id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2303.14464 | Ana Ozaki | Emilia Przybysz and Bimal Bhattarai and Cosimo Persia and Ana Ozaki
and Ole-Christoffer Granmo and Jivitesh Sharma | Verifying Properties of Tsetlin Machines | 12 pages, accepted at ISTM (https://istm.no/) | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Tsetlin Machines (TsMs) are a promising and interpretable machine learning
method which can be applied for various classification tasks. We present an
exact encoding of TsMs into propositional logic and formally verify properties
of TsMs using a SAT solver. In particular, we introduce in this work a notion
of similarity of machine learning models and apply our notion to check for
similarity of TsMs. We also consider notions of robustness and equivalence from
the literature and adapt them for TsMs. Then, we show the correctness of our
encoding and provide results for the properties: adversarial robustness,
equivalence, and similarity of TsMs. In our experiments, we employ the MNIST
and IMDB datasets for (respectively) image and sentiment classification. We
discuss the results for verifying robustness obtained with TsMs with those in
the literature obtained with Binarized Neural Networks on MNIST.
| [
{
"version": "v1",
"created": "Sat, 25 Mar 2023 13:17:21 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jul 2023 13:47:37 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Przybysz",
"Emilia",
""
],
[
"Bhattarai",
"Bimal",
""
],
[
"Persia",
"Cosimo",
""
],
[
"Ozaki",
"Ana",
""
],
[
"Granmo",
"Ole-Christoffer",
""
],
[
"Sharma",
"Jivitesh",
""
]
] | TITLE: Verifying Properties of Tsetlin Machines
ABSTRACT: Tsetlin Machines (TsMs) are a promising and interpretable machine learning
method which can be applied for various classification tasks. We present an
exact encoding of TsMs into propositional logic and formally verify properties
of TsMs using a SAT solver. In particular, we introduce in this work a notion
of similarity of machine learning models and apply our notion to check for
similarity of TsMs. We also consider notions of robustness and equivalence from
the literature and adapt them for TsMs. Then, we show the correctness of our
encoding and provide results for the properties: adversarial robustness,
equivalence, and similarity of TsMs. In our experiments, we employ the MNIST
and IMDB datasets for (respectively) image and sentiment classification. We
discuss the results for verifying robustness obtained with TsMs with those in
the literature obtained with Binarized Neural Networks on MNIST.
| no_new_dataset | 0.711469 |
2304.01117 | Fabricio Olivetti de Franca | F. O. de Franca, M. Virgolin, M. Kommenda, M. S. Majumder, M. Cranmer,
G. Espada, L. Ingelse, A. Fonseca, M. Landajuela, B. Petersen, R. Glatt, N.
Mundhenk, C. S. Lee, J. D. Hochhalter, D. L. Randall, P. Kamienny, H. Zhang,
G. Dick, A. Simon, B. Burlacu, Jaan Kasak, Meera Machado, Casper Wilstrup, W.
G. La Cava | Interpretable Symbolic Regression for Data Science: Analysis of the 2022
Competition | 13 pages, 13 figures, submitted to IEEE Transactions on Evolutionary
Computation | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Symbolic regression searches for analytic expressions that accurately
describe studied phenomena. The main attraction of this approach is that it
returns an interpretable model that can be insightful to users. Historically,
the majority of algorithms for symbolic regression have been based on
evolutionary algorithms. However, there has been a recent surge of new
proposals that instead utilize approaches such as enumeration algorithms, mixed
linear integer programming, neural networks, and Bayesian optimization. In
order to assess how well these new approaches behave on a set of common
challenges often faced in real-world data, we hosted a competition at the 2022
Genetic and Evolutionary Computation Conference consisting of different
synthetic and real-world datasets which were blind to entrants. For the
real-world track, we assessed interpretability in a realistic way by using a
domain expert to judge the trustworthiness of candidate models.We present an
in-depth analysis of the results obtained in this competition, discuss current
challenges of symbolic regression algorithms and highlight possible
improvements for future competitions.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 16:30:20 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2023 15:47:10 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 11:31:36 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"de Franca",
"F. O.",
""
],
[
"Virgolin",
"M.",
""
],
[
"Kommenda",
"M.",
""
],
[
"Majumder",
"M. S.",
""
],
[
"Cranmer",
"M.",
""
],
[
"Espada",
"G.",
""
],
[
"Ingelse",
"L.",
""
],
[
"Fonseca",
"A.",
""
],
[
"Landajuela",
"M.",
""
],
[
"Petersen",
"B.",
""
],
[
"Glatt",
"R.",
""
],
[
"Mundhenk",
"N.",
""
],
[
"Lee",
"C. S.",
""
],
[
"Hochhalter",
"J. D.",
""
],
[
"Randall",
"D. L.",
""
],
[
"Kamienny",
"P.",
""
],
[
"Zhang",
"H.",
""
],
[
"Dick",
"G.",
""
],
[
"Simon",
"A.",
""
],
[
"Burlacu",
"B.",
""
],
[
"Kasak",
"Jaan",
""
],
[
"Machado",
"Meera",
""
],
[
"Wilstrup",
"Casper",
""
],
[
"La Cava",
"W. G.",
""
]
] | TITLE: Interpretable Symbolic Regression for Data Science: Analysis of the 2022
Competition
ABSTRACT: Symbolic regression searches for analytic expressions that accurately
describe studied phenomena. The main attraction of this approach is that it
returns an interpretable model that can be insightful to users. Historically,
the majority of algorithms for symbolic regression have been based on
evolutionary algorithms. However, there has been a recent surge of new
proposals that instead utilize approaches such as enumeration algorithms, mixed
linear integer programming, neural networks, and Bayesian optimization. In
order to assess how well these new approaches behave on a set of common
challenges often faced in real-world data, we hosted a competition at the 2022
Genetic and Evolutionary Computation Conference consisting of different
synthetic and real-world datasets which were blind to entrants. For the
real-world track, we assessed interpretability in a realistic way by using a
domain expert to judge the trustworthiness of candidate models.We present an
in-depth analysis of the results obtained in this competition, discuss current
challenges of symbolic regression algorithms and highlight possible
improvements for future competitions.
| no_new_dataset | 0.70477 |
2304.05841 | Nicola Dall'Asen | Anil Osman Tur and Nicola Dall'Asen and Cigdem Beyan and Elisa Ricci | Exploring Diffusion Models for Unsupervised Video Anomaly Detection | Accepted to IEEE ICIP 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | This paper investigates the performance of diffusion models for video anomaly
detection (VAD) within the most challenging but also the most operational
scenario in which the data annotations are not used. As being sparse, diverse,
contextual, and often ambiguous, detecting abnormal events precisely is a very
ambitious task. To this end, we rely only on the information-rich
spatio-temporal data, and the reconstruction power of the diffusion models such
that a high reconstruction error is utilized to decide the abnormality.
Experiments performed on two large-scale video anomaly detection datasets
demonstrate the consistent improvement of the proposed method over the
state-of-the-art generative models while in some cases our method achieves
better scores than the more complex models. This is the first study using a
diffusion model and examining its parameters' influence to present guidance for
VAD in surveillance scenarios.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2023 13:16:07 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jul 2023 08:55:34 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tur",
"Anil Osman",
""
],
[
"Dall'Asen",
"Nicola",
""
],
[
"Beyan",
"Cigdem",
""
],
[
"Ricci",
"Elisa",
""
]
] | TITLE: Exploring Diffusion Models for Unsupervised Video Anomaly Detection
ABSTRACT: This paper investigates the performance of diffusion models for video anomaly
detection (VAD) within the most challenging but also the most operational
scenario in which the data annotations are not used. As being sparse, diverse,
contextual, and often ambiguous, detecting abnormal events precisely is a very
ambitious task. To this end, we rely only on the information-rich
spatio-temporal data, and the reconstruction power of the diffusion models such
that a high reconstruction error is utilized to decide the abnormality.
Experiments performed on two large-scale video anomaly detection datasets
demonstrate the consistent improvement of the proposed method over the
state-of-the-art generative models while in some cases our method achieves
better scores than the more complex models. This is the first study using a
diffusion model and examining its parameters' influence to present guidance for
VAD in surveillance scenarios.
| no_new_dataset | 0.711418 |
2304.06968 | Sireesha Chamarthi | Katharina Fogelberg, Sireesha Chamarthi, Roman C. Maron, Julia
Niebling, Titus J. Brinker | Domain shifts in dermoscopic skin cancer datasets: Evaluation of
essential limitations for clinical translation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The limited ability of Convolutional Neural Networks to generalize to images
from previously unseen domains is a major limitation, in particular, for
safety-critical clinical tasks such as dermoscopic skin cancer classification.
In order to translate CNN-based applications into the clinic, it is essential
that they are able to adapt to domain shifts. Such new conditions can arise
through the use of different image acquisition systems or varying lighting
conditions. In dermoscopy, shifts can also occur as a change in patient age or
occurence of rare lesion localizations (e.g. palms). These are not prominently
represented in most training datasets and can therefore lead to a decrease in
performance. In order to verify the generalizability of classification models
in real world clinical settings it is crucial to have access to data which
mimics such domain shifts. To our knowledge no dermoscopic image dataset exists
where such domain shifts are properly described and quantified. We therefore
grouped publicly available images from ISIC archive based on their metadata
(e.g. acquisition location, lesion localization, patient age) to generate
meaningful domains. To verify that these domains are in fact distinct, we used
multiple quantification measures to estimate the presence and intensity of
domain shifts. Additionally, we analyzed the performance on these domains with
and without an unsupervised domain adaptation technique. We observed that in
most of our grouped domains, domain shifts in fact exist. Based on our results,
we believe these datasets to be helpful for testing the generalization
capabilities of dermoscopic skin cancer classifiers.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 07:38:09 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2023 08:20:40 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 08:40:03 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Fogelberg",
"Katharina",
""
],
[
"Chamarthi",
"Sireesha",
""
],
[
"Maron",
"Roman C.",
""
],
[
"Niebling",
"Julia",
""
],
[
"Brinker",
"Titus J.",
""
]
] | TITLE: Domain shifts in dermoscopic skin cancer datasets: Evaluation of
essential limitations for clinical translation
ABSTRACT: The limited ability of Convolutional Neural Networks to generalize to images
from previously unseen domains is a major limitation, in particular, for
safety-critical clinical tasks such as dermoscopic skin cancer classification.
In order to translate CNN-based applications into the clinic, it is essential
that they are able to adapt to domain shifts. Such new conditions can arise
through the use of different image acquisition systems or varying lighting
conditions. In dermoscopy, shifts can also occur as a change in patient age or
occurence of rare lesion localizations (e.g. palms). These are not prominently
represented in most training datasets and can therefore lead to a decrease in
performance. In order to verify the generalizability of classification models
in real world clinical settings it is crucial to have access to data which
mimics such domain shifts. To our knowledge no dermoscopic image dataset exists
where such domain shifts are properly described and quantified. We therefore
grouped publicly available images from ISIC archive based on their metadata
(e.g. acquisition location, lesion localization, patient age) to generate
meaningful domains. To verify that these domains are in fact distinct, we used
multiple quantification measures to estimate the presence and intensity of
domain shifts. Additionally, we analyzed the performance on these domains with
and without an unsupervised domain adaptation technique. We observed that in
most of our grouped domains, domain shifts in fact exist. Based on our results,
we believe these datasets to be helpful for testing the generalization
capabilities of dermoscopic skin cancer classifiers.
| no_new_dataset | 0.691562 |
2304.08158 | Guillaume Salha-Galvan | Viet-Anh Tran and Guillaume Salha-Galvan and Bruno Sguerra and Romain
Hennequin | Attention Mixtures for Time-Aware Sequential Recommendation | SIGIR 2023 | null | null | null | cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformers emerged as powerful methods for sequential recommendation.
However, existing architectures often overlook the complex dependencies between
user preferences and the temporal context. In this short paper, we introduce
MOJITO, an improved Transformer sequential recommender system that addresses
this limitation. MOJITO leverages Gaussian mixtures of attention-based temporal
context and item embedding representations for sequential modeling. Such an
approach permits to accurately predict which items should be recommended next
to users depending on past actions and the temporal context. We demonstrate the
relevance of our approach, by empirically outperforming existing Transformers
for sequential recommendation on several real-world datasets.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2023 11:11:19 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 08:52:37 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tran",
"Viet-Anh",
""
],
[
"Salha-Galvan",
"Guillaume",
""
],
[
"Sguerra",
"Bruno",
""
],
[
"Hennequin",
"Romain",
""
]
] | TITLE: Attention Mixtures for Time-Aware Sequential Recommendation
ABSTRACT: Transformers emerged as powerful methods for sequential recommendation.
However, existing architectures often overlook the complex dependencies between
user preferences and the temporal context. In this short paper, we introduce
MOJITO, an improved Transformer sequential recommender system that addresses
this limitation. MOJITO leverages Gaussian mixtures of attention-based temporal
context and item embedding representations for sequential modeling. Such an
approach permits to accurately predict which items should be recommended next
to users depending on past actions and the temporal context. We demonstrate the
relevance of our approach, by empirically outperforming existing Transformers
for sequential recommendation on several real-world datasets.
| no_new_dataset | 0.708395 |
2304.11436 | Hideaki Takahashi | Hideaki Takahashi, Jingjing Liu, and Yang Liu | Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack | null | null | null | null | cs.CR cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Federated Learning with Model Distillation (FedMD) is a nascent collaborative
learning paradigm, where only output logits of public datasets are transmitted
as distilled knowledge, instead of passing on private model parameters that are
susceptible to gradient inversion attacks, a known privacy risk in federated
learning. In this paper, we found that even though sharing output logits of
public datasets is safer than directly sharing gradients, there still exists a
substantial risk of data exposure caused by carefully designed malicious
attacks. Our study shows that a malicious server can inject a PLI
(Paired-Logits Inversion) attack against FedMD and its variants by training an
inversion neural network that exploits the confidence gap between the server
and client models. Experiments on multiple facial recognition datasets validate
that under FedMD-like schemes, by using paired server-client logits of public
datasets only, the malicious server is able to reconstruct private images on
all tested benchmarks with a high success rate.
| [
{
"version": "v1",
"created": "Sat, 22 Apr 2023 15:56:11 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jul 2023 05:56:18 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Takahashi",
"Hideaki",
""
],
[
"Liu",
"Jingjing",
""
],
[
"Liu",
"Yang",
""
]
] | TITLE: Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack
ABSTRACT: Federated Learning with Model Distillation (FedMD) is a nascent collaborative
learning paradigm, where only output logits of public datasets are transmitted
as distilled knowledge, instead of passing on private model parameters that are
susceptible to gradient inversion attacks, a known privacy risk in federated
learning. In this paper, we found that even though sharing output logits of
public datasets is safer than directly sharing gradients, there still exists a
substantial risk of data exposure caused by carefully designed malicious
attacks. Our study shows that a malicious server can inject a PLI
(Paired-Logits Inversion) attack against FedMD and its variants by training an
inversion neural network that exploits the confidence gap between the server
and client models. Experiments on multiple facial recognition datasets validate
that under FedMD-like schemes, by using paired server-client logits of public
datasets only, the malicious server is able to reconstruct private images on
all tested benchmarks with a high success rate.
| no_new_dataset | 0.709806 |
2304.13632 | Hossein Rezaei | Hossein Rezaei, Thushan Sivalingam, Nandana Rajatheva | Automatic and Flexible Transmission of Semantic Map Images using Polar
Codes for End-to-End Semantic-based Communication Systems | null | null | null | null | cs.IT cs.DB math.IT | http://creativecommons.org/licenses/by/4.0/ | Semantic communication represents a promising roadmap toward achieving
end-to-end communication with reduced communication overhead and an enhanced
user experience. The integration of semantic concepts with wireless
communications presents novel challenges. This paper proposes a flexible
simulation software that automatically transmits semantic segmentation map
images over a communication channel. An additive white Gaussian noise (AWGN)
channel using binary phase-shift keying (BPSK) modulation is considered as the
channel setup. The well-known polar codes are chosen as the channel coding
scheme. The popular COCO-Stuff dataset is used as an example to generate
semantic map images corresponding to different signal-to-noise ratios (SNRs).
To evaluate the proposed software, we have generated four small datasets, each
containing a thousand semantic map samples, accompanied by comprehensive
information corresponding to each image, including the polar code
specifications, detailed image attributes, bit error rate (BER), and frame
error rate (FER). The capacity to generate an unlimited number of semantic maps
utilizing desired channel coding parameters and preferred SNR, in conjunction
with the flexibility of using alternative datasets, renders our simulation
software highly adaptable and transferable to a broad range of use cases.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 15:41:57 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 13:55:48 GMT"
},
{
"version": "v3",
"created": "Sun, 7 May 2023 07:01:57 GMT"
},
{
"version": "v4",
"created": "Sat, 13 May 2023 17:59:11 GMT"
},
{
"version": "v5",
"created": "Fri, 30 Jun 2023 18:49:23 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Rezaei",
"Hossein",
""
],
[
"Sivalingam",
"Thushan",
""
],
[
"Rajatheva",
"Nandana",
""
]
] | TITLE: Automatic and Flexible Transmission of Semantic Map Images using Polar
Codes for End-to-End Semantic-based Communication Systems
ABSTRACT: Semantic communication represents a promising roadmap toward achieving
end-to-end communication with reduced communication overhead and an enhanced
user experience. The integration of semantic concepts with wireless
communications presents novel challenges. This paper proposes a flexible
simulation software that automatically transmits semantic segmentation map
images over a communication channel. An additive white Gaussian noise (AWGN)
channel using binary phase-shift keying (BPSK) modulation is considered as the
channel setup. The well-known polar codes are chosen as the channel coding
scheme. The popular COCO-Stuff dataset is used as an example to generate
semantic map images corresponding to different signal-to-noise ratios (SNRs).
To evaluate the proposed software, we have generated four small datasets, each
containing a thousand semantic map samples, accompanied by comprehensive
information corresponding to each image, including the polar code
specifications, detailed image attributes, bit error rate (BER), and frame
error rate (FER). The capacity to generate an unlimited number of semantic maps
utilizing desired channel coding parameters and preferred SNR, in conjunction
with the flexibility of using alternative datasets, renders our simulation
software highly adaptable and transferable to a broad range of use cases.
| new_dataset | 0.709799 |
2304.14005 | Mijeong Kim | Mijeong Kim, Hyunjoon Lee, Bohyung Han | ContraNeRF: 3D-Aware Generative Model via Contrastive Learning with
Unsupervised Implicit Pose Embedding | 20 pages. For the project page, see
https://cv.snu.ac.kr/research/ContraNeRF/ | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Although 3D-aware GANs based on neural radiance fields have achieved
competitive performance, their applicability is still limited to objects or
scenes with the ground-truths or prediction models for clearly defined
canonical camera poses. To extend the scope of applicable datasets, we propose
a novel 3D-aware GAN optimization technique through contrastive learning with
implicit pose embeddings. To this end, we first revise the discriminator design
and remove dependency on ground-truth camera poses. Then, to capture complex
and challenging 3D scene structures more effectively, we make the discriminator
estimate a high-dimensional implicit pose embedding from a given image and
perform contrastive learning on the pose embedding. The proposed approach can
be employed for the dataset, where the canonical camera pose is ill-defined
because it does not look up or estimate camera poses. Experimental results show
that our algorithm outperforms existing methods by large margins on the
datasets with multiple object categories and inconsistent canonical camera
poses.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 07:53:13 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 11:34:38 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Kim",
"Mijeong",
""
],
[
"Lee",
"Hyunjoon",
""
],
[
"Han",
"Bohyung",
""
]
] | TITLE: ContraNeRF: 3D-Aware Generative Model via Contrastive Learning with
Unsupervised Implicit Pose Embedding
ABSTRACT: Although 3D-aware GANs based on neural radiance fields have achieved
competitive performance, their applicability is still limited to objects or
scenes with the ground-truths or prediction models for clearly defined
canonical camera poses. To extend the scope of applicable datasets, we propose
a novel 3D-aware GAN optimization technique through contrastive learning with
implicit pose embeddings. To this end, we first revise the discriminator design
and remove dependency on ground-truth camera poses. Then, to capture complex
and challenging 3D scene structures more effectively, we make the discriminator
estimate a high-dimensional implicit pose embedding from a given image and
perform contrastive learning on the pose embedding. The proposed approach can
be employed for the dataset, where the canonical camera pose is ill-defined
because it does not look up or estimate camera poses. Experimental results show
that our algorithm outperforms existing methods by large margins on the
datasets with multiple object categories and inconsistent canonical camera
poses.
| no_new_dataset | 0.710189 |
2305.00068 | Soheila Hatami | Javad Khoramdel, Soheila Hatami, Majid Sadedel | Wearing face mask detection using deep learning through COVID-19
pandemic | Accepted to Scientia Iranica Journal | Scientia Iranica, Volume 30, Issue 3, Year 2023 and Pages
1058-1067 | 10.24200/SCI.2023.59093.6057 | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | During the COVID-19 pandemic, wearing a face mask has been known to be an
effective way to prevent the spread of COVID-19. In lots of monitoring tasks,
humans have been replaced with computers thanks to the outstanding performance
of the deep learning models. Monitoring the wearing of a face mask is another
task that can be done by deep learning models with acceptable accuracy. The
main challenge of this task is the limited amount of data because of the
quarantine. In this paper, we did an investigation on the capability of three
state-of-the-art object detection neural networks on face mask detection for
real-time applications. As mentioned, here are three models used, Single Shot
Detector (SSD), two versions of You Only Look Once (YOLO) i.e., YOLOv4-tiny,
and YOLOv4-tiny-3l from which the best was selected. In the proposed method,
according to the performance of different models, the best model that can be
suitable for use in real-world and mobile device applications in comparison to
other recent studies was the YOLOv4-tiny model, with 85.31% and 50.66 for mean
Average Precision (mAP) and Frames Per Second (FPS), respectively. These
acceptable values were achieved using two datasets with only 1531 images in
three separate classes.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 19:39:32 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Khoramdel",
"Javad",
""
],
[
"Hatami",
"Soheila",
""
],
[
"Sadedel",
"Majid",
""
]
] | TITLE: Wearing face mask detection using deep learning through COVID-19
pandemic
ABSTRACT: During the COVID-19 pandemic, wearing a face mask has been known to be an
effective way to prevent the spread of COVID-19. In lots of monitoring tasks,
humans have been replaced with computers thanks to the outstanding performance
of the deep learning models. Monitoring the wearing of a face mask is another
task that can be done by deep learning models with acceptable accuracy. The
main challenge of this task is the limited amount of data because of the
quarantine. In this paper, we did an investigation on the capability of three
state-of-the-art object detection neural networks on face mask detection for
real-time applications. As mentioned, here are three models used, Single Shot
Detector (SSD), two versions of You Only Look Once (YOLO) i.e., YOLOv4-tiny,
and YOLOv4-tiny-3l from which the best was selected. In the proposed method,
according to the performance of different models, the best model that can be
suitable for use in real-world and mobile device applications in comparison to
other recent studies was the YOLOv4-tiny model, with 85.31% and 50.66 for mean
Average Precision (mAP) and Frames Per Second (FPS), respectively. These
acceptable values were achieved using two datasets with only 1531 images in
three separate classes.
| no_new_dataset | 0.709667 |
2305.06174 | Tunazzina Islam | Tunazzina Islam, Ruqi Zhang, Dan Goldwasser | Analysis of Climate Campaigns on Social Media using Bayesian Model
Averaging | Accepted as a long paper at 6th AAAI/ACM Conference on AI, Ethics,
and Society 2023 (AIES-2023). Updated for camera-ready | null | null | null | cs.CL cs.AI cs.CY cs.LG cs.SI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Climate change is the defining issue of our time, and we are at a defining
moment. Various interest groups, social movement organizations, and individuals
engage in collective action on this issue on social media. In addition, issue
advocacy campaigns on social media often arise in response to ongoing societal
concerns, especially those faced by energy industries. Our goal in this paper
is to analyze how those industries, their advocacy group, and climate advocacy
group use social media to influence the narrative on climate change. In this
work, we propose a minimally supervised model soup [57] approach combined with
messaging themes to identify the stances of climate ads on Facebook. Finally,
we release our stance dataset, model, and set of themes related to climate
campaigns for future work on opinion mining and the automatic detection of
climate change stances.
| [
{
"version": "v1",
"created": "Sat, 6 May 2023 16:43:29 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2023 18:06:50 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Islam",
"Tunazzina",
""
],
[
"Zhang",
"Ruqi",
""
],
[
"Goldwasser",
"Dan",
""
]
] | TITLE: Analysis of Climate Campaigns on Social Media using Bayesian Model
Averaging
ABSTRACT: Climate change is the defining issue of our time, and we are at a defining
moment. Various interest groups, social movement organizations, and individuals
engage in collective action on this issue on social media. In addition, issue
advocacy campaigns on social media often arise in response to ongoing societal
concerns, especially those faced by energy industries. Our goal in this paper
is to analyze how those industries, their advocacy group, and climate advocacy
group use social media to influence the narrative on climate change. In this
work, we propose a minimally supervised model soup [57] approach combined with
messaging themes to identify the stances of climate ads on Facebook. Finally,
we release our stance dataset, model, and set of themes related to climate
campaigns for future work on opinion mining and the automatic detection of
climate change stances.
| new_dataset | 0.712245 |
2305.16555 | Ali Zia | Ali Zia, Renuka Sharma, Reza Arablouei, Greg Bishop-Hurley, Jody
McNally, Neil Bagnall, Vivien Rolland, Brano Kusy, Lars Petersson, Aaron
Ingham | CVB: A Video Dataset of Cattle Visual Behaviors | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Existing image/video datasets for cattle behavior recognition are mostly
small, lack well-defined labels, or are collected in unrealistic controlled
environments. This limits the utility of machine learning (ML) models learned
from them. Therefore, we introduce a new dataset, called Cattle Visual
Behaviors (CVB), that consists of 502 video clips, each fifteen seconds long,
captured in natural lighting conditions, and annotated with eleven visually
perceptible behaviors of grazing cattle. We use the Computer Vision Annotation
Tool (CVAT) to collect our annotations. To make the procedure more efficient,
we perform an initial detection and tracking of cattle in the videos using
appropriate pre-trained models. The results are corrected by domain experts
along with cattle behavior labeling in CVAT. The pre-hoc detection and tracking
step significantly reduces the manual annotation time and effort. Moreover, we
convert CVB to the atomic visual action (AVA) format and train and evaluate the
popular SlowFast action recognition model on it. The associated preliminary
results confirm that we can localize the cattle and recognize their frequently
occurring behaviors with confidence. By creating and sharing CVB, our aim is to
develop improved models capable of recognizing all important behaviors
accurately and to assist other researchers and practitioners in developing and
evaluating new ML models for cattle behavior classification using video data.
| [
{
"version": "v1",
"created": "Fri, 26 May 2023 00:44:11 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 07:11:17 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zia",
"Ali",
""
],
[
"Sharma",
"Renuka",
""
],
[
"Arablouei",
"Reza",
""
],
[
"Bishop-Hurley",
"Greg",
""
],
[
"McNally",
"Jody",
""
],
[
"Bagnall",
"Neil",
""
],
[
"Rolland",
"Vivien",
""
],
[
"Kusy",
"Brano",
""
],
[
"Petersson",
"Lars",
""
],
[
"Ingham",
"Aaron",
""
]
] | TITLE: CVB: A Video Dataset of Cattle Visual Behaviors
ABSTRACT: Existing image/video datasets for cattle behavior recognition are mostly
small, lack well-defined labels, or are collected in unrealistic controlled
environments. This limits the utility of machine learning (ML) models learned
from them. Therefore, we introduce a new dataset, called Cattle Visual
Behaviors (CVB), that consists of 502 video clips, each fifteen seconds long,
captured in natural lighting conditions, and annotated with eleven visually
perceptible behaviors of grazing cattle. We use the Computer Vision Annotation
Tool (CVAT) to collect our annotations. To make the procedure more efficient,
we perform an initial detection and tracking of cattle in the videos using
appropriate pre-trained models. The results are corrected by domain experts
along with cattle behavior labeling in CVAT. The pre-hoc detection and tracking
step significantly reduces the manual annotation time and effort. Moreover, we
convert CVB to the atomic visual action (AVA) format and train and evaluate the
popular SlowFast action recognition model on it. The associated preliminary
results confirm that we can localize the cattle and recognize their frequently
occurring behaviors with confidence. By creating and sharing CVB, our aim is to
develop improved models capable of recognizing all important behaviors
accurately and to assist other researchers and practitioners in developing and
evaluating new ML models for cattle behavior classification using video data.
| new_dataset | 0.713669 |
2305.18326 | Liyan Kang | Liyan Kang, Luyang Huang, Ningxin Peng, Peihao Zhu, Zewei Sun, Shanbo
Cheng, Mingxuan Wang, Degen Huang and Jinsong Su | BigVideo: A Large-scale Video Subtitle Translation Dataset for
Multimodal Machine Translation | Accepted to ACL 2023 Findings | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a large-scale video subtitle translation dataset, BigVideo, to
facilitate the study of multi-modality machine translation. Compared with the
widely used How2 and VaTeX datasets, BigVideo is more than 10 times larger,
consisting of 4.5 million sentence pairs and 9,981 hours of videos. We also
introduce two deliberately designed test sets to verify the necessity of visual
information: Ambiguous with the presence of ambiguous words, and Unambiguous in
which the text context is self-contained for translation. To better model the
common semantics shared across texts and videos, we introduce a contrastive
learning method in the cross-modal encoder. Extensive experiments on the
BigVideo show that: a) Visual information consistently improves the NMT model
in terms of BLEU, BLEURT, and COMET on both Ambiguous and Unambiguous test
sets. b) Visual information helps disambiguation, compared to the strong text
baseline on terminology-targeted scores and human evaluation. Dataset and our
implementations are available at https://github.com/DeepLearnXMU/BigVideo-VMT.
| [
{
"version": "v1",
"created": "Tue, 23 May 2023 08:53:36 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jun 2023 07:03:06 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 08:10:10 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Kang",
"Liyan",
""
],
[
"Huang",
"Luyang",
""
],
[
"Peng",
"Ningxin",
""
],
[
"Zhu",
"Peihao",
""
],
[
"Sun",
"Zewei",
""
],
[
"Cheng",
"Shanbo",
""
],
[
"Wang",
"Mingxuan",
""
],
[
"Huang",
"Degen",
""
],
[
"Su",
"Jinsong",
""
]
] | TITLE: BigVideo: A Large-scale Video Subtitle Translation Dataset for
Multimodal Machine Translation
ABSTRACT: We present a large-scale video subtitle translation dataset, BigVideo, to
facilitate the study of multi-modality machine translation. Compared with the
widely used How2 and VaTeX datasets, BigVideo is more than 10 times larger,
consisting of 4.5 million sentence pairs and 9,981 hours of videos. We also
introduce two deliberately designed test sets to verify the necessity of visual
information: Ambiguous with the presence of ambiguous words, and Unambiguous in
which the text context is self-contained for translation. To better model the
common semantics shared across texts and videos, we introduce a contrastive
learning method in the cross-modal encoder. Extensive experiments on the
BigVideo show that: a) Visual information consistently improves the NMT model
in terms of BLEU, BLEURT, and COMET on both Ambiguous and Unambiguous test
sets. b) Visual information helps disambiguation, compared to the strong text
baseline on terminology-targeted scores and human evaluation. Dataset and our
implementations are available at https://github.com/DeepLearnXMU/BigVideo-VMT.
| new_dataset | 0.714672 |
2305.18438 | Zihao Li | Zihao Li, Zhuoran Yang, Mengdi Wang | Reinforcement Learning with Human Feedback: Learning Dynamic Choices via
Pessimism | null | null | null | null | cs.LG cs.AI math.OC math.ST stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study offline Reinforcement Learning with Human Feedback
(RLHF) where we aim to learn the human's underlying reward and the MDP's
optimal policy from a set of trajectories induced by human choices. RLHF is
challenging for multiple reasons: large state space but limited human feedback,
the bounded rationality of human decisions, and the off-policy distribution
shift. In this paper, we focus on the Dynamic Discrete Choice (DDC) model for
modeling and understanding human choices. DCC, rooted in econometrics and
decision theory, is widely used to model a human decision-making process with
forward-looking and bounded rationality. We propose a
\underline{D}ynamic-\underline{C}hoice-\underline{P}essimistic-\underline{P}olicy-\underline{O}ptimization
(DCPPO) method. \ The method involves a three-stage process: The first step is
to estimate the human behavior policy and the state-action value function via
maximum likelihood estimation (MLE); the second step recovers the human reward
function via minimizing Bellman mean squared error using the learned value
functions; the third step is to plug in the learned reward and invoke
pessimistic value iteration for finding a near-optimal policy. With only
single-policy coverage (i.e., optimal policy) of the dataset, we prove that the
suboptimality of DCPPO almost matches the classical pessimistic offline RL
algorithm in terms of suboptimality's dependency on distribution shift and
dimension. To the best of our knowledge, this paper presents the first
theoretical guarantees for off-policy offline RLHF with dynamic discrete choice
model.
| [
{
"version": "v1",
"created": "Mon, 29 May 2023 01:18:39 GMT"
},
{
"version": "v2",
"created": "Wed, 31 May 2023 15:47:45 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 13:08:46 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Li",
"Zihao",
""
],
[
"Yang",
"Zhuoran",
""
],
[
"Wang",
"Mengdi",
""
]
] | TITLE: Reinforcement Learning with Human Feedback: Learning Dynamic Choices via
Pessimism
ABSTRACT: In this paper, we study offline Reinforcement Learning with Human Feedback
(RLHF) where we aim to learn the human's underlying reward and the MDP's
optimal policy from a set of trajectories induced by human choices. RLHF is
challenging for multiple reasons: large state space but limited human feedback,
the bounded rationality of human decisions, and the off-policy distribution
shift. In this paper, we focus on the Dynamic Discrete Choice (DDC) model for
modeling and understanding human choices. DCC, rooted in econometrics and
decision theory, is widely used to model a human decision-making process with
forward-looking and bounded rationality. We propose a
\underline{D}ynamic-\underline{C}hoice-\underline{P}essimistic-\underline{P}olicy-\underline{O}ptimization
(DCPPO) method. \ The method involves a three-stage process: The first step is
to estimate the human behavior policy and the state-action value function via
maximum likelihood estimation (MLE); the second step recovers the human reward
function via minimizing Bellman mean squared error using the learned value
functions; the third step is to plug in the learned reward and invoke
pessimistic value iteration for finding a near-optimal policy. With only
single-policy coverage (i.e., optimal policy) of the dataset, we prove that the
suboptimality of DCPPO almost matches the classical pessimistic offline RL
algorithm in terms of suboptimality's dependency on distribution shift and
dimension. To the best of our knowledge, this paper presents the first
theoretical guarantees for off-policy offline RLHF with dynamic discrete choice
model.
| no_new_dataset | 0.70978 |
2305.18777 | Peiman Mohseni | Peiman Mohseni, Nick Duffield, Bani Mallick, Arman Hasanzadeh | Adaptive Conditional Quantile Neural Processes | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural processes are a family of probabilistic models that inherit the
flexibility of neural networks to parameterize stochastic processes. Despite
providing well-calibrated predictions, especially in regression problems, and
quick adaptation to new tasks, the Gaussian assumption that is commonly used to
represent the predictive likelihood fails to capture more complicated
distributions such as multimodal ones. To overcome this limitation, we propose
Conditional Quantile Neural Processes (CQNPs), a new member of the neural
processes family, which exploits the attractive properties of quantile
regression in modeling the distributions irrespective of their form. By
introducing an extension of quantile regression where the model learns to focus
on estimating informative quantiles, we show that the sampling efficiency and
prediction accuracy can be further enhanced. Our experiments with real and
synthetic datasets demonstrate substantial improvements in predictive
performance compared to the baselines, and better modeling of heterogeneous
distributions' characteristics such as multimodality.
| [
{
"version": "v1",
"created": "Tue, 30 May 2023 06:19:19 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Jun 2023 21:02:20 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2023 07:26:57 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Mohseni",
"Peiman",
""
],
[
"Duffield",
"Nick",
""
],
[
"Mallick",
"Bani",
""
],
[
"Hasanzadeh",
"Arman",
""
]
] | TITLE: Adaptive Conditional Quantile Neural Processes
ABSTRACT: Neural processes are a family of probabilistic models that inherit the
flexibility of neural networks to parameterize stochastic processes. Despite
providing well-calibrated predictions, especially in regression problems, and
quick adaptation to new tasks, the Gaussian assumption that is commonly used to
represent the predictive likelihood fails to capture more complicated
distributions such as multimodal ones. To overcome this limitation, we propose
Conditional Quantile Neural Processes (CQNPs), a new member of the neural
processes family, which exploits the attractive properties of quantile
regression in modeling the distributions irrespective of their form. By
introducing an extension of quantile regression where the model learns to focus
on estimating informative quantiles, we show that the sampling efficiency and
prediction accuracy can be further enhanced. Our experiments with real and
synthetic datasets demonstrate substantial improvements in predictive
performance compared to the baselines, and better modeling of heterogeneous
distributions' characteristics such as multimodality.
| no_new_dataset | 0.710829 |
2305.20002 | Che-Ping Tsai | Che-Ping Tsai, Jiong Zhang, Eli Chien, Hsiang-Fu Yu, Cho-Jui Hsieh,
Pradeep Ravikumar | Representer Point Selection for Explaining Regularized High-dimensional
Models | Accepted by ICML 2023 | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We introduce a novel class of sample-based explanations we term
high-dimensional representers, that can be used to explain the predictions of a
regularized high-dimensional model in terms of importance weights for each of
the training samples. Our workhorse is a novel representer theorem for general
regularized high-dimensional models, which decomposes the model prediction in
terms of contributions from each of the training samples: with positive
(negative) values corresponding to positive (negative) impact training samples
to the model's prediction. We derive consequences for the canonical instances
of $\ell_1$ regularized sparse models, and nuclear norm regularized low-rank
models. As a case study, we further investigate the application of low-rank
models in the context of collaborative filtering, where we instantiate
high-dimensional representers for specific popular classes of models. Finally,
we study the empirical performance of our proposed methods on three real-world
binary classification datasets and two recommender system datasets. We also
showcase the utility of high-dimensional representers in explaining model
recommendations.
| [
{
"version": "v1",
"created": "Wed, 31 May 2023 16:23:58 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jul 2023 00:13:29 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tsai",
"Che-Ping",
""
],
[
"Zhang",
"Jiong",
""
],
[
"Chien",
"Eli",
""
],
[
"Yu",
"Hsiang-Fu",
""
],
[
"Hsieh",
"Cho-Jui",
""
],
[
"Ravikumar",
"Pradeep",
""
]
] | TITLE: Representer Point Selection for Explaining Regularized High-dimensional
Models
ABSTRACT: We introduce a novel class of sample-based explanations we term
high-dimensional representers, that can be used to explain the predictions of a
regularized high-dimensional model in terms of importance weights for each of
the training samples. Our workhorse is a novel representer theorem for general
regularized high-dimensional models, which decomposes the model prediction in
terms of contributions from each of the training samples: with positive
(negative) values corresponding to positive (negative) impact training samples
to the model's prediction. We derive consequences for the canonical instances
of $\ell_1$ regularized sparse models, and nuclear norm regularized low-rank
models. As a case study, we further investigate the application of low-rank
models in the context of collaborative filtering, where we instantiate
high-dimensional representers for specific popular classes of models. Finally,
we study the empirical performance of our proposed methods on three real-world
binary classification datasets and two recommender system datasets. We also
showcase the utility of high-dimensional representers in explaining model
recommendations.
| no_new_dataset | 0.707979 |
2306.00942 | Gaoyue Zhou | Gaoyue Zhou, Victoria Dean, Mohan Kumar Srirama, Aravind Rajeswaran,
Jyothish Pari, Kyle Hatch, Aryan Jain, Tianhe Yu, Pieter Abbeel, Lerrel
Pinto, Chelsea Finn, Abhinav Gupta | Train Offline, Test Online: A Real Robot Learning Benchmark | Accepted to ICRA 2023 | null | null | null | cs.RO cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Three challenges limit the progress of robot learning research: robots are
expensive (few labs can participate), everyone uses different robots (findings
do not generalize across labs), and we lack internet-scale robotics data. We
take on these challenges via a new benchmark: Train Offline, Test Online
(TOTO). TOTO provides remote users with access to shared robotic hardware for
evaluating methods on common tasks and an open-source dataset of these tasks
for offline training. Its manipulation task suite requires challenging
generalization to unseen objects, positions, and lighting. We present initial
results on TOTO comparing five pretrained visual representations and four
offline policy learning baselines, remotely contributed by five institutions.
The real promise of TOTO, however, lies in the future: we release the benchmark
for additional submissions from any user, enabling easy, direct comparison to
several methods without the need to obtain hardware or collect data.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2023 17:42:08 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2023 19:24:32 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zhou",
"Gaoyue",
""
],
[
"Dean",
"Victoria",
""
],
[
"Srirama",
"Mohan Kumar",
""
],
[
"Rajeswaran",
"Aravind",
""
],
[
"Pari",
"Jyothish",
""
],
[
"Hatch",
"Kyle",
""
],
[
"Jain",
"Aryan",
""
],
[
"Yu",
"Tianhe",
""
],
[
"Abbeel",
"Pieter",
""
],
[
"Pinto",
"Lerrel",
""
],
[
"Finn",
"Chelsea",
""
],
[
"Gupta",
"Abhinav",
""
]
] | TITLE: Train Offline, Test Online: A Real Robot Learning Benchmark
ABSTRACT: Three challenges limit the progress of robot learning research: robots are
expensive (few labs can participate), everyone uses different robots (findings
do not generalize across labs), and we lack internet-scale robotics data. We
take on these challenges via a new benchmark: Train Offline, Test Online
(TOTO). TOTO provides remote users with access to shared robotic hardware for
evaluating methods on common tasks and an open-source dataset of these tasks
for offline training. Its manipulation task suite requires challenging
generalization to unseen objects, positions, and lighting. We present initial
results on TOTO comparing five pretrained visual representations and four
offline policy learning baselines, remotely contributed by five institutions.
The real promise of TOTO, however, lies in the future: we release the benchmark
for additional submissions from any user, enabling easy, direct comparison to
several methods without the need to obtain hardware or collect data.
| new_dataset | 0.713843 |
2306.02561 | Bill Yuchen Lin | Dongfu Jiang, Xiang Ren, Bill Yuchen Lin | LLM-Blender: Ensembling Large Language Models with Pairwise Ranking and
Generative Fusion | Accepted to ACL 2023 (main conference); Project website:
https://yuchenlin.xyz/LLM-Blender/ V3 update: fix a few typos and update a
few citations; V2 update: The experiments on summarization, translation, and
constrained generation tasks in the prior version have been moved to the
appendix | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | We present LLM-Blender, an ensembling framework designed to attain
consistently superior performance by leveraging the diverse strengths of
multiple open-source large language models (LLMs). Our framework consists of
two modules: PairRanker and GenFuser, addressing the observation that optimal
LLMs for different examples can significantly vary. PairRanker employs a
specialized pairwise comparison method to distinguish subtle differences
between candidate outputs. It jointly encodes the input text and a pair of
candidates, using cross-attention encoders to determine the superior one. Our
results demonstrate that PairRanker exhibits the highest correlation with
ChatGPT-based ranking. Then, GenFuser aims to merge the top-ranked candidates,
generating an improved output by capitalizing on their strengths and mitigating
their weaknesses. To facilitate large-scale evaluation, we introduce a
benchmark dataset, MixInstruct, which is a mixture of multiple instruction
datasets featuring oracle pairwise comparisons. Our LLM-Blender significantly
outperform individual LLMs and baseline methods across various metrics,
establishing a substantial performance gap.
| [
{
"version": "v1",
"created": "Mon, 5 Jun 2023 03:32:26 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Jun 2023 01:07:38 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jun 2023 21:39:54 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Jiang",
"Dongfu",
""
],
[
"Ren",
"Xiang",
""
],
[
"Lin",
"Bill Yuchen",
""
]
] | TITLE: LLM-Blender: Ensembling Large Language Models with Pairwise Ranking and
Generative Fusion
ABSTRACT: We present LLM-Blender, an ensembling framework designed to attain
consistently superior performance by leveraging the diverse strengths of
multiple open-source large language models (LLMs). Our framework consists of
two modules: PairRanker and GenFuser, addressing the observation that optimal
LLMs for different examples can significantly vary. PairRanker employs a
specialized pairwise comparison method to distinguish subtle differences
between candidate outputs. It jointly encodes the input text and a pair of
candidates, using cross-attention encoders to determine the superior one. Our
results demonstrate that PairRanker exhibits the highest correlation with
ChatGPT-based ranking. Then, GenFuser aims to merge the top-ranked candidates,
generating an improved output by capitalizing on their strengths and mitigating
their weaknesses. To facilitate large-scale evaluation, we introduce a
benchmark dataset, MixInstruct, which is a mixture of multiple instruction
datasets featuring oracle pairwise comparisons. Our LLM-Blender significantly
outperform individual LLMs and baseline methods across various metrics,
establishing a substantial performance gap.
| new_dataset | 0.712045 |
2306.04376 | Bastien Dussap | Bastien Dussap, Gilles Blanchard, Badr-Eddine Ch\'erief-Abdellatif | Label Shift Quantification with Robustness Guarantees via Distribution
Feature Matching | Accepted at the European Conference on Machine Learning and
Principles and Practice of Knowledge Discovery in Databases (ECML) 2023 Long
version (with proofs and appendix) | null | null | null | stat.ML cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Quantification learning deals with the task of estimating the target label
distribution under label shift. In this paper, we first present a unifying
framework, distribution feature matching (DFM), that recovers as particular
instances various estimators introduced in previous literature. We derive a
general performance bound for DFM procedures, improving in several key aspects
upon previous bounds derived in particular cases. We then extend this analysis
to study robustness of DFM procedures in the misspecified setting under
departure from the exact label shift hypothesis, in particular in the case of
contamination of the target by an unknown distribution. These theoretical
findings are confirmed by a detailed numerical study on simulated and
real-world datasets. We also introduce an efficient, scalable and robust
version of kernel-based DFM using the Random Fourier Feature principle.
| [
{
"version": "v1",
"created": "Wed, 7 Jun 2023 12:17:34 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jul 2023 19:43:53 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Dussap",
"Bastien",
""
],
[
"Blanchard",
"Gilles",
""
],
[
"Chérief-Abdellatif",
"Badr-Eddine",
""
]
] | TITLE: Label Shift Quantification with Robustness Guarantees via Distribution
Feature Matching
ABSTRACT: Quantification learning deals with the task of estimating the target label
distribution under label shift. In this paper, we first present a unifying
framework, distribution feature matching (DFM), that recovers as particular
instances various estimators introduced in previous literature. We derive a
general performance bound for DFM procedures, improving in several key aspects
upon previous bounds derived in particular cases. We then extend this analysis
to study robustness of DFM procedures in the misspecified setting under
departure from the exact label shift hypothesis, in particular in the case of
contamination of the target by an unknown distribution. These theoretical
findings are confirmed by a detailed numerical study on simulated and
real-world datasets. We also introduce an efficient, scalable and robust
version of kernel-based DFM using the Random Fourier Feature principle.
| no_new_dataset | 0.709252 |
2306.07874 | Zihao Xu | Tianyi Liu, Zihao Xu, Hao He, Guang-Yuan Hao, Guang-He Lee, Hao Wang | Taxonomy-Structured Domain Adaptation | Accepted by ICML 2023 | null | null | null | cs.LG cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Domain adaptation aims to mitigate distribution shifts among different
domains. However, traditional formulations are mostly limited to categorical
domains, greatly simplifying nuanced domain relationships in the real world. In
this work, we tackle a generalization with taxonomy-structured domains, which
formalizes domains with nested, hierarchical similarity structures such as
animal species and product catalogs. We build on the classic adversarial
framework and introduce a novel taxonomist, which competes with the adversarial
discriminator to preserve the taxonomy information. The equilibrium recovers
the classic adversarial domain adaptation's solution if given a non-informative
domain taxonomy (e.g., a flat taxonomy where all leaf nodes connect to the root
node) while yielding non-trivial results with other taxonomies. Empirically,
our method achieves state-of-the-art performance on both synthetic and
real-world datasets with successful adaptation. Code is available at
https://github.com/Wang-ML-Lab/TSDA.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2023 16:04:14 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jul 2023 20:39:15 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Liu",
"Tianyi",
""
],
[
"Xu",
"Zihao",
""
],
[
"He",
"Hao",
""
],
[
"Hao",
"Guang-Yuan",
""
],
[
"Lee",
"Guang-He",
""
],
[
"Wang",
"Hao",
""
]
] | TITLE: Taxonomy-Structured Domain Adaptation
ABSTRACT: Domain adaptation aims to mitigate distribution shifts among different
domains. However, traditional formulations are mostly limited to categorical
domains, greatly simplifying nuanced domain relationships in the real world. In
this work, we tackle a generalization with taxonomy-structured domains, which
formalizes domains with nested, hierarchical similarity structures such as
animal species and product catalogs. We build on the classic adversarial
framework and introduce a novel taxonomist, which competes with the adversarial
discriminator to preserve the taxonomy information. The equilibrium recovers
the classic adversarial domain adaptation's solution if given a non-informative
domain taxonomy (e.g., a flat taxonomy where all leaf nodes connect to the root
node) while yielding non-trivial results with other taxonomies. Empirically,
our method achieves state-of-the-art performance on both synthetic and
real-world datasets with successful adaptation. Code is available at
https://github.com/Wang-ML-Lab/TSDA.
| no_new_dataset | 0.711067 |
2306.07980 | Ali Fayzi Zengir | Ali Fayzi, Mohammad Fayzi, Kourosh Dadashtabar Ahmadi | Dark Web Activity Classification Using Deep Learning | 11 pages , 17 figures , 2 tables , New Dataset For DarkWeb Activity
Classification | null | null | null | cs.IR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In contemporary times, people rely heavily on the internet and search engines
to obtain information, either directly or indirectly. However, the information
accessible to users constitutes merely 4% of the overall information present on
the internet, which is commonly known as the surface web. The remaining
information that eludes search engines is called the deep web. The deep web
encompasses deliberately hidden information, such as personal email accounts,
social media accounts, online banking accounts, and other confidential data.
The deep web contains several critical applications, including databases of
universities, banks, and civil records, which are off-limits and illegal to
access. The dark web is a subset of the deep web that provides an ideal
platform for criminals and smugglers to engage in illicit activities, such as
drug trafficking, weapon smuggling, selling stolen bank cards, and money
laundering. In this article, we propose a search engine that employs deep
learning to detect the titles of activities on the dark web. We focus on five
categories of activities, including drug trading, weapon trading, selling
stolen bank cards, selling fake IDs, and selling illegal currencies. Our aim is
to extract relevant images from websites with a ".onion" extension and identify
the titles of websites without images by extracting keywords from the text of
the pages. Furthermore, we introduce a dataset of images called Darkoob, which
we have gathered and used to evaluate our proposed method. Our experimental
results demonstrate that the proposed method achieves an accuracy rate of 94%
on the test dataset.
| [
{
"version": "v1",
"created": "Tue, 30 May 2023 14:39:32 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2023 13:33:43 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Jul 2023 16:49:17 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Fayzi",
"Ali",
""
],
[
"Fayzi",
"Mohammad",
""
],
[
"Ahmadi",
"Kourosh Dadashtabar",
""
]
] | TITLE: Dark Web Activity Classification Using Deep Learning
ABSTRACT: In contemporary times, people rely heavily on the internet and search engines
to obtain information, either directly or indirectly. However, the information
accessible to users constitutes merely 4% of the overall information present on
the internet, which is commonly known as the surface web. The remaining
information that eludes search engines is called the deep web. The deep web
encompasses deliberately hidden information, such as personal email accounts,
social media accounts, online banking accounts, and other confidential data.
The deep web contains several critical applications, including databases of
universities, banks, and civil records, which are off-limits and illegal to
access. The dark web is a subset of the deep web that provides an ideal
platform for criminals and smugglers to engage in illicit activities, such as
drug trafficking, weapon smuggling, selling stolen bank cards, and money
laundering. In this article, we propose a search engine that employs deep
learning to detect the titles of activities on the dark web. We focus on five
categories of activities, including drug trading, weapon trading, selling
stolen bank cards, selling fake IDs, and selling illegal currencies. Our aim is
to extract relevant images from websites with a ".onion" extension and identify
the titles of websites without images by extracting keywords from the text of
the pages. Furthermore, we introduce a dataset of images called Darkoob, which
we have gathered and used to evaluate our proposed method. Our experimental
results demonstrate that the proposed method achieves an accuracy rate of 94%
on the test dataset.
| new_dataset | 0.717587 |
2306.08422 | Omer Hofman | Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya
Shimizu, Yuval Elovici and Asaf Shabtai | X-Detect: Explainable Adversarial Patch Detection for Object Detectors
in Retail | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object detection models, which are widely used in various domains (such as
retail), have been shown to be vulnerable to adversarial attacks. Existing
methods for detecting adversarial attacks on object detectors have had
difficulty detecting new real-life attacks. We present X-Detect, a novel
adversarial patch detector that can: i) detect adversarial samples in real
time, allowing the defender to take preventive action; ii) provide explanations
for the alerts raised to support the defender's decision-making process, and
iii) handle unfamiliar threats in the form of new attacks. Given a new scene,
X-Detect uses an ensemble of explainable-by-design detectors that utilize
object extraction, scene manipulation, and feature transformation techniques to
determine whether an alert needs to be raised. X-Detect was evaluated in both
the physical and digital space using five different attack scenarios (including
adaptive attacks) and the COCO dataset and our new Superstore dataset. The
physical evaluation was performed using a smart shopping cart setup in
real-world settings and included 17 adversarial patch attacks recorded in 1,700
adversarial videos. The results showed that X-Detect outperforms the
state-of-the-art methods in distinguishing between benign and adversarial
scenes for all attack scenarios while maintaining a 0% FPR (no false alarms)
and providing actionable explanations for the alerts raised. A demo is
available.
| [
{
"version": "v1",
"created": "Wed, 14 Jun 2023 10:35:21 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jul 2023 06:39:59 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Hofman",
"Omer",
""
],
[
"Giloni",
"Amit",
""
],
[
"Hayun",
"Yarin",
""
],
[
"Morikawa",
"Ikuya",
""
],
[
"Shimizu",
"Toshiya",
""
],
[
"Elovici",
"Yuval",
""
],
[
"Shabtai",
"Asaf",
""
]
] | TITLE: X-Detect: Explainable Adversarial Patch Detection for Object Detectors
in Retail
ABSTRACT: Object detection models, which are widely used in various domains (such as
retail), have been shown to be vulnerable to adversarial attacks. Existing
methods for detecting adversarial attacks on object detectors have had
difficulty detecting new real-life attacks. We present X-Detect, a novel
adversarial patch detector that can: i) detect adversarial samples in real
time, allowing the defender to take preventive action; ii) provide explanations
for the alerts raised to support the defender's decision-making process, and
iii) handle unfamiliar threats in the form of new attacks. Given a new scene,
X-Detect uses an ensemble of explainable-by-design detectors that utilize
object extraction, scene manipulation, and feature transformation techniques to
determine whether an alert needs to be raised. X-Detect was evaluated in both
the physical and digital space using five different attack scenarios (including
adaptive attacks) and the COCO dataset and our new Superstore dataset. The
physical evaluation was performed using a smart shopping cart setup in
real-world settings and included 17 adversarial patch attacks recorded in 1,700
adversarial videos. The results showed that X-Detect outperforms the
state-of-the-art methods in distinguishing between benign and adversarial
scenes for all attack scenarios while maintaining a 0% FPR (no false alarms)
and providing actionable explanations for the alerts raised. A demo is
available.
| new_dataset | 0.715399 |
2306.09165 | Haodong Ouyang | Haodong Ouyang | DEYOv2: Rank Feature with Greedy Matching for End-to-End Object
Detection | SOTA detector | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel object detector called DEYOv2, an improved
version of the first-generation DEYO (DETR with YOLO) model. DEYOv2, similar to
its predecessor, DEYOv2 employs a progressive reasoning approach to accelerate
model training and enhance performance. The study delves into the limitations
of one-to-one matching in optimization and proposes solutions to effectively
address the issue, such as Rank Feature and Greedy Matching. This approach
enables the third stage of DEYOv2 to maximize information acquisition from the
first and second stages without needing NMS, achieving end-to-end optimization.
By combining dense queries, sparse queries, one-to-many matching, and
one-to-one matching, DEYOv2 leverages the advantages of each method. It
outperforms all existing query-based end-to-end detectors under the same
settings. When using ResNet-50 as the backbone and multi-scale features on the
COCO dataset, DEYOv2 achieves 51.1 AP and 51.8 AP in 12 and 24 epochs,
respectively. Compared to the end-to-end model DINO, DEYOv2 provides
significant performance gains of 2.1 AP and 1.4 AP in the two epoch settings.
To the best of our knowledge, DEYOv2 is the first fully end-to-end object
detector that combines the respective strengths of classical detectors and
query-based detectors.
| [
{
"version": "v1",
"created": "Thu, 15 Jun 2023 14:42:26 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 01:52:45 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ouyang",
"Haodong",
""
]
] | TITLE: DEYOv2: Rank Feature with Greedy Matching for End-to-End Object
Detection
ABSTRACT: This paper presents a novel object detector called DEYOv2, an improved
version of the first-generation DEYO (DETR with YOLO) model. DEYOv2, similar to
its predecessor, DEYOv2 employs a progressive reasoning approach to accelerate
model training and enhance performance. The study delves into the limitations
of one-to-one matching in optimization and proposes solutions to effectively
address the issue, such as Rank Feature and Greedy Matching. This approach
enables the third stage of DEYOv2 to maximize information acquisition from the
first and second stages without needing NMS, achieving end-to-end optimization.
By combining dense queries, sparse queries, one-to-many matching, and
one-to-one matching, DEYOv2 leverages the advantages of each method. It
outperforms all existing query-based end-to-end detectors under the same
settings. When using ResNet-50 as the backbone and multi-scale features on the
COCO dataset, DEYOv2 achieves 51.1 AP and 51.8 AP in 12 and 24 epochs,
respectively. Compared to the end-to-end model DINO, DEYOv2 provides
significant performance gains of 2.1 AP and 1.4 AP in the two epoch settings.
To the best of our knowledge, DEYOv2 is the first fully end-to-end object
detector that combines the respective strengths of classical detectors and
query-based detectors.
| no_new_dataset | 0.705392 |
2306.10234 | Song Wang | Song Wang, Xingbo Fu, Kaize Ding, Chen Chen, Huiyuan Chen, Jundong Li | Federated Few-shot Learning | SIGKDD 2023 | null | null | null | cs.LG cs.DC | http://creativecommons.org/licenses/by/4.0/ | Federated Learning (FL) enables multiple clients to collaboratively learn a
machine learning model without exchanging their own local data. In this way,
the server can exploit the computational power of all clients and train the
model on a larger set of data samples among all clients. Although such a
mechanism is proven to be effective in various fields, existing works generally
assume that each client preserves sufficient data for training. In practice,
however, certain clients may only contain a limited number of samples (i.e.,
few-shot samples). For example, the available photo data taken by a specific
user with a new mobile device is relatively rare. In this scenario, existing FL
efforts typically encounter a significant performance drop on these clients.
Therefore, it is urgent to develop a few-shot model that can generalize to
clients with limited data under the FL scenario. In this paper, we refer to
this novel problem as federated few-shot learning. Nevertheless, the problem
remains challenging due to two major reasons: the global data variance among
clients (i.e., the difference in data distributions among clients) and the
local data insufficiency in each client (i.e., the lack of adequate local data
for training). To overcome these two challenges, we propose a novel federated
few-shot learning framework with two separately updated models and dedicated
training strategies to reduce the adverse impact of global data variance and
local data insufficiency. Extensive experiments on four prevalent datasets that
cover news articles and images validate the effectiveness of our framework
compared with the state-of-the-art baselines. Our code is provided at
https://github.com/SongW-SW/F2L.
| [
{
"version": "v1",
"created": "Sat, 17 Jun 2023 02:25:56 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2023 01:46:21 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Jul 2023 14:11:00 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Wang",
"Song",
""
],
[
"Fu",
"Xingbo",
""
],
[
"Ding",
"Kaize",
""
],
[
"Chen",
"Chen",
""
],
[
"Chen",
"Huiyuan",
""
],
[
"Li",
"Jundong",
""
]
] | TITLE: Federated Few-shot Learning
ABSTRACT: Federated Learning (FL) enables multiple clients to collaboratively learn a
machine learning model without exchanging their own local data. In this way,
the server can exploit the computational power of all clients and train the
model on a larger set of data samples among all clients. Although such a
mechanism is proven to be effective in various fields, existing works generally
assume that each client preserves sufficient data for training. In practice,
however, certain clients may only contain a limited number of samples (i.e.,
few-shot samples). For example, the available photo data taken by a specific
user with a new mobile device is relatively rare. In this scenario, existing FL
efforts typically encounter a significant performance drop on these clients.
Therefore, it is urgent to develop a few-shot model that can generalize to
clients with limited data under the FL scenario. In this paper, we refer to
this novel problem as federated few-shot learning. Nevertheless, the problem
remains challenging due to two major reasons: the global data variance among
clients (i.e., the difference in data distributions among clients) and the
local data insufficiency in each client (i.e., the lack of adequate local data
for training). To overcome these two challenges, we propose a novel federated
few-shot learning framework with two separately updated models and dedicated
training strategies to reduce the adverse impact of global data variance and
local data insufficiency. Extensive experiments on four prevalent datasets that
cover news articles and images validate the effectiveness of our framework
compared with the state-of-the-art baselines. Our code is provided at
https://github.com/SongW-SW/F2L.
| no_new_dataset | 0.709856 |
2306.15195 | Zhao Zhang | Keqin Chen, Zhao Zhang, Weili Zeng, Richong Zhang, Feng Zhu, Rui Zhao | Shikra: Unleashing Multimodal LLM's Referential Dialogue Magic | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In human conversations, individuals can indicate relevant regions within a
scene while addressing others. In turn, the other person can then respond by
referring to specific regions if necessary. This natural referential ability in
dialogue remains absent in current Multimodal Large Language Models (MLLMs). To
fill this gap, this paper proposes an MLLM called Shikra, which can handle
spatial coordinate inputs and outputs in natural language. Its architecture
consists of a vision encoder, an alignment layer, and a LLM. It is designed to
be straightforward and simple, without the need for extra vocabularies,
position encoder, pre-/post-detection modules, or external plug-in models. All
inputs and outputs are in natural language form. Referential dialogue is a
superset of various vision-language (VL) tasks. Shikra can naturally handle
location-related tasks like REC and PointQA, as well as conventional VL tasks
such as Image Captioning and VQA. Experimental results showcase Shikra's
promising performance. Furthermore, it enables numerous exciting applications,
like providing mentioned objects' coordinates in chains of thoughts and
comparing user-pointed regions similarities. Our code, model and dataset are
accessed at https://github.com/shikras/shikra.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 04:31:52 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 16:08:00 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Chen",
"Keqin",
""
],
[
"Zhang",
"Zhao",
""
],
[
"Zeng",
"Weili",
""
],
[
"Zhang",
"Richong",
""
],
[
"Zhu",
"Feng",
""
],
[
"Zhao",
"Rui",
""
]
] | TITLE: Shikra: Unleashing Multimodal LLM's Referential Dialogue Magic
ABSTRACT: In human conversations, individuals can indicate relevant regions within a
scene while addressing others. In turn, the other person can then respond by
referring to specific regions if necessary. This natural referential ability in
dialogue remains absent in current Multimodal Large Language Models (MLLMs). To
fill this gap, this paper proposes an MLLM called Shikra, which can handle
spatial coordinate inputs and outputs in natural language. Its architecture
consists of a vision encoder, an alignment layer, and a LLM. It is designed to
be straightforward and simple, without the need for extra vocabularies,
position encoder, pre-/post-detection modules, or external plug-in models. All
inputs and outputs are in natural language form. Referential dialogue is a
superset of various vision-language (VL) tasks. Shikra can naturally handle
location-related tasks like REC and PointQA, as well as conventional VL tasks
such as Image Captioning and VQA. Experimental results showcase Shikra's
promising performance. Furthermore, it enables numerous exciting applications,
like providing mentioned objects' coordinates in chains of thoughts and
comparing user-pointed regions similarities. Our code, model and dataset are
accessed at https://github.com/shikras/shikra.
| no_new_dataset | 0.707613 |
2306.15538 | Yuanming Li | Huaizheng Zhang, Yizheng Huang, Yuanming Li | DataCI: A Platform for Data-Centric AI on Streaming Data | 3 pages, 4 figures | null | null | null | cs.DC cs.LG | http://creativecommons.org/licenses/by/4.0/ | We introduce DataCI, a comprehensive open-source platform designed
specifically for data-centric AI in dynamic streaming data settings. DataCI
provides 1) an infrastructure with rich APIs for seamless streaming dataset
management, data-centric pipeline development and evaluation on streaming
scenarios, 2) an carefully designed versioning control function to track the
pipeline lineage, and 3) an intuitive graphical interface for a better
interactive user experience. Preliminary studies and demonstrations attest to
the easy-to-use and effectiveness of DataCI, highlighting its potential to
revolutionize the practice of data-centric AI in streaming data contexts.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 15:07:20 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 14:54:57 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zhang",
"Huaizheng",
""
],
[
"Huang",
"Yizheng",
""
],
[
"Li",
"Yuanming",
""
]
] | TITLE: DataCI: A Platform for Data-Centric AI on Streaming Data
ABSTRACT: We introduce DataCI, a comprehensive open-source platform designed
specifically for data-centric AI in dynamic streaming data settings. DataCI
provides 1) an infrastructure with rich APIs for seamless streaming dataset
management, data-centric pipeline development and evaluation on streaming
scenarios, 2) an carefully designed versioning control function to track the
pipeline lineage, and 3) an intuitive graphical interface for a better
interactive user experience. Preliminary studies and demonstrations attest to
the easy-to-use and effectiveness of DataCI, highlighting its potential to
revolutionize the practice of data-centric AI in streaming data contexts.
| no_new_dataset | 0.709057 |
2306.16678 | Phuoc-Hoan Charles Le | Phuoc-Hoan Charles Le, Xinlin Li | BinaryViT: Pushing Binary Vision Transformers Towards Convolutional
Models | Accepted in CVPR 2023 Workshop on Efficient Deep Learning for
Computer Vision (ECV) | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the increasing popularity and the increasing size of vision transformers
(ViTs), there has been an increasing interest in making them more efficient and
less computationally costly for deployment on edge devices with limited
computing resources. Binarization can be used to help reduce the size of ViT
models and their computational cost significantly, using popcount operations
when the weights and the activations are in binary. However, ViTs suffer a
larger performance drop when directly applying convolutional neural network
(CNN) binarization methods or existing binarization methods to binarize ViTs
compared to CNNs on datasets with a large number of classes such as
ImageNet-1k. With extensive analysis, we find that binary vanilla ViTs such as
DeiT miss out on a lot of key architectural properties that CNNs have that
allow binary CNNs to have much higher representational capability than binary
vanilla ViT. Therefore, we propose BinaryViT, in which inspired by the CNN
architecture, we include operations from the CNN architecture into a pure ViT
architecture to enrich the representational capability of a binary ViT without
introducing convolutions. These include an average pooling layer instead of a
token pooling layer, a block that contains multiple average pooling branches,
an affine transformation right before the addition of each main residual
connection, and a pyramid structure. Experimental results on the ImageNet-1k
dataset show the effectiveness of these operations that allow a binary pure ViT
model to be competitive with previous state-of-the-art (SOTA) binary CNN
models.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 04:48:02 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Le",
"Phuoc-Hoan Charles",
""
],
[
"Li",
"Xinlin",
""
]
] | TITLE: BinaryViT: Pushing Binary Vision Transformers Towards Convolutional
Models
ABSTRACT: With the increasing popularity and the increasing size of vision transformers
(ViTs), there has been an increasing interest in making them more efficient and
less computationally costly for deployment on edge devices with limited
computing resources. Binarization can be used to help reduce the size of ViT
models and their computational cost significantly, using popcount operations
when the weights and the activations are in binary. However, ViTs suffer a
larger performance drop when directly applying convolutional neural network
(CNN) binarization methods or existing binarization methods to binarize ViTs
compared to CNNs on datasets with a large number of classes such as
ImageNet-1k. With extensive analysis, we find that binary vanilla ViTs such as
DeiT miss out on a lot of key architectural properties that CNNs have that
allow binary CNNs to have much higher representational capability than binary
vanilla ViT. Therefore, we propose BinaryViT, in which inspired by the CNN
architecture, we include operations from the CNN architecture into a pure ViT
architecture to enrich the representational capability of a binary ViT without
introducing convolutions. These include an average pooling layer instead of a
token pooling layer, a block that contains multiple average pooling branches,
an affine transformation right before the addition of each main residual
connection, and a pyramid structure. Experimental results on the ImageNet-1k
dataset show the effectiveness of these operations that allow a binary pure ViT
model to be competitive with previous state-of-the-art (SOTA) binary CNN
models.
| no_new_dataset | 0.711281 |
2306.16817 | Albin Soutif--Cormerais | Albin Soutif--Cormerais, Antonio Carta, Joost Van de Weijer | Improving Online Continual Learning Performance and Stability with
Temporal Ensembles | CoLLAs 2023 accepted paper | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural networks are very effective when trained on large datasets for a large
number of iterations. However, when they are trained on non-stationary streams
of data and in an online fashion, their performance is reduced (1) by the
online setup, which limits the availability of data, (2) due to catastrophic
forgetting because of the non-stationary nature of the data. Furthermore,
several recent works (Caccia et al., 2022; Lange et al., 2023) arXiv:2205.13452
showed that replay methods used in continual learning suffer from the stability
gap, encountered when evaluating the model continually (rather than only on
task boundaries). In this article, we study the effect of model ensembling as a
way to improve performance and stability in online continual learning. We
notice that naively ensembling models coming from a variety of training tasks
increases the performance in online continual learning considerably. Starting
from this observation, and drawing inspirations from semi-supervised learning
ensembling methods, we use a lightweight temporal ensemble that computes the
exponential moving average of the weights (EMA) at test time, and show that it
can drastically increase the performance and stability when used in combination
with several methods from the literature.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 09:53:24 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 14:55:43 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Soutif--Cormerais",
"Albin",
""
],
[
"Carta",
"Antonio",
""
],
[
"Van de Weijer",
"Joost",
""
]
] | TITLE: Improving Online Continual Learning Performance and Stability with
Temporal Ensembles
ABSTRACT: Neural networks are very effective when trained on large datasets for a large
number of iterations. However, when they are trained on non-stationary streams
of data and in an online fashion, their performance is reduced (1) by the
online setup, which limits the availability of data, (2) due to catastrophic
forgetting because of the non-stationary nature of the data. Furthermore,
several recent works (Caccia et al., 2022; Lange et al., 2023) arXiv:2205.13452
showed that replay methods used in continual learning suffer from the stability
gap, encountered when evaluating the model continually (rather than only on
task boundaries). In this article, we study the effect of model ensembling as a
way to improve performance and stability in online continual learning. We
notice that naively ensembling models coming from a variety of training tasks
increases the performance in online continual learning considerably. Starting
from this observation, and drawing inspirations from semi-supervised learning
ensembling methods, we use a lightweight temporal ensemble that computes the
exponential moving average of the weights (EMA) at test time, and show that it
can drastically increase the performance and stability when used in combination
with several methods from the literature.
| no_new_dataset | 0.71039 |
2306.17068 | Ramin Mousa | Mahboobeh Sadat Kobari, Nima Karimi, Benyamin Pourhosseini, Ramin
Mousa | weighted CapsuleNet networks for Persian multi-domain sentiment analysis | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Sentiment classification is a fundamental task in natural language
processing, assigning one of the three classes, positive, negative, or neutral,
to free texts. However, sentiment classification models are highly domain
dependent; the classifier may perform classification with reasonable accuracy
in one domain but not in another due to the Semantic multiplicity of words
getting poor accuracy. This article presents a new Persian/Arabic multi-domain
sentiment analysis method using the cumulative weighted capsule networks
approach. Weighted capsule ensemble consists of training separate capsule
networks for each domain and a weighting measure called domain belonging degree
(DBD). This criterion consists of TF and IDF, which calculates the dependency
of each document for each domain separately; this value is multiplied by the
possible output that each capsule creates. In the end, the sum of these
multiplications is the title of the final output, and is used to determine the
polarity. And the most dependent domain is considered the final output for each
domain. The proposed method was evaluated using the Digikala dataset and
obtained acceptable accuracy compared to the existing approaches. It achieved
an accuracy of 0.89 on detecting the domain of belonging and 0.99 on detecting
the polarity. Also, for the problem of dealing with unbalanced classes, a
cost-sensitive function was used. This function was able to achieve 0.0162
improvements in accuracy for sentiment classification. This approach on Amazon
Arabic data can achieve 0.9695 accuracies in domain classification.
| [
{
"version": "v1",
"created": "Mon, 12 Jun 2023 09:53:29 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Jul 2023 20:54:45 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Kobari",
"Mahboobeh Sadat",
""
],
[
"Karimi",
"Nima",
""
],
[
"Pourhosseini",
"Benyamin",
""
],
[
"Mousa",
"Ramin",
""
]
] | TITLE: weighted CapsuleNet networks for Persian multi-domain sentiment analysis
ABSTRACT: Sentiment classification is a fundamental task in natural language
processing, assigning one of the three classes, positive, negative, or neutral,
to free texts. However, sentiment classification models are highly domain
dependent; the classifier may perform classification with reasonable accuracy
in one domain but not in another due to the Semantic multiplicity of words
getting poor accuracy. This article presents a new Persian/Arabic multi-domain
sentiment analysis method using the cumulative weighted capsule networks
approach. Weighted capsule ensemble consists of training separate capsule
networks for each domain and a weighting measure called domain belonging degree
(DBD). This criterion consists of TF and IDF, which calculates the dependency
of each document for each domain separately; this value is multiplied by the
possible output that each capsule creates. In the end, the sum of these
multiplications is the title of the final output, and is used to determine the
polarity. And the most dependent domain is considered the final output for each
domain. The proposed method was evaluated using the Digikala dataset and
obtained acceptable accuracy compared to the existing approaches. It achieved
an accuracy of 0.89 on detecting the domain of belonging and 0.99 on detecting
the polarity. Also, for the problem of dealing with unbalanced classes, a
cost-sensitive function was used. This function was able to achieve 0.0162
improvements in accuracy for sentiment classification. This approach on Amazon
Arabic data can achieve 0.9695 accuracies in domain classification.
| no_new_dataset | 0.712057 |
2306.17091 | Hikmat Khan | Hikmat Khan, Nidhal C. Bouaynaya, Ghulam Rasool | The Importance of Robust Features in Mitigating Catastrophic Forgetting | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | Continual learning (CL) is an approach to address catastrophic forgetting,
which refers to forgetting previously learned knowledge by neural networks when
trained on new tasks or data distributions. The adversarial robustness has
decomposed features into robust and non-robust types and demonstrated that
models trained on robust features significantly enhance adversarial robustness.
However, no study has been conducted on the efficacy of robust features from
the lens of the CL model in mitigating catastrophic forgetting in CL. In this
paper, we introduce the CL robust dataset and train four baseline models on
both the standard and CL robust datasets. Our results demonstrate that the CL
models trained on the CL robust dataset experienced less catastrophic
forgetting of the previously learned tasks than when trained on the standard
dataset. Our observations highlight the significance of the features provided
to the underlying CL models, showing that CL robust features can alleviate
catastrophic forgetting.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 16:48:15 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Khan",
"Hikmat",
""
],
[
"Bouaynaya",
"Nidhal C.",
""
],
[
"Rasool",
"Ghulam",
""
]
] | TITLE: The Importance of Robust Features in Mitigating Catastrophic Forgetting
ABSTRACT: Continual learning (CL) is an approach to address catastrophic forgetting,
which refers to forgetting previously learned knowledge by neural networks when
trained on new tasks or data distributions. The adversarial robustness has
decomposed features into robust and non-robust types and demonstrated that
models trained on robust features significantly enhance adversarial robustness.
However, no study has been conducted on the efficacy of robust features from
the lens of the CL model in mitigating catastrophic forgetting in CL. In this
paper, we introduce the CL robust dataset and train four baseline models on
both the standard and CL robust datasets. Our results demonstrate that the CL
models trained on the CL robust dataset experienced less catastrophic
forgetting of the previously learned tasks than when trained on the standard
dataset. Our observations highlight the significance of the features provided
to the underlying CL models, showing that CL robust features can alleviate
catastrophic forgetting.
| new_dataset | 0.71398 |
2306.17323 | Mahum Naseer | Mahum Naseer and Osman Hasan and Muhammad Shafique | Scaling Model Checking for DNN Analysis via State-Space Reduction and
Input Segmentation (Extended Version) | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Owing to their remarkable learning capabilities and performance in real-world
applications, the use of machine learning systems based on Neural Networks
(NNs) has been continuously increasing. However, various case studies and
empirical findings in the literature suggest that slight variations to NN
inputs can lead to erroneous and undesirable NN behavior. This has led to
considerable interest in their formal analysis, aiming to provide guarantees
regarding a given NN's behavior. Existing frameworks provide robustness and/or
safety guarantees for the trained NNs, using satisfiability solving and linear
programming. We proposed FANNet, the first model checking-based framework for
analyzing a broader range of NN properties. However, the state-space explosion
associated with model checking entails a scalability problem, making the FANNet
applicable only to small NNs. This work develops state-space reduction and
input segmentation approaches, to improve the scalability and timing efficiency
of formal NN analysis. Compared to the state-of-the-art FANNet, this enables
our new model checking-based framework to reduce the verification's timing
overhead by a factor of up to 8000, making the framework applicable to NNs even
with approximately $80$ times more network parameters. This in turn allows the
analysis of NN safety properties using the new framework, in addition to all
the NN properties already included with FANNet. The framework is shown to be
efficiently able to analyze properties of NNs trained on healthcare datasets as
well as the well--acknowledged ACAS Xu NNs.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 22:18:07 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 09:29:49 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Naseer",
"Mahum",
""
],
[
"Hasan",
"Osman",
""
],
[
"Shafique",
"Muhammad",
""
]
] | TITLE: Scaling Model Checking for DNN Analysis via State-Space Reduction and
Input Segmentation (Extended Version)
ABSTRACT: Owing to their remarkable learning capabilities and performance in real-world
applications, the use of machine learning systems based on Neural Networks
(NNs) has been continuously increasing. However, various case studies and
empirical findings in the literature suggest that slight variations to NN
inputs can lead to erroneous and undesirable NN behavior. This has led to
considerable interest in their formal analysis, aiming to provide guarantees
regarding a given NN's behavior. Existing frameworks provide robustness and/or
safety guarantees for the trained NNs, using satisfiability solving and linear
programming. We proposed FANNet, the first model checking-based framework for
analyzing a broader range of NN properties. However, the state-space explosion
associated with model checking entails a scalability problem, making the FANNet
applicable only to small NNs. This work develops state-space reduction and
input segmentation approaches, to improve the scalability and timing efficiency
of formal NN analysis. Compared to the state-of-the-art FANNet, this enables
our new model checking-based framework to reduce the verification's timing
overhead by a factor of up to 8000, making the framework applicable to NNs even
with approximately $80$ times more network parameters. This in turn allows the
analysis of NN safety properties using the new framework, in addition to all
the NN properties already included with FANNet. The framework is shown to be
efficiently able to analyze properties of NNs trained on healthcare datasets as
well as the well--acknowledged ACAS Xu NNs.
| no_new_dataset | 0.710434 |
2306.17624 | Gengchen Mai | Gengchen Mai, Yao Xuan, Wenyun Zuo, Yutong He, Jiaming Song, Stefano
Ermon, Krzysztof Janowicz, and Ni Lao | Sphere2Vec: A General-Purpose Location Representation Learning over a
Spherical Surface for Large-Scale Geospatial Predictions | 30 Pages, 16 figures. Accepted to ISPRS Journal of Photogrammetry and
Remote Sensing | ISPRS Journal of Photogrammetry and Remote Sensing, 2023 | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/publicdomain/zero/1.0/ | Generating learning-friendly representations for points in space is a
fundamental and long-standing problem in ML. Recently, multi-scale encoding
schemes (such as Space2Vec and NeRF) were proposed to directly encode any point
in 2D/3D Euclidean space as a high-dimensional vector, and has been
successfully applied to various geospatial prediction and generative tasks.
However, all current 2D and 3D location encoders are designed to model point
distances in Euclidean space. So when applied to large-scale real-world GPS
coordinate datasets, which require distance metric learning on the spherical
surface, both types of models can fail due to the map projection distortion
problem (2D) and the spherical-to-Euclidean distance approximation error (3D).
To solve these problems, we propose a multi-scale location encoder called
Sphere2Vec which can preserve spherical distances when encoding point
coordinates on a spherical surface. We developed a unified view of
distance-reserving encoding on spheres based on the DFS. We also provide
theoretical proof that the Sphere2Vec preserves the spherical surface distance
between any two points, while existing encoding schemes do not. Experiments on
20 synthetic datasets show that Sphere2Vec can outperform all baseline models
on all these datasets with up to 30.8% error rate reduction. We then apply
Sphere2Vec to three geo-aware image classification tasks - fine-grained species
recognition, Flickr image recognition, and remote sensing image classification.
Results on 7 real-world datasets show the superiority of Sphere2Vec over
multiple location encoders on all three tasks. Further analysis shows that
Sphere2Vec outperforms other location encoder models, especially in the polar
regions and data-sparse areas because of its nature for spherical surface
distance preservation. Code and data are available at
https://gengchenmai.github.io/sphere2vec-website/.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 12:55:02 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2023 01:26:30 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Mai",
"Gengchen",
""
],
[
"Xuan",
"Yao",
""
],
[
"Zuo",
"Wenyun",
""
],
[
"He",
"Yutong",
""
],
[
"Song",
"Jiaming",
""
],
[
"Ermon",
"Stefano",
""
],
[
"Janowicz",
"Krzysztof",
""
],
[
"Lao",
"Ni",
""
]
] | TITLE: Sphere2Vec: A General-Purpose Location Representation Learning over a
Spherical Surface for Large-Scale Geospatial Predictions
ABSTRACT: Generating learning-friendly representations for points in space is a
fundamental and long-standing problem in ML. Recently, multi-scale encoding
schemes (such as Space2Vec and NeRF) were proposed to directly encode any point
in 2D/3D Euclidean space as a high-dimensional vector, and has been
successfully applied to various geospatial prediction and generative tasks.
However, all current 2D and 3D location encoders are designed to model point
distances in Euclidean space. So when applied to large-scale real-world GPS
coordinate datasets, which require distance metric learning on the spherical
surface, both types of models can fail due to the map projection distortion
problem (2D) and the spherical-to-Euclidean distance approximation error (3D).
To solve these problems, we propose a multi-scale location encoder called
Sphere2Vec which can preserve spherical distances when encoding point
coordinates on a spherical surface. We developed a unified view of
distance-reserving encoding on spheres based on the DFS. We also provide
theoretical proof that the Sphere2Vec preserves the spherical surface distance
between any two points, while existing encoding schemes do not. Experiments on
20 synthetic datasets show that Sphere2Vec can outperform all baseline models
on all these datasets with up to 30.8% error rate reduction. We then apply
Sphere2Vec to three geo-aware image classification tasks - fine-grained species
recognition, Flickr image recognition, and remote sensing image classification.
Results on 7 real-world datasets show the superiority of Sphere2Vec over
multiple location encoders on all three tasks. Further analysis shows that
Sphere2Vec outperforms other location encoder models, especially in the polar
regions and data-sparse areas because of its nature for spherical surface
distance preservation. Code and data are available at
https://gengchenmai.github.io/sphere2vec-website/.
| no_new_dataset | 0.71262 |
2307.00021 | Vishvajit Bakarola | Vishvajitsinh Bakrola and Jitendra Nasariwala | SAHAAYAK 2023 -- the Multi Domain Bilingual Parallel Corpus of Sanskrit
to Hindi for Machine Translation | 3 Pages, 1 Figure, and 1 Table | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | The data article presents the large bilingual parallel corpus of
low-resourced language pair Sanskrit-Hindi, named SAHAAYAK 2023. The corpus
contains total of 1.5M sentence pairs between Sanskrit and Hindi. To make the
universal usability of the corpus and to make it balanced, data from multiple
domain has been incorporated into the corpus that includes, News, Daily
conversations, Politics, History, Sport, and Ancient Indian Literature. The
multifaceted approach has been adapted to make a sizable multi-domain corpus of
low-resourced languages like Sanskrit. Our development approach is spanned from
creating a small hand-crafted dataset to applying a wide range of mining,
cleaning, and verification. We have used the three-fold process of mining:
mining from machine-readable sources, mining from non-machine readable sources,
and collation from existing corpora sources. Post mining, the dedicated
pipeline for normalization, alignment, and corpus cleaning is developed and
applied to the corpus to make it ready to use on machine translation
algorithms.
| [
{
"version": "v1",
"created": "Tue, 27 Jun 2023 11:06:44 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Bakrola",
"Vishvajitsinh",
""
],
[
"Nasariwala",
"Jitendra",
""
]
] | TITLE: SAHAAYAK 2023 -- the Multi Domain Bilingual Parallel Corpus of Sanskrit
to Hindi for Machine Translation
ABSTRACT: The data article presents the large bilingual parallel corpus of
low-resourced language pair Sanskrit-Hindi, named SAHAAYAK 2023. The corpus
contains total of 1.5M sentence pairs between Sanskrit and Hindi. To make the
universal usability of the corpus and to make it balanced, data from multiple
domain has been incorporated into the corpus that includes, News, Daily
conversations, Politics, History, Sport, and Ancient Indian Literature. The
multifaceted approach has been adapted to make a sizable multi-domain corpus of
low-resourced languages like Sanskrit. Our development approach is spanned from
creating a small hand-crafted dataset to applying a wide range of mining,
cleaning, and verification. We have used the three-fold process of mining:
mining from machine-readable sources, mining from non-machine readable sources,
and collation from existing corpora sources. Post mining, the dedicated
pipeline for normalization, alignment, and corpus cleaning is developed and
applied to the corpus to make it ready to use on machine translation
algorithms.
| new_dataset | 0.719035 |
2307.00028 | Khalid Saifullah | Khalid Saifullah, Yuxin Wen, Jonas Geiping, Micah Goldblum, Tom
Goldstein | Seeing in Words: Learning to Classify through Language Bottlenecks | 5 pages, 2 figures, Published as a Tiny Paper at ICLR 2023 | null | null | null | cs.CV cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural networks for computer vision extract uninterpretable features despite
achieving high accuracy on benchmarks. In contrast, humans can explain their
predictions using succinct and intuitive descriptions. To incorporate
explainability into neural networks, we train a vision model whose feature
representations are text. We show that such a model can effectively classify
ImageNet images, and we discuss the challenges we encountered when training it.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2023 00:24:42 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Saifullah",
"Khalid",
""
],
[
"Wen",
"Yuxin",
""
],
[
"Geiping",
"Jonas",
""
],
[
"Goldblum",
"Micah",
""
],
[
"Goldstein",
"Tom",
""
]
] | TITLE: Seeing in Words: Learning to Classify through Language Bottlenecks
ABSTRACT: Neural networks for computer vision extract uninterpretable features despite
achieving high accuracy on benchmarks. In contrast, humans can explain their
predictions using succinct and intuitive descriptions. To incorporate
explainability into neural networks, we train a vision model whose feature
representations are text. We show that such a model can effectively classify
ImageNet images, and we discuss the challenges we encountered when training it.
| no_new_dataset | 0.710603 |
2307.00064 | Samuel Goree | Samuel Goree and David Crandall | Situated Cameras, Situated Knowledges: Towards an Egocentric
Epistemology for Computer Vision | Presented at the CVPR 2023 Ego4D workshop | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In her influential 1988 paper, Situated Knowledges, Donna Haraway uses vision
and perspective as a metaphor to discuss scientific knowledge. Today,
egocentric computer vision discusses many of the same issues, except in a
literal vision context. In this short position paper, we collapse that
metaphor, and explore the interactions between feminist epistemology and
egocentric CV as "Egocentric Epistemology." Using this framework, we argue for
the use of qualitative, human-centric methods as a complement to performance
benchmarks, to center both the literal and metaphorical perspective of human
crowd workers in CV.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:07:26 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Goree",
"Samuel",
""
],
[
"Crandall",
"David",
""
]
] | TITLE: Situated Cameras, Situated Knowledges: Towards an Egocentric
Epistemology for Computer Vision
ABSTRACT: In her influential 1988 paper, Situated Knowledges, Donna Haraway uses vision
and perspective as a metaphor to discuss scientific knowledge. Today,
egocentric computer vision discusses many of the same issues, except in a
literal vision context. In this short position paper, we collapse that
metaphor, and explore the interactions between feminist epistemology and
egocentric CV as "Egocentric Epistemology." Using this framework, we argue for
the use of qualitative, human-centric methods as a complement to performance
benchmarks, to center both the literal and metaphorical perspective of human
crowd workers in CV.
| no_new_dataset | 0.714416 |
2307.00065 | Sariah Mghames Dr | Sariah Mghames, Luca Castri, Marc Hanheide, Nicola Bellotto | Qualitative Prediction of Multi-Agent Spatial Interactions | This work will be published in the proceedings of IEEE RO-MAN 2023
(https://ro-man2023.org/main). arXiv admin note: text overlap with
arXiv:2304.11740 | null | null | null | cs.AI cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Deploying service robots in our daily life, whether in restaurants,
warehouses or hospitals, calls for the need to reason on the interactions
happening in dense and dynamic scenes. In this paper, we present and benchmark
three new approaches to model and predict multi-agent interactions in dense
scenes, including the use of an intuitive qualitative representation. The
proposed solutions take into account static and dynamic context to predict
individual interactions. They exploit an input- and a temporal-attention
mechanism, and are tested on medium and long-term time horizons. The first two
approaches integrate different relations from the so-called Qualitative
Trajectory Calculus (QTC) within a state-of-the-art deep neural network to
create a symbol-driven neural architecture for predicting spatial interactions.
The third approach implements a purely data-driven network for motion
prediction, the output of which is post-processed to predict QTC spatial
interactions. Experimental results on a popular robot dataset of challenging
crowded scenarios show that the purely data-driven prediction approach
generally outperforms the other two. The three approaches were further
evaluated on a different but related human scenarios to assess their
generalisation capability.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:08:25 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Mghames",
"Sariah",
""
],
[
"Castri",
"Luca",
""
],
[
"Hanheide",
"Marc",
""
],
[
"Bellotto",
"Nicola",
""
]
] | TITLE: Qualitative Prediction of Multi-Agent Spatial Interactions
ABSTRACT: Deploying service robots in our daily life, whether in restaurants,
warehouses or hospitals, calls for the need to reason on the interactions
happening in dense and dynamic scenes. In this paper, we present and benchmark
three new approaches to model and predict multi-agent interactions in dense
scenes, including the use of an intuitive qualitative representation. The
proposed solutions take into account static and dynamic context to predict
individual interactions. They exploit an input- and a temporal-attention
mechanism, and are tested on medium and long-term time horizons. The first two
approaches integrate different relations from the so-called Qualitative
Trajectory Calculus (QTC) within a state-of-the-art deep neural network to
create a symbol-driven neural architecture for predicting spatial interactions.
The third approach implements a purely data-driven network for motion
prediction, the output of which is post-processed to predict QTC spatial
interactions. Experimental results on a popular robot dataset of challenging
crowded scenarios show that the purely data-driven prediction approach
generally outperforms the other two. The three approaches were further
evaluated on a different but related human scenarios to assess their
generalisation capability.
| no_new_dataset | 0.708231 |
2307.00066 | Yan Wang | Yan Gao, Yan Wang, Qiang Wang | Improving the Transferability of Time Series Forecasting with
Decomposition Adaptation | 15 pages, 7 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to effective pattern mining and feature representation, neural
forecasting models based on deep learning have achieved great progress. The
premise of effective learning is to collect sufficient data. However, in time
series forecasting, it is difficult to obtain enough data, which limits the
performance of neural forecasting models. To alleviate the data scarcity
limitation, we design Sequence Decomposition Adaptation Network (SeDAN) which
is a novel transfer architecture to improve forecasting performance on the
target domain by aligning transferable knowledge from cross-domain datasets.
Rethinking the transferability of features in time series data, we propose
Implicit Contrastive Decomposition to decompose the original features into
components including seasonal and trend features, which are easier to transfer.
Then we design the corresponding adaptation methods for decomposed features in
different domains. Specifically, for seasonal features, we perform joint
distribution adaptation and for trend features, we design an Optimal Local
Adaptation. We conduct extensive experiments on five benchmark datasets for
multivariate time series forecasting. The results demonstrate the effectiveness
of our SeDAN. It can provide more efficient and stable knowledge transfer.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:12:22 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Gao",
"Yan",
""
],
[
"Wang",
"Yan",
""
],
[
"Wang",
"Qiang",
""
]
] | TITLE: Improving the Transferability of Time Series Forecasting with
Decomposition Adaptation
ABSTRACT: Due to effective pattern mining and feature representation, neural
forecasting models based on deep learning have achieved great progress. The
premise of effective learning is to collect sufficient data. However, in time
series forecasting, it is difficult to obtain enough data, which limits the
performance of neural forecasting models. To alleviate the data scarcity
limitation, we design Sequence Decomposition Adaptation Network (SeDAN) which
is a novel transfer architecture to improve forecasting performance on the
target domain by aligning transferable knowledge from cross-domain datasets.
Rethinking the transferability of features in time series data, we propose
Implicit Contrastive Decomposition to decompose the original features into
components including seasonal and trend features, which are easier to transfer.
Then we design the corresponding adaptation methods for decomposed features in
different domains. Specifically, for seasonal features, we perform joint
distribution adaptation and for trend features, we design an Optimal Local
Adaptation. We conduct extensive experiments on five benchmark datasets for
multivariate time series forecasting. The results demonstrate the effectiveness
of our SeDAN. It can provide more efficient and stable knowledge transfer.
| no_new_dataset | 0.710415 |
2307.00077 | Jiaying Wu | Jiaying Wu, Bryan Hooi | DECOR: Degree-Corrected Social Graph Refinement for Fake News Detection | Accepted to KDD 2023 (Research Track) | null | 10.1145/3580305.3599298 | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | Recent efforts in fake news detection have witnessed a surge of interest in
using graph neural networks (GNNs) to exploit rich social context. Existing
studies generally leverage fixed graph structures, assuming that the graphs
accurately represent the related social engagements. However, edge noise
remains a critical challenge in real-world graphs, as training on suboptimal
structures can severely limit the expressiveness of GNNs. Despite initial
efforts in graph structure learning (GSL), prior works often leverage node
features to update edge weights, resulting in heavy computational costs that
hinder the methods' applicability to large-scale social graphs. In this work,
we approach the fake news detection problem with a novel aspect of social graph
refinement. We find that the degrees of news article nodes exhibit distinctive
patterns, which are indicative of news veracity. Guided by this, we propose
DECOR, a novel application of Degree-Corrected Stochastic Blockmodels to the
fake news detection problem. Specifically, we encapsulate our empirical
observations into a lightweight social graph refinement component that
iteratively updates the edge weights via a learnable degree correction mask,
which allows for joint optimization with a GNN-based detector. Extensive
experiments on two real-world benchmarks validate the effectiveness and
efficiency of DECOR.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:31:48 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Wu",
"Jiaying",
""
],
[
"Hooi",
"Bryan",
""
]
] | TITLE: DECOR: Degree-Corrected Social Graph Refinement for Fake News Detection
ABSTRACT: Recent efforts in fake news detection have witnessed a surge of interest in
using graph neural networks (GNNs) to exploit rich social context. Existing
studies generally leverage fixed graph structures, assuming that the graphs
accurately represent the related social engagements. However, edge noise
remains a critical challenge in real-world graphs, as training on suboptimal
structures can severely limit the expressiveness of GNNs. Despite initial
efforts in graph structure learning (GSL), prior works often leverage node
features to update edge weights, resulting in heavy computational costs that
hinder the methods' applicability to large-scale social graphs. In this work,
we approach the fake news detection problem with a novel aspect of social graph
refinement. We find that the degrees of news article nodes exhibit distinctive
patterns, which are indicative of news veracity. Guided by this, we propose
DECOR, a novel application of Degree-Corrected Stochastic Blockmodels to the
fake news detection problem. Specifically, we encapsulate our empirical
observations into a lightweight social graph refinement component that
iteratively updates the edge weights via a learnable degree correction mask,
which allows for joint optimization with a GNN-based detector. Extensive
experiments on two real-world benchmarks validate the effectiveness and
efficiency of DECOR.
| no_new_dataset | 0.708799 |
2307.00079 | Channing Moore | R. Channing Moore, Daniel P. W. Ellis, Eduardo Fonseca, Shawn Hershey,
Aren Jansen, Manoj Plakal | Dataset balancing can hurt model performance | 5 pages, 3 figures, ICASSP 2023 | ICASSP 2023 - 2023 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP), Rhodes Island, Greece, 2023, pp. 1-5 | 10.1109/ICASSP49357.2023.10095255 | null | cs.LG cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Machine learning from training data with a skewed distribution of examples
per class can lead to models that favor performance on common classes at the
expense of performance on rare ones. AudioSet has a very wide range of priors
over its 527 sound event classes. Classification performance on AudioSet is
usually evaluated by a simple average over per-class metrics, meaning that
performance on rare classes is equal in importance to the performance on common
ones. Several recent papers have used dataset balancing techniques to improve
performance on AudioSet. We find, however, that while balancing improves
performance on the public AudioSet evaluation data it simultaneously hurts
performance on an unpublished evaluation set collected under the same
conditions. By varying the degree of balancing, we show that its benefits are
fragile and depend on the evaluation set. We also do not find evidence
indicating that balancing improves rare class performance relative to common
classes. We therefore caution against blind application of balancing, as well
as against paying too much attention to small improvements on a public
evaluation set.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:33:27 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Moore",
"R. Channing",
""
],
[
"Ellis",
"Daniel P. W.",
""
],
[
"Fonseca",
"Eduardo",
""
],
[
"Hershey",
"Shawn",
""
],
[
"Jansen",
"Aren",
""
],
[
"Plakal",
"Manoj",
""
]
] | TITLE: Dataset balancing can hurt model performance
ABSTRACT: Machine learning from training data with a skewed distribution of examples
per class can lead to models that favor performance on common classes at the
expense of performance on rare ones. AudioSet has a very wide range of priors
over its 527 sound event classes. Classification performance on AudioSet is
usually evaluated by a simple average over per-class metrics, meaning that
performance on rare classes is equal in importance to the performance on common
ones. Several recent papers have used dataset balancing techniques to improve
performance on AudioSet. We find, however, that while balancing improves
performance on the public AudioSet evaluation data it simultaneously hurts
performance on an unpublished evaluation set collected under the same
conditions. By varying the degree of balancing, we show that its benefits are
fragile and depend on the evaluation set. We also do not find evidence
indicating that balancing improves rare class performance relative to common
classes. We therefore caution against blind application of balancing, as well
as against paying too much attention to small improvements on a public
evaluation set.
| no_new_dataset | 0.708603 |
2307.00080 | Stefan Hill | Stefan Hill, David Fitzek, Patrick Delfmann, Carl Corea | Inter-case Predictive Process Monitoring: A candidate for Quantum
Machine Learning? | 17 pages, 6 figures, 5 appendixes | null | null | null | cs.LG quant-ph | http://creativecommons.org/licenses/by/4.0/ | Regardless of the domain, forecasting the future behaviour of a running
process instance is a question of interest for decision makers, especially when
multiple instances interact. Fostered by the recent advances in machine
learning research, several methods have been proposed to predict the next
activity, outcome or remaining time of a process automatically. Still, building
a model with high predictive power requires both - intrinsic knowledge of how
to extract meaningful features from the event log data and a model that
captures complex patterns in data. This work builds upon the recent progress in
inter-case Predictive Process Monitoring (PPM) and comprehensively benchmarks
the impact of inter-case features on prediction accuracy. Moreover, it includes
quantum machine learning models, which are expected to provide an advantage
over classical models with a scaling amount of feature dimensions. The
evaluation on real-world training data from the BPI challenge shows that the
inter-case features provide a significant boost by more than four percent in
accuracy and quantum algorithms are indeed competitive in a handful of feature
configurations. Yet, as quantum hardware is still in its early stages of
development, this paper critically discusses these findings in the light of
runtime, noise and the risk to overfit on the training data. Finally, the
implementation of an open-source plugin demonstrates the technical feasibility
to connect a state-of-the-art workflow engine such as Camunda to an IBM quantum
computing cloud service.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 18:33:45 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Hill",
"Stefan",
""
],
[
"Fitzek",
"David",
""
],
[
"Delfmann",
"Patrick",
""
],
[
"Corea",
"Carl",
""
]
] | TITLE: Inter-case Predictive Process Monitoring: A candidate for Quantum
Machine Learning?
ABSTRACT: Regardless of the domain, forecasting the future behaviour of a running
process instance is a question of interest for decision makers, especially when
multiple instances interact. Fostered by the recent advances in machine
learning research, several methods have been proposed to predict the next
activity, outcome or remaining time of a process automatically. Still, building
a model with high predictive power requires both - intrinsic knowledge of how
to extract meaningful features from the event log data and a model that
captures complex patterns in data. This work builds upon the recent progress in
inter-case Predictive Process Monitoring (PPM) and comprehensively benchmarks
the impact of inter-case features on prediction accuracy. Moreover, it includes
quantum machine learning models, which are expected to provide an advantage
over classical models with a scaling amount of feature dimensions. The
evaluation on real-world training data from the BPI challenge shows that the
inter-case features provide a significant boost by more than four percent in
accuracy and quantum algorithms are indeed competitive in a handful of feature
configurations. Yet, as quantum hardware is still in its early stages of
development, this paper critically discusses these findings in the light of
runtime, noise and the risk to overfit on the training data. Finally, the
implementation of an open-source plugin demonstrates the technical feasibility
to connect a state-of-the-art workflow engine such as Camunda to an IBM quantum
computing cloud service.
| no_new_dataset | 0.707209 |
2307.00104 | Uma Maheswara Rao Meleti | Uma Meleti and Abolfazl Razi | Obscured Wildfire Flame Detection By Temporal Analysis of Smoke Patterns
Captured by Unmanned Aerial Systems | 6 pages, 6 figures | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This research paper addresses the challenge of detecting obscured wildfires
(when the fire flames are covered by trees, smoke, clouds, and other natural
barriers) in real-time using drones equipped only with RGB cameras. We propose
a novel methodology that employs semantic segmentation based on the temporal
analysis of smoke patterns in video sequences. Our approach utilizes an
encoder-decoder architecture based on deep convolutional neural network
architecture with a pre-trained CNN encoder and 3D convolutions for decoding
while using sequential stacking of features to exploit temporal variations. The
predicted fire locations can assist drones in effectively combating forest
fires and pinpoint fire retardant chemical drop on exact flame locations. We
applied our method to a curated dataset derived from the FLAME2 dataset that
includes RGB video along with IR video to determine the ground truth. Our
proposed method has a unique property of detecting obscured fire and achieves a
Dice score of 85.88%, while achieving a high precision of 92.47% and
classification accuracy of 90.67% on test data showing promising results when
inspected visually. Indeed, our method outperforms other methods by a
significant margin in terms of video-level fire classification as we obtained
about 100% accuracy using MobileNet+CBAM as the encoder backbone.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 19:45:43 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Meleti",
"Uma",
""
],
[
"Razi",
"Abolfazl",
""
]
] | TITLE: Obscured Wildfire Flame Detection By Temporal Analysis of Smoke Patterns
Captured by Unmanned Aerial Systems
ABSTRACT: This research paper addresses the challenge of detecting obscured wildfires
(when the fire flames are covered by trees, smoke, clouds, and other natural
barriers) in real-time using drones equipped only with RGB cameras. We propose
a novel methodology that employs semantic segmentation based on the temporal
analysis of smoke patterns in video sequences. Our approach utilizes an
encoder-decoder architecture based on deep convolutional neural network
architecture with a pre-trained CNN encoder and 3D convolutions for decoding
while using sequential stacking of features to exploit temporal variations. The
predicted fire locations can assist drones in effectively combating forest
fires and pinpoint fire retardant chemical drop on exact flame locations. We
applied our method to a curated dataset derived from the FLAME2 dataset that
includes RGB video along with IR video to determine the ground truth. Our
proposed method has a unique property of detecting obscured fire and achieves a
Dice score of 85.88%, while achieving a high precision of 92.47% and
classification accuracy of 90.67% on test data showing promising results when
inspected visually. Indeed, our method outperforms other methods by a
significant margin in terms of video-level fire classification as we obtained
about 100% accuracy using MobileNet+CBAM as the encoder backbone.
| no_new_dataset | 0.604691 |
2307.00108 | Zhexiong Liu | Zhexiong Liu, Cris Benge, Siduo Jiang | Ticket-BERT: Labeling Incident Management Tickets with Language Models | In the Microsoft Journal of Applied Research (MSJAR), Volume 18,
January 2023 | null | null | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | An essential aspect of prioritizing incident tickets for resolution is
efficiently labeling tickets with fine-grained categories. However, ticket data
is often complex and poses several unique challenges for modern machine
learning methods: (1) tickets are created and updated either by machines with
pre-defined algorithms or by engineers with domain expertise that share
different protocols, (2) tickets receive frequent revisions that update ticket
status by modifying all or parts of ticket descriptions, and (3) ticket
labeling is time-sensitive and requires knowledge updates and new labels per
the rapid software and hardware improvement lifecycle. To handle these issues,
we introduce Ticket- BERT which trains a simple yet robust language model for
labeling tickets using our proposed ticket datasets. Experiments demonstrate
the superiority of Ticket-BERT over baselines and state-of-the-art text
classifiers on Azure Cognitive Services. We further encapsulate Ticket-BERT
with an active learning cycle and deploy it on the Microsoft IcM system, which
enables the model to quickly finetune on newly-collected tickets with a few
annotations.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 19:48:25 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Liu",
"Zhexiong",
""
],
[
"Benge",
"Cris",
""
],
[
"Jiang",
"Siduo",
""
]
] | TITLE: Ticket-BERT: Labeling Incident Management Tickets with Language Models
ABSTRACT: An essential aspect of prioritizing incident tickets for resolution is
efficiently labeling tickets with fine-grained categories. However, ticket data
is often complex and poses several unique challenges for modern machine
learning methods: (1) tickets are created and updated either by machines with
pre-defined algorithms or by engineers with domain expertise that share
different protocols, (2) tickets receive frequent revisions that update ticket
status by modifying all or parts of ticket descriptions, and (3) ticket
labeling is time-sensitive and requires knowledge updates and new labels per
the rapid software and hardware improvement lifecycle. To handle these issues,
we introduce Ticket- BERT which trains a simple yet robust language model for
labeling tickets using our proposed ticket datasets. Experiments demonstrate
the superiority of Ticket-BERT over baselines and state-of-the-art text
classifiers on Azure Cognitive Services. We further encapsulate Ticket-BERT
with an active learning cycle and deploy it on the Microsoft IcM system, which
enables the model to quickly finetune on newly-collected tickets with a few
annotations.
| new_dataset | 0.71123 |
2307.00123 | Ali Ayub | Ali Ayub, Jainish Mehta, Zachary De Francesco, Patrick Holthaus,
Kerstin Dautenhahn and Chrystopher L. Nehaniv | How Do Human Users Teach a Continual Learning Robot in Repeated
Interactions? | Accepted to the IEEE International Conference on Robot and Human
Interactive Communication (ROMAN), 2023 | null | null | null | cs.RO cs.HC cs.LG | http://creativecommons.org/licenses/by/4.0/ | Continual learning (CL) has emerged as an important avenue of research in
recent years, at the intersection of Machine Learning (ML) and Human-Robot
Interaction (HRI), to allow robots to continually learn in their environments
over long-term interactions with humans. Most research in continual learning,
however, has been robot-centered to develop continual learning algorithms that
can quickly learn new information on static datasets. In this paper, we take a
human-centered approach to continual learning, to understand how humans teach
continual learning robots over the long term and if there are variations in
their teaching styles. We conducted an in-person study with 40 participants
that interacted with a continual learning robot in 200 sessions. In this
between-participant study, we used two different CL models deployed on a Fetch
mobile manipulator robot. An extensive qualitative and quantitative analysis of
the data collected in the study shows that there is significant variation among
the teaching styles of individual users indicating the need for personalized
adaptation to their distinct teaching styles. The results also show that
although there is a difference in the teaching styles between expert and
non-expert users, the style does not have an effect on the performance of the
continual learning robot. Finally, our analysis shows that the constrained
experimental setups that have been widely used to test most continual learning
techniques are not adequate, as real users interact with and teach continual
learning robots in a variety of ways. Our code is available at
https://github.com/aliayub7/cl_hri.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 20:29:48 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ayub",
"Ali",
""
],
[
"Mehta",
"Jainish",
""
],
[
"De Francesco",
"Zachary",
""
],
[
"Holthaus",
"Patrick",
""
],
[
"Dautenhahn",
"Kerstin",
""
],
[
"Nehaniv",
"Chrystopher L.",
""
]
] | TITLE: How Do Human Users Teach a Continual Learning Robot in Repeated
Interactions?
ABSTRACT: Continual learning (CL) has emerged as an important avenue of research in
recent years, at the intersection of Machine Learning (ML) and Human-Robot
Interaction (HRI), to allow robots to continually learn in their environments
over long-term interactions with humans. Most research in continual learning,
however, has been robot-centered to develop continual learning algorithms that
can quickly learn new information on static datasets. In this paper, we take a
human-centered approach to continual learning, to understand how humans teach
continual learning robots over the long term and if there are variations in
their teaching styles. We conducted an in-person study with 40 participants
that interacted with a continual learning robot in 200 sessions. In this
between-participant study, we used two different CL models deployed on a Fetch
mobile manipulator robot. An extensive qualitative and quantitative analysis of
the data collected in the study shows that there is significant variation among
the teaching styles of individual users indicating the need for personalized
adaptation to their distinct teaching styles. The results also show that
although there is a difference in the teaching styles between expert and
non-expert users, the style does not have an effect on the performance of the
continual learning robot. Finally, our analysis shows that the constrained
experimental setups that have been widely used to test most continual learning
techniques are not adequate, as real users interact with and teach continual
learning robots in a variety of ways. Our code is available at
https://github.com/aliayub7/cl_hri.
| no_new_dataset | 0.705734 |
2307.00126 | Junchi Li | Haikuo Yang, Luo Luo, Chris Junchi Li, Michael I. Jordan | Accelerating Inexact HyperGradient Descent for Bilevel Optimization | null | null | null | null | math.OC cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method for solving general nonconvex-strongly-convex bilevel
optimization problems. Our method -- the \emph{Restarted Accelerated
HyperGradient Descent} (\texttt{RAHGD}) method -- finds an
$\epsilon$-first-order stationary point of the objective with
$\tilde{\mathcal{O}}(\kappa^{3.25}\epsilon^{-1.75})$ oracle complexity, where
$\kappa$ is the condition number of the lower-level objective and $\epsilon$ is
the desired accuracy. We also propose a perturbed variant of \texttt{RAHGD} for
finding an
$\big(\epsilon,\mathcal{O}(\kappa^{2.5}\sqrt{\epsilon}\,)\big)$-second-order
stationary point within the same order of oracle complexity. Our results
achieve the best-known theoretical guarantees for finding stationary points in
bilevel optimization and also improve upon the existing upper complexity bound
for finding second-order stationary points in nonconvex-strongly-concave
minimax optimization problems, setting a new state-of-the-art benchmark.
Empirical studies are conducted to validate the theoretical results in this
paper.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 20:36:44 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Yang",
"Haikuo",
""
],
[
"Luo",
"Luo",
""
],
[
"Li",
"Chris Junchi",
""
],
[
"Jordan",
"Michael I.",
""
]
] | TITLE: Accelerating Inexact HyperGradient Descent for Bilevel Optimization
ABSTRACT: We present a method for solving general nonconvex-strongly-convex bilevel
optimization problems. Our method -- the \emph{Restarted Accelerated
HyperGradient Descent} (\texttt{RAHGD}) method -- finds an
$\epsilon$-first-order stationary point of the objective with
$\tilde{\mathcal{O}}(\kappa^{3.25}\epsilon^{-1.75})$ oracle complexity, where
$\kappa$ is the condition number of the lower-level objective and $\epsilon$ is
the desired accuracy. We also propose a perturbed variant of \texttt{RAHGD} for
finding an
$\big(\epsilon,\mathcal{O}(\kappa^{2.5}\sqrt{\epsilon}\,)\big)$-second-order
stationary point within the same order of oracle complexity. Our results
achieve the best-known theoretical guarantees for finding stationary points in
bilevel optimization and also improve upon the existing upper complexity bound
for finding second-order stationary points in nonconvex-strongly-concave
minimax optimization problems, setting a new state-of-the-art benchmark.
Empirical studies are conducted to validate the theoretical results in this
paper.
| no_new_dataset | 0.710446 |
2307.00132 | Harsha Vardhan N | N Harsha Vardhan, Manav Chaudhary | iMETRE: Incorporating Markers of Entity Types for Relation Extraction | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Sentence-level relation extraction (RE) aims to identify the relationship
between 2 entities given a contextual sentence. While there have been many
attempts to solve this problem, the current solutions have a lot of room to
improve. In this paper, we approach the task of relationship extraction in the
financial dataset REFinD. Our approach incorporates typed entity markers
representations and various models finetuned on the dataset, which has allowed
us to achieve an F1 score of 69.65% on the validation set. Through this paper,
we discuss various approaches and possible limitations.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 20:54:41 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Vardhan",
"N Harsha",
""
],
[
"Chaudhary",
"Manav",
""
]
] | TITLE: iMETRE: Incorporating Markers of Entity Types for Relation Extraction
ABSTRACT: Sentence-level relation extraction (RE) aims to identify the relationship
between 2 entities given a contextual sentence. While there have been many
attempts to solve this problem, the current solutions have a lot of room to
improve. In this paper, we approach the task of relationship extraction in the
financial dataset REFinD. Our approach incorporates typed entity markers
representations and various models finetuned on the dataset, which has allowed
us to achieve an F1 score of 69.65% on the validation set. Through this paper,
we discuss various approaches and possible limitations.
| no_new_dataset | 0.713644 |
2307.00135 | Vasilisa Bashlovkina | Vasilisa Bashlovkina, Riley Matthews, Zhaobin Kuang, Simon
Baumgartner, Michael Bendersky | SMILE: Evaluation and Domain Adaptation for Social Media Language
Understanding | null | null | 10.1145/3580305.3599907 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We study the ability of transformer-based language models (LMs) to understand
social media language. Social media (SM) language is distinct from standard
written language, yet existing benchmarks fall short of capturing LM
performance in this socially, economically, and politically important domain.
We quantify the degree to which social media language differs from conventional
language and conclude that the difference is significant both in terms of token
distribution and rate of linguistic shift. Next, we introduce a new benchmark
for Social MedIa Language Evaluation (SMILE) that covers four SM platforms and
eleven tasks. Finally, we show that learning a tokenizer and pretraining on a
mix of social media and conventional language yields an LM that outperforms the
best similar-sized alternative by 4.2 points on the overall SMILE score.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 21:04:59 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Bashlovkina",
"Vasilisa",
""
],
[
"Matthews",
"Riley",
""
],
[
"Kuang",
"Zhaobin",
""
],
[
"Baumgartner",
"Simon",
""
],
[
"Bendersky",
"Michael",
""
]
] | TITLE: SMILE: Evaluation and Domain Adaptation for Social Media Language
Understanding
ABSTRACT: We study the ability of transformer-based language models (LMs) to understand
social media language. Social media (SM) language is distinct from standard
written language, yet existing benchmarks fall short of capturing LM
performance in this socially, economically, and politically important domain.
We quantify the degree to which social media language differs from conventional
language and conclude that the difference is significant both in terms of token
distribution and rate of linguistic shift. Next, we introduce a new benchmark
for Social MedIa Language Evaluation (SMILE) that covers four SM platforms and
eleven tasks. Finally, we show that learning a tokenizer and pretraining on a
mix of social media and conventional language yields an LM that outperforms the
best similar-sized alternative by 4.2 points on the overall SMILE score.
| new_dataset | 0.711443 |
2307.00169 | Omid Sadjadi | Raghuveer Peri and Seyed Omid Sadjadi and Daniel Garcia-Romero | VoxWatch: An open-set speaker recognition benchmark on VoxCeleb | 8 pages | null | null | null | eess.AS cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite its broad practical applications such as in fraud prevention,
open-set speaker identification (OSI) has received less attention in the
speaker recognition community compared to speaker verification (SV). OSI deals
with determining if a test speech sample belongs to a speaker from a set of
pre-enrolled individuals (in-set) or if it is from an out-of-set speaker. In
addition to the typical challenges associated with speech variability, OSI is
prone to the "false-alarm problem"; as the size of the in-set speaker
population (a.k.a watchlist) grows, the out-of-set scores become larger,
leading to increased false alarm rates. This is in particular challenging for
applications in financial institutions and border security where the watchlist
size is typically of the order of several thousand speakers. Therefore, it is
important to systematically quantify the false-alarm problem, and develop
techniques that alleviate the impact of watchlist size on detection
performance. Prior studies on this problem are sparse, and lack a common
benchmark for systematic evaluations. In this paper, we present the first
public benchmark for OSI, developed using the VoxCeleb dataset. We quantify the
effect of the watchlist size and speech duration on the watchlist-based speaker
detection task using three strong neural network based systems. In contrast to
the findings from prior research, we show that the commonly adopted adaptive
score normalization is not guaranteed to improve the performance for this task.
On the other hand, we show that score calibration and score fusion, two other
commonly used techniques in SV, result in significant improvements in OSI
performance.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 23:11:38 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Peri",
"Raghuveer",
""
],
[
"Sadjadi",
"Seyed Omid",
""
],
[
"Garcia-Romero",
"Daniel",
""
]
] | TITLE: VoxWatch: An open-set speaker recognition benchmark on VoxCeleb
ABSTRACT: Despite its broad practical applications such as in fraud prevention,
open-set speaker identification (OSI) has received less attention in the
speaker recognition community compared to speaker verification (SV). OSI deals
with determining if a test speech sample belongs to a speaker from a set of
pre-enrolled individuals (in-set) or if it is from an out-of-set speaker. In
addition to the typical challenges associated with speech variability, OSI is
prone to the "false-alarm problem"; as the size of the in-set speaker
population (a.k.a watchlist) grows, the out-of-set scores become larger,
leading to increased false alarm rates. This is in particular challenging for
applications in financial institutions and border security where the watchlist
size is typically of the order of several thousand speakers. Therefore, it is
important to systematically quantify the false-alarm problem, and develop
techniques that alleviate the impact of watchlist size on detection
performance. Prior studies on this problem are sparse, and lack a common
benchmark for systematic evaluations. In this paper, we present the first
public benchmark for OSI, developed using the VoxCeleb dataset. We quantify the
effect of the watchlist size and speech duration on the watchlist-based speaker
detection task using three strong neural network based systems. In contrast to
the findings from prior research, we show that the commonly adopted adaptive
score normalization is not guaranteed to improve the performance for this task.
On the other hand, we show that score calibration and score fusion, two other
commonly used techniques in SV, result in significant improvements in OSI
performance.
| new_dataset | 0.508788 |
2307.00174 | Xianjun Han | Xianjun Han, Qianqian Chen, Zhaoyang Xie, Xuejun Li, Hongyu Yang | Multiscale Progressive Text Prompt Network for Medical Image
Segmentation | null | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The accurate segmentation of medical images is a crucial step in obtaining
reliable morphological statistics. However, training a deep neural network for
this task requires a large amount of labeled data to ensure high-accuracy
results. To address this issue, we propose using progressive text prompts as
prior knowledge to guide the segmentation process. Our model consists of two
stages. In the first stage, we perform contrastive learning on natural images
to pretrain a powerful prior prompt encoder (PPE). This PPE leverages text
prior prompts to generate multimodality features. In the second stage, medical
image and text prior prompts are sent into the PPE inherited from the first
stage to achieve the downstream medical image segmentation task. A multiscale
feature fusion block (MSFF) combines the features from the PPE to produce
multiscale multimodality features. These two progressive features not only
bridge the semantic gap but also improve prediction accuracy. Finally, an
UpAttention block refines the predicted results by merging the image and text
features. This design provides a simple and accurate way to leverage multiscale
progressive text prior prompts for medical image segmentation. Compared with
using only images, our model achieves high-quality results with low data
annotation costs. Moreover, our model not only has excellent reliability and
validity on medical images but also performs well on natural images. The
experimental results on different image datasets demonstrate that our model is
effective and robust for image segmentation.
| [
{
"version": "v1",
"created": "Fri, 30 Jun 2023 23:37:16 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Han",
"Xianjun",
""
],
[
"Chen",
"Qianqian",
""
],
[
"Xie",
"Zhaoyang",
""
],
[
"Li",
"Xuejun",
""
],
[
"Yang",
"Hongyu",
""
]
] | TITLE: Multiscale Progressive Text Prompt Network for Medical Image
Segmentation
ABSTRACT: The accurate segmentation of medical images is a crucial step in obtaining
reliable morphological statistics. However, training a deep neural network for
this task requires a large amount of labeled data to ensure high-accuracy
results. To address this issue, we propose using progressive text prompts as
prior knowledge to guide the segmentation process. Our model consists of two
stages. In the first stage, we perform contrastive learning on natural images
to pretrain a powerful prior prompt encoder (PPE). This PPE leverages text
prior prompts to generate multimodality features. In the second stage, medical
image and text prior prompts are sent into the PPE inherited from the first
stage to achieve the downstream medical image segmentation task. A multiscale
feature fusion block (MSFF) combines the features from the PPE to produce
multiscale multimodality features. These two progressive features not only
bridge the semantic gap but also improve prediction accuracy. Finally, an
UpAttention block refines the predicted results by merging the image and text
features. This design provides a simple and accurate way to leverage multiscale
progressive text prior prompts for medical image segmentation. Compared with
using only images, our model achieves high-quality results with low data
annotation costs. Moreover, our model not only has excellent reliability and
validity on medical images but also performs well on natural images. The
experimental results on different image datasets demonstrate that our model is
effective and robust for image segmentation.
| no_new_dataset | 0.711205 |
2307.00182 | Jiangpeng He | Jiangpeng He and Fengqing Zhu | Single-Stage Heavy-Tailed Food Classification | ICIP 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning based food image classification has enabled more accurate
nutrition content analysis for image-based dietary assessment by predicting the
types of food in eating occasion images. However, there are two major obstacles
to apply food classification in real life applications. First, real life food
images are usually heavy-tailed distributed, resulting in severe
class-imbalance issue. Second, it is challenging to train a single-stage (i.e.
end-to-end) framework under heavy-tailed data distribution, which cause the
over-predictions towards head classes with rich instances and under-predictions
towards tail classes with rare instance. In this work, we address both issues
by introducing a novel single-stage heavy-tailed food classification framework.
Our method is evaluated on two heavy-tailed food benchmark datasets, Food101-LT
and VFN-LT, and achieves the best performance compared to existing work with
over 5% improvements for top-1 accuracy.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 00:45:35 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"He",
"Jiangpeng",
""
],
[
"Zhu",
"Fengqing",
""
]
] | TITLE: Single-Stage Heavy-Tailed Food Classification
ABSTRACT: Deep learning based food image classification has enabled more accurate
nutrition content analysis for image-based dietary assessment by predicting the
types of food in eating occasion images. However, there are two major obstacles
to apply food classification in real life applications. First, real life food
images are usually heavy-tailed distributed, resulting in severe
class-imbalance issue. Second, it is challenging to train a single-stage (i.e.
end-to-end) framework under heavy-tailed data distribution, which cause the
over-predictions towards head classes with rich instances and under-predictions
towards tail classes with rare instance. In this work, we address both issues
by introducing a novel single-stage heavy-tailed food classification framework.
Our method is evaluated on two heavy-tailed food benchmark datasets, Food101-LT
and VFN-LT, and achieves the best performance compared to existing work with
over 5% improvements for top-1 accuracy.
| no_new_dataset | 0.711481 |
2307.00198 | Shaohui Lin | Shaohui Lin, Wenxuan Huang, Jiao Xie, Baochang Zhang, Yunhang Shen,
Zhou Yu, Jungong Han, David Doermann | Filter Pruning for Efficient CNNs via Knowledge-driven Differential
Filter Sampler | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Filter pruning simultaneously accelerates the computation and reduces the
memory overhead of CNNs, which can be effectively applied to edge devices and
cloud services. In this paper, we propose a novel Knowledge-driven Differential
Filter Sampler~(KDFS) with Masked Filter Modeling~(MFM) framework for filter
pruning, which globally prunes the redundant filters based on the prior
knowledge of a pre-trained model in a differential and non-alternative
optimization. Specifically, we design a differential sampler with learnable
sampling parameters to build a binary mask vector for each layer, determining
whether the corresponding filters are redundant. To learn the mask, we
introduce masked filter modeling to construct PCA-like knowledge by aligning
the intermediate features from the pre-trained teacher model and the outputs of
the student decoder taking sampling features as the input. The mask and sampler
are directly optimized by the Gumbel-Softmax Straight-Through Gradient
Estimator in an end-to-end manner in combination with global pruning
constraint, MFM reconstruction error, and dark knowledge. Extensive experiments
demonstrate the proposed KDFS's effectiveness in compressing the base models on
various datasets. For instance, the pruned ResNet-50 on ImageNet achieves
$55.36\%$ computation reduction, and $42.86\%$ parameter reduction, while only
dropping $0.35\%$ Top-1 accuracy, significantly outperforming the
state-of-the-art methods. The code is available at
\url{https://github.com/Osilly/KDFS}.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 02:28:41 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Lin",
"Shaohui",
""
],
[
"Huang",
"Wenxuan",
""
],
[
"Xie",
"Jiao",
""
],
[
"Zhang",
"Baochang",
""
],
[
"Shen",
"Yunhang",
""
],
[
"Yu",
"Zhou",
""
],
[
"Han",
"Jungong",
""
],
[
"Doermann",
"David",
""
]
] | TITLE: Filter Pruning for Efficient CNNs via Knowledge-driven Differential
Filter Sampler
ABSTRACT: Filter pruning simultaneously accelerates the computation and reduces the
memory overhead of CNNs, which can be effectively applied to edge devices and
cloud services. In this paper, we propose a novel Knowledge-driven Differential
Filter Sampler~(KDFS) with Masked Filter Modeling~(MFM) framework for filter
pruning, which globally prunes the redundant filters based on the prior
knowledge of a pre-trained model in a differential and non-alternative
optimization. Specifically, we design a differential sampler with learnable
sampling parameters to build a binary mask vector for each layer, determining
whether the corresponding filters are redundant. To learn the mask, we
introduce masked filter modeling to construct PCA-like knowledge by aligning
the intermediate features from the pre-trained teacher model and the outputs of
the student decoder taking sampling features as the input. The mask and sampler
are directly optimized by the Gumbel-Softmax Straight-Through Gradient
Estimator in an end-to-end manner in combination with global pruning
constraint, MFM reconstruction error, and dark knowledge. Extensive experiments
demonstrate the proposed KDFS's effectiveness in compressing the base models on
various datasets. For instance, the pruned ResNet-50 on ImageNet achieves
$55.36\%$ computation reduction, and $42.86\%$ parameter reduction, while only
dropping $0.35\%$ Top-1 accuracy, significantly outperforming the
state-of-the-art methods. The code is available at
\url{https://github.com/Osilly/KDFS}.
| no_new_dataset | 0.708767 |
2307.00200 | Renwang Li | Renwang Li, Xiaodan Shao, Shu Sun, Meixia Tao, and Rui Zhang | Beam Scanning for Integrated Sensing and Communication in IRS-aided
mmWave Systems | Accepted by IEEE SPAWC | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates an intelligent reflecting surface (IRS) aided
millimeter-wave integrated sensing and communication (ISAC) system.
Specifically, based on the passive beam scanning in the downlink, the IRS finds
the optimal beam for reflecting the signals from the base station to a
communication user. Meanwhile, the IRS estimates the angle of a nearby target
based on its echo signal received by the sensing elements mounted on the IRS
(i.e., semi-passive IRS). We propose an ISAC protocol for achieving the above
objective via simultaneous (beam) training and sensing (STAS). Then, we derive
the achievable rate of the communication user and the Cramer-Rao bound (CRB) of
the angle estimation for the sensing target in closed-form. The achievable rate
and CRB exhibit different performance against the duration of beam scanning.
Specifically, the average achievable rate initially rises and subsequently
declines, while the CRB monotonically decreases. Consequently, the duration of
beam scanning should be carefully selected to balance communication and sensing
performance. Simulation results have verified our analytical findings and shown
that, thanks to the efficient use of downlink beam scanning signal for
simultaneous communication and target sensing, the STAS protocol outperforms
the benchmark protocol with orthogonal beam training and sensing.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 02:29:46 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Li",
"Renwang",
""
],
[
"Shao",
"Xiaodan",
""
],
[
"Sun",
"Shu",
""
],
[
"Tao",
"Meixia",
""
],
[
"Zhang",
"Rui",
""
]
] | TITLE: Beam Scanning for Integrated Sensing and Communication in IRS-aided
mmWave Systems
ABSTRACT: This paper investigates an intelligent reflecting surface (IRS) aided
millimeter-wave integrated sensing and communication (ISAC) system.
Specifically, based on the passive beam scanning in the downlink, the IRS finds
the optimal beam for reflecting the signals from the base station to a
communication user. Meanwhile, the IRS estimates the angle of a nearby target
based on its echo signal received by the sensing elements mounted on the IRS
(i.e., semi-passive IRS). We propose an ISAC protocol for achieving the above
objective via simultaneous (beam) training and sensing (STAS). Then, we derive
the achievable rate of the communication user and the Cramer-Rao bound (CRB) of
the angle estimation for the sensing target in closed-form. The achievable rate
and CRB exhibit different performance against the duration of beam scanning.
Specifically, the average achievable rate initially rises and subsequently
declines, while the CRB monotonically decreases. Consequently, the duration of
beam scanning should be carefully selected to balance communication and sensing
performance. Simulation results have verified our analytical findings and shown
that, thanks to the efficient use of downlink beam scanning signal for
simultaneous communication and target sensing, the STAS protocol outperforms
the benchmark protocol with orthogonal beam training and sensing.
| no_new_dataset | 0.712451 |
2307.00213 | Andrew Gao | Andrew Kean Gao | More for Less: Compact Convolutional Transformers Enable Robust Medical
Image Classification with Limited Data | 9 pages, 4 figures, 2 tables | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | Transformers are very powerful tools for a variety of tasks across domains,
from text generation to image captioning. However, transformers require
substantial amounts of training data, which is often a challenge in biomedical
settings, where high quality labeled data can be challenging or expensive to
obtain. This study investigates the efficacy of Compact Convolutional
Transformers (CCT) for robust medical image classification with limited data,
addressing a key issue faced by conventional Vision Transformers - their
requirement for large datasets. A hybrid of transformers and convolutional
layers, CCTs demonstrate high accuracy on modestly sized datasets. We employed
a benchmark dataset of peripheral blood cell images of eight distinct cell
types, each represented by approximately 2,000 low-resolution (28x28x3 pixel)
samples. Despite the dataset size being smaller than those typically used with
Vision Transformers, we achieved a commendable classification accuracy of
92.49% and a micro-average ROC AUC of 0.9935. The CCT also learned quickly,
exceeding 80% validation accuracy after five epochs. Analysis of per-class
precision, recall, F1, and ROC showed that performance was strong across cell
types. Our findings underscore the robustness of CCTs, indicating their
potential as a solution to data scarcity issues prevalent in biomedical
imaging. We substantiate the applicability of CCTs in data-constrained areas
and encourage further work on CCTs.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 03:31:30 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Gao",
"Andrew Kean",
""
]
] | TITLE: More for Less: Compact Convolutional Transformers Enable Robust Medical
Image Classification with Limited Data
ABSTRACT: Transformers are very powerful tools for a variety of tasks across domains,
from text generation to image captioning. However, transformers require
substantial amounts of training data, which is often a challenge in biomedical
settings, where high quality labeled data can be challenging or expensive to
obtain. This study investigates the efficacy of Compact Convolutional
Transformers (CCT) for robust medical image classification with limited data,
addressing a key issue faced by conventional Vision Transformers - their
requirement for large datasets. A hybrid of transformers and convolutional
layers, CCTs demonstrate high accuracy on modestly sized datasets. We employed
a benchmark dataset of peripheral blood cell images of eight distinct cell
types, each represented by approximately 2,000 low-resolution (28x28x3 pixel)
samples. Despite the dataset size being smaller than those typically used with
Vision Transformers, we achieved a commendable classification accuracy of
92.49% and a micro-average ROC AUC of 0.9935. The CCT also learned quickly,
exceeding 80% validation accuracy after five epochs. Analysis of per-class
precision, recall, F1, and ROC showed that performance was strong across cell
types. Our findings underscore the robustness of CCTs, indicating their
potential as a solution to data scarcity issues prevalent in biomedical
imaging. We substantiate the applicability of CCTs in data-constrained areas
and encourage further work on CCTs.
| new_dataset | 0.624752 |
2307.00222 | Tingting Dan | Tingting Dan and Jiaqi Ding and Ziquan Wei and Shahar Z Kovalsky and
Minjeong Kim and Won Hwa Kim and Guorong Wu | Re-Think and Re-Design Graph Neural Networks in Spaces of Continuous
Graph Diffusion Functionals | 23 papers, 10 figures | null | null | null | cs.LG cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph neural networks (GNNs) are widely used in domains like social networks
and biological systems. However, the locality assumption of GNNs, which limits
information exchange to neighboring nodes, hampers their ability to capture
long-range dependencies and global patterns in graphs. To address this, we
propose a new inductive bias based on variational analysis, drawing inspiration
from the Brachistochrone problem. Our framework establishes a mapping between
discrete GNN models and continuous diffusion functionals. This enables the
design of application-specific objective functions in the continuous domain and
the construction of discrete deep models with mathematical guarantees. To
tackle over-smoothing in GNNs, we analyze the existing layer-by-layer graph
embedding models and identify that they are equivalent to l2-norm integral
functionals of graph gradients, which cause over-smoothing. Similar to
edge-preserving filters in image denoising, we introduce total variation (TV)
to align the graph diffusion pattern with global community topologies.
Additionally, we devise a selective mechanism to address the trade-off between
model depth and over-smoothing, which can be easily integrated into existing
GNNs. Furthermore, we propose a novel generative adversarial network (GAN) that
predicts spreading flows in graphs through a neural transport equation. To
mitigate vanishing flows, we customize the objective function to minimize
transportation within each community while maximizing inter-community flows.
Our GNN models achieve state-of-the-art (SOTA) performance on popular graph
learning benchmarks such as Cora, Citeseer, and Pubmed.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 04:44:43 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Dan",
"Tingting",
""
],
[
"Ding",
"Jiaqi",
""
],
[
"Wei",
"Ziquan",
""
],
[
"Kovalsky",
"Shahar Z",
""
],
[
"Kim",
"Minjeong",
""
],
[
"Kim",
"Won Hwa",
""
],
[
"Wu",
"Guorong",
""
]
] | TITLE: Re-Think and Re-Design Graph Neural Networks in Spaces of Continuous
Graph Diffusion Functionals
ABSTRACT: Graph neural networks (GNNs) are widely used in domains like social networks
and biological systems. However, the locality assumption of GNNs, which limits
information exchange to neighboring nodes, hampers their ability to capture
long-range dependencies and global patterns in graphs. To address this, we
propose a new inductive bias based on variational analysis, drawing inspiration
from the Brachistochrone problem. Our framework establishes a mapping between
discrete GNN models and continuous diffusion functionals. This enables the
design of application-specific objective functions in the continuous domain and
the construction of discrete deep models with mathematical guarantees. To
tackle over-smoothing in GNNs, we analyze the existing layer-by-layer graph
embedding models and identify that they are equivalent to l2-norm integral
functionals of graph gradients, which cause over-smoothing. Similar to
edge-preserving filters in image denoising, we introduce total variation (TV)
to align the graph diffusion pattern with global community topologies.
Additionally, we devise a selective mechanism to address the trade-off between
model depth and over-smoothing, which can be easily integrated into existing
GNNs. Furthermore, we propose a novel generative adversarial network (GAN) that
predicts spreading flows in graphs through a neural transport equation. To
mitigate vanishing flows, we customize the objective function to minimize
transportation within each community while maximizing inter-community flows.
Our GNN models achieve state-of-the-art (SOTA) performance on popular graph
learning benchmarks such as Cora, Citeseer, and Pubmed.
| no_new_dataset | 0.710007 |
2307.00225 | Qichao Ying | Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian and Xinpeng
Zhang | StyleStegan: Leak-free Style Transfer Based on Feature Steganography | Under Review | null | null | null | cs.CV cs.MM | http://creativecommons.org/licenses/by/4.0/ | In modern social networks, existing style transfer methods suffer from a
serious content leakage issue, which hampers the ability to achieve serial and
reversible stylization, thereby hindering the further propagation of stylized
images in social networks. To address this problem, we propose a leak-free
style transfer method based on feature steganography. Our method consists of
two main components: a style transfer method that accomplishes artistic
stylization on the original image and an image steganography method that embeds
content feature secrets on the stylized image. The main contributions of our
work are as follows: 1) We identify and explain the phenomenon of content
leakage and its underlying causes, which arise from content inconsistencies
between the original image and its subsequent stylized image. 2) We design a
neural flow model for achieving loss-free and biased-free style transfer. 3) We
introduce steganography to hide content feature information on the stylized
image and control the subsequent usage rights. 4) We conduct comprehensive
experimental validation using publicly available datasets MS-COCO and Wikiart.
The results demonstrate that StyleStegan successfully mitigates the content
leakage issue in serial and reversible style transfer tasks. The SSIM
performance metrics for these tasks are 14.98% and 7.28% higher, respectively,
compared to a suboptimal baseline model.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 05:00:19 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Liang",
"Xiujian",
""
],
[
"Liu",
"Bingshan",
""
],
[
"Ying",
"Qichao",
""
],
[
"Qian",
"Zhenxing",
""
],
[
"Zhang",
"Xinpeng",
""
]
] | TITLE: StyleStegan: Leak-free Style Transfer Based on Feature Steganography
ABSTRACT: In modern social networks, existing style transfer methods suffer from a
serious content leakage issue, which hampers the ability to achieve serial and
reversible stylization, thereby hindering the further propagation of stylized
images in social networks. To address this problem, we propose a leak-free
style transfer method based on feature steganography. Our method consists of
two main components: a style transfer method that accomplishes artistic
stylization on the original image and an image steganography method that embeds
content feature secrets on the stylized image. The main contributions of our
work are as follows: 1) We identify and explain the phenomenon of content
leakage and its underlying causes, which arise from content inconsistencies
between the original image and its subsequent stylized image. 2) We design a
neural flow model for achieving loss-free and biased-free style transfer. 3) We
introduce steganography to hide content feature information on the stylized
image and control the subsequent usage rights. 4) We conduct comprehensive
experimental validation using publicly available datasets MS-COCO and Wikiart.
The results demonstrate that StyleStegan successfully mitigates the content
leakage issue in serial and reversible style transfer tasks. The SSIM
performance metrics for these tasks are 14.98% and 7.28% higher, respectively,
compared to a suboptimal baseline model.
| no_new_dataset | 0.713238 |
2307.00226 | Ye Xue | Ye Xue, Diego Klabjan, Jean Utke | S-Omninet: Structured Data Enhanced Universal Multimodal Learning
Architecture | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multimodal multitask learning has attracted an increasing interest in recent
years. Singlemodal models have been advancing rapidly and have achieved
astonishing results on various tasks across multiple domains. Multimodal
learning offers opportunities for further improvements by integrating data from
multiple modalities. Many methods are proposed to learn on a specific type of
multimodal data, such as vision and language data. A few of them are designed
to handle several modalities and tasks at a time. In this work, we extend and
improve Omninet, an architecture that is capable of handling multiple
modalities and tasks at a time, by introducing cross-cache attention,
integrating patch embeddings for vision inputs, and supporting structured data.
The proposed Structured-data-enhanced Omninet (S-Omninet) is a universal model
that is capable of learning from structured data of various dimensions
effectively with unstructured data through cross-cache attention, which enables
interactions among spatial, temporal, and structured features. We also enhance
spatial representations in a spatial cache with patch embeddings. We evaluate
the proposed model on several multimodal datasets and demonstrate a significant
improvement over the baseline, Omninet.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 05:02:46 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Xue",
"Ye",
""
],
[
"Klabjan",
"Diego",
""
],
[
"Utke",
"Jean",
""
]
] | TITLE: S-Omninet: Structured Data Enhanced Universal Multimodal Learning
Architecture
ABSTRACT: Multimodal multitask learning has attracted an increasing interest in recent
years. Singlemodal models have been advancing rapidly and have achieved
astonishing results on various tasks across multiple domains. Multimodal
learning offers opportunities for further improvements by integrating data from
multiple modalities. Many methods are proposed to learn on a specific type of
multimodal data, such as vision and language data. A few of them are designed
to handle several modalities and tasks at a time. In this work, we extend and
improve Omninet, an architecture that is capable of handling multiple
modalities and tasks at a time, by introducing cross-cache attention,
integrating patch embeddings for vision inputs, and supporting structured data.
The proposed Structured-data-enhanced Omninet (S-Omninet) is a universal model
that is capable of learning from structured data of various dimensions
effectively with unstructured data through cross-cache attention, which enables
interactions among spatial, temporal, and structured features. We also enhance
spatial representations in a spatial cache with patch embeddings. We evaluate
the proposed model on several multimodal datasets and demonstrate a significant
improvement over the baseline, Omninet.
| no_new_dataset | 0.711243 |
2307.00257 | Linrui Dai | Linrui Dai, Wenhui Lei, Xiaofan Zhang | Efficient Subclass Segmentation in Medical Images | MICCAI 2023 early accept | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | As research interests in medical image analysis become increasingly
fine-grained, the cost for extensive annotation also rises. One feasible way to
reduce the cost is to annotate with coarse-grained superclass labels while
using limited fine-grained annotations as a complement. In this way,
fine-grained data learning is assisted by ample coarse annotations. Recent
studies in classification tasks have adopted this method to achieve
satisfactory results. However, there is a lack of research on efficient
learning of fine-grained subclasses in semantic segmentation tasks. In this
paper, we propose a novel approach that leverages the hierarchical structure of
categories to design network architecture. Meanwhile, a task-driven data
generation method is presented to make it easier for the network to recognize
different subclass categories. Specifically, we introduce a Prior Concatenation
module that enhances confidence in subclass segmentation by concatenating
predicted logits from the superclass classifier, a Separate Normalization
module that stretches the intra-class distance within the same superclass to
facilitate subclass segmentation, and a HierarchicalMix model that generates
high-quality pseudo labels for unlabeled samples by fusing only similar
superclass regions from labeled and unlabeled images. Our experiments on the
BraTS2021 and ACDC datasets demonstrate that our approach achieves comparable
accuracy to a model trained with full subclass annotations, with limited
subclass annotations and sufficient superclass annotations. Our approach offers
a promising solution for efficient fine-grained subclass segmentation in
medical images. Our code is publicly available here.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 07:39:08 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Dai",
"Linrui",
""
],
[
"Lei",
"Wenhui",
""
],
[
"Zhang",
"Xiaofan",
""
]
] | TITLE: Efficient Subclass Segmentation in Medical Images
ABSTRACT: As research interests in medical image analysis become increasingly
fine-grained, the cost for extensive annotation also rises. One feasible way to
reduce the cost is to annotate with coarse-grained superclass labels while
using limited fine-grained annotations as a complement. In this way,
fine-grained data learning is assisted by ample coarse annotations. Recent
studies in classification tasks have adopted this method to achieve
satisfactory results. However, there is a lack of research on efficient
learning of fine-grained subclasses in semantic segmentation tasks. In this
paper, we propose a novel approach that leverages the hierarchical structure of
categories to design network architecture. Meanwhile, a task-driven data
generation method is presented to make it easier for the network to recognize
different subclass categories. Specifically, we introduce a Prior Concatenation
module that enhances confidence in subclass segmentation by concatenating
predicted logits from the superclass classifier, a Separate Normalization
module that stretches the intra-class distance within the same superclass to
facilitate subclass segmentation, and a HierarchicalMix model that generates
high-quality pseudo labels for unlabeled samples by fusing only similar
superclass regions from labeled and unlabeled images. Our experiments on the
BraTS2021 and ACDC datasets demonstrate that our approach achieves comparable
accuracy to a model trained with full subclass annotations, with limited
subclass annotations and sufficient superclass annotations. Our approach offers
a promising solution for efficient fine-grained subclass segmentation in
medical images. Our code is publicly available here.
| no_new_dataset | 0.711055 |
2307.00277 | Rayees Ahmad Thokar | Rayees Ahmad Thokar, Nikhil Gupta, K. R. Niazi, Anil Swarnkar, Nand K.
Meena, and Jin Yang | Optimally Coordinated Energy Management Framework for Profit
Maximization Considering Dispatchable and Non-Dispatchable Energy Resources | null | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contemporary distribution network can be seen with diverse dispatchable and
non-dispatchable energy resources. The coordinated scheduling of these
dispatchable resources with non-dispatchable resources can provide several
techno-economic and social benefits. Since, battery energy storage systems
(BESSs) and microturbine (MT) units are capital intensive, a thorough
investigation of their coordinated scheduling on pure economic basis will be an
interesting and challenging task while considering dynamic electricity price
and uncertainty handling of non-dispatchable resources and load demand. This
paper proposes a new methodology for optimal coordinated scheduling of BESSs
and MT units considering existing renewable energy resources and dynamic
electricity price to maximize daily profit function of the utility by employing
a recently explored modified African buffalo optimization (MABO) algorithm. The
key attributes of the proposed methodology are comprised of mean price-based
adaptive scheduling embedded within a decision mechanism system (DMS) to
maximize arbitrage benefits. DMS keeps a track of system states as a-priori
thus guides the artificial intelligence based solution technique for sequential
optimization. This may also reduce the computational burden of complex
real-life engineering optimization problems. Further, a novel concept of
fictitious charges is proposed to restrict the counterproductive operational
management of BESSs. The application results investigated and compared on a
benchmark 33-bus test distribution system highlights the importance of the
proposed methodology.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 09:11:50 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Thokar",
"Rayees Ahmad",
""
],
[
"Gupta",
"Nikhil",
""
],
[
"Niazi",
"K. R.",
""
],
[
"Swarnkar",
"Anil",
""
],
[
"Meena",
"Nand K.",
""
],
[
"Yang",
"Jin",
""
]
] | TITLE: Optimally Coordinated Energy Management Framework for Profit
Maximization Considering Dispatchable and Non-Dispatchable Energy Resources
ABSTRACT: Contemporary distribution network can be seen with diverse dispatchable and
non-dispatchable energy resources. The coordinated scheduling of these
dispatchable resources with non-dispatchable resources can provide several
techno-economic and social benefits. Since, battery energy storage systems
(BESSs) and microturbine (MT) units are capital intensive, a thorough
investigation of their coordinated scheduling on pure economic basis will be an
interesting and challenging task while considering dynamic electricity price
and uncertainty handling of non-dispatchable resources and load demand. This
paper proposes a new methodology for optimal coordinated scheduling of BESSs
and MT units considering existing renewable energy resources and dynamic
electricity price to maximize daily profit function of the utility by employing
a recently explored modified African buffalo optimization (MABO) algorithm. The
key attributes of the proposed methodology are comprised of mean price-based
adaptive scheduling embedded within a decision mechanism system (DMS) to
maximize arbitrage benefits. DMS keeps a track of system states as a-priori
thus guides the artificial intelligence based solution technique for sequential
optimization. This may also reduce the computational burden of complex
real-life engineering optimization problems. Further, a novel concept of
fictitious charges is proposed to restrict the counterproductive operational
management of BESSs. The application results investigated and compared on a
benchmark 33-bus test distribution system highlights the importance of the
proposed methodology.
| no_new_dataset | 0.70878 |
2307.00280 | Wang Yan | Yan Wang, Yuhang Li, Ruihao Gong, Aishan Liu, Yanfei Wang, Jian Hu,
Yongqiang Yao, Yunchen Zhang, Tianzi Xiao, Fengwei Yu, Xianglong Liu | SysNoise: Exploring and Benchmarking Training-Deployment System
Inconsistency | Proceedings of Machine Learning and Systems. 2023 Mar 18 | Proceedings of Machine Learning and Systems 2023 | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Extensive studies have shown that deep learning models are vulnerable to
adversarial and natural noises, yet little is known about model robustness on
noises caused by different system implementations. In this paper, we for the
first time introduce SysNoise, a frequently occurred but often overlooked noise
in the deep learning training-deployment cycle. In particular, SysNoise happens
when the source training system switches to a disparate target system in
deployments, where various tiny system mismatch adds up to a non-negligible
difference. We first identify and classify SysNoise into three categories based
on the inference stage; we then build a holistic benchmark to quantitatively
measure the impact of SysNoise on 20+ models, comprehending image
classification, object detection, instance segmentation and natural language
processing tasks. Our extensive experiments revealed that SysNoise could bring
certain impacts on model robustness across different tasks and common
mitigations like data augmentation and adversarial training show limited
effects on it. Together, our findings open a new research topic and we hope
this work will raise research attention to deep learning deployment systems
accounting for model performance. We have open-sourced the benchmark and
framework at https://modeltc.github.io/systemnoise_web.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 09:22:54 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Wang",
"Yan",
""
],
[
"Li",
"Yuhang",
""
],
[
"Gong",
"Ruihao",
""
],
[
"Liu",
"Aishan",
""
],
[
"Wang",
"Yanfei",
""
],
[
"Hu",
"Jian",
""
],
[
"Yao",
"Yongqiang",
""
],
[
"Zhang",
"Yunchen",
""
],
[
"Xiao",
"Tianzi",
""
],
[
"Yu",
"Fengwei",
""
],
[
"Liu",
"Xianglong",
""
]
] | TITLE: SysNoise: Exploring and Benchmarking Training-Deployment System
Inconsistency
ABSTRACT: Extensive studies have shown that deep learning models are vulnerable to
adversarial and natural noises, yet little is known about model robustness on
noises caused by different system implementations. In this paper, we for the
first time introduce SysNoise, a frequently occurred but often overlooked noise
in the deep learning training-deployment cycle. In particular, SysNoise happens
when the source training system switches to a disparate target system in
deployments, where various tiny system mismatch adds up to a non-negligible
difference. We first identify and classify SysNoise into three categories based
on the inference stage; we then build a holistic benchmark to quantitatively
measure the impact of SysNoise on 20+ models, comprehending image
classification, object detection, instance segmentation and natural language
processing tasks. Our extensive experiments revealed that SysNoise could bring
certain impacts on model robustness across different tasks and common
mitigations like data augmentation and adversarial training show limited
effects on it. Together, our findings open a new research topic and we hope
this work will raise research attention to deep learning deployment systems
accounting for model performance. We have open-sourced the benchmark and
framework at https://modeltc.github.io/systemnoise_web.
| no_new_dataset | 0.70844 |
2307.00285 | Lennart Purucker | Lennart Purucker, Joeran Beel | Assembled-OpenML: Creating Efficient Benchmarks for Ensembles in AutoML
with OpenML | 5 pages main paper, 13 pages references and appendix, 2 figures, 1
table, poster presented at: International Conference on Automated Machine
Learning 2022, Workshop Track | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Automated Machine Learning (AutoML) frameworks regularly use ensembles.
Developers need to compare different ensemble techniques to select appropriate
techniques for an AutoML framework from the many potential techniques. So far,
the comparison of ensemble techniques is often computationally expensive,
because many base models must be trained and evaluated one or multiple times.
Therefore, we present Assembled-OpenML. Assembled-OpenML is a Python tool,
which builds meta-datasets for ensembles using OpenML. A meta-dataset, called
Metatask, consists of the data of an OpenML task, the task's dataset, and
prediction data from model evaluations for the task. We can make the comparison
of ensemble techniques computationally cheaper by using the predictions stored
in a metatask instead of training and evaluating base models. To introduce
Assembled-OpenML, we describe the first version of our tool. Moreover, we
present an example of using Assembled-OpenML to compare a set of ensemble
techniques. For this example comparison, we built a benchmark using
Assembled-OpenML and implemented ensemble techniques expecting predictions
instead of base models as input. In our example comparison, we gathered the
prediction data of $1523$ base models for $31$ datasets. Obtaining the
prediction data for all base models using Assembled-OpenML took ${\sim} 1$ hour
in total. In comparison, obtaining the prediction data by training and
evaluating just one base model on the most computationally expensive dataset
took ${\sim} 37$ minutes.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 09:46:59 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Purucker",
"Lennart",
""
],
[
"Beel",
"Joeran",
""
]
] | TITLE: Assembled-OpenML: Creating Efficient Benchmarks for Ensembles in AutoML
with OpenML
ABSTRACT: Automated Machine Learning (AutoML) frameworks regularly use ensembles.
Developers need to compare different ensemble techniques to select appropriate
techniques for an AutoML framework from the many potential techniques. So far,
the comparison of ensemble techniques is often computationally expensive,
because many base models must be trained and evaluated one or multiple times.
Therefore, we present Assembled-OpenML. Assembled-OpenML is a Python tool,
which builds meta-datasets for ensembles using OpenML. A meta-dataset, called
Metatask, consists of the data of an OpenML task, the task's dataset, and
prediction data from model evaluations for the task. We can make the comparison
of ensemble techniques computationally cheaper by using the predictions stored
in a metatask instead of training and evaluating base models. To introduce
Assembled-OpenML, we describe the first version of our tool. Moreover, we
present an example of using Assembled-OpenML to compare a set of ensemble
techniques. For this example comparison, we built a benchmark using
Assembled-OpenML and implemented ensemble techniques expecting predictions
instead of base models as input. In our example comparison, we gathered the
prediction data of $1523$ base models for $31$ datasets. Obtaining the
prediction data for all base models using Assembled-OpenML took ${\sim} 1$ hour
in total. In comparison, obtaining the prediction data by training and
evaluating just one base model on the most computationally expensive dataset
took ${\sim} 37$ minutes.
| no_new_dataset | 0.705341 |
2307.00286 | Lennart Purucker | Lennart Purucker, Joeran Beel | CMA-ES for Post Hoc Ensembling in AutoML: A Great Success and
Salvageable Failure | 10 pages main paper, 13 pages references and appendix, 4 figures, 14
subfigures, 10 tables, to be published in: International Conference on
Automated Machine Learning 2023 | null | null | null | cs.LG cs.NE | http://creativecommons.org/licenses/by/4.0/ | Many state-of-the-art automated machine learning (AutoML) systems use greedy
ensemble selection (GES) by Caruana et al. (2004) to ensemble models found
during model selection post hoc. Thereby, boosting predictive performance and
likely following Auto-Sklearn 1's insight that alternatives, like stacking or
gradient-free numerical optimization, overfit. Overfitting in Auto-Sklearn 1 is
much more likely than in other AutoML systems because it uses only low-quality
validation data for post hoc ensembling. Therefore, we were motivated to
analyze whether Auto-Sklearn 1's insight holds true for systems with
higher-quality validation data. Consequently, we compared the performance of
covariance matrix adaptation evolution strategy (CMA-ES), state-of-the-art
gradient-free numerical optimization, to GES on the 71 classification datasets
from the AutoML benchmark for AutoGluon. We found that Auto-Sklearn's insight
depends on the chosen metric. For the metric ROC AUC, CMA-ES overfits
drastically and is outperformed by GES -- statistically significantly for
multi-class classification. For the metric balanced accuracy, CMA-ES does not
overfit and outperforms GES significantly. Motivated by the successful
application of CMA-ES for balanced accuracy, we explored methods to stop CMA-ES
from overfitting for ROC AUC. We propose a method to normalize the weights
produced by CMA-ES, inspired by GES, that avoids overfitting for CMA-ES and
makes CMA-ES perform better than or similar to GES for ROC AUC.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 09:47:59 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Purucker",
"Lennart",
""
],
[
"Beel",
"Joeran",
""
]
] | TITLE: CMA-ES for Post Hoc Ensembling in AutoML: A Great Success and
Salvageable Failure
ABSTRACT: Many state-of-the-art automated machine learning (AutoML) systems use greedy
ensemble selection (GES) by Caruana et al. (2004) to ensemble models found
during model selection post hoc. Thereby, boosting predictive performance and
likely following Auto-Sklearn 1's insight that alternatives, like stacking or
gradient-free numerical optimization, overfit. Overfitting in Auto-Sklearn 1 is
much more likely than in other AutoML systems because it uses only low-quality
validation data for post hoc ensembling. Therefore, we were motivated to
analyze whether Auto-Sklearn 1's insight holds true for systems with
higher-quality validation data. Consequently, we compared the performance of
covariance matrix adaptation evolution strategy (CMA-ES), state-of-the-art
gradient-free numerical optimization, to GES on the 71 classification datasets
from the AutoML benchmark for AutoGluon. We found that Auto-Sklearn's insight
depends on the chosen metric. For the metric ROC AUC, CMA-ES overfits
drastically and is outperformed by GES -- statistically significantly for
multi-class classification. For the metric balanced accuracy, CMA-ES does not
overfit and outperforms GES significantly. Motivated by the successful
application of CMA-ES for balanced accuracy, we explored methods to stop CMA-ES
from overfitting for ROC AUC. We propose a method to normalize the weights
produced by CMA-ES, inspired by GES, that avoids overfitting for CMA-ES and
makes CMA-ES perform better than or similar to GES for ROC AUC.
| no_new_dataset | 0.710616 |
2307.00313 | Peidong Jia | Peidong Jia, Jiaming Liu, Senqiao Yang, Jiarui Wu, Xiaodong Xie,
Shanghang Zhang | PM-DETR: Domain Adaptive Prompt Memory for Object Detection with
Transformers | cs.cv | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The Transformer-based detectors (i.e., DETR) have demonstrated impressive
performance on end-to-end object detection. However, transferring DETR to
different data distributions may lead to a significant performance degradation.
Existing adaptation techniques focus on model-based approaches, which aim to
leverage feature alignment to narrow the distribution shift between different
domains. In this study, we propose a hierarchical Prompt Domain Memory (PDM)
for adapting detection transformers to different distributions. PDM
comprehensively leverages the prompt memory to extract domain-specific
knowledge and explicitly constructs a long-term memory space for the data
distribution, which represents better domain diversity compared to existing
methods. Specifically, each prompt and its corresponding distribution value are
paired in the memory space, and we inject top M distribution-similar prompts
into the input and multi-level embeddings of DETR. Additionally, we introduce
the Prompt Memory Alignment (PMA) to reduce the discrepancy between the source
and target domains by fully leveraging the domain-specific knowledge extracted
from the prompt domain memory. Extensive experiments demonstrate that our
method outperforms state-of-the-art domain adaptive object detection methods on
three benchmarks, including scene, synthetic to real, and weather adaptation.
Codes will be released.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 12:02:24 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Jia",
"Peidong",
""
],
[
"Liu",
"Jiaming",
""
],
[
"Yang",
"Senqiao",
""
],
[
"Wu",
"Jiarui",
""
],
[
"Xie",
"Xiaodong",
""
],
[
"Zhang",
"Shanghang",
""
]
] | TITLE: PM-DETR: Domain Adaptive Prompt Memory for Object Detection with
Transformers
ABSTRACT: The Transformer-based detectors (i.e., DETR) have demonstrated impressive
performance on end-to-end object detection. However, transferring DETR to
different data distributions may lead to a significant performance degradation.
Existing adaptation techniques focus on model-based approaches, which aim to
leverage feature alignment to narrow the distribution shift between different
domains. In this study, we propose a hierarchical Prompt Domain Memory (PDM)
for adapting detection transformers to different distributions. PDM
comprehensively leverages the prompt memory to extract domain-specific
knowledge and explicitly constructs a long-term memory space for the data
distribution, which represents better domain diversity compared to existing
methods. Specifically, each prompt and its corresponding distribution value are
paired in the memory space, and we inject top M distribution-similar prompts
into the input and multi-level embeddings of DETR. Additionally, we introduce
the Prompt Memory Alignment (PMA) to reduce the discrepancy between the source
and target domains by fully leveraging the domain-specific knowledge extracted
from the prompt domain memory. Extensive experiments demonstrate that our
method outperforms state-of-the-art domain adaptive object detection methods on
three benchmarks, including scene, synthetic to real, and weather adaptation.
Codes will be released.
| no_new_dataset | 0.710641 |
2307.00314 | Jit Mukherjee | Jit Mukherjee | Detection of River Sandbank for Sand Mining with the Presence of Other
High Mineral Content Regions Using Multi-spectral Images | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sand mining is a booming industry. The river sandbank is one of the primary
sources of sand mining. Detection of potential river sandbank regions for sand
mining directly impacts the economy, society, and environment. In the past,
semi-supervised and supervised techniques have been used to detect mining
regions including sand mining. A few techniques employ multi-modal analysis
combining different modalities such as multi-spectral imaging, synthetic
aperture radar (\emph{SAR}) imaging, aerial images, and point cloud data.
However, the distinguishing spectral characteristics of river sandbank regions
are yet to be fully explored. This paper provides a novel method to detect
river sandbank regions for sand mining using multi-spectral images without any
labeled data over the seasons. Association with a river stream and the
abundance of minerals are the most prominent features of such a region. The
proposed work uses these distinguishing features to determine the spectral
signature of a river sandbank region, which is robust to other high mineral
abundance regions. It follows a two-step approach, where first, potential high
mineral regions are detected and next, they are segregated using the presence
of a river stream. The proposed technique provides average accuracy, precision,
and recall of 90.75%, 85.47%, and 73.5%, respectively over the seasons from
Landsat 8 images without using any labeled dataset.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 12:03:17 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Mukherjee",
"Jit",
""
]
] | TITLE: Detection of River Sandbank for Sand Mining with the Presence of Other
High Mineral Content Regions Using Multi-spectral Images
ABSTRACT: Sand mining is a booming industry. The river sandbank is one of the primary
sources of sand mining. Detection of potential river sandbank regions for sand
mining directly impacts the economy, society, and environment. In the past,
semi-supervised and supervised techniques have been used to detect mining
regions including sand mining. A few techniques employ multi-modal analysis
combining different modalities such as multi-spectral imaging, synthetic
aperture radar (\emph{SAR}) imaging, aerial images, and point cloud data.
However, the distinguishing spectral characteristics of river sandbank regions
are yet to be fully explored. This paper provides a novel method to detect
river sandbank regions for sand mining using multi-spectral images without any
labeled data over the seasons. Association with a river stream and the
abundance of minerals are the most prominent features of such a region. The
proposed work uses these distinguishing features to determine the spectral
signature of a river sandbank region, which is robust to other high mineral
abundance regions. It follows a two-step approach, where first, potential high
mineral regions are detected and next, they are segregated using the presence
of a river stream. The proposed technique provides average accuracy, precision,
and recall of 90.75%, 85.47%, and 73.5%, respectively over the seasons from
Landsat 8 images without using any labeled dataset.
| no_new_dataset | 0.711481 |
2307.00324 | Pradeep Singh Ph.D. | Kishore Babu Nampalle, Pradeep Singh, Uppala Vivek Narayan,
Balasubramanian Raman | DeepMediX: A Deep Learning-Driven Resource-Efficient Medical Diagnosis
Across the Spectrum | 23 pages, 3 figures, 4 tables, 1 algorithm | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | In the rapidly evolving landscape of medical imaging diagnostics, achieving
high accuracy while preserving computational efficiency remains a formidable
challenge. This work presents \texttt{DeepMediX}, a groundbreaking,
resource-efficient model that significantly addresses this challenge. Built on
top of the MobileNetV2 architecture, DeepMediX excels in classifying brain MRI
scans and skin cancer images, with superior performance demonstrated on both
binary and multiclass skin cancer datasets. It provides a solution to
labor-intensive manual processes, the need for large datasets, and complexities
related to image properties. DeepMediX's design also includes the concept of
Federated Learning, enabling a collaborative learning approach without
compromising data privacy. This approach allows diverse healthcare institutions
to benefit from shared learning experiences without the necessity of direct
data access, enhancing the model's predictive power while preserving the
privacy and integrity of sensitive patient data. Its low computational
footprint makes DeepMediX suitable for deployment on handheld devices, offering
potential for real-time diagnostic support. Through rigorous testing on
standard datasets, including the ISIC2018 for dermatological research,
DeepMediX demonstrates exceptional diagnostic capabilities, matching the
performance of existing models on almost all tasks and even outperforming them
in some cases. The findings of this study underline significant implications
for the development and deployment of AI-based tools in medical imaging and
their integration into point-of-care settings. The source code and models
generated would be released at https://github.com/kishorebabun/DeepMediX.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 12:30:58 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Nampalle",
"Kishore Babu",
""
],
[
"Singh",
"Pradeep",
""
],
[
"Narayan",
"Uppala Vivek",
""
],
[
"Raman",
"Balasubramanian",
""
]
] | TITLE: DeepMediX: A Deep Learning-Driven Resource-Efficient Medical Diagnosis
Across the Spectrum
ABSTRACT: In the rapidly evolving landscape of medical imaging diagnostics, achieving
high accuracy while preserving computational efficiency remains a formidable
challenge. This work presents \texttt{DeepMediX}, a groundbreaking,
resource-efficient model that significantly addresses this challenge. Built on
top of the MobileNetV2 architecture, DeepMediX excels in classifying brain MRI
scans and skin cancer images, with superior performance demonstrated on both
binary and multiclass skin cancer datasets. It provides a solution to
labor-intensive manual processes, the need for large datasets, and complexities
related to image properties. DeepMediX's design also includes the concept of
Federated Learning, enabling a collaborative learning approach without
compromising data privacy. This approach allows diverse healthcare institutions
to benefit from shared learning experiences without the necessity of direct
data access, enhancing the model's predictive power while preserving the
privacy and integrity of sensitive patient data. Its low computational
footprint makes DeepMediX suitable for deployment on handheld devices, offering
potential for real-time diagnostic support. Through rigorous testing on
standard datasets, including the ISIC2018 for dermatological research,
DeepMediX demonstrates exceptional diagnostic capabilities, matching the
performance of existing models on almost all tasks and even outperforming them
in some cases. The findings of this study underline significant implications
for the development and deployment of AI-based tools in medical imaging and
their integration into point-of-care settings. The source code and models
generated would be released at https://github.com/kishorebabun/DeepMediX.
| no_new_dataset | 0.70825 |
2307.00327 | Yuan Fang | Yuan Fang, Yuanzhi Cai, and Lei Fan | SDRCNN: A single-scale dense residual connected convolutional neural
network for pansharpening | This paper has been accepted for publication in the IEEE Journal of
Selected Topics in Applied Earth Observations and Remote Sensing | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Pansharpening is a process of fusing a high spatial resolution panchromatic
image and a low spatial resolution multispectral image to create a
high-resolution multispectral image. A novel single-branch, single-scale
lightweight convolutional neural network, named SDRCNN, is developed in this
study. By using a novel dense residual connected structure and convolution
block, SDRCNN achieved a better trade-off between accuracy and efficiency. The
performance of SDRCNN was tested using four datasets from the WorldView-3,
WorldView-2 and QuickBird satellites. The compared methods include eight
traditional methods (i.e., GS, GSA, PRACS, BDSD, SFIM, GLP-CBD, CDIF and
LRTCFPan) and five lightweight deep learning methods (i.e., PNN, PanNet,
BayesianNet, DMDNet and FusionNet). Based on a visual inspection of the
pansharpened images created and the associated absolute residual maps, SDRCNN
exhibited least spatial detail blurring and spectral distortion, amongst all
the methods considered. The values of the quantitative evaluation metrics were
closest to their ideal values when SDRCNN was used. The processing time of
SDRCNN was also the shortest among all methods tested. Finally, the
effectiveness of each component in the SDRCNN was demonstrated in ablation
experiments. All of these confirmed the superiority of SDRCNN.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 12:40:39 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Fang",
"Yuan",
""
],
[
"Cai",
"Yuanzhi",
""
],
[
"Fan",
"Lei",
""
]
] | TITLE: SDRCNN: A single-scale dense residual connected convolutional neural
network for pansharpening
ABSTRACT: Pansharpening is a process of fusing a high spatial resolution panchromatic
image and a low spatial resolution multispectral image to create a
high-resolution multispectral image. A novel single-branch, single-scale
lightweight convolutional neural network, named SDRCNN, is developed in this
study. By using a novel dense residual connected structure and convolution
block, SDRCNN achieved a better trade-off between accuracy and efficiency. The
performance of SDRCNN was tested using four datasets from the WorldView-3,
WorldView-2 and QuickBird satellites. The compared methods include eight
traditional methods (i.e., GS, GSA, PRACS, BDSD, SFIM, GLP-CBD, CDIF and
LRTCFPan) and five lightweight deep learning methods (i.e., PNN, PanNet,
BayesianNet, DMDNet and FusionNet). Based on a visual inspection of the
pansharpened images created and the associated absolute residual maps, SDRCNN
exhibited least spatial detail blurring and spectral distortion, amongst all
the methods considered. The values of the quantitative evaluation metrics were
closest to their ideal values when SDRCNN was used. The processing time of
SDRCNN was also the shortest among all methods tested. Finally, the
effectiveness of each component in the SDRCNN was demonstrated in ablation
experiments. All of these confirmed the superiority of SDRCNN.
| no_new_dataset | 0.713631 |
2307.00335 | Gowtham Ramesh | Gowtham Ramesh and Makesh Sreedhar and Junjie Hu | Single Sequence Prediction over Reasoning Graphs for Multi-hop QA | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Recent generative approaches for multi-hop question answering (QA) utilize
the fusion-in-decoder method~\cite{izacard-grave-2021-leveraging} to generate a
single sequence output which includes both a final answer and a reasoning path
taken to arrive at that answer, such as passage titles and key facts from those
passages. While such models can lead to better interpretability and high
quantitative scores, they often have difficulty accurately identifying the
passages corresponding to key entities in the context, resulting in incorrect
passage hops and a lack of faithfulness in the reasoning path. To address this,
we propose a single-sequence prediction method over a local reasoning graph
(\model)\footnote{Code/Models will be released at
\url{https://github.com/gowtham1997/SeqGraph}} that integrates a graph
structure connecting key entities in each context passage to relevant
subsequent passages for each question. We use a graph neural network to encode
this graph structure and fuse the resulting representations into the entity
representations of the model. Our experiments show significant improvements in
answer exact-match/F1 scores and faithfulness of grounding in the reasoning
path on the HotpotQA dataset and achieve state-of-the-art numbers on the
Musique dataset with only up to a 4\% increase in model parameters.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 13:15:09 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ramesh",
"Gowtham",
""
],
[
"Sreedhar",
"Makesh",
""
],
[
"Hu",
"Junjie",
""
]
] | TITLE: Single Sequence Prediction over Reasoning Graphs for Multi-hop QA
ABSTRACT: Recent generative approaches for multi-hop question answering (QA) utilize
the fusion-in-decoder method~\cite{izacard-grave-2021-leveraging} to generate a
single sequence output which includes both a final answer and a reasoning path
taken to arrive at that answer, such as passage titles and key facts from those
passages. While such models can lead to better interpretability and high
quantitative scores, they often have difficulty accurately identifying the
passages corresponding to key entities in the context, resulting in incorrect
passage hops and a lack of faithfulness in the reasoning path. To address this,
we propose a single-sequence prediction method over a local reasoning graph
(\model)\footnote{Code/Models will be released at
\url{https://github.com/gowtham1997/SeqGraph}} that integrates a graph
structure connecting key entities in each context passage to relevant
subsequent passages for each question. We use a graph neural network to encode
this graph structure and fuse the resulting representations into the entity
representations of the model. Our experiments show significant improvements in
answer exact-match/F1 scores and faithfulness of grounding in the reasoning
path on the HotpotQA dataset and achieve state-of-the-art numbers on the
Musique dataset with only up to a 4\% increase in model parameters.
| no_new_dataset | 0.712414 |
2307.00342 | Karl Stratos | Wenzheng Zhang, Chenyan Xiong, Karl Stratos, Arnold Overwijk | Improving Multitask Retrieval by Promoting Task Specialization | TACL 2023 | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In multitask retrieval, a single retriever is trained to retrieve relevant
contexts for multiple tasks. Despite its practical appeal, naive multitask
retrieval lags behind task-specific retrieval in which a separate retriever is
trained for each task. We show that it is possible to train a multitask
retriever that outperforms task-specific retrievers by promoting task
specialization. The main ingredients are: (1) a better choice of pretrained
model (one that is explicitly optimized for multitasking) along with compatible
prompting, and (2) a novel adaptive learning method that encourages each
parameter to specialize in a particular task. The resulting multitask retriever
is highly performant on the KILT benchmark. Upon analysis, we find that the
model indeed learns parameters that are more task-specialized compared to naive
multitasking without prompting or adaptive learning.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 13:45:15 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zhang",
"Wenzheng",
""
],
[
"Xiong",
"Chenyan",
""
],
[
"Stratos",
"Karl",
""
],
[
"Overwijk",
"Arnold",
""
]
] | TITLE: Improving Multitask Retrieval by Promoting Task Specialization
ABSTRACT: In multitask retrieval, a single retriever is trained to retrieve relevant
contexts for multiple tasks. Despite its practical appeal, naive multitask
retrieval lags behind task-specific retrieval in which a separate retriever is
trained for each task. We show that it is possible to train a multitask
retriever that outperforms task-specific retrievers by promoting task
specialization. The main ingredients are: (1) a better choice of pretrained
model (one that is explicitly optimized for multitasking) along with compatible
prompting, and (2) a novel adaptive learning method that encourages each
parameter to specialize in a particular task. The resulting multitask retriever
is highly performant on the KILT benchmark. Upon analysis, we find that the
model indeed learns parameters that are more task-specialized compared to naive
multitasking without prompting or adaptive learning.
| no_new_dataset | 0.709057 |
2307.00356 | Zekai Chen | Zekai Chen, Fuyi Wang, Zhiwei Zheng, Ximeng Liu, Yujie Lin | Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data | Accepted by IEEE ICME 2023 | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Federated learning (FL) enables multiple clients to collaboratively train
deep learning models while considering sensitive local datasets' privacy.
However, adversaries can manipulate datasets and upload models by injecting
triggers for federated backdoor attacks (FBA). Existing defense strategies
against FBA consider specific and limited attacker models, and a sufficient
amount of noise to be injected only mitigates rather than eliminates FBA. To
address these deficiencies, we introduce a Flexible Federated Backdoor Defense
Framework (Fedward) to ensure the elimination of adversarial backdoors. We
decompose FBA into various attacks, and design amplified magnitude
sparsification (AmGrad) and adaptive OPTICS clustering (AutoOPTICS) to address
each attack. Meanwhile, Fedward uses the adaptive clipping method by regarding
the number of samples in the benign group as constraints on the boundary. This
ensures that Fedward can maintain the performance for the Non-IID scenario. We
conduct experimental evaluations over three benchmark datasets and thoroughly
compare them to state-of-the-art studies. The results demonstrate the promising
defense performance from Fedward, moderately improved by 33% $\sim$ 75 in
clustering defense methods, and 96.98%, 90.74%, and 89.8% for Non-IID to the
utmost extent for the average FBA success rate over MNIST, FMNIST, and CIFAR10,
respectively.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 15:01:03 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Chen",
"Zekai",
""
],
[
"Wang",
"Fuyi",
""
],
[
"Zheng",
"Zhiwei",
""
],
[
"Liu",
"Ximeng",
""
],
[
"Lin",
"Yujie",
""
]
] | TITLE: Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data
ABSTRACT: Federated learning (FL) enables multiple clients to collaboratively train
deep learning models while considering sensitive local datasets' privacy.
However, adversaries can manipulate datasets and upload models by injecting
triggers for federated backdoor attacks (FBA). Existing defense strategies
against FBA consider specific and limited attacker models, and a sufficient
amount of noise to be injected only mitigates rather than eliminates FBA. To
address these deficiencies, we introduce a Flexible Federated Backdoor Defense
Framework (Fedward) to ensure the elimination of adversarial backdoors. We
decompose FBA into various attacks, and design amplified magnitude
sparsification (AmGrad) and adaptive OPTICS clustering (AutoOPTICS) to address
each attack. Meanwhile, Fedward uses the adaptive clipping method by regarding
the number of samples in the benign group as constraints on the boundary. This
ensures that Fedward can maintain the performance for the Non-IID scenario. We
conduct experimental evaluations over three benchmark datasets and thoroughly
compare them to state-of-the-art studies. The results demonstrate the promising
defense performance from Fedward, moderately improved by 33% $\sim$ 75 in
clustering defense methods, and 96.98%, 90.74%, and 89.8% for Non-IID to the
utmost extent for the average FBA success rate over MNIST, FMNIST, and CIFAR10,
respectively.
| no_new_dataset | 0.709007 |
2307.00368 | Antonio Emanuele Cin\`a | Dario Lazzaro, Antonio Emanuele Cin\`a, Maura Pintor, Ambra Demontis,
Battista Biggio, Fabio Roli, Marcello Pelillo | Minimizing Energy Consumption of Deep Learning Models by Energy-Aware
Training | 12 pages, 3 figures. Paper accepted at the 22nd International
Conference on Image Analysis and Processing (ICIAP) 2023 | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning models undergo a significant increase in the number of
parameters they possess, leading to the execution of a larger number of
operations during inference. This expansion significantly contributes to higher
energy consumption and prediction latency. In this work, we propose EAT, a
gradient-based algorithm that aims to reduce energy consumption during model
training. To this end, we leverage a differentiable approximation of the
$\ell_0$ norm, and use it as a sparse penalty over the training loss. Through
our experimental analysis conducted on three datasets and two deep neural
networks, we demonstrate that our energy-aware training algorithm EAT is able
to train networks with a better trade-off between classification performance
and energy efficiency.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 15:44:01 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Lazzaro",
"Dario",
""
],
[
"Cinà",
"Antonio Emanuele",
""
],
[
"Pintor",
"Maura",
""
],
[
"Demontis",
"Ambra",
""
],
[
"Biggio",
"Battista",
""
],
[
"Roli",
"Fabio",
""
],
[
"Pelillo",
"Marcello",
""
]
] | TITLE: Minimizing Energy Consumption of Deep Learning Models by Energy-Aware
Training
ABSTRACT: Deep learning models undergo a significant increase in the number of
parameters they possess, leading to the execution of a larger number of
operations during inference. This expansion significantly contributes to higher
energy consumption and prediction latency. In this work, we propose EAT, a
gradient-based algorithm that aims to reduce energy consumption during model
training. To this end, we leverage a differentiable approximation of the
$\ell_0$ norm, and use it as a sparse penalty over the training loss. Through
our experimental analysis conducted on three datasets and two deep neural
networks, we demonstrate that our energy-aware training algorithm EAT is able
to train networks with a better trade-off between classification performance
and energy efficiency.
| no_new_dataset | 0.712389 |
2307.00379 | Sokratis Anagnostopoulos | Sokratis J. Anagnostopoulos, Juan Diego Toscano, Nikolaos
Stergiopulos, George Em Karniadakis | Residual-based attention and connection to information bottleneck theory
in PINNs | null | null | null | null | cs.LG physics.comp-ph | http://creativecommons.org/licenses/by/4.0/ | Driven by the need for more efficient and seamless integration of physical
models and data, physics-informed neural networks (PINNs) have seen a surge of
interest in recent years. However, ensuring the reliability of their
convergence and accuracy remains a challenge. In this work, we propose an
efficient, gradient-less weighting scheme for PINNs, that accelerates the
convergence of dynamic or static systems. This simple yet effective attention
mechanism is a function of the evolving cumulative residuals and aims to make
the optimizer aware of problematic regions at no extra computational cost or
adversarial learning. We illustrate that this general method consistently
achieves a relative $L^{2}$ error of the order of $10^{-5}$ using standard
optimizers on typical benchmark cases of the literature. Furthermore, by
investigating the evolution of weights during training, we identify two
distinct learning phases reminiscent of the fitting and diffusion phases
proposed by the information bottleneck (IB) theory. Subsequent gradient
analysis supports this hypothesis by aligning the transition from high to low
signal-to-noise ratio (SNR) with the transition from fitting to diffusion
regimes of the adopted weights. This novel correlation between PINNs and IB
theory could open future possibilities for understanding the underlying
mechanisms behind the training and stability of PINNs and, more broadly, of
neural operators.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 16:29:55 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Anagnostopoulos",
"Sokratis J.",
""
],
[
"Toscano",
"Juan Diego",
""
],
[
"Stergiopulos",
"Nikolaos",
""
],
[
"Karniadakis",
"George Em",
""
]
] | TITLE: Residual-based attention and connection to information bottleneck theory
in PINNs
ABSTRACT: Driven by the need for more efficient and seamless integration of physical
models and data, physics-informed neural networks (PINNs) have seen a surge of
interest in recent years. However, ensuring the reliability of their
convergence and accuracy remains a challenge. In this work, we propose an
efficient, gradient-less weighting scheme for PINNs, that accelerates the
convergence of dynamic or static systems. This simple yet effective attention
mechanism is a function of the evolving cumulative residuals and aims to make
the optimizer aware of problematic regions at no extra computational cost or
adversarial learning. We illustrate that this general method consistently
achieves a relative $L^{2}$ error of the order of $10^{-5}$ using standard
optimizers on typical benchmark cases of the literature. Furthermore, by
investigating the evolution of weights during training, we identify two
distinct learning phases reminiscent of the fitting and diffusion phases
proposed by the information bottleneck (IB) theory. Subsequent gradient
analysis supports this hypothesis by aligning the transition from high to low
signal-to-noise ratio (SNR) with the transition from fitting to diffusion
regimes of the adopted weights. This novel correlation between PINNs and IB
theory could open future possibilities for understanding the underlying
mechanisms behind the training and stability of PINNs and, more broadly, of
neural operators.
| no_new_dataset | 0.70878 |
2307.00407 | Pranav Jeevan P | Pranav Jeevan, Dharshan Sampath Kumar, Amit Sethi | WavePaint: Resource-efficient Token-mixer for Self-supervised Inpainting | 11 pages, 7 figures | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Image inpainting, which refers to the synthesis of missing regions in an
image, can help restore occluded or degraded areas and also serve as a
precursor task for self-supervision. The current state-of-the-art models for
image inpainting are computationally heavy as they are based on transformer or
CNN backbones that are trained in adversarial or diffusion settings. This paper
diverges from vision transformers by using a computationally-efficient
WaveMix-based fully convolutional architecture -- WavePaint. It uses a
2D-discrete wavelet transform (DWT) for spatial and multi-resolution
token-mixing along with convolutional layers. The proposed model outperforms
the current state-of-the-art models for image inpainting on reconstruction
quality while also using less than half the parameter count and considerably
lower training and evaluation times. Our model even outperforms current
GAN-based architectures in CelebA-HQ dataset without using an adversarially
trainable discriminator. Our work suggests that neural architectures that are
modeled after natural image priors require fewer parameters and computations to
achieve generalization comparable to transformers.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 18:41:34 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Jeevan",
"Pranav",
""
],
[
"Kumar",
"Dharshan Sampath",
""
],
[
"Sethi",
"Amit",
""
]
] | TITLE: WavePaint: Resource-efficient Token-mixer for Self-supervised Inpainting
ABSTRACT: Image inpainting, which refers to the synthesis of missing regions in an
image, can help restore occluded or degraded areas and also serve as a
precursor task for self-supervision. The current state-of-the-art models for
image inpainting are computationally heavy as they are based on transformer or
CNN backbones that are trained in adversarial or diffusion settings. This paper
diverges from vision transformers by using a computationally-efficient
WaveMix-based fully convolutional architecture -- WavePaint. It uses a
2D-discrete wavelet transform (DWT) for spatial and multi-resolution
token-mixing along with convolutional layers. The proposed model outperforms
the current state-of-the-art models for image inpainting on reconstruction
quality while also using less than half the parameter count and considerably
lower training and evaluation times. Our model even outperforms current
GAN-based architectures in CelebA-HQ dataset without using an adversarially
trainable discriminator. Our work suggests that neural architectures that are
modeled after natural image priors require fewer parameters and computations to
achieve generalization comparable to transformers.
| no_new_dataset | 0.709982 |
2307.00430 | Pranav Jeevan P | Pranav Jeevan, Akella Srinidhi, Pasunuri Prathiba, Amit Sethi | WaveMixSR: A Resource-efficient Neural Network for Image
Super-resolution | 10 pages, 3 figures | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Image super-resolution research recently been dominated by transformer models
which need higher computational resources than CNNs due to the quadratic
complexity of self-attention. We propose a new neural network -- WaveMixSR --
for image super-resolution based on WaveMix architecture which uses a
2D-discrete wavelet transform for spatial token-mixing. Unlike
transformer-based models, WaveMixSR does not unroll the image as a sequence of
pixels/patches. It uses the inductive bias of convolutions along with the
lossless token-mixing property of wavelet transform to achieve higher
performance while requiring fewer resources and training data. We compare the
performance of our network with other state-of-the-art methods for image
super-resolution. Our experiments show that WaveMixSR achieves competitive
performance in all datasets and reaches state-of-the-art performance in the
BSD100 dataset on multiple super-resolution tasks. Our model is able to achieve
this performance using less training data and computational resources while
maintaining high parameter efficiency compared to current state-of-the-art
models.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 21:25:03 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Jeevan",
"Pranav",
""
],
[
"Srinidhi",
"Akella",
""
],
[
"Prathiba",
"Pasunuri",
""
],
[
"Sethi",
"Amit",
""
]
] | TITLE: WaveMixSR: A Resource-efficient Neural Network for Image
Super-resolution
ABSTRACT: Image super-resolution research recently been dominated by transformer models
which need higher computational resources than CNNs due to the quadratic
complexity of self-attention. We propose a new neural network -- WaveMixSR --
for image super-resolution based on WaveMix architecture which uses a
2D-discrete wavelet transform for spatial token-mixing. Unlike
transformer-based models, WaveMixSR does not unroll the image as a sequence of
pixels/patches. It uses the inductive bias of convolutions along with the
lossless token-mixing property of wavelet transform to achieve higher
performance while requiring fewer resources and training data. We compare the
performance of our network with other state-of-the-art methods for image
super-resolution. Our experiments show that WaveMixSR achieves competitive
performance in all datasets and reaches state-of-the-art performance in the
BSD100 dataset on multiple super-resolution tasks. Our model is able to achieve
this performance using less training data and computational resources while
maintaining high parameter efficiency compared to current state-of-the-art
models.
| no_new_dataset | 0.709617 |
2307.00432 | Zezhou Huang | Zezhou Huang, Jiaxiang Liu, Daniel Alabi, Raul Castro Fernandez,
Eugene Wu | Saibot: A Differentially Private Data Search Platform | null | VLDB 2023 | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent data search platforms use ML task-based utility measures rather than
metadata-based keywords, to search large dataset corpora. Requesters submit a
training dataset and these platforms search for augmentations (join or union
compatible datasets) that, when used to augment the requester's dataset, most
improve model (e.g., linear regression) performance. Although effective,
providers that manage personally identifiable data demand differential privacy
(DP) guarantees before granting these platforms data access. Unfortunately,
making data search differentially private is nontrivial, as a single search can
involve training and evaluating datasets hundreds or thousands of times,
quickly depleting privacy budgets.
We present Saibot, a differentially private data search platform that employs
Factorized Privacy Mechanism (FPM), a novel DP mechanism, to calculate
sufficient semi-ring statistics for ML over different combinations of datasets.
These statistics are privatized once, and can be freely reused for the search.
This allows Saibot to scale to arbitrary numbers of datasets and requests,
while minimizing the amount that DP noise affects search results. We optimize
the sensitivity of FPM for common augmentation operations, and analyze its
properties with respect to linear regression. Specifically, we develop an
unbiased estimator for many-to-many joins, prove its bounds, and develop an
optimization to redistribute DP noise to minimize the impact on the model. Our
evaluation on a real-world dataset corpus of 329 datasets demonstrates that
Saibot can return augmentations that achieve model accuracy within 50 to 90% of
non-private search, while the leading alternative DP mechanisms (TPM, APM,
shuffling) are several orders of magnitude worse.
| [
{
"version": "v1",
"created": "Sat, 1 Jul 2023 21:37:33 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Huang",
"Zezhou",
""
],
[
"Liu",
"Jiaxiang",
""
],
[
"Alabi",
"Daniel",
""
],
[
"Fernandez",
"Raul Castro",
""
],
[
"Wu",
"Eugene",
""
]
] | TITLE: Saibot: A Differentially Private Data Search Platform
ABSTRACT: Recent data search platforms use ML task-based utility measures rather than
metadata-based keywords, to search large dataset corpora. Requesters submit a
training dataset and these platforms search for augmentations (join or union
compatible datasets) that, when used to augment the requester's dataset, most
improve model (e.g., linear regression) performance. Although effective,
providers that manage personally identifiable data demand differential privacy
(DP) guarantees before granting these platforms data access. Unfortunately,
making data search differentially private is nontrivial, as a single search can
involve training and evaluating datasets hundreds or thousands of times,
quickly depleting privacy budgets.
We present Saibot, a differentially private data search platform that employs
Factorized Privacy Mechanism (FPM), a novel DP mechanism, to calculate
sufficient semi-ring statistics for ML over different combinations of datasets.
These statistics are privatized once, and can be freely reused for the search.
This allows Saibot to scale to arbitrary numbers of datasets and requests,
while minimizing the amount that DP noise affects search results. We optimize
the sensitivity of FPM for common augmentation operations, and analyze its
properties with respect to linear regression. Specifically, we develop an
unbiased estimator for many-to-many joins, prove its bounds, and develop an
optimization to redistribute DP noise to minimize the impact on the model. Our
evaluation on a real-world dataset corpus of 329 datasets demonstrates that
Saibot can return augmentations that achieve model accuracy within 50 to 90% of
non-private search, while the leading alternative DP mechanisms (TPM, APM,
shuffling) are several orders of magnitude worse.
| no_new_dataset | 0.710007 |
2307.00465 | Zsolt Zombori | Zsolt Zombori and Agapi Rissaki and Krist\'of Szab\'o and Wolfgang
Gatterbauer and Michael Benedikt | Towards Unbiased Exploration in Partial Label Learning | null | null | null | null | cs.LG cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider learning a probabilistic classifier from partially-labelled
supervision (inputs denoted with multiple possibilities) using standard neural
architectures with a softmax as the final layer. We identify a bias phenomenon
that can arise from the softmax layer in even simple architectures that
prevents proper exploration of alternative options, making the dynamics of
gradient descent overly sensitive to initialisation. We introduce a novel loss
function that allows for unbiased exploration within the space of alternative
outputs. We give a theoretical justification for our loss function, and provide
an extensive evaluation of its impact on synthetic data, on standard partially
labelled benchmarks and on a contributed novel benchmark related to an existing
rule learning challenge.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 03:47:10 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zombori",
"Zsolt",
""
],
[
"Rissaki",
"Agapi",
""
],
[
"Szabó",
"Kristóf",
""
],
[
"Gatterbauer",
"Wolfgang",
""
],
[
"Benedikt",
"Michael",
""
]
] | TITLE: Towards Unbiased Exploration in Partial Label Learning
ABSTRACT: We consider learning a probabilistic classifier from partially-labelled
supervision (inputs denoted with multiple possibilities) using standard neural
architectures with a softmax as the final layer. We identify a bias phenomenon
that can arise from the softmax layer in even simple architectures that
prevents proper exploration of alternative options, making the dynamics of
gradient descent overly sensitive to initialisation. We introduce a novel loss
function that allows for unbiased exploration within the space of alternative
outputs. We give a theoretical justification for our loss function, and provide
an extensive evaluation of its impact on synthetic data, on standard partially
labelled benchmarks and on a contributed novel benchmark related to an existing
rule learning challenge.
| no_new_dataset | 0.707645 |
2307.00467 | Yidong Ouyang | Yidong Ouyang, Liyan Xie, Chongxuan Li, Guang Cheng | MissDiff: Training Diffusion Models on Tabular Data with Missing Values | 22 pages, short version is accepted by ICML workshop on Structured
Probabilistic Inference & Generative Modeling 2023 | null | null | 22 | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The diffusion model has shown remarkable performance in modeling data
distributions and synthesizing data. However, the vanilla diffusion model
requires complete or fully observed data for training. Incomplete data is a
common issue in various real-world applications, including healthcare and
finance, particularly when dealing with tabular datasets. This work presents a
unified and principled diffusion-based framework for learning from data with
missing values under various missing mechanisms. We first observe that the
widely adopted "impute-then-generate" pipeline may lead to a biased learning
objective. Then we propose to mask the regression loss of Denoising Score
Matching in the training phase. We prove the proposed method is consistent in
learning the score of data distributions, and the proposed training objective
serves as an upper bound for the negative likelihood in certain cases. The
proposed framework is evaluated on multiple tabular datasets using realistic
and efficacious metrics and is demonstrated to outperform state-of-the-art
diffusion model on tabular data with "impute-then-generate" pipeline by a large
margin.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 03:49:47 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ouyang",
"Yidong",
""
],
[
"Xie",
"Liyan",
""
],
[
"Li",
"Chongxuan",
""
],
[
"Cheng",
"Guang",
""
]
] | TITLE: MissDiff: Training Diffusion Models on Tabular Data with Missing Values
ABSTRACT: The diffusion model has shown remarkable performance in modeling data
distributions and synthesizing data. However, the vanilla diffusion model
requires complete or fully observed data for training. Incomplete data is a
common issue in various real-world applications, including healthcare and
finance, particularly when dealing with tabular datasets. This work presents a
unified and principled diffusion-based framework for learning from data with
missing values under various missing mechanisms. We first observe that the
widely adopted "impute-then-generate" pipeline may lead to a biased learning
objective. Then we propose to mask the regression loss of Denoising Score
Matching in the training phase. We prove the proposed method is consistent in
learning the score of data distributions, and the proposed training objective
serves as an upper bound for the negative likelihood in certain cases. The
proposed framework is evaluated on multiple tabular datasets using realistic
and efficacious metrics and is demonstrated to outperform state-of-the-art
diffusion model on tabular data with "impute-then-generate" pipeline by a large
margin.
| no_new_dataset | 0.710635 |
2307.00472 | Furkan Gursoy | Furkan Gursoy and Ioannis A. Kakadiaris | Equal Confusion Fairness: Measuring Group-Based Disparities in Automated
Decision Systems | null | 2022 IEEE International Conference on Data Mining Workshops
(ICDMW), Orlando, FL, USA, 2022, pp. 137-146 | 10.1109/ICDMW58026.2022.00027 | null | cs.LG cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As artificial intelligence plays an increasingly substantial role in
decisions affecting humans and society, the accountability of automated
decision systems has been receiving increasing attention from researchers and
practitioners. Fairness, which is concerned with eliminating unjust treatment
and discrimination against individuals or sensitive groups, is a critical
aspect of accountability. Yet, for evaluating fairness, there is a plethora of
fairness metrics in the literature that employ different perspectives and
assumptions that are often incompatible. This work focuses on group fairness.
Most group fairness metrics desire a parity between selected statistics
computed from confusion matrices belonging to different sensitive groups.
Generalizing this intuition, this paper proposes a new equal confusion fairness
test to check an automated decision system for fairness and a new confusion
parity error to quantify the extent of any unfairness. To further analyze the
source of potential unfairness, an appropriate post hoc analysis methodology is
also presented. The usefulness of the test, metric, and post hoc analysis is
demonstrated via a case study on the controversial case of COMPAS, an automated
decision system employed in the US to assist judges with assessing recidivism
risks. Overall, the methods and metrics provided here may assess automated
decision systems' fairness as part of a more extensive accountability
assessment, such as those based on the system accountability benchmark.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 04:44:19 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Gursoy",
"Furkan",
""
],
[
"Kakadiaris",
"Ioannis A.",
""
]
] | TITLE: Equal Confusion Fairness: Measuring Group-Based Disparities in Automated
Decision Systems
ABSTRACT: As artificial intelligence plays an increasingly substantial role in
decisions affecting humans and society, the accountability of automated
decision systems has been receiving increasing attention from researchers and
practitioners. Fairness, which is concerned with eliminating unjust treatment
and discrimination against individuals or sensitive groups, is a critical
aspect of accountability. Yet, for evaluating fairness, there is a plethora of
fairness metrics in the literature that employ different perspectives and
assumptions that are often incompatible. This work focuses on group fairness.
Most group fairness metrics desire a parity between selected statistics
computed from confusion matrices belonging to different sensitive groups.
Generalizing this intuition, this paper proposes a new equal confusion fairness
test to check an automated decision system for fairness and a new confusion
parity error to quantify the extent of any unfairness. To further analyze the
source of potential unfairness, an appropriate post hoc analysis methodology is
also presented. The usefulness of the test, metric, and post hoc analysis is
demonstrated via a case study on the controversial case of COMPAS, an automated
decision system employed in the US to assist judges with assessing recidivism
risks. Overall, the methods and metrics provided here may assess automated
decision systems' fairness as part of a more extensive accountability
assessment, such as those based on the system accountability benchmark.
| no_new_dataset | 0.707998 |
2307.00488 | Jingxing Qian | Jingxing Qian, Veronica Chatrath, James Servos, Aaron Mavrinac,
Wolfram Burgard, Steven L. Waslander, Angela P. Schoellig | POV-SLAM: Probabilistic Object-Aware Variational SLAM in Semi-Static
Environments | Published in Robotics: Science and Systems (RSS) 2023 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simultaneous localization and mapping (SLAM) in slowly varying scenes is
important for long-term robot task completion. Failing to detect scene changes
may lead to inaccurate maps and, ultimately, lost robots. Classical SLAM
algorithms assume static scenes, and recent works take dynamics into account,
but require scene changes to be observed in consecutive frames. Semi-static
scenes, wherein objects appear, disappear, or move slowly over time, are often
overlooked, yet are critical for long-term operation. We propose an
object-aware, factor-graph SLAM framework that tracks and reconstructs
semi-static object-level changes. Our novel variational
expectation-maximization strategy is used to optimize factor graphs involving a
Gaussian-Uniform bimodal measurement likelihood for potentially-changing
objects. We evaluate our approach alongside the state-of-the-art SLAM solutions
in simulation and on our novel real-world SLAM dataset captured in a warehouse
over four months. Our method improves the robustness of localization in the
presence of semi-static changes, providing object-level reasoning about the
scene.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 06:26:36 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Qian",
"Jingxing",
""
],
[
"Chatrath",
"Veronica",
""
],
[
"Servos",
"James",
""
],
[
"Mavrinac",
"Aaron",
""
],
[
"Burgard",
"Wolfram",
""
],
[
"Waslander",
"Steven L.",
""
],
[
"Schoellig",
"Angela P.",
""
]
] | TITLE: POV-SLAM: Probabilistic Object-Aware Variational SLAM in Semi-Static
Environments
ABSTRACT: Simultaneous localization and mapping (SLAM) in slowly varying scenes is
important for long-term robot task completion. Failing to detect scene changes
may lead to inaccurate maps and, ultimately, lost robots. Classical SLAM
algorithms assume static scenes, and recent works take dynamics into account,
but require scene changes to be observed in consecutive frames. Semi-static
scenes, wherein objects appear, disappear, or move slowly over time, are often
overlooked, yet are critical for long-term operation. We propose an
object-aware, factor-graph SLAM framework that tracks and reconstructs
semi-static object-level changes. Our novel variational
expectation-maximization strategy is used to optimize factor graphs involving a
Gaussian-Uniform bimodal measurement likelihood for potentially-changing
objects. We evaluate our approach alongside the state-of-the-art SLAM solutions
in simulation and on our novel real-world SLAM dataset captured in a warehouse
over four months. Our method improves the robustness of localization in the
presence of semi-static changes, providing object-level reasoning about the
scene.
| new_dataset | 0.714672 |
2307.00509 | Tzuf Paz-Argaman | Tzuf Paz-Argaman, Tal Bauman, Itai Mondshine, Itzhak Omer, Sagi
Dalyot, Reut Tsarfaty | HeGeL: A Novel Dataset for Geo-Location from Hebrew Text | Accepted for ACL findings 2023 | null | null | null | cs.CL cs.AI cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of textual geolocation - retrieving the coordinates of a place based
on a free-form language description - calls for not only grounding but also
natural language understanding and geospatial reasoning. Even though there are
quite a few datasets in English used for geolocation, they are currently based
on open-source data (Wikipedia and Twitter), where the location of the
described place is mostly implicit, such that the location retrieval resolution
is limited. Furthermore, there are no datasets available for addressing the
problem of textual geolocation in morphologically rich and resource-poor
languages, such as Hebrew. In this paper, we present the Hebrew Geo-Location
(HeGeL) corpus, designed to collect literal place descriptions and analyze
lingual geospatial reasoning. We crowdsourced 5,649 literal Hebrew place
descriptions of various place types in three cities in Israel. Qualitative and
empirical analysis show that the data exhibits abundant use of geospatial
reasoning and requires a novel environmental representation.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 08:09:10 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Paz-Argaman",
"Tzuf",
""
],
[
"Bauman",
"Tal",
""
],
[
"Mondshine",
"Itai",
""
],
[
"Omer",
"Itzhak",
""
],
[
"Dalyot",
"Sagi",
""
],
[
"Tsarfaty",
"Reut",
""
]
] | TITLE: HeGeL: A Novel Dataset for Geo-Location from Hebrew Text
ABSTRACT: The task of textual geolocation - retrieving the coordinates of a place based
on a free-form language description - calls for not only grounding but also
natural language understanding and geospatial reasoning. Even though there are
quite a few datasets in English used for geolocation, they are currently based
on open-source data (Wikipedia and Twitter), where the location of the
described place is mostly implicit, such that the location retrieval resolution
is limited. Furthermore, there are no datasets available for addressing the
problem of textual geolocation in morphologically rich and resource-poor
languages, such as Hebrew. In this paper, we present the Hebrew Geo-Location
(HeGeL) corpus, designed to collect literal place descriptions and analyze
lingual geospatial reasoning. We crowdsourced 5,649 literal Hebrew place
descriptions of various place types in three cities in Israel. Qualitative and
empirical analysis show that the data exhibits abundant use of geospatial
reasoning and requires a novel environmental representation.
| new_dataset | 0.710804 |
2307.00511 | Hesheng Liu | Jianxun Ren, Ning An, Youjia Zhang, Danyang Wang, Zhenyu Sun, Cong
Lin, Weigang Cui, Weiwei Wang, Ying Zhou, Wei Zhang, Qingyu Hu, Ping Zhang,
Dan Hu, Danhong Wang, Hesheng Liu | SUGAR: Spherical Ultrafast Graph Attention Framework for Cortical
Surface Registration | null | null | null | null | eess.IV cs.CV cs.LG q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cortical surface registration plays a crucial role in aligning cortical
functional and anatomical features across individuals. However, conventional
registration algorithms are computationally inefficient. Recently,
learning-based registration algorithms have emerged as a promising solution,
significantly improving processing efficiency. Nonetheless, there remains a gap
in the development of a learning-based method that exceeds the state-of-the-art
conventional methods simultaneously in computational efficiency, registration
accuracy, and distortion control, despite the theoretically greater
representational capabilities of deep learning approaches. To address the
challenge, we present SUGAR, a unified unsupervised deep-learning framework for
both rigid and non-rigid registration. SUGAR incorporates a U-Net-based
spherical graph attention network and leverages the Euler angle representation
for deformation. In addition to the similarity loss, we introduce fold and
multiple distortion losses, to preserve topology and minimize various types of
distortions. Furthermore, we propose a data augmentation strategy specifically
tailored for spherical surface registration, enhancing the registration
performance. Through extensive evaluation involving over 10,000 scans from 7
diverse datasets, we showed that our framework exhibits comparable or superior
registration performance in accuracy, distortion, and test-retest reliability
compared to conventional and learning-based methods. Additionally, SUGAR
achieves remarkable sub-second processing times, offering a notable speed-up of
approximately 12,000 times in registering 9,000 subjects from the UK Biobank
dataset in just 32 minutes. This combination of high registration performance
and accelerated processing time may greatly benefit large-scale neuroimaging
studies.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 08:19:15 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ren",
"Jianxun",
""
],
[
"An",
"Ning",
""
],
[
"Zhang",
"Youjia",
""
],
[
"Wang",
"Danyang",
""
],
[
"Sun",
"Zhenyu",
""
],
[
"Lin",
"Cong",
""
],
[
"Cui",
"Weigang",
""
],
[
"Wang",
"Weiwei",
""
],
[
"Zhou",
"Ying",
""
],
[
"Zhang",
"Wei",
""
],
[
"Hu",
"Qingyu",
""
],
[
"Zhang",
"Ping",
""
],
[
"Hu",
"Dan",
""
],
[
"Wang",
"Danhong",
""
],
[
"Liu",
"Hesheng",
""
]
] | TITLE: SUGAR: Spherical Ultrafast Graph Attention Framework for Cortical
Surface Registration
ABSTRACT: Cortical surface registration plays a crucial role in aligning cortical
functional and anatomical features across individuals. However, conventional
registration algorithms are computationally inefficient. Recently,
learning-based registration algorithms have emerged as a promising solution,
significantly improving processing efficiency. Nonetheless, there remains a gap
in the development of a learning-based method that exceeds the state-of-the-art
conventional methods simultaneously in computational efficiency, registration
accuracy, and distortion control, despite the theoretically greater
representational capabilities of deep learning approaches. To address the
challenge, we present SUGAR, a unified unsupervised deep-learning framework for
both rigid and non-rigid registration. SUGAR incorporates a U-Net-based
spherical graph attention network and leverages the Euler angle representation
for deformation. In addition to the similarity loss, we introduce fold and
multiple distortion losses, to preserve topology and minimize various types of
distortions. Furthermore, we propose a data augmentation strategy specifically
tailored for spherical surface registration, enhancing the registration
performance. Through extensive evaluation involving over 10,000 scans from 7
diverse datasets, we showed that our framework exhibits comparable or superior
registration performance in accuracy, distortion, and test-retest reliability
compared to conventional and learning-based methods. Additionally, SUGAR
achieves remarkable sub-second processing times, offering a notable speed-up of
approximately 12,000 times in registering 9,000 subjects from the UK Biobank
dataset in just 32 minutes. This combination of high registration performance
and accelerated processing time may greatly benefit large-scale neuroimaging
studies.
| no_new_dataset | 0.70825 |
2307.00518 | Ling Chen | Binqing Wu, Ling Chen | DSTCGCN: Learning Dynamic Spatial-Temporal Cross Dependencies for
Traffic Forecasting | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Traffic forecasting is essential to intelligent transportation systems, which
is challenging due to the complicated spatial and temporal dependencies within
a road network. Existing works usually learn spatial and temporal dependencies
separately, ignoring the dependencies crossing spatial and temporal dimensions.
In this paper, we propose DSTCGCN, a dynamic spatial-temporal cross graph
convolution network to learn dynamic spatial and temporal dependencies jointly
via graphs for traffic forecasting. Specifically, we introduce a fast Fourier
transform (FFT) based attentive selector to choose relevant time steps for each
time step based on time-varying traffic data. Given the selected time steps, we
introduce a dynamic cross graph construction module, consisting of the spatial
graph construction, temporal connection graph construction, and fusion modules,
to learn dynamic spatial-temporal cross dependencies without pre-defined
priors. Extensive experiments on six real-world datasets demonstrate that
DSTCGCN achieves the state-of-the-art performance.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 08:53:10 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Wu",
"Binqing",
""
],
[
"Chen",
"Ling",
""
]
] | TITLE: DSTCGCN: Learning Dynamic Spatial-Temporal Cross Dependencies for
Traffic Forecasting
ABSTRACT: Traffic forecasting is essential to intelligent transportation systems, which
is challenging due to the complicated spatial and temporal dependencies within
a road network. Existing works usually learn spatial and temporal dependencies
separately, ignoring the dependencies crossing spatial and temporal dimensions.
In this paper, we propose DSTCGCN, a dynamic spatial-temporal cross graph
convolution network to learn dynamic spatial and temporal dependencies jointly
via graphs for traffic forecasting. Specifically, we introduce a fast Fourier
transform (FFT) based attentive selector to choose relevant time steps for each
time step based on time-varying traffic data. Given the selected time steps, we
introduce a dynamic cross graph construction module, consisting of the spatial
graph construction, temporal connection graph construction, and fusion modules,
to learn dynamic spatial-temporal cross dependencies without pre-defined
priors. Extensive experiments on six real-world datasets demonstrate that
DSTCGCN achieves the state-of-the-art performance.
| no_new_dataset | 0.708408 |
2307.00558 | Hananeh Aliee | Hananeh Aliee, Ferdinand Kapl, Soroor Hediyeh-Zadeh, Fabian J. Theis | Conditionally Invariant Representation Learning for Disentangling
Cellular Heterogeneity | null | null | null | null | cs.LG q-bio.QM | http://creativecommons.org/licenses/by/4.0/ | This paper presents a novel approach that leverages domain variability to
learn representations that are conditionally invariant to unwanted variability
or distractors. Our approach identifies both spurious and invariant latent
features necessary for achieving accurate reconstruction by placing distinct
conditional priors on latent features. The invariant signals are disentangled
from noise by enforcing independence which facilitates the construction of an
interpretable model with a causal semantic. By exploiting the interplay between
data domains and labels, our method simultaneously identifies invariant
features and builds invariant predictors. We apply our method to grand
biological challenges, such as data integration in single-cell genomics with
the aim of capturing biological variations across datasets with many samples,
obtained from different conditions or multiple laboratories. Our approach
allows for the incorporation of specific biological mechanisms, including gene
programs, disease states, or treatment conditions into the data integration
process, bridging the gap between the theoretical assumptions and real
biological applications. Specifically, the proposed approach helps to
disentangle biological signals from data biases that are unrelated to the
target task or the causal explanation of interest. Through extensive
benchmarking using large-scale human hematopoiesis and human lung cancer data,
we validate the superiority of our approach over existing methods and
demonstrate that it can empower deeper insights into cellular heterogeneity and
the identification of disease cell states.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 12:52:41 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Aliee",
"Hananeh",
""
],
[
"Kapl",
"Ferdinand",
""
],
[
"Hediyeh-Zadeh",
"Soroor",
""
],
[
"Theis",
"Fabian J.",
""
]
] | TITLE: Conditionally Invariant Representation Learning for Disentangling
Cellular Heterogeneity
ABSTRACT: This paper presents a novel approach that leverages domain variability to
learn representations that are conditionally invariant to unwanted variability
or distractors. Our approach identifies both spurious and invariant latent
features necessary for achieving accurate reconstruction by placing distinct
conditional priors on latent features. The invariant signals are disentangled
from noise by enforcing independence which facilitates the construction of an
interpretable model with a causal semantic. By exploiting the interplay between
data domains and labels, our method simultaneously identifies invariant
features and builds invariant predictors. We apply our method to grand
biological challenges, such as data integration in single-cell genomics with
the aim of capturing biological variations across datasets with many samples,
obtained from different conditions or multiple laboratories. Our approach
allows for the incorporation of specific biological mechanisms, including gene
programs, disease states, or treatment conditions into the data integration
process, bridging the gap between the theoretical assumptions and real
biological applications. Specifically, the proposed approach helps to
disentangle biological signals from data biases that are unrelated to the
target task or the causal explanation of interest. Through extensive
benchmarking using large-scale human hematopoiesis and human lung cancer data,
we validate the superiority of our approach over existing methods and
demonstrate that it can empower deeper insights into cellular heterogeneity and
the identification of disease cell states.
| no_new_dataset | 0.710201 |
2307.00561 | Fu Song | Huiyu Tan and Pengfei Gao and Taolue Chen and Fu Song and Zhilin Wu | SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits | null | null | null | null | cs.CR cs.AR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fault injection attacks represent a type of active, physical attack against
cryptographic circuits. Various countermeasures have been proposed to thwart
such attacks, the design and implementation of which are, however, intricate,
error-prone, and laborious. The current formal fault-resistance verification
approaches are limited in efficiency and scalability. In this paper, we
formalize the fault-resistance verification problem which is shown to be
NP-complete. We then devise a novel approach for encoding the fault-resistance
verification problem as the Boolean satisfiability (SAT) problem so that
off-the-shelf SAT solvers can be utilized. The approach is implemented in an
open-source tool FIRMER which is evaluated extensively on realistic
cryptographic circuit benchmarks. The experimental results show that FIRMER is
able to verify fault-resistance of almost all (46/48) benchmarks in 3 minutes
(the other two are verified in 35 minutes). In contrast, the prior approach
fails on 23 fault-resistance verification tasks even after 24 hours (per task).
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 13:01:32 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tan",
"Huiyu",
""
],
[
"Gao",
"Pengfei",
""
],
[
"Chen",
"Taolue",
""
],
[
"Song",
"Fu",
""
],
[
"Wu",
"Zhilin",
""
]
] | TITLE: SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits
ABSTRACT: Fault injection attacks represent a type of active, physical attack against
cryptographic circuits. Various countermeasures have been proposed to thwart
such attacks, the design and implementation of which are, however, intricate,
error-prone, and laborious. The current formal fault-resistance verification
approaches are limited in efficiency and scalability. In this paper, we
formalize the fault-resistance verification problem which is shown to be
NP-complete. We then devise a novel approach for encoding the fault-resistance
verification problem as the Boolean satisfiability (SAT) problem so that
off-the-shelf SAT solvers can be utilized. The approach is implemented in an
open-source tool FIRMER which is evaluated extensively on realistic
cryptographic circuit benchmarks. The experimental results show that FIRMER is
able to verify fault-resistance of almost all (46/48) benchmarks in 3 minutes
(the other two are verified in 35 minutes). In contrast, the prior approach
fails on 23 fault-resistance verification tasks even after 24 hours (per task).
| no_new_dataset | 0.709252 |
2307.00569 | Tu Quan | Quan Tu, Shen Gao, Xiaolong Wu, Zhao Cao, Ji-Rong Wen and Rui Yan | SSP: Self-Supervised Post-training for Conversational Search | Accepted by ACL 2023 Findings, Long Paper | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Conversational search has been regarded as the next-generation search
paradigm. Constrained by data scarcity, most existing methods distill the
well-trained ad-hoc retriever to the conversational retriever. However, these
methods, which usually initialize parameters by query reformulation to discover
contextualized dependency, have trouble in understanding the dialogue structure
information and struggle with contextual semantic vanishing. In this paper, we
propose \fullmodel (\model) which is a new post-training paradigm with three
self-supervised tasks to efficiently initialize the conversational search model
to enhance the dialogue structure and contextual semantic understanding.
Furthermore, the \model can be plugged into most of the existing conversational
models to boost their performance. To verify the effectiveness of our proposed
method, we apply the conversational encoder post-trained by \model on the
conversational search task using two benchmark datasets: CAsT-19 and CAsT-20.
Extensive experiments that our \model can boost the performance of several
existing conversational search methods. Our source code is available at
\url{https://github.com/morecry/SSP}.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 13:36:36 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tu",
"Quan",
""
],
[
"Gao",
"Shen",
""
],
[
"Wu",
"Xiaolong",
""
],
[
"Cao",
"Zhao",
""
],
[
"Wen",
"Ji-Rong",
""
],
[
"Yan",
"Rui",
""
]
] | TITLE: SSP: Self-Supervised Post-training for Conversational Search
ABSTRACT: Conversational search has been regarded as the next-generation search
paradigm. Constrained by data scarcity, most existing methods distill the
well-trained ad-hoc retriever to the conversational retriever. However, these
methods, which usually initialize parameters by query reformulation to discover
contextualized dependency, have trouble in understanding the dialogue structure
information and struggle with contextual semantic vanishing. In this paper, we
propose \fullmodel (\model) which is a new post-training paradigm with three
self-supervised tasks to efficiently initialize the conversational search model
to enhance the dialogue structure and contextual semantic understanding.
Furthermore, the \model can be plugged into most of the existing conversational
models to boost their performance. To verify the effectiveness of our proposed
method, we apply the conversational encoder post-trained by \model on the
conversational search task using two benchmark datasets: CAsT-19 and CAsT-20.
Extensive experiments that our \model can boost the performance of several
existing conversational search methods. Our source code is available at
\url{https://github.com/morecry/SSP}.
| no_new_dataset | 0.707436 |
2307.00578 | Tarek Hamdani M. | Islem Jarraya, Tarek M. Hamdani, Habib Chabchoub, Adel M. Alimi | TinySiamese Network for Biometric Analysis | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Biometric recognition is the process of verifying or classifying human
characteristics in images or videos. It is a complex task that requires machine
learning algorithms, including convolutional neural networks (CNNs) and Siamese
networks. Besides, there are several limitations to consider when using these
algorithms for image verification and classification tasks. In fact, training
may be computationally intensive, requiring specialized hardware and
significant computational resources to train and deploy. Moreover, it
necessitates a large amount of labeled data, which can be time-consuming and
costly to obtain. The main advantage of the proposed TinySiamese compared to
the standard Siamese is that it does not require the whole CNN for training. In
fact, using a pre-trained CNN as a feature extractor and the TinySiamese to
learn the extracted features gave almost the same performance and efficiency as
the standard Siamese for biometric verification. In this way, the TinySiamese
solves the problems of memory and computational time with a small number of
layers which did not exceed 7. It can be run under low-power machines which
possess a normal GPU and cannot allocate a large RAM space. Using TinySiamese
with only 8 GO of memory, the matching time decreased by 76.78% on the B2F
(Biometric images of Fingerprints and Faces), FVC2000, FVC2002 and FVC2004
while the training time for 10 epochs went down by approximately 93.14% on the
B2F, FVC2002, THDD-part1 and CASIA-B datasets. The accuracy of the fingerprint,
gait (NM-angle 180 degree) and face verification tasks was better than the
accuracy of a standard Siamese by 0.87%, 20.24% and 3.85% respectively.
TinySiamese achieved comparable accuracy with related works for the fingerprint
and gait classification tasks.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 14:15:52 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Jarraya",
"Islem",
""
],
[
"Hamdani",
"Tarek M.",
""
],
[
"Chabchoub",
"Habib",
""
],
[
"Alimi",
"Adel M.",
""
]
] | TITLE: TinySiamese Network for Biometric Analysis
ABSTRACT: Biometric recognition is the process of verifying or classifying human
characteristics in images or videos. It is a complex task that requires machine
learning algorithms, including convolutional neural networks (CNNs) and Siamese
networks. Besides, there are several limitations to consider when using these
algorithms for image verification and classification tasks. In fact, training
may be computationally intensive, requiring specialized hardware and
significant computational resources to train and deploy. Moreover, it
necessitates a large amount of labeled data, which can be time-consuming and
costly to obtain. The main advantage of the proposed TinySiamese compared to
the standard Siamese is that it does not require the whole CNN for training. In
fact, using a pre-trained CNN as a feature extractor and the TinySiamese to
learn the extracted features gave almost the same performance and efficiency as
the standard Siamese for biometric verification. In this way, the TinySiamese
solves the problems of memory and computational time with a small number of
layers which did not exceed 7. It can be run under low-power machines which
possess a normal GPU and cannot allocate a large RAM space. Using TinySiamese
with only 8 GO of memory, the matching time decreased by 76.78% on the B2F
(Biometric images of Fingerprints and Faces), FVC2000, FVC2002 and FVC2004
while the training time for 10 epochs went down by approximately 93.14% on the
B2F, FVC2002, THDD-part1 and CASIA-B datasets. The accuracy of the fingerprint,
gait (NM-angle 180 degree) and face verification tasks was better than the
accuracy of a standard Siamese by 0.87%, 20.24% and 3.85% respectively.
TinySiamese achieved comparable accuracy with related works for the fingerprint
and gait classification tasks.
| no_new_dataset | 0.711205 |
2307.00592 | Zhicheng Cai | Xinyue Wang, Zhicheng Cai and Chenglei Peng | X-MLP: A Patch Embedding-Free MLP Architecture for Vision | IJCNN 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Convolutional neural networks (CNNs) and vision transformers (ViT) have
obtained great achievements in computer vision. Recently, the research of
multi-layer perceptron (MLP) architectures for vision have been popular again.
Vision MLPs are designed to be independent from convolutions and self-attention
operations. However, existing vision MLP architectures always depend on
convolution for patch embedding. Thus we propose X-MLP, an architecture
constructed absolutely upon fully connected layers and free from patch
embedding. It decouples the features extremely and utilizes MLPs to interact
the information across the dimension of width, height and channel independently
and alternately. X-MLP is tested on ten benchmark datasets, all obtaining
better performance than other vision MLP models. It even surpasses CNNs by a
clear margin on various dataset. Furthermore, through mathematically restoring
the spatial weights, we visualize the information communication between any
couples of pixels in the feature map and observe the phenomenon of capturing
long-range dependency.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 15:20:25 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Wang",
"Xinyue",
""
],
[
"Cai",
"Zhicheng",
""
],
[
"Peng",
"Chenglei",
""
]
] | TITLE: X-MLP: A Patch Embedding-Free MLP Architecture for Vision
ABSTRACT: Convolutional neural networks (CNNs) and vision transformers (ViT) have
obtained great achievements in computer vision. Recently, the research of
multi-layer perceptron (MLP) architectures for vision have been popular again.
Vision MLPs are designed to be independent from convolutions and self-attention
operations. However, existing vision MLP architectures always depend on
convolution for patch embedding. Thus we propose X-MLP, an architecture
constructed absolutely upon fully connected layers and free from patch
embedding. It decouples the features extremely and utilizes MLPs to interact
the information across the dimension of width, height and channel independently
and alternately. X-MLP is tested on ten benchmark datasets, all obtaining
better performance than other vision MLP models. It even surpasses CNNs by a
clear margin on various dataset. Furthermore, through mathematically restoring
the spatial weights, we visualize the information communication between any
couples of pixels in the feature map and observe the phenomenon of capturing
long-range dependency.
| no_new_dataset | 0.709831 |
2307.00651 | Salman Mohamadi | Salman Mohamadi, Gianfranco Doretto, Donald A. Adjeroh | More Synergy, Less Redundancy: Exploiting Joint Mutual Information for
Self-Supervised Learning | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Self-supervised learning (SSL) is now a serious competitor for supervised
learning, even though it does not require data annotation. Several baselines
have attempted to make SSL models exploit information about data distribution,
and less dependent on the augmentation effect. However, there is no clear
consensus on whether maximizing or minimizing the mutual information between
representations of augmentation views practically contribute to improvement or
degradation in performance of SSL models. This paper is a fundamental work
where, we investigate role of mutual information in SSL, and reformulate the
problem of SSL in the context of a new perspective on mutual information. To
this end, we consider joint mutual information from the perspective of partial
information decomposition (PID) as a key step in \textbf{reliable multivariate
information measurement}. PID enables us to decompose joint mutual information
into three important components, namely, unique information, redundant
information and synergistic information. Our framework aims for minimizing the
redundant information between views and the desired target representation while
maximizing the synergistic information at the same time. Our experiments lead
to a re-calibration of two redundancy reduction baselines, and a proposal for a
new SSL training protocol. Extensive experimental results on multiple datasets
and two downstream tasks show the effectiveness of this framework.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 20:02:58 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Mohamadi",
"Salman",
""
],
[
"Doretto",
"Gianfranco",
""
],
[
"Adjeroh",
"Donald A.",
""
]
] | TITLE: More Synergy, Less Redundancy: Exploiting Joint Mutual Information for
Self-Supervised Learning
ABSTRACT: Self-supervised learning (SSL) is now a serious competitor for supervised
learning, even though it does not require data annotation. Several baselines
have attempted to make SSL models exploit information about data distribution,
and less dependent on the augmentation effect. However, there is no clear
consensus on whether maximizing or minimizing the mutual information between
representations of augmentation views practically contribute to improvement or
degradation in performance of SSL models. This paper is a fundamental work
where, we investigate role of mutual information in SSL, and reformulate the
problem of SSL in the context of a new perspective on mutual information. To
this end, we consider joint mutual information from the perspective of partial
information decomposition (PID) as a key step in \textbf{reliable multivariate
information measurement}. PID enables us to decompose joint mutual information
into three important components, namely, unique information, redundant
information and synergistic information. Our framework aims for minimizing the
redundant information between views and the desired target representation while
maximizing the synergistic information at the same time. Our experiments lead
to a re-calibration of two redundancy reduction baselines, and a proposal for a
new SSL training protocol. Extensive experimental results on multiple datasets
and two downstream tasks show the effectiveness of this framework.
| no_new_dataset | 0.707411 |
2307.00653 | Ashutosh Hathidara | Ashutosh Hathidara, Lalit Pandey | Neuro-Symbolic Sudoku Solver | Published as a conference paper at KDD KiML 2023 | null | null | null | cs.AI cs.GT | http://creativecommons.org/licenses/by/4.0/ | Deep Neural Networks have achieved great success in some of the complex tasks
that humans can do with ease. These include image recognition/classification,
natural language processing, game playing etc. However, modern Neural Networks
fail or perform poorly when trained on tasks that can be solved easily using
backtracking and traditional algorithms. Therefore, we use the architecture of
the Neuro Logic Machine (NLM) and extend its functionality to solve a 9X9 game
of Sudoku. To expand the application of NLMs, we generate a random grid of
cells from a dataset of solved games and assign up to 10 new empty cells. The
goal of the game is then to find a target value ranging from 1 to 9 and fill in
the remaining empty cells while maintaining a valid configuration. In our
study, we showcase an NLM which is capable of obtaining 100% accuracy for
solving a Sudoku with empty cells ranging from 3 to 10. The purpose of this
study is to demonstrate that NLMs can also be used for solving complex problems
and games like Sudoku. We also analyze the behaviour of NLMs with a
backtracking algorithm by comparing the convergence time using a graph plot on
the same problem. With this study we show that Neural Logic Machines can be
trained on the tasks that traditional Deep Learning architectures fail using
Reinforcement Learning. We also aim to propose the importance of symbolic
learning in explaining the systematicity in the hybrid model of NLMs.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 20:04:01 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Hathidara",
"Ashutosh",
""
],
[
"Pandey",
"Lalit",
""
]
] | TITLE: Neuro-Symbolic Sudoku Solver
ABSTRACT: Deep Neural Networks have achieved great success in some of the complex tasks
that humans can do with ease. These include image recognition/classification,
natural language processing, game playing etc. However, modern Neural Networks
fail or perform poorly when trained on tasks that can be solved easily using
backtracking and traditional algorithms. Therefore, we use the architecture of
the Neuro Logic Machine (NLM) and extend its functionality to solve a 9X9 game
of Sudoku. To expand the application of NLMs, we generate a random grid of
cells from a dataset of solved games and assign up to 10 new empty cells. The
goal of the game is then to find a target value ranging from 1 to 9 and fill in
the remaining empty cells while maintaining a valid configuration. In our
study, we showcase an NLM which is capable of obtaining 100% accuracy for
solving a Sudoku with empty cells ranging from 3 to 10. The purpose of this
study is to demonstrate that NLMs can also be used for solving complex problems
and games like Sudoku. We also analyze the behaviour of NLMs with a
backtracking algorithm by comparing the convergence time using a graph plot on
the same problem. With this study we show that Neural Logic Machines can be
trained on the tasks that traditional Deep Learning architectures fail using
Reinforcement Learning. We also aim to propose the importance of symbolic
learning in explaining the systematicity in the hybrid model of NLMs.
| no_new_dataset | 0.706823 |
2307.00662 | Minakshi Kaushik | Minakshi Kaushik and Rahul Sharma and Iztok Fister Jr. and Dirk
Draheim | Numerical Association Rule Mining: A Systematic Literature Review | null | null | null | null | cs.LG cs.DB | http://creativecommons.org/licenses/by/4.0/ | Numerical association rule mining is a widely used variant of the association
rule mining technique, and it has been extensively used in discovering patterns
and relationships in numerical data. Initially, researchers and scientists
integrated numerical attributes in association rule mining using various
discretization approaches; however, over time, a plethora of alternative
methods have emerged in this field. Unfortunately, the increase of alternative
methods has resulted into a significant knowledge gap in understanding diverse
techniques employed in numerical association rule mining -- this paper attempts
to bridge this knowledge gap by conducting a comprehensive systematic
literature review. We provide an in-depth study of diverse methods, algorithms,
metrics, and datasets derived from 1,140 scholarly articles published from the
inception of numerical association rule mining in the year 1996 to 2022. In
compliance with the inclusion, exclusion, and quality evaluation criteria, 68
papers were chosen to be extensively evaluated. To the best of our knowledge,
this systematic literature review is the first of its kind to provide an
exhaustive analysis of the current literature and previous surveys on numerical
association rule mining. The paper discusses important research issues, the
current status, and future possibilities of numerical association rule mining.
On the basis of this systematic review, the article also presents a novel
discretization measure that contributes by providing a partitioning of
numerical data that meets well human perception of partitions.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 20:44:01 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Kaushik",
"Minakshi",
""
],
[
"Sharma",
"Rahul",
""
],
[
"Fister",
"Iztok",
"Jr."
],
[
"Draheim",
"Dirk",
""
]
] | TITLE: Numerical Association Rule Mining: A Systematic Literature Review
ABSTRACT: Numerical association rule mining is a widely used variant of the association
rule mining technique, and it has been extensively used in discovering patterns
and relationships in numerical data. Initially, researchers and scientists
integrated numerical attributes in association rule mining using various
discretization approaches; however, over time, a plethora of alternative
methods have emerged in this field. Unfortunately, the increase of alternative
methods has resulted into a significant knowledge gap in understanding diverse
techniques employed in numerical association rule mining -- this paper attempts
to bridge this knowledge gap by conducting a comprehensive systematic
literature review. We provide an in-depth study of diverse methods, algorithms,
metrics, and datasets derived from 1,140 scholarly articles published from the
inception of numerical association rule mining in the year 1996 to 2022. In
compliance with the inclusion, exclusion, and quality evaluation criteria, 68
papers were chosen to be extensively evaluated. To the best of our knowledge,
this systematic literature review is the first of its kind to provide an
exhaustive analysis of the current literature and previous surveys on numerical
association rule mining. The paper discusses important research issues, the
current status, and future possibilities of numerical association rule mining.
On the basis of this systematic review, the article also presents a novel
discretization measure that contributes by providing a partitioning of
numerical data that meets well human perception of partitions.
| no_new_dataset | 0.709799 |
2307.00664 | Firat Kizilirmak | Firat Kizilirmak and Berrin Yanikoglu | CNN-BiLSTM model for English Handwriting Recognition: Comprehensive
Evaluation on the IAM Dataset | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We present a CNN-BiLSTM system for the problem of offline English handwriting
recognition, with extensive evaluations on the public IAM dataset, including
the effects of model size, data augmentation and the lexicon. Our best model
achieves 3.59\% CER and 9.44\% WER using CNN-BiLSTM network with CTC layer.
Test time augmentation with rotation and shear transformations applied to the
input image, is proposed to increase recognition of difficult cases and found
to reduce the word error rate by 2.5\% points. We also conduct an error
analysis of our proposed method on IAM dataset, show hard cases of handwriting
images and explore samples with erroneous labels. We provide our source code as
public-domain, to foster further research to encourage scientific
reproducibility.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 20:59:03 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Kizilirmak",
"Firat",
""
],
[
"Yanikoglu",
"Berrin",
""
]
] | TITLE: CNN-BiLSTM model for English Handwriting Recognition: Comprehensive
Evaluation on the IAM Dataset
ABSTRACT: We present a CNN-BiLSTM system for the problem of offline English handwriting
recognition, with extensive evaluations on the public IAM dataset, including
the effects of model size, data augmentation and the lexicon. Our best model
achieves 3.59\% CER and 9.44\% WER using CNN-BiLSTM network with CTC layer.
Test time augmentation with rotation and shear transformations applied to the
input image, is proposed to increase recognition of difficult cases and found
to reduce the word error rate by 2.5\% points. We also conduct an error
analysis of our proposed method on IAM dataset, show hard cases of handwriting
images and explore samples with erroneous labels. We provide our source code as
public-domain, to foster further research to encourage scientific
reproducibility.
| no_new_dataset | 0.710666 |
2307.00670 | Abdelrahman Hosny | Abdelrahman Hosny, Sherief Reda | Automatic MILP Solver Configuration By Learning Problem Similarities | To appear in Annals of Operations Research (ANOR) | null | null | null | cs.LG math.OC | http://creativecommons.org/licenses/by/4.0/ | A large number of real-world optimization problems can be formulated as Mixed
Integer Linear Programs (MILP). MILP solvers expose numerous configuration
parameters to control their internal algorithms. Solutions, and their
associated costs or runtimes, are significantly affected by the choice of the
configuration parameters, even when problem instances have the same number of
decision variables and constraints. On one hand, using the default solver
configuration leads to suboptimal solutions. On the other hand, searching and
evaluating a large number of configurations for every problem instance is
time-consuming and, in some cases, infeasible. In this study, we aim to predict
configuration parameters for unseen problem instances that yield lower-cost
solutions without the time overhead of searching-and-evaluating configurations
at the solving time. Toward that goal, we first investigate the cost
correlation of MILP problem instances that come from the same distribution when
solved using different configurations. We show that instances that have similar
costs using one solver configuration also have similar costs using another
solver configuration in the same runtime environment. After that, we present a
methodology based on Deep Metric Learning to learn MILP similarities that
correlate with their final solutions' costs. At inference time, given a new
problem instance, it is first projected into the learned metric space using the
trained model, and configuration parameters are instantly predicted using
previously-explored configurations from the nearest neighbor instance in the
learned embedding space. Empirical results on real-world problem benchmarks
show that our method predicts configuration parameters that improve solutions'
costs by up to 38% compared to existing approaches.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 21:31:47 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Hosny",
"Abdelrahman",
""
],
[
"Reda",
"Sherief",
""
]
] | TITLE: Automatic MILP Solver Configuration By Learning Problem Similarities
ABSTRACT: A large number of real-world optimization problems can be formulated as Mixed
Integer Linear Programs (MILP). MILP solvers expose numerous configuration
parameters to control their internal algorithms. Solutions, and their
associated costs or runtimes, are significantly affected by the choice of the
configuration parameters, even when problem instances have the same number of
decision variables and constraints. On one hand, using the default solver
configuration leads to suboptimal solutions. On the other hand, searching and
evaluating a large number of configurations for every problem instance is
time-consuming and, in some cases, infeasible. In this study, we aim to predict
configuration parameters for unseen problem instances that yield lower-cost
solutions without the time overhead of searching-and-evaluating configurations
at the solving time. Toward that goal, we first investigate the cost
correlation of MILP problem instances that come from the same distribution when
solved using different configurations. We show that instances that have similar
costs using one solver configuration also have similar costs using another
solver configuration in the same runtime environment. After that, we present a
methodology based on Deep Metric Learning to learn MILP similarities that
correlate with their final solutions' costs. At inference time, given a new
problem instance, it is first projected into the learned metric space using the
trained model, and configuration parameters are instantly predicted using
previously-explored configurations from the nearest neighbor instance in the
learned embedding space. Empirical results on real-world problem benchmarks
show that our method predicts configuration parameters that improve solutions'
costs by up to 38% compared to existing approaches.
| no_new_dataset | 0.710396 |
2307.00680 | Praharsh Nanavati | Praharsh Nanavati, Ranjitha Prasad | CLIMAX: An exploration of Classifier-Based Contrastive Explanations | 11 Pages, 8 figures, 2 tables, 2 algorithms | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Explainable AI is an evolving area that deals with understanding the decision
making of machine learning models so that these models are more transparent,
accountable, and understandable for humans. In particular, post-hoc
model-agnostic interpretable AI techniques explain the decisions of a black-box
ML model for a single instance locally, without the knowledge of the intrinsic
nature of the ML model. Despite their simplicity and capability in providing
valuable insights, existing approaches fail to deliver consistent and reliable
explanations. Moreover, in the context of black-box classifiers, existing
approaches justify the predicted class, but these methods do not ensure that
the explanation scores strongly differ as compared to those of another class.
In this work we propose a novel post-hoc model agnostic XAI technique that
provides contrastive explanations justifying the classification of a black box
classifier along with a reasoning as to why another class was not predicted.
Our method, which we refer to as CLIMAX which is short for Contrastive
Label-aware Influence-based Model Agnostic XAI, is based on local classifiers .
In order to ensure model fidelity of the explainer, we require the
perturbations to be such that it leads to a class-balanced surrogate dataset.
Towards this, we employ a label-aware surrogate data generation method based on
random oversampling and Gaussian Mixture Model sampling. Further, we propose
influence subsampling in order to retaining effective samples and hence ensure
sample complexity. We show that we achieve better consistency as compared to
baselines such as LIME, BayLIME, and SLIME. We also depict results on textual
and image based datasets, where we generate contrastive explanations for any
black-box classification model where one is able to only query the class
probabilities for an instance of interest.
| [
{
"version": "v1",
"created": "Sun, 2 Jul 2023 22:52:58 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Nanavati",
"Praharsh",
""
],
[
"Prasad",
"Ranjitha",
""
]
] | TITLE: CLIMAX: An exploration of Classifier-Based Contrastive Explanations
ABSTRACT: Explainable AI is an evolving area that deals with understanding the decision
making of machine learning models so that these models are more transparent,
accountable, and understandable for humans. In particular, post-hoc
model-agnostic interpretable AI techniques explain the decisions of a black-box
ML model for a single instance locally, without the knowledge of the intrinsic
nature of the ML model. Despite their simplicity and capability in providing
valuable insights, existing approaches fail to deliver consistent and reliable
explanations. Moreover, in the context of black-box classifiers, existing
approaches justify the predicted class, but these methods do not ensure that
the explanation scores strongly differ as compared to those of another class.
In this work we propose a novel post-hoc model agnostic XAI technique that
provides contrastive explanations justifying the classification of a black box
classifier along with a reasoning as to why another class was not predicted.
Our method, which we refer to as CLIMAX which is short for Contrastive
Label-aware Influence-based Model Agnostic XAI, is based on local classifiers .
In order to ensure model fidelity of the explainer, we require the
perturbations to be such that it leads to a class-balanced surrogate dataset.
Towards this, we employ a label-aware surrogate data generation method based on
random oversampling and Gaussian Mixture Model sampling. Further, we propose
influence subsampling in order to retaining effective samples and hence ensure
sample complexity. We show that we achieve better consistency as compared to
baselines such as LIME, BayLIME, and SLIME. We also depict results on textual
and image based datasets, where we generate contrastive explanations for any
black-box classification model where one is able to only query the class
probabilities for an instance of interest.
| no_new_dataset | 0.710622 |
2307.00690 | Yotam Erel | Amir Barda, Yotam Erel, Yoni Kasten, Amit H. Bermano | ROAR: Robust Adaptive Reconstruction of Shapes Using Planar Projections | The first two authors contributed equally to this work. Project page:
https://yoterel.github.io/ROAR-project-page/ | null | null | null | cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The majority of existing large 3D shape datasets contain meshes that lend
themselves extremely well to visual applications such as rendering, yet tend to
be topologically invalid (i.e, contain non-manifold edges and vertices,
disconnected components, self-intersections). Therefore, it is of no surprise
that state of the art studies in shape understanding do not explicitly use this
3D information. In conjunction with this, triangular meshes remain the dominant
shape representation for many downstream tasks, and their connectivity remain a
relatively untapped source of potential for more profound shape reasoning. In
this paper, we introduce ROAR, an iterative geometry/topology evolution
approach to reconstruct 2-manifold triangular meshes from arbitrary 3D shape
representations, that is highly suitable for large existing in-the-wild
datasets. ROAR leverages the visual prior large datasets exhibit by evolving
the geometry of the mesh via a 2D render loss, and a novel 3D projection loss,
the Planar Projection. After each geometry iteration, our system performs
topological corrections. Self-intersections are reduced following a
geometrically motivated attenuation term, and resolution is added to required
regions using a novel face scoring function. These steps alternate until
convergence is achieved, yielding a high-quality manifold mesh. We evaluate
ROAR on the notoriously messy yet popular dataset ShapeNet, and present
ShapeROAR - a topologically valid yet still geometrically accurate version of
ShapeNet. We compare our results to state-of-the-art reconstruction methods and
demonstrate superior shape faithfulness, topological correctness, and
triangulation quality. In addition, we demonstrate reconstructing a mesh from
neural Signed Distance Functions (SDF), and achieve comparable Chamfer distance
with much fewer SDF sampling operations than the commonly used Marching Cubes
approach.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 00:07:34 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Barda",
"Amir",
""
],
[
"Erel",
"Yotam",
""
],
[
"Kasten",
"Yoni",
""
],
[
"Bermano",
"Amit H.",
""
]
] | TITLE: ROAR: Robust Adaptive Reconstruction of Shapes Using Planar Projections
ABSTRACT: The majority of existing large 3D shape datasets contain meshes that lend
themselves extremely well to visual applications such as rendering, yet tend to
be topologically invalid (i.e, contain non-manifold edges and vertices,
disconnected components, self-intersections). Therefore, it is of no surprise
that state of the art studies in shape understanding do not explicitly use this
3D information. In conjunction with this, triangular meshes remain the dominant
shape representation for many downstream tasks, and their connectivity remain a
relatively untapped source of potential for more profound shape reasoning. In
this paper, we introduce ROAR, an iterative geometry/topology evolution
approach to reconstruct 2-manifold triangular meshes from arbitrary 3D shape
representations, that is highly suitable for large existing in-the-wild
datasets. ROAR leverages the visual prior large datasets exhibit by evolving
the geometry of the mesh via a 2D render loss, and a novel 3D projection loss,
the Planar Projection. After each geometry iteration, our system performs
topological corrections. Self-intersections are reduced following a
geometrically motivated attenuation term, and resolution is added to required
regions using a novel face scoring function. These steps alternate until
convergence is achieved, yielding a high-quality manifold mesh. We evaluate
ROAR on the notoriously messy yet popular dataset ShapeNet, and present
ShapeROAR - a topologically valid yet still geometrically accurate version of
ShapeNet. We compare our results to state-of-the-art reconstruction methods and
demonstrate superior shape faithfulness, topological correctness, and
triangulation quality. In addition, we demonstrate reconstructing a mesh from
neural Signed Distance Functions (SDF), and achieve comparable Chamfer distance
with much fewer SDF sampling operations than the commonly used Marching Cubes
approach.
| no_new_dataset | 0.711406 |
2307.00701 | Yang Zhang | Yang Zhang, Huilin Pan, Yang Zhou, Mingying Li, Guodong Sun | Efficient Visual Fault Detection for Freight Train Braking System via
Heterogeneous Self Distillation in the Wild | 12 pages, 9 figures | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Efficient visual fault detection of freight trains is a critical part of
ensuring the safe operation of railways under the restricted hardware
environment. Although deep learning-based approaches have excelled in object
detection, the efficiency of freight train fault detection is still
insufficient to apply in real-world engineering. This paper proposes a
heterogeneous self-distillation framework to ensure detection accuracy and
speed while satisfying low resource requirements. The privileged information in
the output feature knowledge can be transferred from the teacher to the student
model through distillation to boost performance. We first adopt a lightweight
backbone to extract features and generate a new heterogeneous knowledge neck.
Such neck models positional information and long-range dependencies among
channels through parallel encoding to optimize feature extraction capabilities.
Then, we utilize the general distribution to obtain more credible and accurate
bounding box estimates. Finally, we employ a novel loss function that makes the
network easily concentrate on values near the label to improve learning
efficiency. Experiments on four fault datasets reveal that our framework can
achieve over 37 frames per second and maintain the highest accuracy in
comparison with traditional distillation approaches. Moreover, compared to
state-of-the-art methods, our framework demonstrates more competitive
performance with lower memory usage and the smallest model size.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 01:27:39 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zhang",
"Yang",
""
],
[
"Pan",
"Huilin",
""
],
[
"Zhou",
"Yang",
""
],
[
"Li",
"Mingying",
""
],
[
"Sun",
"Guodong",
""
]
] | TITLE: Efficient Visual Fault Detection for Freight Train Braking System via
Heterogeneous Self Distillation in the Wild
ABSTRACT: Efficient visual fault detection of freight trains is a critical part of
ensuring the safe operation of railways under the restricted hardware
environment. Although deep learning-based approaches have excelled in object
detection, the efficiency of freight train fault detection is still
insufficient to apply in real-world engineering. This paper proposes a
heterogeneous self-distillation framework to ensure detection accuracy and
speed while satisfying low resource requirements. The privileged information in
the output feature knowledge can be transferred from the teacher to the student
model through distillation to boost performance. We first adopt a lightweight
backbone to extract features and generate a new heterogeneous knowledge neck.
Such neck models positional information and long-range dependencies among
channels through parallel encoding to optimize feature extraction capabilities.
Then, we utilize the general distribution to obtain more credible and accurate
bounding box estimates. Finally, we employ a novel loss function that makes the
network easily concentrate on values near the label to improve learning
efficiency. Experiments on four fault datasets reveal that our framework can
achieve over 37 frames per second and maintain the highest accuracy in
comparison with traditional distillation approaches. Moreover, compared to
state-of-the-art methods, our framework demonstrates more competitive
performance with lower memory usage and the smallest model size.
| no_new_dataset | 0.708799 |
2307.00714 | Setu Kumar Basak | Setu Kumar Basak, Jamison Cox, Bradley Reaves and Laurie Williams | A Comparative Study of Software Secrets Reporting by Secret Detection
Tools | Accepted at the Technical Track of the International Symposium on
Empirical Software Engineering and Measurement (ESEM 2023) | null | null | null | cs.CR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Background: According to GitGuardian's monitoring of public GitHub
repositories, secrets sprawl continued accelerating in 2022 by 67% compared to
2021, exposing over 10 million secrets (API keys and other credentials). Though
many open-source and proprietary secret detection tools are available, these
tools output many false positives, making it difficult for developers to take
action and teams to choose one tool out of many. To our knowledge, the secret
detection tools are not yet compared and evaluated. Aims: The goal of our study
is to aid developers in choosing a secret detection tool to reduce the exposure
of secrets through an empirical investigation of existing secret detection
tools. Method: We present an evaluation of five open-source and four
proprietary tools against a benchmark dataset. Results: The top three tools
based on precision are: GitHub Secret Scanner (75%), Gitleaks (46%), and
Commercial X (25%), and based on recall are: Gitleaks (88%), SpectralOps (67%)
and TruffleHog (52%). Our manual analysis of reported secrets reveals that
false positives are due to employing generic regular expressions and
ineffective entropy calculation. In contrast, false negatives are due to faulty
regular expressions, skipping specific file types, and insufficient rulesets.
Conclusions: We recommend developers choose tools based on secret types present
in their projects to prevent missing secrets. In addition, we recommend tool
vendors update detection rules periodically and correctly employ secret
verification mechanisms by collaborating with API vendors to improve accuracy.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 02:32:09 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Basak",
"Setu Kumar",
""
],
[
"Cox",
"Jamison",
""
],
[
"Reaves",
"Bradley",
""
],
[
"Williams",
"Laurie",
""
]
] | TITLE: A Comparative Study of Software Secrets Reporting by Secret Detection
Tools
ABSTRACT: Background: According to GitGuardian's monitoring of public GitHub
repositories, secrets sprawl continued accelerating in 2022 by 67% compared to
2021, exposing over 10 million secrets (API keys and other credentials). Though
many open-source and proprietary secret detection tools are available, these
tools output many false positives, making it difficult for developers to take
action and teams to choose one tool out of many. To our knowledge, the secret
detection tools are not yet compared and evaluated. Aims: The goal of our study
is to aid developers in choosing a secret detection tool to reduce the exposure
of secrets through an empirical investigation of existing secret detection
tools. Method: We present an evaluation of five open-source and four
proprietary tools against a benchmark dataset. Results: The top three tools
based on precision are: GitHub Secret Scanner (75%), Gitleaks (46%), and
Commercial X (25%), and based on recall are: Gitleaks (88%), SpectralOps (67%)
and TruffleHog (52%). Our manual analysis of reported secrets reveals that
false positives are due to employing generic regular expressions and
ineffective entropy calculation. In contrast, false negatives are due to faulty
regular expressions, skipping specific file types, and insufficient rulesets.
Conclusions: We recommend developers choose tools based on secret types present
in their projects to prevent missing secrets. In addition, we recommend tool
vendors update detection rules periodically and correctly employ secret
verification mechanisms by collaborating with API vendors to improve accuracy.
| no_new_dataset | 0.710201 |
2307.00717 | Yushan Han | Yushan Han, Hui Zhang, Honglei Zhang and Yidong Li | SSC3OD: Sparsely Supervised Collaborative 3D Object Detection from LiDAR
Point Clouds | 8 pages, 3 figures, IEEE International Conference on Systems, Man,
and Cybernetics (SMC 2023) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative 3D object detection, with its improved interaction advantage
among multiple agents, has been widely explored in autonomous driving. However,
existing collaborative 3D object detectors in a fully supervised paradigm
heavily rely on large-scale annotated 3D bounding boxes, which is
labor-intensive and time-consuming. To tackle this issue, we propose a sparsely
supervised collaborative 3D object detection framework SSC3OD, which only
requires each agent to randomly label one object in the scene. Specifically,
this model consists of two novel components, i.e., the pillar-based masked
autoencoder (Pillar-MAE) and the instance mining module. The Pillar-MAE module
aims to reason over high-level semantics in a self-supervised manner, and the
instance mining module generates high-quality pseudo labels for collaborative
detectors online. By introducing these simple yet effective mechanisms, the
proposed SSC3OD can alleviate the adverse impacts of incomplete annotations. We
generate sparse labels based on collaborative perception datasets to evaluate
our method. Extensive experiments on three large-scale datasets reveal that our
proposed SSC3OD can effectively improve the performance of sparsely supervised
collaborative 3D object detectors.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 02:42:14 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Han",
"Yushan",
""
],
[
"Zhang",
"Hui",
""
],
[
"Zhang",
"Honglei",
""
],
[
"Li",
"Yidong",
""
]
] | TITLE: SSC3OD: Sparsely Supervised Collaborative 3D Object Detection from LiDAR
Point Clouds
ABSTRACT: Collaborative 3D object detection, with its improved interaction advantage
among multiple agents, has been widely explored in autonomous driving. However,
existing collaborative 3D object detectors in a fully supervised paradigm
heavily rely on large-scale annotated 3D bounding boxes, which is
labor-intensive and time-consuming. To tackle this issue, we propose a sparsely
supervised collaborative 3D object detection framework SSC3OD, which only
requires each agent to randomly label one object in the scene. Specifically,
this model consists of two novel components, i.e., the pillar-based masked
autoencoder (Pillar-MAE) and the instance mining module. The Pillar-MAE module
aims to reason over high-level semantics in a self-supervised manner, and the
instance mining module generates high-quality pseudo labels for collaborative
detectors online. By introducing these simple yet effective mechanisms, the
proposed SSC3OD can alleviate the adverse impacts of incomplete annotations. We
generate sparse labels based on collaborative perception datasets to evaluate
our method. Extensive experiments on three large-scale datasets reveal that our
proposed SSC3OD can effectively improve the performance of sparsely supervised
collaborative 3D object detectors.
| no_new_dataset | 0.709177 |
2307.00729 | Qilong Yuan | Sheng Zhao, Qilong Yuan, Yibo Duan and Zhuoyue Chen | An End-to-End Multi-Module Audio Deepfake Generation System for ADD
Challenge 2023 | null | null | null | null | cs.SD cs.CL eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of synthetic speech generation is to generate language content from
a given text, then simulating fake human voice.The key factors that determine
the effect of synthetic speech generation mainly include speed of generation,
accuracy of word segmentation, naturalness of synthesized speech, etc. This
paper builds an end-to-end multi-module synthetic speech generation model,
including speaker encoder, synthesizer based on Tacotron2, and vocoder based on
WaveRNN. In addition, we perform a lot of comparative experiments on different
datasets and various model structures. Finally, we won the first place in the
ADD 2023 challenge Track 1.1 with the weighted deception success rate (WDSR) of
44.97%.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 03:21:23 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Zhao",
"Sheng",
""
],
[
"Yuan",
"Qilong",
""
],
[
"Duan",
"Yibo",
""
],
[
"Chen",
"Zhuoyue",
""
]
] | TITLE: An End-to-End Multi-Module Audio Deepfake Generation System for ADD
Challenge 2023
ABSTRACT: The task of synthetic speech generation is to generate language content from
a given text, then simulating fake human voice.The key factors that determine
the effect of synthetic speech generation mainly include speed of generation,
accuracy of word segmentation, naturalness of synthesized speech, etc. This
paper builds an end-to-end multi-module synthetic speech generation model,
including speaker encoder, synthesizer based on Tacotron2, and vocoder based on
WaveRNN. In addition, we perform a lot of comparative experiments on different
datasets and various model structures. Finally, we won the first place in the
ADD 2023 challenge Track 1.1 with the weighted deception success rate (WDSR) of
44.97%.
| no_new_dataset | 0.712201 |
2307.00735 | Chao Lei | Chao Lei, Nir Lipovetzky, Krista A. Ehinger | Novelty and Lifted Helpful Actions in Generalized Planning | Accepted at SoCS 2023 (extended version) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has been shown recently that successful techniques in classical planning,
such as goal-oriented heuristics and landmarks, can improve the ability to
compute planning programs for generalized planning (GP) problems. In this work,
we introduce the notion of action novelty rank, which computes novelty with
respect to a planning program, and propose novelty-based generalized planning
solvers, which prune a newly generated planning program if its most frequent
action repetition is greater than a given bound $v$, implemented by
novelty-based best-first search BFS($v$) and its progressive variant PGP($v$).
Besides, we introduce lifted helpful actions in GP derived from action schemes,
and propose new evaluation functions and structural program restrictions to
scale up the search. Our experiments show that the new algorithms BFS($v$) and
PGP($v$) outperform the state-of-the-art in GP over the standard generalized
planning benchmarks. Practical findings on the above-mentioned methods in
generalized planning are briefly discussed.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 03:44:12 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Lei",
"Chao",
""
],
[
"Lipovetzky",
"Nir",
""
],
[
"Ehinger",
"Krista A.",
""
]
] | TITLE: Novelty and Lifted Helpful Actions in Generalized Planning
ABSTRACT: It has been shown recently that successful techniques in classical planning,
such as goal-oriented heuristics and landmarks, can improve the ability to
compute planning programs for generalized planning (GP) problems. In this work,
we introduce the notion of action novelty rank, which computes novelty with
respect to a planning program, and propose novelty-based generalized planning
solvers, which prune a newly generated planning program if its most frequent
action repetition is greater than a given bound $v$, implemented by
novelty-based best-first search BFS($v$) and its progressive variant PGP($v$).
Besides, we introduce lifted helpful actions in GP derived from action schemes,
and propose new evaluation functions and structural program restrictions to
scale up the search. Our experiments show that the new algorithms BFS($v$) and
PGP($v$) outperform the state-of-the-art in GP over the standard generalized
planning benchmarks. Practical findings on the above-mentioned methods in
generalized planning are briefly discussed.
| no_new_dataset | 0.708792 |
2307.00741 | Muhammad Ibrahim | Muhammad Ibrahim, Naveed Akhtar, Saeed Anwar, and Ajmal Mian | UnLoc: A Universal Localization Method for Autonomous Vehicles using
LiDAR, Radar and/or Camera Input | UnLoc: A Universal Localization Method for Autonomous Vehicles using
LiDAR, Radar and/or Camera Input has been accepted for publication in the
Proceedings of the 2023 IEEE/RSJ International Conference on Intelligent
Robots and Systems (IROS 2023) | null | null | null | cs.RO cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Localization is a fundamental task in robotics for autonomous navigation.
Existing localization methods rely on a single input data modality or train
several computational models to process different modalities. This leads to
stringent computational requirements and sub-optimal results that fail to
capitalize on the complementary information in other data streams. This paper
proposes UnLoc, a novel unified neural modeling approach for localization with
multi-sensor input in all weather conditions. Our multi-stream network can
handle LiDAR, Camera and RADAR inputs for localization on demand, i.e., it can
work with one or more input sensors, making it robust to sensor failure. UnLoc
uses 3D sparse convolutions and cylindrical partitioning of the space to
process LiDAR frames and implements ResNet blocks with a slot attention-based
feature filtering module for the Radar and image modalities. We introduce a
unique learnable modality encoding scheme to distinguish between the input
sensor data. Our method is extensively evaluated on Oxford Radar RobotCar,
ApolloSouthBay and Perth-WA datasets. The results ascertain the efficacy of our
technique.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 04:10:55 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Ibrahim",
"Muhammad",
""
],
[
"Akhtar",
"Naveed",
""
],
[
"Anwar",
"Saeed",
""
],
[
"Mian",
"Ajmal",
""
]
] | TITLE: UnLoc: A Universal Localization Method for Autonomous Vehicles using
LiDAR, Radar and/or Camera Input
ABSTRACT: Localization is a fundamental task in robotics for autonomous navigation.
Existing localization methods rely on a single input data modality or train
several computational models to process different modalities. This leads to
stringent computational requirements and sub-optimal results that fail to
capitalize on the complementary information in other data streams. This paper
proposes UnLoc, a novel unified neural modeling approach for localization with
multi-sensor input in all weather conditions. Our multi-stream network can
handle LiDAR, Camera and RADAR inputs for localization on demand, i.e., it can
work with one or more input sensors, making it robust to sensor failure. UnLoc
uses 3D sparse convolutions and cylindrical partitioning of the space to
process LiDAR frames and implements ResNet blocks with a slot attention-based
feature filtering module for the Radar and image modalities. We introduce a
unique learnable modality encoding scheme to distinguish between the input
sensor data. Our method is extensively evaluated on Oxford Radar RobotCar,
ApolloSouthBay and Perth-WA datasets. The results ascertain the efficacy of our
technique.
| no_new_dataset | 0.710848 |
2307.00755 | Chaoxi Niu | Chaoxi Niu, Guansong Pang, Ling Chen | Graph-level Anomaly Detection via Hierarchical Memory Networks | Accepted to ECML-PKDD 2023 | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph-level anomaly detection aims to identify abnormal graphs that exhibit
deviant structures and node attributes compared to the majority in a graph set.
One primary challenge is to learn normal patterns manifested in both
fine-grained and holistic views of graphs for identifying graphs that are
abnormal in part or in whole. To tackle this challenge, we propose a novel
approach called Hierarchical Memory Networks (HimNet), which learns
hierarchical memory modules -- node and graph memory modules -- via a graph
autoencoder network architecture. The node-level memory module is trained to
model fine-grained, internal graph interactions among nodes for detecting
locally abnormal graphs, while the graph-level memory module is dedicated to
the learning of holistic normal patterns for detecting globally abnormal
graphs. The two modules are jointly optimized to detect both locally- and
globally-anomalous graphs. Extensive empirical results on 16 real-world graph
datasets from various domains show that i) HimNet significantly outperforms the
state-of-art methods and ii) it is robust to anomaly contamination. Codes are
available at: https://github.com/Niuchx/HimNet.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 04:57:53 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Niu",
"Chaoxi",
""
],
[
"Pang",
"Guansong",
""
],
[
"Chen",
"Ling",
""
]
] | TITLE: Graph-level Anomaly Detection via Hierarchical Memory Networks
ABSTRACT: Graph-level anomaly detection aims to identify abnormal graphs that exhibit
deviant structures and node attributes compared to the majority in a graph set.
One primary challenge is to learn normal patterns manifested in both
fine-grained and holistic views of graphs for identifying graphs that are
abnormal in part or in whole. To tackle this challenge, we propose a novel
approach called Hierarchical Memory Networks (HimNet), which learns
hierarchical memory modules -- node and graph memory modules -- via a graph
autoencoder network architecture. The node-level memory module is trained to
model fine-grained, internal graph interactions among nodes for detecting
locally abnormal graphs, while the graph-level memory module is dedicated to
the learning of holistic normal patterns for detecting globally abnormal
graphs. The two modules are jointly optimized to detect both locally- and
globally-anomalous graphs. Extensive empirical results on 16 real-world graph
datasets from various domains show that i) HimNet significantly outperforms the
state-of-art methods and ii) it is robust to anomaly contamination. Codes are
available at: https://github.com/Niuchx/HimNet.
| no_new_dataset | 0.710653 |
2307.00758 | Wenting Tang | Wenting Tang, Xingxing Wei, Bo Li (Beijing Key Laboratory of Digital
Media, School of Computer Science and Engineering, Beihang University,
Beijing, China) | Structured Network Pruning by Measuring Filter-wise Interactions | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Structured network pruning is a practical approach to reduce computation cost
directly while retaining the CNNs' generalization performance in real
applications. However, identifying redundant filters is a core problem in
structured network pruning, and current redundancy criteria only focus on
individual filters' attributes. When pruning sparsity increases, these
redundancy criteria are not effective or efficient enough. Since the
filter-wise interaction also contributes to the CNN's prediction accuracy, we
integrate the filter-wise interaction into the redundancy criterion. In our
criterion, we introduce the filter importance and filter utilization strength
to reflect the decision ability of individual and multiple filters. Utilizing
this new redundancy criterion, we propose a structured network pruning approach
SNPFI (Structured Network Pruning by measuring Filter-wise Interaction). During
the pruning, the SNPFI can automatically assign the proper sparsity based on
the filter utilization strength and eliminate the useless filters by filter
importance. After the pruning, the SNPFI can recover pruned model's performance
effectively without iterative training by minimizing the interaction
difference. We empirically demonstrate the effectiveness of the SNPFI with
several commonly used CNN models, including AlexNet, MobileNetv1, and
ResNet-50, on various image classification datasets, including MNIST, CIFAR-10,
and ImageNet. For all experimental CNN models, nearly 60% of computation is
reduced in a network compression while the classification accuracy remains.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 05:26:05 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Tang",
"Wenting",
"",
"Beijing Key Laboratory of Digital\n Media, School of Computer Science and Engineering, Beihang University,\n Beijing, China"
],
[
"Wei",
"Xingxing",
"",
"Beijing Key Laboratory of Digital\n Media, School of Computer Science and Engineering, Beihang University,\n Beijing, China"
],
[
"Li",
"Bo",
"",
"Beijing Key Laboratory of Digital\n Media, School of Computer Science and Engineering, Beihang University,\n Beijing, China"
]
] | TITLE: Structured Network Pruning by Measuring Filter-wise Interactions
ABSTRACT: Structured network pruning is a practical approach to reduce computation cost
directly while retaining the CNNs' generalization performance in real
applications. However, identifying redundant filters is a core problem in
structured network pruning, and current redundancy criteria only focus on
individual filters' attributes. When pruning sparsity increases, these
redundancy criteria are not effective or efficient enough. Since the
filter-wise interaction also contributes to the CNN's prediction accuracy, we
integrate the filter-wise interaction into the redundancy criterion. In our
criterion, we introduce the filter importance and filter utilization strength
to reflect the decision ability of individual and multiple filters. Utilizing
this new redundancy criterion, we propose a structured network pruning approach
SNPFI (Structured Network Pruning by measuring Filter-wise Interaction). During
the pruning, the SNPFI can automatically assign the proper sparsity based on
the filter utilization strength and eliminate the useless filters by filter
importance. After the pruning, the SNPFI can recover pruned model's performance
effectively without iterative training by minimizing the interaction
difference. We empirically demonstrate the effectiveness of the SNPFI with
several commonly used CNN models, including AlexNet, MobileNetv1, and
ResNet-50, on various image classification datasets, including MNIST, CIFAR-10,
and ImageNet. For all experimental CNN models, nearly 60% of computation is
reduced in a network compression while the classification accuracy remains.
| no_new_dataset | 0.71 |
2307.00777 | Zhang Liu | Zhang Liu and Lianfen Huang and Zhibin Gao and Manman Luo and
Seyyedali Hosseinalipour and Huaiyu Dai | GA-DRL: Graph Neural Network-Augmented Deep Reinforcement Learning for
DAG Task Scheduling over Dynamic Vehicular Clouds | 15 pages, 12 figures, regular journal | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vehicular clouds (VCs) are modern platforms for processing of
computation-intensive tasks over vehicles. Such tasks are often represented as
directed acyclic graphs (DAGs) consisting of interdependent vertices/subtasks
and directed edges. In this paper, we propose a graph neural network-augmented
deep reinforcement learning scheme (GA-DRL) for scheduling DAG tasks over
dynamic VCs. In doing so, we first model the VC-assisted DAG task scheduling as
a Markov decision process. We then adopt a multi-head graph attention network
(GAT) to extract the features of DAG subtasks. Our developed GAT enables a
two-way aggregation of the topological information in a DAG task by
simultaneously considering predecessors and successors of each subtask. We
further introduce non-uniform DAG neighborhood sampling through codifying the
scheduling priority of different subtasks, which makes our developed GAT
generalizable to completely unseen DAG task topologies. Finally, we augment GAT
into a double deep Q-network learning module to conduct subtask-to-vehicle
assignment according to the extracted features of subtasks, while considering
the dynamics and heterogeneity of the vehicles in VCs. Through simulating
various DAG tasks under real-world movement traces of vehicles, we demonstrate
that GA-DRL outperforms existing benchmarks in terms of DAG task completion
time.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 06:41:15 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Liu",
"Zhang",
""
],
[
"Huang",
"Lianfen",
""
],
[
"Gao",
"Zhibin",
""
],
[
"Luo",
"Manman",
""
],
[
"Hosseinalipour",
"Seyyedali",
""
],
[
"Dai",
"Huaiyu",
""
]
] | TITLE: GA-DRL: Graph Neural Network-Augmented Deep Reinforcement Learning for
DAG Task Scheduling over Dynamic Vehicular Clouds
ABSTRACT: Vehicular clouds (VCs) are modern platforms for processing of
computation-intensive tasks over vehicles. Such tasks are often represented as
directed acyclic graphs (DAGs) consisting of interdependent vertices/subtasks
and directed edges. In this paper, we propose a graph neural network-augmented
deep reinforcement learning scheme (GA-DRL) for scheduling DAG tasks over
dynamic VCs. In doing so, we first model the VC-assisted DAG task scheduling as
a Markov decision process. We then adopt a multi-head graph attention network
(GAT) to extract the features of DAG subtasks. Our developed GAT enables a
two-way aggregation of the topological information in a DAG task by
simultaneously considering predecessors and successors of each subtask. We
further introduce non-uniform DAG neighborhood sampling through codifying the
scheduling priority of different subtasks, which makes our developed GAT
generalizable to completely unseen DAG task topologies. Finally, we augment GAT
into a double deep Q-network learning module to conduct subtask-to-vehicle
assignment according to the extracted features of subtasks, while considering
the dynamics and heterogeneity of the vehicles in VCs. Through simulating
various DAG tasks under real-world movement traces of vehicles, we demonstrate
that GA-DRL outperforms existing benchmarks in terms of DAG task completion
time.
| no_new_dataset | 0.70939 |
2307.00781 | Axi Niu | Axi Niu, Pham Xuan Trung, Kang Zhang, Jinqiu Sun, Yu Zhu, In So Kweon,
and Yanning Zhang | ACDMSR: Accelerated Conditional Diffusion Models for Single Image
Super-Resolution | arXiv admin note: text overlap with arXiv:2302.12831 | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Diffusion models have gained significant popularity in the field of
image-to-image translation. Previous efforts applying diffusion models to image
super-resolution (SR) have demonstrated that iteratively refining pure Gaussian
noise using a U-Net architecture trained on denoising at various noise levels
can yield satisfactory high-resolution images from low-resolution inputs.
However, this iterative refinement process comes with the drawback of low
inference speed, which strongly limits its applications. To speed up inference
and further enhance the performance, our research revisits diffusion models in
image super-resolution and proposes a straightforward yet significant diffusion
model-based super-resolution method called ACDMSR (accelerated conditional
diffusion model for image super-resolution). Specifically, our method adapts
the standard diffusion model to perform super-resolution through a
deterministic iterative denoising process. Our study also highlights the
effectiveness of using a pre-trained SR model to provide the conditional image
of the given low-resolution (LR) image to achieve superior high-resolution
results. We demonstrate that our method surpasses previous attempts in
qualitative and quantitative results through extensive experiments conducted on
benchmark datasets such as Set5, Set14, Urban100, BSD100, and Manga109.
Moreover, our approach generates more visually realistic counterparts for
low-resolution images, emphasizing its effectiveness in practical scenarios.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2023 06:49:04 GMT"
}
] | 2023-07-04T00:00:00 | [
[
"Niu",
"Axi",
""
],
[
"Trung",
"Pham Xuan",
""
],
[
"Zhang",
"Kang",
""
],
[
"Sun",
"Jinqiu",
""
],
[
"Zhu",
"Yu",
""
],
[
"Kweon",
"In So",
""
],
[
"Zhang",
"Yanning",
""
]
] | TITLE: ACDMSR: Accelerated Conditional Diffusion Models for Single Image
Super-Resolution
ABSTRACT: Diffusion models have gained significant popularity in the field of
image-to-image translation. Previous efforts applying diffusion models to image
super-resolution (SR) have demonstrated that iteratively refining pure Gaussian
noise using a U-Net architecture trained on denoising at various noise levels
can yield satisfactory high-resolution images from low-resolution inputs.
However, this iterative refinement process comes with the drawback of low
inference speed, which strongly limits its applications. To speed up inference
and further enhance the performance, our research revisits diffusion models in
image super-resolution and proposes a straightforward yet significant diffusion
model-based super-resolution method called ACDMSR (accelerated conditional
diffusion model for image super-resolution). Specifically, our method adapts
the standard diffusion model to perform super-resolution through a
deterministic iterative denoising process. Our study also highlights the
effectiveness of using a pre-trained SR model to provide the conditional image
of the given low-resolution (LR) image to achieve superior high-resolution
results. We demonstrate that our method surpasses previous attempts in
qualitative and quantitative results through extensive experiments conducted on
benchmark datasets such as Set5, Set14, Urban100, BSD100, and Manga109.
Moreover, our approach generates more visually realistic counterparts for
low-resolution images, emphasizing its effectiveness in practical scenarios.
| no_new_dataset | 0.709831 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.