images and achieve
recovery without requiring knowledge of the corresponding manipulation method.
Furthermore, existing evaluation metrics only consider detection accuracy at a
single inferring step, without accounting for the matching degree with
ground-truth under continuous multiple steps. To overcome this limitation, we
propose a novel evaluation metric called Complete Sequence Matching (CSM),
which considers the detection accuracy at multiple inferring steps, reflecting
the ability to detect integrally forged sequences. Extensive experiments on
several typical datasets demonstrate that MMNet achieves state-of-the-art
detection performance and independent recovery performance.
| no_new_dataset | 0.707436 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.