id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2305.17376 | Yongbiao Xiao | Hui Li, Yongbiao Xiao, Chunyang Cheng, Zhongwei Shen, Xiaoning Song | DePF: A Novel Fusion Approach based on Decomposition Pooling for
Infrared and Visible Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Infrared and visible image fusion aims to generate synthetic images
simultaneously containing salient features and rich texture details, which can
be used to boost downstream tasks. However, existing fusion methods are
suffering from the issues of texture loss and edge information deficiency,
which result in suboptimal fusion results. Meanwhile, the straight-forward
up-sampling operator can not well preserve the source information from
multi-scale features. To address these issues, a novel fusion network based on
the decomposition pooling (de-pooling) manner is proposed, termed as DePF.
Specifically, a de-pooling based encoder is designed to extract multi-scale
image and detail features of source images at the same time. In addition, the
spatial attention model is used to aggregate these salient features. After
that, the fused features will be reconstructed by the decoder, in which the
up-sampling operator is replaced by the de-pooling reversed operation.
Different from the common max-pooling technique, image features after the
de-pooling layer can retain abundant details information, which is benefit to
the fusion process. In this case, rich texture information and multi-scale
information are maintained during the reconstruction phase. The experimental
results demonstrate that the proposed method exhibits superior fusion
performance over the state-of-the-arts on multiple image fusion benchmarks.
| [
{
"version": "v1",
"created": "Sat, 27 May 2023 05:47:14 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 15:23:24 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Li",
"Hui",
""
],
[
"Xiao",
"Yongbiao",
""
],
[
"Cheng",
"Chunyang",
""
],
[
"Shen",
"Zhongwei",
""
],
[
"Song",
"Xiaoning",
""
]
] | TITLE: DePF: A Novel Fusion Approach based on Decomposition Pooling for
Infrared and Visible Images
ABSTRACT: Infrared and visible image fusion aims to generate synthetic images
simultaneously containing salient features and rich texture details, which can
be used to boost downstream tasks. However, existing fusion methods are
suffering from the issues of texture loss and edge information deficiency,
which result in suboptimal fusion results. Meanwhile, the straight-forward
up-sampling operator can not well preserve the source information from
multi-scale features. To address these issues, a novel fusion network based on
the decomposition pooling (de-pooling) manner is proposed, termed as DePF.
Specifically, a de-pooling based encoder is designed to extract multi-scale
image and detail features of source images at the same time. In addition, the
spatial attention model is used to aggregate these salient features. After
that, the fused features will be reconstructed by the decoder, in which the
up-sampling operator is replaced by the de-pooling reversed operation.
Different from the common max-pooling technique, image features after the
de-pooling layer can retain abundant details information, which is benefit to
the fusion process. In this case, rich texture information and multi-scale
information are maintained during the reconstruction phase. The experimental
results demonstrate that the proposed method exhibits superior fusion
performance over the state-of-the-arts on multiple image fusion benchmarks.
| no_new_dataset | 0.710396 |
2306.03361 | Deuksin Kwon | Deuksin Kwon, Sunwoo Lee, Ki Hyun Kim, Seojin Lee, Taeyoon Kim, Eric
Davis | WHAT, WHEN, and HOW to Ground: Designing User Persona-Aware
Conversational Agents for Engaging Dialogue | Accepted in ACL 2023 Industry Track | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a method for building a personalized open-domain dialogue
system to address the WWH (WHAT, WHEN, and HOW) problem for natural response
generation in a commercial setting, where personalized dialogue responses are
heavily interleaved with casual response turns. The proposed approach involves
weighted dataset blending, negative persona information augmentation methods,
and the design of personalized conversation datasets to address the challenges
of WWH in personalized, open-domain dialogue systems. Our work effectively
balances dialogue fluency and tendency to ground, while also introducing a
response-type label to improve the controllability and explainability of the
grounded responses. The combination of these methods leads to more fluent
conversations, as evidenced by subjective human evaluations as well as
objective evaluations.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2023 02:28:38 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2023 16:37:22 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 22:44:12 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Kwon",
"Deuksin",
""
],
[
"Lee",
"Sunwoo",
""
],
[
"Kim",
"Ki Hyun",
""
],
[
"Lee",
"Seojin",
""
],
[
"Kim",
"Taeyoon",
""
],
[
"Davis",
"Eric",
""
]
] | TITLE: WHAT, WHEN, and HOW to Ground: Designing User Persona-Aware
Conversational Agents for Engaging Dialogue
ABSTRACT: This paper presents a method for building a personalized open-domain dialogue
system to address the WWH (WHAT, WHEN, and HOW) problem for natural response
generation in a commercial setting, where personalized dialogue responses are
heavily interleaved with casual response turns. The proposed approach involves
weighted dataset blending, negative persona information augmentation methods,
and the design of personalized conversation datasets to address the challenges
of WWH in personalized, open-domain dialogue systems. Our work effectively
balances dialogue fluency and tendency to ground, while also introducing a
response-type label to improve the controllability and explainability of the
grounded responses. The combination of these methods leads to more fluent
conversations, as evidenced by subjective human evaluations as well as
objective evaluations.
| no_new_dataset | 0.708584 |
2306.07024 | Francesco Quinzan | Francesco Quinzan, Ashkan Soleymani, Patrick Jaillet, Cristian R.
Rojas, Stefan Bauer | DRCFS: Doubly Robust Causal Feature Selection | null | null | null | null | cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | Knowing the features of a complex system that are highly relevant to a
particular target variable is of fundamental interest in many areas of science.
Existing approaches are often limited to linear settings, sometimes lack
guarantees, and in most cases, do not scale to the problem at hand, in
particular to images. We propose DRCFS, a doubly robust feature selection
method for identifying the causal features even in nonlinear and high
dimensional settings. We provide theoretical guarantees, illustrate necessary
conditions for our assumptions, and perform extensive experiments across a wide
range of simulated and semi-synthetic datasets. DRCFS significantly outperforms
existing state-of-the-art methods, selecting robust features even in
challenging highly non-linear and high-dimensional problems.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2023 10:53:50 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 09:03:22 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jul 2023 08:47:46 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Quinzan",
"Francesco",
""
],
[
"Soleymani",
"Ashkan",
""
],
[
"Jaillet",
"Patrick",
""
],
[
"Rojas",
"Cristian R.",
""
],
[
"Bauer",
"Stefan",
""
]
] | TITLE: DRCFS: Doubly Robust Causal Feature Selection
ABSTRACT: Knowing the features of a complex system that are highly relevant to a
particular target variable is of fundamental interest in many areas of science.
Existing approaches are often limited to linear settings, sometimes lack
guarantees, and in most cases, do not scale to the problem at hand, in
particular to images. We propose DRCFS, a doubly robust feature selection
method for identifying the causal features even in nonlinear and high
dimensional settings. We provide theoretical guarantees, illustrate necessary
conditions for our assumptions, and perform extensive experiments across a wide
range of simulated and semi-synthetic datasets. DRCFS significantly outperforms
existing state-of-the-art methods, selecting robust features even in
challenging highly non-linear and high-dimensional problems.
| no_new_dataset | 0.71145 |
2306.07797 | Dmitry Karpov | Dmitry Karpov, Mikhail Burtsev | Monolingual and Cross-Lingual Knowledge Transfer for Topic
Classification | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article investigates the knowledge transfer from the RuQTopics dataset.
This Russian topical dataset combines a large sample number (361,560
single-label, 170,930 multi-label) with extensive class coverage (76 classes).
We have prepared this dataset from the "Yandex Que" raw data. By evaluating the
RuQTopics - trained models on the six matching classes of the Russian MASSIVE
subset, we have proved that the RuQTopics dataset is suitable for real-world
conversational tasks, as the Russian-only models trained on this dataset
consistently yield an accuracy around 85\% on this subset. We also have figured
out that for the multilingual BERT, trained on the RuQTopics and evaluated on
the same six classes of MASSIVE (for all MASSIVE languages), the language-wise
accuracy closely correlates (Spearman correlation 0.773 with p-value 2.997e-11)
with the approximate size of the pretraining BERT's data for the corresponding
language. At the same time, the correlation of the language-wise accuracy with
the linguistical distance from Russian is not statistically significant.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2023 14:19:45 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 14:07:39 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Karpov",
"Dmitry",
""
],
[
"Burtsev",
"Mikhail",
""
]
] | TITLE: Monolingual and Cross-Lingual Knowledge Transfer for Topic
Classification
ABSTRACT: This article investigates the knowledge transfer from the RuQTopics dataset.
This Russian topical dataset combines a large sample number (361,560
single-label, 170,930 multi-label) with extensive class coverage (76 classes).
We have prepared this dataset from the "Yandex Que" raw data. By evaluating the
RuQTopics - trained models on the six matching classes of the Russian MASSIVE
subset, we have proved that the RuQTopics dataset is suitable for real-world
conversational tasks, as the Russian-only models trained on this dataset
consistently yield an accuracy around 85\% on this subset. We also have figured
out that for the multilingual BERT, trained on the RuQTopics and evaluated on
the same six classes of MASSIVE (for all MASSIVE languages), the language-wise
accuracy closely correlates (Spearman correlation 0.773 with p-value 2.997e-11)
with the approximate size of the pretraining BERT's data for the corresponding
language. At the same time, the correlation of the language-wise accuracy with
the linguistical distance from Russian is not statistically significant.
| no_new_dataset | 0.651299 |
2306.12901 | Christiaan M\"uller | Christiaan J. M\"uller and Corn\'e E. van Daalen | Map Point Selection for Visual SLAM | null | null | 10.1016/j.robot.2023.104485 | null | cs.RO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Simultaneous localisation and mapping (SLAM) play a vital role in autonomous
robotics. Robotic platforms are often resource-constrained, and this limitation
motivates resource-efficient SLAM implementations. While sparse visual SLAM
algorithms offer good accuracy for modest hardware requirements, even these
more scalable sparse approaches face limitations when applied to large-scale
and long-term scenarios. A contributing factor is that the point clouds
resulting from SLAM are inefficient to use and contain significant redundancy.
This paper proposes the use of subset selection algorithms to reduce the map
produced by sparse visual SLAM algorithms. Information-theoretic techniques
have been applied to simpler related problems before, but they do not scale if
applied to the full visual SLAM problem. This paper proposes a number of novel
information\hyp{}theoretic utility functions for map point selection and
optimises these functions using greedy algorithms. The reduced maps are
evaluated using practical data alongside an existing visual SLAM implementation
(ORB-SLAM 2). Approximate selection techniques proposed in this paper achieve
trajectory accuracy comparable to an offline baseline while being suitable for
online use. These techniques enable the practical reduction of maps for visual
SLAM with competitive trajectory accuracy.
Results also demonstrate that SLAM front-end performance can significantly
impact the performance of map point selection. This shows the importance of
testing map point selection with a front-end implementation. To exploit this,
this paper proposes an approach that includes a model of the front-end in the
utility function when additional information is available. This approach
outperforms alternatives on applicable datasets and highlights future research
directions.
| [
{
"version": "v1",
"created": "Thu, 22 Jun 2023 14:08:09 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Müller",
"Christiaan J.",
""
],
[
"van Daalen",
"Corné E.",
""
]
] | TITLE: Map Point Selection for Visual SLAM
ABSTRACT: Simultaneous localisation and mapping (SLAM) play a vital role in autonomous
robotics. Robotic platforms are often resource-constrained, and this limitation
motivates resource-efficient SLAM implementations. While sparse visual SLAM
algorithms offer good accuracy for modest hardware requirements, even these
more scalable sparse approaches face limitations when applied to large-scale
and long-term scenarios. A contributing factor is that the point clouds
resulting from SLAM are inefficient to use and contain significant redundancy.
This paper proposes the use of subset selection algorithms to reduce the map
produced by sparse visual SLAM algorithms. Information-theoretic techniques
have been applied to simpler related problems before, but they do not scale if
applied to the full visual SLAM problem. This paper proposes a number of novel
information\hyp{}theoretic utility functions for map point selection and
optimises these functions using greedy algorithms. The reduced maps are
evaluated using practical data alongside an existing visual SLAM implementation
(ORB-SLAM 2). Approximate selection techniques proposed in this paper achieve
trajectory accuracy comparable to an offline baseline while being suitable for
online use. These techniques enable the practical reduction of maps for visual
SLAM with competitive trajectory accuracy.
Results also demonstrate that SLAM front-end performance can significantly
impact the performance of map point selection. This shows the importance of
testing map point selection with a front-end implementation. To exploit this,
this paper proposes an approach that includes a model of the front-end in the
utility function when additional information is available. This approach
outperforms alternatives on applicable datasets and highlights future research
directions.
| no_new_dataset | 0.710653 |
2306.13695 | Hang Jung Ling | Hang Jung Ling, Olivier Bernard, Nicolas Ducros, Damien Garcia | Phase Unwrapping of Color Doppler Echocardiography using Deep Learning | 11 pages, accepted for publication in IEEE TUFFC, modified graphical
abstract | null | 10.1109/TUFFC.2023.3289621 | null | eess.IV cs.AI cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Color Doppler echocardiography is a widely used non-invasive imaging modality
that provides real-time information about the intracardiac blood flow. In an
apical long-axis view of the left ventricle, color Doppler is subject to phase
wrapping, or aliasing, especially during cardiac filling and ejection. When
setting up quantitative methods based on color Doppler, it is necessary to
correct this wrapping artifact. We developed an unfolded primal-dual network to
unwrap (dealias) color Doppler echocardiographic images and compared its
effectiveness against two state-of-the-art segmentation approaches based on
nnU-Net and transformer models. We trained and evaluated the performance of
each method on an in-house dataset and found that the nnU-Net-based method
provided the best dealiased results, followed by the primal-dual approach and
the transformer-based technique. Noteworthy, the primal-dual network, which had
significantly fewer trainable parameters, performed competitively with respect
to the other two methods, demonstrating the high potential of deep unfolding
methods. Our results suggest that deep learning-based methods can effectively
remove aliasing artifacts in color Doppler echocardiographic images,
outperforming DeAN, a state-of-the-art semi-automatic technique. Overall, our
results show that deep learning-based methods have the potential to effectively
preprocess color Doppler images for downstream quantitative analysis.
| [
{
"version": "v1",
"created": "Fri, 23 Jun 2023 13:23:03 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2023 17:03:43 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ling",
"Hang Jung",
""
],
[
"Bernard",
"Olivier",
""
],
[
"Ducros",
"Nicolas",
""
],
[
"Garcia",
"Damien",
""
]
] | TITLE: Phase Unwrapping of Color Doppler Echocardiography using Deep Learning
ABSTRACT: Color Doppler echocardiography is a widely used non-invasive imaging modality
that provides real-time information about the intracardiac blood flow. In an
apical long-axis view of the left ventricle, color Doppler is subject to phase
wrapping, or aliasing, especially during cardiac filling and ejection. When
setting up quantitative methods based on color Doppler, it is necessary to
correct this wrapping artifact. We developed an unfolded primal-dual network to
unwrap (dealias) color Doppler echocardiographic images and compared its
effectiveness against two state-of-the-art segmentation approaches based on
nnU-Net and transformer models. We trained and evaluated the performance of
each method on an in-house dataset and found that the nnU-Net-based method
provided the best dealiased results, followed by the primal-dual approach and
the transformer-based technique. Noteworthy, the primal-dual network, which had
significantly fewer trainable parameters, performed competitively with respect
to the other two methods, demonstrating the high potential of deep unfolding
methods. Our results suggest that deep learning-based methods can effectively
remove aliasing artifacts in color Doppler echocardiographic images,
outperforming DeAN, a state-of-the-art semi-automatic technique. Overall, our
results show that deep learning-based methods have the potential to effectively
preprocess color Doppler images for downstream quantitative analysis.
| no_new_dataset | 0.711794 |
2306.14397 | Li Ke | Li Ke, Hong Sheng, Fu Cai, Zhang Yunhe and Liu Ming | Discriminating Human-authored from ChatGPT-Generated Code Via
Discernable Feature Analysis | 11 pages, 8 figures, 3 tables | null | null | null | cs.SE cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ubiquitous adoption of Large Language Generation Models (LLMs) in
programming has underscored the importance of differentiating between
human-written code and code generated by intelligent models. This paper
specifically aims to distinguish code generated by ChatGPT from that authored
by humans. Our investigation reveals disparities in programming style,
technical level, and readability between these two sources. Consequently, we
develop a discriminative feature set for differentiation and evaluate its
efficacy through ablation experiments. Additionally, we devise a dataset
cleansing technique, which employs temporal and spatial segmentation, to
mitigate the dearth of datasets and to secure high-caliber, uncontaminated
datasets. To further enrich data resources, we employ "code transformation,"
"feature transformation," and "feature customization" techniques, generating an
extensive dataset comprising 10,000 lines of ChatGPT-generated code. The
salient contributions of our research include: proposing a discriminative
feature set yielding high accuracy in differentiating ChatGPT-generated code
from human-authored code in binary classification tasks; devising methods for
generating extensive ChatGPT-generated codes; and introducing a dataset
cleansing strategy that extracts immaculate, high-grade code datasets from
open-source repositories, thus achieving exceptional accuracy in code
authorship attribution tasks.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2023 03:15:06 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 09:23:08 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ke",
"Li",
""
],
[
"Sheng",
"Hong",
""
],
[
"Cai",
"Fu",
""
],
[
"Yunhe",
"Zhang",
""
],
[
"Ming",
"Liu",
""
]
] | TITLE: Discriminating Human-authored from ChatGPT-Generated Code Via
Discernable Feature Analysis
ABSTRACT: The ubiquitous adoption of Large Language Generation Models (LLMs) in
programming has underscored the importance of differentiating between
human-written code and code generated by intelligent models. This paper
specifically aims to distinguish code generated by ChatGPT from that authored
by humans. Our investigation reveals disparities in programming style,
technical level, and readability between these two sources. Consequently, we
develop a discriminative feature set for differentiation and evaluate its
efficacy through ablation experiments. Additionally, we devise a dataset
cleansing technique, which employs temporal and spatial segmentation, to
mitigate the dearth of datasets and to secure high-caliber, uncontaminated
datasets. To further enrich data resources, we employ "code transformation,"
"feature transformation," and "feature customization" techniques, generating an
extensive dataset comprising 10,000 lines of ChatGPT-generated code. The
salient contributions of our research include: proposing a discriminative
feature set yielding high accuracy in differentiating ChatGPT-generated code
from human-authored code in binary classification tasks; devising methods for
generating extensive ChatGPT-generated codes; and introducing a dataset
cleansing strategy that extracts immaculate, high-grade code datasets from
open-source repositories, thus achieving exceptional accuracy in code
authorship attribution tasks.
| no_new_dataset | 0.656906 |
2306.14749 | Alexander Bigalke | Alexander Bigalke, Mattias P. Heinrich | A denoised Mean Teacher for domain adaptive point cloud registration | early accepted at MICCAI 2023; corrected confused reference | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Point cloud-based medical registration promises increased computational
efficiency, robustness to intensity shifts, and anonymity preservation but is
limited by the inefficacy of unsupervised learning with similarity metrics.
Supervised training on synthetic deformations is an alternative but, in turn,
suffers from the domain gap to the real domain. In this work, we aim to tackle
this gap through domain adaptation. Self-training with the Mean Teacher is an
established approach to this problem but is impaired by the inherent noise of
the pseudo labels from the teacher. As a remedy, we present a denoised
teacher-student paradigm for point cloud registration, comprising two
complementary denoising strategies. First, we propose to filter pseudo labels
based on the Chamfer distances of teacher and student registrations, thus
preventing detrimental supervision by the teacher. Second, we make the teacher
dynamically synthesize novel training pairs with noise-free labels by warping
its moving inputs with the predicted deformations. Evaluation is performed for
inhale-to-exhale registration of lung vessel trees on the public PVT dataset
under two domain shifts. Our method surpasses the baseline Mean Teacher by
13.5/62.8%, consistently outperforms diverse competitors, and sets a new
state-of-the-art accuracy (TRE=2.31mm). Code is available at
https://github.com/multimodallearning/denoised_mt_pcd_reg.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2023 15:03:47 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 10:18:23 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Bigalke",
"Alexander",
""
],
[
"Heinrich",
"Mattias P.",
""
]
] | TITLE: A denoised Mean Teacher for domain adaptive point cloud registration
ABSTRACT: Point cloud-based medical registration promises increased computational
efficiency, robustness to intensity shifts, and anonymity preservation but is
limited by the inefficacy of unsupervised learning with similarity metrics.
Supervised training on synthetic deformations is an alternative but, in turn,
suffers from the domain gap to the real domain. In this work, we aim to tackle
this gap through domain adaptation. Self-training with the Mean Teacher is an
established approach to this problem but is impaired by the inherent noise of
the pseudo labels from the teacher. As a remedy, we present a denoised
teacher-student paradigm for point cloud registration, comprising two
complementary denoising strategies. First, we propose to filter pseudo labels
based on the Chamfer distances of teacher and student registrations, thus
preventing detrimental supervision by the teacher. Second, we make the teacher
dynamically synthesize novel training pairs with noise-free labels by warping
its moving inputs with the predicted deformations. Evaluation is performed for
inhale-to-exhale registration of lung vessel trees on the public PVT dataset
under two domain shifts. Our method surpasses the baseline Mean Teacher by
13.5/62.8%, consistently outperforms diverse competitors, and sets a new
state-of-the-art accuracy (TRE=2.31mm). Code is available at
https://github.com/multimodallearning/denoised_mt_pcd_reg.
| no_new_dataset | 0.711055 |
2306.15736 | Junyi Bian | Junyi Bian, Rongze Jiang, Weiqi Zhai, Tianyang Huang, Hong Zhou,
Shanfeng Zhu | DMNER: Biomedical Entity Recognition by Detection and Matching | 9 pages content, 2 pages appendix | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biomedical named entity recognition (BNER) serves as the foundation for
numerous biomedical text mining tasks. Unlike general NER, BNER require a
comprehensive grasp of the domain, and incorporating external knowledge beyond
training data poses a significant challenge. In this study, we propose a novel
BNER framework called DMNER. By leveraging existing entity representation
models SAPBERT, we tackle BNER as a two-step process: entity boundary detection
and biomedical entity matching. DMNER exhibits applicability across multiple
NER scenarios: 1) In supervised NER, we observe that DMNER effectively
rectifies the output of baseline NER models, thereby further enhancing
performance. 2) In distantly supervised NER, combining MRC and AutoNER as span
boundary detectors enables DMNER to achieve satisfactory results. 3) For
training NER by merging multiple datasets, we adopt a framework similar to
DS-NER but additionally leverage ChatGPT to obtain high-quality phrases in the
training. Through extensive experiments conducted on 10 benchmark datasets, we
demonstrate the versatility and effectiveness of DMNER.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 18:32:07 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2023 12:26:07 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Bian",
"Junyi",
""
],
[
"Jiang",
"Rongze",
""
],
[
"Zhai",
"Weiqi",
""
],
[
"Huang",
"Tianyang",
""
],
[
"Zhou",
"Hong",
""
],
[
"Zhu",
"Shanfeng",
""
]
] | TITLE: DMNER: Biomedical Entity Recognition by Detection and Matching
ABSTRACT: Biomedical named entity recognition (BNER) serves as the foundation for
numerous biomedical text mining tasks. Unlike general NER, BNER require a
comprehensive grasp of the domain, and incorporating external knowledge beyond
training data poses a significant challenge. In this study, we propose a novel
BNER framework called DMNER. By leveraging existing entity representation
models SAPBERT, we tackle BNER as a two-step process: entity boundary detection
and biomedical entity matching. DMNER exhibits applicability across multiple
NER scenarios: 1) In supervised NER, we observe that DMNER effectively
rectifies the output of baseline NER models, thereby further enhancing
performance. 2) In distantly supervised NER, combining MRC and AutoNER as span
boundary detectors enables DMNER to achieve satisfactory results. 3) For
training NER by merging multiple datasets, we adopt a framework similar to
DS-NER but additionally leverage ChatGPT to obtain high-quality phrases in the
training. Through extensive experiments conducted on 10 benchmark datasets, we
demonstrate the versatility and effectiveness of DMNER.
| no_new_dataset | 0.709466 |
2306.15767 | Xue-Feng Zhu | Xue-Feng Zhu, Tianyang Xu, Jian Zhao, Jia-Wei Liu, Kai Wang, Gang
Wang, Jianan Li, Qiang Wang, Lei Jin, Zheng Zhu, Junliang Xing, Xiao-Jun Wu | Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Unmanned Aerial Vehicles (UAVs) have been widely used in many areas,
including transportation, surveillance, and military. However, their potential
for safety and privacy violations is an increasing issue and highly limits
their broader applications, underscoring the critical importance of UAV
perception and defense (anti-UAV). Still, previous works have simplified such
an anti-UAV task as a tracking problem, where the prior information of UAVs is
always provided; such a scheme fails in real-world anti-UAV tasks (i.e. complex
scenes, indeterminate-appear and -reappear UAVs, and real-time UAV
surveillance). In this paper, we first formulate a new and practical anti-UAV
problem featuring the UAVs perception in complex scenes without prior UAVs
information. To benchmark such a challenging task, we propose the largest UAV
dataset dubbed AntiUAV600 and a new evaluation metric. The AntiUAV600 comprises
600 video sequences of challenging scenes with random, fast, and small-scale
UAVs, with over 723K thermal infrared frames densely annotated with bounding
boxes. Finally, we develop a novel anti-UAV approach via an evidential
collaboration of global UAVs detection and local UAVs tracking, which
effectively tackles the proposed problem and can serve as a strong baseline for
future research. Extensive experiments show our method outperforms SOTA
approaches and validate the ability of AntiUAV600 to enhance UAV perception
performance due to its large scale and complexity. Our dataset, pretrained
models, and source codes will be released publically.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 19:30:23 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 18:59:31 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhu",
"Xue-Feng",
""
],
[
"Xu",
"Tianyang",
""
],
[
"Zhao",
"Jian",
""
],
[
"Liu",
"Jia-Wei",
""
],
[
"Wang",
"Kai",
""
],
[
"Wang",
"Gang",
""
],
[
"Li",
"Jianan",
""
],
[
"Wang",
"Qiang",
""
],
[
"Jin",
"Lei",
""
],
[
"Zhu",
"Zheng",
""
],
[
"Xing",
"Junliang",
""
],
[
"Wu",
"Xiao-Jun",
""
]
] | TITLE: Evidential Detection and Tracking Collaboration: New Problem, Benchmark
and Algorithm for Robust Anti-UAV System
ABSTRACT: Unmanned Aerial Vehicles (UAVs) have been widely used in many areas,
including transportation, surveillance, and military. However, their potential
for safety and privacy violations is an increasing issue and highly limits
their broader applications, underscoring the critical importance of UAV
perception and defense (anti-UAV). Still, previous works have simplified such
an anti-UAV task as a tracking problem, where the prior information of UAVs is
always provided; such a scheme fails in real-world anti-UAV tasks (i.e. complex
scenes, indeterminate-appear and -reappear UAVs, and real-time UAV
surveillance). In this paper, we first formulate a new and practical anti-UAV
problem featuring the UAVs perception in complex scenes without prior UAVs
information. To benchmark such a challenging task, we propose the largest UAV
dataset dubbed AntiUAV600 and a new evaluation metric. The AntiUAV600 comprises
600 video sequences of challenging scenes with random, fast, and small-scale
UAVs, with over 723K thermal infrared frames densely annotated with bounding
boxes. Finally, we develop a novel anti-UAV approach via an evidential
collaboration of global UAVs detection and local UAVs tracking, which
effectively tackles the proposed problem and can serve as a strong baseline for
future research. Extensive experiments show our method outperforms SOTA
approaches and validate the ability of AntiUAV600 to enhance UAV perception
performance due to its large scale and complexity. Our dataset, pretrained
models, and source codes will be released publically.
| new_dataset | 0.713781 |
2306.17059 | Jina Kim | Jina Kim, Zekun Li, Yijun Lin, Min Namgung, Leeje Jang, Yao-Yi Chiang | The mapKurator System: A Complete Pipeline for Extracting and Linking
Text from Historical Maps | 4 pages, 4 figures | null | null | null | cs.AI cs.CL cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Scanned historical maps in libraries and archives are valuable repositories
of geographic data that often do not exist elsewhere. Despite the potential of
machine learning tools like the Google Vision APIs for automatically
transcribing text from these maps into machine-readable formats, they do not
work well with large-sized images (e.g., high-resolution scanned documents),
cannot infer the relation between the recognized text and other datasets, and
are challenging to integrate with post-processing tools. This paper introduces
the mapKurator system, an end-to-end system integrating machine learning models
with a comprehensive data processing pipeline. mapKurator empowers automated
extraction, post-processing, and linkage of text labels from large numbers of
large-dimension historical map scans. The output data, comprising bounding
polygons and recognized text, is in the standard GeoJSON format, making it
easily modifiable within Geographic Information Systems (GIS). The proposed
system allows users to quickly generate valuable data from large numbers of
historical maps for in-depth analysis of the map content and, in turn,
encourages map findability, accessibility, interoperability, and reusability
(FAIR principles). We deployed the mapKurator system and enabled the processing
of over 60,000 maps and over 100 million text/place names in the David Rumsey
Historical Map collection. We also demonstrated a seamless integration of
mapKurator with a collaborative web platform to enable accessing automated
approaches for extracting and linking text labels from historical map scans and
collective work to improve the results.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 16:05:40 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 19:38:37 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Kim",
"Jina",
""
],
[
"Li",
"Zekun",
""
],
[
"Lin",
"Yijun",
""
],
[
"Namgung",
"Min",
""
],
[
"Jang",
"Leeje",
""
],
[
"Chiang",
"Yao-Yi",
""
]
] | TITLE: The mapKurator System: A Complete Pipeline for Extracting and Linking
Text from Historical Maps
ABSTRACT: Scanned historical maps in libraries and archives are valuable repositories
of geographic data that often do not exist elsewhere. Despite the potential of
machine learning tools like the Google Vision APIs for automatically
transcribing text from these maps into machine-readable formats, they do not
work well with large-sized images (e.g., high-resolution scanned documents),
cannot infer the relation between the recognized text and other datasets, and
are challenging to integrate with post-processing tools. This paper introduces
the mapKurator system, an end-to-end system integrating machine learning models
with a comprehensive data processing pipeline. mapKurator empowers automated
extraction, post-processing, and linkage of text labels from large numbers of
large-dimension historical map scans. The output data, comprising bounding
polygons and recognized text, is in the standard GeoJSON format, making it
easily modifiable within Geographic Information Systems (GIS). The proposed
system allows users to quickly generate valuable data from large numbers of
historical maps for in-depth analysis of the map content and, in turn,
encourages map findability, accessibility, interoperability, and reusability
(FAIR principles). We deployed the mapKurator system and enabled the processing
of over 60,000 maps and over 100 million text/place names in the David Rumsey
Historical Map collection. We also demonstrated a seamless integration of
mapKurator with a collaborative web platform to enable accessing automated
approaches for extracting and linking text labels from historical map scans and
collective work to improve the results.
| no_new_dataset | 0.712988 |
2306.17431 | Huiming Sun | Huiming Sun, Lan Fu, Jinlong Li, Qing Guo, Zibo Meng, Tianyun Zhang,
Yuewei Lin, Hongkai Yu | Defense against Adversarial Cloud Attack on Remote Sensing Salient
Object Detection | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Detecting the salient objects in a remote sensing image has wide applications
for the interdisciplinary research. Many existing deep learning methods have
been proposed for Salient Object Detection (SOD) in remote sensing images and
get remarkable results. However, the recent adversarial attack examples,
generated by changing a few pixel values on the original remote sensing image,
could result in a collapse for the well-trained deep learning based SOD model.
Different with existing methods adding perturbation to original images, we
propose to jointly tune adversarial exposure and additive perturbation for
attack and constrain image close to cloudy image as Adversarial Cloud. Cloud is
natural and common in remote sensing images, however, camouflaging cloud based
adversarial attack and defense for remote sensing images are not well studied
before. Furthermore, we design DefenseNet as a learn-able pre-processing to the
adversarial cloudy images so as to preserve the performance of the deep
learning based remote sensing SOD model, without tuning the already deployed
deep SOD model. By considering both regular and generalized adversarial
examples, the proposed DefenseNet can defend the proposed Adversarial Cloud in
white-box setting and other attack methods in black-box setting. Experimental
results on a synthesized benchmark from the public remote sensing SOD dataset
(EORSSD) show the promising defense against adversarial cloud attacks.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 07:06:13 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2023 16:15:10 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Sun",
"Huiming",
""
],
[
"Fu",
"Lan",
""
],
[
"Li",
"Jinlong",
""
],
[
"Guo",
"Qing",
""
],
[
"Meng",
"Zibo",
""
],
[
"Zhang",
"Tianyun",
""
],
[
"Lin",
"Yuewei",
""
],
[
"Yu",
"Hongkai",
""
]
] | TITLE: Defense against Adversarial Cloud Attack on Remote Sensing Salient
Object Detection
ABSTRACT: Detecting the salient objects in a remote sensing image has wide applications
for the interdisciplinary research. Many existing deep learning methods have
been proposed for Salient Object Detection (SOD) in remote sensing images and
get remarkable results. However, the recent adversarial attack examples,
generated by changing a few pixel values on the original remote sensing image,
could result in a collapse for the well-trained deep learning based SOD model.
Different with existing methods adding perturbation to original images, we
propose to jointly tune adversarial exposure and additive perturbation for
attack and constrain image close to cloudy image as Adversarial Cloud. Cloud is
natural and common in remote sensing images, however, camouflaging cloud based
adversarial attack and defense for remote sensing images are not well studied
before. Furthermore, we design DefenseNet as a learn-able pre-processing to the
adversarial cloudy images so as to preserve the performance of the deep
learning based remote sensing SOD model, without tuning the already deployed
deep SOD model. By considering both regular and generalized adversarial
examples, the proposed DefenseNet can defend the proposed Adversarial Cloud in
white-box setting and other attack methods in black-box setting. Experimental
results on a synthesized benchmark from the public remote sensing SOD dataset
(EORSSD) show the promising defense against adversarial cloud attacks.
| no_new_dataset | 0.710459 |
2306.17643 | Che Sun | Yi Guo, Che Sun, Yunde Jia, and Yuwei Wu | Neural 3D Scene Reconstruction from Multiple 2D Images without 3D
Supervision | 10 pages, 6 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural 3D scene reconstruction methods have achieved impressive performance
when reconstructing complex geometry and low-textured regions in indoor scenes.
However, these methods heavily rely on 3D data which is costly and
time-consuming to obtain in real world. In this paper, we propose a novel
neural reconstruction method that reconstructs scenes using sparse depth under
the plane constraints without 3D supervision. We introduce a signed distance
function field, a color field, and a probability field to represent a scene. We
optimize these fields to reconstruct the scene by using differentiable ray
marching with accessible 2D images as supervision. We improve the
reconstruction quality of complex geometry scene regions with sparse depth
obtained by using the geometric constraints. The geometric constraints project
3D points on the surface to similar-looking regions with similar features in
different 2D images. We impose the plane constraints to make large planes
parallel or vertical to the indoor floor. Both two constraints help reconstruct
accurate and smooth geometry structures of the scene. Without 3D supervision,
our method achieves competitive performance compared with existing methods that
use 3D supervision on the ScanNet dataset.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 13:30:48 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 09:53:14 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Jul 2023 03:54:44 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Guo",
"Yi",
""
],
[
"Sun",
"Che",
""
],
[
"Jia",
"Yunde",
""
],
[
"Wu",
"Yuwei",
""
]
] | TITLE: Neural 3D Scene Reconstruction from Multiple 2D Images without 3D
Supervision
ABSTRACT: Neural 3D scene reconstruction methods have achieved impressive performance
when reconstructing complex geometry and low-textured regions in indoor scenes.
However, these methods heavily rely on 3D data which is costly and
time-consuming to obtain in real world. In this paper, we propose a novel
neural reconstruction method that reconstructs scenes using sparse depth under
the plane constraints without 3D supervision. We introduce a signed distance
function field, a color field, and a probability field to represent a scene. We
optimize these fields to reconstruct the scene by using differentiable ray
marching with accessible 2D images as supervision. We improve the
reconstruction quality of complex geometry scene regions with sparse depth
obtained by using the geometric constraints. The geometric constraints project
3D points on the surface to similar-looking regions with similar features in
different 2D images. We impose the plane constraints to make large planes
parallel or vertical to the indoor floor. Both two constraints help reconstruct
accurate and smooth geometry structures of the scene. Without 3D supervision,
our method achieves competitive performance compared with existing methods that
use 3D supervision on the ScanNet dataset.
| no_new_dataset | 0.712389 |
2307.00165 | Jianchao Ji | Jianchao Ji, Zelong Li, Shuyuan Xu, Max Xiong, Juntao Tan, Yingqiang
Ge, Hao Wang, Yongfeng Zhang | Counterfactual Collaborative Reasoning | null | null | 10.1145/3539597.3570464 | null | cs.IR cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Causal reasoning and logical reasoning are two important types of reasoning
abilities for human intelligence. However, their relationship has not been
extensively explored under machine intelligence context. In this paper, we
explore how the two reasoning abilities can be jointly modeled to enhance both
accuracy and explainability of machine learning models. More specifically, by
integrating two important types of reasoning ability -- counterfactual
reasoning and (neural) logical reasoning -- we propose Counterfactual
Collaborative Reasoning (CCR), which conducts counterfactual logic reasoning to
improve the performance. In particular, we use recommender system as an example
to show how CCR alleviate data scarcity, improve accuracy and enhance
transparency. Technically, we leverage counterfactual reasoning to generate
"difficult" counterfactual training examples for data augmentation, which --
together with the original training examples -- can enhance the model
performance. Since the augmented data is model irrelevant, they can be used to
enhance any model, enabling the wide applicability of the technique. Besides,
most of the existing data augmentation methods focus on "implicit data
augmentation" over users' implicit feedback, while our framework conducts
"explicit data augmentation" over users explicit feedback based on
counterfactual logic reasoning. Experiments on three real-world datasets show
that CCR achieves better performance than non-augmented models and implicitly
augmented models, and also improves model transparency by generating
counterfactual explanations.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 23:01:10 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ji",
"Jianchao",
""
],
[
"Li",
"Zelong",
""
],
[
"Xu",
"Shuyuan",
""
],
[
"Xiong",
"Max",
""
],
[
"Tan",
"Juntao",
""
],
[
"Ge",
"Yingqiang",
""
],
[
"Wang",
"Hao",
""
],
[
"Zhang",
"Yongfeng",
""
]
] | TITLE: Counterfactual Collaborative Reasoning
ABSTRACT: Causal reasoning and logical reasoning are two important types of reasoning
abilities for human intelligence. However, their relationship has not been
extensively explored under machine intelligence context. In this paper, we
explore how the two reasoning abilities can be jointly modeled to enhance both
accuracy and explainability of machine learning models. More specifically, by
integrating two important types of reasoning ability -- counterfactual
reasoning and (neural) logical reasoning -- we propose Counterfactual
Collaborative Reasoning (CCR), which conducts counterfactual logic reasoning to
improve the performance. In particular, we use recommender system as an example
to show how CCR alleviate data scarcity, improve accuracy and enhance
transparency. Technically, we leverage counterfactual reasoning to generate
"difficult" counterfactual training examples for data augmentation, which --
together with the original training examples -- can enhance the model
performance. Since the augmented data is model irrelevant, they can be used to
enhance any model, enabling the wide applicability of the technique. Besides,
most of the existing data augmentation methods focus on "implicit data
augmentation" over users' implicit feedback, while our framework conducts
"explicit data augmentation" over users explicit feedback based on
counterfactual logic reasoning. Experiments on three real-world datasets show
that CCR achieves better performance than non-augmented models and implicitly
augmented models, and also improves model transparency by generating
counterfactual explanations.
| no_new_dataset | 0.709453 |
2307.00397 | Yassine Himeur | Ammar Chouchane, Abdelmalik Ouamane, Yassine Himeur, Wathiq Mansoor,
Shadi Atalla, Afaf Benzaibak and Chahrazed Boudellal | Improving CNN-based Person Re-identification using score Normalization | 5 pages, 6 figures and 2 tables | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Person re-identification (PRe-ID) is a crucial task in security,
surveillance, and retail analysis, which involves identifying an individual
across multiple cameras and views. However, it is a challenging task due to
changes in illumination, background, and viewpoint. Efficient feature
extraction and metric learning algorithms are essential for a successful PRe-ID
system. This paper proposes a novel approach for PRe-ID, which combines a
Convolutional Neural Network (CNN) based feature extraction method with
Cross-view Quadratic Discriminant Analysis (XQDA) for metric learning.
Additionally, a matching algorithm that employs Mahalanobis distance and a
score normalization process to address inconsistencies between camera scores is
implemented. The proposed approach is tested on four challenging datasets,
including VIPeR, GRID, CUHK01, and PRID450S, and promising results are
obtained. For example, without normalization, the rank-20 rate accuracies of
the GRID, CUHK01, VIPeR and PRID450S datasets were 61.92%, 83.90%, 92.03%,
96.22%; however, after score normalization, they have increased to 64.64%,
89.30%, 92.78%, and 98.76%, respectively. Accordingly, the promising results on
four challenging datasets indicate the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 18:12:27 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 06:23:36 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Chouchane",
"Ammar",
""
],
[
"Ouamane",
"Abdelmalik",
""
],
[
"Himeur",
"Yassine",
""
],
[
"Mansoor",
"Wathiq",
""
],
[
"Atalla",
"Shadi",
""
],
[
"Benzaibak",
"Afaf",
""
],
[
"Boudellal",
"Chahrazed",
""
]
] | TITLE: Improving CNN-based Person Re-identification using score Normalization
ABSTRACT: Person re-identification (PRe-ID) is a crucial task in security,
surveillance, and retail analysis, which involves identifying an individual
across multiple cameras and views. However, it is a challenging task due to
changes in illumination, background, and viewpoint. Efficient feature
extraction and metric learning algorithms are essential for a successful PRe-ID
system. This paper proposes a novel approach for PRe-ID, which combines a
Convolutional Neural Network (CNN) based feature extraction method with
Cross-view Quadratic Discriminant Analysis (XQDA) for metric learning.
Additionally, a matching algorithm that employs Mahalanobis distance and a
score normalization process to address inconsistencies between camera scores is
implemented. The proposed approach is tested on four challenging datasets,
including VIPeR, GRID, CUHK01, and PRID450S, and promising results are
obtained. For example, without normalization, the rank-20 rate accuracies of
the GRID, CUHK01, VIPeR and PRID450S datasets were 61.92%, 83.90%, 92.03%,
96.22%; however, after score normalization, they have increased to 64.64%,
89.30%, 92.78%, and 98.76%, respectively. Accordingly, the promising results on
four challenging datasets indicate the effectiveness of the proposed approach.
| no_new_dataset | 0.713201 |
2307.00937 | Nicol\'as Navarro-Guerrero | Oscar Alberto Jui\~na Quilacham\'in and Nicol\'as Navarro-Guerrero | A Biomimetic Fingerprint for Robotic Tactile Sensing | 56th International Symposium on Robotics (ISR Europe) | September
26-27, 2023, Stuttgart, Germany | null | null | null | cs.RO | http://creativecommons.org/licenses/by-sa/4.0/ | Tactile sensors have been developed since the early '70s and have greatly
improved, but there are still no widely adopted solutions. Various
technologies, such as capacitive, piezoelectric, piezoresistive, optical, and
magnetic, are used in haptic sensing. However, most sensors are not
mechanically robust for many applications and cannot cope well with curved or
sizeable surfaces. Aiming to address this problem, we present a 3D-printed
fingerprint pattern to enhance the body-borne vibration signal for dynamic
tactile feedback. The 3D-printed fingerprint patterns were designed and tested
for an RH8D Adult size Robot Hand. The patterns significantly increased the
signal's power to over 11 times the baseline. A public haptic dataset including
52 objects of several materials was created using the best fingerprint pattern
and material.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 11:24:11 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jul 2023 14:02:18 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Quilachamín",
"Oscar Alberto Juiña",
""
],
[
"Navarro-Guerrero",
"Nicolás",
""
]
] | TITLE: A Biomimetic Fingerprint for Robotic Tactile Sensing
ABSTRACT: Tactile sensors have been developed since the early '70s and have greatly
improved, but there are still no widely adopted solutions. Various
technologies, such as capacitive, piezoelectric, piezoresistive, optical, and
magnetic, are used in haptic sensing. However, most sensors are not
mechanically robust for many applications and cannot cope well with curved or
sizeable surfaces. Aiming to address this problem, we present a 3D-printed
fingerprint pattern to enhance the body-borne vibration signal for dynamic
tactile feedback. The 3D-printed fingerprint patterns were designed and tested
for an RH8D Adult size Robot Hand. The patterns significantly increased the
signal's power to over 11 times the baseline. A public haptic dataset including
52 objects of several materials was created using the best fingerprint pattern
and material.
| new_dataset | 0.714055 |
2307.00995 | Daeun Lee | Daeun Lee, Sejung Son, Hyolim Jeon, Seungbae Kim, Jinyoung Han | Towards Suicide Prevention from Bipolar Disorder with Temporal
Symptom-Aware Multitask Learning | KDD 2023 accepted | KDD 2023: Proceedings of the 29th ACM SIGKDD Conference on
Knowledge Discovery and Data Mining | 10.1145/3580305.3599917 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bipolar disorder (BD) is closely associated with an increased risk of
suicide. However, while the prior work has revealed valuable insight into
understanding the behavior of BD patients on social media, little attention has
been paid to developing a model that can predict the future suicidality of a BD
patient. Therefore, this study proposes a multi-task learning model for
predicting the future suicidality of BD patients by jointly learning current
symptoms. We build a novel BD dataset clinically validated by psychiatrists,
including 14 years of posts on bipolar-related subreddits written by 818 BD
patients, along with the annotations of future suicidality and BD symptoms. We
also suggest a temporal symptom-aware attention mechanism to determine which
symptoms are the most influential for predicting future suicidality over time
through a sequence of BD posts. Our experiments demonstrate that the proposed
model outperforms the state-of-the-art models in both BD symptom identification
and future suicidality prediction tasks. In addition, the proposed temporal
symptom-aware attention provides interpretable attention weights, helping
clinicians to apprehend BD patients more comprehensively and to provide timely
intervention by tracking mental state progression.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 13:18:55 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Lee",
"Daeun",
""
],
[
"Son",
"Sejung",
""
],
[
"Jeon",
"Hyolim",
""
],
[
"Kim",
"Seungbae",
""
],
[
"Han",
"Jinyoung",
""
]
] | TITLE: Towards Suicide Prevention from Bipolar Disorder with Temporal
Symptom-Aware Multitask Learning
ABSTRACT: Bipolar disorder (BD) is closely associated with an increased risk of
suicide. However, while the prior work has revealed valuable insight into
understanding the behavior of BD patients on social media, little attention has
been paid to developing a model that can predict the future suicidality of a BD
patient. Therefore, this study proposes a multi-task learning model for
predicting the future suicidality of BD patients by jointly learning current
symptoms. We build a novel BD dataset clinically validated by psychiatrists,
including 14 years of posts on bipolar-related subreddits written by 818 BD
patients, along with the annotations of future suicidality and BD symptoms. We
also suggest a temporal symptom-aware attention mechanism to determine which
symptoms are the most influential for predicting future suicidality over time
through a sequence of BD posts. Our experiments demonstrate that the proposed
model outperforms the state-of-the-art models in both BD symptom identification
and future suicidality prediction tasks. In addition, the proposed temporal
symptom-aware attention provides interpretable attention weights, helping
clinicians to apprehend BD patients more comprehensively and to provide timely
intervention by tracking mental state progression.
| new_dataset | 0.713276 |
2307.01088 | Kevin Kasa | Kevin Kasa and Graham W. Taylor | Empirically Validating Conformal Prediction on Modern Vision
Architectures Under Distribution Shift and Long-tailed Data | null | null | null | null | cs.LG cs.CV stat.ML | http://creativecommons.org/licenses/by/4.0/ | Conformal prediction has emerged as a rigorous means of providing deep
learning models with reliable uncertainty estimates and safety guarantees. Yet,
its performance is known to degrade under distribution shift and long-tailed
class distributions, which are often present in real world applications. Here,
we characterize the performance of several post-hoc and training-based
conformal prediction methods under these settings, providing the first
empirical evaluation on large-scale datasets and models. We show that across
numerous conformal methods and neural network families, performance greatly
degrades under distribution shifts violating safety guarantees. Similarly, we
show that in long-tailed settings the guarantees are frequently violated on
many classes. Understanding the limitations of these methods is necessary for
deployment in real world and safety-critical applications.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 15:08:28 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Kasa",
"Kevin",
""
],
[
"Taylor",
"Graham W.",
""
]
] | TITLE: Empirically Validating Conformal Prediction on Modern Vision
Architectures Under Distribution Shift and Long-tailed Data
ABSTRACT: Conformal prediction has emerged as a rigorous means of providing deep
learning models with reliable uncertainty estimates and safety guarantees. Yet,
its performance is known to degrade under distribution shift and long-tailed
class distributions, which are often present in real world applications. Here,
we characterize the performance of several post-hoc and training-based
conformal prediction methods under these settings, providing the first
empirical evaluation on large-scale datasets and models. We show that across
numerous conformal methods and neural network families, performance greatly
degrades under distribution shifts violating safety guarantees. Similarly, we
show that in long-tailed settings the guarantees are frequently violated on
many classes. Understanding the limitations of these methods is necessary for
deployment in real world and safety-critical applications.
| no_new_dataset | 0.712188 |
2307.01201 | Sivaramakrishnan Swaminathan | Sivaramakrishnan Swaminathan, Antoine Dedieu, Rajkumar Vasudeva Raju,
Murray Shanahan, Miguel Lazaro-Gredilla, Dileep George | Schema-learning and rebinding as mechanisms of in-context learning and
emergence | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | In-context learning (ICL) is one of the most powerful and most unexpected
capabilities to emerge in recent transformer-based large language models
(LLMs). Yet the mechanisms that underlie it are poorly understood. In this
paper, we demonstrate that comparable ICL capabilities can be acquired by an
alternative sequence prediction learning method using clone-structured causal
graphs (CSCGs). Moreover, a key property of CSCGs is that, unlike
transformer-based LLMs, they are {\em interpretable}, which considerably
simplifies the task of explaining how ICL works. Specifically, we show that it
uses a combination of (a) learning template (schema) circuits for pattern
completion, (b) retrieving relevant templates in a context-sensitive manner,
and (c) rebinding of novel tokens to appropriate slots in the templates. We go
on to marshall evidence for the hypothesis that similar mechanisms underlie ICL
in LLMs. For example, we find that, with CSCGs as with LLMs, different
capabilities emerge at different levels of overparameterization, suggesting
that overparameterization helps in learning more complex template (schema)
circuits. By showing how ICL can be achieved with small models and datasets, we
open up a path to novel architectures, and take a vital step towards a more
general understanding of the mechanics behind this important capability.
| [
{
"version": "v1",
"created": "Fri, 16 Jun 2023 00:29:19 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Swaminathan",
"Sivaramakrishnan",
""
],
[
"Dedieu",
"Antoine",
""
],
[
"Raju",
"Rajkumar Vasudeva",
""
],
[
"Shanahan",
"Murray",
""
],
[
"Lazaro-Gredilla",
"Miguel",
""
],
[
"George",
"Dileep",
""
]
] | TITLE: Schema-learning and rebinding as mechanisms of in-context learning and
emergence
ABSTRACT: In-context learning (ICL) is one of the most powerful and most unexpected
capabilities to emerge in recent transformer-based large language models
(LLMs). Yet the mechanisms that underlie it are poorly understood. In this
paper, we demonstrate that comparable ICL capabilities can be acquired by an
alternative sequence prediction learning method using clone-structured causal
graphs (CSCGs). Moreover, a key property of CSCGs is that, unlike
transformer-based LLMs, they are {\em interpretable}, which considerably
simplifies the task of explaining how ICL works. Specifically, we show that it
uses a combination of (a) learning template (schema) circuits for pattern
completion, (b) retrieving relevant templates in a context-sensitive manner,
and (c) rebinding of novel tokens to appropriate slots in the templates. We go
on to marshall evidence for the hypothesis that similar mechanisms underlie ICL
in LLMs. For example, we find that, with CSCGs as with LLMs, different
capabilities emerge at different levels of overparameterization, suggesting
that overparameterization helps in learning more complex template (schema)
circuits. By showing how ICL can be achieved with small models and datasets, we
open up a path to novel architectures, and take a vital step towards a more
general understanding of the mechanics behind this important capability.
| no_new_dataset | 0.708616 |
2307.01204 | Zicheng Zhao | Zicheng Zhao, Linhao Luo, Shirui Pan, Quoc Viet Hung Nguyen, Chen Gong | Towards Few-shot Inductive Link Prediction on Knowledge Graphs: A
Relational Anonymous Walk-guided Neural Process Approach | Accepted by ECML/PKDD 2023 | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Few-shot inductive link prediction on knowledge graphs (KGs) aims to predict
missing links for unseen entities with few-shot links observed. Previous
methods are limited to transductive scenarios, where entities exist in the
knowledge graphs, so they are unable to handle unseen entities. Therefore,
recent inductive methods utilize the sub-graphs around unseen entities to
obtain the semantics and predict links inductively. However, in the few-shot
setting, the sub-graphs are often sparse and cannot provide meaningful
inductive patterns. In this paper, we propose a novel relational anonymous
walk-guided neural process for few-shot inductive link prediction on knowledge
graphs, denoted as RawNP. Specifically, we develop a neural process-based
method to model a flexible distribution over link prediction functions. This
enables the model to quickly adapt to new entities and estimate the uncertainty
when making predictions. To capture general inductive patterns, we present a
relational anonymous walk to extract a series of relational motifs from
few-shot observations. These motifs reveal the distinctive semantic patterns on
KGs that support inductive predictions. Extensive experiments on typical
benchmark datasets demonstrate that our model derives new state-of-the-art
performance.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2023 12:02:32 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhao",
"Zicheng",
""
],
[
"Luo",
"Linhao",
""
],
[
"Pan",
"Shirui",
""
],
[
"Nguyen",
"Quoc Viet Hung",
""
],
[
"Gong",
"Chen",
""
]
] | TITLE: Towards Few-shot Inductive Link Prediction on Knowledge Graphs: A
Relational Anonymous Walk-guided Neural Process Approach
ABSTRACT: Few-shot inductive link prediction on knowledge graphs (KGs) aims to predict
missing links for unseen entities with few-shot links observed. Previous
methods are limited to transductive scenarios, where entities exist in the
knowledge graphs, so they are unable to handle unseen entities. Therefore,
recent inductive methods utilize the sub-graphs around unseen entities to
obtain the semantics and predict links inductively. However, in the few-shot
setting, the sub-graphs are often sparse and cannot provide meaningful
inductive patterns. In this paper, we propose a novel relational anonymous
walk-guided neural process for few-shot inductive link prediction on knowledge
graphs, denoted as RawNP. Specifically, we develop a neural process-based
method to model a flexible distribution over link prediction functions. This
enables the model to quickly adapt to new entities and estimate the uncertainty
when making predictions. To capture general inductive patterns, we present a
relational anonymous walk to extract a series of relational motifs from
few-shot observations. These motifs reveal the distinctive semantic patterns on
KGs that support inductive predictions. Extensive experiments on typical
benchmark datasets demonstrate that our model derives new state-of-the-art
performance.
| no_new_dataset | 0.710823 |
2307.01206 | Jian Zhu | Jian Zhu, Congcong Liu, Pei Wang, Xiwei Zhao, Zhangang Lin, Jingping
Shao | Confidence Ranking for CTR Prediction | Accepted by WWW2023 | null | null | null | cs.IR cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | Model evolution and constant availability of data are two common phenomena in
large-scale real-world machine learning applications, e.g. ads and
recommendation systems. To adapt, the real-world system typically retrain with
all available data and online learn with recently available data to update the
models periodically with the goal of better serving performance. In this paper,
we propose a novel framework, named Confidence Ranking, which designs the
optimization objective as a ranking function with two different models. Our
confidence ranking loss allows direct optimization of the logits output for
different convex surrogate functions of metrics, e.g. AUC and Accuracy
depending on the target task and dataset. Armed with our proposed methods, our
experiments show that the introduction of confidence ranking loss can
outperform all baselines on the CTR prediction tasks of public and industrial
datasets. This framework has been deployed in the advertisement system of
JD.com to serve the main traffic in the fine-rank stage.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2023 07:31:00 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhu",
"Jian",
""
],
[
"Liu",
"Congcong",
""
],
[
"Wang",
"Pei",
""
],
[
"Zhao",
"Xiwei",
""
],
[
"Lin",
"Zhangang",
""
],
[
"Shao",
"Jingping",
""
]
] | TITLE: Confidence Ranking for CTR Prediction
ABSTRACT: Model evolution and constant availability of data are two common phenomena in
large-scale real-world machine learning applications, e.g. ads and
recommendation systems. To adapt, the real-world system typically retrain with
all available data and online learn with recently available data to update the
models periodically with the goal of better serving performance. In this paper,
we propose a novel framework, named Confidence Ranking, which designs the
optimization objective as a ranking function with two different models. Our
confidence ranking loss allows direct optimization of the logits output for
different convex surrogate functions of metrics, e.g. AUC and Accuracy
depending on the target task and dataset. Armed with our proposed methods, our
experiments show that the introduction of confidence ranking loss can
outperform all baselines on the CTR prediction tasks of public and industrial
datasets. This framework has been deployed in the advertisement system of
JD.com to serve the main traffic in the fine-rank stage.
| no_new_dataset | 0.710007 |
2307.01212 | Darius Afchar | Darius Afchar, Romain Hennequin and Vincent Guigue | Of Spiky SVDs and Music Recommendation | Accepted for RecSys 2023 (Singapour, 18-22 September) | null | null | null | cs.IR cs.LG cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | The truncated singular value decomposition is a widely used methodology in
music recommendation for direct similar-item retrieval or embedding musical
items for downstream tasks. This paper investigates a curious effect that we
show naturally occurring on many recommendation datasets: spiking formations in
the embedding space. We first propose a metric to quantify this spiking
organization's strength, then mathematically prove its origin tied to
underlying communities of items of varying internal popularity. With this
new-found theoretical understanding, we finally open the topic with an
industrial use case of estimating how music embeddings' top-k similar items
will change over time under the addition of data.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 15:19:33 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Afchar",
"Darius",
""
],
[
"Hennequin",
"Romain",
""
],
[
"Guigue",
"Vincent",
""
]
] | TITLE: Of Spiky SVDs and Music Recommendation
ABSTRACT: The truncated singular value decomposition is a widely used methodology in
music recommendation for direct similar-item retrieval or embedding musical
items for downstream tasks. This paper investigates a curious effect that we
show naturally occurring on many recommendation datasets: spiking formations in
the embedding space. We first propose a metric to quantify this spiking
organization's strength, then mathematically prove its origin tied to
underlying communities of items of varying internal popularity. With this
new-found theoretical understanding, we finally open the topic with an
industrial use case of estimating how music embeddings' top-k similar items
will change over time under the addition of data.
| no_new_dataset | 0.710641 |
2307.01214 | Rui Song | Rui Song, Fausto Giunchiglia, Yingji Li, Hao Xu | Automatic Counterfactual Augmentation for Robust Text Classification
Based on Word-Group Search | 13 pages, 7 figures | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Despite large-scale pre-trained language models have achieved striking
results for text classificaion, recent work has raised concerns about the
challenge of shortcut learning. In general, a keyword is regarded as a shortcut
if it creates a superficial association with the label, resulting in a false
prediction. Conversely, shortcut learning can be mitigated if the model relies
on robust causal features that help produce sound predictions. To this end,
many studies have explored post-hoc interpretable methods to mine shortcuts and
causal features for robustness and generalization. However, most existing
methods focus only on single word in a sentence and lack consideration of
word-group, leading to wrong causal features. To solve this problem, we propose
a new Word-Group mining approach, which captures the causal effect of any
keyword combination and orders the combinations that most affect the
prediction. Our approach bases on effective post-hoc analysis and beam search,
which ensures the mining effect and reduces the complexity. Then, we build a
counterfactual augmentation method based on the multiple word-groups, and use
an adaptive voting mechanism to learn the influence of different augmentated
samples on the prediction results, so as to force the model to pay attention to
effective causal features. We demonstrate the effectiveness of the proposed
method by several tasks on 8 affective review datasets and 4 toxic language
datasets, including cross-domain text classificaion, text attack and gender
fairness test.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 02:26:34 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Song",
"Rui",
""
],
[
"Giunchiglia",
"Fausto",
""
],
[
"Li",
"Yingji",
""
],
[
"Xu",
"Hao",
""
]
] | TITLE: Automatic Counterfactual Augmentation for Robust Text Classification
Based on Word-Group Search
ABSTRACT: Despite large-scale pre-trained language models have achieved striking
results for text classificaion, recent work has raised concerns about the
challenge of shortcut learning. In general, a keyword is regarded as a shortcut
if it creates a superficial association with the label, resulting in a false
prediction. Conversely, shortcut learning can be mitigated if the model relies
on robust causal features that help produce sound predictions. To this end,
many studies have explored post-hoc interpretable methods to mine shortcuts and
causal features for robustness and generalization. However, most existing
methods focus only on single word in a sentence and lack consideration of
word-group, leading to wrong causal features. To solve this problem, we propose
a new Word-Group mining approach, which captures the causal effect of any
keyword combination and orders the combinations that most affect the
prediction. Our approach bases on effective post-hoc analysis and beam search,
which ensures the mining effect and reduces the complexity. Then, we build a
counterfactual augmentation method based on the multiple word-groups, and use
an adaptive voting mechanism to learn the influence of different augmentated
samples on the prediction results, so as to force the model to pay attention to
effective causal features. We demonstrate the effectiveness of the proposed
method by several tasks on 8 affective review datasets and 4 toxic language
datasets, including cross-domain text classificaion, text attack and gender
fairness test.
| no_new_dataset | 0.711418 |
2307.01216 | Yutian Sun | Yutian Sun and Hai Zhuge | Discovering Patterns of Definitions and Methods from Scientific
Documents | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The difficulties of automatic extraction of definitions and methods from
scientific documents lie in two aspects: (1) the complexity and diversity of
natural language texts, which requests an analysis method to support the
discovery of pattern; and, (2) a complete definition or method represented by a
scientific paper is usually distributed within text, therefore an effective
approach should not only extract single sentence definitions and methods but
also integrate the sentences to obtain a complete definition or method. This
paper proposes an analysis method for discovering patterns of definition and
method and uses the method to discover patterns of definition and method.
Completeness of the patterns at the semantic level is guaranteed by a complete
set of semantic relations that identify definitions and methods respectively.
The completeness of the patterns at the syntactic and lexical levels is
guaranteed by syntactic and lexical constraints. Experiments on the self-built
dataset and two public definition datasets show that the discovered patterns
are effective. The patterns can be used to extract definitions and methods from
scientific documents and can be tailored or extended to suit other
applications.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 05:08:44 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Sun",
"Yutian",
""
],
[
"Zhuge",
"Hai",
""
]
] | TITLE: Discovering Patterns of Definitions and Methods from Scientific
Documents
ABSTRACT: The difficulties of automatic extraction of definitions and methods from
scientific documents lie in two aspects: (1) the complexity and diversity of
natural language texts, which requests an analysis method to support the
discovery of pattern; and, (2) a complete definition or method represented by a
scientific paper is usually distributed within text, therefore an effective
approach should not only extract single sentence definitions and methods but
also integrate the sentences to obtain a complete definition or method. This
paper proposes an analysis method for discovering patterns of definition and
method and uses the method to discover patterns of definition and method.
Completeness of the patterns at the semantic level is guaranteed by a complete
set of semantic relations that identify definitions and methods respectively.
The completeness of the patterns at the syntactic and lexical levels is
guaranteed by syntactic and lexical constraints. Experiments on the self-built
dataset and two public definition datasets show that the discovered patterns
are effective. The patterns can be used to extract definitions and methods from
scientific documents and can be tailored or extended to suit other
applications.
| new_dataset | 0.7136 |
2307.01220 | Jiayu Huo | Jiayu Huo, Yang Liu, Xi Ouyang, Alejandro Granados, Sebastien
Ourselin, Rachel Sparks | ARHNet: Adaptive Region Harmonization for Lesion-aware Augmentation to
Improve Segmentation Performance | 9 pages, 4 figures, 3 tables | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | Accurately segmenting brain lesions in MRI scans is critical for providing
patients with prognoses and neurological monitoring. However, the performance
of CNN-based segmentation methods is constrained by the limited training set
size. Advanced data augmentation is an effective strategy to improve the
model's robustness. However, they often introduce intensity disparities between
foreground and background areas and boundary artifacts, which weakens the
effectiveness of such strategies. In this paper, we propose a foreground
harmonization framework (ARHNet) to tackle intensity disparities and make
synthetic images look more realistic. In particular, we propose an Adaptive
Region Harmonization (ARH) module to dynamically align foreground feature maps
to the background with an attention mechanism. We demonstrate the efficacy of
our method in improving the segmentation performance using real and synthetic
images. Experimental results on the ATLAS 2.0 dataset show that ARHNet
outperforms other methods for image harmonization tasks, and boosts the
down-stream segmentation performance. Our code is publicly available at
https://github.com/King-HAW/ARHNet.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 10:39:29 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Huo",
"Jiayu",
""
],
[
"Liu",
"Yang",
""
],
[
"Ouyang",
"Xi",
""
],
[
"Granados",
"Alejandro",
""
],
[
"Ourselin",
"Sebastien",
""
],
[
"Sparks",
"Rachel",
""
]
] | TITLE: ARHNet: Adaptive Region Harmonization for Lesion-aware Augmentation to
Improve Segmentation Performance
ABSTRACT: Accurately segmenting brain lesions in MRI scans is critical for providing
patients with prognoses and neurological monitoring. However, the performance
of CNN-based segmentation methods is constrained by the limited training set
size. Advanced data augmentation is an effective strategy to improve the
model's robustness. However, they often introduce intensity disparities between
foreground and background areas and boundary artifacts, which weakens the
effectiveness of such strategies. In this paper, we propose a foreground
harmonization framework (ARHNet) to tackle intensity disparities and make
synthetic images look more realistic. In particular, we propose an Adaptive
Region Harmonization (ARH) module to dynamically align foreground feature maps
to the background with an attention mechanism. We demonstrate the efficacy of
our method in improving the segmentation performance using real and synthetic
images. Experimental results on the ATLAS 2.0 dataset show that ARHNet
outperforms other methods for image harmonization tasks, and boosts the
down-stream segmentation performance. Our code is publicly available at
https://github.com/King-HAW/ARHNet.
| no_new_dataset | 0.710459 |
2307.01221 | Yassine Himeur | Qazi Mohammad Areeb, Mohammad Nadeem, Shahab Saquib Sohail, Raza Imam,
Faiyaz Doctor, Yassine Himeur, Amir Hussain and Abbes Amira | Filter Bubbles in Recommender Systems: Fact or Fallacy -- A Systematic
Review | 21 pages, 10 figures and 5 tables | null | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | A filter bubble refers to the phenomenon where Internet customization
effectively isolates individuals from diverse opinions or materials, resulting
in their exposure to only a select set of content. This can lead to the
reinforcement of existing attitudes, beliefs, or conditions. In this study, our
primary focus is to investigate the impact of filter bubbles in recommender
systems. This pioneering research aims to uncover the reasons behind this
problem, explore potential solutions, and propose an integrated tool to help
users avoid filter bubbles in recommender systems. To achieve this objective,
we conduct a systematic literature review on the topic of filter bubbles in
recommender systems. The reviewed articles are carefully analyzed and
classified, providing valuable insights that inform the development of an
integrated approach. Notably, our review reveals evidence of filter bubbles in
recommendation systems, highlighting several biases that contribute to their
existence. Moreover, we propose mechanisms to mitigate the impact of filter
bubbles and demonstrate that incorporating diversity into recommendations can
potentially help alleviate this issue. The findings of this timely review will
serve as a benchmark for researchers working in interdisciplinary fields such
as privacy, artificial intelligence ethics, and recommendation systems.
Furthermore, it will open new avenues for future research in related domains,
prompting further exploration and advancement in this critical area.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 13:41:42 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Areeb",
"Qazi Mohammad",
""
],
[
"Nadeem",
"Mohammad",
""
],
[
"Sohail",
"Shahab Saquib",
""
],
[
"Imam",
"Raza",
""
],
[
"Doctor",
"Faiyaz",
""
],
[
"Himeur",
"Yassine",
""
],
[
"Hussain",
"Amir",
""
],
[
"Amira",
"Abbes",
""
]
] | TITLE: Filter Bubbles in Recommender Systems: Fact or Fallacy -- A Systematic
Review
ABSTRACT: A filter bubble refers to the phenomenon where Internet customization
effectively isolates individuals from diverse opinions or materials, resulting
in their exposure to only a select set of content. This can lead to the
reinforcement of existing attitudes, beliefs, or conditions. In this study, our
primary focus is to investigate the impact of filter bubbles in recommender
systems. This pioneering research aims to uncover the reasons behind this
problem, explore potential solutions, and propose an integrated tool to help
users avoid filter bubbles in recommender systems. To achieve this objective,
we conduct a systematic literature review on the topic of filter bubbles in
recommender systems. The reviewed articles are carefully analyzed and
classified, providing valuable insights that inform the development of an
integrated approach. Notably, our review reveals evidence of filter bubbles in
recommendation systems, highlighting several biases that contribute to their
existence. Moreover, we propose mechanisms to mitigate the impact of filter
bubbles and demonstrate that incorporating diversity into recommendations can
potentially help alleviate this issue. The findings of this timely review will
serve as a benchmark for researchers working in interdisciplinary fields such
as privacy, artificial intelligence ethics, and recommendation systems.
Furthermore, it will open new avenues for future research in related domains,
prompting further exploration and advancement in this critical area.
| no_new_dataset | 0.711443 |
2307.01232 | Adnan Qayyum | Adnan Qayyum, Hassan Ali, Massimo Caputo, Hunaid Vohra, Taofeek
Akinosho, Sofiat Abioye, Ilhem Berrou, Pawe{\l} Capik, Junaid Qadir, and
Muhammad Bilal | Robust Surgical Tools Detection in Endoscopic Videos with Noisy Data | null | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Over the past few years, surgical data science has attracted substantial
interest from the machine learning (ML) community. Various studies have
demonstrated the efficacy of emerging ML techniques in analysing surgical data,
particularly recordings of procedures, for digitizing clinical and non-clinical
functions like preoperative planning, context-aware decision-making, and
operating skill assessment. However, this field is still in its infancy and
lacks representative, well-annotated datasets for training robust models in
intermediate ML tasks. Also, existing datasets suffer from inaccurate labels,
hindering the development of reliable models. In this paper, we propose a
systematic methodology for developing robust models for surgical tool detection
using noisy data. Our methodology introduces two key innovations: (1) an
intelligent active learning strategy for minimal dataset identification and
label correction by human experts; and (2) an assembling strategy for a
student-teacher model-based self-training framework to achieve the robust
classification of 14 surgical tools in a semi-supervised fashion. Furthermore,
we employ weighted data loaders to handle difficult class labels and address
class imbalance issues. The proposed methodology achieves an average F1-score
of 85.88\% for the ensemble model-based self-training with class weights, and
80.88\% without class weights for noisy labels. Also, our proposed method
significantly outperforms existing approaches, which effectively demonstrates
its effectiveness.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 08:12:56 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Qayyum",
"Adnan",
""
],
[
"Ali",
"Hassan",
""
],
[
"Caputo",
"Massimo",
""
],
[
"Vohra",
"Hunaid",
""
],
[
"Akinosho",
"Taofeek",
""
],
[
"Abioye",
"Sofiat",
""
],
[
"Berrou",
"Ilhem",
""
],
[
"Capik",
"Paweł",
""
],
[
"Qadir",
"Junaid",
""
],
[
"Bilal",
"Muhammad",
""
]
] | TITLE: Robust Surgical Tools Detection in Endoscopic Videos with Noisy Data
ABSTRACT: Over the past few years, surgical data science has attracted substantial
interest from the machine learning (ML) community. Various studies have
demonstrated the efficacy of emerging ML techniques in analysing surgical data,
particularly recordings of procedures, for digitizing clinical and non-clinical
functions like preoperative planning, context-aware decision-making, and
operating skill assessment. However, this field is still in its infancy and
lacks representative, well-annotated datasets for training robust models in
intermediate ML tasks. Also, existing datasets suffer from inaccurate labels,
hindering the development of reliable models. In this paper, we propose a
systematic methodology for developing robust models for surgical tool detection
using noisy data. Our methodology introduces two key innovations: (1) an
intelligent active learning strategy for minimal dataset identification and
label correction by human experts; and (2) an assembling strategy for a
student-teacher model-based self-training framework to achieve the robust
classification of 14 surgical tools in a semi-supervised fashion. Furthermore,
we employ weighted data loaders to handle difficult class labels and address
class imbalance issues. The proposed methodology achieves an average F1-score
of 85.88\% for the ensemble model-based self-training with class weights, and
80.88\% without class weights for noisy labels. Also, our proposed method
significantly outperforms existing approaches, which effectively demonstrates
its effectiveness.
| no_new_dataset | 0.709787 |
2307.01233 | Neha Sahipjohn | Neha Sahipjohn, Neil Shah, Vishal Tambrahalli, Vineet Gandhi | RobustL2S: Speaker-Specific Lip-to-Speech Synthesis exploiting
Self-Supervised Representations | null | null | null | null | cs.SD cs.LG eess.AS | http://creativecommons.org/licenses/by/4.0/ | Significant progress has been made in speaker dependent Lip-to-Speech
synthesis, which aims to generate speech from silent videos of talking faces.
Current state-of-the-art approaches primarily employ non-autoregressive
sequence-to-sequence architectures to directly predict mel-spectrograms or
audio waveforms from lip representations. We hypothesize that the direct
mel-prediction hampers training/model efficiency due to the entanglement of
speech content with ambient information and speaker characteristics. To this
end, we propose RobustL2S, a modularized framework for Lip-to-Speech synthesis.
First, a non-autoregressive sequence-to-sequence model maps self-supervised
visual features to a representation of disentangled speech content. A vocoder
then converts the speech features into raw waveforms. Extensive evaluations
confirm the effectiveness of our setup, achieving state-of-the-art performance
on the unconstrained Lip2Wav dataset and the constrained GRID and TCD-TIMIT
datasets. Speech samples from RobustL2S can be found at
https://neha-sherin.github.io/RobustL2S/
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 09:13:57 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Sahipjohn",
"Neha",
""
],
[
"Shah",
"Neil",
""
],
[
"Tambrahalli",
"Vishal",
""
],
[
"Gandhi",
"Vineet",
""
]
] | TITLE: RobustL2S: Speaker-Specific Lip-to-Speech Synthesis exploiting
Self-Supervised Representations
ABSTRACT: Significant progress has been made in speaker dependent Lip-to-Speech
synthesis, which aims to generate speech from silent videos of talking faces.
Current state-of-the-art approaches primarily employ non-autoregressive
sequence-to-sequence architectures to directly predict mel-spectrograms or
audio waveforms from lip representations. We hypothesize that the direct
mel-prediction hampers training/model efficiency due to the entanglement of
speech content with ambient information and speaker characteristics. To this
end, we propose RobustL2S, a modularized framework for Lip-to-Speech synthesis.
First, a non-autoregressive sequence-to-sequence model maps self-supervised
visual features to a representation of disentangled speech content. A vocoder
then converts the speech features into raw waveforms. Extensive evaluations
confirm the effectiveness of our setup, achieving state-of-the-art performance
on the unconstrained Lip2Wav dataset and the constrained GRID and TCD-TIMIT
datasets. Speech samples from RobustL2S can be found at
https://neha-sherin.github.io/RobustL2S/
| no_new_dataset | 0.709435 |
2307.01237 | Ziqiang Li | Ziqiang Li, Kantaro Fujiwara, Gouhei Tanaka | Dynamical Graph Echo State Networks with Snapshot Merging for
Dissemination Process Classification | null | null | null | null | cs.LG cs.SI | http://creativecommons.org/licenses/by/4.0/ | The Dissemination Process Classification (DPC) is a popular application of
temporal graph classification. The aim of DPC is to classify different
spreading patterns of information or pestilence within a community represented
by discrete-time temporal graphs. Recently, a reservoir computing-based model
named Dynamical Graph Echo State Network (DynGESN) has been proposed for
processing temporal graphs with relatively high effectiveness and low
computational costs. In this study, we propose a novel model which combines a
novel data augmentation strategy called snapshot merging with the DynGESN for
dealing with DPC tasks. In our model, the snapshot merging strategy is designed
for forming new snapshots by merging neighboring snapshots over time, and then
multiple reservoir encoders are set for capturing spatiotemporal features from
merged snapshots. After those, the logistic regression is adopted for decoding
the sum-pooled embeddings into the classification results. Experimental results
on six benchmark DPC datasets show that our proposed model has better
classification performances than the DynGESN and several kernel-based models.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 12:17:28 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Li",
"Ziqiang",
""
],
[
"Fujiwara",
"Kantaro",
""
],
[
"Tanaka",
"Gouhei",
""
]
] | TITLE: Dynamical Graph Echo State Networks with Snapshot Merging for
Dissemination Process Classification
ABSTRACT: The Dissemination Process Classification (DPC) is a popular application of
temporal graph classification. The aim of DPC is to classify different
spreading patterns of information or pestilence within a community represented
by discrete-time temporal graphs. Recently, a reservoir computing-based model
named Dynamical Graph Echo State Network (DynGESN) has been proposed for
processing temporal graphs with relatively high effectiveness and low
computational costs. In this study, we propose a novel model which combines a
novel data augmentation strategy called snapshot merging with the DynGESN for
dealing with DPC tasks. In our model, the snapshot merging strategy is designed
for forming new snapshots by merging neighboring snapshots over time, and then
multiple reservoir encoders are set for capturing spatiotemporal features from
merged snapshots. After those, the logistic regression is adopted for decoding
the sum-pooled embeddings into the classification results. Experimental results
on six benchmark DPC datasets show that our proposed model has better
classification performances than the DynGESN and several kernel-based models.
| no_new_dataset | 0.710804 |
2307.01238 | Daniel Parra | Daniel Parra, David Joedicke, J. Manuel Velasco, Gabriel Kronberger,
J. Ignacio Hidalgo | Learning Difference Equations with Structured Grammatical Evolution for
Postprandial Glycaemia Prediction | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | People with diabetes must carefully monitor their blood glucose levels,
especially after eating. Blood glucose regulation requires a proper combination
of food intake and insulin boluses. Glucose prediction is vital to avoid
dangerous post-meal complications in treating individuals with diabetes.
Although traditional methods, such as artificial neural networks, have shown
high accuracy rates, sometimes they are not suitable for developing
personalised treatments by physicians due to their lack of interpretability. In
this study, we propose a novel glucose prediction method emphasising
interpretability: Interpretable Sparse Identification by Grammatical Evolution.
Combined with a previous clustering stage, our approach provides finite
difference equations to predict postprandial glucose levels up to two hours
after meals. We divide the dataset into four-hour segments and perform
clustering based on blood glucose values for the twohour window before the
meal. Prediction models are trained for each cluster for the two-hour windows
after meals, allowing predictions in 15-minute steps, yielding up to eight
predictions at different time horizons. Prediction safety was evaluated based
on Parkes Error Grid regions. Our technique produces safe predictions through
explainable expressions, avoiding zones D (0.2% average) and E (0%) and
reducing predictions on zone C (6.2%). In addition, our proposal has slightly
better accuracy than other techniques, including sparse identification of
non-linear dynamics and artificial neural networks. The results demonstrate
that our proposal provides interpretable solutions without sacrificing
prediction accuracy, offering a promising approach to glucose prediction in
diabetes management that balances accuracy, interpretability, and computational
efficiency.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 12:22:04 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Parra",
"Daniel",
""
],
[
"Joedicke",
"David",
""
],
[
"Velasco",
"J. Manuel",
""
],
[
"Kronberger",
"Gabriel",
""
],
[
"Hidalgo",
"J. Ignacio",
""
]
] | TITLE: Learning Difference Equations with Structured Grammatical Evolution for
Postprandial Glycaemia Prediction
ABSTRACT: People with diabetes must carefully monitor their blood glucose levels,
especially after eating. Blood glucose regulation requires a proper combination
of food intake and insulin boluses. Glucose prediction is vital to avoid
dangerous post-meal complications in treating individuals with diabetes.
Although traditional methods, such as artificial neural networks, have shown
high accuracy rates, sometimes they are not suitable for developing
personalised treatments by physicians due to their lack of interpretability. In
this study, we propose a novel glucose prediction method emphasising
interpretability: Interpretable Sparse Identification by Grammatical Evolution.
Combined with a previous clustering stage, our approach provides finite
difference equations to predict postprandial glucose levels up to two hours
after meals. We divide the dataset into four-hour segments and perform
clustering based on blood glucose values for the twohour window before the
meal. Prediction models are trained for each cluster for the two-hour windows
after meals, allowing predictions in 15-minute steps, yielding up to eight
predictions at different time horizons. Prediction safety was evaluated based
on Parkes Error Grid regions. Our technique produces safe predictions through
explainable expressions, avoiding zones D (0.2% average) and E (0%) and
reducing predictions on zone C (6.2%). In addition, our proposal has slightly
better accuracy than other techniques, including sparse identification of
non-linear dynamics and artificial neural networks. The results demonstrate
that our proposal provides interpretable solutions without sacrificing
prediction accuracy, offering a promising approach to glucose prediction in
diabetes management that balances accuracy, interpretability, and computational
efficiency.
| no_new_dataset | 0.710176 |
2307.01288 | Antonio Jesus Banegas-Luna | Antonio Jesus Banegas-Luna, Carlos Mart{\i}nez-Cortes, Horacio
Perez-Sanchez | Fighting the disagreement in Explainable Machine Learning with consensus | 21 pages, 7 figures | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Machine learning (ML) models are often valued by the accuracy of their
predictions. However, in some areas of science, the inner workings of models
are as relevant as their accuracy. To understand how ML models work internally,
the use of interpretability algorithms is the preferred option. Unfortunately,
despite the diversity of algorithms available, they often disagree in
explaining a model, leading to contradictory explanations. To cope with this
issue, consensus functions can be applied once the models have been explained.
Nevertheless, the problem is not completely solved because the final result
will depend on the selected consensus function and other factors. In this
paper, six consensus functions have been evaluated for the explanation of five
ML models. The models were previously trained on four synthetic datasets whose
internal rules were known in advance. The models were then explained with
model-agnostic local and global interpretability algorithms. Finally, consensus
was calculated with six different functions, including one developed by the
authors. The results demonstrated that the proposed function is fairer than the
others and provides more consistent and accurate explanations.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 18:32:50 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Banegas-Luna",
"Antonio Jesus",
""
],
[
"Martınez-Cortes",
"Carlos",
""
],
[
"Perez-Sanchez",
"Horacio",
""
]
] | TITLE: Fighting the disagreement in Explainable Machine Learning with consensus
ABSTRACT: Machine learning (ML) models are often valued by the accuracy of their
predictions. However, in some areas of science, the inner workings of models
are as relevant as their accuracy. To understand how ML models work internally,
the use of interpretability algorithms is the preferred option. Unfortunately,
despite the diversity of algorithms available, they often disagree in
explaining a model, leading to contradictory explanations. To cope with this
issue, consensus functions can be applied once the models have been explained.
Nevertheless, the problem is not completely solved because the final result
will depend on the selected consensus function and other factors. In this
paper, six consensus functions have been evaluated for the explanation of five
ML models. The models were previously trained on four synthetic datasets whose
internal rules were known in advance. The models were then explained with
model-agnostic local and global interpretability algorithms. Finally, consensus
was calculated with six different functions, including one developed by the
authors. The results demonstrated that the proposed function is fairer than the
others and provides more consistent and accurate explanations.
| no_new_dataset | 0.711017 |
2307.01325 | Jonathan Becktor Mr | Jonathan Becktor, Frederik Scholler, Evangelos Boukas, and Lazaros
Nalpantidis | Robust Uncertainty Estimation for Classification of Maritime Objects | null | null | null | null | cs.LG cs.RO | http://creativecommons.org/licenses/by/4.0/ | We explore the use of uncertainty estimation in the maritime domain, showing
the efficacy on toy datasets (CIFAR10) and proving it on an in-house dataset,
SHIPS. We present a method joining the intra-class uncertainty achieved using
Monte Carlo Dropout, with recent discoveries in the field of outlier detection,
to gain more holistic uncertainty measures. We explore the relationship between
the introduced uncertainty measures and examine how well they work on CIFAR10
and in a real-life setting. Our work improves the FPR95 by 8% compared to the
current highest-performing work when the models are trained without
out-of-distribution data. We increase the performance by 77% compared to a
vanilla implementation of the Wide ResNet. We release the SHIPS dataset and
show the effectiveness of our method by improving the FPR95 by 44.2% with
respect to the baseline. Our approach is model agnostic, easy to implement, and
often does not require model retraining.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 19:54:53 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Becktor",
"Jonathan",
""
],
[
"Scholler",
"Frederik",
""
],
[
"Boukas",
"Evangelos",
""
],
[
"Nalpantidis",
"Lazaros",
""
]
] | TITLE: Robust Uncertainty Estimation for Classification of Maritime Objects
ABSTRACT: We explore the use of uncertainty estimation in the maritime domain, showing
the efficacy on toy datasets (CIFAR10) and proving it on an in-house dataset,
SHIPS. We present a method joining the intra-class uncertainty achieved using
Monte Carlo Dropout, with recent discoveries in the field of outlier detection,
to gain more holistic uncertainty measures. We explore the relationship between
the introduced uncertainty measures and examine how well they work on CIFAR10
and in a real-life setting. Our work improves the FPR95 by 8% compared to the
current highest-performing work when the models are trained without
out-of-distribution data. We increase the performance by 77% compared to a
vanilla implementation of the Wide ResNet. We release the SHIPS dataset and
show the effectiveness of our method by improving the FPR95 by 44.2% with
respect to the baseline. Our approach is model agnostic, easy to implement, and
often does not require model retraining.
| no_new_dataset | 0.704821 |
2307.01366 | Shuo Chen | Shuo Chen, Ning Yang, Meng Zhang, Jun Wang | Minimizing Age of Information for Mobile Edge Computing Systems: A
Nested Index Approach | null | null | null | null | cs.AI cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Exploiting the computational heterogeneity of mobile devices and edge nodes,
mobile edge computation (MEC) provides an efficient approach to achieving
real-time applications that are sensitive to information freshness, by
offloading tasks from mobile devices to edge nodes. We use the metric
Age-of-Information (AoI) to evaluate information freshness. An efficient
solution to minimize the AoI for the MEC system with multiple users is
non-trivial to obtain due to the random computing time. In this paper, we
consider multiple users offloading tasks to heterogeneous edge servers in a MEC
system. We first reformulate the problem as a Restless Multi-Arm-Bandit (RMAB)
problem and establish a hierarchical Markov Decision Process (MDP) to
characterize the updating of AoI for the MEC system. Based on the hierarchical
MDP, we propose a nested index framework and design a nested index policy with
provably asymptotic optimality. Finally, the closed form of the nested index is
obtained, which enables the performance tradeoffs between computation
complexity and accuracy. Our algorithm leads to an optimality gap reduction of
up to 40%, compared to benchmarks. Our algorithm asymptotically approximates
the lower bound as the system scalar gets large enough.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 21:47:21 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Chen",
"Shuo",
""
],
[
"Yang",
"Ning",
""
],
[
"Zhang",
"Meng",
""
],
[
"Wang",
"Jun",
""
]
] | TITLE: Minimizing Age of Information for Mobile Edge Computing Systems: A
Nested Index Approach
ABSTRACT: Exploiting the computational heterogeneity of mobile devices and edge nodes,
mobile edge computation (MEC) provides an efficient approach to achieving
real-time applications that are sensitive to information freshness, by
offloading tasks from mobile devices to edge nodes. We use the metric
Age-of-Information (AoI) to evaluate information freshness. An efficient
solution to minimize the AoI for the MEC system with multiple users is
non-trivial to obtain due to the random computing time. In this paper, we
consider multiple users offloading tasks to heterogeneous edge servers in a MEC
system. We first reformulate the problem as a Restless Multi-Arm-Bandit (RMAB)
problem and establish a hierarchical Markov Decision Process (MDP) to
characterize the updating of AoI for the MEC system. Based on the hierarchical
MDP, we propose a nested index framework and design a nested index policy with
provably asymptotic optimality. Finally, the closed form of the nested index is
obtained, which enables the performance tradeoffs between computation
complexity and accuracy. Our algorithm leads to an optimality gap reduction of
up to 40%, compared to benchmarks. Our algorithm asymptotically approximates
the lower bound as the system scalar gets large enough.
| no_new_dataset | 0.708603 |
2307.01377 | Lizhong Chen | Matthew Raffel, Drew Penney, Lizhong Chen | Shiftable Context: Addressing Training-Inference Context Mismatch in
Simultaneous Speech Translation | Accepted at ICML 2023 | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer models using segment-based processing have been an effective
architecture for simultaneous speech translation. However, such models create a
context mismatch between training and inference environments, hindering
potential translation accuracy. We solve this issue by proposing Shiftable
Context, a simple yet effective scheme to ensure that consistent segment and
context sizes are maintained throughout training and inference, even with the
presence of partially filled segments due to the streaming nature of
simultaneous translation. Shiftable Context is also broadly applicable to
segment-based transformers for streaming tasks. Our experiments on the
English-German, English-French, and English-Spanish language pairs from the
MUST-C dataset demonstrate that when applied to the Augmented Memory
Transformer, a state-of-the-art model for simultaneous speech translation, the
proposed scheme achieves an average increase of 2.09, 1.83, and 1.95 BLEU
scores across each wait-k value for the three language pairs, respectively,
with a minimal impact on computation-aware Average Lagging.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 22:11:51 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Raffel",
"Matthew",
""
],
[
"Penney",
"Drew",
""
],
[
"Chen",
"Lizhong",
""
]
] | TITLE: Shiftable Context: Addressing Training-Inference Context Mismatch in
Simultaneous Speech Translation
ABSTRACT: Transformer models using segment-based processing have been an effective
architecture for simultaneous speech translation. However, such models create a
context mismatch between training and inference environments, hindering
potential translation accuracy. We solve this issue by proposing Shiftable
Context, a simple yet effective scheme to ensure that consistent segment and
context sizes are maintained throughout training and inference, even with the
presence of partially filled segments due to the streaming nature of
simultaneous translation. Shiftable Context is also broadly applicable to
segment-based transformers for streaming tasks. Our experiments on the
English-German, English-French, and English-Spanish language pairs from the
MUST-C dataset demonstrate that when applied to the Augmented Memory
Transformer, a state-of-the-art model for simultaneous speech translation, the
proposed scheme achieves an average increase of 2.09, 1.83, and 1.95 BLEU
scores across each wait-k value for the three language pairs, respectively,
with a minimal impact on computation-aware Average Lagging.
| no_new_dataset | 0.708994 |
2307.01381 | Lizhong Chen | Matthew Raffel, Lizhong Chen | Implicit Memory Transformer for Computationally Efficient Simultaneous
Speech Translation | Accepted at Findings of ACL 2023 | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simultaneous speech translation is an essential communication task difficult
for humans whereby a translation is generated concurrently with oncoming speech
inputs. For such a streaming task, transformers using block processing to break
an input sequence into segments have achieved state-of-the-art performance at a
reduced cost. Current methods to allow information to propagate across
segments, including left context and memory banks, have faltered as they are
both insufficient representations and unnecessarily expensive to compute. In
this paper, we propose an Implicit Memory Transformer that implicitly retains
memory through a new left context method, removing the need to explicitly
represent memory with memory banks. We generate the left context from the
attention output of the previous segment and include it in the keys and values
of the current segment's attention calculation. Experiments on the MuST-C
dataset show that the Implicit Memory Transformer provides a substantial
speedup on the encoder forward pass with nearly identical translation quality
when compared with the state-of-the-art approach that employs both left context
and memory banks.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 22:20:21 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Raffel",
"Matthew",
""
],
[
"Chen",
"Lizhong",
""
]
] | TITLE: Implicit Memory Transformer for Computationally Efficient Simultaneous
Speech Translation
ABSTRACT: Simultaneous speech translation is an essential communication task difficult
for humans whereby a translation is generated concurrently with oncoming speech
inputs. For such a streaming task, transformers using block processing to break
an input sequence into segments have achieved state-of-the-art performance at a
reduced cost. Current methods to allow information to propagate across
segments, including left context and memory banks, have faltered as they are
both insufficient representations and unnecessarily expensive to compute. In
this paper, we propose an Implicit Memory Transformer that implicitly retains
memory through a new left context method, removing the need to explicitly
represent memory with memory banks. We generate the left context from the
attention output of the previous segment and include it in the keys and values
of the current segment's attention calculation. Experiments on the MuST-C
dataset show that the Implicit Memory Transformer provides a substantial
speedup on the encoder forward pass with nearly identical translation quality
when compared with the state-of-the-art approach that employs both left context
and memory banks.
| no_new_dataset | 0.7118 |
2307.01384 | Owen O'Neill | Owen O'Neill and Fintan Costello | Systematic Bias in Sample Inference and its Effect on Machine Learning | null | null | null | null | cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | A commonly observed pattern in machine learning models is an underprediction
of the target feature, with the model's predicted target rate for members of a
given category typically being lower than the actual target rate for members of
that category in the training set. This underprediction is usually larger for
members of minority groups; while income level is underpredicted for both men
and women in the 'adult' dataset, for example, the degree of underprediction is
significantly higher for women (a minority in that dataset). We propose that
this pattern of underprediction for minorities arises as a predictable
consequence of statistical inference on small samples. When presented with a
new individual for classification, an ML model performs inference not on the
entire training set, but on a subset that is in some way similar to the new
individual, with sizes of these subsets typically following a power law
distribution so that most are small (and with these subsets being necessarily
smaller for the minority group). We show that such inference on small samples
is subject to systematic and directional statistical bias, and that this bias
produces the observed patterns of underprediction seen in ML models. Analysing
a standard sklearn decision tree model's predictions on a set of over 70
subsets of the 'adult' and COMPAS datasets, we found that a bias prediction
measure based on small-sample inference had a significant positive correlations
(0.56 and 0.85) with the observed underprediction rate for these subsets.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 22:29:48 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"O'Neill",
"Owen",
""
],
[
"Costello",
"Fintan",
""
]
] | TITLE: Systematic Bias in Sample Inference and its Effect on Machine Learning
ABSTRACT: A commonly observed pattern in machine learning models is an underprediction
of the target feature, with the model's predicted target rate for members of a
given category typically being lower than the actual target rate for members of
that category in the training set. This underprediction is usually larger for
members of minority groups; while income level is underpredicted for both men
and women in the 'adult' dataset, for example, the degree of underprediction is
significantly higher for women (a minority in that dataset). We propose that
this pattern of underprediction for minorities arises as a predictable
consequence of statistical inference on small samples. When presented with a
new individual for classification, an ML model performs inference not on the
entire training set, but on a subset that is in some way similar to the new
individual, with sizes of these subsets typically following a power law
distribution so that most are small (and with these subsets being necessarily
smaller for the minority group). We show that such inference on small samples
is subject to systematic and directional statistical bias, and that this bias
produces the observed patterns of underprediction seen in ML models. Analysing
a standard sklearn decision tree model's predictions on a set of over 70
subsets of the 'adult' and COMPAS datasets, we found that a bias prediction
measure based on small-sample inference had a significant positive correlations
(0.56 and 0.85) with the observed underprediction rate for these subsets.
| no_new_dataset | 0.710791 |
2307.01386 | Yijiang Chen | Yijiang Chen, Chengdong Liang, and Xiao-Lei Zhang | Spatial-temporal Graph Based Multi-channel Speaker Verification With
Ad-hoc Microphone Arrays | null | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The performance of speaker verification degrades significantly in adverse
acoustic environments with strong reverberation and noise. To address this
issue, this paper proposes a spatial-temporal graph convolutional network (GCN)
method for the multi-channel speaker verification with ad-hoc microphone
arrays. It includes a feature aggregation block and a channel selection block,
both of which are built on graphs. The feature aggregation block fuses speaker
features among different time and channels by a spatial-temporal GCN. The
graph-based channel selection block discards the noisy channels that may
contribute negatively to the system. The proposed method is flexible in
incorporating various kinds of graphs and prior knowledge. We compared the
proposed method with six representative methods in both real-world and
simulated environments.
Experimental results show that the proposed method achieves a relative equal
error rate (EER) reduction of $\mathbf{15.39\%}$ lower than the strongest
referenced method in the simulated datasets, and $\mathbf{17.70\%}$ lower than
the latter in the real datasets. Moreover, its performance is robust across
different signal-to-noise ratios and reverberation time.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 22:49:25 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Chen",
"Yijiang",
""
],
[
"Liang",
"Chengdong",
""
],
[
"Zhang",
"Xiao-Lei",
""
]
] | TITLE: Spatial-temporal Graph Based Multi-channel Speaker Verification With
Ad-hoc Microphone Arrays
ABSTRACT: The performance of speaker verification degrades significantly in adverse
acoustic environments with strong reverberation and noise. To address this
issue, this paper proposes a spatial-temporal graph convolutional network (GCN)
method for the multi-channel speaker verification with ad-hoc microphone
arrays. It includes a feature aggregation block and a channel selection block,
both of which are built on graphs. The feature aggregation block fuses speaker
features among different time and channels by a spatial-temporal GCN. The
graph-based channel selection block discards the noisy channels that may
contribute negatively to the system. The proposed method is flexible in
incorporating various kinds of graphs and prior knowledge. We compared the
proposed method with six representative methods in both real-world and
simulated environments.
Experimental results show that the proposed method achieves a relative equal
error rate (EER) reduction of $\mathbf{15.39\%}$ lower than the strongest
referenced method in the simulated datasets, and $\mathbf{17.70\%}$ lower than
the latter in the real datasets. Moreover, its performance is robust across
different signal-to-noise ratios and reverberation time.
| no_new_dataset | 0.711036 |
2307.01401 | Shashank Shekhar | Amirhossein Farzam, Shashank Shekhar, Isaac Mehlhaff, Marco Morucci | Multi-Task Learning Improves Performance In Deep Argument Mining Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | The successful analysis of argumentative techniques from user-generated text
is central to many downstream tasks such as political and market analysis.
Recent argument mining tools use state-of-the-art deep learning methods to
extract and annotate argumentative techniques from various online text corpora,
however each task is treated as separate and different bespoke models are
fine-tuned for each dataset. We show that different argument mining tasks share
common semantic and logical structure by implementing a multi-task approach to
argument mining that achieves better performance than state-of-the-art methods
for the same problems. Our model builds a shared representation of the input
text that is common to all tasks and exploits similarities between tasks in
order to further boost performance via parameter-sharing. Our results are
important for argument mining as they show that different tasks share
substantial similarities and suggest a holistic approach to the extraction of
argumentative techniques from text.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 23:42:29 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Farzam",
"Amirhossein",
""
],
[
"Shekhar",
"Shashank",
""
],
[
"Mehlhaff",
"Isaac",
""
],
[
"Morucci",
"Marco",
""
]
] | TITLE: Multi-Task Learning Improves Performance In Deep Argument Mining Models
ABSTRACT: The successful analysis of argumentative techniques from user-generated text
is central to many downstream tasks such as political and market analysis.
Recent argument mining tools use state-of-the-art deep learning methods to
extract and annotate argumentative techniques from various online text corpora,
however each task is treated as separate and different bespoke models are
fine-tuned for each dataset. We show that different argument mining tasks share
common semantic and logical structure by implementing a multi-task approach to
argument mining that achieves better performance than state-of-the-art methods
for the same problems. Our model builds a shared representation of the input
text that is common to all tasks and exploits similarities between tasks in
order to further boost performance via parameter-sharing. Our results are
important for argument mining as they show that different tasks share
substantial similarities and suggest a holistic approach to the extraction of
argumentative techniques from text.
| no_new_dataset | 0.707992 |
2307.01421 | Yunhui Guo | Yunhui Guo, Youren Zhang, Yubei Chen, Stella X. Yu | Unsupervised Feature Learning with Emergent Data-Driven Prototypicality | 17 pages | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Given an image set without any labels, our goal is to train a model that maps
each image to a point in a feature space such that, not only proximity
indicates visual similarity, but where it is located directly encodes how
prototypical the image is according to the dataset.
Our key insight is to perform unsupervised feature learning in hyperbolic
instead of Euclidean space, where the distance between points still reflect
image similarity, and yet we gain additional capacity for representing
prototypicality with the location of the point: The closer it is to the origin,
the more prototypical it is. The latter property is simply emergent from
optimizing the usual metric learning objective: The image similar to many
training instances is best placed at the center of corresponding points in
Euclidean space, but closer to the origin in hyperbolic space.
We propose an unsupervised feature learning algorithm in Hyperbolic space
with sphere pACKing. HACK first generates uniformly packed particles in the
Poincar\'e ball of hyperbolic space and then assigns each image uniquely to
each particle. Images after congealing are regarded more typical of the dataset
it belongs to. With our feature mapper simply trained to spread out training
instances in hyperbolic space, we observe that images move closer to the origin
with congealing, validating our idea of unsupervised prototypicality discovery.
We demonstrate that our data-driven prototypicality provides an easy and
superior unsupervised instance selection to reduce sample complexity, increase
model generalization with atypical instances and robustness with typical ones.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 01:26:26 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Guo",
"Yunhui",
""
],
[
"Zhang",
"Youren",
""
],
[
"Chen",
"Yubei",
""
],
[
"Yu",
"Stella X.",
""
]
] | TITLE: Unsupervised Feature Learning with Emergent Data-Driven Prototypicality
ABSTRACT: Given an image set without any labels, our goal is to train a model that maps
each image to a point in a feature space such that, not only proximity
indicates visual similarity, but where it is located directly encodes how
prototypical the image is according to the dataset.
Our key insight is to perform unsupervised feature learning in hyperbolic
instead of Euclidean space, where the distance between points still reflect
image similarity, and yet we gain additional capacity for representing
prototypicality with the location of the point: The closer it is to the origin,
the more prototypical it is. The latter property is simply emergent from
optimizing the usual metric learning objective: The image similar to many
training instances is best placed at the center of corresponding points in
Euclidean space, but closer to the origin in hyperbolic space.
We propose an unsupervised feature learning algorithm in Hyperbolic space
with sphere pACKing. HACK first generates uniformly packed particles in the
Poincar\'e ball of hyperbolic space and then assigns each image uniquely to
each particle. Images after congealing are regarded more typical of the dataset
it belongs to. With our feature mapper simply trained to spread out training
instances in hyperbolic space, we observe that images move closer to the origin
with congealing, validating our idea of unsupervised prototypicality discovery.
We demonstrate that our data-driven prototypicality provides an easy and
superior unsupervised instance selection to reduce sample complexity, increase
model generalization with atypical instances and robustness with typical ones.
| no_new_dataset | 0.711425 |
2307.01425 | Zhen Zhu | Zhen Zhu, Yijun Li, Weijie Lyu, Krishna Kumar Singh, Zhixin Shu,
Soeren Pirk, Derek Hoiem | Consistent Multimodal Generation via A Unified GAN Framework | In review | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate how to generate multimodal image outputs, such as RGB, depth,
and surface normals, with a single generative model. The challenge is to
produce outputs that are realistic, and also consistent with each other. Our
solution builds on the StyleGAN3 architecture, with a shared backbone and
modality-specific branches in the last layers of the synthesis network, and we
propose per-modality fidelity discriminators and a cross-modality consistency
discriminator. In experiments on the Stanford2D3D dataset, we demonstrate
realistic and consistent generation of RGB, depth, and normal images. We also
show a training recipe to easily extend our pretrained model on a new domain,
even with a few pairwise data. We further evaluate the use of synthetically
generated RGB and depth pairs for training or fine-tuning depth estimators.
Code will be available at https://github.com/jessemelpolio/MultimodalGAN.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 01:33:20 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhu",
"Zhen",
""
],
[
"Li",
"Yijun",
""
],
[
"Lyu",
"Weijie",
""
],
[
"Singh",
"Krishna Kumar",
""
],
[
"Shu",
"Zhixin",
""
],
[
"Pirk",
"Soeren",
""
],
[
"Hoiem",
"Derek",
""
]
] | TITLE: Consistent Multimodal Generation via A Unified GAN Framework
ABSTRACT: We investigate how to generate multimodal image outputs, such as RGB, depth,
and surface normals, with a single generative model. The challenge is to
produce outputs that are realistic, and also consistent with each other. Our
solution builds on the StyleGAN3 architecture, with a shared backbone and
modality-specific branches in the last layers of the synthesis network, and we
propose per-modality fidelity discriminators and a cross-modality consistency
discriminator. In experiments on the Stanford2D3D dataset, we demonstrate
realistic and consistent generation of RGB, depth, and normal images. We also
show a training recipe to easily extend our pretrained model on a new domain,
even with a few pairwise data. We further evaluate the use of synthetically
generated RGB and depth pairs for training or fine-tuning depth estimators.
Code will be available at https://github.com/jessemelpolio/MultimodalGAN.
| no_new_dataset | 0.71081 |
2307.01434 | Kaiwen Li | Rui Wang, Zhiming Zhou, Tao Zhang, Ling Wang, Xin Xu, Xiangke Liao,
Kaiwen Li | Learning to Branch in Combinatorial Optimization with Graph Pointer
Networks | null | null | null | null | cs.LG cs.NE math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Branch-and-bound is a typical way to solve combinatorial optimization
problems. This paper proposes a graph pointer network model for learning the
variable selection policy in the branch-and-bound. We extract the graph
features, global features and historical features to represent the solver
state. The proposed model, which combines the graph neural network and the
pointer mechanism, can effectively map from the solver state to the branching
variable decisions. The model is trained to imitate the classic strong
branching expert rule by a designed top-k Kullback-Leibler divergence loss
function. Experiments on a series of benchmark problems demonstrate that the
proposed approach significantly outperforms the widely used expert-designed
branching rules. Our approach also outperforms the state-of-the-art
machine-learning-based branch-and-bound methods in terms of solving speed and
search tree size on all the test instances. In addition, the model can
generalize to unseen instances and scale to larger instances.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 01:56:07 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Wang",
"Rui",
""
],
[
"Zhou",
"Zhiming",
""
],
[
"Zhang",
"Tao",
""
],
[
"Wang",
"Ling",
""
],
[
"Xu",
"Xin",
""
],
[
"Liao",
"Xiangke",
""
],
[
"Li",
"Kaiwen",
""
]
] | TITLE: Learning to Branch in Combinatorial Optimization with Graph Pointer
Networks
ABSTRACT: Branch-and-bound is a typical way to solve combinatorial optimization
problems. This paper proposes a graph pointer network model for learning the
variable selection policy in the branch-and-bound. We extract the graph
features, global features and historical features to represent the solver
state. The proposed model, which combines the graph neural network and the
pointer mechanism, can effectively map from the solver state to the branching
variable decisions. The model is trained to imitate the classic strong
branching expert rule by a designed top-k Kullback-Leibler divergence loss
function. Experiments on a series of benchmark problems demonstrate that the
proposed approach significantly outperforms the widely used expert-designed
branching rules. Our approach also outperforms the state-of-the-art
machine-learning-based branch-and-bound methods in terms of solving speed and
search tree size on all the test instances. In addition, the model can
generalize to unseen instances and scale to larger instances.
| no_new_dataset | 0.710622 |
2307.01464 | Helen Carson | Helen Carson, Jason J. Ford, Michael Milford | Unsupervised Quality Prediction for Improved Single-Frame and Weighted
Sequential Visual Place Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While substantial progress has been made in the absolute performance of
localization and Visual Place Recognition (VPR) techniques, it is becoming
increasingly clear from translating these systems into applications that other
capabilities like integrity and predictability are just as important,
especially for safety- or operationally-critical autonomous systems. In this
research we present a new, training-free approach to predicting the likely
quality of localization estimates, and a novel method for using these
predictions to bias a sequence-matching process to produce additional
performance gains beyond that of a naive sequence matching approach. Our
combined system is lightweight, runs in real-time and is agnostic to the
underlying VPR technique. On extensive experiments across four datasets and
three VPR techniques, we demonstrate our system improves precision performance,
especially at the high-precision/low-recall operating point. We also present
ablation and analysis identifying the performance contributions of the
prediction and weighted sequence matching components in isolation, and the
relationship between the quality of the prediction system and the benefits of
the weighted sequential matcher.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 03:53:05 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Carson",
"Helen",
""
],
[
"Ford",
"Jason J.",
""
],
[
"Milford",
"Michael",
""
]
] | TITLE: Unsupervised Quality Prediction for Improved Single-Frame and Weighted
Sequential Visual Place Recognition
ABSTRACT: While substantial progress has been made in the absolute performance of
localization and Visual Place Recognition (VPR) techniques, it is becoming
increasingly clear from translating these systems into applications that other
capabilities like integrity and predictability are just as important,
especially for safety- or operationally-critical autonomous systems. In this
research we present a new, training-free approach to predicting the likely
quality of localization estimates, and a novel method for using these
predictions to bias a sequence-matching process to produce additional
performance gains beyond that of a naive sequence matching approach. Our
combined system is lightweight, runs in real-time and is agnostic to the
underlying VPR technique. On extensive experiments across four datasets and
three VPR techniques, we demonstrate our system improves precision performance,
especially at the high-precision/low-recall operating point. We also present
ablation and analysis identifying the performance contributions of the
prediction and weighted sequence matching components in isolation, and the
relationship between the quality of the prediction system and the benefits of
the weighted sequential matcher.
| no_new_dataset | 0.709837 |
2307.01486 | Jun Shi | Jun Shi, Hongyu Kan, Shulan Ruan, Ziqi Zhu, Minfan Zhao, Liang Qiao,
Zhaohui Wang, Hong An, Xudong Xue | H-DenseFormer: An Efficient Hybrid Densely Connected Transformer for
Multimodal Tumor Segmentation | 11 pages, 2 figures. This paper has been accepted by Medical Image
Computing and Computer-Assisted Intervention(MICCAI) 2023 | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, deep learning methods have been widely used for tumor segmentation
of multimodal medical images with promising results. However, most existing
methods are limited by insufficient representational ability, specific modality
number and high computational complexity. In this paper, we propose a hybrid
densely connected network for tumor segmentation, named H-DenseFormer, which
combines the representational power of the Convolutional Neural Network (CNN)
and the Transformer structures. Specifically, H-DenseFormer integrates a
Transformer-based Multi-path Parallel Embedding (MPE) module that can take an
arbitrary number of modalities as input to extract the fusion features from
different modalities. Then, the multimodal fusion features are delivered to
different levels of the encoder to enhance multimodal learning representation.
Besides, we design a lightweight Densely Connected Transformer (DCT) block to
replace the standard Transformer block, thus significantly reducing
computational complexity. We conduct extensive experiments on two public
multimodal datasets, HECKTOR21 and PI-CAI22. The experimental results show that
our proposed method outperforms the existing state-of-the-art methods while
having lower computational complexity. The source code is available at
https://github.com/shijun18/H-DenseFormer.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 05:31:09 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Shi",
"Jun",
""
],
[
"Kan",
"Hongyu",
""
],
[
"Ruan",
"Shulan",
""
],
[
"Zhu",
"Ziqi",
""
],
[
"Zhao",
"Minfan",
""
],
[
"Qiao",
"Liang",
""
],
[
"Wang",
"Zhaohui",
""
],
[
"An",
"Hong",
""
],
[
"Xue",
"Xudong",
""
]
] | TITLE: H-DenseFormer: An Efficient Hybrid Densely Connected Transformer for
Multimodal Tumor Segmentation
ABSTRACT: Recently, deep learning methods have been widely used for tumor segmentation
of multimodal medical images with promising results. However, most existing
methods are limited by insufficient representational ability, specific modality
number and high computational complexity. In this paper, we propose a hybrid
densely connected network for tumor segmentation, named H-DenseFormer, which
combines the representational power of the Convolutional Neural Network (CNN)
and the Transformer structures. Specifically, H-DenseFormer integrates a
Transformer-based Multi-path Parallel Embedding (MPE) module that can take an
arbitrary number of modalities as input to extract the fusion features from
different modalities. Then, the multimodal fusion features are delivered to
different levels of the encoder to enhance multimodal learning representation.
Besides, we design a lightweight Densely Connected Transformer (DCT) block to
replace the standard Transformer block, thus significantly reducing
computational complexity. We conduct extensive experiments on two public
multimodal datasets, HECKTOR21 and PI-CAI22. The experimental results show that
our proposed method outperforms the existing state-of-the-art methods while
having lower computational complexity. The source code is available at
https://github.com/shijun18/H-DenseFormer.
| no_new_dataset | 0.710226 |
2307.01488 | Junjie Wu | Junjie Wu, Dit-Yan Yeung | SCAT: Robust Self-supervised Contrastive Learning via Adversarial
Training for Text Classification | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite their promising performance across various natural language
processing (NLP) tasks, current NLP systems are vulnerable to textual
adversarial attacks. To defend against these attacks, most existing methods
apply adversarial training by incorporating adversarial examples. However,
these methods have to rely on ground-truth labels to generate adversarial
examples, rendering it impractical for large-scale model pre-training which is
commonly used nowadays for NLP and many other tasks. In this paper, we propose
a novel learning framework called SCAT (Self-supervised Contrastive Learning
via Adversarial Training), which can learn robust representations without
requiring labeled data. Specifically, SCAT modifies random augmentations of the
data in a fully labelfree manner to generate adversarial examples. Adversarial
training is achieved by minimizing the contrastive loss between the
augmentations and their adversarial counterparts. We evaluate SCAT on two text
classification datasets using two state-of-the-art attack schemes proposed
recently. Our results show that SCAT can not only train robust language models
from scratch, but it can also significantly improve the robustness of existing
pre-trained language models. Moreover, to demonstrate its flexibility, we show
that SCAT can also be combined with supervised adversarial training to further
enhance model robustness.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 05:41:31 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Wu",
"Junjie",
""
],
[
"Yeung",
"Dit-Yan",
""
]
] | TITLE: SCAT: Robust Self-supervised Contrastive Learning via Adversarial
Training for Text Classification
ABSTRACT: Despite their promising performance across various natural language
processing (NLP) tasks, current NLP systems are vulnerable to textual
adversarial attacks. To defend against these attacks, most existing methods
apply adversarial training by incorporating adversarial examples. However,
these methods have to rely on ground-truth labels to generate adversarial
examples, rendering it impractical for large-scale model pre-training which is
commonly used nowadays for NLP and many other tasks. In this paper, we propose
a novel learning framework called SCAT (Self-supervised Contrastive Learning
via Adversarial Training), which can learn robust representations without
requiring labeled data. Specifically, SCAT modifies random augmentations of the
data in a fully labelfree manner to generate adversarial examples. Adversarial
training is achieved by minimizing the contrastive loss between the
augmentations and their adversarial counterparts. We evaluate SCAT on two text
classification datasets using two state-of-the-art attack schemes proposed
recently. Our results show that SCAT can not only train robust language models
from scratch, but it can also significantly improve the robustness of existing
pre-trained language models. Moreover, to demonstrate its flexibility, we show
that SCAT can also be combined with supervised adversarial training to further
enhance model robustness.
| no_new_dataset | 0.709025 |
2307.01492 | Zhiding Yu | Zhiqi Li, Zhiding Yu, David Austin, Mingsheng Fang, Shiyi Lan, Jan
Kautz, Jose M. Alvarez | FB-OCC: 3D Occupancy Prediction based on Forward-Backward View
Transformation | Outstanding Champion and Innovation Award in the 3D Occupancy
Prediction Challenge (CVPR23) | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This technical report summarizes the winning solution for the 3D Occupancy
Prediction Challenge, which is held in conjunction with the CVPR 2023 Workshop
on End-to-End Autonomous Driving and CVPR 23 Workshop on Vision-Centric
Autonomous Driving Workshop. Our proposed solution FB-OCC builds upon FB-BEV, a
cutting-edge camera-based bird's-eye view perception design using
forward-backward projection. On top of FB-BEV, we further study novel designs
and optimization tailored to the 3D occupancy prediction task, including joint
depth-semantic pre-training, joint voxel-BEV representation, model scaling up,
and effective post-processing strategies. These designs and optimization result
in a state-of-the-art mIoU score of 54.19% on the nuScenes dataset, ranking the
1st place in the challenge track. Code and models will be released at:
https://github.com/NVlabs/FB-BEV.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 05:55:54 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Li",
"Zhiqi",
""
],
[
"Yu",
"Zhiding",
""
],
[
"Austin",
"David",
""
],
[
"Fang",
"Mingsheng",
""
],
[
"Lan",
"Shiyi",
""
],
[
"Kautz",
"Jan",
""
],
[
"Alvarez",
"Jose M.",
""
]
] | TITLE: FB-OCC: 3D Occupancy Prediction based on Forward-Backward View
Transformation
ABSTRACT: This technical report summarizes the winning solution for the 3D Occupancy
Prediction Challenge, which is held in conjunction with the CVPR 2023 Workshop
on End-to-End Autonomous Driving and CVPR 23 Workshop on Vision-Centric
Autonomous Driving Workshop. Our proposed solution FB-OCC builds upon FB-BEV, a
cutting-edge camera-based bird's-eye view perception design using
forward-backward projection. On top of FB-BEV, we further study novel designs
and optimization tailored to the 3D occupancy prediction task, including joint
depth-semantic pre-training, joint voxel-BEV representation, model scaling up,
and effective post-processing strategies. These designs and optimization result
in a state-of-the-art mIoU score of 54.19% on the nuScenes dataset, ranking the
1st place in the challenge track. Code and models will be released at:
https://github.com/NVlabs/FB-BEV.
| no_new_dataset | 0.710879 |
2307.01503 | Aniket Vashishtha | Aniket Vashishtha, Kabir Ahuja, Sunayana Sitaram | On Evaluating and Mitigating Gender Biases in Multilingual Settings | Accepted in ACL 2023 Findings | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | While understanding and removing gender biases in language models has been a
long-standing problem in Natural Language Processing, prior research work has
primarily been limited to English. In this work, we investigate some of the
challenges with evaluating and mitigating biases in multilingual settings which
stem from a lack of existing benchmarks and resources for bias evaluation
beyond English especially for non-western context. In this paper, we first
create a benchmark for evaluating gender biases in pre-trained masked language
models by extending DisCo to different Indian languages using human
annotations. We extend various debiasing methods to work beyond English and
evaluate their effectiveness for SOTA massively multilingual models on our
proposed metric. Overall, our work highlights the challenges that arise while
studying social biases in multilingual settings and provides resources as well
as mitigation techniques to take a step toward scaling to more languages.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 06:23:04 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Vashishtha",
"Aniket",
""
],
[
"Ahuja",
"Kabir",
""
],
[
"Sitaram",
"Sunayana",
""
]
] | TITLE: On Evaluating and Mitigating Gender Biases in Multilingual Settings
ABSTRACT: While understanding and removing gender biases in language models has been a
long-standing problem in Natural Language Processing, prior research work has
primarily been limited to English. In this work, we investigate some of the
challenges with evaluating and mitigating biases in multilingual settings which
stem from a lack of existing benchmarks and resources for bias evaluation
beyond English especially for non-western context. In this paper, we first
create a benchmark for evaluating gender biases in pre-trained masked language
models by extending DisCo to different Indian languages using human
annotations. We extend various debiasing methods to work beyond English and
evaluate their effectiveness for SOTA massively multilingual models on our
proposed metric. Overall, our work highlights the challenges that arise while
studying social biases in multilingual settings and provides resources as well
as mitigation techniques to take a step toward scaling to more languages.
| new_dataset | 0.637708 |
2307.01542 | Jian Guan | Jian Guan, Minlie Huang | Mitigating the Learning Bias towards Repetition by Self-Contrastive
Training for Open-Ended Generation | ACL 2023 Short Findings | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the huge progress in myriad generation tasks, pretrained language
models (LMs) such as GPT2 still tend to generate repetitive texts with
maximization-based decoding algorithms for open-ended generation. We attribute
their overestimation of token-level repetition probabilities to the learning
bias: LMs capture simple repetitive patterns faster with the MLE loss. We
propose self-contrastive training to penalize the output of a premature
checkpoint of the same model when it incorrectly predicts repetition, which is
shown to mitigate repetition effectively while maintaining fluency on two
datasets. Furthermore, we find that LMs use longer-range dependencies to
predict repetitive tokens than non-repetitive ones, which may be the cause of
sentence-level repetition loops.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 07:53:55 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Guan",
"Jian",
""
],
[
"Huang",
"Minlie",
""
]
] | TITLE: Mitigating the Learning Bias towards Repetition by Self-Contrastive
Training for Open-Ended Generation
ABSTRACT: Despite the huge progress in myriad generation tasks, pretrained language
models (LMs) such as GPT2 still tend to generate repetitive texts with
maximization-based decoding algorithms for open-ended generation. We attribute
their overestimation of token-level repetition probabilities to the learning
bias: LMs capture simple repetitive patterns faster with the MLE loss. We
propose self-contrastive training to penalize the output of a premature
checkpoint of the same model when it incorrectly predicts repetition, which is
shown to mitigate repetition effectively while maintaining fluency on two
datasets. Furthermore, we find that LMs use longer-range dependencies to
predict repetitive tokens than non-repetitive ones, which may be the cause of
sentence-level repetition loops.
| no_new_dataset | 0.711638 |
2307.01548 | Hussam Ghanem | Hussam Ghanem (ICB), Massinissa Atmani (ICB), Christophe Cruz (ICB) | Knowledge Graph for NLG in the context of conversational agents | null | French Regional Conference on Complex Systems (FRCCS 2023), May
2023, Le Havre, France | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of knowledge graphs (KGs) enhances the accuracy and comprehensiveness
of the responses provided by a conversational agent. While generating answers
during conversations consists in generating text from these KGs, it is still
regarded as a challenging task that has gained significant attention in recent
years. In this document, we provide a review of different architectures used
for knowledge graph-to-text generation including: Graph Neural Networks, the
Graph Transformer, and linearization with seq2seq models. We discuss the
advantages and limitations of each architecture and conclude that the choice of
architecture will depend on the specific requirements of the task at hand. We
also highlight the importance of considering constraints such as execution time
and model validity, particularly in the context of conversational agents. Based
on these constraints and the availability of labeled data for the domains of
DAVI, we choose to use seq2seq Transformer-based models (PLMs) for the
Knowledge Graph-to-Text Generation task. We aim to refine benchmark datasets of
kg-to-text generation on PLMs and to explore the emotional and multilingual
dimensions in our future work. Overall, this review provides insights into the
different approaches for knowledge graph-to-text generation and outlines future
directions for research in this area.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 08:03:33 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ghanem",
"Hussam",
"",
"ICB"
],
[
"Atmani",
"Massinissa",
"",
"ICB"
],
[
"Cruz",
"Christophe",
"",
"ICB"
]
] | TITLE: Knowledge Graph for NLG in the context of conversational agents
ABSTRACT: The use of knowledge graphs (KGs) enhances the accuracy and comprehensiveness
of the responses provided by a conversational agent. While generating answers
during conversations consists in generating text from these KGs, it is still
regarded as a challenging task that has gained significant attention in recent
years. In this document, we provide a review of different architectures used
for knowledge graph-to-text generation including: Graph Neural Networks, the
Graph Transformer, and linearization with seq2seq models. We discuss the
advantages and limitations of each architecture and conclude that the choice of
architecture will depend on the specific requirements of the task at hand. We
also highlight the importance of considering constraints such as execution time
and model validity, particularly in the context of conversational agents. Based
on these constraints and the availability of labeled data for the domains of
DAVI, we choose to use seq2seq Transformer-based models (PLMs) for the
Knowledge Graph-to-Text Generation task. We aim to refine benchmark datasets of
kg-to-text generation on PLMs and to explore the emotional and multilingual
dimensions in our future work. Overall, this review provides insights into the
different approaches for knowledge graph-to-text generation and outlines future
directions for research in this area.
| no_new_dataset | 0.709617 |
2307.01570 | Thien Van Luong Dr | Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, and Hung Tran | Machine Learning-Based Intrusion Detection: Feature Selection versus
Feature Extraction | null | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by/4.0/ | Internet of things (IoT) has been playing an important role in many sectors,
such as smart cities, smart agriculture, smart healthcare, and smart
manufacturing. However, IoT devices are highly vulnerable to cyber-attacks,
which may result in security breaches and data leakages. To effectively prevent
these attacks, a variety of machine learning-based network intrusion detection
methods for IoT networks have been developed, which often rely on either
feature extraction or feature selection techniques for reducing the dimension
of input data before being fed into machine learning models. This aims to make
the detection complexity low enough for real-time operations, which is
particularly vital in any intrusion detection systems. This paper provides a
comprehensive comparison between these two feature reduction methods of
intrusion detection in terms of various performance metrics, namely, precision
rate, recall rate, detection accuracy, as well as runtime complexity, in the
presence of the modern UNSW-NB15 dataset as well as both binary and multiclass
classification. For example, in general, the feature selection method not only
provides better detection performance but also lower training and inference
time compared to its feature extraction counterpart, especially when the number
of reduced features K increases. However, the feature extraction method is much
more reliable than its selection counterpart, particularly when K is very
small, such as K = 4. Additionally, feature extraction is less sensitive to
changing the number of reduced features K than feature selection, and this
holds true for both binary and multiclass classifications. Based on this
comparison, we provide a useful guideline for selecting a suitable intrusion
detection type for each specific scenario, as detailed in Tab. 14 at the end of
Section IV.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 08:48:01 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ngo",
"Vu-Duc",
""
],
[
"Vuong",
"Tuan-Cuong",
""
],
[
"Van Luong",
"Thien",
""
],
[
"Tran",
"Hung",
""
]
] | TITLE: Machine Learning-Based Intrusion Detection: Feature Selection versus
Feature Extraction
ABSTRACT: Internet of things (IoT) has been playing an important role in many sectors,
such as smart cities, smart agriculture, smart healthcare, and smart
manufacturing. However, IoT devices are highly vulnerable to cyber-attacks,
which may result in security breaches and data leakages. To effectively prevent
these attacks, a variety of machine learning-based network intrusion detection
methods for IoT networks have been developed, which often rely on either
feature extraction or feature selection techniques for reducing the dimension
of input data before being fed into machine learning models. This aims to make
the detection complexity low enough for real-time operations, which is
particularly vital in any intrusion detection systems. This paper provides a
comprehensive comparison between these two feature reduction methods of
intrusion detection in terms of various performance metrics, namely, precision
rate, recall rate, detection accuracy, as well as runtime complexity, in the
presence of the modern UNSW-NB15 dataset as well as both binary and multiclass
classification. For example, in general, the feature selection method not only
provides better detection performance but also lower training and inference
time compared to its feature extraction counterpart, especially when the number
of reduced features K increases. However, the feature extraction method is much
more reliable than its selection counterpart, particularly when K is very
small, such as K = 4. Additionally, feature extraction is less sensitive to
changing the number of reduced features K than feature selection, and this
holds true for both binary and multiclass classifications. Based on this
comparison, we provide a useful guideline for selecting a suitable intrusion
detection type for each specific scenario, as detailed in Tab. 14 at the end of
Section IV.
| no_new_dataset | 0.70939 |
2307.01578 | Franco Marchesoni | Franco Marchesoni-Acland, Jean-Michel Morel, Josselin Kherroubi,
Gabriele Facciolo | Optimal and Efficient Binary Questioning for Human-in-the-Loop
Annotation | 8 pages + references + appendix | null | null | null | cs.LG cs.AI cs.CV cs.HC cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | Even though data annotation is extremely important for interpretability,
research and development of artificial intelligence solutions, most research
efforts such as active learning or few-shot learning focus on the sample
efficiency problem. This paper studies the neglected complementary problem of
getting annotated data given a predictor. For the simple binary classification
setting, we present the spectrum ranging from optimal general solutions to
practical efficient methods. The problem is framed as the full annotation of a
binary classification dataset with the minimal number of yes/no questions when
a predictor is available. For the case of general binary questions the solution
is found in coding theory, where the optimal questioning strategy is given by
the Huffman encoding of the possible labelings. However, this approach is
computationally intractable even for small dataset sizes. We propose an
alternative practical solution based on several heuristics and lookahead
minimization of proxy cost functions. The proposed solution is analysed,
compared with optimal solutions and evaluated on several synthetic and
real-world datasets. On these datasets, the method allows a significant
improvement ($23-86\%$) in annotation efficiency.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:11:33 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Marchesoni-Acland",
"Franco",
""
],
[
"Morel",
"Jean-Michel",
""
],
[
"Kherroubi",
"Josselin",
""
],
[
"Facciolo",
"Gabriele",
""
]
] | TITLE: Optimal and Efficient Binary Questioning for Human-in-the-Loop
Annotation
ABSTRACT: Even though data annotation is extremely important for interpretability,
research and development of artificial intelligence solutions, most research
efforts such as active learning or few-shot learning focus on the sample
efficiency problem. This paper studies the neglected complementary problem of
getting annotated data given a predictor. For the simple binary classification
setting, we present the spectrum ranging from optimal general solutions to
practical efficient methods. The problem is framed as the full annotation of a
binary classification dataset with the minimal number of yes/no questions when
a predictor is available. For the case of general binary questions the solution
is found in coding theory, where the optimal questioning strategy is given by
the Huffman encoding of the possible labelings. However, this approach is
computationally intractable even for small dataset sizes. We propose an
alternative practical solution based on several heuristics and lookahead
minimization of proxy cost functions. The proposed solution is analysed,
compared with optimal solutions and evaluated on several synthetic and
real-world datasets. On these datasets, the method allows a significant
improvement ($23-86\%$) in annotation efficiency.
| no_new_dataset | 0.707411 |
2307.01582 | Franco Marchesoni | Franco Marchesoni-Acland, Gabriele Facciolo | IAdet: Simplest human-in-the-loop object detection | null | null | null | null | cs.CV cs.AI cs.HC cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | This work proposes a strategy for training models while annotating data named
Intelligent Annotation (IA). IA involves three modules: (1) assisted data
annotation, (2) background model training, and (3) active selection of the next
datapoints. Under this framework, we open-source the IAdet tool, which is
specific for single-class object detection. Additionally, we devise a method
for automatically evaluating such a human-in-the-loop system. For the PASCAL
VOC dataset, the IAdet tool reduces the database annotation time by $25\%$
while providing a trained model for free. These results are obtained for a
deliberately very simple IAdet design. As a consequence, IAdet is susceptible
to multiple easy improvements, paving the way for powerful human-in-the-loop
object detection systems.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:22:50 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Marchesoni-Acland",
"Franco",
""
],
[
"Facciolo",
"Gabriele",
""
]
] | TITLE: IAdet: Simplest human-in-the-loop object detection
ABSTRACT: This work proposes a strategy for training models while annotating data named
Intelligent Annotation (IA). IA involves three modules: (1) assisted data
annotation, (2) background model training, and (3) active selection of the next
datapoints. Under this framework, we open-source the IAdet tool, which is
specific for single-class object detection. Additionally, we devise a method
for automatically evaluating such a human-in-the-loop system. For the PASCAL
VOC dataset, the IAdet tool reduces the database annotation time by $25\%$
while providing a trained model for free. These results are obtained for a
deliberately very simple IAdet design. As a consequence, IAdet is susceptible
to multiple easy improvements, paving the way for powerful human-in-the-loop
object detection systems.
| no_new_dataset | 0.710998 |
2307.01583 | Victoria Klein | Alex Gabel, Victoria Klein, Riccardo Valperga, Jeroen S. W. Lamb,
Kevin Webster, Rick Quax, Efstratios Gavves | Learning Lie Group Symmetry Transformations with Neural Networks | 9 pages, 5 figures, Proceedings of the 2nd Annual Workshop on
Topology, Algebra, and Geometry in Machine Learning (TAG-ML) at the 40th
International Conference on Machine Learning, Honolulu, Hawaii, USA. 2023 | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | The problem of detecting and quantifying the presence of symmetries in
datasets is useful for model selection, generative modeling, and data analysis,
amongst others. While existing methods for hard-coding transformations in
neural networks require prior knowledge of the symmetries of the task at hand,
this work focuses on discovering and characterizing unknown symmetries present
in the dataset, namely, Lie group symmetry transformations beyond the
traditional ones usually considered in the field (rotation, scaling, and
translation). Specifically, we consider a scenario in which a dataset has been
transformed by a one-parameter subgroup of transformations with different
parameter values for each data point. Our goal is to characterize the
transformation group and the distribution of the parameter values. The results
showcase the effectiveness of the approach in both these settings.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:23:24 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Gabel",
"Alex",
""
],
[
"Klein",
"Victoria",
""
],
[
"Valperga",
"Riccardo",
""
],
[
"Lamb",
"Jeroen S. W.",
""
],
[
"Webster",
"Kevin",
""
],
[
"Quax",
"Rick",
""
],
[
"Gavves",
"Efstratios",
""
]
] | TITLE: Learning Lie Group Symmetry Transformations with Neural Networks
ABSTRACT: The problem of detecting and quantifying the presence of symmetries in
datasets is useful for model selection, generative modeling, and data analysis,
amongst others. While existing methods for hard-coding transformations in
neural networks require prior knowledge of the symmetries of the task at hand,
this work focuses on discovering and characterizing unknown symmetries present
in the dataset, namely, Lie group symmetry transformations beyond the
traditional ones usually considered in the field (rotation, scaling, and
translation). Specifically, we consider a scenario in which a dataset has been
transformed by a one-parameter subgroup of transformations with different
parameter values for each data point. Our goal is to characterize the
transformation group and the distribution of the parameter values. The results
showcase the effectiveness of the approach in both these settings.
| no_new_dataset | 0.710829 |
2307.01593 | Pengye Zhang | Wei Zhang, Ping Zhang, Jian Dong, Yongkang Wang, Pengye Zhang, Bo
Zhang, Xingxing Wang, Dong Wang | Cross-Element Combinatorial Selection for Multi-Element Creative in
Display Advertising | null | null | null | null | cs.IR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The effectiveness of ad creatives is greatly influenced by their visual
appearance. Advertising platforms can generate ad creatives with different
appearances by combining creative elements provided by advertisers. However,
with the increasing number of ad creative elements, it becomes challenging to
select a suitable combination from the countless possibilities. The industry's
mainstream approach is to select individual creative elements independently,
which often overlooks the importance of interaction between creative elements
during the modeling process. In response, this paper proposes a Cross-Element
Combinatorial Selection framework for multiple creative elements, termed CECS.
In the encoder process, a cross-element interaction is adopted to dynamically
adjust the expression of a single creative element based on the current
candidate creatives. In the decoder process, the creative combination problem
is transformed into a cascade selection problem of multiple creative elements.
A pointer mechanism with a cascade design is used to model the associations
among candidates. Comprehensive experiments on real-world datasets show that
CECS achieved the SOTA score on offline metrics. Moreover, the CECS algorithm
has been deployed in our industrial application, resulting in a significant
6.02% CTR and 10.37% GMV lift, which is beneficial to the business.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:32:39 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhang",
"Wei",
""
],
[
"Zhang",
"Ping",
""
],
[
"Dong",
"Jian",
""
],
[
"Wang",
"Yongkang",
""
],
[
"Zhang",
"Pengye",
""
],
[
"Zhang",
"Bo",
""
],
[
"Wang",
"Xingxing",
""
],
[
"Wang",
"Dong",
""
]
] | TITLE: Cross-Element Combinatorial Selection for Multi-Element Creative in
Display Advertising
ABSTRACT: The effectiveness of ad creatives is greatly influenced by their visual
appearance. Advertising platforms can generate ad creatives with different
appearances by combining creative elements provided by advertisers. However,
with the increasing number of ad creative elements, it becomes challenging to
select a suitable combination from the countless possibilities. The industry's
mainstream approach is to select individual creative elements independently,
which often overlooks the importance of interaction between creative elements
during the modeling process. In response, this paper proposes a Cross-Element
Combinatorial Selection framework for multiple creative elements, termed CECS.
In the encoder process, a cross-element interaction is adopted to dynamically
adjust the expression of a single creative element based on the current
candidate creatives. In the decoder process, the creative combination problem
is transformed into a cascade selection problem of multiple creative elements.
A pointer mechanism with a cascade design is used to model the associations
among candidates. Comprehensive experiments on real-world datasets show that
CECS achieved the SOTA score on offline metrics. Moreover, the CECS algorithm
has been deployed in our industrial application, resulting in a significant
6.02% CTR and 10.37% GMV lift, which is beneficial to the business.
| no_new_dataset | 0.710998 |
2307.01595 | Yingji Li | Yingji Li, Mengnan Du, Xin Wang, Ying Wang | Prompt Tuning Pushes Farther, Contrastive Learning Pulls Closer: A
Two-Stage Approach to Mitigate Social Biases | has been accepted as ACL2023 main conference long paper | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the representation capability of Pre-trained Language Models (PLMs)
improve, there is growing concern that they will inherit social biases from
unprocessed corpora. Most previous debiasing techniques used Counterfactual
Data Augmentation (CDA) to balance the training corpus. However, CDA slightly
modifies the original corpus, limiting the representation distance between
different demographic groups to a narrow range. As a result, the debiasing
model easily fits the differences between counterfactual pairs, which affects
its debiasing performance with limited text resources. In this paper, we
propose an adversarial training-inspired two-stage debiasing model using
Contrastive learning with Continuous Prompt Augmentation (named CCPA) to
mitigate social biases in PLMs' encoding. In the first stage, we propose a data
augmentation method based on continuous prompt tuning to push farther the
representation distance between sample pairs along different demographic
groups. In the second stage, we utilize contrastive learning to pull closer the
representation distance between the augmented sample pairs and then fine-tune
PLMs' parameters to get debiased encoding. Our approach guides the model to
achieve stronger debiasing performance by adding difficulty to the training
process. Extensive experiments show that CCPA outperforms baselines in terms of
debiasing performance. Meanwhile, experimental results on the GLUE benchmark
show that CCPA retains the language modeling capability of PLMs.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:35:03 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Li",
"Yingji",
""
],
[
"Du",
"Mengnan",
""
],
[
"Wang",
"Xin",
""
],
[
"Wang",
"Ying",
""
]
] | TITLE: Prompt Tuning Pushes Farther, Contrastive Learning Pulls Closer: A
Two-Stage Approach to Mitigate Social Biases
ABSTRACT: As the representation capability of Pre-trained Language Models (PLMs)
improve, there is growing concern that they will inherit social biases from
unprocessed corpora. Most previous debiasing techniques used Counterfactual
Data Augmentation (CDA) to balance the training corpus. However, CDA slightly
modifies the original corpus, limiting the representation distance between
different demographic groups to a narrow range. As a result, the debiasing
model easily fits the differences between counterfactual pairs, which affects
its debiasing performance with limited text resources. In this paper, we
propose an adversarial training-inspired two-stage debiasing model using
Contrastive learning with Continuous Prompt Augmentation (named CCPA) to
mitigate social biases in PLMs' encoding. In the first stage, we propose a data
augmentation method based on continuous prompt tuning to push farther the
representation distance between sample pairs along different demographic
groups. In the second stage, we utilize contrastive learning to pull closer the
representation distance between the augmented sample pairs and then fine-tune
PLMs' parameters to get debiased encoding. Our approach guides the model to
achieve stronger debiasing performance by adding difficulty to the training
process. Extensive experiments show that CCPA outperforms baselines in terms of
debiasing performance. Meanwhile, experimental results on the GLUE benchmark
show that CCPA retains the language modeling capability of PLMs.
| no_new_dataset | 0.710396 |
2307.01610 | Zitao Chen | Zitao Chen, Karthik Pattabiraman | Overconfidence is a Dangerous Thing: Mitigating Membership Inference
Attacks by Enforcing Less Confident Prediction | To appear at NDSS'24 | null | null | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Machine learning (ML) models are vulnerable to membership inference attacks
(MIAs), which determine whether a given input is used for training the target
model. While there have been many efforts to mitigate MIAs, they often suffer
from limited privacy protection, large accuracy drop, and/or requiring
additional data that may be difficult to acquire. This work proposes a defense
technique, HAMP that can achieve both strong membership privacy and high
accuracy, without requiring extra data. To mitigate MIAs in different forms, we
observe that they can be unified as they all exploit the ML model's
overconfidence in predicting training samples through different proxies. This
motivates our design to enforce less confident prediction by the model, hence
forcing the model to behave similarly on the training and testing samples. HAMP
consists of a novel training framework with high-entropy soft labels and an
entropy-based regularizer to constrain the model's prediction while still
achieving high accuracy. To further reduce privacy risk, HAMP uniformly
modifies all the prediction outputs to become low-confidence outputs while
preserving the accuracy, which effectively obscures the differences between the
prediction on members and non-members. We conduct extensive evaluation on five
benchmark datasets, and show that HAMP provides consistently high accuracy and
strong membership privacy. Our comparison with seven state-of-the-art defenses
shows that HAMP achieves a superior privacy-utility trade off than those
techniques.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 09:50:33 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Chen",
"Zitao",
""
],
[
"Pattabiraman",
"Karthik",
""
]
] | TITLE: Overconfidence is a Dangerous Thing: Mitigating Membership Inference
Attacks by Enforcing Less Confident Prediction
ABSTRACT: Machine learning (ML) models are vulnerable to membership inference attacks
(MIAs), which determine whether a given input is used for training the target
model. While there have been many efforts to mitigate MIAs, they often suffer
from limited privacy protection, large accuracy drop, and/or requiring
additional data that may be difficult to acquire. This work proposes a defense
technique, HAMP that can achieve both strong membership privacy and high
accuracy, without requiring extra data. To mitigate MIAs in different forms, we
observe that they can be unified as they all exploit the ML model's
overconfidence in predicting training samples through different proxies. This
motivates our design to enforce less confident prediction by the model, hence
forcing the model to behave similarly on the training and testing samples. HAMP
consists of a novel training framework with high-entropy soft labels and an
entropy-based regularizer to constrain the model's prediction while still
achieving high accuracy. To further reduce privacy risk, HAMP uniformly
modifies all the prediction outputs to become low-confidence outputs while
preserving the accuracy, which effectively obscures the differences between the
prediction on members and non-members. We conduct extensive evaluation on five
benchmark datasets, and show that HAMP provides consistently high accuracy and
strong membership privacy. Our comparison with seven state-of-the-art defenses
shows that HAMP achieves a superior privacy-utility trade off than those
techniques.
| no_new_dataset | 0.707582 |
2307.01630 | Anshul Gupta | Samy Tafasca, Anshul Gupta, Jean-Marc Odobez | ChildPlay: A New Benchmark for Understanding Children's Gaze Behaviour | First submitted for CVPR 2022. Current draft is in review | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaze behaviors such as eye-contact or shared attention are important markers
for diagnosing developmental disorders in children. While previous studies have
looked at some of these elements, the analysis is usually performed on private
datasets and is restricted to lab settings. Furthermore, all publicly available
gaze target prediction benchmarks mostly contain instances of adults, which
makes models trained on them less applicable to scenarios with young children.
In this paper, we propose the first study for predicting the gaze target of
children and interacting adults. To this end, we introduce the ChildPlay
dataset: a curated collection of short video clips featuring children playing
and interacting with adults in uncontrolled environments (e.g. kindergarten,
therapy centers, preschools etc.), which we annotate with rich gaze
information. We further propose a new model for gaze target prediction that is
geometrically grounded by explicitly identifying the scene parts in the 3D
field of view (3DFoV) of the person, leveraging recent geometry preserving
depth inference methods. Our model achieves state of the art results on
benchmark datasets and ChildPlay. Furthermore, results show that looking at
faces prediction performance on children is much worse than on adults, and can
be significantly improved by fine-tuning models using child gaze annotations.
Our dataset and models will be made publicly available.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 10:26:53 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Tafasca",
"Samy",
""
],
[
"Gupta",
"Anshul",
""
],
[
"Odobez",
"Jean-Marc",
""
]
] | TITLE: ChildPlay: A New Benchmark for Understanding Children's Gaze Behaviour
ABSTRACT: Gaze behaviors such as eye-contact or shared attention are important markers
for diagnosing developmental disorders in children. While previous studies have
looked at some of these elements, the analysis is usually performed on private
datasets and is restricted to lab settings. Furthermore, all publicly available
gaze target prediction benchmarks mostly contain instances of adults, which
makes models trained on them less applicable to scenarios with young children.
In this paper, we propose the first study for predicting the gaze target of
children and interacting adults. To this end, we introduce the ChildPlay
dataset: a curated collection of short video clips featuring children playing
and interacting with adults in uncontrolled environments (e.g. kindergarten,
therapy centers, preschools etc.), which we annotate with rich gaze
information. We further propose a new model for gaze target prediction that is
geometrically grounded by explicitly identifying the scene parts in the 3D
field of view (3DFoV) of the person, leveraging recent geometry preserving
depth inference methods. Our model achieves state of the art results on
benchmark datasets and ChildPlay. Furthermore, results show that looking at
faces prediction performance on children is much worse than on adults, and can
be significantly improved by fine-tuning models using child gaze annotations.
Our dataset and models will be made publicly available.
| new_dataset | 0.715859 |
2307.01637 | Dongsheng Luo | Dongsheng Luo, Yuchen Bian, Yaowei Yan, Xiong Yu, Jun Huan, Xiao Liu,
Xiang Zhang | Random Walk on Multiple Networks | Accepted to IEEE TKDE | null | null | null | cs.SI cs.AI cs.IR | http://creativecommons.org/licenses/by/4.0/ | Random Walk is a basic algorithm to explore the structure of networks, which
can be used in many tasks, such as local community detection and network
embedding. Existing random walk methods are based on single networks that
contain limited information. In contrast, real data often contain entities with
different types or/and from different sources, which are comprehensive and can
be better modeled by multiple networks. To take advantage of rich information
in multiple networks and make better inferences on entities, in this study, we
propose random walk on multiple networks, RWM. RWM is flexible and supports
both multiplex networks and general multiple networks, which may form
many-to-many node mappings between networks. RWM sends a random walker on each
network to obtain the local proximity (i.e., node visiting probabilities)
w.r.t. the starting nodes. Walkers with similar visiting probabilities
reinforce each other. We theoretically analyze the convergence properties of
RWM. Two approximation methods with theoretical performance guarantees are
proposed for efficient computation. We apply RWM in link prediction, network
embedding, and local community detection. Comprehensive experiments conducted
on both synthetic and real-world datasets demonstrate the effectiveness and
efficiency of RWM.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 10:45:11 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Luo",
"Dongsheng",
""
],
[
"Bian",
"Yuchen",
""
],
[
"Yan",
"Yaowei",
""
],
[
"Yu",
"Xiong",
""
],
[
"Huan",
"Jun",
""
],
[
"Liu",
"Xiao",
""
],
[
"Zhang",
"Xiang",
""
]
] | TITLE: Random Walk on Multiple Networks
ABSTRACT: Random Walk is a basic algorithm to explore the structure of networks, which
can be used in many tasks, such as local community detection and network
embedding. Existing random walk methods are based on single networks that
contain limited information. In contrast, real data often contain entities with
different types or/and from different sources, which are comprehensive and can
be better modeled by multiple networks. To take advantage of rich information
in multiple networks and make better inferences on entities, in this study, we
propose random walk on multiple networks, RWM. RWM is flexible and supports
both multiplex networks and general multiple networks, which may form
many-to-many node mappings between networks. RWM sends a random walker on each
network to obtain the local proximity (i.e., node visiting probabilities)
w.r.t. the starting nodes. Walkers with similar visiting probabilities
reinforce each other. We theoretically analyze the convergence properties of
RWM. Two approximation methods with theoretical performance guarantees are
proposed for efficient computation. We apply RWM in link prediction, network
embedding, and local community detection. Comprehensive experiments conducted
on both synthetic and real-world datasets demonstrate the effectiveness and
efficiency of RWM.
| no_new_dataset | 0.711212 |
2307.01640 | Dingjun Wu | Dingjun Wu, Jing Zhang, Xinmei Huang | Chain of Thought Prompting Elicits Knowledge Augmentation | Accepted by Findings of ACL 2023 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The knowledge-augmented deep learning paradigm refers to a paradigm in which
domain knowledge is identified and integrated into deep models. Conventional
methods typically employ task-specific approaches to gather external knowledge
from various sources. In contrast, large language models are extensively
pre-trained and can serve as a comprehensive source of external knowledge. In
this paper, we propose CoT-KA, a Chain-of-Thought-based method that augments
knowledge for deep learning. CoT-KA avoids the need for additional knowledge
retrieval or knowledge reasoning models, as required in conventional
augmentation methods. Our results demonstrate that CoT-KA outperforms both pure
CoT-based methods and the non-augmented method across the majority of eleven
publicly available benchmarks for various reasoning tasks.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 10:51:16 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Wu",
"Dingjun",
""
],
[
"Zhang",
"Jing",
""
],
[
"Huang",
"Xinmei",
""
]
] | TITLE: Chain of Thought Prompting Elicits Knowledge Augmentation
ABSTRACT: The knowledge-augmented deep learning paradigm refers to a paradigm in which
domain knowledge is identified and integrated into deep models. Conventional
methods typically employ task-specific approaches to gather external knowledge
from various sources. In contrast, large language models are extensively
pre-trained and can serve as a comprehensive source of external knowledge. In
this paper, we propose CoT-KA, a Chain-of-Thought-based method that augments
knowledge for deep learning. CoT-KA avoids the need for additional knowledge
retrieval or knowledge reasoning models, as required in conventional
augmentation methods. Our results demonstrate that CoT-KA outperforms both pure
CoT-based methods and the non-augmented method across the majority of eleven
publicly available benchmarks for various reasoning tasks.
| no_new_dataset | 0.708824 |
2307.01668 | Weijian Luo | Weijian Luo and Hao Jiang and Tianyang Hu and Jiacheng Sun and Zhenguo
Li and Zhihua Zhang | Training Energy-Based Models with Diffusion Contrastive Divergences | null | null | null | null | cs.LG cs.CV stat.ML | http://creativecommons.org/licenses/by/4.0/ | Energy-Based Models (EBMs) have been widely used for generative modeling.
Contrastive Divergence (CD), a prevailing training objective for EBMs, requires
sampling from the EBM with Markov Chain Monte Carlo methods (MCMCs), which
leads to an irreconcilable trade-off between the computational burden and the
validity of the CD. Running MCMCs till convergence is computationally
intensive. On the other hand, short-run MCMC brings in an extra non-negligible
parameter gradient term that is difficult to handle. In this paper, we provide
a general interpretation of CD, viewing it as a special instance of our
proposed Diffusion Contrastive Divergence (DCD) family. By replacing the
Langevin dynamic used in CD with other EBM-parameter-free diffusion processes,
we propose a more efficient divergence. We show that the proposed DCDs are both
more computationally efficient than the CD and are not limited to a
non-negligible gradient term. We conduct intensive experiments, including both
synthesis data modeling and high-dimensional image denoising and generation, to
show the advantages of the proposed DCDs. On the synthetic data learning and
image denoising experiments, our proposed DCD outperforms CD by a large margin.
In image generation experiments, the proposed DCD is capable of training an
energy-based model for generating the Celab-A $32\times 32$ dataset, which is
comparable to existing EBMs.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 12:00:06 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Luo",
"Weijian",
""
],
[
"Jiang",
"Hao",
""
],
[
"Hu",
"Tianyang",
""
],
[
"Sun",
"Jiacheng",
""
],
[
"Li",
"Zhenguo",
""
],
[
"Zhang",
"Zhihua",
""
]
] | TITLE: Training Energy-Based Models with Diffusion Contrastive Divergences
ABSTRACT: Energy-Based Models (EBMs) have been widely used for generative modeling.
Contrastive Divergence (CD), a prevailing training objective for EBMs, requires
sampling from the EBM with Markov Chain Monte Carlo methods (MCMCs), which
leads to an irreconcilable trade-off between the computational burden and the
validity of the CD. Running MCMCs till convergence is computationally
intensive. On the other hand, short-run MCMC brings in an extra non-negligible
parameter gradient term that is difficult to handle. In this paper, we provide
a general interpretation of CD, viewing it as a special instance of our
proposed Diffusion Contrastive Divergence (DCD) family. By replacing the
Langevin dynamic used in CD with other EBM-parameter-free diffusion processes,
we propose a more efficient divergence. We show that the proposed DCDs are both
more computationally efficient than the CD and are not limited to a
non-negligible gradient term. We conduct intensive experiments, including both
synthesis data modeling and high-dimensional image denoising and generation, to
show the advantages of the proposed DCDs. On the synthetic data learning and
image denoising experiments, our proposed DCD outperforms CD by a large margin.
In image generation experiments, the proposed DCD is capable of training an
energy-based model for generating the Celab-A $32\times 32$ dataset, which is
comparable to existing EBMs.
| no_new_dataset | 0.709648 |
2307.01672 | Javier De La Rosa | Javier de la Rosa, Rolv-Arild Braaten, Per Egil Kummervold, Freddy
Wetjen, Svein Arne Brygfjeld | Boosting Norwegian Automatic Speech Recognition | 10 pages, 10 figures. Published as Proceedings NoDaLiDa 2023, pages
555--564 | 2023. Boosting Norwegian Automatic Speech Recognition. In
Proceedings of the 24th Nordic Conference on Computational Linguistics
(NoDaLiDa), pages 555--564, T\'orshavn, Faroe Islands. University of Tartu
Library | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | In this paper, we present several baselines for automatic speech recognition
(ASR) models for the two official written languages in Norway: Bokm{\aa}l and
Nynorsk. We compare the performance of models of varying sizes and pre-training
approaches on multiple Norwegian speech datasets. Additionally, we measure the
performance of these models against previous state-of-the-art ASR models, as
well as on out-of-domain datasets. We improve the state of the art on the
Norwegian Parliamentary Speech Corpus (NPSC) from a word error rate (WER) of
17.10\% to 7.60\%, with models achieving 5.81\% for Bokm{\aa}l and 11.54\% for
Nynorsk. We also discuss the challenges and potential solutions for further
improving ASR models for Norwegian.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 12:05:15 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"de la Rosa",
"Javier",
""
],
[
"Braaten",
"Rolv-Arild",
""
],
[
"Kummervold",
"Per Egil",
""
],
[
"Wetjen",
"Freddy",
""
],
[
"Brygfjeld",
"Svein Arne",
""
]
] | TITLE: Boosting Norwegian Automatic Speech Recognition
ABSTRACT: In this paper, we present several baselines for automatic speech recognition
(ASR) models for the two official written languages in Norway: Bokm{\aa}l and
Nynorsk. We compare the performance of models of varying sizes and pre-training
approaches on multiple Norwegian speech datasets. Additionally, we measure the
performance of these models against previous state-of-the-art ASR models, as
well as on out-of-domain datasets. We improve the state of the art on the
Norwegian Parliamentary Speech Corpus (NPSC) from a word error rate (WER) of
17.10\% to 7.60\%, with models achieving 5.81\% for Bokm{\aa}l and 11.54\% for
Nynorsk. We also discuss the challenges and potential solutions for further
improving ASR models for Norwegian.
| no_new_dataset | 0.710879 |
2307.01676 | Hyeonchang Jeon | Hyeon-Chang Jeon, In-Chang Baek, Cheong-mok Bae, Taehwa Park, Wonsang
You, Taegwan Ha, Hoyun Jung, Jinha Noh, Seungwon Oh, Kyung-Joong Kim | RaidEnv: Exploring New Challenges in Automated Content Balancing for
Boss Raid Games | 14 pages, 6 figures, 6 tables, 2 algorithms | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | The balance of game content significantly impacts the gaming experience.
Unbalanced game content diminishes engagement or increases frustration because
of repetitive failure. Although game designers intend to adjust the difficulty
of game content, this is a repetitive, labor-intensive, and challenging
process, especially for commercial-level games with extensive content. To
address this issue, the game research community has explored automated game
balancing using artificial intelligence (AI) techniques. However, previous
studies have focused on limited game content and did not consider the
importance of the generalization ability of playtesting agents when
encountering content changes. In this study, we propose RaidEnv, a new game
simulator that includes diverse and customizable content for the boss raid
scenario in MMORPG games. Additionally, we design two benchmarks for the boss
raid scenario that can aid in the practical application of game AI. These
benchmarks address two open problems in automatic content balancing, and we
introduce two evaluation metrics to provide guidance for AI in automatic
content balancing. This novel game research platform expands the frontiers of
automatic game balancing problems and offers a framework within a realistic
game production pipeline.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 12:07:25 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Jeon",
"Hyeon-Chang",
""
],
[
"Baek",
"In-Chang",
""
],
[
"Bae",
"Cheong-mok",
""
],
[
"Park",
"Taehwa",
""
],
[
"You",
"Wonsang",
""
],
[
"Ha",
"Taegwan",
""
],
[
"Jung",
"Hoyun",
""
],
[
"Noh",
"Jinha",
""
],
[
"Oh",
"Seungwon",
""
],
[
"Kim",
"Kyung-Joong",
""
]
] | TITLE: RaidEnv: Exploring New Challenges in Automated Content Balancing for
Boss Raid Games
ABSTRACT: The balance of game content significantly impacts the gaming experience.
Unbalanced game content diminishes engagement or increases frustration because
of repetitive failure. Although game designers intend to adjust the difficulty
of game content, this is a repetitive, labor-intensive, and challenging
process, especially for commercial-level games with extensive content. To
address this issue, the game research community has explored automated game
balancing using artificial intelligence (AI) techniques. However, previous
studies have focused on limited game content and did not consider the
importance of the generalization ability of playtesting agents when
encountering content changes. In this study, we propose RaidEnv, a new game
simulator that includes diverse and customizable content for the boss raid
scenario in MMORPG games. Additionally, we design two benchmarks for the boss
raid scenario that can aid in the practical application of game AI. These
benchmarks address two open problems in automatic content balancing, and we
introduce two evaluation metrics to provide guidance for AI in automatic
content balancing. This novel game research platform expands the frontiers of
automatic game balancing problems and offers a framework within a realistic
game production pipeline.
| no_new_dataset | 0.702326 |
2307.01680 | Dimosthenis Antypas | Dimosthenis Antypas and Jose Camacho-Collados | Robust Hate Speech Detection in Social Media: A Cross-Dataset Empirical
Evaluation | Accepted in "Workshop on Online Abuse and Harms (WOAH)", 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | The automatic detection of hate speech online is an active research area in
NLP. Most of the studies to date are based on social media datasets that
contribute to the creation of hate speech detection models trained on them.
However, data creation processes contain their own biases, and models
inherently learn from these dataset-specific biases. In this paper, we perform
a large-scale cross-dataset comparison where we fine-tune language models on
different hate speech detection datasets. This analysis shows how some datasets
are more generalisable than others when used as training data. Crucially, our
experiments show how combining hate speech detection datasets can contribute to
the development of robust hate speech detection models. This robustness holds
even when controlling by data size and compared with the best individual
datasets.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 12:22:40 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Antypas",
"Dimosthenis",
""
],
[
"Camacho-Collados",
"Jose",
""
]
] | TITLE: Robust Hate Speech Detection in Social Media: A Cross-Dataset Empirical
Evaluation
ABSTRACT: The automatic detection of hate speech online is an active research area in
NLP. Most of the studies to date are based on social media datasets that
contribute to the creation of hate speech detection models trained on them.
However, data creation processes contain their own biases, and models
inherently learn from these dataset-specific biases. In this paper, we perform
a large-scale cross-dataset comparison where we fine-tune language models on
different hate speech detection datasets. This analysis shows how some datasets
are more generalisable than others when used as training data. Crucially, our
experiments show how combining hate speech detection datasets can contribute to
the development of robust hate speech detection models. This robustness holds
even when controlling by data size and compared with the best individual
datasets.
| no_new_dataset | 0.711243 |
2307.01704 | Peng Tang | Peng Tang, Yang Nan, Tobias Lasser | Graph-Ensemble Learning Model for Multi-label Skin Lesion Classification
using Dermoscopy and Clinical Images | Submitted to TNNLS in 1st July 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many skin lesion analysis (SLA) methods recently focused on developing a
multi-modal-based multi-label classification method due to two factors. The
first is multi-modal data, i.e., clinical and dermoscopy images, which can
provide complementary information to obtain more accurate results than
single-modal data. The second one is that multi-label classification, i.e.,
seven-point checklist (SPC) criteria as an auxiliary classification task can
not only boost the diagnostic accuracy of melanoma in the deep learning (DL)
pipeline but also provide more useful functions to the clinical doctor as it is
commonly used in clinical dermatologist's diagnosis. However, most methods only
focus on designing a better module for multi-modal data fusion; few methods
explore utilizing the label correlation between SPC and skin disease for
performance improvement. This study fills the gap that introduces a Graph
Convolution Network (GCN) to exploit prior co-occurrence between each category
as a correlation matrix into the DL model for the multi-label classification.
However, directly applying GCN degraded the performances in our experiments; we
attribute this to the weak generalization ability of GCN in the scenario of
insufficient statistical samples of medical data. We tackle this issue by
proposing a Graph-Ensemble Learning Model (GELN) that views the prediction from
GCN as complementary information of the predictions from the fusion model and
adaptively fuses them by a weighted averaging scheme, which can utilize the
valuable information from GCN while avoiding its negative influences as much as
possible. To evaluate our method, we conduct experiments on public datasets.
The results illustrate that our GELN can consistently improve the
classification performance on different datasets and that the proposed method
can achieve state-of-the-art performance in SPC and diagnosis classification.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 13:19:57 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Tang",
"Peng",
""
],
[
"Nan",
"Yang",
""
],
[
"Lasser",
"Tobias",
""
]
] | TITLE: Graph-Ensemble Learning Model for Multi-label Skin Lesion Classification
using Dermoscopy and Clinical Images
ABSTRACT: Many skin lesion analysis (SLA) methods recently focused on developing a
multi-modal-based multi-label classification method due to two factors. The
first is multi-modal data, i.e., clinical and dermoscopy images, which can
provide complementary information to obtain more accurate results than
single-modal data. The second one is that multi-label classification, i.e.,
seven-point checklist (SPC) criteria as an auxiliary classification task can
not only boost the diagnostic accuracy of melanoma in the deep learning (DL)
pipeline but also provide more useful functions to the clinical doctor as it is
commonly used in clinical dermatologist's diagnosis. However, most methods only
focus on designing a better module for multi-modal data fusion; few methods
explore utilizing the label correlation between SPC and skin disease for
performance improvement. This study fills the gap that introduces a Graph
Convolution Network (GCN) to exploit prior co-occurrence between each category
as a correlation matrix into the DL model for the multi-label classification.
However, directly applying GCN degraded the performances in our experiments; we
attribute this to the weak generalization ability of GCN in the scenario of
insufficient statistical samples of medical data. We tackle this issue by
proposing a Graph-Ensemble Learning Model (GELN) that views the prediction from
GCN as complementary information of the predictions from the fusion model and
adaptively fuses them by a weighted averaging scheme, which can utilize the
valuable information from GCN while avoiding its negative influences as much as
possible. To evaluate our method, we conduct experiments on public datasets.
The results illustrate that our GELN can consistently improve the
classification performance on different datasets and that the proposed method
can achieve state-of-the-art performance in SPC and diagnosis classification.
| no_new_dataset | 0.711857 |
2307.01709 | Chen Chen | Chen Chen, Yufei Wang, Aixin Sun, Bing Li and Kwok-Yan Lam | Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge
Graph Completion via Conditional Soft Prompting | Accepted by ACL 2023 Findings, Long Paper | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge Graph Completion (KGC) often requires both KG structural and
textual information to be effective. Pre-trained Language Models (PLMs) have
been used to learn the textual information, usually under the fine-tune
paradigm for the KGC task. However, the fine-tuned PLMs often overwhelmingly
focus on the textual information and overlook structural knowledge. To tackle
this issue, this paper proposes CSProm-KG (Conditional Soft Prompts for KGC)
which maintains a balance between structural information and textual knowledge.
CSProm-KG only tunes the parameters of Conditional Soft Prompts that are
generated by the entities and relations representations. We verify the
effectiveness of CSProm-KG on three popular static KGC benchmarks WN18RR,
FB15K-237 and Wikidata5M, and two temporal KGC benchmarks ICEWS14 and
ICEWS05-15. CSProm-KG outperforms competitive baseline models and sets new
state-of-the-art on these benchmarks. We conduct further analysis to show (i)
the effectiveness of our proposed components, (ii) the efficiency of CSProm-KG,
and (iii) the flexibility of CSProm-KG.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 13:24:04 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Chen",
"Chen",
""
],
[
"Wang",
"Yufei",
""
],
[
"Sun",
"Aixin",
""
],
[
"Li",
"Bing",
""
],
[
"Lam",
"Kwok-Yan",
""
]
] | TITLE: Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge
Graph Completion via Conditional Soft Prompting
ABSTRACT: Knowledge Graph Completion (KGC) often requires both KG structural and
textual information to be effective. Pre-trained Language Models (PLMs) have
been used to learn the textual information, usually under the fine-tune
paradigm for the KGC task. However, the fine-tuned PLMs often overwhelmingly
focus on the textual information and overlook structural knowledge. To tackle
this issue, this paper proposes CSProm-KG (Conditional Soft Prompts for KGC)
which maintains a balance between structural information and textual knowledge.
CSProm-KG only tunes the parameters of Conditional Soft Prompts that are
generated by the entities and relations representations. We verify the
effectiveness of CSProm-KG on three popular static KGC benchmarks WN18RR,
FB15K-237 and Wikidata5M, and two temporal KGC benchmarks ICEWS14 and
ICEWS05-15. CSProm-KG outperforms competitive baseline models and sets new
state-of-the-art on these benchmarks. We conduct further analysis to show (i)
the effectiveness of our proposed components, (ii) the efficiency of CSProm-KG,
and (iii) the flexibility of CSProm-KG.
| no_new_dataset | 0.708603 |
2307.01741 | Michael Mommert | Michael Mommert, Nicolas Kesseli, Jo\"elle Hanna, Linus Scheibenreif,
Damian Borth, Beg\"um Demir | Ben-ge: Extending BigEarthNet with Geographical and Environmental Data | Accepted for presentation at the IEEE International Geoscience and
Remote Sensing Symposium 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Deep learning methods have proven to be a powerful tool in the analysis of
large amounts of complex Earth observation data. However, while Earth
observation data are multi-modal in most cases, only single or few modalities
are typically considered. In this work, we present the ben-ge dataset, which
supplements the BigEarthNet-MM dataset by compiling freely and globally
available geographical and environmental data. Based on this dataset, we
showcase the value of combining different data modalities for the downstream
tasks of patch-based land-use/land-cover classification and land-use/land-cover
segmentation. ben-ge is freely available and expected to serve as a test bed
for fully supervised and self-supervised Earth observation applications.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 14:17:54 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Mommert",
"Michael",
""
],
[
"Kesseli",
"Nicolas",
""
],
[
"Hanna",
"Joëlle",
""
],
[
"Scheibenreif",
"Linus",
""
],
[
"Borth",
"Damian",
""
],
[
"Demir",
"Begüm",
""
]
] | TITLE: Ben-ge: Extending BigEarthNet with Geographical and Environmental Data
ABSTRACT: Deep learning methods have proven to be a powerful tool in the analysis of
large amounts of complex Earth observation data. However, while Earth
observation data are multi-modal in most cases, only single or few modalities
are typically considered. In this work, we present the ben-ge dataset, which
supplements the BigEarthNet-MM dataset by compiling freely and globally
available geographical and environmental data. Based on this dataset, we
showcase the value of combining different data modalities for the downstream
tasks of patch-based land-use/land-cover classification and land-use/land-cover
segmentation. ben-ge is freely available and expected to serve as a test bed
for fully supervised and self-supervised Earth observation applications.
| new_dataset | 0.715032 |
2307.01749 | Lisl Weynans | Geoffrey Beck, David Lannes, Lisl Weynans | A numerical method for wave-structure interactions in the Boussinesq
regime | null | null | null | null | math.NA cs.NA math.AP | http://creativecommons.org/licenses/by/4.0/ | The goal of this work is to study waves interacting with partially immersed
objects allowed to move freely in the vertical direction, and in a regime in
which the propagation of the waves is described by the one dimensional
Boussinesq-Abbott system. The problem can be reduced to a transmission problem
for this Boussinesq system, in which the transmission conditions between the
components of the domain at the left and at the right of the object are
determined through the resolution of coupled forced ODEs in time satisfied by
the vertical displacement of the object and the average discharge in the
portion of the fluid located under the object. We propose a new extended
formulation in which these ODEs are complemented by two other forced ODEs
satisfied by the trace of the surface elevation at the contact points. The
interest of this new extended formulation is that the forcing terms are easy to
compute numerically and that the surface elevation at the contact points is
furnished for free. Based on this formulation, we propose a second order scheme
that involves a generalization of the MacCormack scheme with nonlocal flux and
a source term, which is coupled to a second order Heun scheme for the ODEs. In
order to validate this scheme, several explicit solutions for this
wave-structure interaction problem are derived and can serve as benchmark for
future codes. As a byproduct, our method provides a second order scheme for the
generation of waves at the entrance of the numerical domain for the
Boussinesq-Abbott system.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 14:39:40 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Beck",
"Geoffrey",
""
],
[
"Lannes",
"David",
""
],
[
"Weynans",
"Lisl",
""
]
] | TITLE: A numerical method for wave-structure interactions in the Boussinesq
regime
ABSTRACT: The goal of this work is to study waves interacting with partially immersed
objects allowed to move freely in the vertical direction, and in a regime in
which the propagation of the waves is described by the one dimensional
Boussinesq-Abbott system. The problem can be reduced to a transmission problem
for this Boussinesq system, in which the transmission conditions between the
components of the domain at the left and at the right of the object are
determined through the resolution of coupled forced ODEs in time satisfied by
the vertical displacement of the object and the average discharge in the
portion of the fluid located under the object. We propose a new extended
formulation in which these ODEs are complemented by two other forced ODEs
satisfied by the trace of the surface elevation at the contact points. The
interest of this new extended formulation is that the forcing terms are easy to
compute numerically and that the surface elevation at the contact points is
furnished for free. Based on this formulation, we propose a second order scheme
that involves a generalization of the MacCormack scheme with nonlocal flux and
a source term, which is coupled to a second order Heun scheme for the ODEs. In
order to validate this scheme, several explicit solutions for this
wave-structure interaction problem are derived and can serve as benchmark for
future codes. As a byproduct, our method provides a second order scheme for the
generation of waves at the entrance of the numerical domain for the
Boussinesq-Abbott system.
| no_new_dataset | 0.710019 |
2307.01764 | Guangzhi Sun | Guangzhi Sun, Chao Zhang, Ivan Vuli\'c, Pawe{\l} Budzianowski, Philip
C. Woodland | Knowledge-Aware Audio-Grounded Generative Slot Filling for Limited
Annotated Data | to submit to CS&L | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Manually annotating fine-grained slot-value labels for task-oriented dialogue
(ToD) systems is an expensive and time-consuming endeavour. This motivates
research into slot-filling methods that operate with limited amounts of
labelled data. Moreover, the majority of current work on ToD is based solely on
text as the input modality, neglecting the additional challenges of imperfect
automatic speech recognition (ASR) when working with spoken language. In this
work, we propose a Knowledge-Aware Audio-Grounded generative slot-filling
framework, termed KA2G, that focuses on few-shot and zero-shot slot filling for
ToD with speech input. KA2G achieves robust and data-efficient slot filling for
speech-based ToD by 1) framing it as a text generation task, 2) grounding text
generation additionally in the audio modality, and 3) conditioning on available
external knowledge (e.g. a predefined list of possible slot values). We show
that combining both modalities within the KA2G framework improves the
robustness against ASR errors. Further, the knowledge-aware slot-value
generator in KA2G, implemented via a pointer generator mechanism, particularly
benefits few-shot and zero-shot learning. Experiments, conducted on the
standard speech-based single-turn SLURP dataset and a multi-turn dataset
extracted from a commercial ToD system, display strong and consistent gains
over prior work, especially in few-shot and zero-shot setups.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 15:05:42 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Sun",
"Guangzhi",
""
],
[
"Zhang",
"Chao",
""
],
[
"Vulić",
"Ivan",
""
],
[
"Budzianowski",
"Paweł",
""
],
[
"Woodland",
"Philip C.",
""
]
] | TITLE: Knowledge-Aware Audio-Grounded Generative Slot Filling for Limited
Annotated Data
ABSTRACT: Manually annotating fine-grained slot-value labels for task-oriented dialogue
(ToD) systems is an expensive and time-consuming endeavour. This motivates
research into slot-filling methods that operate with limited amounts of
labelled data. Moreover, the majority of current work on ToD is based solely on
text as the input modality, neglecting the additional challenges of imperfect
automatic speech recognition (ASR) when working with spoken language. In this
work, we propose a Knowledge-Aware Audio-Grounded generative slot-filling
framework, termed KA2G, that focuses on few-shot and zero-shot slot filling for
ToD with speech input. KA2G achieves robust and data-efficient slot filling for
speech-based ToD by 1) framing it as a text generation task, 2) grounding text
generation additionally in the audio modality, and 3) conditioning on available
external knowledge (e.g. a predefined list of possible slot values). We show
that combining both modalities within the KA2G framework improves the
robustness against ASR errors. Further, the knowledge-aware slot-value
generator in KA2G, implemented via a pointer generator mechanism, particularly
benefits few-shot and zero-shot learning. Experiments, conducted on the
standard speech-based single-turn SLURP dataset and a multi-turn dataset
extracted from a commercial ToD system, display strong and consistent gains
over prior work, especially in few-shot and zero-shot setups.
| new_dataset | 0.630628 |
2307.01806 | Afshin Khadangi | Afshin Khadangi | DeepFlorist: Rethinking Deep Neural Networks and Ensemble Learning as A
Meta-Classifier For Object Classification | null | null | null | null | cs.CV cs.AI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel learning paradigm called "DeepFlorist" for
flower classification using ensemble learning as a meta-classifier. DeepFlorist
combines the power of deep learning with the robustness of ensemble methods to
achieve accurate and reliable flower classification results. The proposed
network architecture leverages a combination of dense convolutional and
convolutional neural networks (DCNNs and CNNs) to extract high-level features
from flower images, followed by a fully connected layer for classification. To
enhance the performance and generalization of DeepFlorist, an ensemble learning
approach is employed, incorporating multiple diverse models to improve the
classification accuracy. Experimental results on benchmark flower datasets
demonstrate the effectiveness of DeepFlorist, outperforming state-of-the-art
methods in terms of accuracy and robustness. The proposed framework holds
significant potential for automated flower recognition systems in real-world
applications, enabling advancements in plant taxonomy, conservation efforts,
and ecological studies.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 16:21:39 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Khadangi",
"Afshin",
""
]
] | TITLE: DeepFlorist: Rethinking Deep Neural Networks and Ensemble Learning as A
Meta-Classifier For Object Classification
ABSTRACT: In this paper, we propose a novel learning paradigm called "DeepFlorist" for
flower classification using ensemble learning as a meta-classifier. DeepFlorist
combines the power of deep learning with the robustness of ensemble methods to
achieve accurate and reliable flower classification results. The proposed
network architecture leverages a combination of dense convolutional and
convolutional neural networks (DCNNs and CNNs) to extract high-level features
from flower images, followed by a fully connected layer for classification. To
enhance the performance and generalization of DeepFlorist, an ensemble learning
approach is employed, incorporating multiple diverse models to improve the
classification accuracy. Experimental results on benchmark flower datasets
demonstrate the effectiveness of DeepFlorist, outperforming state-of-the-art
methods in terms of accuracy and robustness. The proposed framework holds
significant potential for automated flower recognition systems in real-world
applications, enabling advancements in plant taxonomy, conservation efforts,
and ecological studies.
| no_new_dataset | 0.711638 |
2307.01807 | Zheyuan Zhou | Zheyuan Zhou, Jiachen Lu, Yihan Zeng, Hang Xu, Li Zhang | SUIT: Learning Significance-guided Information for 3D Temporal Detection | Accepted to IROS 2023 | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3D object detection from LiDAR point cloud is of critical importance for
autonomous driving and robotics. While sequential point cloud has the potential
to enhance 3D perception through temporal information, utilizing these temporal
features effectively and efficiently remains a challenging problem. Based on
the observation that the foreground information is sparsely distributed in
LiDAR scenes, we believe sufficient knowledge can be provided by sparse format
rather than dense maps. To this end, we propose to learn Significance-gUided
Information for 3D Temporal detection (SUIT), which simplifies temporal
information as sparse features for information fusion across frames.
Specifically, we first introduce a significant sampling mechanism that extracts
information-rich yet sparse features based on predicted object centroids. On
top of that, we present an explicit geometric transformation learning
technique, which learns the object-centric transformations among sparse
features across frames. We evaluate our method on large-scale nuScenes and
Waymo dataset, where our SUIT not only significantly reduces the memory and
computation cost of temporal fusion, but also performs well over the
state-of-the-art baselines.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 16:22:10 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Zhou",
"Zheyuan",
""
],
[
"Lu",
"Jiachen",
""
],
[
"Zeng",
"Yihan",
""
],
[
"Xu",
"Hang",
""
],
[
"Zhang",
"Li",
""
]
] | TITLE: SUIT: Learning Significance-guided Information for 3D Temporal Detection
ABSTRACT: 3D object detection from LiDAR point cloud is of critical importance for
autonomous driving and robotics. While sequential point cloud has the potential
to enhance 3D perception through temporal information, utilizing these temporal
features effectively and efficiently remains a challenging problem. Based on
the observation that the foreground information is sparsely distributed in
LiDAR scenes, we believe sufficient knowledge can be provided by sparse format
rather than dense maps. To this end, we propose to learn Significance-gUided
Information for 3D Temporal detection (SUIT), which simplifies temporal
information as sparse features for information fusion across frames.
Specifically, we first introduce a significant sampling mechanism that extracts
information-rich yet sparse features based on predicted object centroids. On
top of that, we present an explicit geometric transformation learning
technique, which learns the object-centric transformations among sparse
features across frames. We evaluate our method on large-scale nuScenes and
Waymo dataset, where our SUIT not only significantly reduces the memory and
computation cost of temporal fusion, but also performs well over the
state-of-the-art baselines.
| no_new_dataset | 0.710176 |
2307.01831 | Shentong Mo | Shentong Mo, Enze Xie, Ruihang Chu, Lewei Yao, Lanqing Hong, Matthias
Nie{\ss}ner, Zhenguo Li | DiT-3D: Exploring Plain Diffusion Transformers for 3D Shape Generation | Project Page: https://dit-3d.github.io/ | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent Diffusion Transformers (e.g., DiT) have demonstrated their powerful
effectiveness in generating high-quality 2D images. However, it is still being
determined whether the Transformer architecture performs equally well in 3D
shape generation, as previous 3D diffusion methods mostly adopted the U-Net
architecture. To bridge this gap, we propose a novel Diffusion Transformer for
3D shape generation, namely DiT-3D, which can directly operate the denoising
process on voxelized point clouds using plain Transformers. Compared to
existing U-Net approaches, our DiT-3D is more scalable in model size and
produces much higher quality generations. Specifically, the DiT-3D adopts the
design philosophy of DiT but modifies it by incorporating 3D positional and
patch embeddings to adaptively aggregate input from voxelized point clouds. To
reduce the computational cost of self-attention in 3D shape generation, we
incorporate 3D window attention into Transformer blocks, as the increased 3D
token length resulting from the additional dimension of voxels can lead to high
computation. Finally, linear and devoxelization layers are used to predict the
denoised point clouds. In addition, our transformer architecture supports
efficient fine-tuning from 2D to 3D, where the pre-trained DiT-2D checkpoint on
ImageNet can significantly improve DiT-3D on ShapeNet. Experimental results on
the ShapeNet dataset demonstrate that the proposed DiT-3D achieves
state-of-the-art performance in high-fidelity and diverse 3D point cloud
generation. In particular, our DiT-3D decreases the 1-Nearest Neighbor Accuracy
of the state-of-the-art method by 4.59 and increases the Coverage metric by
3.51 when evaluated on Chamfer Distance.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 17:15:46 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Mo",
"Shentong",
""
],
[
"Xie",
"Enze",
""
],
[
"Chu",
"Ruihang",
""
],
[
"Yao",
"Lewei",
""
],
[
"Hong",
"Lanqing",
""
],
[
"Nießner",
"Matthias",
""
],
[
"Li",
"Zhenguo",
""
]
] | TITLE: DiT-3D: Exploring Plain Diffusion Transformers for 3D Shape Generation
ABSTRACT: Recent Diffusion Transformers (e.g., DiT) have demonstrated their powerful
effectiveness in generating high-quality 2D images. However, it is still being
determined whether the Transformer architecture performs equally well in 3D
shape generation, as previous 3D diffusion methods mostly adopted the U-Net
architecture. To bridge this gap, we propose a novel Diffusion Transformer for
3D shape generation, namely DiT-3D, which can directly operate the denoising
process on voxelized point clouds using plain Transformers. Compared to
existing U-Net approaches, our DiT-3D is more scalable in model size and
produces much higher quality generations. Specifically, the DiT-3D adopts the
design philosophy of DiT but modifies it by incorporating 3D positional and
patch embeddings to adaptively aggregate input from voxelized point clouds. To
reduce the computational cost of self-attention in 3D shape generation, we
incorporate 3D window attention into Transformer blocks, as the increased 3D
token length resulting from the additional dimension of voxels can lead to high
computation. Finally, linear and devoxelization layers are used to predict the
denoised point clouds. In addition, our transformer architecture supports
efficient fine-tuning from 2D to 3D, where the pre-trained DiT-2D checkpoint on
ImageNet can significantly improve DiT-3D on ShapeNet. Experimental results on
the ShapeNet dataset demonstrate that the proposed DiT-3D achieves
state-of-the-art performance in high-fidelity and diverse 3D point cloud
generation. In particular, our DiT-3D decreases the 1-Nearest Neighbor Accuracy
of the state-of-the-art method by 4.59 and increases the Coverage metric by
3.51 when evaluated on Chamfer Distance.
| no_new_dataset | 0.708988 |
2307.01845 | Hailin Li | Hailin Li and Raghavendra Ramachandra | Deep Features for Contactless Fingerprint Presentation Attack Detection:
Can They Be Generalized? | Preprint paper accepted by First Workshop on Contactless Hand
Biometrics and Gesture Recognition (CHBGR-2023) | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The rapid evolution of high-end smartphones with advanced high-resolution
cameras has resulted in contactless capture of fingerprint biometrics that are
more reliable and suitable for verification. Similar to other biometric
systems, contactless fingerprint-verification systems are vulnerable to
presentation attacks. In this paper, we present a comparative study on the
generalizability of seven different pre-trained Convolutional Neural Networks
(CNN) and a Vision Transformer (ViT) to reliably detect presentation attacks.
Extensive experiments were carried out on publicly available smartphone-based
presentation attack datasets using four different Presentation Attack
Instruments (PAI). The detection performance of the eighth deep feature
technique was evaluated using the leave-one-out protocol to benchmark the
generalization performance for unseen PAI. The obtained results indicated the
best generalization performance with the ResNet50 CNN.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 17:46:20 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Li",
"Hailin",
""
],
[
"Ramachandra",
"Raghavendra",
""
]
] | TITLE: Deep Features for Contactless Fingerprint Presentation Attack Detection:
Can They Be Generalized?
ABSTRACT: The rapid evolution of high-end smartphones with advanced high-resolution
cameras has resulted in contactless capture of fingerprint biometrics that are
more reliable and suitable for verification. Similar to other biometric
systems, contactless fingerprint-verification systems are vulnerable to
presentation attacks. In this paper, we present a comparative study on the
generalizability of seven different pre-trained Convolutional Neural Networks
(CNN) and a Vision Transformer (ViT) to reliably detect presentation attacks.
Extensive experiments were carried out on publicly available smartphone-based
presentation attack datasets using four different Presentation Attack
Instruments (PAI). The detection performance of the eighth deep feature
technique was evaluated using the leave-one-out protocol to benchmark the
generalization performance for unseen PAI. The obtained results indicated the
best generalization performance with the ResNet50 CNN.
| no_new_dataset | 0.710804 |
2307.01866 | Santiago De Leon-Martinez | Santiago de Leon-Martinez | Understanding User Behavior in Carousel Recommendation Systems for Click
Modeling and Learning to Rank | Manuscript submitted to ACM RecSys '23 Doctoral Symposium | null | null | null | cs.IR cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Carousels (also-known as multilists) have become the standard user interface
for e-commerce platforms replacing the ranked list, the previous standard for
recommender systems. While the research community has begun to focus on
carousels, there are many unanswered questions and undeveloped areas when
compared to the literature for ranked lists, which includes information
retrieval research on the presentation of web search results. This work is an
extended abstract for the RecSys 2023 Doctoral Symposium outlining a PhD
project, with the main contribution of addressing the undeveloped areas in
carousel recommenders: 1) the formulation of new click models and 2) learning
to rank with click data.
We present two significant barriers for this contribution and the field: lack
of public datasets and lack of eye tracking user studies of browsing behavior.
Clicks, the standard feedback collected by recommender systems, are
insufficient to understand the whole interaction process of a user with a
recommender requiring system designers to make assumptions, especially on
browsing behavior. Eye tracking provides a means to elucidate the process and
test these assumptions. Thus, to address these barriers and encourage future
work, we will conduct an eye tracking user study within a carousel movie
recommendation setting and make the dataset publicly available. Moreover, the
insights learned on browsing behavior will help motivate the formulation of new
click models and learning to rank.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:25:15 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"de Leon-Martinez",
"Santiago",
""
]
] | TITLE: Understanding User Behavior in Carousel Recommendation Systems for Click
Modeling and Learning to Rank
ABSTRACT: Carousels (also-known as multilists) have become the standard user interface
for e-commerce platforms replacing the ranked list, the previous standard for
recommender systems. While the research community has begun to focus on
carousels, there are many unanswered questions and undeveloped areas when
compared to the literature for ranked lists, which includes information
retrieval research on the presentation of web search results. This work is an
extended abstract for the RecSys 2023 Doctoral Symposium outlining a PhD
project, with the main contribution of addressing the undeveloped areas in
carousel recommenders: 1) the formulation of new click models and 2) learning
to rank with click data.
We present two significant barriers for this contribution and the field: lack
of public datasets and lack of eye tracking user studies of browsing behavior.
Clicks, the standard feedback collected by recommender systems, are
insufficient to understand the whole interaction process of a user with a
recommender requiring system designers to make assumptions, especially on
browsing behavior. Eye tracking provides a means to elucidate the process and
test these assumptions. Thus, to address these barriers and encourage future
work, we will conduct an eye tracking user study within a carousel movie
recommendation setting and make the dataset publicly available. Moreover, the
insights learned on browsing behavior will help motivate the formulation of new
click models and learning to rank.
| no_new_dataset | 0.71 |
2307.01870 | Simone Conia | Riccardo Orlando and Simone Conia and Roberto Navigli | Exploring Non-Verbal Predicates in Semantic Role Labeling: Challenges
and Opportunities | Accepted at Findings of ACL 2023 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Although we have witnessed impressive progress in Semantic Role Labeling
(SRL), most of the research in the area is carried out assuming that the
majority of predicates are verbs. Conversely, predicates can also be expressed
using other parts of speech, e.g., nouns and adjectives. However, non-verbal
predicates appear in the benchmarks we commonly use to measure progress in SRL
less frequently than in some real-world settings -- newspaper headlines,
dialogues, and tweets, among others. In this paper, we put forward a new
PropBank dataset which boasts wide coverage of multiple predicate types. Thanks
to it, we demonstrate empirically that standard benchmarks do not provide an
accurate picture of the current situation in SRL and that state-of-the-art
systems are still incapable of transferring knowledge across different
predicate types. Having observed these issues, we also present a novel,
manually-annotated challenge set designed to give equal importance to verbal,
nominal, and adjectival predicate-argument structures. We use such dataset to
investigate whether we can leverage different linguistic resources to promote
knowledge transfer. In conclusion, we claim that SRL is far from "solved", and
its integration with other semantic tasks might enable significant improvements
in the future, especially for the long tail of non-verbal predicates, thereby
facilitating further research on SRL for non-verbal predicates.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:28:59 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Orlando",
"Riccardo",
""
],
[
"Conia",
"Simone",
""
],
[
"Navigli",
"Roberto",
""
]
] | TITLE: Exploring Non-Verbal Predicates in Semantic Role Labeling: Challenges
and Opportunities
ABSTRACT: Although we have witnessed impressive progress in Semantic Role Labeling
(SRL), most of the research in the area is carried out assuming that the
majority of predicates are verbs. Conversely, predicates can also be expressed
using other parts of speech, e.g., nouns and adjectives. However, non-verbal
predicates appear in the benchmarks we commonly use to measure progress in SRL
less frequently than in some real-world settings -- newspaper headlines,
dialogues, and tweets, among others. In this paper, we put forward a new
PropBank dataset which boasts wide coverage of multiple predicate types. Thanks
to it, we demonstrate empirically that standard benchmarks do not provide an
accurate picture of the current situation in SRL and that state-of-the-art
systems are still incapable of transferring knowledge across different
predicate types. Having observed these issues, we also present a novel,
manually-annotated challenge set designed to give equal importance to verbal,
nominal, and adjectival predicate-argument structures. We use such dataset to
investigate whether we can leverage different linguistic resources to promote
knowledge transfer. In conclusion, we claim that SRL is far from "solved", and
its integration with other semantic tasks might enable significant improvements
in the future, especially for the long tail of non-verbal predicates, thereby
facilitating further research on SRL for non-verbal predicates.
| new_dataset | 0.716572 |
2307.01872 | Sina Tayebati | Sina Tayebati, Kyu Taek Cho | A hybrid machine learning framework for clad characteristics prediction
in metal additive manufacturing | 35 pages, 10 figures | null | null | null | cs.LG cs.CE | http://creativecommons.org/licenses/by/4.0/ | During the past decade, metal additive manufacturing (MAM) has experienced
significant developments and gained much attention due to its ability to
fabricate complex parts, manufacture products with functionally graded
materials, minimize waste, and enable low-cost customization. Despite these
advantages, predicting the impact of processing parameters on the
characteristics of an MAM printed clad is challenging due to the complex nature
of MAM processes. Machine learning (ML) techniques can help connect the physics
underlying the process and processing parameters to the clad characteristics.
In this study, we introduce a hybrid approach which involves utilizing the data
provided by a calibrated multi-physics computational fluid dynamic (CFD) model
and experimental research for preparing the essential big dataset, and then
uses a comprehensive framework consisting of various ML models to predict and
understand clad characteristics. We first compile an extensive dataset by
fusing experimental data into the data generated using the developed CFD model
for this study. This dataset comprises critical clad characteristics, including
geometrical features such as width, height, and depth, labels identifying clad
quality, and processing parameters. Second, we use two sets of processing
parameters for training the ML models: machine setting parameters and
physics-aware parameters, along with versatile ML models and reliable
evaluation metrics to create a comprehensive and scalable learning framework
for predicting clad geometry and quality. This framework can serve as a basis
for clad characteristics control and process optimization. The framework
resolves many challenges of conventional modeling methods in MAM by solving t
the issue of data scarcity using a hybrid approach and introducing an
efficient, accurate, and scalable platform for clad characteristics prediction
and optimization.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:32:41 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Tayebati",
"Sina",
""
],
[
"Cho",
"Kyu Taek",
""
]
] | TITLE: A hybrid machine learning framework for clad characteristics prediction
in metal additive manufacturing
ABSTRACT: During the past decade, metal additive manufacturing (MAM) has experienced
significant developments and gained much attention due to its ability to
fabricate complex parts, manufacture products with functionally graded
materials, minimize waste, and enable low-cost customization. Despite these
advantages, predicting the impact of processing parameters on the
characteristics of an MAM printed clad is challenging due to the complex nature
of MAM processes. Machine learning (ML) techniques can help connect the physics
underlying the process and processing parameters to the clad characteristics.
In this study, we introduce a hybrid approach which involves utilizing the data
provided by a calibrated multi-physics computational fluid dynamic (CFD) model
and experimental research for preparing the essential big dataset, and then
uses a comprehensive framework consisting of various ML models to predict and
understand clad characteristics. We first compile an extensive dataset by
fusing experimental data into the data generated using the developed CFD model
for this study. This dataset comprises critical clad characteristics, including
geometrical features such as width, height, and depth, labels identifying clad
quality, and processing parameters. Second, we use two sets of processing
parameters for training the ML models: machine setting parameters and
physics-aware parameters, along with versatile ML models and reliable
evaluation metrics to create a comprehensive and scalable learning framework
for predicting clad geometry and quality. This framework can serve as a basis
for clad characteristics control and process optimization. The framework
resolves many challenges of conventional modeling methods in MAM by solving t
the issue of data scarcity using a hybrid approach and introducing an
efficient, accurate, and scalable platform for clad characteristics prediction
and optimization.
| no_new_dataset | 0.68487 |
2307.01875 | Weijie Xu | Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving
Training Data Release for Machine Learning | 10 pages, 3 figures, AAAI Workshop | AAAI 2023 Workshop on Privacy-Preserving Artificial Intelligence | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The availability of large amounts of informative data is crucial for
successful machine learning. However, in domains with sensitive information,
the release of high-utility data which protects the privacy of individuals has
proven challenging. Despite progress in differential privacy and generative
modeling for privacy-preserving data release in the literature, only a few
approaches optimize for machine learning utility: most approaches only take
into account statistical metrics on the data itself and fail to explicitly
preserve the loss metrics of machine learning models that are to be
subsequently trained on the generated data. In this paper, we introduce a data
release framework, 3A (Approximate, Adapt, Anonymize), to maximize data utility
for machine learning, while preserving differential privacy. We also describe a
specific implementation of this framework that leverages mixture models to
approximate, kernel-inducing points to adapt, and Gaussian differential privacy
to anonymize a dataset, in order to ensure that the resulting data is both
privacy-preserving and high utility. We present experimental evidence showing
minimal discrepancy between performance metrics of models trained on real
versus privatized datasets, when evaluated on held-out real data. We also
compare our results with several privacy-preserving synthetic data generation
models (such as differentially private generative adversarial networks), and
report significant increases in classification performance metrics compared to
state-of-the-art models. These favorable comparisons show that the presented
framework is a promising direction of research, increasing the utility of
low-risk synthetic data release for machine learning.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:37:11 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Madl",
"Tamas",
""
],
[
"Xu",
"Weijie",
""
],
[
"Choudhury",
"Olivia",
""
],
[
"Howard",
"Matthew",
""
]
] | TITLE: Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving
Training Data Release for Machine Learning
ABSTRACT: The availability of large amounts of informative data is crucial for
successful machine learning. However, in domains with sensitive information,
the release of high-utility data which protects the privacy of individuals has
proven challenging. Despite progress in differential privacy and generative
modeling for privacy-preserving data release in the literature, only a few
approaches optimize for machine learning utility: most approaches only take
into account statistical metrics on the data itself and fail to explicitly
preserve the loss metrics of machine learning models that are to be
subsequently trained on the generated data. In this paper, we introduce a data
release framework, 3A (Approximate, Adapt, Anonymize), to maximize data utility
for machine learning, while preserving differential privacy. We also describe a
specific implementation of this framework that leverages mixture models to
approximate, kernel-inducing points to adapt, and Gaussian differential privacy
to anonymize a dataset, in order to ensure that the resulting data is both
privacy-preserving and high utility. We present experimental evidence showing
minimal discrepancy between performance metrics of models trained on real
versus privatized datasets, when evaluated on held-out real data. We also
compare our results with several privacy-preserving synthetic data generation
models (such as differentially private generative adversarial networks), and
report significant increases in classification performance metrics compared to
state-of-the-art models. These favorable comparisons show that the presented
framework is a promising direction of research, increasing the utility of
low-risk synthetic data release for machine learning.
| no_new_dataset | 0.710478 |
2307.01876 | Rasul Abdusalamov | Rasul Abdusalamov, Julius Kaplunov, Mikhail Itskov | Discovering Asymptotic Expansions Using Symbolic Regression | null | null | null | null | cs.SC physics.comp-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Recently, symbolic regression (SR) has demonstrated its efficiency for
discovering basic governing relations in physical systems. A major impact can
be potentially achieved by coupling symbolic regression with asymptotic
methodology. The main advantage of asymptotic approach involves the robust
approximation to the sought for solution bringing a clear idea of the effect of
problem parameters. However, the analytic derivation of the asymptotic series
is often highly nontrivial especially, when the exact solution is not
available. In this paper, we adapt SR methodology to discover asymptotic
series. As an illustration we consider three problem in mechanics, including
two-mass collision, viscoelastic behavior of a Kelvin-Voigt solid and
propagation of Rayleigh-Lamb waves. The training data is generated from the
explicit exact solutions of these problems. The obtained SR results are
compared to the benchmark asymptotic expansions of the above mentioned exact
solutions. Both convergent and divergent asymptotic series are considered. A
good agreement between SR expansions and analytical results is observed. It is
demonstrated that the proposed approach can be used to identify material
parameters, e.g. Poisson's ratio, and has high prospects for utilizing
experimental and numerical data.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:37:20 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Abdusalamov",
"Rasul",
""
],
[
"Kaplunov",
"Julius",
""
],
[
"Itskov",
"Mikhail",
""
]
] | TITLE: Discovering Asymptotic Expansions Using Symbolic Regression
ABSTRACT: Recently, symbolic regression (SR) has demonstrated its efficiency for
discovering basic governing relations in physical systems. A major impact can
be potentially achieved by coupling symbolic regression with asymptotic
methodology. The main advantage of asymptotic approach involves the robust
approximation to the sought for solution bringing a clear idea of the effect of
problem parameters. However, the analytic derivation of the asymptotic series
is often highly nontrivial especially, when the exact solution is not
available. In this paper, we adapt SR methodology to discover asymptotic
series. As an illustration we consider three problem in mechanics, including
two-mass collision, viscoelastic behavior of a Kelvin-Voigt solid and
propagation of Rayleigh-Lamb waves. The training data is generated from the
explicit exact solutions of these problems. The obtained SR results are
compared to the benchmark asymptotic expansions of the above mentioned exact
solutions. Both convergent and divergent asymptotic series are considered. A
good agreement between SR expansions and analytical results is observed. It is
demonstrated that the proposed approach can be used to identify material
parameters, e.g. Poisson's ratio, and has high prospects for utilizing
experimental and numerical data.
| no_new_dataset | 0.710038 |
2307.01877 | Tal Wagner | Tal Wagner, Yonatan Naamad, Nina Mishra | Fast Private Kernel Density Estimation via Locality Sensitive
Quantization | ICML 2023 | null | null | null | cs.DS cs.LG | http://creativecommons.org/licenses/by/4.0/ | We study efficient mechanisms for differentially private kernel density
estimation (DP-KDE). Prior work for the Gaussian kernel described algorithms
that run in time exponential in the number of dimensions $d$. This paper breaks
the exponential barrier, and shows how the KDE can privately be approximated in
time linear in $d$, making it feasible for high-dimensional data. We also
present improved bounds for low-dimensional data.
Our results are obtained through a general framework, which we term Locality
Sensitive Quantization (LSQ), for constructing private KDE mechanisms where
existing KDE approximation techniques can be applied. It lets us leverage
several efficient non-private KDE methods -- like Random Fourier Features, the
Fast Gauss Transform, and Locality Sensitive Hashing -- and ``privatize'' them
in a black-box manner. Our experiments demonstrate that our resulting DP-KDE
mechanisms are fast and accurate on large datasets in both high and low
dimensions.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:48:04 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Wagner",
"Tal",
""
],
[
"Naamad",
"Yonatan",
""
],
[
"Mishra",
"Nina",
""
]
] | TITLE: Fast Private Kernel Density Estimation via Locality Sensitive
Quantization
ABSTRACT: We study efficient mechanisms for differentially private kernel density
estimation (DP-KDE). Prior work for the Gaussian kernel described algorithms
that run in time exponential in the number of dimensions $d$. This paper breaks
the exponential barrier, and shows how the KDE can privately be approximated in
time linear in $d$, making it feasible for high-dimensional data. We also
present improved bounds for low-dimensional data.
Our results are obtained through a general framework, which we term Locality
Sensitive Quantization (LSQ), for constructing private KDE mechanisms where
existing KDE approximation techniques can be applied. It lets us leverage
several efficient non-private KDE methods -- like Random Fourier Features, the
Fast Gauss Transform, and Locality Sensitive Hashing -- and ``privatize'' them
in a black-box manner. Our experiments demonstrate that our resulting DP-KDE
mechanisms are fast and accurate on large datasets in both high and low
dimensions.
| no_new_dataset | 0.710672 |
2307.01881 | Siwon Kim | Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong
Joon Oh | ProPILE: Probing Privacy Leakage in Large Language Models | null | null | null | null | cs.CR cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The rapid advancement and widespread use of large language models (LLMs) have
raised significant concerns regarding the potential leakage of personally
identifiable information (PII). These models are often trained on vast
quantities of web-collected data, which may inadvertently include sensitive
personal data. This paper presents ProPILE, a novel probing tool designed to
empower data subjects, or the owners of the PII, with awareness of potential
PII leakage in LLM-based services. ProPILE lets data subjects formulate prompts
based on their own PII to evaluate the level of privacy intrusion in LLMs. We
demonstrate its application on the OPT-1.3B model trained on the publicly
available Pile dataset. We show how hypothetical data subjects may assess the
likelihood of their PII being included in the Pile dataset being revealed.
ProPILE can also be leveraged by LLM service providers to effectively evaluate
their own levels of PII leakage with more powerful prompts specifically tuned
for their in-house models. This tool represents a pioneering step towards
empowering the data subjects for their awareness and control over their own
data on the web.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 18:53:47 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Kim",
"Siwon",
""
],
[
"Yun",
"Sangdoo",
""
],
[
"Lee",
"Hwaran",
""
],
[
"Gubri",
"Martin",
""
],
[
"Yoon",
"Sungroh",
""
],
[
"Oh",
"Seong Joon",
""
]
] | TITLE: ProPILE: Probing Privacy Leakage in Large Language Models
ABSTRACT: The rapid advancement and widespread use of large language models (LLMs) have
raised significant concerns regarding the potential leakage of personally
identifiable information (PII). These models are often trained on vast
quantities of web-collected data, which may inadvertently include sensitive
personal data. This paper presents ProPILE, a novel probing tool designed to
empower data subjects, or the owners of the PII, with awareness of potential
PII leakage in LLM-based services. ProPILE lets data subjects formulate prompts
based on their own PII to evaluate the level of privacy intrusion in LLMs. We
demonstrate its application on the OPT-1.3B model trained on the publicly
available Pile dataset. We show how hypothetical data subjects may assess the
likelihood of their PII being included in the Pile dataset being revealed.
ProPILE can also be leveraged by LLM service providers to effectively evaluate
their own levels of PII leakage with more powerful prompts specifically tuned
for their in-house models. This tool represents a pioneering step towards
empowering the data subjects for their awareness and control over their own
data on the web.
| no_new_dataset | 0.709806 |
2307.01893 | Erdem Akag\"und\"uz | Abbas T\"urko\u{g}lu, Erdem Akag\"und\"uz | EANet: Enhanced Attribute-based RGBT Tracker Network | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Tracking objects can be a difficult task in computer vision, especially when
faced with challenges such as occlusion, changes in lighting, and motion blur.
Recent advances in deep learning have shown promise in challenging these
conditions. However, most deep learning-based object trackers only use visible
band (RGB) images. Thermal infrared electromagnetic waves (TIR) can provide
additional information about an object, including its temperature, when faced
with challenging conditions. We propose a deep learning-based image tracking
approach that fuses RGB and thermal images (RGBT). The proposed model consists
of two main components: a feature extractor and a tracker. The feature
extractor encodes deep features from both the RGB and the TIR images. The
tracker then uses these features to track the object using an enhanced
attribute-based architecture. We propose a fusion of attribute-specific feature
selection with an aggregation module. The proposed methods are evaluated on the
RGBT234 \cite{LiCLiang2018} and LasHeR \cite{LiLasher2021} datasets, which are
the most widely used RGBT object-tracking datasets in the literature. The
results show that the proposed system outperforms state-of-the-art RGBT object
trackers on these datasets, with a relatively smaller number of parameters.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 19:34:53 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Türkoğlu",
"Abbas",
""
],
[
"Akagündüz",
"Erdem",
""
]
] | TITLE: EANet: Enhanced Attribute-based RGBT Tracker Network
ABSTRACT: Tracking objects can be a difficult task in computer vision, especially when
faced with challenges such as occlusion, changes in lighting, and motion blur.
Recent advances in deep learning have shown promise in challenging these
conditions. However, most deep learning-based object trackers only use visible
band (RGB) images. Thermal infrared electromagnetic waves (TIR) can provide
additional information about an object, including its temperature, when faced
with challenging conditions. We propose a deep learning-based image tracking
approach that fuses RGB and thermal images (RGBT). The proposed model consists
of two main components: a feature extractor and a tracker. The feature
extractor encodes deep features from both the RGB and the TIR images. The
tracker then uses these features to track the object using an enhanced
attribute-based architecture. We propose a fusion of attribute-specific feature
selection with an aggregation module. The proposed methods are evaluated on the
RGBT234 \cite{LiCLiang2018} and LasHeR \cite{LiLasher2021} datasets, which are
the most widely used RGBT object-tracking datasets in the literature. The
results show that the proposed system outperforms state-of-the-art RGBT object
trackers on these datasets, with a relatively smaller number of parameters.
| no_new_dataset | 0.711036 |
2307.01900 | Isar Nejadgholi | Isar Nejadgholi, Svetlana Kiritchenko, Kathleen C. Fraser, and Esma
Balk{\i}r | Concept-Based Explanations to Test for False Causal Relationships
Learned by Abusive Language Classifiers | Published at WOAH2023 co-located with ACL2023 | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Classifiers tend to learn a false causal relationship between an
over-represented concept and a label, which can result in over-reliance on the
concept and compromised classification accuracy. It is imperative to have
methods in place that can compare different models and identify over-reliances
on specific concepts. We consider three well-known abusive language classifiers
trained on large English datasets and focus on the concept of negative
emotions, which is an important signal but should not be learned as a
sufficient feature for the label of abuse. Motivated by the definition of
global sufficiency, we first examine the unwanted dependencies learned by the
classifiers by assessing their accuracy on a challenge set across all decision
thresholds. Further, recognizing that a challenge set might not always be
available, we introduce concept-based explanation metrics to assess the
influence of the concept on the labels. These explanations allow us to compare
classifiers regarding the degree of false global sufficiency they have learned
between a concept and a label.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 19:57:54 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Nejadgholi",
"Isar",
""
],
[
"Kiritchenko",
"Svetlana",
""
],
[
"Fraser",
"Kathleen C.",
""
],
[
"Balkır",
"Esma",
""
]
] | TITLE: Concept-Based Explanations to Test for False Causal Relationships
Learned by Abusive Language Classifiers
ABSTRACT: Classifiers tend to learn a false causal relationship between an
over-represented concept and a label, which can result in over-reliance on the
concept and compromised classification accuracy. It is imperative to have
methods in place that can compare different models and identify over-reliances
on specific concepts. We consider three well-known abusive language classifiers
trained on large English datasets and focus on the concept of negative
emotions, which is an important signal but should not be learned as a
sufficient feature for the label of abuse. Motivated by the definition of
global sufficiency, we first examine the unwanted dependencies learned by the
classifiers by assessing their accuracy on a challenge set across all decision
thresholds. Further, recognizing that a challenge set might not always be
available, we introduce concept-based explanation metrics to assess the
influence of the concept on the labels. These explanations allow us to compare
classifiers regarding the degree of false global sufficiency they have learned
between a concept and a label.
| no_new_dataset | 0.711663 |
2307.01909 | Tung Nguyen | Tung Nguyen, Jason Jewik, Hritik Bansal, Prakhar Sharma, Aditya Grover | ClimateLearn: Benchmarking Machine Learning for Weather and Climate
Modeling | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modeling weather and climate is an essential endeavor to understand the near-
and long-term impacts of climate change, as well as inform technology and
policymaking for adaptation and mitigation efforts. In recent years, there has
been a surging interest in applying data-driven methods based on machine
learning for solving core problems such as weather forecasting and climate
downscaling. Despite promising results, much of this progress has been impaired
due to the lack of large-scale, open-source efforts for reproducibility,
resulting in the use of inconsistent or underspecified datasets, training
setups, and evaluations by both domain scientists and artificial intelligence
researchers. We introduce ClimateLearn, an open-source PyTorch library that
vastly simplifies the training and evaluation of machine learning models for
data-driven climate science. ClimateLearn consists of holistic pipelines for
dataset processing (e.g., ERA5, CMIP6, PRISM), implementation of
state-of-the-art deep learning models (e.g., Transformers, ResNets), and
quantitative and qualitative evaluation for standard weather and climate
modeling tasks. We supplement these functionalities with extensive
documentation, contribution guides, and quickstart tutorials to expand access
and promote community growth. We have also performed comprehensive forecasting
and downscaling experiments to showcase the capabilities and key features of
our library. To our knowledge, ClimateLearn is the first large-scale,
open-source effort for bridging research in weather and climate modeling with
modern machine learning systems. Our library is available publicly at
https://github.com/aditya-grover/climate-learn.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 20:36:01 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Nguyen",
"Tung",
""
],
[
"Jewik",
"Jason",
""
],
[
"Bansal",
"Hritik",
""
],
[
"Sharma",
"Prakhar",
""
],
[
"Grover",
"Aditya",
""
]
] | TITLE: ClimateLearn: Benchmarking Machine Learning for Weather and Climate
Modeling
ABSTRACT: Modeling weather and climate is an essential endeavor to understand the near-
and long-term impacts of climate change, as well as inform technology and
policymaking for adaptation and mitigation efforts. In recent years, there has
been a surging interest in applying data-driven methods based on machine
learning for solving core problems such as weather forecasting and climate
downscaling. Despite promising results, much of this progress has been impaired
due to the lack of large-scale, open-source efforts for reproducibility,
resulting in the use of inconsistent or underspecified datasets, training
setups, and evaluations by both domain scientists and artificial intelligence
researchers. We introduce ClimateLearn, an open-source PyTorch library that
vastly simplifies the training and evaluation of machine learning models for
data-driven climate science. ClimateLearn consists of holistic pipelines for
dataset processing (e.g., ERA5, CMIP6, PRISM), implementation of
state-of-the-art deep learning models (e.g., Transformers, ResNets), and
quantitative and qualitative evaluation for standard weather and climate
modeling tasks. We supplement these functionalities with extensive
documentation, contribution guides, and quickstart tutorials to expand access
and promote community growth. We have also performed comprehensive forecasting
and downscaling experiments to showcase the capabilities and key features of
our library. To our knowledge, ClimateLearn is the first large-scale,
open-source effort for bridging research in weather and climate modeling with
modern machine learning systems. Our library is available publicly at
https://github.com/aditya-grover/climate-learn.
| no_new_dataset | 0.708364 |
2307.01924 | Gulcin Baykal | Gulcin Baykal, Halil Faruk Karagoz, Taha Binhuraib, Gozde Unal | ProtoDiffusion: Classifier-Free Diffusion Guidance with Prototype
Learning | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models are generative models that have shown significant advantages
compared to other generative models in terms of higher generation quality and
more stable training. However, the computational need for training diffusion
models is considerably increased. In this work, we incorporate prototype
learning into diffusion models to achieve high generation quality faster than
the original diffusion model. Instead of randomly initialized class embeddings,
we use separately learned class prototypes as the conditioning information to
guide the diffusion process. We observe that our method, called ProtoDiffusion,
achieves better performance in the early stages of training compared to the
baseline method, signifying that using the learned prototypes shortens the
training time. We demonstrate the performance of ProtoDiffusion using various
datasets and experimental settings, achieving the best performance in shorter
times across all settings.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 21:18:39 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Baykal",
"Gulcin",
""
],
[
"Karagoz",
"Halil Faruk",
""
],
[
"Binhuraib",
"Taha",
""
],
[
"Unal",
"Gozde",
""
]
] | TITLE: ProtoDiffusion: Classifier-Free Diffusion Guidance with Prototype
Learning
ABSTRACT: Diffusion models are generative models that have shown significant advantages
compared to other generative models in terms of higher generation quality and
more stable training. However, the computational need for training diffusion
models is considerably increased. In this work, we incorporate prototype
learning into diffusion models to achieve high generation quality faster than
the original diffusion model. Instead of randomly initialized class embeddings,
we use separately learned class prototypes as the conditioning information to
guide the diffusion process. We observe that our method, called ProtoDiffusion,
achieves better performance in the early stages of training compared to the
baseline method, signifying that using the learned prototypes shortens the
training time. We demonstrate the performance of ProtoDiffusion using various
datasets and experimental settings, achieving the best performance in shorter
times across all settings.
| no_new_dataset | 0.713188 |
2307.01938 | Daniele Reda | Daniele Reda, Jungdam Won, Yuting Ye, Michiel van de Panne, Alexander
Winkler | Physics-based Motion Retargeting from Sparse Inputs | More info at: https://www.cs.ubc.ca/~dreda/retargeting.html | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Avatars are important to create interactive and immersive experiences in
virtual worlds. One challenge in animating these characters to mimic a user's
motion is that commercial AR/VR products consist only of a headset and
controllers, providing very limited sensor data of the user's pose. Another
challenge is that an avatar might have a different skeleton structure than a
human and the mapping between them is unclear. In this work we address both of
these challenges. We introduce a method to retarget motions in real-time from
sparse human sensor data to characters of various morphologies. Our method uses
reinforcement learning to train a policy to control characters in a physics
simulator. We only require human motion capture data for training, without
relying on artist-generated animations for each avatar. This allows us to use
large motion capture datasets to train general policies that can track unseen
users from real and sparse data in real-time. We demonstrate the feasibility of
our approach on three characters with different skeleton structure: a dinosaur,
a mouse-like creature and a human. We show that the avatar poses often match
the user surprisingly well, despite having no sensor information of the lower
body available. We discuss and ablate the important components in our
framework, specifically the kinematic retargeting step, the imitation, contact
and action reward as well as our asymmetric actor-critic observations. We
further explore the robustness of our method in a variety of settings including
unbalancing, dancing and sports motions.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 21:57:05 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Reda",
"Daniele",
""
],
[
"Won",
"Jungdam",
""
],
[
"Ye",
"Yuting",
""
],
[
"van de Panne",
"Michiel",
""
],
[
"Winkler",
"Alexander",
""
]
] | TITLE: Physics-based Motion Retargeting from Sparse Inputs
ABSTRACT: Avatars are important to create interactive and immersive experiences in
virtual worlds. One challenge in animating these characters to mimic a user's
motion is that commercial AR/VR products consist only of a headset and
controllers, providing very limited sensor data of the user's pose. Another
challenge is that an avatar might have a different skeleton structure than a
human and the mapping between them is unclear. In this work we address both of
these challenges. We introduce a method to retarget motions in real-time from
sparse human sensor data to characters of various morphologies. Our method uses
reinforcement learning to train a policy to control characters in a physics
simulator. We only require human motion capture data for training, without
relying on artist-generated animations for each avatar. This allows us to use
large motion capture datasets to train general policies that can track unseen
users from real and sparse data in real-time. We demonstrate the feasibility of
our approach on three characters with different skeleton structure: a dinosaur,
a mouse-like creature and a human. We show that the avatar poses often match
the user surprisingly well, despite having no sensor information of the lower
body available. We discuss and ablate the important components in our
framework, specifically the kinematic retargeting step, the imitation, contact
and action reward as well as our asymmetric actor-critic observations. We
further explore the robustness of our method in a variety of settings including
unbalancing, dancing and sports motions.
| no_new_dataset | 0.710597 |
2307.01944 | Eric Lei | Eric Lei, Yi\u{g}it Berkay Uslu, Hamed Hassani, Shirin Saeedi Bidokhti | Text + Sketch: Image Compression at Ultra Low Rates | ICML 2023 Neural Compression Workshop | null | null | null | cs.LG cs.CV cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in text-to-image generative models provide the ability to
generate high-quality images from short text descriptions. These foundation
models, when pre-trained on billion-scale datasets, are effective for various
downstream tasks with little or no further training. A natural question to ask
is how such models may be adapted for image compression. We investigate several
techniques in which the pre-trained models can be directly used to implement
compression schemes targeting novel low rate regimes. We show how text
descriptions can be used in conjunction with side information to generate
high-fidelity reconstructions that preserve both semantics and spatial
structure of the original. We demonstrate that at very low bit-rates, our
method can significantly improve upon learned compressors in terms of
perceptual and semantic fidelity, despite no end-to-end training.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 22:26:20 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Lei",
"Eric",
""
],
[
"Uslu",
"Yiğit Berkay",
""
],
[
"Hassani",
"Hamed",
""
],
[
"Bidokhti",
"Shirin Saeedi",
""
]
] | TITLE: Text + Sketch: Image Compression at Ultra Low Rates
ABSTRACT: Recent advances in text-to-image generative models provide the ability to
generate high-quality images from short text descriptions. These foundation
models, when pre-trained on billion-scale datasets, are effective for various
downstream tasks with little or no further training. A natural question to ask
is how such models may be adapted for image compression. We investigate several
techniques in which the pre-trained models can be directly used to implement
compression schemes targeting novel low rate regimes. We show how text
descriptions can be used in conjunction with side information to generate
high-fidelity reconstructions that preserve both semantics and spatial
structure of the original. We demonstrate that at very low bit-rates, our
method can significantly improve upon learned compressors in terms of
perceptual and semantic fidelity, despite no end-to-end training.
| no_new_dataset | 0.709667 |
2307.01945 | Jia-Hong Huang | Jia-Hong Huang, Luka Murn, Marta Mrak, Marcel Worring | Query-based Video Summarization with Pseudo Label Supervision | This paper is accepted by IEEE International Conference on Image
Processing (ICIP), 2023 | null | null | null | cs.CV cs.AI cs.IR | http://creativecommons.org/licenses/by/4.0/ | Existing datasets for manually labelled query-based video summarization are
costly and thus small, limiting the performance of supervised deep video
summarization models. Self-supervision can address the data sparsity challenge
by using a pretext task and defining a method to acquire extra data with pseudo
labels to pre-train a supervised deep model. In this work, we introduce
segment-level pseudo labels from input videos to properly model both the
relationship between a pretext task and a target task, and the implicit
relationship between the pseudo label and the human-defined label. The pseudo
labels are generated based on existing human-defined frame-level labels. To
create more accurate query-dependent video summaries, a semantics booster is
proposed to generate context-aware query representations. Furthermore, we
propose mutual attention to help capture the interactive information between
visual and textual modalities. Three commonly-used video summarization
benchmarks are used to thoroughly validate the proposed approach. Experimental
results show that the proposed video summarization algorithm achieves
state-of-the-art performance.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 22:28:17 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Huang",
"Jia-Hong",
""
],
[
"Murn",
"Luka",
""
],
[
"Mrak",
"Marta",
""
],
[
"Worring",
"Marcel",
""
]
] | TITLE: Query-based Video Summarization with Pseudo Label Supervision
ABSTRACT: Existing datasets for manually labelled query-based video summarization are
costly and thus small, limiting the performance of supervised deep video
summarization models. Self-supervision can address the data sparsity challenge
by using a pretext task and defining a method to acquire extra data with pseudo
labels to pre-train a supervised deep model. In this work, we introduce
segment-level pseudo labels from input videos to properly model both the
relationship between a pretext task and a target task, and the implicit
relationship between the pseudo label and the human-defined label. The pseudo
labels are generated based on existing human-defined frame-level labels. To
create more accurate query-dependent video summaries, a semantics booster is
proposed to generate context-aware query representations. Furthermore, we
propose mutual attention to help capture the interactive information between
visual and textual modalities. Three commonly-used video summarization
benchmarks are used to thoroughly validate the proposed approach. Experimental
results show that the proposed video summarization algorithm achieves
state-of-the-art performance.
| no_new_dataset | 0.708036 |
2307.01947 | Jia-Hong Huang | Jia-Hong Huang, Chao-Han Huck Yang, Pin-Yu Chen, Andrew Brown, Marcel
Worring | Causal Video Summarizer for Video Exploration | This paper is accepted by IEEE International Conference on Multimedia
and Expo (ICME), 2022 | null | null | null | cs.CV cs.AI cs.IR | http://creativecommons.org/licenses/by/4.0/ | Recently, video summarization has been proposed as a method to help video
exploration. However, traditional video summarization models only generate a
fixed video summary which is usually independent of user-specific needs and
hence limits the effectiveness of video exploration. Multi-modal video
summarization is one of the approaches utilized to address this issue.
Multi-modal video summarization has a video input and a text-based query input.
Hence, effective modeling of the interaction between a video input and
text-based query is essential to multi-modal video summarization. In this work,
a new causality-based method named Causal Video Summarizer (CVS) is proposed to
effectively capture the interactive information between the video and query to
tackle the task of multi-modal video summarization. The proposed method
consists of a probabilistic encoder and a probabilistic decoder. Based on the
evaluation of the existing multi-modal video summarization dataset,
experimental results show that the proposed approach is effective with the
increase of +5.4% in accuracy and +4.92% increase of F 1- score, compared with
the state-of-the-art method.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 22:52:16 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Huang",
"Jia-Hong",
""
],
[
"Yang",
"Chao-Han Huck",
""
],
[
"Chen",
"Pin-Yu",
""
],
[
"Brown",
"Andrew",
""
],
[
"Worring",
"Marcel",
""
]
] | TITLE: Causal Video Summarizer for Video Exploration
ABSTRACT: Recently, video summarization has been proposed as a method to help video
exploration. However, traditional video summarization models only generate a
fixed video summary which is usually independent of user-specific needs and
hence limits the effectiveness of video exploration. Multi-modal video
summarization is one of the approaches utilized to address this issue.
Multi-modal video summarization has a video input and a text-based query input.
Hence, effective modeling of the interaction between a video input and
text-based query is essential to multi-modal video summarization. In this work,
a new causality-based method named Causal Video Summarizer (CVS) is proposed to
effectively capture the interactive information between the video and query to
tackle the task of multi-modal video summarization. The proposed method
consists of a probabilistic encoder and a probabilistic decoder. Based on the
evaluation of the existing multi-modal video summarization dataset,
experimental results show that the proposed approach is effective with the
increase of +5.4% in accuracy and +4.92% increase of F 1- score, compared with
the state-of-the-art method.
| no_new_dataset | 0.706222 |
2307.01954 | Pierre Houdouin | Pierre Houdouin and Matthieu Jonckheere and Frederic Pascal | FEMDA: Une m\'ethode de classification robuste et flexible | in French language | null | null | null | stat.ML cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | Linear and Quadratic Discriminant Analysis (LDA and QDA) are well-known
classical methods but can heavily suffer from non-Gaussian distributions and/or
contaminated datasets, mainly because of the underlying Gaussian assumption
that is not robust. This paper studies the robustness to scale changes in the
data of a new discriminant analysis technique where each data point is drawn by
its own arbitrary Elliptically Symmetrical (ES) distribution and its own
arbitrary scale parameter. Such a model allows for possibly very heterogeneous,
independent but non-identically distributed samples. The new decision rule
derived is simple, fast, and robust to scale changes in the data compared to
other state-of-the-art method
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 23:15:31 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Houdouin",
"Pierre",
""
],
[
"Jonckheere",
"Matthieu",
""
],
[
"Pascal",
"Frederic",
""
]
] | TITLE: FEMDA: Une m\'ethode de classification robuste et flexible
ABSTRACT: Linear and Quadratic Discriminant Analysis (LDA and QDA) are well-known
classical methods but can heavily suffer from non-Gaussian distributions and/or
contaminated datasets, mainly because of the underlying Gaussian assumption
that is not robust. This paper studies the robustness to scale changes in the
data of a new discriminant analysis technique where each data point is drawn by
its own arbitrary Elliptically Symmetrical (ES) distribution and its own
arbitrary scale parameter. Such a model allows for possibly very heterogeneous,
independent but non-identically distributed samples. The new decision rule
derived is simple, fast, and robust to scale changes in the data compared to
other state-of-the-art method
| no_new_dataset | 0.711425 |
2307.01956 | Ramviyas Parasuraman | Ehsan Latif and Ramviyas Parasuraman | Instantaneous Wireless Robotic Node Localization Using Collaborative
Direction of Arrival | Accepted to the IEEE Internet of Things Journal. arXiv admin note:
text overlap with arXiv:2201.05105 | null | null | null | cs.RO cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Localizing mobile robotic nodes in indoor and GPS-denied environments is a
complex problem, particularly in dynamic, unstructured scenarios where
traditional cameras and LIDAR-based sensing and localization modalities may
fail. Alternatively, wireless signal-based localization has been extensively
studied in the literature yet primarily focuses on fingerprinting and
feature-matching paradigms, requiring dedicated environment-specific offline
data collection. We propose an online robot localization algorithm enabled by
collaborative wireless sensor nodes to remedy these limitations. Our approach's
core novelty lies in obtaining the Collaborative Direction of Arrival (CDOA) of
wireless signals by exploiting the geometric features and collaboration between
wireless nodes. The CDOA is combined with the Expectation Maximization (EM) and
Particle Filter (PF) algorithms to calculate the Gaussian probability of the
node's location with high efficiency and accuracy. The algorithm relies on
RSSI-only data, making it ubiquitous to resource-constrained devices. We
theoretically analyze the approach and extensively validate the proposed
method's consistency, accuracy, and computational efficiency in simulations,
real-world public datasets, as well as real robot demonstrations. The results
validate the method's real-time computational capability and demonstrate
considerably-high centimeter-level localization accuracy, outperforming
relevant state-of-the-art localization approaches.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 23:27:07 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Latif",
"Ehsan",
""
],
[
"Parasuraman",
"Ramviyas",
""
]
] | TITLE: Instantaneous Wireless Robotic Node Localization Using Collaborative
Direction of Arrival
ABSTRACT: Localizing mobile robotic nodes in indoor and GPS-denied environments is a
complex problem, particularly in dynamic, unstructured scenarios where
traditional cameras and LIDAR-based sensing and localization modalities may
fail. Alternatively, wireless signal-based localization has been extensively
studied in the literature yet primarily focuses on fingerprinting and
feature-matching paradigms, requiring dedicated environment-specific offline
data collection. We propose an online robot localization algorithm enabled by
collaborative wireless sensor nodes to remedy these limitations. Our approach's
core novelty lies in obtaining the Collaborative Direction of Arrival (CDOA) of
wireless signals by exploiting the geometric features and collaboration between
wireless nodes. The CDOA is combined with the Expectation Maximization (EM) and
Particle Filter (PF) algorithms to calculate the Gaussian probability of the
node's location with high efficiency and accuracy. The algorithm relies on
RSSI-only data, making it ubiquitous to resource-constrained devices. We
theoretically analyze the approach and extensively validate the proposed
method's consistency, accuracy, and computational efficiency in simulations,
real-world public datasets, as well as real robot demonstrations. The results
validate the method's real-time computational capability and demonstrate
considerably-high centimeter-level localization accuracy, outperforming
relevant state-of-the-art localization approaches.
| no_new_dataset | 0.710415 |
2307.01957 | Kun Han | Kun Han, Shanlin Sun, Xiaohui Xie | Hybrid Neural Diffeomorphic Flow for Shape Representation and Generation
via Triplane | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Deep Implicit Functions (DIFs) have gained popularity in 3D computer vision
due to their compactness and continuous representation capabilities. However,
addressing dense correspondences and semantic relationships across DIF-encoded
shapes remains a critical challenge, limiting their applications in texture
transfer and shape analysis. Moreover, recent endeavors in 3D shape generation
using DIFs often neglect correspondence and topology preservation. This paper
presents HNDF (Hybrid Neural Diffeomorphic Flow), a method that implicitly
learns the underlying representation and decomposes intricate dense
correspondences into explicitly axis-aligned triplane features. To avoid
suboptimal representations trapped in local minima, we propose hybrid
supervision that captures both local and global correspondences. Unlike
conventional approaches that directly generate new 3D shapes, we further
explore the idea of shape generation with deformed template shape via
diffeomorphic flows, where the deformation is encoded by the generated triplane
features. Leveraging a pre-existing 2D diffusion model, we produce high-quality
and diverse 3D diffeomorphic flows through generated triplanes features,
ensuring topological consistency with the template shape. Extensive experiments
on medical image organ segmentation datasets evaluate the effectiveness of HNDF
in 3D shape representation and generation.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2023 23:28:01 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Han",
"Kun",
""
],
[
"Sun",
"Shanlin",
""
],
[
"Xie",
"Xiaohui",
""
]
] | TITLE: Hybrid Neural Diffeomorphic Flow for Shape Representation and Generation
via Triplane
ABSTRACT: Deep Implicit Functions (DIFs) have gained popularity in 3D computer vision
due to their compactness and continuous representation capabilities. However,
addressing dense correspondences and semantic relationships across DIF-encoded
shapes remains a critical challenge, limiting their applications in texture
transfer and shape analysis. Moreover, recent endeavors in 3D shape generation
using DIFs often neglect correspondence and topology preservation. This paper
presents HNDF (Hybrid Neural Diffeomorphic Flow), a method that implicitly
learns the underlying representation and decomposes intricate dense
correspondences into explicitly axis-aligned triplane features. To avoid
suboptimal representations trapped in local minima, we propose hybrid
supervision that captures both local and global correspondences. Unlike
conventional approaches that directly generate new 3D shapes, we further
explore the idea of shape generation with deformed template shape via
diffeomorphic flows, where the deformation is encoded by the generated triplane
features. Leveraging a pre-existing 2D diffusion model, we produce high-quality
and diverse 3D diffeomorphic flows through generated triplanes features,
ensuring topological consistency with the template shape. Extensive experiments
on medical image organ segmentation datasets evaluate the effectiveness of HNDF
in 3D shape representation and generation.
| no_new_dataset | 0.710879 |
2307.01968 | Shuhao Shi | Shuhao Shi, Kai Qiao, Zhengyan Wang, Jie Yang, Baojie Song, Jian Chen,
Bin Yan | Muti-scale Graph Neural Network with Signed-attention for Social Bot
Detection: A Frequency Perspective | 13 pages, 10 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The presence of a large number of bots on social media has adverse effects.
The graph neural network (GNN) can effectively leverage the social
relationships between users and achieve excellent results in detecting bots.
Recently, more and more GNN-based methods have been proposed for bot detection.
However, the existing GNN-based bot detection methods only focus on
low-frequency information and seldom consider high-frequency information, which
limits the representation ability of the model. To address this issue, this
paper proposes a Multi-scale with Signed-attention Graph Filter for social bot
detection called MSGS. MSGS could effectively utilize both high and
low-frequency information in the social graph. Specifically, MSGS utilizes a
multi-scale structure to produce representation vectors at different scales.
These representations are then combined using a signed-attention mechanism.
Finally, multi-scale representations via MLP after polymerization to produce
the final result. We analyze the frequency response and demonstrate that MSGS
is a more flexible and expressive adaptive graph filter. MSGS can effectively
utilize high-frequency information to alleviate the over-smoothing problem of
deep GNNs. Experimental results on real-world datasets demonstrate that our
method achieves better performance compared with several state-of-the-art
social bot detection methods.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 00:40:19 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Shi",
"Shuhao",
""
],
[
"Qiao",
"Kai",
""
],
[
"Wang",
"Zhengyan",
""
],
[
"Yang",
"Jie",
""
],
[
"Song",
"Baojie",
""
],
[
"Chen",
"Jian",
""
],
[
"Yan",
"Bin",
""
]
] | TITLE: Muti-scale Graph Neural Network with Signed-attention for Social Bot
Detection: A Frequency Perspective
ABSTRACT: The presence of a large number of bots on social media has adverse effects.
The graph neural network (GNN) can effectively leverage the social
relationships between users and achieve excellent results in detecting bots.
Recently, more and more GNN-based methods have been proposed for bot detection.
However, the existing GNN-based bot detection methods only focus on
low-frequency information and seldom consider high-frequency information, which
limits the representation ability of the model. To address this issue, this
paper proposes a Multi-scale with Signed-attention Graph Filter for social bot
detection called MSGS. MSGS could effectively utilize both high and
low-frequency information in the social graph. Specifically, MSGS utilizes a
multi-scale structure to produce representation vectors at different scales.
These representations are then combined using a signed-attention mechanism.
Finally, multi-scale representations via MLP after polymerization to produce
the final result. We analyze the frequency response and demonstrate that MSGS
is a more flexible and expressive adaptive graph filter. MSGS can effectively
utilize high-frequency information to alleviate the over-smoothing problem of
deep GNNs. Experimental results on real-world datasets demonstrate that our
method achieves better performance compared with several state-of-the-art
social bot detection methods.
| no_new_dataset | 0.709403 |
2307.01969 | Bang Yang | Bang Yang, Fenglin Liu, Zheng Li, Qingyu Yin, Chenyu You, Bing Yin,
and Yuexian Zou | Multimodal Prompt Learning for Product Title Generation with Extremely
Limited Labels | accepted by ACL Findings 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generating an informative and attractive title for the product is a crucial
task for e-commerce. Most existing works follow the standard multimodal natural
language generation approaches, e.g., image captioning, and employ the large
scale of human-labelled datasets to train desirable models. However, for novel
products, especially in a different domain, there are few existing labelled
data. In this paper, we propose a prompt-based approach, i.e., the Multimodal
Prompt Learning framework, to accurately and efficiently generate titles for
novel products with limited labels. We observe that the core challenges of
novel product title generation are the understanding of novel product
characteristics and the generation of titles in a novel writing style. To this
end, we build a set of multimodal prompts from different modalities to preserve
the corresponding characteristics and writing styles of novel products. As a
result, with extremely limited labels for training, the proposed method can
retrieve the multimodal prompts to generate desirable titles for novel
products. The experiments and analyses are conducted on five novel product
categories under both the in-domain and out-of-domain experimental settings.
The results show that, with only 1% of downstream labelled data for training,
our proposed approach achieves the best few-shot results and even achieves
competitive results with fully-supervised methods trained on 100% of training
data; With the full labelled data for training, our method achieves
state-of-the-art results.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 00:40:40 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Yang",
"Bang",
""
],
[
"Liu",
"Fenglin",
""
],
[
"Li",
"Zheng",
""
],
[
"Yin",
"Qingyu",
""
],
[
"You",
"Chenyu",
""
],
[
"Yin",
"Bing",
""
],
[
"Zou",
"Yuexian",
""
]
] | TITLE: Multimodal Prompt Learning for Product Title Generation with Extremely
Limited Labels
ABSTRACT: Generating an informative and attractive title for the product is a crucial
task for e-commerce. Most existing works follow the standard multimodal natural
language generation approaches, e.g., image captioning, and employ the large
scale of human-labelled datasets to train desirable models. However, for novel
products, especially in a different domain, there are few existing labelled
data. In this paper, we propose a prompt-based approach, i.e., the Multimodal
Prompt Learning framework, to accurately and efficiently generate titles for
novel products with limited labels. We observe that the core challenges of
novel product title generation are the understanding of novel product
characteristics and the generation of titles in a novel writing style. To this
end, we build a set of multimodal prompts from different modalities to preserve
the corresponding characteristics and writing styles of novel products. As a
result, with extremely limited labels for training, the proposed method can
retrieve the multimodal prompts to generate desirable titles for novel
products. The experiments and analyses are conducted on five novel product
categories under both the in-domain and out-of-domain experimental settings.
The results show that, with only 1% of downstream labelled data for training,
our proposed approach achieves the best few-shot results and even achieves
competitive results with fully-supervised methods trained on 100% of training
data; With the full labelled data for training, our method achieves
state-of-the-art results.
| no_new_dataset | 0.710176 |
2307.01981 | Jiaxiang Liu | Jiaxiang Liu, Tianxiang Hu, Yan Zhang, Xiaotang Gai, Yang Feng, Zuozhu
Liu | A ChatGPT Aided Explainable Framework for Zero-Shot Medical Image
Diagnosis | Workshop on Interpretable ML in Healthcare at International
Conference on Machine Learning (ICML) 2023 | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Zero-shot medical image classification is a critical process in real-world
scenarios where we have limited access to all possible diseases or large-scale
annotated data. It involves computing similarity scores between a query medical
image and possible disease categories to determine the diagnostic result.
Recent advances in pretrained vision-language models (VLMs) such as CLIP have
shown great performance for zero-shot natural image recognition and exhibit
benefits in medical applications. However, an explainable zero-shot medical
image recognition framework with promising performance is yet under
development. In this paper, we propose a novel CLIP-based zero-shot medical
image classification framework supplemented with ChatGPT for explainable
diagnosis, mimicking the diagnostic process performed by human experts. The key
idea is to query large language models (LLMs) with category names to
automatically generate additional cues and knowledge, such as disease symptoms
or descriptions other than a single category name, to help provide more
accurate and explainable diagnosis in CLIP. We further design specific prompts
to enhance the quality of generated texts by ChatGPT that describe visual
medical features. Extensive results on one private dataset and four public
datasets along with detailed analysis demonstrate the effectiveness and
explainability of our training-free zero-shot diagnosis pipeline, corroborating
the great potential of VLMs and LLMs for medical applications.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 01:45:19 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Liu",
"Jiaxiang",
""
],
[
"Hu",
"Tianxiang",
""
],
[
"Zhang",
"Yan",
""
],
[
"Gai",
"Xiaotang",
""
],
[
"Feng",
"Yang",
""
],
[
"Liu",
"Zuozhu",
""
]
] | TITLE: A ChatGPT Aided Explainable Framework for Zero-Shot Medical Image
Diagnosis
ABSTRACT: Zero-shot medical image classification is a critical process in real-world
scenarios where we have limited access to all possible diseases or large-scale
annotated data. It involves computing similarity scores between a query medical
image and possible disease categories to determine the diagnostic result.
Recent advances in pretrained vision-language models (VLMs) such as CLIP have
shown great performance for zero-shot natural image recognition and exhibit
benefits in medical applications. However, an explainable zero-shot medical
image recognition framework with promising performance is yet under
development. In this paper, we propose a novel CLIP-based zero-shot medical
image classification framework supplemented with ChatGPT for explainable
diagnosis, mimicking the diagnostic process performed by human experts. The key
idea is to query large language models (LLMs) with category names to
automatically generate additional cues and knowledge, such as disease symptoms
or descriptions other than a single category name, to help provide more
accurate and explainable diagnosis in CLIP. We further design specific prompts
to enhance the quality of generated texts by ChatGPT that describe visual
medical features. Extensive results on one private dataset and four public
datasets along with detailed analysis demonstrate the effectiveness and
explainability of our training-free zero-shot diagnosis pipeline, corroborating
the great potential of VLMs and LLMs for medical applications.
| no_new_dataset | 0.708767 |
2307.01984 | Nicholas Heller | Nicholas Heller, Fabian Isensee, Dasha Trofimova, Resha Tejpaul,
Zhongchen Zhao, Huai Chen, Lisheng Wang, Alex Golts, Daniel Khapun, Daniel
Shats, Yoel Shoshan, Flora Gilboa-Solomon, Yasmeen George, Xi Yang, Jianpeng
Zhang, Jing Zhang, Yong Xia, Mengran Wu, Zhiyang Liu, Ed Walczak, Sean
McSweeney, Ranveer Vasdev, Chris Hornung, Rafat Solaiman, Jamee
Schoephoerster, Bailey Abernathy, David Wu, Safa Abdulkadir, Ben Byun,
Justice Spriggs, Griffin Struyk, Alexandra Austin, Ben Simpson, Michael
Hagstrom, Sierra Virnig, John French, Nitin Venkatesh, Sarah Chan, Keenan
Moore, Anna Jacobsen, Susan Austin, Mark Austin, Subodh Regmi, Nikolaos
Papanikolopoulos, and Christopher Weight | The KiTS21 Challenge: Automatic segmentation of kidneys, renal tumors,
and renal cysts in corticomedullary-phase CT | 34 pages, 12 figures | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the challenge report for the 2021 Kidney and Kidney Tumor
Segmentation Challenge (KiTS21) held in conjunction with the 2021 international
conference on Medical Image Computing and Computer Assisted Interventions
(MICCAI). KiTS21 is a sequel to its first edition in 2019, and it features a
variety of innovations in how the challenge was designed, in addition to a
larger dataset. A novel annotation method was used to collect three separate
annotations for each region of interest, and these annotations were performed
in a fully transparent setting using a web-based annotation tool. Further, the
KiTS21 test set was collected from an outside institution, challenging
participants to develop methods that generalize well to new populations.
Nonetheless, the top-performing teams achieved a significant improvement over
the state of the art set in 2019, and this performance is shown to inch ever
closer to human-level performance. An in-depth meta-analysis is presented
describing which methods were used and how they faired on the leaderboard, as
well as the characteristics of which cases generally saw good performance, and
which did not. Overall KiTS21 facilitated a significant advancement in the
state of the art in kidney tumor segmentation, and provides useful insights
that are applicable to the field of semantic segmentation as a whole.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 02:00:14 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Heller",
"Nicholas",
""
],
[
"Isensee",
"Fabian",
""
],
[
"Trofimova",
"Dasha",
""
],
[
"Tejpaul",
"Resha",
""
],
[
"Zhao",
"Zhongchen",
""
],
[
"Chen",
"Huai",
""
],
[
"Wang",
"Lisheng",
""
],
[
"Golts",
"Alex",
""
],
[
"Khapun",
"Daniel",
""
],
[
"Shats",
"Daniel",
""
],
[
"Shoshan",
"Yoel",
""
],
[
"Gilboa-Solomon",
"Flora",
""
],
[
"George",
"Yasmeen",
""
],
[
"Yang",
"Xi",
""
],
[
"Zhang",
"Jianpeng",
""
],
[
"Zhang",
"Jing",
""
],
[
"Xia",
"Yong",
""
],
[
"Wu",
"Mengran",
""
],
[
"Liu",
"Zhiyang",
""
],
[
"Walczak",
"Ed",
""
],
[
"McSweeney",
"Sean",
""
],
[
"Vasdev",
"Ranveer",
""
],
[
"Hornung",
"Chris",
""
],
[
"Solaiman",
"Rafat",
""
],
[
"Schoephoerster",
"Jamee",
""
],
[
"Abernathy",
"Bailey",
""
],
[
"Wu",
"David",
""
],
[
"Abdulkadir",
"Safa",
""
],
[
"Byun",
"Ben",
""
],
[
"Spriggs",
"Justice",
""
],
[
"Struyk",
"Griffin",
""
],
[
"Austin",
"Alexandra",
""
],
[
"Simpson",
"Ben",
""
],
[
"Hagstrom",
"Michael",
""
],
[
"Virnig",
"Sierra",
""
],
[
"French",
"John",
""
],
[
"Venkatesh",
"Nitin",
""
],
[
"Chan",
"Sarah",
""
],
[
"Moore",
"Keenan",
""
],
[
"Jacobsen",
"Anna",
""
],
[
"Austin",
"Susan",
""
],
[
"Austin",
"Mark",
""
],
[
"Regmi",
"Subodh",
""
],
[
"Papanikolopoulos",
"Nikolaos",
""
],
[
"Weight",
"Christopher",
""
]
] | TITLE: The KiTS21 Challenge: Automatic segmentation of kidneys, renal tumors,
and renal cysts in corticomedullary-phase CT
ABSTRACT: This paper presents the challenge report for the 2021 Kidney and Kidney Tumor
Segmentation Challenge (KiTS21) held in conjunction with the 2021 international
conference on Medical Image Computing and Computer Assisted Interventions
(MICCAI). KiTS21 is a sequel to its first edition in 2019, and it features a
variety of innovations in how the challenge was designed, in addition to a
larger dataset. A novel annotation method was used to collect three separate
annotations for each region of interest, and these annotations were performed
in a fully transparent setting using a web-based annotation tool. Further, the
KiTS21 test set was collected from an outside institution, challenging
participants to develop methods that generalize well to new populations.
Nonetheless, the top-performing teams achieved a significant improvement over
the state of the art set in 2019, and this performance is shown to inch ever
closer to human-level performance. An in-depth meta-analysis is presented
describing which methods were used and how they faired on the leaderboard, as
well as the characteristics of which cases generally saw good performance, and
which did not. Overall KiTS21 facilitated a significant advancement in the
state of the art in kidney tumor segmentation, and provides useful insights
that are applicable to the field of semantic segmentation as a whole.
| no_new_dataset | 0.581125 |
2307.01990 | Kai Feng | Kai Feng, Yongqiang Zhao, Seong G. Kong, and Haijin Zeng | Unsupervised Spectral Demosaicing with Lightweight Spectral Attention
Networks | null | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a deep learning-based spectral demosaicing technique
trained in an unsupervised manner. Many existing deep learning-based techniques
relying on supervised learning with synthetic images, often underperform on
real-world images especially when the number of spectral bands increases.
According to the characteristics of the spectral mosaic image, this paper
proposes a mosaic loss function, the corresponding model structure, a
transformation strategy, and an early stopping strategy, which form a complete
unsupervised spectral demosaicing framework. A challenge in real-world spectral
demosaicing is inconsistency between the model parameters and the computational
resources of the imager. We reduce the complexity and parameters of the
spectral attention module by dividing the spectral attention tensor into
spectral attention matrices in the spatial dimension and spectral attention
vector in the channel dimension, which is more suitable for unsupervised
framework. This paper also presents Mosaic25, a real 25-band hyperspectral
mosaic image dataset of various objects, illuminations, and materials for
benchmarking. Extensive experiments on synthetic and real-world datasets
demonstrate that the proposed method outperforms conventional unsupervised
methods in terms of spatial distortion suppression, spectral fidelity,
robustness, and computational cost.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 02:45:44 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Feng",
"Kai",
""
],
[
"Zhao",
"Yongqiang",
""
],
[
"Kong",
"Seong G.",
""
],
[
"Zeng",
"Haijin",
""
]
] | TITLE: Unsupervised Spectral Demosaicing with Lightweight Spectral Attention
Networks
ABSTRACT: This paper presents a deep learning-based spectral demosaicing technique
trained in an unsupervised manner. Many existing deep learning-based techniques
relying on supervised learning with synthetic images, often underperform on
real-world images especially when the number of spectral bands increases.
According to the characteristics of the spectral mosaic image, this paper
proposes a mosaic loss function, the corresponding model structure, a
transformation strategy, and an early stopping strategy, which form a complete
unsupervised spectral demosaicing framework. A challenge in real-world spectral
demosaicing is inconsistency between the model parameters and the computational
resources of the imager. We reduce the complexity and parameters of the
spectral attention module by dividing the spectral attention tensor into
spectral attention matrices in the spatial dimension and spectral attention
vector in the channel dimension, which is more suitable for unsupervised
framework. This paper also presents Mosaic25, a real 25-band hyperspectral
mosaic image dataset of various objects, illuminations, and materials for
benchmarking. Extensive experiments on synthetic and real-world datasets
demonstrate that the proposed method outperforms conventional unsupervised
methods in terms of spatial distortion suppression, spectral fidelity,
robustness, and computational cost.
| new_dataset | 0.709573 |
2307.02007 | Liu Chenglong | Chenglong Liu | Remote Sensing Image Change Detection with Graph Interaction | null | null | null | null | cs.CV cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern remote sensing image change detection has witnessed substantial
advancements by harnessing the potent feature extraction capabilities of CNNs
and Transforms.Yet,prevailing change detection techniques consistently
prioritize extracting semantic features related to significant
alterations,overlooking the viability of directly interacting with bitemporal
image features.In this letter,we propose a bitemporal image graph Interaction
network for remote sensing change detection,namely BGINet-CD. More
specifically,by leveraging the concept of non-local operations and mapping the
features obtained from the backbone network to the graph structure space,we
propose a unified self-focus mechanism for bitemporal images.This approach
enhances the information coupling between the two temporal images while
effectively suppressing task-irrelevant interference,Based on a streamlined
backbone architecture,namely ResNet18,our model demonstrates superior
performance compared to other state-of-the-art methods (SOTA) on the GZ CD
dataset. Moreover,the model exhibits an enhanced trade-off between accuracy and
computational efficiency,further improving its overall effectiveness
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 03:32:49 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Liu",
"Chenglong",
""
]
] | TITLE: Remote Sensing Image Change Detection with Graph Interaction
ABSTRACT: Modern remote sensing image change detection has witnessed substantial
advancements by harnessing the potent feature extraction capabilities of CNNs
and Transforms.Yet,prevailing change detection techniques consistently
prioritize extracting semantic features related to significant
alterations,overlooking the viability of directly interacting with bitemporal
image features.In this letter,we propose a bitemporal image graph Interaction
network for remote sensing change detection,namely BGINet-CD. More
specifically,by leveraging the concept of non-local operations and mapping the
features obtained from the backbone network to the graph structure space,we
propose a unified self-focus mechanism for bitemporal images.This approach
enhances the information coupling between the two temporal images while
effectively suppressing task-irrelevant interference,Based on a streamlined
backbone architecture,namely ResNet18,our model demonstrates superior
performance compared to other state-of-the-art methods (SOTA) on the GZ CD
dataset. Moreover,the model exhibits an enhanced trade-off between accuracy and
computational efficiency,further improving its overall effectiveness
| no_new_dataset | 0.708603 |
2307.02019 | Mingchuan Tian | Mingchuan Tian, Wilson Weixun Lu, Kelvin Weng Chiong Foong, Eugene Loh | Generative Adversarial Networks for Dental Patient Identity Protection
in Orthodontic Educational Imaging | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Objectives: This research introduces a novel area-preserving Generative
Adversarial Networks (GAN) inversion technique for effectively de-identifying
dental patient images. This innovative method addresses privacy concerns while
preserving key dental features, thereby generating valuable resources for
dental education and research.
Methods: We enhanced the existing GAN Inversion methodology to maximize the
preservation of dental characteristics within the synthesized images. A
comprehensive technical framework incorporating several deep learning models
was developed to provide end-to-end development guidance and practical
application for image de-identification.
Results: Our approach was assessed with varied facial pictures, extensively
used for diagnosing skeletal asymmetry and facial anomalies. Results
demonstrated our model's ability to adapt the context from one image to
another, maintaining compatibility, while preserving dental features essential
for oral diagnosis and dental education. A panel of five clinicians conducted
an evaluation on a set of original and GAN-processed images. The generated
images achieved effective de-identification, maintaining the realism of
important dental features and were deemed useful for dental diagnostics and
education.
Clinical Significance: Our GAN model and the encompassing framework can
streamline the de-identification process of dental patient images, enhancing
efficiency in dental education. This method improves students' diagnostic
capabilities by offering more exposure to orthodontic malocclusions.
Furthermore, it facilitates the creation of de-identified datasets for broader
2D image research at major research institutions.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 04:14:57 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Tian",
"Mingchuan",
""
],
[
"Lu",
"Wilson Weixun",
""
],
[
"Foong",
"Kelvin Weng Chiong",
""
],
[
"Loh",
"Eugene",
""
]
] | TITLE: Generative Adversarial Networks for Dental Patient Identity Protection
in Orthodontic Educational Imaging
ABSTRACT: Objectives: This research introduces a novel area-preserving Generative
Adversarial Networks (GAN) inversion technique for effectively de-identifying
dental patient images. This innovative method addresses privacy concerns while
preserving key dental features, thereby generating valuable resources for
dental education and research.
Methods: We enhanced the existing GAN Inversion methodology to maximize the
preservation of dental characteristics within the synthesized images. A
comprehensive technical framework incorporating several deep learning models
was developed to provide end-to-end development guidance and practical
application for image de-identification.
Results: Our approach was assessed with varied facial pictures, extensively
used for diagnosing skeletal asymmetry and facial anomalies. Results
demonstrated our model's ability to adapt the context from one image to
another, maintaining compatibility, while preserving dental features essential
for oral diagnosis and dental education. A panel of five clinicians conducted
an evaluation on a set of original and GAN-processed images. The generated
images achieved effective de-identification, maintaining the realism of
important dental features and were deemed useful for dental diagnostics and
education.
Clinical Significance: Our GAN model and the encompassing framework can
streamline the de-identification process of dental patient images, enhancing
efficiency in dental education. This method improves students' diagnostic
capabilities by offering more exposure to orthodontic malocclusions.
Furthermore, it facilitates the creation of de-identified datasets for broader
2D image research at major research institutions.
| no_new_dataset | 0.710019 |
2307.02041 | Junyu Gao | Jie Fu, Junyu Gao, Changsheng Xu | Multimodal Imbalance-Aware Gradient Modulation for Weakly-supervised
Audio-Visual Video Parsing | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Weakly-supervised audio-visual video parsing (WS-AVVP) aims to localize the
temporal extents of audio, visual and audio-visual event instances as well as
identify the corresponding event categories with only video-level category
labels for training. Most previous methods pay much attention to refining the
supervision for each modality or extracting fruitful cross-modality information
for more reliable feature learning. None of them have noticed the imbalanced
feature learning between different modalities in the task. In this paper, to
balance the feature learning processes of different modalities, a dynamic
gradient modulation (DGM) mechanism is explored, where a novel and effective
metric function is designed to measure the imbalanced feature learning between
audio and visual modalities. Furthermore, principle analysis indicates that the
multimodal confusing calculation will hamper the precise measurement of
multimodal imbalanced feature learning, which further weakens the effectiveness
of our DGM mechanism. To cope with this issue, a modality-separated decision
unit (MSDU) is designed for more precise measurement of imbalanced feature
learning between audio and visual modalities. Comprehensive experiments are
conducted on public benchmarks and the corresponding experimental results
demonstrate the effectiveness of our proposed method.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 05:55:10 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Fu",
"Jie",
""
],
[
"Gao",
"Junyu",
""
],
[
"Xu",
"Changsheng",
""
]
] | TITLE: Multimodal Imbalance-Aware Gradient Modulation for Weakly-supervised
Audio-Visual Video Parsing
ABSTRACT: Weakly-supervised audio-visual video parsing (WS-AVVP) aims to localize the
temporal extents of audio, visual and audio-visual event instances as well as
identify the corresponding event categories with only video-level category
labels for training. Most previous methods pay much attention to refining the
supervision for each modality or extracting fruitful cross-modality information
for more reliable feature learning. None of them have noticed the imbalanced
feature learning between different modalities in the task. In this paper, to
balance the feature learning processes of different modalities, a dynamic
gradient modulation (DGM) mechanism is explored, where a novel and effective
metric function is designed to measure the imbalanced feature learning between
audio and visual modalities. Furthermore, principle analysis indicates that the
multimodal confusing calculation will hamper the precise measurement of
multimodal imbalanced feature learning, which further weakens the effectiveness
of our DGM mechanism. To cope with this issue, a modality-separated decision
unit (MSDU) is designed for more precise measurement of imbalanced feature
learning between audio and visual modalities. Comprehensive experiments are
conducted on public benchmarks and the corresponding experimental results
demonstrate the effectiveness of our proposed method.
| no_new_dataset | 0.710069 |
2307.02049 | Mingjian Tuo | Mingjian Tuo, Xingpeng Li, Tianxia Zhao | Graph Neural Network-based Power Flow Model | arXiv admin note: text overlap with arXiv:2112.08418 | null | null | null | eess.SY cs.LG cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Power flow analysis plays a crucial role in examining the electricity flow
within a power system network. By performing power flow calculations, the
system's steady-state variables, including voltage magnitude, phase angle at
each bus, active/reactive power flow across branches, can be determined. While
the widely used DC power flow model offers speed and robustness, it may yield
inaccurate line flow results for certain transmission lines. This issue becomes
more critical when dealing with renewable energy sources such as wind farms,
which are often located far from the main grid. Obtaining precise line flow
results for these critical lines is vital for next operations. To address these
challenges, data-driven approaches leverage historical grid profiles. In this
paper, a graph neural network (GNN) model is trained using historical power
system data to predict power flow outcomes. The GNN model enables rapid
estimation of line flows. A comprehensive performance analysis is conducted,
comparing the proposed GNN-based power flow model with the traditional DC power
flow model, as well as deep neural network (DNN) and convolutional neural
network (CNN). The results on test systems demonstrate that the proposed
GNN-based power flow model provides more accurate solutions with high
efficiency comparing to benchmark models.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 06:09:25 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Tuo",
"Mingjian",
""
],
[
"Li",
"Xingpeng",
""
],
[
"Zhao",
"Tianxia",
""
]
] | TITLE: Graph Neural Network-based Power Flow Model
ABSTRACT: Power flow analysis plays a crucial role in examining the electricity flow
within a power system network. By performing power flow calculations, the
system's steady-state variables, including voltage magnitude, phase angle at
each bus, active/reactive power flow across branches, can be determined. While
the widely used DC power flow model offers speed and robustness, it may yield
inaccurate line flow results for certain transmission lines. This issue becomes
more critical when dealing with renewable energy sources such as wind farms,
which are often located far from the main grid. Obtaining precise line flow
results for these critical lines is vital for next operations. To address these
challenges, data-driven approaches leverage historical grid profiles. In this
paper, a graph neural network (GNN) model is trained using historical power
system data to predict power flow outcomes. The GNN model enables rapid
estimation of line flows. A comprehensive performance analysis is conducted,
comparing the proposed GNN-based power flow model with the traditional DC power
flow model, as well as deep neural network (DNN) and convolutional neural
network (CNN). The results on test systems demonstrate that the proposed
GNN-based power flow model provides more accurate solutions with high
efficiency comparing to benchmark models.
| no_new_dataset | 0.711005 |
2307.02053 | Soujanya Poria | Deepanway Ghosal, Yew Ken Chia, Navonil Majumder, Soujanya Poria | Flacuna: Unleashing the Problem Solving Power of Vicuna using FLAN
Fine-Tuning | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Recently, the release of INSTRUCTEVAL has provided valuable insights into the
performance of large language models (LLMs) that utilize encoder-decoder or
decoder-only architecture. Interestingly, despite being introduced four years
ago, T5-based LLMs, such as FLAN-T5, continue to outperform the latest
decoder-based LLMs, such as LLAMA and VICUNA, on tasks that require general
problem-solving skills. This performance discrepancy can be attributed to three
key factors: (1) Pre-training data, (2) Backbone architecture, and (3)
Instruction dataset. In this technical report, our main focus is on
investigating the impact of the third factor by leveraging VICUNA, a large
language model based on LLAMA, which has undergone fine-tuning on ChatGPT
conversations. To achieve this objective, we fine-tuned VICUNA using a
customized instruction dataset collection called FLANMINI. This collection
includes a subset of the large-scale instruction dataset known as FLAN, as well
as various code-related datasets and conversational datasets derived from
ChatGPT/GPT-4. This dataset comprises a large number of tasks that demand
problem-solving skills. Our experimental findings strongly indicate that the
enhanced problem-solving abilities of our model, FLACUNA, are obtained through
fine-tuning VICUNA on the FLAN dataset, leading to significant improvements
across numerous benchmark datasets in INSTRUCTEVAL. FLACUNA is publicly
available at https://huggingface.co/declare-lab/flacuna-13b-v1.0.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 06:36:54 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Ghosal",
"Deepanway",
""
],
[
"Chia",
"Yew Ken",
""
],
[
"Majumder",
"Navonil",
""
],
[
"Poria",
"Soujanya",
""
]
] | TITLE: Flacuna: Unleashing the Problem Solving Power of Vicuna using FLAN
Fine-Tuning
ABSTRACT: Recently, the release of INSTRUCTEVAL has provided valuable insights into the
performance of large language models (LLMs) that utilize encoder-decoder or
decoder-only architecture. Interestingly, despite being introduced four years
ago, T5-based LLMs, such as FLAN-T5, continue to outperform the latest
decoder-based LLMs, such as LLAMA and VICUNA, on tasks that require general
problem-solving skills. This performance discrepancy can be attributed to three
key factors: (1) Pre-training data, (2) Backbone architecture, and (3)
Instruction dataset. In this technical report, our main focus is on
investigating the impact of the third factor by leveraging VICUNA, a large
language model based on LLAMA, which has undergone fine-tuning on ChatGPT
conversations. To achieve this objective, we fine-tuned VICUNA using a
customized instruction dataset collection called FLANMINI. This collection
includes a subset of the large-scale instruction dataset known as FLAN, as well
as various code-related datasets and conversational datasets derived from
ChatGPT/GPT-4. This dataset comprises a large number of tasks that demand
problem-solving skills. Our experimental findings strongly indicate that the
enhanced problem-solving abilities of our model, FLACUNA, are obtained through
fine-tuning VICUNA on the FLAN dataset, leading to significant improvements
across numerous benchmark datasets in INSTRUCTEVAL. FLACUNA is publicly
available at https://huggingface.co/declare-lab/flacuna-13b-v1.0.
| new_dataset | 0.72193 |
2307.02055 | Jaydip Sen Prof | Jaydip Sen and Subhasis Dasgupta | Adversarial Attacks on Image Classification Models: FGSM and Patch
Attacks and their Impact | This is the preprint of the chapter titled "Adversarial Attacks on
Image Classification Models: FGSM and Patch Attacks and their Impact" which
will be published in the volume titled "Information Security and Privacy in
the Digital World - Some Selected Cases", edited by Jaydip Sen. The book will
be published by IntechOpen, London, UK, in 2023. This is not the final
version of the chapter | null | null | null | cs.CV cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This chapter introduces the concept of adversarial attacks on image
classification models built on convolutional neural networks (CNN). CNNs are
very popular deep-learning models which are used in image classification tasks.
However, very powerful and pre-trained CNN models working very accurately on
image datasets for image classification tasks may perform disastrously when the
networks are under adversarial attacks. In this work, two very well-known
adversarial attacks are discussed and their impact on the performance of image
classifiers is analyzed. These two adversarial attacks are the fast gradient
sign method (FGSM) and adversarial patch attack. These attacks are launched on
three powerful pre-trained image classifier architectures, ResNet-34,
GoogleNet, and DenseNet-161. The classification accuracy of the models in the
absence and presence of the two attacks are computed on images from the
publicly accessible ImageNet dataset. The results are analyzed to evaluate the
impact of the attacks on the image classification task.
| [
{
"version": "v1",
"created": "Wed, 5 Jul 2023 06:40:08 GMT"
}
] | 2023-07-06T00:00:00 | [
[
"Sen",
"Jaydip",
""
],
[
"Dasgupta",
"Subhasis",
""
]
] | TITLE: Adversarial Attacks on Image Classification Models: FGSM and Patch
Attacks and their Impact
ABSTRACT: This chapter introduces the concept of adversarial attacks on image
classification models built on convolutional neural networks (CNN). CNNs are
very popular deep-learning models which are used in image classification tasks.
However, very powerful and pre-trained CNN models working very accurately on
image datasets for image classification tasks may perform disastrously when the
networks are under adversarial attacks. In this work, two very well-known
adversarial attacks are discussed and their impact on the performance of image
classifiers is analyzed. These two adversarial attacks are the fast gradient
sign method (FGSM) and adversarial patch attack. These attacks are launched on
three powerful pre-trained image classifier architectures, ResNet-34,
GoogleNet, and DenseNet-161. The classification accuracy of the models in the
absence and presence of the two attacks are computed on images from the
publicly accessible ImageNet dataset. The results are analyzed to evaluate the
impact of the attacks on the image classification task.
| no_new_dataset | 0.712226 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.