id
large_string | submitter
large_string | authors
large_string | title
large_string | comments
large_string | journal-ref
large_string | doi
large_string | report-no
large_string | categories
large_string | license
large_string | abstract
large_string | versions
large list | update_date
timestamp[ms] | authors_parsed
large list | prompt
large_string | label
string | prob
float64 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2211.07284 | Mark Basham FInstP PhD | Felicity Currie, Mark Basham, Laura Shemilt and Nick Lynch | Data Management in Integrated Research Institutes: Undertaking a Review
of Research Data Management at the Rosalind Franklin Institute | 17 pages, 6 figures | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Managing Research Data, and making it available for use/reuse by others in
line with the UKRI Concordat on Open Research Data and FAIR principles, is a
major issue for research-intensive organisations. In this case study we outline
an institute-wide review of data management in practice, carried out at the
Rosalind Franklin Institute (The Franklin) in partnership with external
consultants, Curlew Research, in March 2022. We aim to describe the processes
involved in undertaking a review of the services already in place that support
good practice in managing research data, and their uptake, with an emphasis on
the methodology used. We conducted interviews with scientific Theme Leads which
set the scope for the Data Management Workshops subsequently held with
Researchers. Workshops were valuable in both providing actionable insights for
data management and in priming the audience for future discussions. The final
report produced for The Franklin, summarising results of the analysis, provides
a snapshot of current practice for the Institute, highlighting what is working
well and where improvements might be made, and provides a benchmark against
which development can be measured in the coming years. The Review will continue
to be conducted on an annual basis, reflecting changes in a fast-moving area
and enabling an agile approach to research data management.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2022 11:28:27 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 17:39:50 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Currie",
"Felicity",
""
],
[
"Basham",
"Mark",
""
],
[
"Shemilt",
"Laura",
""
],
[
"Lynch",
"Nick",
""
]
] | TITLE: Data Management in Integrated Research Institutes: Undertaking a Review
of Research Data Management at the Rosalind Franklin Institute
ABSTRACT: Managing Research Data, and making it available for use/reuse by others in
line with the UKRI Concordat on Open Research Data and FAIR principles, is a
major issue for research-intensive organisations. In this case study we outline
an institute-wide review of data management in practice, carried out at the
Rosalind Franklin Institute (The Franklin) in partnership with external
consultants, Curlew Research, in March 2022. We aim to describe the processes
involved in undertaking a review of the services already in place that support
good practice in managing research data, and their uptake, with an emphasis on
the methodology used. We conducted interviews with scientific Theme Leads which
set the scope for the Data Management Workshops subsequently held with
Researchers. Workshops were valuable in both providing actionable insights for
data management and in priming the audience for future discussions. The final
report produced for The Franklin, summarising results of the analysis, provides
a snapshot of current practice for the Institute, highlighting what is working
well and where improvements might be made, and provides a benchmark against
which development can be measured in the coming years. The Review will continue
to be conducted on an annual basis, reflecting changes in a fast-moving area
and enabling an agile approach to research data management.
| no_new_dataset | 0.929887 |
2211.08006 | Yuru Jing | Yuru Jing and Zixuan Li | Auto-outlier Fusion Technique for Chest X-ray classification with
Multi-head Attention Mechanism | Accepted by the Journal of Image Processing Theory and Applications | null | 10.23977/jipta.2023.060101 | null | eess.IV cs.CV cs.LG stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A chest X-ray is one of the most widely available radiological examinations
for diagnosing and detecting various lung illnesses. The National Institutes of
Health (NIH) provides an extensive database, ChestX-ray8 and ChestXray14, to
help establish a deep learning community for analysing and predicting lung
diseases. ChestX-ray14 consists of 112,120 frontal-view X-ray images of 30,805
distinct patients with text-mined fourteen disease image labels, where each
image has multiple labels and has been utilised in numerous research in the
past. To our current knowledge, no previous study has investigated outliers and
multi-label impact for a single X-ray image during the preprocessing stage. The
effect of outliers is mitigated in this paper by our proposed auto-outlier
fusion technique. The image label is regenerated by concentrating on a
particular factor in one image. The final cleaned dataset will be used to
compare the mechanisms of multi-head self-attention and multi-head attention
with generalised max-pooling.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 2022 09:35:49 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Jing",
"Yuru",
""
],
[
"Li",
"Zixuan",
""
]
] | TITLE: Auto-outlier Fusion Technique for Chest X-ray classification with
Multi-head Attention Mechanism
ABSTRACT: A chest X-ray is one of the most widely available radiological examinations
for diagnosing and detecting various lung illnesses. The National Institutes of
Health (NIH) provides an extensive database, ChestX-ray8 and ChestXray14, to
help establish a deep learning community for analysing and predicting lung
diseases. ChestX-ray14 consists of 112,120 frontal-view X-ray images of 30,805
distinct patients with text-mined fourteen disease image labels, where each
image has multiple labels and has been utilised in numerous research in the
past. To our current knowledge, no previous study has investigated outliers and
multi-label impact for a single X-ray image during the preprocessing stage. The
effect of outliers is mitigated in this paper by our proposed auto-outlier
fusion technique. The image label is regenerated by concentrating on a
particular factor in one image. The final cleaned dataset will be used to
compare the mechanisms of multi-head self-attention and multi-head attention
with generalised max-pooling.
| no_new_dataset | 0.947672 |
2211.08654 | Xu Wu | Lesego E. Moloko, Pavel M. Bokov, Xu Wu, Kostadin N. Ivanov | Prediction and Uncertainty Quantification of SAFARI-1 Axial Neutron Flux
Profiles with Neural Networks | 34 pages, 12 figures | null | 10.1016/j.anucene.2023.109813 | null | stat.ML cs.LG physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Neural Networks (ANNs) have been successfully used in various
nuclear engineering applications, such as predicting reactor physics parameters
within reasonable time and with a high level of accuracy. Despite this success,
they cannot provide information about the model prediction uncertainties,
making it difficult to assess ANN prediction credibility, especially in
extrapolated domains. In this study, Deep Neural Networks (DNNs) are used to
predict the assembly axial neutron flux profiles in the SAFARI-1 research
reactor, with quantified uncertainties in the ANN predictions and extrapolation
to cycles not used in the training process. The training dataset consists of
copper-wire activation measurements, the axial measurement locations and the
measured control bank positions obtained from the reactor's historical cycles.
Uncertainty Quantification of the regular DNN models' predictions is performed
using Monte Carlo Dropout (MCD) and Bayesian Neural Networks solved by
Variational Inference (BNN VI). The regular DNNs, DNNs solved with MCD and BNN
VI results agree very well among each other as well as with the new measured
dataset not used in the training process, thus indicating good prediction and
generalization capability. The uncertainty bands produced by MCD and BNN VI
agree very well, and in general, they can fully envelop the noisy measurement
data points. The developed ANNs are useful in supporting the experimental
measurements campaign and neutronics code Verification and Validation (V&V).
| [
{
"version": "v1",
"created": "Wed, 16 Nov 2022 04:14:13 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Moloko",
"Lesego E.",
""
],
[
"Bokov",
"Pavel M.",
""
],
[
"Wu",
"Xu",
""
],
[
"Ivanov",
"Kostadin N.",
""
]
] | TITLE: Prediction and Uncertainty Quantification of SAFARI-1 Axial Neutron Flux
Profiles with Neural Networks
ABSTRACT: Artificial Neural Networks (ANNs) have been successfully used in various
nuclear engineering applications, such as predicting reactor physics parameters
within reasonable time and with a high level of accuracy. Despite this success,
they cannot provide information about the model prediction uncertainties,
making it difficult to assess ANN prediction credibility, especially in
extrapolated domains. In this study, Deep Neural Networks (DNNs) are used to
predict the assembly axial neutron flux profiles in the SAFARI-1 research
reactor, with quantified uncertainties in the ANN predictions and extrapolation
to cycles not used in the training process. The training dataset consists of
copper-wire activation measurements, the axial measurement locations and the
measured control bank positions obtained from the reactor's historical cycles.
Uncertainty Quantification of the regular DNN models' predictions is performed
using Monte Carlo Dropout (MCD) and Bayesian Neural Networks solved by
Variational Inference (BNN VI). The regular DNNs, DNNs solved with MCD and BNN
VI results agree very well among each other as well as with the new measured
dataset not used in the training process, thus indicating good prediction and
generalization capability. The uncertainty bands produced by MCD and BNN VI
agree very well, and in general, they can fully envelop the noisy measurement
data points. The developed ANNs are useful in supporting the experimental
measurements campaign and neutronics code Verification and Validation (V&V).
| no_new_dataset | 0.947088 |
2211.11595 | Alexey Vishnyakov | Alexey Vishnyakov, Daniil Kuts, Vlada Logunova, Darya Parygina, Eli
Kobrin, Georgy Savidov, Andrey Fedotov | Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security
Development Lifecycle | null | 2022 Ivannikov ISPRAS Open Conference (ISPRAS), IEEE, 2022, pp.
111-123 | 10.1109/ISPRAS57371.2022.10076861 | null | cs.CR cs.SE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Nowadays automated dynamic analysis frameworks for continuous testing are in
high demand to ensure software safety and satisfy the security development
lifecycle (SDL) requirements. The security bug hunting efficiency of
cutting-edge hybrid fuzzing techniques outperforms widely utilized
coverage-guided fuzzing. We propose an enhanced dynamic analysis pipeline to
leverage productivity of automated bug detection based on hybrid fuzzing. We
implement the proposed pipeline in the continuous fuzzing toolset Sydr-Fuzz
which is powered by hybrid fuzzing orchestrator, integrating our DSE tool Sydr
with libFuzzer and AFL++. Sydr-Fuzz also incorporates security predicate
checkers, crash triaging tool Casr, and utilities for corpus minimization and
coverage gathering. The benchmarking of our hybrid fuzzer against alternative
state-of-the-art solutions demonstrates its superiority over coverage-guided
fuzzers while remaining on the same level with advanced hybrid fuzzers.
Furthermore, we approve the relevance of our approach by discovering 85 new
real-world software flaws within the OSS-Sydr-Fuzz project. Finally, we open
Casr source code to the community to facilitate examination of the existing
crashes.
| [
{
"version": "v1",
"created": "Mon, 21 Nov 2022 15:51:09 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 12:53:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Vishnyakov",
"Alexey",
""
],
[
"Kuts",
"Daniil",
""
],
[
"Logunova",
"Vlada",
""
],
[
"Parygina",
"Darya",
""
],
[
"Kobrin",
"Eli",
""
],
[
"Savidov",
"Georgy",
""
],
[
"Fedotov",
"Andrey",
""
]
] | TITLE: Sydr-Fuzz: Continuous Hybrid Fuzzing and Dynamic Analysis for Security
Development Lifecycle
ABSTRACT: Nowadays automated dynamic analysis frameworks for continuous testing are in
high demand to ensure software safety and satisfy the security development
lifecycle (SDL) requirements. The security bug hunting efficiency of
cutting-edge hybrid fuzzing techniques outperforms widely utilized
coverage-guided fuzzing. We propose an enhanced dynamic analysis pipeline to
leverage productivity of automated bug detection based on hybrid fuzzing. We
implement the proposed pipeline in the continuous fuzzing toolset Sydr-Fuzz
which is powered by hybrid fuzzing orchestrator, integrating our DSE tool Sydr
with libFuzzer and AFL++. Sydr-Fuzz also incorporates security predicate
checkers, crash triaging tool Casr, and utilities for corpus minimization and
coverage gathering. The benchmarking of our hybrid fuzzer against alternative
state-of-the-art solutions demonstrates its superiority over coverage-guided
fuzzers while remaining on the same level with advanced hybrid fuzzers.
Furthermore, we approve the relevance of our approach by discovering 85 new
real-world software flaws within the OSS-Sydr-Fuzz project. Finally, we open
Casr source code to the community to facilitate examination of the existing
crashes.
| no_new_dataset | 0.9357 |
2211.13081 | Robert Alexander Marsden | Mario D\"obler, Robert A. Marsden, Bin Yang | Robust Mean Teacher for Continual and Gradual Test-Time Adaptation | Accepted at CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since experiencing domain shifts during test-time is inevitable in practice,
test-time adaption (TTA) continues to adapt the model after deployment.
Recently, the area of continual and gradual test-time adaptation (TTA) emerged.
In contrast to standard TTA, continual TTA considers not only a single domain
shift, but a sequence of shifts. Gradual TTA further exploits the property that
some shifts evolve gradually over time. Since in both settings long test
sequences are present, error accumulation needs to be addressed for methods
relying on self-training. In this work, we propose and show that in the setting
of TTA, the symmetric cross-entropy is better suited as a consistency loss for
mean teachers compared to the commonly used cross-entropy. This is justified by
our analysis with respect to the (symmetric) cross-entropy's gradient
properties. To pull the test feature space closer to the source domain, where
the pre-trained model is well posed, contrastive learning is leveraged. Since
applications differ in their requirements, we address several settings,
including having source data available and the more challenging source-free
setting. We demonstrate the effectiveness of our proposed method 'robust mean
teacher' (RMT) on the continual and gradual corruption benchmarks CIFAR10C,
CIFAR100C, and Imagenet-C. We further consider ImageNet-R and propose a new
continual DomainNet-126 benchmark. State-of-the-art results are achieved on all
benchmarks.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2022 16:14:45 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2023 18:44:42 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Döbler",
"Mario",
""
],
[
"Marsden",
"Robert A.",
""
],
[
"Yang",
"Bin",
""
]
] | TITLE: Robust Mean Teacher for Continual and Gradual Test-Time Adaptation
ABSTRACT: Since experiencing domain shifts during test-time is inevitable in practice,
test-time adaption (TTA) continues to adapt the model after deployment.
Recently, the area of continual and gradual test-time adaptation (TTA) emerged.
In contrast to standard TTA, continual TTA considers not only a single domain
shift, but a sequence of shifts. Gradual TTA further exploits the property that
some shifts evolve gradually over time. Since in both settings long test
sequences are present, error accumulation needs to be addressed for methods
relying on self-training. In this work, we propose and show that in the setting
of TTA, the symmetric cross-entropy is better suited as a consistency loss for
mean teachers compared to the commonly used cross-entropy. This is justified by
our analysis with respect to the (symmetric) cross-entropy's gradient
properties. To pull the test feature space closer to the source domain, where
the pre-trained model is well posed, contrastive learning is leveraged. Since
applications differ in their requirements, we address several settings,
including having source data available and the more challenging source-free
setting. We demonstrate the effectiveness of our proposed method 'robust mean
teacher' (RMT) on the continual and gradual corruption benchmarks CIFAR10C,
CIFAR100C, and Imagenet-C. We further consider ImageNet-R and propose a new
continual DomainNet-126 benchmark. State-of-the-art results are achieved on all
benchmarks.
| no_new_dataset | 0.946051 |
2211.16152 | Hao Phung | Hao Phung, Quan Dao, Anh Tran | Wavelet Diffusion Models are fast and scalable Image Generators | Accepted to CVPR 2023 | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models are rising as a powerful solution for high-fidelity image
generation, which exceeds GANs in quality in many circumstances. However, their
slow training and inference speed is a huge bottleneck, blocking them from
being used in real-time applications. A recent DiffusionGAN method
significantly decreases the models' running time by reducing the number of
sampling steps from thousands to several, but their speeds still largely lag
behind the GAN counterparts. This paper aims to reduce the speed gap by
proposing a novel wavelet-based diffusion scheme. We extract low-and-high
frequency components from both image and feature levels via wavelet
decomposition and adaptively handle these components for faster processing
while maintaining good generation quality. Furthermore, we propose to use a
reconstruction term, which effectively boosts the model training convergence.
Experimental results on CelebA-HQ, CIFAR-10, LSUN-Church, and STL-10 datasets
prove our solution is a stepping-stone to offering real-time and high-fidelity
diffusion models. Our code and pre-trained checkpoints are available at
\url{https://github.com/VinAIResearch/WaveDiff.git}.
| [
{
"version": "v1",
"created": "Tue, 29 Nov 2022 12:25:25 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2023 19:11:25 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Phung",
"Hao",
""
],
[
"Dao",
"Quan",
""
],
[
"Tran",
"Anh",
""
]
] | TITLE: Wavelet Diffusion Models are fast and scalable Image Generators
ABSTRACT: Diffusion models are rising as a powerful solution for high-fidelity image
generation, which exceeds GANs in quality in many circumstances. However, their
slow training and inference speed is a huge bottleneck, blocking them from
being used in real-time applications. A recent DiffusionGAN method
significantly decreases the models' running time by reducing the number of
sampling steps from thousands to several, but their speeds still largely lag
behind the GAN counterparts. This paper aims to reduce the speed gap by
proposing a novel wavelet-based diffusion scheme. We extract low-and-high
frequency components from both image and feature levels via wavelet
decomposition and adaptively handle these components for faster processing
while maintaining good generation quality. Furthermore, we propose to use a
reconstruction term, which effectively boosts the model training convergence.
Experimental results on CelebA-HQ, CIFAR-10, LSUN-Church, and STL-10 datasets
prove our solution is a stepping-stone to offering real-time and high-fidelity
diffusion models. Our code and pre-trained checkpoints are available at
\url{https://github.com/VinAIResearch/WaveDiff.git}.
| no_new_dataset | 0.94699 |
2212.07422 | Yuliang Xiu | Yuliang Xiu, Jinlong Yang, Xu Cao, Dimitrios Tzionas, Michael J. Black | ECON: Explicit Clothed humans Optimized via Normal integration | Homepage: https://xiuyuliang.cn/econ Code:
https://github.com/YuliangXiu/ECON | null | null | null | cs.CV cs.AI cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The combination of deep learning, artist-curated scans, and Implicit
Functions (IF), is enabling the creation of detailed, clothed, 3D humans from
images. However, existing methods are far from perfect. IF-based methods
recover free-form geometry, but produce disembodied limbs or degenerate shapes
for novel poses or clothes. To increase robustness for these cases, existing
work uses an explicit parametric body model to constrain surface
reconstruction, but this limits the recovery of free-form surfaces such as
loose clothing that deviates from the body. What we want is a method that
combines the best properties of implicit representation and explicit body
regularization. To this end, we make two key observations: (1) current networks
are better at inferring detailed 2D maps than full-3D surfaces, and (2) a
parametric model can be seen as a "canvas" for stitching together detailed
surface patches. Based on these, our method, ECON, has three main steps: (1) It
infers detailed 2D normal maps for the front and back side of a clothed person.
(2) From these, it recovers 2.5D front and back surfaces, called d-BiNI, that
are equally detailed, yet incomplete, and registers these w.r.t. each other
with the help of a SMPL-X body mesh recovered from the image. (3) It "inpaints"
the missing geometry between d-BiNI surfaces. If the face and hands are noisy,
they can optionally be replaced with the ones of SMPL-X. As a result, ECON
infers high-fidelity 3D humans even in loose clothes and challenging poses.
This goes beyond previous methods, according to the quantitative evaluation on
the CAPE and Renderpeople datasets. Perceptual studies also show that ECON's
perceived realism is better by a large margin. Code and models are available
for research purposes at econ.is.tue.mpg.de
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2022 18:59:19 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 14:27:38 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Xiu",
"Yuliang",
""
],
[
"Yang",
"Jinlong",
""
],
[
"Cao",
"Xu",
""
],
[
"Tzionas",
"Dimitrios",
""
],
[
"Black",
"Michael J.",
""
]
] | TITLE: ECON: Explicit Clothed humans Optimized via Normal integration
ABSTRACT: The combination of deep learning, artist-curated scans, and Implicit
Functions (IF), is enabling the creation of detailed, clothed, 3D humans from
images. However, existing methods are far from perfect. IF-based methods
recover free-form geometry, but produce disembodied limbs or degenerate shapes
for novel poses or clothes. To increase robustness for these cases, existing
work uses an explicit parametric body model to constrain surface
reconstruction, but this limits the recovery of free-form surfaces such as
loose clothing that deviates from the body. What we want is a method that
combines the best properties of implicit representation and explicit body
regularization. To this end, we make two key observations: (1) current networks
are better at inferring detailed 2D maps than full-3D surfaces, and (2) a
parametric model can be seen as a "canvas" for stitching together detailed
surface patches. Based on these, our method, ECON, has three main steps: (1) It
infers detailed 2D normal maps for the front and back side of a clothed person.
(2) From these, it recovers 2.5D front and back surfaces, called d-BiNI, that
are equally detailed, yet incomplete, and registers these w.r.t. each other
with the help of a SMPL-X body mesh recovered from the image. (3) It "inpaints"
the missing geometry between d-BiNI surfaces. If the face and hands are noisy,
they can optionally be replaced with the ones of SMPL-X. As a result, ECON
infers high-fidelity 3D humans even in loose clothes and challenging poses.
This goes beyond previous methods, according to the quantitative evaluation on
the CAPE and Renderpeople datasets. Perceptual studies also show that ECON's
perceived realism is better by a large margin. Code and models are available
for research purposes at econ.is.tue.mpg.de
| no_new_dataset | 0.941868 |
2212.10156 | Li Chen | Yihan Hu, Jiazhi Yang, Li Chen, Keyu Li, Chonghao Sima, Xizhou Zhu,
Siqi Chai, Senyao Du, Tianwei Lin, Wenhai Wang, Lewei Lu, Xiaosong Jia, Qiang
Liu, Jifeng Dai, Yu Qiao, Hongyang Li | Planning-oriented Autonomous Driving | CVPR 2023 award candidate. Project page:
https://opendrivelab.github.io/UniAD/ | null | null | null | cs.CV cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Modern autonomous driving system is characterized as modular tasks in
sequential order, i.e., perception, prediction, and planning. In order to
perform a wide diversity of tasks and achieve advanced-level intelligence,
contemporary approaches either deploy standalone models for individual tasks,
or design a multi-task paradigm with separate heads. However, they might suffer
from accumulative errors or deficient task coordination. Instead, we argue that
a favorable framework should be devised and optimized in pursuit of the
ultimate goal, i.e., planning of the self-driving car. Oriented at this, we
revisit the key components within perception and prediction, and prioritize the
tasks such that all these tasks contribute to planning. We introduce Unified
Autonomous Driving (UniAD), a comprehensive framework up-to-date that
incorporates full-stack driving tasks in one network. It is exquisitely devised
to leverage advantages of each module, and provide complementary feature
abstractions for agent interaction from a global perspective. Tasks are
communicated with unified query interfaces to facilitate each other toward
planning. We instantiate UniAD on the challenging nuScenes benchmark. With
extensive ablations, the effectiveness of using such a philosophy is proven by
substantially outperforming previous state-of-the-arts in all aspects. Code and
models are public.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2022 10:47:53 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 16:26:08 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Hu",
"Yihan",
""
],
[
"Yang",
"Jiazhi",
""
],
[
"Chen",
"Li",
""
],
[
"Li",
"Keyu",
""
],
[
"Sima",
"Chonghao",
""
],
[
"Zhu",
"Xizhou",
""
],
[
"Chai",
"Siqi",
""
],
[
"Du",
"Senyao",
""
],
[
"Lin",
"Tianwei",
""
],
[
"Wang",
"Wenhai",
""
],
[
"Lu",
"Lewei",
""
],
[
"Jia",
"Xiaosong",
""
],
[
"Liu",
"Qiang",
""
],
[
"Dai",
"Jifeng",
""
],
[
"Qiao",
"Yu",
""
],
[
"Li",
"Hongyang",
""
]
] | TITLE: Planning-oriented Autonomous Driving
ABSTRACT: Modern autonomous driving system is characterized as modular tasks in
sequential order, i.e., perception, prediction, and planning. In order to
perform a wide diversity of tasks and achieve advanced-level intelligence,
contemporary approaches either deploy standalone models for individual tasks,
or design a multi-task paradigm with separate heads. However, they might suffer
from accumulative errors or deficient task coordination. Instead, we argue that
a favorable framework should be devised and optimized in pursuit of the
ultimate goal, i.e., planning of the self-driving car. Oriented at this, we
revisit the key components within perception and prediction, and prioritize the
tasks such that all these tasks contribute to planning. We introduce Unified
Autonomous Driving (UniAD), a comprehensive framework up-to-date that
incorporates full-stack driving tasks in one network. It is exquisitely devised
to leverage advantages of each module, and provide complementary feature
abstractions for agent interaction from a global perspective. Tasks are
communicated with unified query interfaces to facilitate each other toward
planning. We instantiate UniAD on the challenging nuScenes benchmark. With
extensive ablations, the effectiveness of using such a philosophy is proven by
substantially outperforming previous state-of-the-arts in all aspects. Code and
models are public.
| no_new_dataset | 0.936576 |
2212.12105 | Jingwei Zhang | Jingwei Zhang, Saarthak Kapse, Ke Ma, Prateek Prasanna, Maria
Vakalopoulou, Joel Saltz, Dimitris Samaras | Precise Location Matching Improves Dense Contrastive Learning in Digital
Pathology | Accept to IPMI 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dense prediction tasks such as segmentation and detection of pathological
entities hold crucial clinical value in computational pathology workflows.
However, obtaining dense annotations on large cohorts is usually tedious and
expensive. Contrastive learning (CL) is thus often employed to leverage large
volumes of unlabeled data to pre-train the backbone network. To boost CL for
dense prediction, some studies have proposed variations of dense matching
objectives in pre-training. However, our analysis shows that employing existing
dense matching strategies on histopathology images enforces invariance among
incorrect pairs of dense features and, thus, is imprecise. To address this, we
propose a precise location-based matching mechanism that utilizes the
overlapping information between geometric transformations to precisely match
regions in two augmentations. Extensive experiments on two pretraining datasets
(TCGA-BRCA, NCT-CRC-HE) and three downstream datasets (GlaS, CRAG, BCSS)
highlight the superiority of our method in semantic and instance segmentation
tasks. Our method outperforms previous dense matching methods by up to 7.2% in
average precision for detection and 5.6% in average precision for instance
segmentation tasks. Additionally, by using our matching mechanism in the three
popular contrastive learning frameworks, MoCo-v2, VICRegL, and ConCL, the
average precision in detection is improved by 0.7% to 5.2%, and the average
precision in segmentation is improved by 0.7% to 4.0%, demonstrating
generalizability. Our code is available at
https://github.com/cvlab-stonybrook/PLM_SSL.
| [
{
"version": "v1",
"created": "Fri, 23 Dec 2022 02:11:27 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 01:26:35 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zhang",
"Jingwei",
""
],
[
"Kapse",
"Saarthak",
""
],
[
"Ma",
"Ke",
""
],
[
"Prasanna",
"Prateek",
""
],
[
"Vakalopoulou",
"Maria",
""
],
[
"Saltz",
"Joel",
""
],
[
"Samaras",
"Dimitris",
""
]
] | TITLE: Precise Location Matching Improves Dense Contrastive Learning in Digital
Pathology
ABSTRACT: Dense prediction tasks such as segmentation and detection of pathological
entities hold crucial clinical value in computational pathology workflows.
However, obtaining dense annotations on large cohorts is usually tedious and
expensive. Contrastive learning (CL) is thus often employed to leverage large
volumes of unlabeled data to pre-train the backbone network. To boost CL for
dense prediction, some studies have proposed variations of dense matching
objectives in pre-training. However, our analysis shows that employing existing
dense matching strategies on histopathology images enforces invariance among
incorrect pairs of dense features and, thus, is imprecise. To address this, we
propose a precise location-based matching mechanism that utilizes the
overlapping information between geometric transformations to precisely match
regions in two augmentations. Extensive experiments on two pretraining datasets
(TCGA-BRCA, NCT-CRC-HE) and three downstream datasets (GlaS, CRAG, BCSS)
highlight the superiority of our method in semantic and instance segmentation
tasks. Our method outperforms previous dense matching methods by up to 7.2% in
average precision for detection and 5.6% in average precision for instance
segmentation tasks. Additionally, by using our matching mechanism in the three
popular contrastive learning frameworks, MoCo-v2, VICRegL, and ConCL, the
average precision in detection is improved by 0.7% to 5.2%, and the average
precision in segmentation is improved by 0.7% to 4.0%, demonstrating
generalizability. Our code is available at
https://github.com/cvlab-stonybrook/PLM_SSL.
| no_new_dataset | 0.948202 |
2301.01217 | Jiaming Zhang | Jiaming Zhang, Xingjun Ma, Qi Yi, Jitao Sang, Yu-Gang Jiang, Yaowei
Wang, Changsheng Xu | Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples | CVPR2023 | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a growing interest in developing unlearnable examples (UEs) against
visual privacy leaks on the Internet. UEs are training samples added with
invisible but unlearnable noise, which have been found can prevent unauthorized
training of machine learning models. UEs typically are generated via a bilevel
optimization framework with a surrogate model to remove (minimize) errors from
the original samples, and then applied to protect the data against unknown
target models. However, existing UE generation methods all rely on an ideal
assumption called label-consistency, where the hackers and protectors are
assumed to hold the same label for a given sample. In this work, we propose and
promote a more practical label-agnostic setting, where the hackers may exploit
the protected data quite differently from the protectors. E.g., a m-class
unlearnable dataset held by the protector may be exploited by the hacker as a
n-class dataset. Existing UE generation methods are rendered ineffective in
this challenging setting. To tackle this challenge, we present a novel
technique called Unlearnable Clusters (UCs) to generate label-agnostic
unlearnable examples with cluster-wise perturbations. Furthermore, we propose
to leverage VisionandLanguage Pre-trained Models (VLPMs) like CLIP as the
surrogate model to improve the transferability of the crafted UCs to diverse
domains. We empirically verify the effectiveness of our proposed approach under
a variety of settings with different datasets, target models, and even
commercial platforms Microsoft Azure and Baidu PaddlePaddle. Code is available
at \url{https://github.com/jiamingzhang94/Unlearnable-Clusters}.
| [
{
"version": "v1",
"created": "Sat, 31 Dec 2022 04:26:25 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Mar 2023 11:23:58 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Mar 2023 03:27:49 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Mar 2023 11:29:03 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zhang",
"Jiaming",
""
],
[
"Ma",
"Xingjun",
""
],
[
"Yi",
"Qi",
""
],
[
"Sang",
"Jitao",
""
],
[
"Jiang",
"Yu-Gang",
""
],
[
"Wang",
"Yaowei",
""
],
[
"Xu",
"Changsheng",
""
]
] | TITLE: Unlearnable Clusters: Towards Label-agnostic Unlearnable Examples
ABSTRACT: There is a growing interest in developing unlearnable examples (UEs) against
visual privacy leaks on the Internet. UEs are training samples added with
invisible but unlearnable noise, which have been found can prevent unauthorized
training of machine learning models. UEs typically are generated via a bilevel
optimization framework with a surrogate model to remove (minimize) errors from
the original samples, and then applied to protect the data against unknown
target models. However, existing UE generation methods all rely on an ideal
assumption called label-consistency, where the hackers and protectors are
assumed to hold the same label for a given sample. In this work, we propose and
promote a more practical label-agnostic setting, where the hackers may exploit
the protected data quite differently from the protectors. E.g., a m-class
unlearnable dataset held by the protector may be exploited by the hacker as a
n-class dataset. Existing UE generation methods are rendered ineffective in
this challenging setting. To tackle this challenge, we present a novel
technique called Unlearnable Clusters (UCs) to generate label-agnostic
unlearnable examples with cluster-wise perturbations. Furthermore, we propose
to leverage VisionandLanguage Pre-trained Models (VLPMs) like CLIP as the
surrogate model to improve the transferability of the crafted UCs to diverse
domains. We empirically verify the effectiveness of our proposed approach under
a variety of settings with different datasets, target models, and even
commercial platforms Microsoft Azure and Baidu PaddlePaddle. Code is available
at \url{https://github.com/jiamingzhang94/Unlearnable-Clusters}.
| no_new_dataset | 0.948442 |
2301.07702 | Zifan Shi | Zifan Shi, Yujun Shen, Yinghao Xu, Sida Peng, Yiyi Liao, Sheng Guo,
Qifeng Chen, Dit-Yan Yeung | Learning 3D-aware Image Synthesis with Unknown Pose Distribution | CVPR 2023. Project page: https://vivianszf.github.io/pof3d/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing methods for 3D-aware image synthesis largely depend on the 3D pose
distribution pre-estimated on the training set. An inaccurate estimation may
mislead the model into learning faulty geometry. This work proposes PoF3D that
frees generative radiance fields from the requirements of 3D pose priors. We
first equip the generator with an efficient pose learner, which is able to
infer a pose from a latent code, to approximate the underlying true pose
distribution automatically. We then assign the discriminator a task to learn
pose distribution under the supervision of the generator and to differentiate
real and synthesized images with the predicted pose as the condition. The
pose-free generator and the pose-aware discriminator are jointly trained in an
adversarial manner. Extensive results on a couple of datasets confirm that the
performance of our approach, regarding both image quality and geometry quality,
is on par with state of the art. To our best knowledge, PoF3D demonstrates the
feasibility of learning high-quality 3D-aware image synthesis without using 3D
pose priors for the first time.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2023 18:47:46 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 12:25:12 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Shi",
"Zifan",
""
],
[
"Shen",
"Yujun",
""
],
[
"Xu",
"Yinghao",
""
],
[
"Peng",
"Sida",
""
],
[
"Liao",
"Yiyi",
""
],
[
"Guo",
"Sheng",
""
],
[
"Chen",
"Qifeng",
""
],
[
"Yeung",
"Dit-Yan",
""
]
] | TITLE: Learning 3D-aware Image Synthesis with Unknown Pose Distribution
ABSTRACT: Existing methods for 3D-aware image synthesis largely depend on the 3D pose
distribution pre-estimated on the training set. An inaccurate estimation may
mislead the model into learning faulty geometry. This work proposes PoF3D that
frees generative radiance fields from the requirements of 3D pose priors. We
first equip the generator with an efficient pose learner, which is able to
infer a pose from a latent code, to approximate the underlying true pose
distribution automatically. We then assign the discriminator a task to learn
pose distribution under the supervision of the generator and to differentiate
real and synthesized images with the predicted pose as the condition. The
pose-free generator and the pose-aware discriminator are jointly trained in an
adversarial manner. Extensive results on a couple of datasets confirm that the
performance of our approach, regarding both image quality and geometry quality,
is on par with state of the art. To our best knowledge, PoF3D demonstrates the
feasibility of learning high-quality 3D-aware image synthesis without using 3D
pose priors for the first time.
| no_new_dataset | 0.946051 |
2302.01703 | Tony Han | Fuzhang Han, Han Zheng, Wenjun Huang, Rong Xiong, Yue Wang, Yanmei
Jiao | DAMS-LIO: A Degeneration-Aware and Modular Sensor-Fusion LiDAR-inertial
Odometry | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With robots being deployed in increasingly complex environments like
underground mines and planetary surfaces, the multi-sensor fusion method has
gained more and more attention which is a promising solution to state
estimation in the such scene. The fusion scheme is a central component of these
methods. In this paper, a light-weight iEKF-based LiDAR-inertial odometry
system is presented, which utilizes a degeneration-aware and modular
sensor-fusion pipeline that takes both LiDAR points and relative pose from
another odometry as the measurement in the update process only when
degeneration is detected. Both the Cramer-Rao Lower Bound (CRLB) theory and
simulation test are used to demonstrate the higher accuracy of our method
compared to methods using a single observation. Furthermore, the proposed
system is evaluated in perceptually challenging datasets against various
state-of-the-art sensor-fusion methods. The results show that the proposed
system achieves real-time and high estimation accuracy performance despite the
challenging environment and poor observations.
| [
{
"version": "v1",
"created": "Fri, 3 Feb 2023 13:01:55 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2023 14:09:06 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Mar 2023 06:02:59 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Han",
"Fuzhang",
""
],
[
"Zheng",
"Han",
""
],
[
"Huang",
"Wenjun",
""
],
[
"Xiong",
"Rong",
""
],
[
"Wang",
"Yue",
""
],
[
"Jiao",
"Yanmei",
""
]
] | TITLE: DAMS-LIO: A Degeneration-Aware and Modular Sensor-Fusion LiDAR-inertial
Odometry
ABSTRACT: With robots being deployed in increasingly complex environments like
underground mines and planetary surfaces, the multi-sensor fusion method has
gained more and more attention which is a promising solution to state
estimation in the such scene. The fusion scheme is a central component of these
methods. In this paper, a light-weight iEKF-based LiDAR-inertial odometry
system is presented, which utilizes a degeneration-aware and modular
sensor-fusion pipeline that takes both LiDAR points and relative pose from
another odometry as the measurement in the update process only when
degeneration is detected. Both the Cramer-Rao Lower Bound (CRLB) theory and
simulation test are used to demonstrate the higher accuracy of our method
compared to methods using a single observation. Furthermore, the proposed
system is evaluated in perceptually challenging datasets against various
state-of-the-art sensor-fusion methods. The results show that the proposed
system achieves real-time and high estimation accuracy performance despite the
challenging environment and poor observations.
| no_new_dataset | 0.948106 |
2302.06081 | Xu Wang | Xu Wang, Dezhong Peng, Ming Yan, Peng Hu | Correspondence-Free Domain Alignment for Unsupervised Cross-Domain Image
Retrieval | AAAI 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Cross-domain image retrieval aims at retrieving images across different
domains to excavate cross-domain classificatory or correspondence
relationships. This paper studies a less-touched problem of cross-domain image
retrieval, i.e., unsupervised cross-domain image retrieval, considering the
following practical assumptions: (i) no correspondence relationship, and (ii)
no category annotations. It is challenging to align and bridge distinct domains
without cross-domain correspondence. To tackle the challenge, we present a
novel Correspondence-free Domain Alignment (CoDA) method to effectively
eliminate the cross-domain gap through In-domain Self-matching Supervision
(ISS) and Cross-domain Classifier Alignment (CCA). To be specific, ISS is
presented to encapsulate discriminative information into the latent common
space by elaborating a novel self-matching supervision mechanism. To alleviate
the cross-domain discrepancy, CCA is proposed to align distinct domain-specific
classifiers. Thanks to the ISS and CCA, our method could encode the
discrimination into the domain-invariant embedding space for unsupervised
cross-domain image retrieval. To verify the effectiveness of the proposed
method, extensive experiments are conducted on four benchmark datasets compared
with six state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 13 Feb 2023 03:34:49 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 11:38:53 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wang",
"Xu",
""
],
[
"Peng",
"Dezhong",
""
],
[
"Yan",
"Ming",
""
],
[
"Hu",
"Peng",
""
]
] | TITLE: Correspondence-Free Domain Alignment for Unsupervised Cross-Domain Image
Retrieval
ABSTRACT: Cross-domain image retrieval aims at retrieving images across different
domains to excavate cross-domain classificatory or correspondence
relationships. This paper studies a less-touched problem of cross-domain image
retrieval, i.e., unsupervised cross-domain image retrieval, considering the
following practical assumptions: (i) no correspondence relationship, and (ii)
no category annotations. It is challenging to align and bridge distinct domains
without cross-domain correspondence. To tackle the challenge, we present a
novel Correspondence-free Domain Alignment (CoDA) method to effectively
eliminate the cross-domain gap through In-domain Self-matching Supervision
(ISS) and Cross-domain Classifier Alignment (CCA). To be specific, ISS is
presented to encapsulate discriminative information into the latent common
space by elaborating a novel self-matching supervision mechanism. To alleviate
the cross-domain discrepancy, CCA is proposed to align distinct domain-specific
classifiers. Thanks to the ISS and CCA, our method could encode the
discrimination into the domain-invariant embedding space for unsupervised
cross-domain image retrieval. To verify the effectiveness of the proposed
method, extensive experiments are conducted on four benchmark datasets compared
with six state-of-the-art methods.
| no_new_dataset | 0.950411 |
2303.00521 | Kai Zhao | Kai Zhao, Kun Yuan, Ming Sun, Mading Li and Xing Wen | Quality-aware Pre-trained Models for Blind Image Quality Assessment | Accepted by CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Blind image quality assessment (BIQA) aims to automatically evaluate the
perceived quality of a single image, whose performance has been improved by
deep learning-based methods in recent years. However, the paucity of labeled
data somewhat restrains deep learning-based BIQA methods from unleashing their
full potential. In this paper, we propose to solve the problem by a pretext
task customized for BIQA in a self-supervised learning manner, which enables
learning representations from orders of magnitude more data. To constrain the
learning process, we propose a quality-aware contrastive loss based on a simple
assumption: the quality of patches from a distorted image should be similar,
but vary from patches from the same image with different degradations and
patches from different images. Further, we improve the existing degradation
process and form a degradation space with the size of roughly $2\times10^7$.
After pre-trained on ImageNet using our method, models are more sensitive to
image quality and perform significantly better on downstream BIQA tasks.
Experimental results show that our method obtains remarkable improvements on
popular BIQA datasets.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2023 13:52:40 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 06:57:56 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zhao",
"Kai",
""
],
[
"Yuan",
"Kun",
""
],
[
"Sun",
"Ming",
""
],
[
"Li",
"Mading",
""
],
[
"Wen",
"Xing",
""
]
] | TITLE: Quality-aware Pre-trained Models for Blind Image Quality Assessment
ABSTRACT: Blind image quality assessment (BIQA) aims to automatically evaluate the
perceived quality of a single image, whose performance has been improved by
deep learning-based methods in recent years. However, the paucity of labeled
data somewhat restrains deep learning-based BIQA methods from unleashing their
full potential. In this paper, we propose to solve the problem by a pretext
task customized for BIQA in a self-supervised learning manner, which enables
learning representations from orders of magnitude more data. To constrain the
learning process, we propose a quality-aware contrastive loss based on a simple
assumption: the quality of patches from a distorted image should be similar,
but vary from patches from the same image with different degradations and
patches from different images. Further, we improve the existing degradation
process and form a degradation space with the size of roughly $2\times10^7$.
After pre-trained on ImageNet using our method, models are more sensitive to
image quality and perform significantly better on downstream BIQA tasks.
Experimental results show that our method obtains remarkable improvements on
popular BIQA datasets.
| no_new_dataset | 0.943815 |
2303.02905 | Xiao Hu | Xiao Hu, HangJie Mo, XiangSheng Chen, JinLiang Chen, and Xiangyu Chen | ONE PIECE: One Patchwork In Effectively Combined Extraction for grasp | Submitted to IROS2023 | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | For grasp network algorithms, generating grasp datasets for a large number of
3D objects is a crucial task. However, generating grasp datasets for hundreds
of objects can be very slow and consume a lot of storage resources, which
hinders algorithm iteration and promotion. For point cloud grasp network
algorithms, the network input is essentially the internal point cloud of the
grasp area that intersects with the object in the gripper coordinate system.
Due to the existence of a large number of completely consistent gripper area
point clouds based on the gripper coordinate system in the grasp dataset
generated for hundreds of objects, it is possible to remove the consistent
gripper area point clouds from many objects and assemble them into a single
object to generate the grasp dataset, thus replacing the enormous workload of
generating grasp datasets for hundreds of objects. We propose a new approach to
map the repetitive features of a large number of objects onto a finite set.To
this end, we propose a method for extracting the gripper area point cloud that
intersects with the object from the simulator and design a gripper feature
filter to remove the shape-repeated gripper space area point clouds, and then
assemble them into a single object. The experimental results show that the time
required to generate the new object grasp dataset is greatly reduced compared
to generating the grasp dataset for hundreds of objects, and it performs well
in real machine grasping experiments. We will release the data and tools after
the paper is accepted.
| [
{
"version": "v1",
"created": "Mon, 6 Mar 2023 05:45:08 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 09:38:46 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Hu",
"Xiao",
""
],
[
"Mo",
"HangJie",
""
],
[
"Chen",
"XiangSheng",
""
],
[
"Chen",
"JinLiang",
""
],
[
"Chen",
"Xiangyu",
""
]
] | TITLE: ONE PIECE: One Patchwork In Effectively Combined Extraction for grasp
ABSTRACT: For grasp network algorithms, generating grasp datasets for a large number of
3D objects is a crucial task. However, generating grasp datasets for hundreds
of objects can be very slow and consume a lot of storage resources, which
hinders algorithm iteration and promotion. For point cloud grasp network
algorithms, the network input is essentially the internal point cloud of the
grasp area that intersects with the object in the gripper coordinate system.
Due to the existence of a large number of completely consistent gripper area
point clouds based on the gripper coordinate system in the grasp dataset
generated for hundreds of objects, it is possible to remove the consistent
gripper area point clouds from many objects and assemble them into a single
object to generate the grasp dataset, thus replacing the enormous workload of
generating grasp datasets for hundreds of objects. We propose a new approach to
map the repetitive features of a large number of objects onto a finite set.To
this end, we propose a method for extracting the gripper area point cloud that
intersects with the object from the simulator and design a gripper feature
filter to remove the shape-repeated gripper space area point clouds, and then
assemble them into a single object. The experimental results show that the time
required to generate the new object grasp dataset is greatly reduced compared
to generating the grasp dataset for hundreds of objects, and it performs well
in real machine grasping experiments. We will release the data and tools after
the paper is accepted.
| no_new_dataset | 0.81604 |
2303.08358 | Chengliang Liu | Chengliang Liu, Jie Wen, Xiaoling Luo, Chao Huang, Zhihao Wu, Yong Xu | DICNet: Deep Instance-Level Contrastive Network for Double Incomplete
Multi-View Multi-Label Classification | Accepted to AAAI-2023, code is available at
https://github.com/justsmart/DICNet | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, multi-view multi-label learning has aroused extensive
research enthusiasm. However, multi-view multi-label data in the real world is
commonly incomplete due to the uncertain factors of data collection and manual
annotation, which means that not only multi-view features are often missing,
and label completeness is also difficult to be satisfied. To deal with the
double incomplete multi-view multi-label classification problem, we propose a
deep instance-level contrastive network, namely DICNet. Different from
conventional methods, our DICNet focuses on leveraging deep neural network to
exploit the high-level semantic representations of samples rather than
shallow-level features. First, we utilize the stacked autoencoders to build an
end-to-end multi-view feature extraction framework to learn the view-specific
representations of samples. Furthermore, in order to improve the consensus
representation ability, we introduce an incomplete instance-level contrastive
learning scheme to guide the encoders to better extract the consensus
information of multiple views and use a multi-view weighted fusion module to
enhance the discrimination of semantic features. Overall, our DICNet is adept
in capturing consistent discriminative representations of multi-view
multi-label data and avoiding the negative effects of missing views and missing
labels. Extensive experiments performed on five datasets validate that our
method outperforms other state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 15 Mar 2023 04:24:01 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 03:09:11 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Liu",
"Chengliang",
""
],
[
"Wen",
"Jie",
""
],
[
"Luo",
"Xiaoling",
""
],
[
"Huang",
"Chao",
""
],
[
"Wu",
"Zhihao",
""
],
[
"Xu",
"Yong",
""
]
] | TITLE: DICNet: Deep Instance-Level Contrastive Network for Double Incomplete
Multi-View Multi-Label Classification
ABSTRACT: In recent years, multi-view multi-label learning has aroused extensive
research enthusiasm. However, multi-view multi-label data in the real world is
commonly incomplete due to the uncertain factors of data collection and manual
annotation, which means that not only multi-view features are often missing,
and label completeness is also difficult to be satisfied. To deal with the
double incomplete multi-view multi-label classification problem, we propose a
deep instance-level contrastive network, namely DICNet. Different from
conventional methods, our DICNet focuses on leveraging deep neural network to
exploit the high-level semantic representations of samples rather than
shallow-level features. First, we utilize the stacked autoencoders to build an
end-to-end multi-view feature extraction framework to learn the view-specific
representations of samples. Furthermore, in order to improve the consensus
representation ability, we introduce an incomplete instance-level contrastive
learning scheme to guide the encoders to better extract the consensus
information of multiple views and use a multi-view weighted fusion module to
enhance the discrimination of semantic features. Overall, our DICNet is adept
in capturing consistent discriminative representations of multi-view
multi-label data and avoiding the negative effects of missing views and missing
labels. Extensive experiments performed on five datasets validate that our
method outperforms other state-of-the-art methods.
| no_new_dataset | 0.944485 |
2303.10848 | Haiyang Yu | Xinyan Zu, Haiyang Yu, Bin Li, Xiangyang Xue | Weakly-Supervised Text Instance Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text segmentation is a challenging vision task with many downstream
applications. Current text segmentation methods require pixel-level
annotations, which are expensive in the cost of human labor and limited in
application scenarios. In this paper, we take the first attempt to perform
weakly-supervised text instance segmentation by bridging text recognition and
text segmentation. The insight is that text recognition methods provide precise
attention position of each text instance, and the attention location can feed
to both a text adaptive refinement head (TAR) and a text segmentation head.
Specifically, the proposed TAR generates pseudo labels by performing two-stage
iterative refinement operations on the attention location to fit the accurate
boundaries of the corresponding text instance. Meanwhile, the text segmentation
head takes the rough attention location to predict segmentation masks which are
supervised by the aforementioned pseudo labels. In addition, we design a
mask-augmented contrastive learning by treating our segmentation result as an
augmented version of the input text image, thus improving the visual
representation and further enhancing the performance of both recognition and
segmentation. The experimental results demonstrate that the proposed method
significantly outperforms weakly-supervised instance segmentation methods on
ICDAR13-FST (18.95$\%$ improvement) and TextSeg (17.80$\%$ improvement)
benchmarks.
| [
{
"version": "v1",
"created": "Mon, 20 Mar 2023 03:56:47 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 07:56:07 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zu",
"Xinyan",
""
],
[
"Yu",
"Haiyang",
""
],
[
"Li",
"Bin",
""
],
[
"Xue",
"Xiangyang",
""
]
] | TITLE: Weakly-Supervised Text Instance Segmentation
ABSTRACT: Text segmentation is a challenging vision task with many downstream
applications. Current text segmentation methods require pixel-level
annotations, which are expensive in the cost of human labor and limited in
application scenarios. In this paper, we take the first attempt to perform
weakly-supervised text instance segmentation by bridging text recognition and
text segmentation. The insight is that text recognition methods provide precise
attention position of each text instance, and the attention location can feed
to both a text adaptive refinement head (TAR) and a text segmentation head.
Specifically, the proposed TAR generates pseudo labels by performing two-stage
iterative refinement operations on the attention location to fit the accurate
boundaries of the corresponding text instance. Meanwhile, the text segmentation
head takes the rough attention location to predict segmentation masks which are
supervised by the aforementioned pseudo labels. In addition, we design a
mask-augmented contrastive learning by treating our segmentation result as an
augmented version of the input text image, thus improving the visual
representation and further enhancing the performance of both recognition and
segmentation. The experimental results demonstrate that the proposed method
significantly outperforms weakly-supervised instance segmentation methods on
ICDAR13-FST (18.95$\%$ improvement) and TextSeg (17.80$\%$ improvement)
benchmarks.
| no_new_dataset | 0.949995 |
2303.12258 | Jiashu Wu | Jiashu Wu, Yang Wang, Jinpeng Wang, Hekang Wang, Taorui Lin | How does SSD Cluster Perform for Distributed File Systems: An Empirical
Study | Accepted by Concurrency and Computation: Practice and Experience | null | 10.1002/cpe.7709 | null | cs.PF cs.AR cs.DC stat.AP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | As the capacity of Solid-State Drives (SSDs) is constantly being optimised
and boosted with gradually reduced cost, the SSD cluster is now widely deployed
as part of the hybrid storage system in various scenarios such as cloud
computing and big data processing. However, despite its rapid developments, the
performance of the SSD cluster remains largely under-investigated, leaving its
sub-optimal applications in reality. To address this issue, in this paper we
conduct extensive empirical studies for a comprehensive understanding of the
SSD cluster in diverse settings. To this end, we configure a real SSD cluster
and gather the generated trace data based on some often-used benchmarks, then
adopt analytical methods to analyse the performance of the SSD cluster with
different configurations. In particular, regression models are built to provide
better performance predictability under broader configurations, and the
correlations between influential factors and performance metrics with respect
to different numbers of nodes are investigated, which reveal the high
scalability of the SSD cluster. Additionally, the cluster's network bandwidth
is inspected to explain the performance bottleneck. Finally, the knowledge
gained is summarised to benefit the SSD cluster deployment in practice.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 01:59:58 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 02:28:57 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wu",
"Jiashu",
""
],
[
"Wang",
"Yang",
""
],
[
"Wang",
"Jinpeng",
""
],
[
"Wang",
"Hekang",
""
],
[
"Lin",
"Taorui",
""
]
] | TITLE: How does SSD Cluster Perform for Distributed File Systems: An Empirical
Study
ABSTRACT: As the capacity of Solid-State Drives (SSDs) is constantly being optimised
and boosted with gradually reduced cost, the SSD cluster is now widely deployed
as part of the hybrid storage system in various scenarios such as cloud
computing and big data processing. However, despite its rapid developments, the
performance of the SSD cluster remains largely under-investigated, leaving its
sub-optimal applications in reality. To address this issue, in this paper we
conduct extensive empirical studies for a comprehensive understanding of the
SSD cluster in diverse settings. To this end, we configure a real SSD cluster
and gather the generated trace data based on some often-used benchmarks, then
adopt analytical methods to analyse the performance of the SSD cluster with
different configurations. In particular, regression models are built to provide
better performance predictability under broader configurations, and the
correlations between influential factors and performance metrics with respect
to different numbers of nodes are investigated, which reveal the high
scalability of the SSD cluster. Additionally, the cluster's network bandwidth
is inspected to explain the performance bottleneck. Finally, the knowledge
gained is summarised to benefit the SSD cluster deployment in practice.
| no_new_dataset | 0.943243 |
2303.12397 | Haibin Zheng | Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong
Zhang, Shouling Ji | Edge Deep Learning Model Protection via Neuron Authorization | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the development of deep learning processors and accelerators, deep
learning models have been widely deployed on edge devices as part of the
Internet of Things. Edge device models are generally considered as valuable
intellectual properties that are worth for careful protection. Unfortunately,
these models have a great risk of being stolen or illegally copied. The
existing model protections using encryption algorithms are suffered from high
computation overhead which is not practical due to the limited computing
capacity on edge devices. In this work, we propose a light-weight, practical,
and general Edge device model Pro tection method at neuron level, denoted as
EdgePro. Specifically, we select several neurons as authorization neurons and
set their activation values to locking values and scale the neuron outputs as
the "asswords" during training. EdgePro protects the model by ensuring it can
only work correctly when the "passwords" are met, at the cost of encrypting and
storing the information of the "passwords" instead of the whole model.
Extensive experimental results indicate that EdgePro can work well on the task
of protecting on datasets with different modes. The inference time increase of
EdgePro is only 60% of state-of-the-art methods, and the accuracy loss is less
than 1%. Additionally, EdgePro is robust against adaptive attacks including
fine-tuning and pruning, which makes it more practical in real-world
applications. EdgePro is also open sourced to facilitate future research:
https://github.com/Leon022/Edg
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 09:03:27 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 00:47:28 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Chen",
"Jinyin",
""
],
[
"Zheng",
"Haibin",
""
],
[
"Liu",
"Tao",
""
],
[
"Li",
"Rongchang",
""
],
[
"Cheng",
"Yao",
""
],
[
"Zhang",
"Xuhong",
""
],
[
"Ji",
"Shouling",
""
]
] | TITLE: Edge Deep Learning Model Protection via Neuron Authorization
ABSTRACT: With the development of deep learning processors and accelerators, deep
learning models have been widely deployed on edge devices as part of the
Internet of Things. Edge device models are generally considered as valuable
intellectual properties that are worth for careful protection. Unfortunately,
these models have a great risk of being stolen or illegally copied. The
existing model protections using encryption algorithms are suffered from high
computation overhead which is not practical due to the limited computing
capacity on edge devices. In this work, we propose a light-weight, practical,
and general Edge device model Pro tection method at neuron level, denoted as
EdgePro. Specifically, we select several neurons as authorization neurons and
set their activation values to locking values and scale the neuron outputs as
the "asswords" during training. EdgePro protects the model by ensuring it can
only work correctly when the "passwords" are met, at the cost of encrypting and
storing the information of the "passwords" instead of the whole model.
Extensive experimental results indicate that EdgePro can work well on the task
of protecting on datasets with different modes. The inference time increase of
EdgePro is only 60% of state-of-the-art methods, and the accuracy loss is less
than 1%. Additionally, EdgePro is robust against adaptive attacks including
fine-tuning and pruning, which makes it more practical in real-world
applications. EdgePro is also open sourced to facilitate future research:
https://github.com/Leon022/Edg
| no_new_dataset | 0.945851 |
2303.12796 | Tohida Rehman Ms. | Tohida Rehman, Suchandan Das, Debarshi Kumar Sanyal, Samiran
Chattopadhyay | An Analysis of Abstractive Text Summarization Using Pre-trained Models | 11 Pages, 6 Figures, 3 Tables | https://link.springer.com/chapter/10.1007/978-981-19-1657-1_21(2022) | 10.1007/978-981-19-1657-1_21 | null | cs.CL cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | People nowadays use search engines like Google, Yahoo, and Bing to find
information on the Internet. Due to explosion in data, it is helpful for users
if they are provided relevant summaries of the search results rather than just
links to webpages. Text summarization has become a vital approach to help
consumers swiftly grasp vast amounts of information.In this paper, different
pre-trained models for text summarization are evaluated on different datasets.
Specifically, we have used three different pre-trained models, namely,
google/pegasus-cnn-dailymail, T5-base, facebook/bart-large-cnn. We have
considered three different datasets, namely, CNN-dailymail, SAMSum and BillSum
to get the output from the above three models. The pre-trained models are
compared over these different datasets, each of 2000 examples, through ROUGH
and BLEU metrics.
| [
{
"version": "v1",
"created": "Sat, 25 Feb 2023 16:44:37 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Rehman",
"Tohida",
""
],
[
"Das",
"Suchandan",
""
],
[
"Sanyal",
"Debarshi Kumar",
""
],
[
"Chattopadhyay",
"Samiran",
""
]
] | TITLE: An Analysis of Abstractive Text Summarization Using Pre-trained Models
ABSTRACT: People nowadays use search engines like Google, Yahoo, and Bing to find
information on the Internet. Due to explosion in data, it is helpful for users
if they are provided relevant summaries of the search results rather than just
links to webpages. Text summarization has become a vital approach to help
consumers swiftly grasp vast amounts of information.In this paper, different
pre-trained models for text summarization are evaluated on different datasets.
Specifically, we have used three different pre-trained models, namely,
google/pegasus-cnn-dailymail, T5-base, facebook/bart-large-cnn. We have
considered three different datasets, namely, CNN-dailymail, SAMSum and BillSum
to get the output from the above three models. The pre-trained models are
compared over these different datasets, each of 2000 examples, through ROUGH
and BLEU metrics.
| no_new_dataset | 0.952838 |
2303.12800 | Jaidip Kotak | Jaidip Kotak and Yuval Elovici | IoT Device Identification Based on Network Communication Analysis Using
Deep Learning | J Ambient Intell Human Comput (2022) | null | 10.1007/s12652-022-04415-6 | null | cs.NI cs.AI cs.CR cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Attack vectors for adversaries have increased in organizations because of the
growing use of less secure IoT devices. The risk of attacks on an
organization's network has also increased due to the bring your own device
(BYOD) policy which permits employees to bring IoT devices onto the premises
and attach them to the organization's network. To tackle this threat and
protect their networks, organizations generally implement security policies in
which only white listed IoT devices are allowed on the organization's network.
To monitor compliance with such policies, it has become essential to
distinguish IoT devices permitted within an organization's network from non
white listed (unknown) IoT devices. In this research, deep learning is applied
to network communication for the automated identification of IoT devices
permitted on the network. In contrast to existing methods, the proposed
approach does not require complex feature engineering of the network
communication, because the 'communication behavior' of IoT devices is
represented as small images which are generated from the device's network
communication payload. The proposed approach is applicable for any IoT device,
regardless of the protocol used for communication. As our approach relies on
the network communication payload, it is also applicable for the IoT devices
behind a network address translation (NAT) enabled router. In this study, we
trained various classifiers on a publicly accessible dataset to identify IoT
devices in different scenarios, including the identification of known and
unknown IoT devices, achieving over 99% overall average detection accuracy.
| [
{
"version": "v1",
"created": "Thu, 2 Mar 2023 13:44:58 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Kotak",
"Jaidip",
""
],
[
"Elovici",
"Yuval",
""
]
] | TITLE: IoT Device Identification Based on Network Communication Analysis Using
Deep Learning
ABSTRACT: Attack vectors for adversaries have increased in organizations because of the
growing use of less secure IoT devices. The risk of attacks on an
organization's network has also increased due to the bring your own device
(BYOD) policy which permits employees to bring IoT devices onto the premises
and attach them to the organization's network. To tackle this threat and
protect their networks, organizations generally implement security policies in
which only white listed IoT devices are allowed on the organization's network.
To monitor compliance with such policies, it has become essential to
distinguish IoT devices permitted within an organization's network from non
white listed (unknown) IoT devices. In this research, deep learning is applied
to network communication for the automated identification of IoT devices
permitted on the network. In contrast to existing methods, the proposed
approach does not require complex feature engineering of the network
communication, because the 'communication behavior' of IoT devices is
represented as small images which are generated from the device's network
communication payload. The proposed approach is applicable for any IoT device,
regardless of the protocol used for communication. As our approach relies on
the network communication payload, it is also applicable for the IoT devices
behind a network address translation (NAT) enabled router. In this study, we
trained various classifiers on a publicly accessible dataset to identify IoT
devices in different scenarios, including the identification of known and
unknown IoT devices, achieving over 99% overall average detection accuracy.
| no_new_dataset | 0.949248 |
2303.12804 | Muhammad Danial Khilji | Muhammad Danial Khilji | Features matching using natural language processing | 10 pages, 7 figures, International Conference on NLP & AI (NLPAI
2023) | International Journal on Cybernetics & Informatics (IJCI) Vol. 12,
No.2, April 2023 | 10.5121/ijci.2023.120218 | null | cs.DB cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | The feature matching is a basic step in matching different datasets. This
article proposes shows a new hybrid model of a pretrained Natural Language
Processing (NLP) based model called BERT used in parallel with a statistical
model based on Jaccard similarity to measure the similarity between list of
features from two different datasets. This reduces the time required to search
for correlations or manually match each feature from one dataset to another.
| [
{
"version": "v1",
"created": "Tue, 14 Mar 2023 13:31:19 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Khilji",
"Muhammad Danial",
""
]
] | TITLE: Features matching using natural language processing
ABSTRACT: The feature matching is a basic step in matching different datasets. This
article proposes shows a new hybrid model of a pretrained Natural Language
Processing (NLP) based model called BERT used in parallel with a statistical
model based on Jaccard similarity to measure the similarity between list of
features from two different datasets. This reduces the time required to search
for correlations or manually match each feature from one dataset to another.
| no_new_dataset | 0.955486 |
2303.12808 | Vaibhav Garg | Vaibhav Garg, Ganning Xu, and Munindar P. Singh | PACO: Provocation Involving Action, Culture, and Oppression | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | In India, people identify with a particular group based on certain attributes
such as religion. The same religious groups are often provoked against each
other. Previous studies show the role of provocation in increasing tensions
between India's two prominent religious groups: Hindus and Muslims. With the
advent of the Internet, such provocation also surfaced on social media
platforms such as WhatsApp.
By leveraging an existing dataset of Indian WhatsApp posts, we identified
three categories of provoking sentences against Indian Muslims. Further, we
labeled 7,000 sentences for three provocation categories and called this
dataset PACO. We leveraged PACO to train a model that can identify provoking
sentences from a WhatsApp post. Our best model is fine-tuned RoBERTa and
achieved a 0.851 average AUC score over five-fold cross-validation.
Automatically identifying provoking sentences could stop provoking text from
reaching out to the masses, and can prevent possible discrimination or violence
against the target religious group.
Further, we studied the provocative speech through a pragmatic lens, by
identifying the dialog acts and impoliteness super-strategies used against the
religious group.
| [
{
"version": "v1",
"created": "Sun, 19 Mar 2023 04:39:36 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Garg",
"Vaibhav",
""
],
[
"Xu",
"Ganning",
""
],
[
"Singh",
"Munindar P.",
""
]
] | TITLE: PACO: Provocation Involving Action, Culture, and Oppression
ABSTRACT: In India, people identify with a particular group based on certain attributes
such as religion. The same religious groups are often provoked against each
other. Previous studies show the role of provocation in increasing tensions
between India's two prominent religious groups: Hindus and Muslims. With the
advent of the Internet, such provocation also surfaced on social media
platforms such as WhatsApp.
By leveraging an existing dataset of Indian WhatsApp posts, we identified
three categories of provoking sentences against Indian Muslims. Further, we
labeled 7,000 sentences for three provocation categories and called this
dataset PACO. We leveraged PACO to train a model that can identify provoking
sentences from a WhatsApp post. Our best model is fine-tuned RoBERTa and
achieved a 0.851 average AUC score over five-fold cross-validation.
Automatically identifying provoking sentences could stop provoking text from
reaching out to the masses, and can prevent possible discrimination or violence
against the target religious group.
Further, we studied the provocative speech through a pragmatic lens, by
identifying the dialog acts and impoliteness super-strategies used against the
religious group.
| new_dataset | 0.968649 |
2303.12812 | Mark Stamp | Vrinda Malhotra and Katerina Potika and Mark Stamp | A Comparison of Graph Neural Networks for Malware Classification | null | null | null | null | cs.LG cs.CR | http://creativecommons.org/licenses/by/4.0/ | Managing the threat posed by malware requires accurate detection and
classification techniques. Traditional detection strategies, such as signature
scanning, rely on manual analysis of malware to extract relevant features,
which is labor intensive and requires expert knowledge. Function call graphs
consist of a set of program functions and their inter-procedural calls,
providing a rich source of information that can be leveraged to classify
malware without the labor intensive feature extraction step of traditional
techniques. In this research, we treat malware classification as a graph
classification problem. Based on Local Degree Profile features, we train a wide
range of Graph Neural Network (GNN) architectures to generate embeddings which
we then classify. We find that our best GNN models outperform previous
comparable research involving the well-known MalNet-Tiny Android malware
dataset. In addition, our GNN models do not suffer from the overfitting issues
that commonly afflict non-GNN techniques, although GNN models require longer
training times.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 01:05:57 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Malhotra",
"Vrinda",
""
],
[
"Potika",
"Katerina",
""
],
[
"Stamp",
"Mark",
""
]
] | TITLE: A Comparison of Graph Neural Networks for Malware Classification
ABSTRACT: Managing the threat posed by malware requires accurate detection and
classification techniques. Traditional detection strategies, such as signature
scanning, rely on manual analysis of malware to extract relevant features,
which is labor intensive and requires expert knowledge. Function call graphs
consist of a set of program functions and their inter-procedural calls,
providing a rich source of information that can be leveraged to classify
malware without the labor intensive feature extraction step of traditional
techniques. In this research, we treat malware classification as a graph
classification problem. Based on Local Degree Profile features, we train a wide
range of Graph Neural Network (GNN) architectures to generate embeddings which
we then classify. We find that our best GNN models outperform previous
comparable research involving the well-known MalNet-Tiny Android malware
dataset. In addition, our GNN models do not suffer from the overfitting issues
that commonly afflict non-GNN techniques, although GNN models require longer
training times.
| no_new_dataset | 0.945651 |
2303.12818 | Mark Stamp | Yashna Peerthum and Mark Stamp | An Empirical Analysis of the Shift and Scale Parameters in BatchNorm | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Batch Normalization (BatchNorm) is a technique that improves the training of
deep neural networks, especially Convolutional Neural Networks (CNN). It has
been empirically demonstrated that BatchNorm increases performance, stability,
and accuracy, although the reasons for such improvements are unclear. BatchNorm
includes a normalization step as well as trainable shift and scale parameters.
In this paper, we empirically examine the relative contribution to the success
of BatchNorm of the normalization step, as compared to the re-parameterization
via shifting and scaling. To conduct our experiments, we implement two new
optimizers in PyTorch, namely, a version of BatchNorm that we refer to as
AffineLayer, which includes the re-parameterization step without normalization,
and a version with just the normalization step, that we call BatchNorm-minus.
We compare the performance of our AffineLayer and BatchNorm-minus
implementations to standard BatchNorm, and we also compare these to the case
where no batch normalization is used. We experiment with four ResNet
architectures (ResNet18, ResNet34, ResNet50, and ResNet101) over a standard
image dataset and multiple batch sizes. Among other findings, we provide
empirical evidence that the success of BatchNorm may derive primarily from
improved weight initialization.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 12:41:12 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Peerthum",
"Yashna",
""
],
[
"Stamp",
"Mark",
""
]
] | TITLE: An Empirical Analysis of the Shift and Scale Parameters in BatchNorm
ABSTRACT: Batch Normalization (BatchNorm) is a technique that improves the training of
deep neural networks, especially Convolutional Neural Networks (CNN). It has
been empirically demonstrated that BatchNorm increases performance, stability,
and accuracy, although the reasons for such improvements are unclear. BatchNorm
includes a normalization step as well as trainable shift and scale parameters.
In this paper, we empirically examine the relative contribution to the success
of BatchNorm of the normalization step, as compared to the re-parameterization
via shifting and scaling. To conduct our experiments, we implement two new
optimizers in PyTorch, namely, a version of BatchNorm that we refer to as
AffineLayer, which includes the re-parameterization step without normalization,
and a version with just the normalization step, that we call BatchNorm-minus.
We compare the performance of our AffineLayer and BatchNorm-minus
implementations to standard BatchNorm, and we also compare these to the case
where no batch normalization is used. We experiment with four ResNet
architectures (ResNet18, ResNet34, ResNet50, and ResNet101) over a standard
image dataset and multiple batch sizes. Among other findings, we provide
empirical evidence that the success of BatchNorm may derive primarily from
improved weight initialization.
| no_new_dataset | 0.949248 |
2303.12862 | Mehmet Kerim Yucel | Konstantinos Georgiadis, M. Kerim Yucel, Evangelos Skartados, Valia
Dimaridou, Anastasios Drosou, Albert Saa-Garriga, Bruno Manganelli | LP-IOANet: Efficient High Resolution Document Shadow Removal | ICASSP 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Document shadow removal is an integral task in document enhancement
pipelines, as it improves visibility, readability and thus the overall quality.
Assuming that the majority of practical document shadow removal scenarios
require real-time, accurate models that can produce high-resolution outputs
in-the-wild, we propose Laplacian Pyramid with Input/Output Attention Network
(LP-IOANet), a novel pipeline with a lightweight architecture and an upsampling
module. Furthermore, we propose three new datasets which cover a wide range of
lighting conditions, images, shadow shapes and viewpoints. Our results show
that we outperform the state-of-the-art by a 35% relative improvement in mean
average error (MAE), while running real-time in four times the resolution (of
the state-of-the-art method) on a mobile device.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 18:56:45 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Georgiadis",
"Konstantinos",
""
],
[
"Yucel",
"M. Kerim",
""
],
[
"Skartados",
"Evangelos",
""
],
[
"Dimaridou",
"Valia",
""
],
[
"Drosou",
"Anastasios",
""
],
[
"Saa-Garriga",
"Albert",
""
],
[
"Manganelli",
"Bruno",
""
]
] | TITLE: LP-IOANet: Efficient High Resolution Document Shadow Removal
ABSTRACT: Document shadow removal is an integral task in document enhancement
pipelines, as it improves visibility, readability and thus the overall quality.
Assuming that the majority of practical document shadow removal scenarios
require real-time, accurate models that can produce high-resolution outputs
in-the-wild, we propose Laplacian Pyramid with Input/Output Attention Network
(LP-IOANet), a novel pipeline with a lightweight architecture and an upsampling
module. Furthermore, we propose three new datasets which cover a wide range of
lighting conditions, images, shadow shapes and viewpoints. Our results show
that we outperform the state-of-the-art by a 35% relative improvement in mean
average error (MAE), while running real-time in four times the resolution (of
the state-of-the-art method) on a mobile device.
| new_dataset | 0.958693 |
2303.12869 | Jessica Nayeli Lopez Espejel | Jessica L\'opez Espejel, Mahaman Sanoussi Yahaya Alassan, Walid
Dahhane, El Hassane Ettifouri | JaCoText: A Pretrained Model for Java Code-Text Generation | International Conference on Code Generation and Implementation
Volume: 17 | Espejel, J. L., Alassan, M. S. Y., Dahhane, W., & Ettifouri, E. H.
(2023). JaCoText: A Pretrained Model for Java Code-Text Generation.
International Journal of Computer and Systems Engineering, 17(2), 100-105 | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Pretrained transformer-based models have shown high performance in natural
language generation task. However, a new wave of interest has surged: automatic
programming language generation. This task consists of translating natural
language instructions to a programming code. Despite the fact that well-known
pretrained models on language generation have achieved good performance in
learning programming languages, effort is still needed in automatic code
generation. In this paper, we introduce JaCoText, a model based on Transformers
neural network. It aims to generate java source code from natural language
text. JaCoText leverages advantages of both natural language and code
generation models. More specifically, we study some findings from the state of
the art and use them to (1) initialize our model from powerful pretrained
models, (2) explore additional pretraining on our java dataset, (3) carry out
experiments combining the unimodal and bimodal data in the training, and (4)
scale the input and output length during the fine-tuning of the model.
Conducted experiments on CONCODE dataset show that JaCoText achieves new
state-of-the-art results.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 19:01:25 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Espejel",
"Jessica López",
""
],
[
"Alassan",
"Mahaman Sanoussi Yahaya",
""
],
[
"Dahhane",
"Walid",
""
],
[
"Ettifouri",
"El Hassane",
""
]
] | TITLE: JaCoText: A Pretrained Model for Java Code-Text Generation
ABSTRACT: Pretrained transformer-based models have shown high performance in natural
language generation task. However, a new wave of interest has surged: automatic
programming language generation. This task consists of translating natural
language instructions to a programming code. Despite the fact that well-known
pretrained models on language generation have achieved good performance in
learning programming languages, effort is still needed in automatic code
generation. In this paper, we introduce JaCoText, a model based on Transformers
neural network. It aims to generate java source code from natural language
text. JaCoText leverages advantages of both natural language and code
generation models. More specifically, we study some findings from the state of
the art and use them to (1) initialize our model from powerful pretrained
models, (2) explore additional pretraining on our java dataset, (3) carry out
experiments combining the unimodal and bimodal data in the training, and (4)
scale the input and output length during the fine-tuning of the model.
Conducted experiments on CONCODE dataset show that JaCoText achieves new
state-of-the-art results.
| no_new_dataset | 0.945901 |
2303.12872 | Katherine Collins | Katherine M. Collins, Matthew Barker, Mateo Espinosa Zarlenga, Naveen
Raman, Umang Bhatt, Mateja Jamnik, Ilia Sucholutsky, Adrian Weller,
Krishnamurthy Dvijotham | Human Uncertainty in Concept-Based AI Systems | null | null | null | null | cs.HC cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Placing a human in the loop may abate the risks of deploying AI systems in
safety-critical settings (e.g., a clinician working with a medical AI system).
However, mitigating risks arising from human error and uncertainty within such
human-AI interactions is an important and understudied issue. In this work, we
study human uncertainty in the context of concept-based models, a family of AI
systems that enable human feedback via concept interventions where an expert
intervenes on human-interpretable concepts relevant to the task. Prior work in
this space often assumes that humans are oracles who are always certain and
correct. Yet, real-world decision-making by humans is prone to occasional
mistakes and uncertainty. We study how existing concept-based models deal with
uncertain interventions from humans using two novel datasets: UMNIST, a visual
dataset with controlled simulated uncertainty based on the MNIST dataset, and
CUB-S, a relabeling of the popular CUB concept dataset with rich,
densely-annotated soft labels from humans. We show that training with uncertain
concept labels may help mitigate weaknesses of concept-based systems when
handling uncertain interventions. These results allow us to identify several
open challenges, which we argue can be tackled through future multidisciplinary
research on building interactive uncertainty-aware systems. To facilitate
further research, we release a new elicitation platform, UElic, to collect
uncertain feedback from humans in collaborative prediction tasks.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 19:17:57 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Collins",
"Katherine M.",
""
],
[
"Barker",
"Matthew",
""
],
[
"Zarlenga",
"Mateo Espinosa",
""
],
[
"Raman",
"Naveen",
""
],
[
"Bhatt",
"Umang",
""
],
[
"Jamnik",
"Mateja",
""
],
[
"Sucholutsky",
"Ilia",
""
],
[
"Weller",
"Adrian",
""
],
[
"Dvijotham",
"Krishnamurthy",
""
]
] | TITLE: Human Uncertainty in Concept-Based AI Systems
ABSTRACT: Placing a human in the loop may abate the risks of deploying AI systems in
safety-critical settings (e.g., a clinician working with a medical AI system).
However, mitigating risks arising from human error and uncertainty within such
human-AI interactions is an important and understudied issue. In this work, we
study human uncertainty in the context of concept-based models, a family of AI
systems that enable human feedback via concept interventions where an expert
intervenes on human-interpretable concepts relevant to the task. Prior work in
this space often assumes that humans are oracles who are always certain and
correct. Yet, real-world decision-making by humans is prone to occasional
mistakes and uncertainty. We study how existing concept-based models deal with
uncertain interventions from humans using two novel datasets: UMNIST, a visual
dataset with controlled simulated uncertainty based on the MNIST dataset, and
CUB-S, a relabeling of the popular CUB concept dataset with rich,
densely-annotated soft labels from humans. We show that training with uncertain
concept labels may help mitigate weaknesses of concept-based systems when
handling uncertain interventions. These results allow us to identify several
open challenges, which we argue can be tackled through future multidisciplinary
research on building interactive uncertainty-aware systems. To facilitate
further research, we release a new elicitation platform, UElic, to collect
uncertain feedback from humans in collaborative prediction tasks.
| new_dataset | 0.981058 |
2303.12883 | Peng Hu | Atefeh H. Arani, Peng Hu, Yeying Zhu | HAPS-UAV-Enabled Heterogeneous Networks: A Deep Reinforcement Learning
Approach | null | null | null | null | eess.SY cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The integrated use of non-terrestrial network (NTN) entities such as the
high-altitude platform station (HAPS) and low-altitude platform station (LAPS)
has become essential elements in the space-air-ground integrated networks
(SAGINs). However, the complexity, mobility, and heterogeneity of NTN entities
and resources present various challenges from system design to deployment. This
paper proposes a novel approach to designing a heterogeneous network consisting
of HAPSs and unmanned aerial vehicles (UAVs) being LAPS entities. Our approach
involves jointly optimizing the three-dimensional trajectory and channel
allocation for aerial base stations, with a focus on ensuring fairness and the
provision of quality of service (QoS) to ground users. Furthermore, we consider
the load on base stations and incorporate this information into the
optimization problem. The proposed approach utilizes a combination of deep
reinforcement learning and fixed-point iteration techniques to determine the
UAV locations and channel allocation strategies. Simulation results reveal that
our proposed deep learning-based approach significantly outperforms
learning-based and conventional benchmark models.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 19:50:22 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Arani",
"Atefeh H.",
""
],
[
"Hu",
"Peng",
""
],
[
"Zhu",
"Yeying",
""
]
] | TITLE: HAPS-UAV-Enabled Heterogeneous Networks: A Deep Reinforcement Learning
Approach
ABSTRACT: The integrated use of non-terrestrial network (NTN) entities such as the
high-altitude platform station (HAPS) and low-altitude platform station (LAPS)
has become essential elements in the space-air-ground integrated networks
(SAGINs). However, the complexity, mobility, and heterogeneity of NTN entities
and resources present various challenges from system design to deployment. This
paper proposes a novel approach to designing a heterogeneous network consisting
of HAPSs and unmanned aerial vehicles (UAVs) being LAPS entities. Our approach
involves jointly optimizing the three-dimensional trajectory and channel
allocation for aerial base stations, with a focus on ensuring fairness and the
provision of quality of service (QoS) to ground users. Furthermore, we consider
the load on base stations and incorporate this information into the
optimization problem. The proposed approach utilizes a combination of deep
reinforcement learning and fixed-point iteration techniques to determine the
UAV locations and channel allocation strategies. Simulation results reveal that
our proposed deep learning-based approach significantly outperforms
learning-based and conventional benchmark models.
| no_new_dataset | 0.945751 |
2303.12889 | Zijin Wang | Ou Zheng, Mohamed Abdel-Aty, Zijin Wang, Shengxuan Ding, Dongdong
Wang, Yuxuan Huang | AVOID: Autonomous Vehicle Operation Incident Dataset Across the Globe | null | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crash data of autonomous vehicles (AV) or vehicles equipped with advanced
driver assistance systems (ADAS) are the key information to understand the
crash nature and to enhance the automation systems. However, most of the
existing crash data sources are either limited by the sample size or suffer
from missing or unverified data. To contribute to the AV safety research
community, we introduce AVOID: an open AV crash dataset. Three types of
vehicles are considered: Advanced Driving System (ADS) vehicles, Advanced
Driver Assistance Systems (ADAS) vehicles, and low-speed autonomous shuttles.
The crash data are collected from the National Highway Traffic Safety
Administration (NHTSA), California Department of Motor Vehicles (CA DMV) and
incident news worldwide, and the data are manually verified and summarized in
ready-to-use format. In addition, land use, weather, and geometry information
are also provided. The dataset is expected to accelerate the research on AV
crash analysis and potential risk identification by providing the research
community with data of rich samples, diverse data sources, clear data
structure, and high data quality.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 20:05:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zheng",
"Ou",
""
],
[
"Abdel-Aty",
"Mohamed",
""
],
[
"Wang",
"Zijin",
""
],
[
"Ding",
"Shengxuan",
""
],
[
"Wang",
"Dongdong",
""
],
[
"Huang",
"Yuxuan",
""
]
] | TITLE: AVOID: Autonomous Vehicle Operation Incident Dataset Across the Globe
ABSTRACT: Crash data of autonomous vehicles (AV) or vehicles equipped with advanced
driver assistance systems (ADAS) are the key information to understand the
crash nature and to enhance the automation systems. However, most of the
existing crash data sources are either limited by the sample size or suffer
from missing or unverified data. To contribute to the AV safety research
community, we introduce AVOID: an open AV crash dataset. Three types of
vehicles are considered: Advanced Driving System (ADS) vehicles, Advanced
Driver Assistance Systems (ADAS) vehicles, and low-speed autonomous shuttles.
The crash data are collected from the National Highway Traffic Safety
Administration (NHTSA), California Department of Motor Vehicles (CA DMV) and
incident news worldwide, and the data are manually verified and summarized in
ready-to-use format. In addition, land use, weather, and geometry information
are also provided. The dataset is expected to accelerate the research on AV
crash analysis and potential risk identification by providing the research
community with data of rich samples, diverse data sources, clear data
structure, and high data quality.
| new_dataset | 0.962143 |
2303.12890 | Djemel Ziou | Aicha Baya Goumeidane, Djemel Ziou, and Nafaa Nacereddine | Scale space radon transform-based inertia axis and object central
symmetry estimation | This work has not been published | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Inertia Axes are involved in many techniques for image content measurement
when involving information obtained from lines, angles, centroids... etc. We
investigate, here, the estimation of the main axis of inertia of an object in
the image. We identify the coincidence conditions of the Scale Space Radon
Transform (SSRT) maximum and the inertia main axis. We show, that by choosing
the appropriate scale parameter, it is possible to match the SSRT maximum and
the main axis of inertia location and orientation of the embedded object in the
image. Furthermore, an example of use case is presented where binary objects
central symmetry computation is derived by means of SSRT projections and the
axis of inertia orientation. To this end, some SSRT characteristics have been
highlighted and exploited. The experimentations show the SSRT-based main axis
of inertia computation effectiveness. Concerning the central symmetry, results
are very satisfying as experimentations carried out on randomly created images
dataset and existing datasets have permitted to divide successfully these
images bases into centrally symmetric and non-centrally symmetric objects.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 20:07:27 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Goumeidane",
"Aicha Baya",
""
],
[
"Ziou",
"Djemel",
""
],
[
"Nacereddine",
"Nafaa",
""
]
] | TITLE: Scale space radon transform-based inertia axis and object central
symmetry estimation
ABSTRACT: Inertia Axes are involved in many techniques for image content measurement
when involving information obtained from lines, angles, centroids... etc. We
investigate, here, the estimation of the main axis of inertia of an object in
the image. We identify the coincidence conditions of the Scale Space Radon
Transform (SSRT) maximum and the inertia main axis. We show, that by choosing
the appropriate scale parameter, it is possible to match the SSRT maximum and
the main axis of inertia location and orientation of the embedded object in the
image. Furthermore, an example of use case is presented where binary objects
central symmetry computation is derived by means of SSRT projections and the
axis of inertia orientation. To this end, some SSRT characteristics have been
highlighted and exploited. The experimentations show the SSRT-based main axis
of inertia computation effectiveness. Concerning the central symmetry, results
are very satisfying as experimentations carried out on randomly created images
dataset and existing datasets have permitted to divide successfully these
images bases into centrally symmetric and non-centrally symmetric objects.
| no_new_dataset | 0.95635 |
2303.12898 | Anthony Rios | Richard Tarbell, Kim-Kwang Raymond Choo, Glenn Dietrich and Anthony
Rios | Towards Understanding the Generalization of Medical Text-to-SQL Models
and Datasets | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Electronic medical records (EMRs) are stored in relational databases. It can
be challenging to access the required information if the user is unfamiliar
with the database schema or general database fundamentals. Hence, researchers
have explored text-to-SQL generation methods that provide healthcare
professionals direct access to EMR data without needing a database expert.
However, currently available datasets have been essentially "solved" with
state-of-the-art models achieving accuracy greater than or near 90%. In this
paper, we show that there is still a long way to go before solving text-to-SQL
generation in the medical domain. To show this, we create new splits of the
existing medical text-to-SQL dataset MIMICSQL that better measure the
generalizability of the resulting models. We evaluate state-of-the-art language
models on our new split showing substantial drops in performance with accuracy
dropping from up to 92% to 28%, thus showing substantial room for improvement.
Moreover, we introduce a novel data augmentation approach to improve the
generalizability of the language models. Overall, this paper is the first step
towards developing more robust text-to-SQL models in the medical
domain.\footnote{The dataset and code will be released upon acceptance.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 20:26:30 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Tarbell",
"Richard",
""
],
[
"Choo",
"Kim-Kwang Raymond",
""
],
[
"Dietrich",
"Glenn",
""
],
[
"Rios",
"Anthony",
""
]
] | TITLE: Towards Understanding the Generalization of Medical Text-to-SQL Models
and Datasets
ABSTRACT: Electronic medical records (EMRs) are stored in relational databases. It can
be challenging to access the required information if the user is unfamiliar
with the database schema or general database fundamentals. Hence, researchers
have explored text-to-SQL generation methods that provide healthcare
professionals direct access to EMR data without needing a database expert.
However, currently available datasets have been essentially "solved" with
state-of-the-art models achieving accuracy greater than or near 90%. In this
paper, we show that there is still a long way to go before solving text-to-SQL
generation in the medical domain. To show this, we create new splits of the
existing medical text-to-SQL dataset MIMICSQL that better measure the
generalizability of the resulting models. We evaluate state-of-the-art language
models on our new split showing substantial drops in performance with accuracy
dropping from up to 92% to 28%, thus showing substantial room for improvement.
Moreover, we introduce a novel data augmentation approach to improve the
generalizability of the language models. Overall, this paper is the first step
towards developing more robust text-to-SQL models in the medical
domain.\footnote{The dataset and code will be released upon acceptance.
| new_dataset | 0.971859 |
2303.12946 | Jinchao Zhu | Feng Dong, Jinchao Zhu | Underwater Camouflage Object Detection Dataset | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have made a dataset of camouflage object detection mainly for complex
seabed scenes, and named it UnderWater RGB&Sonar,or UW-RS for short. The UW-RS
dataset contains a total of 1972 image data. The dataset mainly consists of two
parts, namely underwater optical data part (UW-R dataset) and underwater sonar
data part (UW-S dataset).
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2023 22:36:54 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Dong",
"Feng",
""
],
[
"Zhu",
"Jinchao",
""
]
] | TITLE: Underwater Camouflage Object Detection Dataset
ABSTRACT: We have made a dataset of camouflage object detection mainly for complex
seabed scenes, and named it UnderWater RGB&Sonar,or UW-RS for short. The UW-RS
dataset contains a total of 1972 image data. The dataset mainly consists of two
parts, namely underwater optical data part (UW-R dataset) and underwater sonar
data part (UW-S dataset).
| new_dataset | 0.958343 |
2303.12947 | Hamed Farkhari | Joseanne Viana, Hamed Farkhari, Pedro Sebastiao, Luis Miguel Campos,
Katerina Koutlia, Biljana Bojovic, Sandra Lagen, Rui Dinis | Deep Attention Recognition for Attack Identification in 5G UAV
scenarios: Novel Architecture and End-to-End Evaluation | 17 pages, 11 figures | null | null | null | cs.CR cs.LG cs.RO | http://creativecommons.org/licenses/by/4.0/ | Despite the robust security features inherent in the 5G framework, attackers
will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations
and decrease UAV control communication performance in Air-to-Ground (A2G)
links. Operating under the assumption that the 5G UAV communications
infrastructure will never be entirely secure, we propose Deep Attention
Recognition (DAtR) as a solution to identify attacks based on a small deep
network embedded in authenticated UAVs. Our proposed solution uses two
observable parameters: the Signal-to-Interference-plus-Noise Ratio (SINR) and
the Reference Signal Received Power (RSSI) to recognize attacks under
Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination
of the two conditions. In the tested scenarios, a number of attackers are
located in random positions, while their power is varied in each simulation.
Moreover, terrestrial users are included in the network to impose additional
complexity on attack detection. To improve the systems overall performance in
the attack scenarios, we propose complementing the deep network decision with
two mechanisms based on data manipulation and majority voting techniques. We
compare several performance parameters in our proposed Deep Network. For
example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in
terms of their overall accuracy, the window size effect, and test the accuracy
when only partial data is available in the training process. Finally, we
benchmark our deep network with six widely used classifiers regarding
classification accuracy. Our algorithms accuracy exceeds 4% compared with the
eXtreme Gradient Boosting (XGB) classifier in LoS condition and around 3% in
the short distance NLoS condition. Considering the proposed deep network, all
other classifiers present lower accuracy than XGB.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2023 17:10:35 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Viana",
"Joseanne",
""
],
[
"Farkhari",
"Hamed",
""
],
[
"Sebastiao",
"Pedro",
""
],
[
"Campos",
"Luis Miguel",
""
],
[
"Koutlia",
"Katerina",
""
],
[
"Bojovic",
"Biljana",
""
],
[
"Lagen",
"Sandra",
""
],
[
"Dinis",
"Rui",
""
]
] | TITLE: Deep Attention Recognition for Attack Identification in 5G UAV
scenarios: Novel Architecture and End-to-End Evaluation
ABSTRACT: Despite the robust security features inherent in the 5G framework, attackers
will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations
and decrease UAV control communication performance in Air-to-Ground (A2G)
links. Operating under the assumption that the 5G UAV communications
infrastructure will never be entirely secure, we propose Deep Attention
Recognition (DAtR) as a solution to identify attacks based on a small deep
network embedded in authenticated UAVs. Our proposed solution uses two
observable parameters: the Signal-to-Interference-plus-Noise Ratio (SINR) and
the Reference Signal Received Power (RSSI) to recognize attacks under
Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination
of the two conditions. In the tested scenarios, a number of attackers are
located in random positions, while their power is varied in each simulation.
Moreover, terrestrial users are included in the network to impose additional
complexity on attack detection. To improve the systems overall performance in
the attack scenarios, we propose complementing the deep network decision with
two mechanisms based on data manipulation and majority voting techniques. We
compare several performance parameters in our proposed Deep Network. For
example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in
terms of their overall accuracy, the window size effect, and test the accuracy
when only partial data is available in the training process. Finally, we
benchmark our deep network with six widely used classifiers regarding
classification accuracy. Our algorithms accuracy exceeds 4% compared with the
eXtreme Gradient Boosting (XGB) classifier in LoS condition and around 3% in
the short distance NLoS condition. Considering the proposed deep network, all
other classifiers present lower accuracy than XGB.
| no_new_dataset | 0.946794 |
2303.12952 | Tie Luo | Shyam Sundar Saravanan, Tie Luo, and Mao Van Ngo | TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional
Cycle-Consistent Generative Adversarial Networks | To appear in the Proceedings of PAKDD 2023 (27th Pacific-Asia
Conference on Knowledge Discovery and Data Mining) | null | null | null | cs.LG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anomaly detection is widely used in network intrusion detection, autonomous
driving, medical diagnosis, credit card frauds, etc. However, several key
challenges remain open, such as lack of ground truth labels, presence of
complex temporal patterns, and generalizing over different datasets. This paper
proposes TSI-GAN, an unsupervised anomaly detection model for time-series that
can learn complex temporal patterns automatically and generalize well, i.e., no
need for choosing dataset-specific parameters, making statistical assumptions
about underlying data, or changing model architectures. To achieve these goals,
we convert each input time-series into a sequence of 2D images using two
encoding techniques with the intent of capturing temporal patterns and various
types of deviance. Moreover, we design a reconstructive GAN that uses
convolutional layers in an encoder-decoder network and employs
cycle-consistency loss during training to ensure that inverse mappings are
accurate as well. In addition, we also instrument a Hodrick-Prescott filter in
post-processing to mitigate false positives. We evaluate TSI-GAN using 250
well-curated and harder-than-usual datasets and compare with 8 state-of-the-art
baseline methods. The results demonstrate the superiority of TSI-GAN to all the
baselines, offering an overall performance improvement of 13% and 31% over the
second-best performer MERLIN and the third-best performer LSTM-AE,
respectively.
| [
{
"version": "v1",
"created": "Wed, 22 Mar 2023 23:24:47 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Saravanan",
"Shyam Sundar",
""
],
[
"Luo",
"Tie",
""
],
[
"Van Ngo",
"Mao",
""
]
] | TITLE: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional
Cycle-Consistent Generative Adversarial Networks
ABSTRACT: Anomaly detection is widely used in network intrusion detection, autonomous
driving, medical diagnosis, credit card frauds, etc. However, several key
challenges remain open, such as lack of ground truth labels, presence of
complex temporal patterns, and generalizing over different datasets. This paper
proposes TSI-GAN, an unsupervised anomaly detection model for time-series that
can learn complex temporal patterns automatically and generalize well, i.e., no
need for choosing dataset-specific parameters, making statistical assumptions
about underlying data, or changing model architectures. To achieve these goals,
we convert each input time-series into a sequence of 2D images using two
encoding techniques with the intent of capturing temporal patterns and various
types of deviance. Moreover, we design a reconstructive GAN that uses
convolutional layers in an encoder-decoder network and employs
cycle-consistency loss during training to ensure that inverse mappings are
accurate as well. In addition, we also instrument a Hodrick-Prescott filter in
post-processing to mitigate false positives. We evaluate TSI-GAN using 250
well-curated and harder-than-usual datasets and compare with 8 state-of-the-art
baseline methods. The results demonstrate the superiority of TSI-GAN to all the
baselines, offering an overall performance improvement of 13% and 31% over the
second-best performer MERLIN and the third-best performer LSTM-AE,
respectively.
| no_new_dataset | 0.94801 |
2303.12971 | Jian-Xun Wang | Xiantao Fan, Jian-Xun Wang | Differentiable hybrid neural modeling for fluid-structure interaction | 42 Pages, 14 figures | null | null | null | physics.comp-ph cs.CE | http://creativecommons.org/licenses/by/4.0/ | Solving complex fluid-structure interaction (FSI) problems, which are
described by nonlinear partial differential equations, is crucial in various
scientific and engineering applications. Traditional computational fluid
dynamics based solvers are inadequate to handle the increasing demand for
large-scale and long-period simulations. The ever-increasing availability of
data and rapid advancement in deep learning (DL) have opened new avenues to
tackle these challenges through data-enabled modeling. The seamless integration
of DL and classic numerical techniques through the differentiable programming
framework can significantly improve data-driven modeling performance. In this
study, we propose a differentiable hybrid neural modeling framework for
efficient simulation of FSI problems, where the numerically discretized FSI
physics based on the immersed boundary method is seamlessly integrated with
sequential neural networks using differentiable programming. All modules are
programmed in JAX, where automatic differentiation enables gradient
back-propagation over the entire model rollout trajectory, allowing the hybrid
neural FSI model to be trained as a whole in an end-to-end,
sequence-to-sequence manner. Through several FSI benchmark cases, we
demonstrate the merit and capability of the proposed method in modeling FSI
dynamics for both rigid and flexible bodies. The proposed model has also
demonstrated its superiority over baseline purely data-driven neural models,
weakly-coupled hybrid neural models, and purely numerical FSI solvers in terms
of accuracy, robustness, and generalizability.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 00:30:51 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Fan",
"Xiantao",
""
],
[
"Wang",
"Jian-Xun",
""
]
] | TITLE: Differentiable hybrid neural modeling for fluid-structure interaction
ABSTRACT: Solving complex fluid-structure interaction (FSI) problems, which are
described by nonlinear partial differential equations, is crucial in various
scientific and engineering applications. Traditional computational fluid
dynamics based solvers are inadequate to handle the increasing demand for
large-scale and long-period simulations. The ever-increasing availability of
data and rapid advancement in deep learning (DL) have opened new avenues to
tackle these challenges through data-enabled modeling. The seamless integration
of DL and classic numerical techniques through the differentiable programming
framework can significantly improve data-driven modeling performance. In this
study, we propose a differentiable hybrid neural modeling framework for
efficient simulation of FSI problems, where the numerically discretized FSI
physics based on the immersed boundary method is seamlessly integrated with
sequential neural networks using differentiable programming. All modules are
programmed in JAX, where automatic differentiation enables gradient
back-propagation over the entire model rollout trajectory, allowing the hybrid
neural FSI model to be trained as a whole in an end-to-end,
sequence-to-sequence manner. Through several FSI benchmark cases, we
demonstrate the merit and capability of the proposed method in modeling FSI
dynamics for both rigid and flexible bodies. The proposed model has also
demonstrated its superiority over baseline purely data-driven neural models,
weakly-coupled hybrid neural models, and purely numerical FSI solvers in terms
of accuracy, robustness, and generalizability.
| no_new_dataset | 0.946349 |
2303.12974 | Prabin Sharma | Salik Ram Khanal, Prabin Sharma, Hugo Fernandes, Jo\~ao Barroso,
V\'itor Manuel de Jesus Filipe | Performance Analysis and Evaluation of Cloud Vision Emotion APIs | 10 pages, 6 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Facial expression is a way of communication that can be used to interact with
computers or other electronic devices and the recognition of emotion from faces
is an emerging practice with application in many fields. There are many
cloud-based vision application programming interfaces available that recognize
emotion from facial images and video. In this article, the performances of two
well-known APIs were compared using a public dataset of 980 images of facial
emotions. For these experiments, a client program was developed which iterates
over the image set, calls the cloud services, and caches the results of the
emotion detection for each image. The performance was evaluated in each class
of emotions using prediction accuracy. It has been found that the prediction
accuracy for each emotion varies according to the cloud service being used.
Similarly, each service provider presents a strong variation of performance
according to the class being analyzed, as can be seen with more detail in this
artilects.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 00:47:43 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Khanal",
"Salik Ram",
""
],
[
"Sharma",
"Prabin",
""
],
[
"Fernandes",
"Hugo",
""
],
[
"Barroso",
"João",
""
],
[
"Filipe",
"Vítor Manuel de Jesus",
""
]
] | TITLE: Performance Analysis and Evaluation of Cloud Vision Emotion APIs
ABSTRACT: Facial expression is a way of communication that can be used to interact with
computers or other electronic devices and the recognition of emotion from faces
is an emerging practice with application in many fields. There are many
cloud-based vision application programming interfaces available that recognize
emotion from facial images and video. In this article, the performances of two
well-known APIs were compared using a public dataset of 980 images of facial
emotions. For these experiments, a client program was developed which iterates
over the image set, calls the cloud services, and caches the results of the
emotion detection for each image. The performance was evaluated in each class
of emotions using prediction accuracy. It has been found that the prediction
accuracy for each emotion varies according to the cloud service being used.
Similarly, each service provider presents a strong variation of performance
according to the class being analyzed, as can be seen with more detail in this
artilects.
| no_new_dataset | 0.94366 |
2303.12993 | Kuofeng Gao | Kuofeng Gao, Yang Bai, Jindong Gu, Yong Yang, Shu-Tao Xia | Backdoor Defense via Adaptively Splitting Poisoned Dataset | Accepted by CVPR 2023 | null | null | null | cs.CV cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Backdoor defenses have been studied to alleviate the threat of deep neural
networks (DNNs) being backdoor attacked and thus maliciously altered. Since
DNNs usually adopt some external training data from an untrusted third party, a
robust backdoor defense strategy during the training stage is of importance. We
argue that the core of training-time defense is to select poisoned samples and
to handle them properly. In this work, we summarize the training-time defenses
from a unified framework as splitting the poisoned dataset into two data pools.
Under our framework, we propose an adaptively splitting dataset-based defense
(ASD). Concretely, we apply loss-guided split and meta-learning-inspired split
to dynamically update two data pools. With the split clean data pool and
polluted data pool, ASD successfully defends against backdoor attacks during
training. Extensive experiments on multiple benchmark datasets and DNN models
against six state-of-the-art backdoor attacks demonstrate the superiority of
our ASD. Our code is available at https://github.com/KuofengGao/ASD.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 02:16:38 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Gao",
"Kuofeng",
""
],
[
"Bai",
"Yang",
""
],
[
"Gu",
"Jindong",
""
],
[
"Yang",
"Yong",
""
],
[
"Xia",
"Shu-Tao",
""
]
] | TITLE: Backdoor Defense via Adaptively Splitting Poisoned Dataset
ABSTRACT: Backdoor defenses have been studied to alleviate the threat of deep neural
networks (DNNs) being backdoor attacked and thus maliciously altered. Since
DNNs usually adopt some external training data from an untrusted third party, a
robust backdoor defense strategy during the training stage is of importance. We
argue that the core of training-time defense is to select poisoned samples and
to handle them properly. In this work, we summarize the training-time defenses
from a unified framework as splitting the poisoned dataset into two data pools.
Under our framework, we propose an adaptively splitting dataset-based defense
(ASD). Concretely, we apply loss-guided split and meta-learning-inspired split
to dynamically update two data pools. With the split clean data pool and
polluted data pool, ASD successfully defends against backdoor attacks during
training. Extensive experiments on multiple benchmark datasets and DNN models
against six state-of-the-art backdoor attacks demonstrate the superiority of
our ASD. Our code is available at https://github.com/KuofengGao/ASD.
| no_new_dataset | 0.945651 |
2303.12997 | Yande Li | Yande Li, Mingjie Wang, Minglun Gong, Yonggang Lu, Li Liu | FER-former: Multi-modal Transformer for Facial Expression Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ever-increasing demands for intuitive interactions in Virtual Reality has
triggered a boom in the realm of Facial Expression Recognition (FER). To
address the limitations in existing approaches (e.g., narrow receptive fields
and homogenous supervisory signals) and further cement the capacity of FER
tools, a novel multifarious supervision-steering Transformer for FER in the
wild is proposed in this paper. Referred as FER-former, our approach features
multi-granularity embedding integration, hybrid self-attention scheme, and
heterogeneous domain-steering supervision. In specific, to dig deep into the
merits of the combination of features provided by prevailing CNNs and
Transformers, a hybrid stem is designed to cascade two types of learning
paradigms simultaneously. Wherein, a FER-specific transformer mechanism is
devised to characterize conventional hard one-hot label-focusing and CLIP-based
text-oriented tokens in parallel for final classification. To ease the issue of
annotation ambiguity, a heterogeneous domains-steering supervision module is
proposed to make image features also have text-space semantic correlations by
supervising the similarity between image features and text features. On top of
the collaboration of multifarious token heads, diverse global receptive fields
with multi-modal semantic cues are captured, thereby delivering superb learning
capability. Extensive experiments on popular benchmarks demonstrate the
superiority of the proposed FER-former over the existing state-of-the-arts.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 02:29:53 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Li",
"Yande",
""
],
[
"Wang",
"Mingjie",
""
],
[
"Gong",
"Minglun",
""
],
[
"Lu",
"Yonggang",
""
],
[
"Liu",
"Li",
""
]
] | TITLE: FER-former: Multi-modal Transformer for Facial Expression Recognition
ABSTRACT: The ever-increasing demands for intuitive interactions in Virtual Reality has
triggered a boom in the realm of Facial Expression Recognition (FER). To
address the limitations in existing approaches (e.g., narrow receptive fields
and homogenous supervisory signals) and further cement the capacity of FER
tools, a novel multifarious supervision-steering Transformer for FER in the
wild is proposed in this paper. Referred as FER-former, our approach features
multi-granularity embedding integration, hybrid self-attention scheme, and
heterogeneous domain-steering supervision. In specific, to dig deep into the
merits of the combination of features provided by prevailing CNNs and
Transformers, a hybrid stem is designed to cascade two types of learning
paradigms simultaneously. Wherein, a FER-specific transformer mechanism is
devised to characterize conventional hard one-hot label-focusing and CLIP-based
text-oriented tokens in parallel for final classification. To ease the issue of
annotation ambiguity, a heterogeneous domains-steering supervision module is
proposed to make image features also have text-space semantic correlations by
supervising the similarity between image features and text features. On top of
the collaboration of multifarious token heads, diverse global receptive fields
with multi-modal semantic cues are captured, thereby delivering superb learning
capability. Extensive experiments on popular benchmarks demonstrate the
superiority of the proposed FER-former over the existing state-of-the-arts.
| no_new_dataset | 0.949435 |
2303.13010 | Jinqi Luo | Jinqi Luo, Zhaoning Wang, Chen Henry Wu, Dong Huang, Fernando De la
Torre | Semantic Image Attack for Visual Model Diagnosis | Initial version submitted to NeurIPS 2022 | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | In practice, metric analysis on a specific train and test dataset does not
guarantee reliable or fair ML models. This is partially due to the fact that
obtaining a balanced, diverse, and perfectly labeled dataset is typically
expensive, time-consuming, and error-prone. Rather than relying on a carefully
designed test set to assess ML models' failures, fairness, or robustness, this
paper proposes Semantic Image Attack (SIA), a method based on the adversarial
attack that provides semantic adversarial images to allow model diagnosis,
interpretability, and robustness. Traditional adversarial training is a popular
methodology for robustifying ML models against attacks. However, existing
adversarial methods do not combine the two aspects that enable the
interpretation and analysis of the model's flaws: semantic traceability and
perceptual quality. SIA combines the two features via iterative gradient ascent
on a predefined semantic attribute space and the image space. We illustrate the
validity of our approach in three scenarios for keypoint detection and
classification. (1) Model diagnosis: SIA generates a histogram of attributes
that highlights the semantic vulnerability of the ML model (i.e., attributes
that make the model fail). (2) Stronger attacks: SIA generates adversarial
examples with visually interpretable attributes that lead to higher attack
success rates than baseline methods. The adversarial training on SIA improves
the transferable robustness across different gradient-based attacks. (3)
Robustness to imbalanced datasets: we use SIA to augment the underrepresented
classes, which outperforms strong augmentation and re-balancing baselines.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 03:13:04 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Luo",
"Jinqi",
""
],
[
"Wang",
"Zhaoning",
""
],
[
"Wu",
"Chen Henry",
""
],
[
"Huang",
"Dong",
""
],
[
"De la Torre",
"Fernando",
""
]
] | TITLE: Semantic Image Attack for Visual Model Diagnosis
ABSTRACT: In practice, metric analysis on a specific train and test dataset does not
guarantee reliable or fair ML models. This is partially due to the fact that
obtaining a balanced, diverse, and perfectly labeled dataset is typically
expensive, time-consuming, and error-prone. Rather than relying on a carefully
designed test set to assess ML models' failures, fairness, or robustness, this
paper proposes Semantic Image Attack (SIA), a method based on the adversarial
attack that provides semantic adversarial images to allow model diagnosis,
interpretability, and robustness. Traditional adversarial training is a popular
methodology for robustifying ML models against attacks. However, existing
adversarial methods do not combine the two aspects that enable the
interpretation and analysis of the model's flaws: semantic traceability and
perceptual quality. SIA combines the two features via iterative gradient ascent
on a predefined semantic attribute space and the image space. We illustrate the
validity of our approach in three scenarios for keypoint detection and
classification. (1) Model diagnosis: SIA generates a histogram of attributes
that highlights the semantic vulnerability of the ML model (i.e., attributes
that make the model fail). (2) Stronger attacks: SIA generates adversarial
examples with visually interpretable attributes that lead to higher attack
success rates than baseline methods. The adversarial training on SIA improves
the transferable robustness across different gradient-based attacks. (3)
Robustness to imbalanced datasets: we use SIA to augment the underrepresented
classes, which outperforms strong augmentation and re-balancing baselines.
| no_new_dataset | 0.948489 |
2303.13018 | Yunsong Zhou | Yunsong Zhou, Hongzi Zhu, Quan Liu, Shan Chang, and Minyi Guo | MonoATT: Online Monocular 3D Object Detection with Adaptive Token
Transformer | in the Proceedings of IEEE/CVF Conference on Computer Vision and
Pattern Recognition (CVPR), 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mobile monocular 3D object detection (Mono3D) (e.g., on a vehicle, a drone,
or a robot) is an important yet challenging task. Existing transformer-based
offline Mono3D models adopt grid-based vision tokens, which is suboptimal when
using coarse tokens due to the limited available computational power. In this
paper, we propose an online Mono3D framework, called MonoATT, which leverages a
novel vision transformer with heterogeneous tokens of varying shapes and sizes
to facilitate mobile Mono3D. The core idea of MonoATT is to adaptively assign
finer tokens to areas of more significance before utilizing a transformer to
enhance Mono3D. To this end, we first use prior knowledge to design a scoring
network for selecting the most important areas of the image, and then propose a
token clustering and merging network with an attention mechanism to gradually
merge tokens around the selected areas in multiple stages. Finally, a
pixel-level feature map is reconstructed from heterogeneous tokens before
employing a SOTA Mono3D detector as the underlying detection core. Experiment
results on the real-world KITTI dataset demonstrate that MonoATT can
effectively improve the Mono3D accuracy for both near and far objects and
guarantee low latency. MonoATT yields the best performance compared with the
state-of-the-art methods by a large margin and is ranked number one on the
KITTI 3D benchmark.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 03:45:03 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zhou",
"Yunsong",
""
],
[
"Zhu",
"Hongzi",
""
],
[
"Liu",
"Quan",
""
],
[
"Chang",
"Shan",
""
],
[
"Guo",
"Minyi",
""
]
] | TITLE: MonoATT: Online Monocular 3D Object Detection with Adaptive Token
Transformer
ABSTRACT: Mobile monocular 3D object detection (Mono3D) (e.g., on a vehicle, a drone,
or a robot) is an important yet challenging task. Existing transformer-based
offline Mono3D models adopt grid-based vision tokens, which is suboptimal when
using coarse tokens due to the limited available computational power. In this
paper, we propose an online Mono3D framework, called MonoATT, which leverages a
novel vision transformer with heterogeneous tokens of varying shapes and sizes
to facilitate mobile Mono3D. The core idea of MonoATT is to adaptively assign
finer tokens to areas of more significance before utilizing a transformer to
enhance Mono3D. To this end, we first use prior knowledge to design a scoring
network for selecting the most important areas of the image, and then propose a
token clustering and merging network with an attention mechanism to gradually
merge tokens around the selected areas in multiple stages. Finally, a
pixel-level feature map is reconstructed from heterogeneous tokens before
employing a SOTA Mono3D detector as the underlying detection core. Experiment
results on the real-world KITTI dataset demonstrate that MonoATT can
effectively improve the Mono3D accuracy for both near and far objects and
guarantee low latency. MonoATT yields the best performance compared with the
state-of-the-art methods by a large margin and is ranked number one on the
KITTI 3D benchmark.
| no_new_dataset | 0.951639 |
2303.13040 | Han-Cheol Cho | Han-Cheol Cho, Won Young Jhoo, Wooyoung Kang, Byungseok Roh | Open-Vocabulary Object Detection using Pseudo Caption Labels | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent open-vocabulary detection methods aim to detect novel objects by
distilling knowledge from vision-language models (VLMs) trained on a vast
amount of image-text pairs. To improve the effectiveness of these methods,
researchers have utilized datasets with a large vocabulary that contains a
large number of object classes, under the assumption that such data will enable
models to extract comprehensive knowledge on the relationships between various
objects and better generalize to unseen object classes. In this study, we argue
that more fine-grained labels are necessary to extract richer knowledge about
novel objects, including object attributes and relationships, in addition to
their names. To address this challenge, we propose a simple and effective
method named Pseudo Caption Labeling (PCL), which utilizes an image captioning
model to generate captions that describe object instances from diverse
perspectives. The resulting pseudo caption labels offer dense samples for
knowledge distillation. On the LVIS benchmark, our best model trained on the
de-duplicated VisualGenome dataset achieves an AP of 34.5 and an APr of 30.6,
comparable to the state-of-the-art performance. PCL's simplicity and
flexibility are other notable features, as it is a straightforward
pre-processing technique that can be used with any image captioning model
without imposing any restrictions on model architecture or training process.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 05:10:22 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Cho",
"Han-Cheol",
""
],
[
"Jhoo",
"Won Young",
""
],
[
"Kang",
"Wooyoung",
""
],
[
"Roh",
"Byungseok",
""
]
] | TITLE: Open-Vocabulary Object Detection using Pseudo Caption Labels
ABSTRACT: Recent open-vocabulary detection methods aim to detect novel objects by
distilling knowledge from vision-language models (VLMs) trained on a vast
amount of image-text pairs. To improve the effectiveness of these methods,
researchers have utilized datasets with a large vocabulary that contains a
large number of object classes, under the assumption that such data will enable
models to extract comprehensive knowledge on the relationships between various
objects and better generalize to unseen object classes. In this study, we argue
that more fine-grained labels are necessary to extract richer knowledge about
novel objects, including object attributes and relationships, in addition to
their names. To address this challenge, we propose a simple and effective
method named Pseudo Caption Labeling (PCL), which utilizes an image captioning
model to generate captions that describe object instances from diverse
perspectives. The resulting pseudo caption labels offer dense samples for
knowledge distillation. On the LVIS benchmark, our best model trained on the
de-duplicated VisualGenome dataset achieves an AP of 34.5 and an APr of 30.6,
comparable to the state-of-the-art performance. PCL's simplicity and
flexibility are other notable features, as it is a straightforward
pre-processing technique that can be used with any image captioning model
without imposing any restrictions on model architecture or training process.
| no_new_dataset | 0.943452 |
2303.13051 | Shengyang Sun | Shengyang Sun, Xiaojin Gong | Hierarchical Semantic Contrast for Scene-aware Video Anomaly Detection | Accepted by CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Increasing scene-awareness is a key challenge in video anomaly detection
(VAD). In this work, we propose a hierarchical semantic contrast (HSC) method
to learn a scene-aware VAD model from normal videos. We first incorporate
foreground object and background scene features with high-level semantics by
taking advantage of pre-trained video parsing models. Then, building upon the
autoencoder-based reconstruction framework, we introduce both scene-level and
object-level contrastive learning to enforce the encoded latent features to be
compact within the same semantic classes while being separable across different
classes. This hierarchical semantic contrast strategy helps to deal with the
diversity of normal patterns and also increases their discrimination ability.
Moreover, for the sake of tackling rare normal activities, we design a
skeleton-based motion augmentation to increase samples and refine the model
further. Extensive experiments on three public datasets and scene-dependent
mixture datasets validate the effectiveness of our proposed method.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 05:53:34 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Sun",
"Shengyang",
""
],
[
"Gong",
"Xiaojin",
""
]
] | TITLE: Hierarchical Semantic Contrast for Scene-aware Video Anomaly Detection
ABSTRACT: Increasing scene-awareness is a key challenge in video anomaly detection
(VAD). In this work, we propose a hierarchical semantic contrast (HSC) method
to learn a scene-aware VAD model from normal videos. We first incorporate
foreground object and background scene features with high-level semantics by
taking advantage of pre-trained video parsing models. Then, building upon the
autoencoder-based reconstruction framework, we introduce both scene-level and
object-level contrastive learning to enforce the encoded latent features to be
compact within the same semantic classes while being separable across different
classes. This hierarchical semantic contrast strategy helps to deal with the
diversity of normal patterns and also increases their discrimination ability.
Moreover, for the sake of tackling rare normal activities, we design a
skeleton-based motion augmentation to increase samples and refine the model
further. Extensive experiments on three public datasets and scene-dependent
mixture datasets validate the effectiveness of our proposed method.
| no_new_dataset | 0.951729 |
2303.13055 | Muhammad Tariq Saeed | Subtain Malik, Muhammad Tariq Saeed, Marya Jabeen Zia, Shahzad Rasool,
Liaquat Ali Khan, and Mian Ilyas Ahmed | Reimagining Application User Interface (UI) Design using Deep Learning
Methods: Challenges and Opportunities | A review paper on studies of UI design techniques and deep learning | null | null | null | cs.HC cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a review of the recent work in deep learning
methods for user interface design. The survey encompasses well known deep
learning techniques (deep neural networks, convolutional neural networks,
recurrent neural networks, autoencoders, and generative adversarial networks)
and datasets widely used to design user interface applications. We highlight
important problems and emerging research frontiers in this field. We believe
that the use of deep learning for user interface design automation tasks could
be one of the high potential fields for the advancement of the software
development industry.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 05:59:56 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Malik",
"Subtain",
""
],
[
"Saeed",
"Muhammad Tariq",
""
],
[
"Zia",
"Marya Jabeen",
""
],
[
"Rasool",
"Shahzad",
""
],
[
"Khan",
"Liaquat Ali",
""
],
[
"Ahmed",
"Mian Ilyas",
""
]
] | TITLE: Reimagining Application User Interface (UI) Design using Deep Learning
Methods: Challenges and Opportunities
ABSTRACT: In this paper, we present a review of the recent work in deep learning
methods for user interface design. The survey encompasses well known deep
learning techniques (deep neural networks, convolutional neural networks,
recurrent neural networks, autoencoders, and generative adversarial networks)
and datasets widely used to design user interface applications. We highlight
important problems and emerging research frontiers in this field. We believe
that the use of deep learning for user interface design automation tasks could
be one of the high potential fields for the advancement of the software
development industry.
| no_new_dataset | 0.948106 |
2303.13060 | Zixiao Wang | Zixiao Wang, Yunheng Shen, Wenqian Zhao, Yang Bai, Guojin Chen, Farzan
Farnia, Bei Yu | DiffPattern: Layout Pattern Generation via Discrete Diffusion | DAC2023 Accepted | null | null | null | cs.CV cs.AR | http://creativecommons.org/licenses/by/4.0/ | Deep generative models dominate the existing literature in layout pattern
generation. However, leaving the guarantee of legality to an inexplicable
neural network could be problematic in several applications. In this paper, we
propose \tool{DiffPattern} to generate reliable layout patterns.
\tool{DiffPattern} introduces a novel diverse topology generation method via a
discrete diffusion model with compute-efficiently lossless layout pattern
representation. Then a white-box pattern assessment is utilized to generate
legal patterns given desired design rules. Our experiments on several benchmark
settings show that \tool{DiffPattern} significantly outperforms existing
baselines and is capable of synthesizing reliable layout patterns.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 06:16:14 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wang",
"Zixiao",
""
],
[
"Shen",
"Yunheng",
""
],
[
"Zhao",
"Wenqian",
""
],
[
"Bai",
"Yang",
""
],
[
"Chen",
"Guojin",
""
],
[
"Farnia",
"Farzan",
""
],
[
"Yu",
"Bei",
""
]
] | TITLE: DiffPattern: Layout Pattern Generation via Discrete Diffusion
ABSTRACT: Deep generative models dominate the existing literature in layout pattern
generation. However, leaving the guarantee of legality to an inexplicable
neural network could be problematic in several applications. In this paper, we
propose \tool{DiffPattern} to generate reliable layout patterns.
\tool{DiffPattern} introduces a novel diverse topology generation method via a
discrete diffusion model with compute-efficiently lossless layout pattern
representation. Then a white-box pattern assessment is utilized to generate
legal patterns given desired design rules. Our experiments on several benchmark
settings show that \tool{DiffPattern} significantly outperforms existing
baselines and is capable of synthesizing reliable layout patterns.
| no_new_dataset | 0.946151 |
2303.13062 | Wuyang Luo | Wuyang Luo, Su Yang, Xinjian Zhang, Weishan Zhang | SIEDOB: Semantic Image Editing by Disentangling Object and Background | CVPR 2023 highlight paper | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic image editing provides users with a flexible tool to modify a given
image guided by a corresponding segmentation map. In this task, the features of
the foreground objects and the backgrounds are quite different. However, all
previous methods handle backgrounds and objects as a whole using a monolithic
model. Consequently, they remain limited in processing content-rich images and
suffer from generating unrealistic objects and texture-inconsistent
backgrounds. To address this issue, we propose a novel paradigm,
\textbf{S}emantic \textbf{I}mage \textbf{E}diting by \textbf{D}isentangling
\textbf{O}bject and \textbf{B}ackground (\textbf{SIEDOB}), the core idea of
which is to explicitly leverages several heterogeneous subnetworks for objects
and backgrounds. First, SIEDOB disassembles the edited input into background
regions and instance-level objects. Then, we feed them into the dedicated
generators. Finally, all synthesized parts are embedded in their original
locations and utilize a fusion network to obtain a harmonized result. Moreover,
to produce high-quality edited images, we propose some innovative designs,
including Semantic-Aware Self-Propagation Module, Boundary-Anchored Patch
Discriminator, and Style-Diversity Object Generator, and integrate them into
SIEDOB. We conduct extensive experiments on Cityscapes and ADE20K-Room datasets
and exhibit that our method remarkably outperforms the baselines, especially in
synthesizing realistic and diverse objects and texture-consistent backgrounds.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 06:17:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Luo",
"Wuyang",
""
],
[
"Yang",
"Su",
""
],
[
"Zhang",
"Xinjian",
""
],
[
"Zhang",
"Weishan",
""
]
] | TITLE: SIEDOB: Semantic Image Editing by Disentangling Object and Background
ABSTRACT: Semantic image editing provides users with a flexible tool to modify a given
image guided by a corresponding segmentation map. In this task, the features of
the foreground objects and the backgrounds are quite different. However, all
previous methods handle backgrounds and objects as a whole using a monolithic
model. Consequently, they remain limited in processing content-rich images and
suffer from generating unrealistic objects and texture-inconsistent
backgrounds. To address this issue, we propose a novel paradigm,
\textbf{S}emantic \textbf{I}mage \textbf{E}diting by \textbf{D}isentangling
\textbf{O}bject and \textbf{B}ackground (\textbf{SIEDOB}), the core idea of
which is to explicitly leverages several heterogeneous subnetworks for objects
and backgrounds. First, SIEDOB disassembles the edited input into background
regions and instance-level objects. Then, we feed them into the dedicated
generators. Finally, all synthesized parts are embedded in their original
locations and utilize a fusion network to obtain a harmonized result. Moreover,
to produce high-quality edited images, we propose some innovative designs,
including Semantic-Aware Self-Propagation Module, Boundary-Anchored Patch
Discriminator, and Style-Diversity Object Generator, and integrate them into
SIEDOB. We conduct extensive experiments on Cityscapes and ADE20K-Room datasets
and exhibit that our method remarkably outperforms the baselines, especially in
synthesizing realistic and diverse objects and texture-consistent backgrounds.
| no_new_dataset | 0.949342 |
2303.13069 | Du Chen | Du Chen, Jie Liang, Xindong Zhang, Ming Liu, Hui Zeng, Lei Zhang | Human Guided Ground-truth Generation for Realistic Image
Super-resolution | 10 pages. Already accpted by 2023 IEEE/CVF Conference on Computer
Vision and Pattern Recognition (CVPR) | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | How to generate the ground-truth (GT) image is a critical issue for training
realistic image super-resolution (Real-ISR) models. Existing methods mostly
take a set of high-resolution (HR) images as GTs and apply various degradations
to simulate their low-resolution (LR) counterparts. Though great progress has
been achieved, such an LR-HR pair generation scheme has several limitations.
First, the perceptual quality of HR images may not be high enough, limiting the
quality of Real-ISR outputs. Second, existing schemes do not consider much
human perception in GT generation, and the trained models tend to produce
over-smoothed results or unpleasant artifacts. With the above considerations,
we propose a human guided GT generation scheme. We first elaborately train
multiple image enhancement models to improve the perceptual quality of HR
images, and enable one LR image having multiple HR counterparts. Human subjects
are then involved to annotate the high quality regions among the enhanced HR
images as GTs, and label the regions with unpleasant artifacts as negative
samples. A human guided GT image dataset with both positive and negative
samples is then constructed, and a loss function is proposed to train the
Real-ISR models. Experiments show that the Real-ISR models trained on our
dataset can produce perceptually more realistic results with less artifacts.
Dataset and codes can be found at https://github.com/ChrisDud0257/HGGT
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 06:53:14 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Chen",
"Du",
""
],
[
"Liang",
"Jie",
""
],
[
"Zhang",
"Xindong",
""
],
[
"Liu",
"Ming",
""
],
[
"Zeng",
"Hui",
""
],
[
"Zhang",
"Lei",
""
]
] | TITLE: Human Guided Ground-truth Generation for Realistic Image
Super-resolution
ABSTRACT: How to generate the ground-truth (GT) image is a critical issue for training
realistic image super-resolution (Real-ISR) models. Existing methods mostly
take a set of high-resolution (HR) images as GTs and apply various degradations
to simulate their low-resolution (LR) counterparts. Though great progress has
been achieved, such an LR-HR pair generation scheme has several limitations.
First, the perceptual quality of HR images may not be high enough, limiting the
quality of Real-ISR outputs. Second, existing schemes do not consider much
human perception in GT generation, and the trained models tend to produce
over-smoothed results or unpleasant artifacts. With the above considerations,
we propose a human guided GT generation scheme. We first elaborately train
multiple image enhancement models to improve the perceptual quality of HR
images, and enable one LR image having multiple HR counterparts. Human subjects
are then involved to annotate the high quality regions among the enhanced HR
images as GTs, and label the regions with unpleasant artifacts as negative
samples. A human guided GT image dataset with both positive and negative
samples is then constructed, and a loss function is proposed to train the
Real-ISR models. Experiments show that the Real-ISR models trained on our
dataset can produce perceptually more realistic results with less artifacts.
Dataset and codes can be found at https://github.com/ChrisDud0257/HGGT
| new_dataset | 0.92657 |
2303.13076 | Xiaoshi Wu | Xiaoshi Wu, Feng Zhu, Rui Zhao, Hongsheng Li | CORA: Adapting CLIP for Open-Vocabulary Detection with Region Prompting
and Anchor Pre-Matching | 11 pages, 4 figures. Accepted by CVPR 2023 | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Open-vocabulary detection (OVD) is an object detection task aiming at
detecting objects from novel categories beyond the base categories on which the
detector is trained. Recent OVD methods rely on large-scale visual-language
pre-trained models, such as CLIP, for recognizing novel objects. We identify
the two core obstacles that need to be tackled when incorporating these models
into detector training: (1) the distribution mismatch that happens when
applying a VL-model trained on whole images to region recognition tasks; (2)
the difficulty of localizing objects of unseen classes. To overcome these
obstacles, we propose CORA, a DETR-style framework that adapts CLIP for
Open-vocabulary detection by Region prompting and Anchor pre-matching. Region
prompting mitigates the whole-to-region distribution gap by prompting the
region features of the CLIP-based region classifier. Anchor pre-matching helps
learning generalizable object localization by a class-aware matching mechanism.
We evaluate CORA on the COCO OVD benchmark, where we achieve 41.7 AP50 on novel
classes, which outperforms the previous SOTA by 2.4 AP50 even without resorting
to extra training data. When extra training data is available, we train
CORA$^+$ on both ground-truth base-category annotations and additional pseudo
bounding box labels computed by CORA. CORA$^+$ achieves 43.1 AP50 on the COCO
OVD benchmark and 28.1 box APr on the LVIS OVD benchmark.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 07:13:57 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wu",
"Xiaoshi",
""
],
[
"Zhu",
"Feng",
""
],
[
"Zhao",
"Rui",
""
],
[
"Li",
"Hongsheng",
""
]
] | TITLE: CORA: Adapting CLIP for Open-Vocabulary Detection with Region Prompting
and Anchor Pre-Matching
ABSTRACT: Open-vocabulary detection (OVD) is an object detection task aiming at
detecting objects from novel categories beyond the base categories on which the
detector is trained. Recent OVD methods rely on large-scale visual-language
pre-trained models, such as CLIP, for recognizing novel objects. We identify
the two core obstacles that need to be tackled when incorporating these models
into detector training: (1) the distribution mismatch that happens when
applying a VL-model trained on whole images to region recognition tasks; (2)
the difficulty of localizing objects of unseen classes. To overcome these
obstacles, we propose CORA, a DETR-style framework that adapts CLIP for
Open-vocabulary detection by Region prompting and Anchor pre-matching. Region
prompting mitigates the whole-to-region distribution gap by prompting the
region features of the CLIP-based region classifier. Anchor pre-matching helps
learning generalizable object localization by a class-aware matching mechanism.
We evaluate CORA on the COCO OVD benchmark, where we achieve 41.7 AP50 on novel
classes, which outperforms the previous SOTA by 2.4 AP50 even without resorting
to extra training data. When extra training data is available, we train
CORA$^+$ on both ground-truth base-category annotations and additional pseudo
bounding box labels computed by CORA. CORA$^+$ achieves 43.1 AP50 on the COCO
OVD benchmark and 28.1 box APr on the LVIS OVD benchmark.
| no_new_dataset | 0.946745 |
2303.13080 | Xiang He | Xiang He, Yang Li, Dongcheng Zhao, Qingqun Kong, Yi Zeng | MSAT: Biologically Inspired Multi-Stage Adaptive Threshold for
Conversion of Spiking Neural Networks | null | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spiking Neural Networks (SNNs) can do inference with low power consumption
due to their spike sparsity. ANN-SNN conversion is an efficient way to achieve
deep SNNs by converting well-trained Artificial Neural Networks (ANNs).
However, the existing methods commonly use constant threshold for conversion,
which prevents neurons from rapidly delivering spikes to deeper layers and
causes high time delay. In addition, the same response for different inputs may
result in information loss during the information transmission. Inspired by the
biological model mechanism, we propose a multi-stage adaptive threshold (MSAT).
Specifically, for each neuron, the dynamic threshold varies with firing history
and input properties and is positively correlated with the average membrane
potential and negatively correlated with the rate of depolarization. The
self-adaptation to membrane potential and input allows a timely adjustment of
the threshold to fire spike faster and transmit more information. Moreover, we
analyze the Spikes of Inactivated Neurons error which is pervasive in early
time steps and propose spike confidence accordingly as a measurement of
confidence about the neurons that correctly deliver spikes. We use such spike
confidence in early time steps to determine whether to elicit spike to
alleviate this error. Combined with the proposed method, we examine the
performance on non-trivial datasets CIFAR-10, CIFAR-100, and ImageNet. We also
conduct sentiment classification and speech recognition experiments on the IDBM
and Google speech commands datasets respectively. Experiments show
near-lossless and lower latency ANN-SNN conversion. To the best of our
knowledge, this is the first time to build a biologically inspired multi-stage
adaptive threshold for converted SNN, with comparable performance to
state-of-the-art methods while improving energy efficiency.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 07:18:08 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"He",
"Xiang",
""
],
[
"Li",
"Yang",
""
],
[
"Zhao",
"Dongcheng",
""
],
[
"Kong",
"Qingqun",
""
],
[
"Zeng",
"Yi",
""
]
] | TITLE: MSAT: Biologically Inspired Multi-Stage Adaptive Threshold for
Conversion of Spiking Neural Networks
ABSTRACT: Spiking Neural Networks (SNNs) can do inference with low power consumption
due to their spike sparsity. ANN-SNN conversion is an efficient way to achieve
deep SNNs by converting well-trained Artificial Neural Networks (ANNs).
However, the existing methods commonly use constant threshold for conversion,
which prevents neurons from rapidly delivering spikes to deeper layers and
causes high time delay. In addition, the same response for different inputs may
result in information loss during the information transmission. Inspired by the
biological model mechanism, we propose a multi-stage adaptive threshold (MSAT).
Specifically, for each neuron, the dynamic threshold varies with firing history
and input properties and is positively correlated with the average membrane
potential and negatively correlated with the rate of depolarization. The
self-adaptation to membrane potential and input allows a timely adjustment of
the threshold to fire spike faster and transmit more information. Moreover, we
analyze the Spikes of Inactivated Neurons error which is pervasive in early
time steps and propose spike confidence accordingly as a measurement of
confidence about the neurons that correctly deliver spikes. We use such spike
confidence in early time steps to determine whether to elicit spike to
alleviate this error. Combined with the proposed method, we examine the
performance on non-trivial datasets CIFAR-10, CIFAR-100, and ImageNet. We also
conduct sentiment classification and speech recognition experiments on the IDBM
and Google speech commands datasets respectively. Experiments show
near-lossless and lower latency ANN-SNN conversion. To the best of our
knowledge, this is the first time to build a biologically inspired multi-stage
adaptive threshold for converted SNN, with comparable performance to
state-of-the-art methods while improving energy efficiency.
| no_new_dataset | 0.949763 |
2303.13087 | Huang Zhuo | Zhuo Huang, Miaoxi Zhu, Xiaobo Xia, Li Shen, Jun Yu, Chen Gong, Bo
Han, Bo Du, Tongliang Liu | Robust Generalization against Photon-Limited Corruptions via Worst-Case
Sharpness Minimization | CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Robust generalization aims to tackle the most challenging data distributions
which are rare in the training set and contain severe noises, i.e.,
photon-limited corruptions. Common solutions such as distributionally robust
optimization (DRO) focus on the worst-case empirical risk to ensure low
training error on the uncommon noisy distributions. However, due to the
over-parameterized model being optimized on scarce worst-case data, DRO fails
to produce a smooth loss landscape, thus struggling on generalizing well to the
test set. Therefore, instead of focusing on the worst-case risk minimization,
we propose SharpDRO by penalizing the sharpness of the worst-case distribution,
which measures the loss changes around the neighbor of learning parameters.
Through worst-case sharpness minimization, the proposed method successfully
produces a flat loss curve on the corrupted distributions, thus achieving
robust generalization. Moreover, by considering whether the distribution
annotation is available, we apply SharpDRO to two problem settings and design a
worst-case selection process for robust generalization. Theoretically, we show
that SharpDRO has a great convergence guarantee. Experimentally, we simulate
photon-limited corruptions using CIFAR10/100 and ImageNet30 datasets and show
that SharpDRO exhibits a strong generalization ability against severe
corruptions and exceeds well-known baseline methods with large performance
gains.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 07:58:48 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Huang",
"Zhuo",
""
],
[
"Zhu",
"Miaoxi",
""
],
[
"Xia",
"Xiaobo",
""
],
[
"Shen",
"Li",
""
],
[
"Yu",
"Jun",
""
],
[
"Gong",
"Chen",
""
],
[
"Han",
"Bo",
""
],
[
"Du",
"Bo",
""
],
[
"Liu",
"Tongliang",
""
]
] | TITLE: Robust Generalization against Photon-Limited Corruptions via Worst-Case
Sharpness Minimization
ABSTRACT: Robust generalization aims to tackle the most challenging data distributions
which are rare in the training set and contain severe noises, i.e.,
photon-limited corruptions. Common solutions such as distributionally robust
optimization (DRO) focus on the worst-case empirical risk to ensure low
training error on the uncommon noisy distributions. However, due to the
over-parameterized model being optimized on scarce worst-case data, DRO fails
to produce a smooth loss landscape, thus struggling on generalizing well to the
test set. Therefore, instead of focusing on the worst-case risk minimization,
we propose SharpDRO by penalizing the sharpness of the worst-case distribution,
which measures the loss changes around the neighbor of learning parameters.
Through worst-case sharpness minimization, the proposed method successfully
produces a flat loss curve on the corrupted distributions, thus achieving
robust generalization. Moreover, by considering whether the distribution
annotation is available, we apply SharpDRO to two problem settings and design a
worst-case selection process for robust generalization. Theoretically, we show
that SharpDRO has a great convergence guarantee. Experimentally, we simulate
photon-limited corruptions using CIFAR10/100 and ImageNet30 datasets and show
that SharpDRO exhibits a strong generalization ability against severe
corruptions and exceeds well-known baseline methods with large performance
gains.
| no_new_dataset | 0.950503 |
2303.13089 | Mengyao Lyu | Mengyao Lyu, Jundong Zhou, Hui Chen, Yijie Huang, Dongdong Yu, Yaqian
Li, Yandong Guo, Yuchen Guo, Liuyu Xiang, Guiguang Ding | Box-Level Active Detection | CVPR 2023 highlight | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Active learning selects informative samples for annotation within budget,
which has proven efficient recently on object detection. However, the widely
used active detection benchmarks conduct image-level evaluation, which is
unrealistic in human workload estimation and biased towards crowded images.
Furthermore, existing methods still perform image-level annotation, but equally
scoring all targets within the same image incurs waste of budget and redundant
labels. Having revealed above problems and limitations, we introduce a
box-level active detection framework that controls a box-based budget per
cycle, prioritizes informative targets and avoids redundancy for fair
comparison and efficient application.
Under the proposed box-level setting, we devise a novel pipeline, namely
Complementary Pseudo Active Strategy (ComPAS). It exploits both human
annotations and the model intelligence in a complementary fashion: an efficient
input-end committee queries labels for informative objects only; meantime
well-learned targets are identified by the model and compensated with
pseudo-labels. ComPAS consistently outperforms 10 competitors under 4 settings
in a unified codebase. With supervision from labeled data only, it achieves
100% supervised performance of VOC0712 with merely 19% box annotations. On the
COCO dataset, it yields up to 4.3% mAP improvement over the second-best method.
ComPAS also supports training with the unlabeled pool, where it surpasses 90%
COCO supervised performance with 85% label reduction. Our source code is
publicly available at https://github.com/lyumengyao/blad.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 08:06:10 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Lyu",
"Mengyao",
""
],
[
"Zhou",
"Jundong",
""
],
[
"Chen",
"Hui",
""
],
[
"Huang",
"Yijie",
""
],
[
"Yu",
"Dongdong",
""
],
[
"Li",
"Yaqian",
""
],
[
"Guo",
"Yandong",
""
],
[
"Guo",
"Yuchen",
""
],
[
"Xiang",
"Liuyu",
""
],
[
"Ding",
"Guiguang",
""
]
] | TITLE: Box-Level Active Detection
ABSTRACT: Active learning selects informative samples for annotation within budget,
which has proven efficient recently on object detection. However, the widely
used active detection benchmarks conduct image-level evaluation, which is
unrealistic in human workload estimation and biased towards crowded images.
Furthermore, existing methods still perform image-level annotation, but equally
scoring all targets within the same image incurs waste of budget and redundant
labels. Having revealed above problems and limitations, we introduce a
box-level active detection framework that controls a box-based budget per
cycle, prioritizes informative targets and avoids redundancy for fair
comparison and efficient application.
Under the proposed box-level setting, we devise a novel pipeline, namely
Complementary Pseudo Active Strategy (ComPAS). It exploits both human
annotations and the model intelligence in a complementary fashion: an efficient
input-end committee queries labels for informative objects only; meantime
well-learned targets are identified by the model and compensated with
pseudo-labels. ComPAS consistently outperforms 10 competitors under 4 settings
in a unified codebase. With supervision from labeled data only, it achieves
100% supervised performance of VOC0712 with merely 19% box annotations. On the
COCO dataset, it yields up to 4.3% mAP improvement over the second-best method.
ComPAS also supports training with the unlabeled pool, where it surpasses 90%
COCO supervised performance with 85% label reduction. Our source code is
publicly available at https://github.com/lyumengyao/blad.
| no_new_dataset | 0.94868 |
2303.13090 | Heng Cai | Heng Cai, Shumeng Li, Lei Qi, Qian Yu, Yinghuan Shi, Yang Gao | Orthogonal Annotation Benefits Barely-supervised Medical Image
Segmentation | Accepted to CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent trends in semi-supervised learning have significantly boosted the
performance of 3D semi-supervised medical image segmentation. Compared with 2D
images, 3D medical volumes involve information from different directions, e.g.,
transverse, sagittal, and coronal planes, so as to naturally provide
complementary views. These complementary views and the intrinsic similarity
among adjacent 3D slices inspire us to develop a novel annotation way and its
corresponding semi-supervised model for effective segmentation. Specifically,
we firstly propose the orthogonal annotation by only labeling two orthogonal
slices in a labeled volume, which significantly relieves the burden of
annotation. Then, we perform registration to obtain the initial pseudo labels
for sparsely labeled volumes. Subsequently, by introducing unlabeled volumes,
we propose a dual-network paradigm named Dense-Sparse Co-training (DeSCO) that
exploits dense pseudo labels in early stage and sparse labels in later stage
and meanwhile forces consistent output of two networks. Experimental results on
three benchmark datasets validated our effectiveness in performance and
efficiency in annotation. For example, with only 10 annotated slices, our
method reaches a Dice up to 86.93% on KiTS19 dataset.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 08:10:25 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Cai",
"Heng",
""
],
[
"Li",
"Shumeng",
""
],
[
"Qi",
"Lei",
""
],
[
"Yu",
"Qian",
""
],
[
"Shi",
"Yinghuan",
""
],
[
"Gao",
"Yang",
""
]
] | TITLE: Orthogonal Annotation Benefits Barely-supervised Medical Image
Segmentation
ABSTRACT: Recent trends in semi-supervised learning have significantly boosted the
performance of 3D semi-supervised medical image segmentation. Compared with 2D
images, 3D medical volumes involve information from different directions, e.g.,
transverse, sagittal, and coronal planes, so as to naturally provide
complementary views. These complementary views and the intrinsic similarity
among adjacent 3D slices inspire us to develop a novel annotation way and its
corresponding semi-supervised model for effective segmentation. Specifically,
we firstly propose the orthogonal annotation by only labeling two orthogonal
slices in a labeled volume, which significantly relieves the burden of
annotation. Then, we perform registration to obtain the initial pseudo labels
for sparsely labeled volumes. Subsequently, by introducing unlabeled volumes,
we propose a dual-network paradigm named Dense-Sparse Co-training (DeSCO) that
exploits dense pseudo labels in early stage and sparse labels in later stage
and meanwhile forces consistent output of two networks. Experimental results on
three benchmark datasets validated our effectiveness in performance and
efficiency in annotation. For example, with only 10 annotated slices, our
method reaches a Dice up to 86.93% on KiTS19 dataset.
| no_new_dataset | 0.950088 |
2303.13101 | Bo Zhang | Bo Zhang, Zuheng Ming, Wei Feng, Yaqian Liu, Liang He, Kaixing Zhao | MMFormer: Multimodal Transformer Using Multiscale Self-Attention for
Remote Sensing Image Classification | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | To benefit the complementary information between heterogeneous data, we
introduce a new Multimodal Transformer (MMFormer) for Remote Sensing (RS) image
classification using Hyperspectral Image (HSI) accompanied by another source of
data such as Light Detection and Ranging (LiDAR). Compared with traditional
Vision Transformer (ViT) lacking inductive biases of convolutions, we first
introduce convolutional layers to our MMFormer to tokenize patches from
multimodal data of HSI and LiDAR. Then we propose a Multi-scale Multi-head
Self-Attention (MSMHSA) module to address the problem of compatibility which
often limits to fuse HSI with high spectral resolution and LiDAR with
relatively low spatial resolution. The proposed MSMHSA module can incorporate
HSI to LiDAR data in a coarse-to-fine manner enabling us to learn a
fine-grained representation. Extensive experiments on widely used benchmarks
(e.g., Trento and MUUFL) demonstrate the effectiveness and superiority of our
proposed MMFormer for RS image classification.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 08:34:24 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zhang",
"Bo",
""
],
[
"Ming",
"Zuheng",
""
],
[
"Feng",
"Wei",
""
],
[
"Liu",
"Yaqian",
""
],
[
"He",
"Liang",
""
],
[
"Zhao",
"Kaixing",
""
]
] | TITLE: MMFormer: Multimodal Transformer Using Multiscale Self-Attention for
Remote Sensing Image Classification
ABSTRACT: To benefit the complementary information between heterogeneous data, we
introduce a new Multimodal Transformer (MMFormer) for Remote Sensing (RS) image
classification using Hyperspectral Image (HSI) accompanied by another source of
data such as Light Detection and Ranging (LiDAR). Compared with traditional
Vision Transformer (ViT) lacking inductive biases of convolutions, we first
introduce convolutional layers to our MMFormer to tokenize patches from
multimodal data of HSI and LiDAR. Then we propose a Multi-scale Multi-head
Self-Attention (MSMHSA) module to address the problem of compatibility which
often limits to fuse HSI with high spectral resolution and LiDAR with
relatively low spatial resolution. The proposed MSMHSA module can incorporate
HSI to LiDAR data in a coarse-to-fine manner enabling us to learn a
fine-grained representation. Extensive experiments on widely used benchmarks
(e.g., Trento and MUUFL) demonstrate the effectiveness and superiority of our
proposed MMFormer for RS image classification.
| no_new_dataset | 0.947721 |
2303.13122 | Yi Lin | Yi Lin, Zhongchen Zhao, Zhengjie ZHU, Lisheng Wang, Kwang-Ting Cheng,
Hao Chen | Exploring Visual Prompts for Whole Slide Image Classification with
Multiple Instance Learning | Submitted to MICCAI 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Multiple instance learning (MIL) has emerged as a popular method for
classifying histopathology whole slide images (WSIs). However, existing
approaches typically rely on pre-trained models from large natural image
datasets, such as ImageNet, to generate instance features, which can be
sub-optimal due to the significant differences between natural images and
histopathology images that lead to a domain shift. In this paper, we present a
novel, simple yet effective method for learning domain-specific knowledge
transformation from pre-trained models to histopathology images. Our approach
entails using a prompt component to assist the pre-trained model in discerning
differences between the pre-trained dataset and the target histopathology
dataset, resulting in improved performance of MIL models. We validate our
method on two publicly available datasets, Camelyon16 and TCGA-NSCLC. Extensive
experimental results demonstrate the significant performance improvement of our
method for different MIL models and backbones. Upon publication of this paper,
we will release the source code for our method.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 09:23:52 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Lin",
"Yi",
""
],
[
"Zhao",
"Zhongchen",
""
],
[
"ZHU",
"Zhengjie",
""
],
[
"Wang",
"Lisheng",
""
],
[
"Cheng",
"Kwang-Ting",
""
],
[
"Chen",
"Hao",
""
]
] | TITLE: Exploring Visual Prompts for Whole Slide Image Classification with
Multiple Instance Learning
ABSTRACT: Multiple instance learning (MIL) has emerged as a popular method for
classifying histopathology whole slide images (WSIs). However, existing
approaches typically rely on pre-trained models from large natural image
datasets, such as ImageNet, to generate instance features, which can be
sub-optimal due to the significant differences between natural images and
histopathology images that lead to a domain shift. In this paper, we present a
novel, simple yet effective method for learning domain-specific knowledge
transformation from pre-trained models to histopathology images. Our approach
entails using a prompt component to assist the pre-trained model in discerning
differences between the pre-trained dataset and the target histopathology
dataset, resulting in improved performance of MIL models. We validate our
method on two publicly available datasets, Camelyon16 and TCGA-NSCLC. Extensive
experimental results demonstrate the significant performance improvement of our
method for different MIL models and backbones. Upon publication of this paper,
we will release the source code for our method.
| no_new_dataset | 0.949809 |
2303.13131 | Yuxuan Duan | Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi
Chen | Watch Out for the Confusing Faces: Detecting Face Swapping with the
Probability Distribution of Face Identification Models | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, face swapping has been developing rapidly and achieved a surprising
reality, raising concerns about fake content. As a countermeasure, various
detection approaches have been proposed and achieved promising performance.
However, most existing detectors struggle to maintain performance on unseen
face swapping methods and low-quality images. Apart from the generalization
problem, current detection approaches have been shown vulnerable to evasion
attacks crafted by detection-aware manipulators. Lack of robustness under
adversary scenarios leaves threats for applying face swapping detection in real
world. In this paper, we propose a novel face swapping detection approach based
on face identification probability distributions, coined as IdP_FSD, to improve
the generalization and robustness. IdP_FSD is specially designed for detecting
swapped faces whose identities belong to a finite set, which is meaningful in
real-world applications. Compared with previous general detection methods, we
make use of the available real faces with concerned identities and require no
fake samples for training. IdP_FSD exploits face swapping's common nature that
the identity of swapped face combines that of two faces involved in swapping.
We reflect this nature with the confusion of a face identification model and
measure the confusion with the maximum value of the output probability
distribution. What's more, to defend our detector under adversary scenarios, an
attention-based finetuning scheme is proposed for the face identification
models used in IdP_FSD. Extensive experiments show that the proposed IdP_FSD
not only achieves high detection performance on different benchmark datasets
and image qualities but also raises the bar for manipulators to evade the
detection.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 09:33:10 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Duan",
"Yuxuan",
""
],
[
"Zhang",
"Xuhong",
""
],
[
"Yu",
"Chuer",
""
],
[
"Wang",
"Zonghui",
""
],
[
"Ji",
"Shouling",
""
],
[
"Chen",
"Wenzhi",
""
]
] | TITLE: Watch Out for the Confusing Faces: Detecting Face Swapping with the
Probability Distribution of Face Identification Models
ABSTRACT: Recently, face swapping has been developing rapidly and achieved a surprising
reality, raising concerns about fake content. As a countermeasure, various
detection approaches have been proposed and achieved promising performance.
However, most existing detectors struggle to maintain performance on unseen
face swapping methods and low-quality images. Apart from the generalization
problem, current detection approaches have been shown vulnerable to evasion
attacks crafted by detection-aware manipulators. Lack of robustness under
adversary scenarios leaves threats for applying face swapping detection in real
world. In this paper, we propose a novel face swapping detection approach based
on face identification probability distributions, coined as IdP_FSD, to improve
the generalization and robustness. IdP_FSD is specially designed for detecting
swapped faces whose identities belong to a finite set, which is meaningful in
real-world applications. Compared with previous general detection methods, we
make use of the available real faces with concerned identities and require no
fake samples for training. IdP_FSD exploits face swapping's common nature that
the identity of swapped face combines that of two faces involved in swapping.
We reflect this nature with the confusion of a face identification model and
measure the confusion with the maximum value of the output probability
distribution. What's more, to defend our detector under adversary scenarios, an
attention-based finetuning scheme is proposed for the face identification
models used in IdP_FSD. Extensive experiments show that the proposed IdP_FSD
not only achieves high detection performance on different benchmark datasets
and image qualities but also raises the bar for manipulators to evade the
detection.
| no_new_dataset | 0.946151 |
2303.13174 | Hemal Naik | Hemal Naik, Alex Hoi Hang Chan, Junran Yang, Mathilde Delacoux, Iain
D. Couzin, Fumihiro Kano, M\'at\'e Nagy | 3D-POP -- An automated annotation approach to facilitate markerless
2D-3D tracking of freely moving birds with marker-based motion capture | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Recent advances in machine learning and computer vision are revolutionizing
the field of animal behavior by enabling researchers to track the poses and
locations of freely moving animals without any marker attachment. However,
large datasets of annotated images of animals for markerless pose tracking,
especially high-resolution images taken from multiple angles with accurate 3D
annotations, are still scant. Here, we propose a method that uses a motion
capture (mo-cap) system to obtain a large amount of annotated data on animal
movement and posture (2D and 3D) in a semi-automatic manner. Our method is
novel in that it extracts the 3D positions of morphological keypoints (e.g
eyes, beak, tail) in reference to the positions of markers attached to the
animals. Using this method, we obtained, and offer here, a new dataset - 3D-POP
with approximately 300k annotated frames (4 million instances) in the form of
videos having groups of one to ten freely moving birds from 4 different camera
views in a 3.6m x 4.2m area. 3D-POP is the first dataset of flocking birds with
accurate keypoint annotations in 2D and 3D along with bounding box and
individual identities and will facilitate the development of solutions for
problems of 2D to 3D markerless pose, trajectory tracking, and identification
in birds.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 11:03:18 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Naik",
"Hemal",
""
],
[
"Chan",
"Alex Hoi Hang",
""
],
[
"Yang",
"Junran",
""
],
[
"Delacoux",
"Mathilde",
""
],
[
"Couzin",
"Iain D.",
""
],
[
"Kano",
"Fumihiro",
""
],
[
"Nagy",
"Máté",
""
]
] | TITLE: 3D-POP -- An automated annotation approach to facilitate markerless
2D-3D tracking of freely moving birds with marker-based motion capture
ABSTRACT: Recent advances in machine learning and computer vision are revolutionizing
the field of animal behavior by enabling researchers to track the poses and
locations of freely moving animals without any marker attachment. However,
large datasets of annotated images of animals for markerless pose tracking,
especially high-resolution images taken from multiple angles with accurate 3D
annotations, are still scant. Here, we propose a method that uses a motion
capture (mo-cap) system to obtain a large amount of annotated data on animal
movement and posture (2D and 3D) in a semi-automatic manner. Our method is
novel in that it extracts the 3D positions of morphological keypoints (e.g
eyes, beak, tail) in reference to the positions of markers attached to the
animals. Using this method, we obtained, and offer here, a new dataset - 3D-POP
with approximately 300k annotated frames (4 million instances) in the form of
videos having groups of one to ten freely moving birds from 4 different camera
views in a 3.6m x 4.2m area. 3D-POP is the first dataset of flocking birds with
accurate keypoint annotations in 2D and 3D along with bounding box and
individual identities and will facilitate the development of solutions for
problems of 2D to 3D markerless pose, trajectory tracking, and identification
in birds.
| new_dataset | 0.960324 |
2303.13182 | Zhengping Che | Mingze Wei, Yaomin Huang, Zhiyuan Xu, Ning Liu, Zhengping Che, Xinyu
Zhang, Chaomin Shen, Feifei Feng, Chun Shan, Jian Tang | CMG-Net: An End-to-End Contact-Based Multi-Finger Dexterous Grasping
Network | The first two authors are with equal contributions. Paper accepted by
ICRA 2023 | null | null | null | cs.RO cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a novel representation for grasping using contacts
between multi-finger robotic hands and objects to be manipulated. This
representation significantly reduces the prediction dimensions and accelerates
the learning process. We present an effective end-to-end network, CMG-Net, for
grasping unknown objects in a cluttered environment by efficiently predicting
multi-finger grasp poses and hand configurations from a single-shot point
cloud. Moreover, we create a synthetic grasp dataset that consists of five
thousand cluttered scenes, 80 object categories, and 20 million annotations. We
perform a comprehensive empirical study and demonstrate the effectiveness of
our grasping representation and CMG-Net. Our work significantly outperforms the
state-of-the-art for three-finger robotic hands. We also demonstrate that the
model trained using synthetic data performs very well for real robots.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 11:29:31 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wei",
"Mingze",
""
],
[
"Huang",
"Yaomin",
""
],
[
"Xu",
"Zhiyuan",
""
],
[
"Liu",
"Ning",
""
],
[
"Che",
"Zhengping",
""
],
[
"Zhang",
"Xinyu",
""
],
[
"Shen",
"Chaomin",
""
],
[
"Feng",
"Feifei",
""
],
[
"Shan",
"Chun",
""
],
[
"Tang",
"Jian",
""
]
] | TITLE: CMG-Net: An End-to-End Contact-Based Multi-Finger Dexterous Grasping
Network
ABSTRACT: In this paper, we propose a novel representation for grasping using contacts
between multi-finger robotic hands and objects to be manipulated. This
representation significantly reduces the prediction dimensions and accelerates
the learning process. We present an effective end-to-end network, CMG-Net, for
grasping unknown objects in a cluttered environment by efficiently predicting
multi-finger grasp poses and hand configurations from a single-shot point
cloud. Moreover, we create a synthetic grasp dataset that consists of five
thousand cluttered scenes, 80 object categories, and 20 million annotations. We
perform a comprehensive empirical study and demonstrate the effectiveness of
our grasping representation and CMG-Net. Our work significantly outperforms the
state-of-the-art for three-finger robotic hands. We also demonstrate that the
model trained using synthetic data performs very well for real robots.
| new_dataset | 0.95297 |
2303.13186 | Ziyang Lu | Ziyang Lu, Yunqiang Pei, Guoqing Wang, Yang Yang, Zheng Wang, Heng Tao
Shen | ScanERU: Interactive 3D Visual Grounding based on Embodied Reference
Understanding | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aiming to link natural language descriptions to specific regions in a 3D
scene represented as 3D point clouds, 3D visual grounding is a very fundamental
task for human-robot interaction. The recognition errors can significantly
impact the overall accuracy and then degrade the operation of AI systems.
Despite their effectiveness, existing methods suffer from the difficulty of low
recognition accuracy in cases of multiple adjacent objects with similar
appearances.To address this issue, this work intuitively introduces the
human-robot interaction as a cue to facilitate the development of 3D visual
grounding. Specifically, a new task termed Embodied Reference Understanding
(ERU) is first designed for this concern. Then a new dataset called ScanERU is
constructed to evaluate the effectiveness of this idea. Different from existing
datasets, our ScanERU is the first to cover semi-synthetic scene integration
with textual, real-world visual, and synthetic gestural information.
Additionally, this paper formulates a heuristic framework based on attention
mechanisms and human body movements to enlighten the research of ERU.
Experimental results demonstrate the superiority of the proposed method,
especially in the recognition of multiple identical objects. Our codes and
dataset are ready to be available publicly.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 11:36:14 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Lu",
"Ziyang",
""
],
[
"Pei",
"Yunqiang",
""
],
[
"Wang",
"Guoqing",
""
],
[
"Yang",
"Yang",
""
],
[
"Wang",
"Zheng",
""
],
[
"Shen",
"Heng Tao",
""
]
] | TITLE: ScanERU: Interactive 3D Visual Grounding based on Embodied Reference
Understanding
ABSTRACT: Aiming to link natural language descriptions to specific regions in a 3D
scene represented as 3D point clouds, 3D visual grounding is a very fundamental
task for human-robot interaction. The recognition errors can significantly
impact the overall accuracy and then degrade the operation of AI systems.
Despite their effectiveness, existing methods suffer from the difficulty of low
recognition accuracy in cases of multiple adjacent objects with similar
appearances.To address this issue, this work intuitively introduces the
human-robot interaction as a cue to facilitate the development of 3D visual
grounding. Specifically, a new task termed Embodied Reference Understanding
(ERU) is first designed for this concern. Then a new dataset called ScanERU is
constructed to evaluate the effectiveness of this idea. Different from existing
datasets, our ScanERU is the first to cover semi-synthetic scene integration
with textual, real-world visual, and synthetic gestural information.
Additionally, this paper formulates a heuristic framework based on attention
mechanisms and human body movements to enlighten the research of ERU.
Experimental results demonstrate the superiority of the proposed method,
especially in the recognition of multiple identical objects. Our codes and
dataset are ready to be available publicly.
| new_dataset | 0.961353 |
2303.13191 | Giorgio Terracina | Francesco Cauteruccio and Giorgio Terracina | Extended High Utility Pattern Mining: An Answer Set Programming Based
Framework and Applications | Under consideration in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting sets of relevant patterns from a given dataset is an important
challenge in data mining. The relevance of a pattern, also called utility in
the literature, is a subjective measure and can be actually assessed from very
different points of view. Rule-based languages like Answer Set Programming
(ASP) seem well suited for specifying user-provided criteria to assess pattern
utility in a form of constraints; moreover, declarativity of ASP allows for a
very easy switch between several criteria in order to analyze the dataset from
different points of view. In this paper, we make steps toward extending the
notion of High Utility Pattern Mining (HUPM); in particular we introduce a new
framework that allows for new classes of utility criteria not considered in the
previous literature. We also show how recent extensions of ASP with external
functions can support a fast and effective encoding and testing of the new
framework. To demonstrate the potential of the proposed framework, we exploit
it as a building block for the definition of an innovative method for
predicting ICU admission for COVID-19 patients. Finally, an extensive
experimental activity demonstrates both from a quantitative and a qualitative
point of view the effectiveness of the proposed approach. Under consideration
in Theory and Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 11:42:57 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Cauteruccio",
"Francesco",
""
],
[
"Terracina",
"Giorgio",
""
]
] | TITLE: Extended High Utility Pattern Mining: An Answer Set Programming Based
Framework and Applications
ABSTRACT: Detecting sets of relevant patterns from a given dataset is an important
challenge in data mining. The relevance of a pattern, also called utility in
the literature, is a subjective measure and can be actually assessed from very
different points of view. Rule-based languages like Answer Set Programming
(ASP) seem well suited for specifying user-provided criteria to assess pattern
utility in a form of constraints; moreover, declarativity of ASP allows for a
very easy switch between several criteria in order to analyze the dataset from
different points of view. In this paper, we make steps toward extending the
notion of High Utility Pattern Mining (HUPM); in particular we introduce a new
framework that allows for new classes of utility criteria not considered in the
previous literature. We also show how recent extensions of ASP with external
functions can support a fast and effective encoding and testing of the new
framework. To demonstrate the potential of the proposed framework, we exploit
it as a building block for the definition of an innovative method for
predicting ICU admission for COVID-19 patients. Finally, an extensive
experimental activity demonstrates both from a quantitative and a qualitative
point of view the effectiveness of the proposed approach. Under consideration
in Theory and Practice of Logic Programming (TPLP)
| no_new_dataset | 0.945197 |
2303.13209 | Wenqing Wang | Wenqing Wang, Yawei Luo, Zhiqing Chen, Tao Jiang, Lei Chen, Yi Yang,
Jun Xiao | Taking A Closer Look at Visual Relation: Unbiased Video Scene Graph
Generation with Decoupled Label Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current video-based scene graph generation (VidSGG) methods have been found
to perform poorly on predicting predicates that are less represented due to the
inherent biased distribution in the training data. In this paper, we take a
closer look at the predicates and identify that most visual relations (e.g.
sit_above) involve both actional pattern (sit) and spatial pattern (above),
while the distribution bias is much less severe at the pattern level. Based on
this insight, we propose a decoupled label learning (DLL) paradigm to address
the intractable visual relation prediction from the pattern-level perspective.
Specifically, DLL decouples the predicate labels and adopts separate
classifiers to learn actional and spatial patterns respectively. The patterns
are then combined and mapped back to the predicate. Moreover, we propose a
knowledge-level label decoupling method to transfer non-target knowledge from
head predicates to tail predicates within the same pattern to calibrate the
distribution of tail classes. We validate the effectiveness of DLL on the
commonly used VidSGG benchmark, i.e. VidVRD. Extensive experiments demonstrate
that the DLL offers a remarkably simple but highly effective solution to the
long-tailed problem, achieving the state-of-the-art VidSGG performance.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 12:08:10 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Wang",
"Wenqing",
""
],
[
"Luo",
"Yawei",
""
],
[
"Chen",
"Zhiqing",
""
],
[
"Jiang",
"Tao",
""
],
[
"Chen",
"Lei",
""
],
[
"Yang",
"Yi",
""
],
[
"Xiao",
"Jun",
""
]
] | TITLE: Taking A Closer Look at Visual Relation: Unbiased Video Scene Graph
Generation with Decoupled Label Learning
ABSTRACT: Current video-based scene graph generation (VidSGG) methods have been found
to perform poorly on predicting predicates that are less represented due to the
inherent biased distribution in the training data. In this paper, we take a
closer look at the predicates and identify that most visual relations (e.g.
sit_above) involve both actional pattern (sit) and spatial pattern (above),
while the distribution bias is much less severe at the pattern level. Based on
this insight, we propose a decoupled label learning (DLL) paradigm to address
the intractable visual relation prediction from the pattern-level perspective.
Specifically, DLL decouples the predicate labels and adopts separate
classifiers to learn actional and spatial patterns respectively. The patterns
are then combined and mapped back to the predicate. Moreover, we propose a
knowledge-level label decoupling method to transfer non-target knowledge from
head predicates to tail predicates within the same pattern to calibrate the
distribution of tail classes. We validate the effectiveness of DLL on the
commonly used VidSGG benchmark, i.e. VidVRD. Extensive experiments demonstrate
that the DLL offers a remarkably simple but highly effective solution to the
long-tailed problem, achieving the state-of-the-art VidSGG performance.
| no_new_dataset | 0.950824 |
2303.13220 | St\'ephane Clinchant | Vaishali Pal, Carlos Lassance, Herv\'e D\'ejean, St\'ephane Clinchant | Parameter-Efficient Sparse Retrievers and Rerankers using Adapters | accepted at ECIR'23 | null | null | null | cs.IR cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Parameter-Efficient transfer learning with Adapters have been studied in
Natural Language Processing (NLP) as an alternative to full fine-tuning.
Adapters are memory-efficient and scale well with downstream tasks by training
small bottle-neck layers added between transformer layers while keeping the
large pretrained language model (PLMs) frozen. In spite of showing promising
results in NLP, these methods are under-explored in Information Retrieval.
While previous studies have only experimented with dense retriever or in a
cross lingual retrieval scenario, in this paper we aim to complete the picture
on the use of adapters in IR. First, we study adapters for SPLADE, a sparse
retriever, for which adapters not only retain the efficiency and effectiveness
otherwise achieved by finetuning, but are memory-efficient and orders of
magnitude lighter to train. We observe that Adapters-SPLADE not only optimizes
just 2\% of training parameters, but outperforms fully fine-tuned counterpart
and existing parameter-efficient dense IR models on IR benchmark datasets.
Secondly, we address domain adaptation of neural retrieval thanks to adapters
on cross-domain BEIR datasets and TripClick. Finally, we also consider
knowledge sharing between rerankers and first stage rankers. Overall, our study
complete the examination of adapters for neural IR
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 12:34:30 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Pal",
"Vaishali",
""
],
[
"Lassance",
"Carlos",
""
],
[
"Déjean",
"Hervé",
""
],
[
"Clinchant",
"Stéphane",
""
]
] | TITLE: Parameter-Efficient Sparse Retrievers and Rerankers using Adapters
ABSTRACT: Parameter-Efficient transfer learning with Adapters have been studied in
Natural Language Processing (NLP) as an alternative to full fine-tuning.
Adapters are memory-efficient and scale well with downstream tasks by training
small bottle-neck layers added between transformer layers while keeping the
large pretrained language model (PLMs) frozen. In spite of showing promising
results in NLP, these methods are under-explored in Information Retrieval.
While previous studies have only experimented with dense retriever or in a
cross lingual retrieval scenario, in this paper we aim to complete the picture
on the use of adapters in IR. First, we study adapters for SPLADE, a sparse
retriever, for which adapters not only retain the efficiency and effectiveness
otherwise achieved by finetuning, but are memory-efficient and orders of
magnitude lighter to train. We observe that Adapters-SPLADE not only optimizes
just 2\% of training parameters, but outperforms fully fine-tuned counterpart
and existing parameter-efficient dense IR models on IR benchmark datasets.
Secondly, we address domain adaptation of neural retrieval thanks to adapters
on cross-domain BEIR datasets and TripClick. Finally, we also consider
knowledge sharing between rerankers and first stage rankers. Overall, our study
complete the examination of adapters for neural IR
| no_new_dataset | 0.951097 |
2303.13228 | Rahul Nellikkath | Rahul Nellikkath, Spyros Chatzivasileiadis | Enriching Neural Network Training Dataset to Improve Worst-Case
Performance Guarantees | arXiv admin note: text overlap with arXiv:2212.10930 | null | null | null | cs.LG cs.AI cs.SY eess.SY stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Machine learning algorithms, especially Neural Networks (NNs), are a valuable
tool used to approximate non-linear relationships, like the AC-Optimal Power
Flow (AC-OPF), with considerable accuracy -- and achieving a speedup of several
orders of magnitude when deployed for use. Often in power systems literature,
the NNs are trained with a fixed dataset generated prior to the training
process. In this paper, we show that adapting the NN training dataset during
training can improve the NN performance and substantially reduce its worst-case
violations. This paper proposes an algorithm that identifies and enriches the
training dataset with critical datapoints that reduce the worst-case violations
and deliver a neural network with improved worst-case performance guarantees.
We demonstrate the performance of our algorithm in four test power systems,
ranging from 39-buses to 162-buses.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 12:59:37 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Nellikkath",
"Rahul",
""
],
[
"Chatzivasileiadis",
"Spyros",
""
]
] | TITLE: Enriching Neural Network Training Dataset to Improve Worst-Case
Performance Guarantees
ABSTRACT: Machine learning algorithms, especially Neural Networks (NNs), are a valuable
tool used to approximate non-linear relationships, like the AC-Optimal Power
Flow (AC-OPF), with considerable accuracy -- and achieving a speedup of several
orders of magnitude when deployed for use. Often in power systems literature,
the NNs are trained with a fixed dataset generated prior to the training
process. In this paper, we show that adapting the NN training dataset during
training can improve the NN performance and substantially reduce its worst-case
violations. This paper proposes an algorithm that identifies and enriches the
training dataset with critical datapoints that reduce the worst-case violations
and deliver a neural network with improved worst-case performance guarantees.
We demonstrate the performance of our algorithm in four test power systems,
ranging from 39-buses to 162-buses.
| no_new_dataset | 0.950549 |
2303.13243 | Kai Liu | Kai Liu, Hailiang Xiong, Gangqiang Yang, Zhengfeng Du, Yewen Cao,
Danyal Shah | Pyramid Multi-branch Fusion DCNN with Multi-Head Self-Attention for
Mandarin Speech Recognition | null | null | null | null | eess.AS cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As one of the major branches of automatic speech recognition, attention-based
models greatly improves the feature representation ability of the model. In
particular, the multi-head mechanism is employed in the attention, hoping to
learn speech features of more aspects in different attention subspaces. For
speech recognition of complex languages, on the one hand, a small head size
will lead to an obvious shortage of learnable aspects. On the other hand, we
need to reduce the dimension of each subspace to keep the size of the overall
feature space unchanged when we increase the number of heads, which will
significantly weaken the ability to represent the feature of each subspace.
Therefore, this paper explores how to use a small attention subspace to
represent complete speech features while ensuring many heads. In this work we
propose a novel neural network architecture, namely, pyramid multi-branch
fusion DCNN with multi-head self-attention. The proposed architecture is
inspired by Dilated Convolution Neural Networks (DCNN), it uses multiple
branches with DCNN to extract the feature of the input speech under different
receptive fields. To reduce the number of parameters, every two branches are
merged until all the branches are merged into one. Thus, its shape is like a
pyramid rotated 90 degrees. We demonstrate that on Aishell-1, a widely used
Mandarin speech dataset, our model achieves a character error rate (CER) of
6.45% on the test sets.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 13:18:54 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Liu",
"Kai",
""
],
[
"Xiong",
"Hailiang",
""
],
[
"Yang",
"Gangqiang",
""
],
[
"Du",
"Zhengfeng",
""
],
[
"Cao",
"Yewen",
""
],
[
"Shah",
"Danyal",
""
]
] | TITLE: Pyramid Multi-branch Fusion DCNN with Multi-Head Self-Attention for
Mandarin Speech Recognition
ABSTRACT: As one of the major branches of automatic speech recognition, attention-based
models greatly improves the feature representation ability of the model. In
particular, the multi-head mechanism is employed in the attention, hoping to
learn speech features of more aspects in different attention subspaces. For
speech recognition of complex languages, on the one hand, a small head size
will lead to an obvious shortage of learnable aspects. On the other hand, we
need to reduce the dimension of each subspace to keep the size of the overall
feature space unchanged when we increase the number of heads, which will
significantly weaken the ability to represent the feature of each subspace.
Therefore, this paper explores how to use a small attention subspace to
represent complete speech features while ensuring many heads. In this work we
propose a novel neural network architecture, namely, pyramid multi-branch
fusion DCNN with multi-head self-attention. The proposed architecture is
inspired by Dilated Convolution Neural Networks (DCNN), it uses multiple
branches with DCNN to extract the feature of the input speech under different
receptive fields. To reduce the number of parameters, every two branches are
merged until all the branches are merged into one. Thus, its shape is like a
pyramid rotated 90 degrees. We demonstrate that on Aishell-1, a widely used
Mandarin speech dataset, our model achieves a character error rate (CER) of
6.45% on the test sets.
| no_new_dataset | 0.949248 |
2303.13245 | Tim Lebailly | Thomas Stegm\"uller, Tim Lebailly, Behzad Bozorgtabar, Tinne
Tuytelaars, Jean-Philippe Thiran | CrOC: Cross-View Online Clustering for Dense Visual Representation
Learning | Accepted at CVPR 2023, * denotes equal contribution | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Learning dense visual representations without labels is an arduous task and
more so from scene-centric data. We propose to tackle this challenging problem
by proposing a Cross-view consistency objective with an Online Clustering
mechanism (CrOC) to discover and segment the semantics of the views. In the
absence of hand-crafted priors, the resulting method is more generalizable and
does not require a cumbersome pre-processing step. More importantly, the
clustering algorithm conjointly operates on the features of both views, thereby
elegantly bypassing the issue of content not represented in both views and the
ambiguous matching of objects from one crop to the other. We demonstrate
excellent performance on linear and unsupervised segmentation transfer tasks on
various datasets and similarly for video object segmentation. Our code and
pre-trained models are publicly available at https://github.com/stegmuel/CrOC.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 13:24:16 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Stegmüller",
"Thomas",
""
],
[
"Lebailly",
"Tim",
""
],
[
"Bozorgtabar",
"Behzad",
""
],
[
"Tuytelaars",
"Tinne",
""
],
[
"Thiran",
"Jean-Philippe",
""
]
] | TITLE: CrOC: Cross-View Online Clustering for Dense Visual Representation
Learning
ABSTRACT: Learning dense visual representations without labels is an arduous task and
more so from scene-centric data. We propose to tackle this challenging problem
by proposing a Cross-view consistency objective with an Online Clustering
mechanism (CrOC) to discover and segment the semantics of the views. In the
absence of hand-crafted priors, the resulting method is more generalizable and
does not require a cumbersome pre-processing step. More importantly, the
clustering algorithm conjointly operates on the features of both views, thereby
elegantly bypassing the issue of content not represented in both views and the
ambiguous matching of objects from one crop to the other. We demonstrate
excellent performance on linear and unsupervised segmentation transfer tasks on
various datasets and similarly for video object segmentation. Our code and
pre-trained models are publicly available at https://github.com/stegmuel/CrOC.
| no_new_dataset | 0.950778 |
2303.13251 | Weijie Tu | Weijie Tu, Weijian Deng, Tom Gedeon and Liang Zheng | A Bag-of-Prototypes Representation for Dataset-Level Applications | CVPR 2023 camera-ready | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work investigates dataset vectorization for two dataset-level tasks:
assessing training set suitability and test set difficulty. The former measures
how suitable a training set is for a target domain, while the latter studies
how challenging a test set is for a learned model. Central to the two tasks is
measuring the underlying relationship between datasets. This needs a desirable
dataset vectorization scheme, which should preserve as much discriminative
dataset information as possible so that the distance between the resulting
dataset vectors can reflect dataset-to-dataset similarity. To this end, we
propose a bag-of-prototypes (BoP) dataset representation that extends the
image-level bag consisting of patch descriptors to dataset-level bag consisting
of semantic prototypes. Specifically, we develop a codebook consisting of K
prototypes clustered from a reference dataset. Given a dataset to be encoded,
we quantize each of its image features to a certain prototype in the codebook
and obtain a K-dimensional histogram. Without assuming access to dataset
labels, the BoP representation provides a rich characterization of the dataset
semantic distribution. Furthermore, BoP representations cooperate well with
Jensen-Shannon divergence for measuring dataset-to-dataset similarity. Although
very simple, BoP consistently shows its advantage over existing representations
on a series of benchmarks for two dataset-level tasks.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 13:33:58 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Tu",
"Weijie",
""
],
[
"Deng",
"Weijian",
""
],
[
"Gedeon",
"Tom",
""
],
[
"Zheng",
"Liang",
""
]
] | TITLE: A Bag-of-Prototypes Representation for Dataset-Level Applications
ABSTRACT: This work investigates dataset vectorization for two dataset-level tasks:
assessing training set suitability and test set difficulty. The former measures
how suitable a training set is for a target domain, while the latter studies
how challenging a test set is for a learned model. Central to the two tasks is
measuring the underlying relationship between datasets. This needs a desirable
dataset vectorization scheme, which should preserve as much discriminative
dataset information as possible so that the distance between the resulting
dataset vectors can reflect dataset-to-dataset similarity. To this end, we
propose a bag-of-prototypes (BoP) dataset representation that extends the
image-level bag consisting of patch descriptors to dataset-level bag consisting
of semantic prototypes. Specifically, we develop a codebook consisting of K
prototypes clustered from a reference dataset. Given a dataset to be encoded,
we quantize each of its image features to a certain prototype in the codebook
and obtain a K-dimensional histogram. Without assuming access to dataset
labels, the BoP representation provides a rich characterization of the dataset
semantic distribution. Furthermore, BoP representations cooperate well with
Jensen-Shannon divergence for measuring dataset-to-dataset similarity. Although
very simple, BoP consistently shows its advantage over existing representations
on a series of benchmarks for two dataset-level tasks.
| no_new_dataset | 0.939692 |
2303.13272 | Dichucheng Li | Dichucheng Li, Mingjin Che, Wenwu Meng, Yulun Wu, Yi Yu, Fan Xia, Wei
Li | Frame-Level Multi-Label Playing Technique Detection Using Multi-Scale
Network and Self-Attention Mechanism | Accepted to ICASSP 2023 | null | null | null | cs.SD cs.AI eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Instrument playing technique (IPT) is a key element of musical presentation.
However, most of the existing works for IPT detection only concern monophonic
music signals, yet little has been done to detect IPTs in polyphonic
instrumental solo pieces with overlapping IPTs or mixed IPTs. In this paper, we
formulate it as a frame-level multi-label classification problem and apply it
to Guzheng, a Chinese plucked string instrument. We create a new dataset,
Guzheng\_Tech99, containing Guzheng recordings and onset, offset, pitch, IPT
annotations of each note. Because different IPTs vary a lot in their lengths,
we propose a new method to solve this problem using multi-scale network and
self-attention. The multi-scale network extracts features from different
scales, and the self-attention mechanism applied to the feature maps at the
coarsest scale further enhances the long-range feature extraction. Our approach
outperforms existing works by a large margin, indicating its effectiveness in
IPT detection.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 13:52:42 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Li",
"Dichucheng",
""
],
[
"Che",
"Mingjin",
""
],
[
"Meng",
"Wenwu",
""
],
[
"Wu",
"Yulun",
""
],
[
"Yu",
"Yi",
""
],
[
"Xia",
"Fan",
""
],
[
"Li",
"Wei",
""
]
] | TITLE: Frame-Level Multi-Label Playing Technique Detection Using Multi-Scale
Network and Self-Attention Mechanism
ABSTRACT: Instrument playing technique (IPT) is a key element of musical presentation.
However, most of the existing works for IPT detection only concern monophonic
music signals, yet little has been done to detect IPTs in polyphonic
instrumental solo pieces with overlapping IPTs or mixed IPTs. In this paper, we
formulate it as a frame-level multi-label classification problem and apply it
to Guzheng, a Chinese plucked string instrument. We create a new dataset,
Guzheng\_Tech99, containing Guzheng recordings and onset, offset, pitch, IPT
annotations of each note. Because different IPTs vary a lot in their lengths,
we propose a new method to solve this problem using multi-scale network and
self-attention. The multi-scale network extracts features from different
scales, and the self-attention mechanism applied to the feature maps at the
coarsest scale further enhances the long-range feature extraction. Our approach
outperforms existing works by a large margin, indicating its effectiveness in
IPT detection.
| new_dataset | 0.950778 |
2303.13283 | Hantao Yao | Hantao Yao, Rui Zhang, Changsheng Xu | Visual-Language Prompt Tuning with Knowledge-guided Context Optimization | accepted by CVPR23 | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Prompt tuning is an effective way to adapt the pre-trained visual-language
model (VLM) to the downstream task using task-related textual tokens.
Representative CoOp-based work combines the learnable textual tokens with the
class tokens to obtain specific textual knowledge. However, the specific
textual knowledge is the worse generalization to the unseen classes because it
forgets the essential general textual knowledge having a strong generalization
ability. To tackle this issue, we introduce a novel Knowledge-guided Context
Optimization (KgCoOp) to enhance the generalization ability of the learnable
prompt for unseen classes. The key insight of KgCoOp is that forgetting about
essential knowledge can be alleviated by reducing the discrepancy between the
learnable prompt and the hand-crafted prompt. Especially, KgCoOp minimizes the
discrepancy between the textual embeddings generated by learned prompts and the
hand-crafted prompts. Finally, adding the KgCoOp upon the contrastive loss can
make a discriminative prompt for both seen and unseen tasks. Extensive
evaluation of several benchmarks demonstrates that the proposed
Knowledge-guided Context Optimization is an efficient method for prompt tuning,
\emph{i.e.,} achieves better performance with less training time.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 14:04:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Yao",
"Hantao",
""
],
[
"Zhang",
"Rui",
""
],
[
"Xu",
"Changsheng",
""
]
] | TITLE: Visual-Language Prompt Tuning with Knowledge-guided Context Optimization
ABSTRACT: Prompt tuning is an effective way to adapt the pre-trained visual-language
model (VLM) to the downstream task using task-related textual tokens.
Representative CoOp-based work combines the learnable textual tokens with the
class tokens to obtain specific textual knowledge. However, the specific
textual knowledge is the worse generalization to the unseen classes because it
forgets the essential general textual knowledge having a strong generalization
ability. To tackle this issue, we introduce a novel Knowledge-guided Context
Optimization (KgCoOp) to enhance the generalization ability of the learnable
prompt for unseen classes. The key insight of KgCoOp is that forgetting about
essential knowledge can be alleviated by reducing the discrepancy between the
learnable prompt and the hand-crafted prompt. Especially, KgCoOp minimizes the
discrepancy between the textual embeddings generated by learned prompts and the
hand-crafted prompts. Finally, adding the KgCoOp upon the contrastive loss can
make a discriminative prompt for both seen and unseen tasks. Extensive
evaluation of several benchmarks demonstrates that the proposed
Knowledge-guided Context Optimization is an efficient method for prompt tuning,
\emph{i.e.,} achieves better performance with less training time.
| no_new_dataset | 0.944842 |
2303.13290 | Guofeng Mei | Guofeng Mei and Hao Tang and Xiaoshui Huang and Weijie Wang and Juan
Liu and Jian Zhang and Luc Van Gool and Qiang Wu | Unsupervised Deep Probabilistic Approach for Partial Point Cloud
Registration | CVPR 2023 | null | null | null | cs.CV cs.AI math.PR | http://creativecommons.org/licenses/by/4.0/ | Deep point cloud registration methods face challenges to partial overlaps and
rely on labeled data. To address these issues, we propose UDPReg, an
unsupervised deep probabilistic registration framework for point clouds with
partial overlaps. Specifically, we first adopt a network to learn posterior
probability distributions of Gaussian mixture models (GMMs) from point clouds.
To handle partial point cloud registration, we apply the Sinkhorn algorithm to
predict the distribution-level correspondences under the constraint of the
mixing weights of GMMs. To enable unsupervised learning, we design three
distribution consistency-based losses: self-consistency, cross-consistency, and
local contrastive. The self-consistency loss is formulated by encouraging GMMs
in Euclidean and feature spaces to share identical posterior distributions. The
cross-consistency loss derives from the fact that the points of two partially
overlapping point clouds belonging to the same clusters share the cluster
centroids. The cross-consistency loss allows the network to flexibly learn a
transformation-invariant posterior distribution of two aligned point clouds.
The local contrastive loss facilitates the network to extract discriminative
local features. Our UDPReg achieves competitive performance on the
3DMatch/3DLoMatch and ModelNet/ModelLoNet benchmarks.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 14:18:06 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Mei",
"Guofeng",
""
],
[
"Tang",
"Hao",
""
],
[
"Huang",
"Xiaoshui",
""
],
[
"Wang",
"Weijie",
""
],
[
"Liu",
"Juan",
""
],
[
"Zhang",
"Jian",
""
],
[
"Van Gool",
"Luc",
""
],
[
"Wu",
"Qiang",
""
]
] | TITLE: Unsupervised Deep Probabilistic Approach for Partial Point Cloud
Registration
ABSTRACT: Deep point cloud registration methods face challenges to partial overlaps and
rely on labeled data. To address these issues, we propose UDPReg, an
unsupervised deep probabilistic registration framework for point clouds with
partial overlaps. Specifically, we first adopt a network to learn posterior
probability distributions of Gaussian mixture models (GMMs) from point clouds.
To handle partial point cloud registration, we apply the Sinkhorn algorithm to
predict the distribution-level correspondences under the constraint of the
mixing weights of GMMs. To enable unsupervised learning, we design three
distribution consistency-based losses: self-consistency, cross-consistency, and
local contrastive. The self-consistency loss is formulated by encouraging GMMs
in Euclidean and feature spaces to share identical posterior distributions. The
cross-consistency loss derives from the fact that the points of two partially
overlapping point clouds belonging to the same clusters share the cluster
centroids. The cross-consistency loss allows the network to flexibly learn a
transformation-invariant posterior distribution of two aligned point clouds.
The local contrastive loss facilitates the network to extract discriminative
local features. Our UDPReg achieves competitive performance on the
3DMatch/3DLoMatch and ModelNet/ModelLoNet benchmarks.
| no_new_dataset | 0.948346 |
2303.13293 | Ege \"Ozsoy | Ege \"Ozsoy, Tobias Czempiel, Felix Holm, Chantal Pellegrini, Nassir
Navab | LABRAD-OR: Lightweight Memory Scene Graphs for Accurate Bimodal
Reasoning in Dynamic Operating Rooms | 11 pages, 3 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern surgeries are performed in complex and dynamic settings, including
ever-changing interactions between medical staff, patients, and equipment. The
holistic modeling of the operating room (OR) is, therefore, a challenging but
essential task, with the potential to optimize the performance of surgical
teams and aid in developing new surgical technologies to improve patient
outcomes. The holistic representation of surgical scenes as semantic scene
graphs (SGG), where entities are represented as nodes and relations between
them as edges, is a promising direction for fine-grained semantic OR
understanding. We propose, for the first time, the use of temporal information
for more accurate and consistent holistic OR modeling. Specifically, we
introduce memory scene graphs, where the scene graphs of previous time steps
act as the temporal representation guiding the current prediction. We design an
end-to-end architecture that intelligently fuses the temporal information of
our lightweight memory scene graphs with the visual information from point
clouds and images. We evaluate our method on the 4D-OR dataset and demonstrate
that integrating temporality leads to more accurate and consistent results
achieving an +5% increase and a new SOTA of 0.88 in macro F1. This work opens
the path for representing the entire surgery history with memory scene graphs
and improves the holistic understanding in the OR. Introducing scene graphs as
memory representations can offer a valuable tool for many temporal
understanding tasks.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 14:26:16 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Özsoy",
"Ege",
""
],
[
"Czempiel",
"Tobias",
""
],
[
"Holm",
"Felix",
""
],
[
"Pellegrini",
"Chantal",
""
],
[
"Navab",
"Nassir",
""
]
] | TITLE: LABRAD-OR: Lightweight Memory Scene Graphs for Accurate Bimodal
Reasoning in Dynamic Operating Rooms
ABSTRACT: Modern surgeries are performed in complex and dynamic settings, including
ever-changing interactions between medical staff, patients, and equipment. The
holistic modeling of the operating room (OR) is, therefore, a challenging but
essential task, with the potential to optimize the performance of surgical
teams and aid in developing new surgical technologies to improve patient
outcomes. The holistic representation of surgical scenes as semantic scene
graphs (SGG), where entities are represented as nodes and relations between
them as edges, is a promising direction for fine-grained semantic OR
understanding. We propose, for the first time, the use of temporal information
for more accurate and consistent holistic OR modeling. Specifically, we
introduce memory scene graphs, where the scene graphs of previous time steps
act as the temporal representation guiding the current prediction. We design an
end-to-end architecture that intelligently fuses the temporal information of
our lightweight memory scene graphs with the visual information from point
clouds and images. We evaluate our method on the 4D-OR dataset and demonstrate
that integrating temporality leads to more accurate and consistent results
achieving an +5% increase and a new SOTA of 0.88 in macro F1. This work opens
the path for representing the entire surgery history with memory scene graphs
and improves the holistic understanding in the OR. Introducing scene graphs as
memory representations can offer a valuable tool for many temporal
understanding tasks.
| no_new_dataset | 0.949763 |
2303.13299 | Avi Schwarzschild | Avi Schwarzschild, Max Cembalest, Karthik Rao, Keegan Hines, John
Dickerson | Reckoning with the Disagreement Problem: Explanation Consensus as a
Training Objective | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | As neural networks increasingly make critical decisions in high-stakes
settings, monitoring and explaining their behavior in an understandable and
trustworthy manner is a necessity. One commonly used type of explainer is post
hoc feature attribution, a family of methods for giving each feature in an
input a score corresponding to its influence on a model's output. A major
limitation of this family of explainers in practice is that they can disagree
on which features are more important than others. Our contribution in this
paper is a method of training models with this disagreement problem in mind. We
do this by introducing a Post hoc Explainer Agreement Regularization (PEAR)
loss term alongside the standard term corresponding to accuracy, an additional
term that measures the difference in feature attribution between a pair of
explainers. We observe on three datasets that we can train a model with this
loss term to improve explanation consensus on unseen data, and see improved
consensus between explainers other than those used in the loss term. We examine
the trade-off between improved consensus and model performance. And finally, we
study the influence our method has on feature attribution explanations.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 14:35:37 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Schwarzschild",
"Avi",
""
],
[
"Cembalest",
"Max",
""
],
[
"Rao",
"Karthik",
""
],
[
"Hines",
"Keegan",
""
],
[
"Dickerson",
"John",
""
]
] | TITLE: Reckoning with the Disagreement Problem: Explanation Consensus as a
Training Objective
ABSTRACT: As neural networks increasingly make critical decisions in high-stakes
settings, monitoring and explaining their behavior in an understandable and
trustworthy manner is a necessity. One commonly used type of explainer is post
hoc feature attribution, a family of methods for giving each feature in an
input a score corresponding to its influence on a model's output. A major
limitation of this family of explainers in practice is that they can disagree
on which features are more important than others. Our contribution in this
paper is a method of training models with this disagreement problem in mind. We
do this by introducing a Post hoc Explainer Agreement Regularization (PEAR)
loss term alongside the standard term corresponding to accuracy, an additional
term that measures the difference in feature attribution between a pair of
explainers. We observe on three datasets that we can train a model with this
loss term to improve explanation consensus on unseen data, and see improved
consensus between explainers other than those used in the loss term. We examine
the trade-off between improved consensus and model performance. And finally, we
study the influence our method has on feature attribution explanations.
| no_new_dataset | 0.943086 |
2303.13314 | Shaina Raza Dr. | Shaina Raza and Syed Raza Bashir | Leveraging Foundation Models for Clinical Text Analysis | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Infectious diseases are a significant public health concern globally, and
extracting relevant information from scientific literature can facilitate the
development of effective prevention and treatment strategies. However, the
large amount of clinical data available presents a challenge for information
extraction. To address this challenge, this study proposes a natural language
processing (NLP) framework that uses a pre-trained transformer model fine-tuned
on task-specific data to extract key information related to infectious diseases
from free-text clinical data. The proposed framework includes three components:
a data layer for preparing datasets from clinical texts, a foundation model
layer for entity extraction, and an assessment layer for performance analysis.
The results of the evaluation indicate that the proposed method outperforms
standard methods, and leveraging prior knowledge through the pre-trained
transformer model makes it useful for investigating other infectious diseases
in the future.
| [
{
"version": "v1",
"created": "Mon, 20 Mar 2023 17:05:13 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Raza",
"Shaina",
""
],
[
"Bashir",
"Syed Raza",
""
]
] | TITLE: Leveraging Foundation Models for Clinical Text Analysis
ABSTRACT: Infectious diseases are a significant public health concern globally, and
extracting relevant information from scientific literature can facilitate the
development of effective prevention and treatment strategies. However, the
large amount of clinical data available presents a challenge for information
extraction. To address this challenge, this study proposes a natural language
processing (NLP) framework that uses a pre-trained transformer model fine-tuned
on task-specific data to extract key information related to infectious diseases
from free-text clinical data. The proposed framework includes three components:
a data layer for preparing datasets from clinical texts, a foundation model
layer for entity extraction, and an assessment layer for performance analysis.
The results of the evaluation indicate that the proposed method outperforms
standard methods, and leveraging prior knowledge through the pre-trained
transformer model makes it useful for investigating other infectious diseases
in the future.
| no_new_dataset | 0.948822 |
2303.13323 | Chaoyi Gu | Chaoyi Gu, Varuna De Silva | Deep Generative Multi-Agent Imitation Model as a Computational Benchmark
for Evaluating Human Performance in Complex Interactive Tasks: A Case Study
in Football | 8 pages, 10 figures | null | null | null | stat.ML cs.LG cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evaluating the performance of human is a common need across many
applications, such as in engineering and sports. When evaluating human
performance in completing complex and interactive tasks, the most common way is
to use a metric having been proved efficient for that context, or to use
subjective measurement techniques. However, this can be an error prone and
unreliable process since static metrics cannot capture all the complex contexts
associated with such tasks and biases exist in subjective measurement. The
objective of our research is to create data-driven AI agents as computational
benchmarks to evaluate human performance in solving difficult tasks involving
multiple humans and contextual factors. We demonstrate this within the context
of football performance analysis. We train a generative model based on
Conditional Variational Recurrent Neural Network (VRNN) Model on a large player
and ball tracking dataset. The trained model is used to imitate the
interactions between two teams and predict the performance from each team. Then
the trained Conditional VRNN Model is used as a benchmark to evaluate team
performance. The experimental results on Premier League football dataset
demonstrates the usefulness of our method to existing state-of-the-art static
metric used in football analytics.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 15:01:52 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Gu",
"Chaoyi",
""
],
[
"De Silva",
"Varuna",
""
]
] | TITLE: Deep Generative Multi-Agent Imitation Model as a Computational Benchmark
for Evaluating Human Performance in Complex Interactive Tasks: A Case Study
in Football
ABSTRACT: Evaluating the performance of human is a common need across many
applications, such as in engineering and sports. When evaluating human
performance in completing complex and interactive tasks, the most common way is
to use a metric having been proved efficient for that context, or to use
subjective measurement techniques. However, this can be an error prone and
unreliable process since static metrics cannot capture all the complex contexts
associated with such tasks and biases exist in subjective measurement. The
objective of our research is to create data-driven AI agents as computational
benchmarks to evaluate human performance in solving difficult tasks involving
multiple humans and contextual factors. We demonstrate this within the context
of football performance analysis. We train a generative model based on
Conditional Variational Recurrent Neural Network (VRNN) Model on a large player
and ball tracking dataset. The trained model is used to imitate the
interactions between two teams and predict the performance from each team. Then
the trained Conditional VRNN Model is used as a benchmark to evaluate team
performance. The experimental results on Premier League football dataset
demonstrates the usefulness of our method to existing state-of-the-art static
metric used in football analytics.
| no_new_dataset | 0.941223 |
2303.13325 | Ismail Nejjar | Ismail Nejjar and Qin Wang and Olga Fink | DARE-GRAM : Unsupervised Domain Adaptation Regression by Aligning
Inverse Gram Matrices | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unsupervised Domain Adaptation Regression (DAR) aims to bridge the domain gap
between a labeled source dataset and an unlabelled target dataset for
regression problems. Recent works mostly focus on learning a deep feature
encoder by minimizing the discrepancy between source and target features. In
this work, we present a different perspective for the DAR problem by analyzing
the closed-form ordinary least square~(OLS) solution to the linear regressor in
the deep domain adaptation context. Rather than aligning the original feature
embedding space, we propose to align the inverse Gram matrix of the features,
which is motivated by its presence in the OLS solution and the Gram matrix's
ability to capture the feature correlations. Specifically, we propose a simple
yet effective DAR method which leverages the pseudo-inverse low-rank property
to align the scale and angle in a selected subspace generated by the
pseudo-inverse Gram matrix of the two domains. We evaluate our method on three
domain adaptation regression benchmarks. Experimental results demonstrate that
our method achieves state-of-the-art performance. Our code is available at
https://github.com/ismailnejjar/DARE-GRAM.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 15:04:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Nejjar",
"Ismail",
""
],
[
"Wang",
"Qin",
""
],
[
"Fink",
"Olga",
""
]
] | TITLE: DARE-GRAM : Unsupervised Domain Adaptation Regression by Aligning
Inverse Gram Matrices
ABSTRACT: Unsupervised Domain Adaptation Regression (DAR) aims to bridge the domain gap
between a labeled source dataset and an unlabelled target dataset for
regression problems. Recent works mostly focus on learning a deep feature
encoder by minimizing the discrepancy between source and target features. In
this work, we present a different perspective for the DAR problem by analyzing
the closed-form ordinary least square~(OLS) solution to the linear regressor in
the deep domain adaptation context. Rather than aligning the original feature
embedding space, we propose to align the inverse Gram matrix of the features,
which is motivated by its presence in the OLS solution and the Gram matrix's
ability to capture the feature correlations. Specifically, we propose a simple
yet effective DAR method which leverages the pseudo-inverse low-rank property
to align the scale and angle in a selected subspace generated by the
pseudo-inverse Gram matrix of the two domains. We evaluate our method on three
domain adaptation regression benchmarks. Experimental results demonstrate that
our method achieves state-of-the-art performance. Our code is available at
https://github.com/ismailnejjar/DARE-GRAM.
| no_new_dataset | 0.944022 |
2303.13340 | Idan Glassberg | Idan Glassberg, Tom Hope | Increasing Textual Context Size Boosts Medical Image-Text Matching | null | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short technical report demonstrates a simple technique that yields state
of the art results in medical image-text matching tasks. We analyze the use of
OpenAI's CLIP, a general image-text matching model, and observe that CLIP's
limited textual input size has negative impact on downstream performance in the
medical domain where encoding longer textual contexts is often required. We
thus train and release ClipMD, which is trained with a simple sliding window
technique to encode textual captions. ClipMD was tested on two medical
image-text datasets and compared with other image-text matching models. The
results show that ClipMD outperforms other models on both datasets by a large
margin. We make our code and pretrained model publicly available.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 15:20:05 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Glassberg",
"Idan",
""
],
[
"Hope",
"Tom",
""
]
] | TITLE: Increasing Textual Context Size Boosts Medical Image-Text Matching
ABSTRACT: This short technical report demonstrates a simple technique that yields state
of the art results in medical image-text matching tasks. We analyze the use of
OpenAI's CLIP, a general image-text matching model, and observe that CLIP's
limited textual input size has negative impact on downstream performance in the
medical domain where encoding longer textual contexts is often required. We
thus train and release ClipMD, which is trained with a simple sliding window
technique to encode textual captions. ClipMD was tested on two medical
image-text datasets and compared with other image-text matching models. The
results show that ClipMD outperforms other models on both datasets by a large
margin. We make our code and pretrained model publicly available.
| no_new_dataset | 0.953144 |
2303.13355 | Son Tran | Son Quoc Tran, Phong Nguyen-Thuan Do, Kiet Van Nguyen, Ngan Luu-Thuy
Nguyen | Revealing Weaknesses of Vietnamese Language Models Through Unanswerable
Questions in Machine Reading Comprehension | Accepted at The 2023 EACL Student Research Workshop | null | null | null | cs.CL cs.AI | http://creativecommons.org/publicdomain/zero/1.0/ | Although the curse of multilinguality significantly restricts the language
abilities of multilingual models in monolingual settings, researchers now still
have to rely on multilingual models to develop state-of-the-art systems in
Vietnamese Machine Reading Comprehension. This difficulty in researching is
because of the limited number of high-quality works in developing Vietnamese
language models. In order to encourage more work in this research field, we
present a comprehensive analysis of language weaknesses and strengths of
current Vietnamese monolingual models using the downstream task of Machine
Reading Comprehension. From the analysis results, we suggest new directions for
developing Vietnamese language models. Besides this main contribution, we also
successfully reveal the existence of artifacts in Vietnamese Machine Reading
Comprehension benchmarks and suggest an urgent need for new high-quality
benchmarks to track the progress of Vietnamese Machine Reading Comprehension.
Moreover, we also introduced a minor but valuable modification to the process
of annotating unanswerable questions for Machine Reading Comprehension from
previous work. Our proposed modification helps improve the quality of
unanswerable questions to a higher level of difficulty for Machine Reading
Comprehension systems to solve.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2023 20:32:58 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Tran",
"Son Quoc",
""
],
[
"Do",
"Phong Nguyen-Thuan",
""
],
[
"Van Nguyen",
"Kiet",
""
],
[
"Nguyen",
"Ngan Luu-Thuy",
""
]
] | TITLE: Revealing Weaknesses of Vietnamese Language Models Through Unanswerable
Questions in Machine Reading Comprehension
ABSTRACT: Although the curse of multilinguality significantly restricts the language
abilities of multilingual models in monolingual settings, researchers now still
have to rely on multilingual models to develop state-of-the-art systems in
Vietnamese Machine Reading Comprehension. This difficulty in researching is
because of the limited number of high-quality works in developing Vietnamese
language models. In order to encourage more work in this research field, we
present a comprehensive analysis of language weaknesses and strengths of
current Vietnamese monolingual models using the downstream task of Machine
Reading Comprehension. From the analysis results, we suggest new directions for
developing Vietnamese language models. Besides this main contribution, we also
successfully reveal the existence of artifacts in Vietnamese Machine Reading
Comprehension benchmarks and suggest an urgent need for new high-quality
benchmarks to track the progress of Vietnamese Machine Reading Comprehension.
Moreover, we also introduced a minor but valuable modification to the process
of annotating unanswerable questions for Machine Reading Comprehension from
previous work. Our proposed modification helps improve the quality of
unanswerable questions to a higher level of difficulty for Machine Reading
Comprehension systems to solve.
| no_new_dataset | 0.943034 |
2303.13357 | Ce Zheng | Ce Zheng, Xianpeng Liu, Guo-Jun Qi, Chen Chen | POTTER: Pooling Attention Transformer for Efficient Human Mesh Recovery | CVPR 2023 | null | null | null | cs.CV cs.AI cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer architectures have achieved SOTA performance on the human mesh
recovery (HMR) from monocular images. However, the performance gain has come at
the cost of substantial memory and computational overhead. A lightweight and
efficient model to reconstruct accurate human mesh is needed for real-world
applications. In this paper, we propose a pure transformer architecture named
POoling aTtention TransformER (POTTER) for the HMR task from single images.
Observing that the conventional attention module is memory and computationally
expensive, we propose an efficient pooling attention module, which
significantly reduces the memory and computational cost without sacrificing
performance. Furthermore, we design a new transformer architecture by
integrating a High-Resolution (HR) stream for the HMR task. The high-resolution
local and global features from the HR stream can be utilized for recovering
more accurate human mesh. Our POTTER outperforms the SOTA method METRO by only
requiring 7% of total parameters and 14% of the Multiply-Accumulate Operations
on the Human3.6M (PA-MPJPE metric) and 3DPW (all three metrics) datasets. The
project webpage is https://zczcwh.github.io/potter_page.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 15:36:12 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Zheng",
"Ce",
""
],
[
"Liu",
"Xianpeng",
""
],
[
"Qi",
"Guo-Jun",
""
],
[
"Chen",
"Chen",
""
]
] | TITLE: POTTER: Pooling Attention Transformer for Efficient Human Mesh Recovery
ABSTRACT: Transformer architectures have achieved SOTA performance on the human mesh
recovery (HMR) from monocular images. However, the performance gain has come at
the cost of substantial memory and computational overhead. A lightweight and
efficient model to reconstruct accurate human mesh is needed for real-world
applications. In this paper, we propose a pure transformer architecture named
POoling aTtention TransformER (POTTER) for the HMR task from single images.
Observing that the conventional attention module is memory and computationally
expensive, we propose an efficient pooling attention module, which
significantly reduces the memory and computational cost without sacrificing
performance. Furthermore, we design a new transformer architecture by
integrating a High-Resolution (HR) stream for the HMR task. The high-resolution
local and global features from the HR stream can be utilized for recovering
more accurate human mesh. Our POTTER outperforms the SOTA method METRO by only
requiring 7% of total parameters and 14% of the Multiply-Accumulate Operations
on the Human3.6M (PA-MPJPE metric) and 3DPW (all three metrics) datasets. The
project webpage is https://zczcwh.github.io/potter_page.
| no_new_dataset | 0.947624 |
2303.13360 | Alan Chan | Alan Chan, Maxime Rich\'e, Jesse Clifton | Towards the Scalable Evaluation of Cooperativeness in Language Models | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is likely that AI systems driven by pre-trained language models (PLMs)
will increasingly be used to assist humans in high-stakes interactions with
other agents, such as negotiation or conflict resolution. Consistent with the
goals of Cooperative AI \citep{dafoe_open_2020}, we wish to understand and
shape the multi-agent behaviors of PLMs in a pro-social manner. An important
first step is the evaluation of model behaviour across diverse cooperation
problems. Since desired behaviour in an interaction depends upon precise
game-theoretic structure, we focus on generating scenarios with particular
structures with both crowdworkers and a language model. Our work proceeds as
follows. First, we discuss key methodological issues in the generation of
scenarios corresponding to particular game-theoretic structures. Second, we
employ both crowdworkers and a language model to generate such scenarios. We
find that the quality of generations tends to be mediocre in both cases. We
additionally get both crowdworkers and a language model to judge whether given
scenarios align with their intended game-theoretic structure, finding mixed
results depending on the game. Third, we provide a dataset of scenario based on
our data generated. We provide both quantitative and qualitative evaluations of
UnifiedQA and GPT-3 on this dataset. We find that instruct-tuned models tend to
act in a way that could be perceived as cooperative when scaled up, while other
models seemed to have flat scaling trends.
| [
{
"version": "v1",
"created": "Thu, 16 Mar 2023 15:34:23 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Chan",
"Alan",
""
],
[
"Riché",
"Maxime",
""
],
[
"Clifton",
"Jesse",
""
]
] | TITLE: Towards the Scalable Evaluation of Cooperativeness in Language Models
ABSTRACT: It is likely that AI systems driven by pre-trained language models (PLMs)
will increasingly be used to assist humans in high-stakes interactions with
other agents, such as negotiation or conflict resolution. Consistent with the
goals of Cooperative AI \citep{dafoe_open_2020}, we wish to understand and
shape the multi-agent behaviors of PLMs in a pro-social manner. An important
first step is the evaluation of model behaviour across diverse cooperation
problems. Since desired behaviour in an interaction depends upon precise
game-theoretic structure, we focus on generating scenarios with particular
structures with both crowdworkers and a language model. Our work proceeds as
follows. First, we discuss key methodological issues in the generation of
scenarios corresponding to particular game-theoretic structures. Second, we
employ both crowdworkers and a language model to generate such scenarios. We
find that the quality of generations tends to be mediocre in both cases. We
additionally get both crowdworkers and a language model to judge whether given
scenarios align with their intended game-theoretic structure, finding mixed
results depending on the game. Third, we provide a dataset of scenario based on
our data generated. We provide both quantitative and qualitative evaluations of
UnifiedQA and GPT-3 on this dataset. We find that instruct-tuned models tend to
act in a way that could be perceived as cooperative when scaled up, while other
models seemed to have flat scaling trends.
| new_dataset | 0.966632 |
2303.13364 | Moeen Mostafavi | Moeen Mostafavi, Michael D. Porter | Reevaluating Data Partitioning for Emotion Detection in EmoWOZ | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the EmoWoz dataset, an extension of MultiWOZ that
provides emotion labels for the dialogues. MultiWOZ was partitioned initially
for another purpose, resulting in a distributional shift when considering the
new purpose of emotion recognition. The emotion tags in EmoWoz are highly
imbalanced and unevenly distributed across the partitions, which causes
sub-optimal performance and poor comparison of models. We propose a stratified
sampling scheme based on emotion tags to address this issue, improve the
dataset's distribution, and reduce dataset shift. We also introduce a special
technique to handle conversation (sequential) data with many emotional tags.
Using our proposed sampling method, models built upon EmoWoz can perform
better, making it a more reliable resource for training conversational agents
with emotional intelligence. We recommend that future researchers use this new
partitioning to ensure consistent and accurate performance evaluations.
| [
{
"version": "v1",
"created": "Wed, 15 Mar 2023 03:06:13 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Mostafavi",
"Moeen",
""
],
[
"Porter",
"Michael D.",
""
]
] | TITLE: Reevaluating Data Partitioning for Emotion Detection in EmoWOZ
ABSTRACT: This paper focuses on the EmoWoz dataset, an extension of MultiWOZ that
provides emotion labels for the dialogues. MultiWOZ was partitioned initially
for another purpose, resulting in a distributional shift when considering the
new purpose of emotion recognition. The emotion tags in EmoWoz are highly
imbalanced and unevenly distributed across the partitions, which causes
sub-optimal performance and poor comparison of models. We propose a stratified
sampling scheme based on emotion tags to address this issue, improve the
dataset's distribution, and reduce dataset shift. We also introduce a special
technique to handle conversation (sequential) data with many emotional tags.
Using our proposed sampling method, models built upon EmoWoz can perform
better, making it a more reliable resource for training conversational agents
with emotional intelligence. We recommend that future researchers use this new
partitioning to ensure consistent and accurate performance evaluations.
| no_new_dataset | 0.929696 |
2303.13365 | Chenghua Lin | Shekoufeh Kolahdouz-Rahimi, Kevin Lano, Chenghua Lin | Requirement Formalisation using Natural Language Processing and Machine
Learning: A Systematic Review | null | null | null | null | cs.CL cs.AI cs.LG cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Improvement of software development methodologies attracts developers to
automatic Requirement Formalisation (RF) in the Requirement Engineering (RE)
field. The potential advantages by applying Natural Language Processing (NLP)
and Machine Learning (ML) in reducing the ambiguity and incompleteness of
requirement written in natural languages is reported in different studies. The
goal of this paper is to survey and classify existing work on NLP and ML for
RF, identifying challenges in this domain and providing promising future
research directions. To achieve this, we conducted a systematic literature
review to outline the current state-of-the-art of NLP and ML techniques in RF
by selecting 257 papers from common used libraries. The search result is
filtered by defining inclusion and exclusion criteria and 47 relevant studies
between 2012 and 2022 are selected. We found that heuristic NLP approaches are
the most common NLP techniques used for automatic RF, primary operating on
structured and semi-structured data. This study also revealed that Deep
Learning (DL) technique are not widely used, instead classical ML techniques
are predominant in the surveyed studies. More importantly, we identified the
difficulty of comparing the performance of different approaches due to the lack
of standard benchmark cases for RF.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2023 17:36:21 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Kolahdouz-Rahimi",
"Shekoufeh",
""
],
[
"Lano",
"Kevin",
""
],
[
"Lin",
"Chenghua",
""
]
] | TITLE: Requirement Formalisation using Natural Language Processing and Machine
Learning: A Systematic Review
ABSTRACT: Improvement of software development methodologies attracts developers to
automatic Requirement Formalisation (RF) in the Requirement Engineering (RE)
field. The potential advantages by applying Natural Language Processing (NLP)
and Machine Learning (ML) in reducing the ambiguity and incompleteness of
requirement written in natural languages is reported in different studies. The
goal of this paper is to survey and classify existing work on NLP and ML for
RF, identifying challenges in this domain and providing promising future
research directions. To achieve this, we conducted a systematic literature
review to outline the current state-of-the-art of NLP and ML techniques in RF
by selecting 257 papers from common used libraries. The search result is
filtered by defining inclusion and exclusion criteria and 47 relevant studies
between 2012 and 2022 are selected. We found that heuristic NLP approaches are
the most common NLP techniques used for automatic RF, primary operating on
structured and semi-structured data. This study also revealed that Deep
Learning (DL) technique are not widely used, instead classical ML techniques
are predominant in the surveyed studies. More importantly, we identified the
difficulty of comparing the performance of different approaches due to the lack
of standard benchmark cases for RF.
| no_new_dataset | 0.946151 |
2303.13412 | Yi Huang | Yi Huang, Xiaoguang Tu, Gui Fu, Tingting Liu, Bokai Liu, Ming Yang,
Ziliang Feng | Low-Light Image Enhancement by Learning Contrastive Representations in
Spatial and Frequency Domains | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Images taken under low-light conditions tend to suffer from poor visibility,
which can decrease image quality and even reduce the performance of the
downstream tasks. It is hard for a CNN-based method to learn generalized
features that can recover normal images from the ones under various unknow
low-light conditions. In this paper, we propose to incorporate the contrastive
learning into an illumination correction network to learn abstract
representations to distinguish various low-light conditions in the
representation space, with the purpose of enhancing the generalizability of the
network. Considering that light conditions can change the frequency components
of the images, the representations are learned and compared in both spatial and
frequency domains to make full advantage of the contrastive learning. The
proposed method is evaluated on LOL and LOL-V2 datasets, the results show that
the proposed method achieves better qualitative and quantitative results
compared with other state-of-the-arts.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 16:32:49 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Huang",
"Yi",
""
],
[
"Tu",
"Xiaoguang",
""
],
[
"Fu",
"Gui",
""
],
[
"Liu",
"Tingting",
""
],
[
"Liu",
"Bokai",
""
],
[
"Yang",
"Ming",
""
],
[
"Feng",
"Ziliang",
""
]
] | TITLE: Low-Light Image Enhancement by Learning Contrastive Representations in
Spatial and Frequency Domains
ABSTRACT: Images taken under low-light conditions tend to suffer from poor visibility,
which can decrease image quality and even reduce the performance of the
downstream tasks. It is hard for a CNN-based method to learn generalized
features that can recover normal images from the ones under various unknow
low-light conditions. In this paper, we propose to incorporate the contrastive
learning into an illumination correction network to learn abstract
representations to distinguish various low-light conditions in the
representation space, with the purpose of enhancing the generalizability of the
network. Considering that light conditions can change the frequency components
of the images, the representations are learned and compared in both spatial and
frequency domains to make full advantage of the contrastive learning. The
proposed method is evaluated on LOL and LOL-V2 datasets, the results show that
the proposed method achieves better qualitative and quantitative results
compared with other state-of-the-arts.
| no_new_dataset | 0.947235 |
2303.13419 | Benyou Wang | Juhao Liang, Chen Zhang, Zhengyang Tang, Jie Fu, Dawei Song, Benyou
Wang | Modular Retrieval for Generalization and Interpretation | preprint | null | null | null | cs.IR | http://creativecommons.org/licenses/by/4.0/ | New retrieval tasks have always been emerging, thus urging the development of
new retrieval models. However, instantiating a retrieval model for each new
retrieval task is resource-intensive and time-consuming, especially for a
retrieval model that employs a large-scale pre-trained language model. To
address this issue, we shift to a novel retrieval paradigm called modular
retrieval, which aims to solve new retrieval tasks by instead composing
multiple existing retrieval modules. Built upon the paradigm, we propose a
retrieval model with modular prompt tuning named REMOP. It constructs retrieval
modules subject to task attributes with deep prompt tuning, and yields
retrieval models subject to tasks with module composition. We validate that,
REMOP inherently with modularity not only has appealing generalizability and
interpretability in preliminary explorations, but also achieves comparable
performance to state-of-the-art retrieval models on a zero-shot retrieval
benchmark.\footnote{Our code is available at
\url{https://github.com/FreedomIntelligence/REMOP}}
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 16:40:00 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Liang",
"Juhao",
""
],
[
"Zhang",
"Chen",
""
],
[
"Tang",
"Zhengyang",
""
],
[
"Fu",
"Jie",
""
],
[
"Song",
"Dawei",
""
],
[
"Wang",
"Benyou",
""
]
] | TITLE: Modular Retrieval for Generalization and Interpretation
ABSTRACT: New retrieval tasks have always been emerging, thus urging the development of
new retrieval models. However, instantiating a retrieval model for each new
retrieval task is resource-intensive and time-consuming, especially for a
retrieval model that employs a large-scale pre-trained language model. To
address this issue, we shift to a novel retrieval paradigm called modular
retrieval, which aims to solve new retrieval tasks by instead composing
multiple existing retrieval modules. Built upon the paradigm, we propose a
retrieval model with modular prompt tuning named REMOP. It constructs retrieval
modules subject to task attributes with deep prompt tuning, and yields
retrieval models subject to tasks with module composition. We validate that,
REMOP inherently with modularity not only has appealing generalizability and
interpretability in preliminary explorations, but also achieves comparable
performance to state-of-the-art retrieval models on a zero-shot retrieval
benchmark.\footnote{Our code is available at
\url{https://github.com/FreedomIntelligence/REMOP}}
| no_new_dataset | 0.946547 |
2303.13439 | Roberto Henschel | Levon Khachatryan, Andranik Movsisyan, Vahram Tadevosyan, Roberto
Henschel, Zhangyang Wang, Shant Navasardyan, Humphrey Shi | Text2Video-Zero: Text-to-Image Diffusion Models are Zero-Shot Video
Generators | The project is available at:
https://github.com/Picsart-AI-Research/Text2Video-Zero | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent text-to-video generation approaches rely on computationally heavy
training and require large-scale video datasets. In this paper, we introduce a
new task of zero-shot text-to-video generation and propose a low-cost approach
(without any training or optimization) by leveraging the power of existing
text-to-image synthesis methods (e.g., Stable Diffusion), making them suitable
for the video domain.
Our key modifications include (i) enriching the latent codes of the generated
frames with motion dynamics to keep the global scene and the background time
consistent; and (ii) reprogramming frame-level self-attention using a new
cross-frame attention of each frame on the first frame, to preserve the
context, appearance, and identity of the foreground object.
Experiments show that this leads to low overhead, yet high-quality and
remarkably consistent video generation. Moreover, our approach is not limited
to text-to-video synthesis but is also applicable to other tasks such as
conditional and content-specialized video generation, and Video
Instruct-Pix2Pix, i.e., instruction-guided video editing.
As experiments show, our method performs comparably or sometimes better than
recent approaches, despite not being trained on additional video data. Our code
will be open sourced at: https://github.com/Picsart-AI-Research/Text2Video-Zero .
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:01:59 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Khachatryan",
"Levon",
""
],
[
"Movsisyan",
"Andranik",
""
],
[
"Tadevosyan",
"Vahram",
""
],
[
"Henschel",
"Roberto",
""
],
[
"Wang",
"Zhangyang",
""
],
[
"Navasardyan",
"Shant",
""
],
[
"Shi",
"Humphrey",
""
]
] | TITLE: Text2Video-Zero: Text-to-Image Diffusion Models are Zero-Shot Video
Generators
ABSTRACT: Recent text-to-video generation approaches rely on computationally heavy
training and require large-scale video datasets. In this paper, we introduce a
new task of zero-shot text-to-video generation and propose a low-cost approach
(without any training or optimization) by leveraging the power of existing
text-to-image synthesis methods (e.g., Stable Diffusion), making them suitable
for the video domain.
Our key modifications include (i) enriching the latent codes of the generated
frames with motion dynamics to keep the global scene and the background time
consistent; and (ii) reprogramming frame-level self-attention using a new
cross-frame attention of each frame on the first frame, to preserve the
context, appearance, and identity of the foreground object.
Experiments show that this leads to low overhead, yet high-quality and
remarkably consistent video generation. Moreover, our approach is not limited
to text-to-video synthesis but is also applicable to other tasks such as
conditional and content-specialized video generation, and Video
Instruct-Pix2Pix, i.e., instruction-guided video editing.
As experiments show, our method performs comparably or sometimes better than
recent approaches, despite not being trained on additional video data. Our code
will be open sourced at: https://github.com/Picsart-AI-Research/Text2Video-Zero .
| no_new_dataset | 0.951504 |
2303.13451 | Xavier Tannier | Xavier Tannier, Perceval Wajsb\"urt, Alice Calliger, Basile Dura,
Alexandre Mouchet, Martin Hilka, Romain Bey | Development and validation of a natural language processing algorithm to
pseudonymize documents in the context of a clinical data warehouse | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The objective of this study is to address the critical issue of
de-identification of clinical reports in order to allow access to data for
research purposes, while ensuring patient privacy. The study highlights the
difficulties faced in sharing tools and resources in this domain and presents
the experience of the Greater Paris University Hospitals (AP-HP) in
implementing a systematic pseudonymization of text documents from its Clinical
Data Warehouse. We annotated a corpus of clinical documents according to 12
types of identifying entities, and built a hybrid system, merging the results
of a deep learning model as well as manual rules. Our results show an overall
performance of 0.99 of F1-score. We discuss implementation choices and present
experiments to better understand the effort involved in such a task, including
dataset size, document types, language models, or rule addition. We share
guidelines and code under a 3-Clause BSD license.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:17:46 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Tannier",
"Xavier",
""
],
[
"Wajsbürt",
"Perceval",
""
],
[
"Calliger",
"Alice",
""
],
[
"Dura",
"Basile",
""
],
[
"Mouchet",
"Alexandre",
""
],
[
"Hilka",
"Martin",
""
],
[
"Bey",
"Romain",
""
]
] | TITLE: Development and validation of a natural language processing algorithm to
pseudonymize documents in the context of a clinical data warehouse
ABSTRACT: The objective of this study is to address the critical issue of
de-identification of clinical reports in order to allow access to data for
research purposes, while ensuring patient privacy. The study highlights the
difficulties faced in sharing tools and resources in this domain and presents
the experience of the Greater Paris University Hospitals (AP-HP) in
implementing a systematic pseudonymization of text documents from its Clinical
Data Warehouse. We annotated a corpus of clinical documents according to 12
types of identifying entities, and built a hybrid system, merging the results
of a deep learning model as well as manual rules. Our results show an overall
performance of 0.99 of F1-score. We discuss implementation choices and present
experiments to better understand the effort involved in such a task, including
dataset size, document types, language models, or rule addition. We share
guidelines and code under a 3-Clause BSD license.
| no_new_dataset | 0.944944 |
2303.13471 | Chao Huang | Chao Huang, Yapeng Tian, Anurag Kumar, Chenliang Xu | Egocentric Audio-Visual Object Localization | Accepted by CVPR 2023 | null | null | null | cs.CV cs.MM cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Humans naturally perceive surrounding scenes by unifying sound and sight in a
first-person view. Likewise, machines are advanced to approach human
intelligence by learning with multisensory inputs from an egocentric
perspective. In this paper, we explore the challenging egocentric audio-visual
object localization task and observe that 1) egomotion commonly exists in
first-person recordings, even within a short duration; 2) The out-of-view sound
components can be created while wearers shift their attention. To address the
first problem, we propose a geometry-aware temporal aggregation module to
handle the egomotion explicitly. The effect of egomotion is mitigated by
estimating the temporal geometry transformation and exploiting it to update
visual representations. Moreover, we propose a cascaded feature enhancement
module to tackle the second issue. It improves cross-modal localization
robustness by disentangling visually-indicated audio representation. During
training, we take advantage of the naturally available audio-visual temporal
synchronization as the ``free'' self-supervision to avoid costly labeling. We
also annotate and create the Epic Sounding Object dataset for evaluation
purposes. Extensive experiments show that our method achieves state-of-the-art
localization performance in egocentric videos and can be generalized to diverse
audio-visual scenes.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:43:11 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Huang",
"Chao",
""
],
[
"Tian",
"Yapeng",
""
],
[
"Kumar",
"Anurag",
""
],
[
"Xu",
"Chenliang",
""
]
] | TITLE: Egocentric Audio-Visual Object Localization
ABSTRACT: Humans naturally perceive surrounding scenes by unifying sound and sight in a
first-person view. Likewise, machines are advanced to approach human
intelligence by learning with multisensory inputs from an egocentric
perspective. In this paper, we explore the challenging egocentric audio-visual
object localization task and observe that 1) egomotion commonly exists in
first-person recordings, even within a short duration; 2) The out-of-view sound
components can be created while wearers shift their attention. To address the
first problem, we propose a geometry-aware temporal aggregation module to
handle the egomotion explicitly. The effect of egomotion is mitigated by
estimating the temporal geometry transformation and exploiting it to update
visual representations. Moreover, we propose a cascaded feature enhancement
module to tackle the second issue. It improves cross-modal localization
robustness by disentangling visually-indicated audio representation. During
training, we take advantage of the naturally available audio-visual temporal
synchronization as the ``free'' self-supervision to avoid costly labeling. We
also annotate and create the Epic Sounding Object dataset for evaluation
purposes. Extensive experiments show that our method achieves state-of-the-art
localization performance in egocentric videos and can be generalized to diverse
audio-visual scenes.
| no_new_dataset | 0.92657 |
2303.13483 | Joy Hsu | Joy Hsu, Jiayuan Mao, Jiajun Wu | NS3D: Neuro-Symbolic Grounding of 3D Objects and Relations | In CVPR 2023 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Grounding object properties and relations in 3D scenes is a prerequisite for
a wide range of artificial intelligence tasks, such as visually grounded
dialogues and embodied manipulation. However, the variability of the 3D domain
induces two fundamental challenges: 1) the expense of labeling and 2) the
complexity of 3D grounded language. Hence, essential desiderata for models are
to be data-efficient, generalize to different data distributions and tasks with
unseen semantic forms, as well as ground complex language semantics (e.g.,
view-point anchoring and multi-object reference). To address these challenges,
we propose NS3D, a neuro-symbolic framework for 3D grounding. NS3D translates
language into programs with hierarchical structures by leveraging large
language-to-code models. Different functional modules in the programs are
implemented as neural networks. Notably, NS3D extends prior neuro-symbolic
visual reasoning methods by introducing functional modules that effectively
reason about high-arity relations (i.e., relations among more than two
objects), key in disambiguating objects in complex 3D scenes. Modular and
compositional architecture enables NS3D to achieve state-of-the-art results on
the ReferIt3D view-dependence task, a 3D referring expression comprehension
benchmark. Importantly, NS3D shows significantly improved performance on
settings of data-efficiency and generalization, and demonstrate zero-shot
transfer to an unseen 3D question-answering task.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:50:40 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Hsu",
"Joy",
""
],
[
"Mao",
"Jiayuan",
""
],
[
"Wu",
"Jiajun",
""
]
] | TITLE: NS3D: Neuro-Symbolic Grounding of 3D Objects and Relations
ABSTRACT: Grounding object properties and relations in 3D scenes is a prerequisite for
a wide range of artificial intelligence tasks, such as visually grounded
dialogues and embodied manipulation. However, the variability of the 3D domain
induces two fundamental challenges: 1) the expense of labeling and 2) the
complexity of 3D grounded language. Hence, essential desiderata for models are
to be data-efficient, generalize to different data distributions and tasks with
unseen semantic forms, as well as ground complex language semantics (e.g.,
view-point anchoring and multi-object reference). To address these challenges,
we propose NS3D, a neuro-symbolic framework for 3D grounding. NS3D translates
language into programs with hierarchical structures by leveraging large
language-to-code models. Different functional modules in the programs are
implemented as neural networks. Notably, NS3D extends prior neuro-symbolic
visual reasoning methods by introducing functional modules that effectively
reason about high-arity relations (i.e., relations among more than two
objects), key in disambiguating objects in complex 3D scenes. Modular and
compositional architecture enables NS3D to achieve state-of-the-art results on
the ReferIt3D view-dependence task, a 3D referring expression comprehension
benchmark. Importantly, NS3D shows significantly improved performance on
settings of data-efficiency and generalization, and demonstrate zero-shot
transfer to an unseen 3D question-answering task.
| no_new_dataset | 0.938857 |
2303.13500 | Puja Trivedi | Puja Trivedi, Danai Koutra, Jayaraman J. Thiagarajan | A Closer Look at Model Adaptation using Feature Distortion and
Simplicity Bias | Accepted to ICLR 2023 as notable-25% (spotlight) | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advances in the expressivity of pretrained models have increased interest in
the design of adaptation protocols which enable safe and effective transfer
learning. Going beyond conventional linear probing (LP) and fine tuning (FT)
strategies, protocols that can effectively control feature distortion, i.e.,
the failure to update features orthogonal to the in-distribution, have been
found to achieve improved out-of-distribution generalization (OOD). In order to
limit this distortion, the LP+FT protocol, which first learns a linear probe
and then uses this initialization for subsequent FT, was proposed. However, in
this paper, we find when adaptation protocols (LP, FT, LP+FT) are also
evaluated on a variety of safety objectives (e.g., calibration, robustness,
etc.), a complementary perspective to feature distortion is helpful to explain
protocol behavior. To this end, we study the susceptibility of protocols to
simplicity bias (SB), i.e. the well-known propensity of deep neural networks to
rely upon simple features, as SB has recently been shown to underlie several
problems in robust generalization. Using a synthetic dataset, we demonstrate
the susceptibility of existing protocols to SB. Given the strong effectiveness
of LP+FT, we then propose modified linear probes that help mitigate SB, and
lead to better initializations for subsequent FT. We verify the effectiveness
of the proposed LP+FT variants for decreasing SB in a controlled setting, and
their ability to improve OOD generalization and safety on three adaptation
datasets.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:57:09 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Trivedi",
"Puja",
""
],
[
"Koutra",
"Danai",
""
],
[
"Thiagarajan",
"Jayaraman J.",
""
]
] | TITLE: A Closer Look at Model Adaptation using Feature Distortion and
Simplicity Bias
ABSTRACT: Advances in the expressivity of pretrained models have increased interest in
the design of adaptation protocols which enable safe and effective transfer
learning. Going beyond conventional linear probing (LP) and fine tuning (FT)
strategies, protocols that can effectively control feature distortion, i.e.,
the failure to update features orthogonal to the in-distribution, have been
found to achieve improved out-of-distribution generalization (OOD). In order to
limit this distortion, the LP+FT protocol, which first learns a linear probe
and then uses this initialization for subsequent FT, was proposed. However, in
this paper, we find when adaptation protocols (LP, FT, LP+FT) are also
evaluated on a variety of safety objectives (e.g., calibration, robustness,
etc.), a complementary perspective to feature distortion is helpful to explain
protocol behavior. To this end, we study the susceptibility of protocols to
simplicity bias (SB), i.e. the well-known propensity of deep neural networks to
rely upon simple features, as SB has recently been shown to underlie several
problems in robust generalization. Using a synthetic dataset, we demonstrate
the susceptibility of existing protocols to SB. Given the strong effectiveness
of LP+FT, we then propose modified linear probes that help mitigate SB, and
lead to better initializations for subsequent FT. We verify the effectiveness
of the proposed LP+FT variants for decreasing SB in a controlled setting, and
their ability to improve OOD generalization and safety on three adaptation
datasets.
| no_new_dataset | 0.944485 |
2303.13504 | Jeya Maria Jose Valanarasu | Jeya Maria Jose Valanarasu, Rahul Garg, Andeep Toor, Xin Tong, Weijuan
Xi, Andreas Lugmayr, Vishal M. Patel, Anne Menini | ReBotNet: Fast Real-time Video Enhancement | Project Website: https://jeya-maria-jose.github.io/rebotnet-web/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most video restoration networks are slow, have high computational load, and
can't be used for real-time video enhancement. In this work, we design an
efficient and fast framework to perform real-time video enhancement for
practical use-cases like live video calls and video streams. Our proposed
method, called Recurrent Bottleneck Mixer Network (ReBotNet), employs a
dual-branch framework. The first branch learns spatio-temporal features by
tokenizing the input frames along the spatial and temporal dimensions using a
ConvNext-based encoder and processing these abstract tokens using a bottleneck
mixer. To further improve temporal consistency, the second branch employs a
mixer directly on tokens extracted from individual frames. A common decoder
then merges the features form the two branches to predict the enhanced frame.
In addition, we propose a recurrent training approach where the last frame's
prediction is leveraged to efficiently enhance the current frame while
improving temporal consistency. To evaluate our method, we curate two new
datasets that emulate real-world video call and streaming scenarios, and show
extensive results on multiple datasets where ReBotNet outperforms existing
approaches with lower computations, reduced memory requirements, and faster
inference time.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:58:05 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Valanarasu",
"Jeya Maria Jose",
""
],
[
"Garg",
"Rahul",
""
],
[
"Toor",
"Andeep",
""
],
[
"Tong",
"Xin",
""
],
[
"Xi",
"Weijuan",
""
],
[
"Lugmayr",
"Andreas",
""
],
[
"Patel",
"Vishal M.",
""
],
[
"Menini",
"Anne",
""
]
] | TITLE: ReBotNet: Fast Real-time Video Enhancement
ABSTRACT: Most video restoration networks are slow, have high computational load, and
can't be used for real-time video enhancement. In this work, we design an
efficient and fast framework to perform real-time video enhancement for
practical use-cases like live video calls and video streams. Our proposed
method, called Recurrent Bottleneck Mixer Network (ReBotNet), employs a
dual-branch framework. The first branch learns spatio-temporal features by
tokenizing the input frames along the spatial and temporal dimensions using a
ConvNext-based encoder and processing these abstract tokens using a bottleneck
mixer. To further improve temporal consistency, the second branch employs a
mixer directly on tokens extracted from individual frames. A common decoder
then merges the features form the two branches to predict the enhanced frame.
In addition, we propose a recurrent training approach where the last frame's
prediction is leveraged to efficiently enhance the current frame while
improving temporal consistency. To evaluate our method, we curate two new
datasets that emulate real-world video call and streaming scenarios, and show
extensive results on multiple datasets where ReBotNet outperforms existing
approaches with lower computations, reduced memory requirements, and faster
inference time.
| new_dataset | 0.962673 |
2303.13509 | Zeqi Xiao | Zeqi Xiao, Wenwei Zhang, Tai Wang, Chen Change Loy, Dahua Lin,
Jiangmiao Pang | Position-Guided Point Cloud Panoptic Segmentation Transformer | Project page: https://github.com/SmartBot-PJLab/P3Former | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | DEtection TRansformer (DETR) started a trend that uses a group of learnable
queries for unified visual perception. This work begins by applying this
appealing paradigm to LiDAR-based point cloud segmentation and obtains a simple
yet effective baseline. Although the naive adaptation obtains fair results, the
instance segmentation performance is noticeably inferior to previous works. By
diving into the details, we observe that instances in the sparse point clouds
are relatively small to the whole scene and often have similar geometry but
lack distinctive appearance for segmentation, which are rare in the image
domain. Considering instances in 3D are more featured by their positional
information, we emphasize their roles during the modeling and design a robust
Mixed-parameterized Positional Embedding (MPE) to guide the segmentation
process. It is embedded into backbone features and later guides the mask
prediction and query update processes iteratively, leading to Position-Aware
Segmentation (PA-Seg) and Masked Focal Attention (MFA). All these designs impel
the queries to attend to specific regions and identify various instances. The
method, named Position-guided Point cloud Panoptic segmentation transFormer
(P3Former), outperforms previous state-of-the-art methods by 3.4% and 1.2% PQ
on SemanticKITTI and nuScenes benchmark, respectively. The source code and
models are available at https://github.com/SmartBot-PJLab/P3Former .
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:59:02 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Xiao",
"Zeqi",
""
],
[
"Zhang",
"Wenwei",
""
],
[
"Wang",
"Tai",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Lin",
"Dahua",
""
],
[
"Pang",
"Jiangmiao",
""
]
] | TITLE: Position-Guided Point Cloud Panoptic Segmentation Transformer
ABSTRACT: DEtection TRansformer (DETR) started a trend that uses a group of learnable
queries for unified visual perception. This work begins by applying this
appealing paradigm to LiDAR-based point cloud segmentation and obtains a simple
yet effective baseline. Although the naive adaptation obtains fair results, the
instance segmentation performance is noticeably inferior to previous works. By
diving into the details, we observe that instances in the sparse point clouds
are relatively small to the whole scene and often have similar geometry but
lack distinctive appearance for segmentation, which are rare in the image
domain. Considering instances in 3D are more featured by their positional
information, we emphasize their roles during the modeling and design a robust
Mixed-parameterized Positional Embedding (MPE) to guide the segmentation
process. It is embedded into backbone features and later guides the mask
prediction and query update processes iteratively, leading to Position-Aware
Segmentation (PA-Seg) and Masked Focal Attention (MFA). All these designs impel
the queries to attend to specific regions and identify various instances. The
method, named Position-guided Point cloud Panoptic segmentation transFormer
(P3Former), outperforms previous state-of-the-art methods by 3.4% and 1.2% PQ
on SemanticKITTI and nuScenes benchmark, respectively. The source code and
models are available at https://github.com/SmartBot-PJLab/P3Former .
| no_new_dataset | 0.951097 |
2303.13510 | Runsen Xu | Runsen Xu, Tai Wang, Wenwei Zhang, Runjian Chen, Jinkun Cao, Jiangmiao
Pang, Dahua Lin | MV-JAR: Masked Voxel Jigsaw and Reconstruction for LiDAR-Based
Self-Supervised Pre-Training | Accepted by CVPR 2023 with a carefully designed benchmark on Waymo.
Codes and the benchmark will be available at
https://github.com/SmartBot-PJLab/MV-JAR | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper introduces the Masked Voxel Jigsaw and Reconstruction (MV-JAR)
method for LiDAR-based self-supervised pre-training and a carefully designed
data-efficient 3D object detection benchmark on the Waymo dataset. Inspired by
the scene-voxel-point hierarchy in downstream 3D object detectors, we design
masking and reconstruction strategies accounting for voxel distributions in the
scene and local point distributions within the voxel. We employ a
Reversed-Furthest-Voxel-Sampling strategy to address the uneven distribution of
LiDAR points and propose MV-JAR, which combines two techniques for modeling the
aforementioned distributions, resulting in superior performance. Our
experiments reveal limitations in previous data-efficient experiments, which
uniformly sample fine-tuning splits with varying data proportions from each
LiDAR sequence, leading to similar data diversity across splits. To address
this, we propose a new benchmark that samples scene sequences for diverse
fine-tuning splits, ensuring adequate model convergence and providing a more
accurate evaluation of pre-training methods. Experiments on our Waymo benchmark
and the KITTI dataset demonstrate that MV-JAR consistently and significantly
improves 3D detection performance across various data scales, achieving up to a
6.3% increase in mAPH compared to training from scratch. Codes and the
benchmark will be available at https://github.com/SmartBot-PJLab/MV-JAR .
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:59:02 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Xu",
"Runsen",
""
],
[
"Wang",
"Tai",
""
],
[
"Zhang",
"Wenwei",
""
],
[
"Chen",
"Runjian",
""
],
[
"Cao",
"Jinkun",
""
],
[
"Pang",
"Jiangmiao",
""
],
[
"Lin",
"Dahua",
""
]
] | TITLE: MV-JAR: Masked Voxel Jigsaw and Reconstruction for LiDAR-Based
Self-Supervised Pre-Training
ABSTRACT: This paper introduces the Masked Voxel Jigsaw and Reconstruction (MV-JAR)
method for LiDAR-based self-supervised pre-training and a carefully designed
data-efficient 3D object detection benchmark on the Waymo dataset. Inspired by
the scene-voxel-point hierarchy in downstream 3D object detectors, we design
masking and reconstruction strategies accounting for voxel distributions in the
scene and local point distributions within the voxel. We employ a
Reversed-Furthest-Voxel-Sampling strategy to address the uneven distribution of
LiDAR points and propose MV-JAR, which combines two techniques for modeling the
aforementioned distributions, resulting in superior performance. Our
experiments reveal limitations in previous data-efficient experiments, which
uniformly sample fine-tuning splits with varying data proportions from each
LiDAR sequence, leading to similar data diversity across splits. To address
this, we propose a new benchmark that samples scene sequences for diverse
fine-tuning splits, ensuring adequate model convergence and providing a more
accurate evaluation of pre-training methods. Experiments on our Waymo benchmark
and the KITTI dataset demonstrate that MV-JAR consistently and significantly
improves 3D detection performance across various data scales, achieving up to a
6.3% increase in mAPH compared to training from scratch. Codes and the
benchmark will be available at https://github.com/SmartBot-PJLab/MV-JAR .
| no_new_dataset | 0.945651 |
2303.13518 | Relja Arandjelovi\'c | Relja Arandjelovi\'c, Alex Andonian, Arthur Mensch, Olivier J.
H\'enaff, Jean-Baptiste Alayrac, Andrew Zisserman | Three ways to improve feature alignment for open vocabulary detection | null | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The core problem in zero-shot open vocabulary detection is how to align
visual and text features, so that the detector performs well on unseen classes.
Previous approaches train the feature pyramid and detection head from scratch,
which breaks the vision-text feature alignment established during pretraining,
and struggles to prevent the language model from forgetting unseen classes.
We propose three methods to alleviate these issues. Firstly, a simple scheme
is used to augment the text embeddings which prevents overfitting to a small
number of classes seen during training, while simultaneously saving memory and
computation. Secondly, the feature pyramid network and the detection head are
modified to include trainable gated shortcuts, which encourages vision-text
feature alignment and guarantees it at the start of detection training.
Finally, a self-training approach is used to leverage a larger corpus of
image-text pairs thus improving detection performance on classes with no human
annotated bounding boxes.
Our three methods are evaluated on the zero-shot version of the LVIS
benchmark, each of them showing clear and significant benefits. Our final
network achieves the new stateof-the-art on the mAP-all metric and demonstrates
competitive performance for mAP-rare, as well as superior transfer to COCO and
Objects365.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:59:53 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Arandjelović",
"Relja",
""
],
[
"Andonian",
"Alex",
""
],
[
"Mensch",
"Arthur",
""
],
[
"Hénaff",
"Olivier J.",
""
],
[
"Alayrac",
"Jean-Baptiste",
""
],
[
"Zisserman",
"Andrew",
""
]
] | TITLE: Three ways to improve feature alignment for open vocabulary detection
ABSTRACT: The core problem in zero-shot open vocabulary detection is how to align
visual and text features, so that the detector performs well on unseen classes.
Previous approaches train the feature pyramid and detection head from scratch,
which breaks the vision-text feature alignment established during pretraining,
and struggles to prevent the language model from forgetting unseen classes.
We propose three methods to alleviate these issues. Firstly, a simple scheme
is used to augment the text embeddings which prevents overfitting to a small
number of classes seen during training, while simultaneously saving memory and
computation. Secondly, the feature pyramid network and the detection head are
modified to include trainable gated shortcuts, which encourages vision-text
feature alignment and guarantees it at the start of detection training.
Finally, a self-training approach is used to leverage a larger corpus of
image-text pairs thus improving detection performance on classes with no human
annotated bounding boxes.
Our three methods are evaluated on the zero-shot version of the LVIS
benchmark, each of them showing clear and significant benefits. Our final
network achieves the new stateof-the-art on the mAP-all metric and demonstrates
competitive performance for mAP-rare, as well as superior transfer to COCO and
Objects365.
| no_new_dataset | 0.94428 |
2303.13519 | Medhini Narasimhan | Medhini Narasimhan, Licheng Yu, Sean Bell, Ning Zhang, Trevor Darrell | Learning and Verification of Task Structure in Instructional Videos | Wesbite at https://medhini.github.io/task_structure | null | null | null | cs.CV cs.AI cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Given the enormous number of instructional videos available online, learning
a diverse array of multi-step task models from videos is an appealing goal. We
introduce a new pre-trained video model, VideoTaskformer, focused on
representing the semantics and structure of instructional videos. We pre-train
VideoTaskformer using a simple and effective objective: predicting weakly
supervised textual labels for steps that are randomly masked out from an
instructional video (masked step modeling). Compared to prior work which learns
step representations locally, our approach involves learning them globally,
leveraging video of the entire surrounding task as context. From these learned
representations, we can verify if an unseen video correctly executes a given
task, as well as forecast which steps are likely to be taken after a given
step. We introduce two new benchmarks for detecting mistakes in instructional
videos, to verify if there is an anomalous step and if steps are executed in
the right order. We also introduce a long-term forecasting benchmark, where the
goal is to predict long-range future steps from a given step. Our method
outperforms previous baselines on these tasks, and we believe the tasks will be
a valuable way for the community to measure the quality of step
representations. Additionally, we evaluate VideoTaskformer on 3 existing
benchmarks -- procedural activity recognition, step classification, and step
forecasting -- and demonstrate on each that our method outperforms existing
baselines and achieves new state-of-the-art performance.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 17:59:54 GMT"
}
] | 2023-03-24T00:00:00 | [
[
"Narasimhan",
"Medhini",
""
],
[
"Yu",
"Licheng",
""
],
[
"Bell",
"Sean",
""
],
[
"Zhang",
"Ning",
""
],
[
"Darrell",
"Trevor",
""
]
] | TITLE: Learning and Verification of Task Structure in Instructional Videos
ABSTRACT: Given the enormous number of instructional videos available online, learning
a diverse array of multi-step task models from videos is an appealing goal. We
introduce a new pre-trained video model, VideoTaskformer, focused on
representing the semantics and structure of instructional videos. We pre-train
VideoTaskformer using a simple and effective objective: predicting weakly
supervised textual labels for steps that are randomly masked out from an
instructional video (masked step modeling). Compared to prior work which learns
step representations locally, our approach involves learning them globally,
leveraging video of the entire surrounding task as context. From these learned
representations, we can verify if an unseen video correctly executes a given
task, as well as forecast which steps are likely to be taken after a given
step. We introduce two new benchmarks for detecting mistakes in instructional
videos, to verify if there is an anomalous step and if steps are executed in
the right order. We also introduce a long-term forecasting benchmark, where the
goal is to predict long-range future steps from a given step. Our method
outperforms previous baselines on these tasks, and we believe the tasks will be
a valuable way for the community to measure the quality of step
representations. Additionally, we evaluate VideoTaskformer on 3 existing
benchmarks -- procedural activity recognition, step classification, and step
forecasting -- and demonstrate on each that our method outperforms existing
baselines and achieves new state-of-the-art performance.
| no_new_dataset | 0.775009 |
2102.05368 | Thibault Maho | Thibault Maho, Beno\^it Bonnet, Teddy Furon, Erwan Le Merrer | RoBIC: A benchmark suite for assessing classifiers robustness | 4 pages, accepted to ICIP 2021 | null | 10.1109/ICIP42928.2021.9506053 | null | cs.CV cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many defenses have emerged with the development of adversarial attacks.
Models must be objectively evaluated accordingly. This paper systematically
tackles this concern by proposing a new parameter-free benchmark we coin RoBIC.
RoBIC fairly evaluates the robustness of image classifiers using a new
half-distortion measure. It gauges the robustness of the network against white
and black box attacks, independently of its accuracy. RoBIC is faster than the
other available benchmarks. We present the significant differences in the
robustness of 16 recent models as assessed by RoBIC.
| [
{
"version": "v1",
"created": "Wed, 10 Feb 2021 10:13:39 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2023 15:21:10 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Maho",
"Thibault",
""
],
[
"Bonnet",
"Benoît",
""
],
[
"Furon",
"Teddy",
""
],
[
"Merrer",
"Erwan Le",
""
]
] | TITLE: RoBIC: A benchmark suite for assessing classifiers robustness
ABSTRACT: Many defenses have emerged with the development of adversarial attacks.
Models must be objectively evaluated accordingly. This paper systematically
tackles this concern by proposing a new parameter-free benchmark we coin RoBIC.
RoBIC fairly evaluates the robustness of image classifiers using a new
half-distortion measure. It gauges the robustness of the network against white
and black box attacks, independently of its accuracy. RoBIC is faster than the
other available benchmarks. We present the significant differences in the
robustness of 16 recent models as assessed by RoBIC.
| no_new_dataset | 0.890865 |
2103.17084 | Jingyi Zhang | Jingyi Zhang, Jiaxing Huang, Zhipeng Luo, Gongjie Zhang, Xiaoqin
Zhang, Shijian Lu | DA-DETR: Domain Adaptive Detection Transformer with Information Fusion | Accepted to CVPR2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | The recent detection transformer (DETR) simplifies the object detection
pipeline by removing hand-crafted designs and hyperparameters as employed in
conventional two-stage object detectors. However, how to leverage the simple
yet effective DETR architecture in domain adaptive object detection is largely
neglected. Inspired by the unique DETR attention mechanisms, we design DA-DETR,
a domain adaptive object detection transformer that introduces information
fusion for effective transfer from a labeled source domain to an unlabeled
target domain. DA-DETR introduces a novel CNN-Transformer Blender (CTBlender)
that fuses the CNN features and Transformer features ingeniously for effective
feature alignment and knowledge transfer across domains. Specifically,
CTBlender employs the Transformer features to modulate the CNN features across
multiple scales where the high-level semantic information and the low-level
spatial information are fused for accurate object identification and
localization. Extensive experiments show that DA-DETR achieves superior
detection performance consistently across multiple widely adopted domain
adaptation benchmarks.
| [
{
"version": "v1",
"created": "Wed, 31 Mar 2021 13:55:56 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2023 05:15:36 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Zhang",
"Jingyi",
""
],
[
"Huang",
"Jiaxing",
""
],
[
"Luo",
"Zhipeng",
""
],
[
"Zhang",
"Gongjie",
""
],
[
"Zhang",
"Xiaoqin",
""
],
[
"Lu",
"Shijian",
""
]
] | TITLE: DA-DETR: Domain Adaptive Detection Transformer with Information Fusion
ABSTRACT: The recent detection transformer (DETR) simplifies the object detection
pipeline by removing hand-crafted designs and hyperparameters as employed in
conventional two-stage object detectors. However, how to leverage the simple
yet effective DETR architecture in domain adaptive object detection is largely
neglected. Inspired by the unique DETR attention mechanisms, we design DA-DETR,
a domain adaptive object detection transformer that introduces information
fusion for effective transfer from a labeled source domain to an unlabeled
target domain. DA-DETR introduces a novel CNN-Transformer Blender (CTBlender)
that fuses the CNN features and Transformer features ingeniously for effective
feature alignment and knowledge transfer across domains. Specifically,
CTBlender employs the Transformer features to modulate the CNN features across
multiple scales where the high-level semantic information and the low-level
spatial information are fused for accurate object identification and
localization. Extensive experiments show that DA-DETR achieves superior
detection performance consistently across multiple widely adopted domain
adaptation benchmarks.
| no_new_dataset | 0.94474 |
2107.02266 | Koulik Khamaru | Koulik Khamaru, Yash Deshpande, Tor Lattimore, Lester Mackey, Martin
J. Wainwright | Near-optimal inference in adaptive linear regression | 51 pages, 7 figures | null | null | null | math.ST cs.LG stat.ML stat.TH | http://creativecommons.org/licenses/by/4.0/ | When data is collected in an adaptive manner, even simple methods like
ordinary least squares can exhibit non-normal asymptotic behavior. As an
undesirable consequence, hypothesis tests and confidence intervals based on
asymptotic normality can lead to erroneous results. We propose a family of
online debiasing estimators to correct these distributional anomalies in least
squares estimation. Our proposed methods take advantage of the covariance
structure present in the dataset and provide sharper estimates in directions
for which more information has accrued. We establish an asymptotic normality
property for our proposed online debiasing estimators under mild conditions on
the data collection process and provide asymptotically exact confidence
intervals. We additionally prove a minimax lower bound for the adaptive linear
regression problem, thereby providing a baseline by which to compare
estimators. There are various conditions under which our proposed estimators
achieve the minimax lower bound. We demonstrate the usefulness of our theory
via applications to multi-armed bandit, autoregressive time series estimation,
and active learning with exploration.
| [
{
"version": "v1",
"created": "Mon, 5 Jul 2021 21:05:11 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 2021 02:57:42 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Mar 2023 18:18:30 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Khamaru",
"Koulik",
""
],
[
"Deshpande",
"Yash",
""
],
[
"Lattimore",
"Tor",
""
],
[
"Mackey",
"Lester",
""
],
[
"Wainwright",
"Martin J.",
""
]
] | TITLE: Near-optimal inference in adaptive linear regression
ABSTRACT: When data is collected in an adaptive manner, even simple methods like
ordinary least squares can exhibit non-normal asymptotic behavior. As an
undesirable consequence, hypothesis tests and confidence intervals based on
asymptotic normality can lead to erroneous results. We propose a family of
online debiasing estimators to correct these distributional anomalies in least
squares estimation. Our proposed methods take advantage of the covariance
structure present in the dataset and provide sharper estimates in directions
for which more information has accrued. We establish an asymptotic normality
property for our proposed online debiasing estimators under mild conditions on
the data collection process and provide asymptotically exact confidence
intervals. We additionally prove a minimax lower bound for the adaptive linear
regression problem, thereby providing a baseline by which to compare
estimators. There are various conditions under which our proposed estimators
achieve the minimax lower bound. We demonstrate the usefulness of our theory
via applications to multi-armed bandit, autoregressive time series estimation,
and active learning with exploration.
| no_new_dataset | 0.943608 |
2108.02235 | Chong Wang | Weijie Liu, Chong Wang, Haohe Li, Shenghao Yu and Jiafei Wu | Dynamic Relevance Learning for Few-Shot Object Detection | 12 pages, 8 figures, 7 tables | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Expensive bounding-box annotations have limited the development of object
detection task. Thus, it is necessary to focus on more challenging task of
few-shot object detection. It requires the detector to recognize objects of
novel classes with only a few training samples. Nowadays, many existing popular
methods adopting training way similar to meta-learning have achieved promising
performance, such as Meta R-CNN series. However, support data is only used as
the class attention to guide the detecting of query images each time. Their
relevance to each other remains unexploited. Moreover, a lot of recent works
treat the support data and query images as independent branch without
considering the relationship between them. To address this issue, we propose a
dynamic relevance learning model, which utilizes the relationship between all
support images and Region of Interest (RoI) on the query images to construct a
dynamic graph convolutional network (GCN). By adjusting the prediction
distribution of the base detector using the output of this GCN, the proposed
model serves as a hard auxiliary classification task, which guides the detector
to improve the class representation implicitly. Comprehensive experiments have
been conducted on Pascal VOC and MS-COCO dataset. The proposed model achieves
the best overall performance, which shows its effectiveness of learning more
generalized features. Our code is available at
https://github.com/liuweijie19980216/DRL-for-FSOD.
| [
{
"version": "v1",
"created": "Wed, 4 Aug 2021 18:29:42 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jun 2022 07:09:48 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Mar 2023 13:26:59 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Liu",
"Weijie",
""
],
[
"Wang",
"Chong",
""
],
[
"Li",
"Haohe",
""
],
[
"Yu",
"Shenghao",
""
],
[
"Wu",
"Jiafei",
""
]
] | TITLE: Dynamic Relevance Learning for Few-Shot Object Detection
ABSTRACT: Expensive bounding-box annotations have limited the development of object
detection task. Thus, it is necessary to focus on more challenging task of
few-shot object detection. It requires the detector to recognize objects of
novel classes with only a few training samples. Nowadays, many existing popular
methods adopting training way similar to meta-learning have achieved promising
performance, such as Meta R-CNN series. However, support data is only used as
the class attention to guide the detecting of query images each time. Their
relevance to each other remains unexploited. Moreover, a lot of recent works
treat the support data and query images as independent branch without
considering the relationship between them. To address this issue, we propose a
dynamic relevance learning model, which utilizes the relationship between all
support images and Region of Interest (RoI) on the query images to construct a
dynamic graph convolutional network (GCN). By adjusting the prediction
distribution of the base detector using the output of this GCN, the proposed
model serves as a hard auxiliary classification task, which guides the detector
to improve the class representation implicitly. Comprehensive experiments have
been conducted on Pascal VOC and MS-COCO dataset. The proposed model achieves
the best overall performance, which shows its effectiveness of learning more
generalized features. Our code is available at
https://github.com/liuweijie19980216/DRL-for-FSOD.
| no_new_dataset | 0.946101 |
2108.11726 | Zijian Wang | Zijian Wang, Yadan Luo, Ruihong Qiu, Zi Huang, Mahsa Baktashmotlagh | Learning to Diversify for Single Domain Generalization | ICCV 2021 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Domain generalization (DG) aims to generalize a model trained on multiple
source (i.e., training) domains to a distributionally different target (i.e.,
test) domain. In contrast to the conventional DG that strictly requires the
availability of multiple source domains, this paper considers a more realistic
yet challenging scenario, namely Single Domain Generalization (Single-DG),
where only one source domain is available for training. In this scenario, the
limited diversity may jeopardize the model generalization on unseen target
domains. To tackle this problem, we propose a style-complement module to
enhance the generalization power of the model by synthesizing images from
diverse distributions that are complementary to the source ones. More
specifically, we adopt a tractable upper bound of mutual information (MI)
between the generated and source samples and perform a two-step optimization
iteratively: (1) by minimizing the MI upper bound approximation for each sample
pair, the generated images are forced to be diversified from the source
samples; (2) subsequently, we maximize the MI between the samples from the same
semantic category, which assists the network to learn discriminative features
from diverse-styled images. Extensive experiments on three benchmark datasets
demonstrate the superiority of our approach, which surpasses the
state-of-the-art single-DG methods by up to 25.14%.
| [
{
"version": "v1",
"created": "Thu, 26 Aug 2021 12:04:32 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Aug 2021 00:36:05 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Mar 2023 09:13:00 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Wang",
"Zijian",
""
],
[
"Luo",
"Yadan",
""
],
[
"Qiu",
"Ruihong",
""
],
[
"Huang",
"Zi",
""
],
[
"Baktashmotlagh",
"Mahsa",
""
]
] | TITLE: Learning to Diversify for Single Domain Generalization
ABSTRACT: Domain generalization (DG) aims to generalize a model trained on multiple
source (i.e., training) domains to a distributionally different target (i.e.,
test) domain. In contrast to the conventional DG that strictly requires the
availability of multiple source domains, this paper considers a more realistic
yet challenging scenario, namely Single Domain Generalization (Single-DG),
where only one source domain is available for training. In this scenario, the
limited diversity may jeopardize the model generalization on unseen target
domains. To tackle this problem, we propose a style-complement module to
enhance the generalization power of the model by synthesizing images from
diverse distributions that are complementary to the source ones. More
specifically, we adopt a tractable upper bound of mutual information (MI)
between the generated and source samples and perform a two-step optimization
iteratively: (1) by minimizing the MI upper bound approximation for each sample
pair, the generated images are forced to be diversified from the source
samples; (2) subsequently, we maximize the MI between the samples from the same
semantic category, which assists the network to learn discriminative features
from diverse-styled images. Extensive experiments on three benchmark datasets
demonstrate the superiority of our approach, which surpasses the
state-of-the-art single-DG methods by up to 25.14%.
| no_new_dataset | 0.947235 |
2201.10981 | Georg Hille | Georg Hille, Shubham Agrawal, Pavan Tummala, Christian Wybranski,
Maciej Pech, Alexey Surov, Sylvia Saalfeld | Joint Liver and Hepatic Lesion Segmentation in MRI using a Hybrid CNN
with Transformer Layers | null | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Deep learning-based segmentation of the liver and hepatic lesions therein
steadily gains relevance in clinical practice due to the increasing incidence
of liver cancer each year. Whereas various network variants with overall
promising results in the field of medical image segmentation have been
successfully developed over the last years, almost all of them struggle with
the challenge of accurately segmenting hepatic lesions in magnetic resonance
imaging (MRI). This led to the idea of combining elements of convolutional and
transformer-based architectures to overcome the existing limitations. This work
presents a hybrid network called SWTR-Unet, consisting of a pretrained ResNet,
transformer blocks as well as a common Unet-style decoder path. This network
was primarily applied to single-modality non-contrast-enhanced liver MRI and
additionally to the publicly available computed tomography (CT) data of the
liver tumor segmentation (LiTS) challenge to verify the applicability on other
modalities. For a broader evaluation, multiple state-of-the-art networks were
implemented and applied, ensuring a direct comparability. Furthermore,
correlation analysis and an ablation study were carried out, to investigate
various influencing factors on the segmentation accuracy of the presented
method. With Dice scores of averaged 98+-2% for liver and 81+-28% lesion
segmentation on the MRI dataset and 97+-2% and 79+-25%, respectively on the CT
dataset, the proposed SWTR-Unet proved to be a precise approach for liver and
hepatic lesion segmentation with state-of-the-art results for MRI and competing
accuracy in CT imaging. The achieved segmentation accuracy was found to be on
par with manually performed expert segmentations as indicated by inter-observer
variabilities for liver lesion segmentation. In conclusion, the presented
method could save valuable time and resources in clinical practice.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2022 14:52:23 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jan 2023 13:31:20 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Mar 2023 07:35:10 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Hille",
"Georg",
""
],
[
"Agrawal",
"Shubham",
""
],
[
"Tummala",
"Pavan",
""
],
[
"Wybranski",
"Christian",
""
],
[
"Pech",
"Maciej",
""
],
[
"Surov",
"Alexey",
""
],
[
"Saalfeld",
"Sylvia",
""
]
] | TITLE: Joint Liver and Hepatic Lesion Segmentation in MRI using a Hybrid CNN
with Transformer Layers
ABSTRACT: Deep learning-based segmentation of the liver and hepatic lesions therein
steadily gains relevance in clinical practice due to the increasing incidence
of liver cancer each year. Whereas various network variants with overall
promising results in the field of medical image segmentation have been
successfully developed over the last years, almost all of them struggle with
the challenge of accurately segmenting hepatic lesions in magnetic resonance
imaging (MRI). This led to the idea of combining elements of convolutional and
transformer-based architectures to overcome the existing limitations. This work
presents a hybrid network called SWTR-Unet, consisting of a pretrained ResNet,
transformer blocks as well as a common Unet-style decoder path. This network
was primarily applied to single-modality non-contrast-enhanced liver MRI and
additionally to the publicly available computed tomography (CT) data of the
liver tumor segmentation (LiTS) challenge to verify the applicability on other
modalities. For a broader evaluation, multiple state-of-the-art networks were
implemented and applied, ensuring a direct comparability. Furthermore,
correlation analysis and an ablation study were carried out, to investigate
various influencing factors on the segmentation accuracy of the presented
method. With Dice scores of averaged 98+-2% for liver and 81+-28% lesion
segmentation on the MRI dataset and 97+-2% and 79+-25%, respectively on the CT
dataset, the proposed SWTR-Unet proved to be a precise approach for liver and
hepatic lesion segmentation with state-of-the-art results for MRI and competing
accuracy in CT imaging. The achieved segmentation accuracy was found to be on
par with manually performed expert segmentations as indicated by inter-observer
variabilities for liver lesion segmentation. In conclusion, the presented
method could save valuable time and resources in clinical practice.
| no_new_dataset | 0.956309 |
2201.11097 | Qizhen Lan | Qizhen Lan and Qing Tian | Adaptive Instance Distillation for Object Detection in Autonomous
Driving | 6 pages, 3 figures | 2022 26th International Conference on Pattern Recognition (ICPR),
Montreal, QC, Canada, 2022, pp. 4559-4565 | 10.1109/ICPR56361.2022.9956165 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, knowledge distillation (KD) has been widely used to derive
efficient models. Through imitating a large teacher model, a lightweight
student model can achieve comparable performance with more efficiency. However,
most existing knowledge distillation methods are focused on classification
tasks. Only a limited number of studies have applied knowledge distillation to
object detection, especially in time-sensitive autonomous driving scenarios. In
this paper, we propose Adaptive Instance Distillation (AID) to selectively
impart teacher's knowledge to the student to improve the performance of
knowledge distillation. Unlike previous KD methods that treat all instances
equally, our AID can attentively adjust the distillation weights of instances
based on the teacher model's prediction loss. We verified the effectiveness of
our AID method through experiments on the KITTI and the COCO traffic datasets.
The results show that our method improves the performance of state-of-the-art
attention-guided and non-local distillation methods and achieves better
distillation results on both single-stage and two-stage detectors. Compared to
the baseline, our AID led to an average of 2.7% and 2.1% mAP increases for
single-stage and two-stage detectors, respectively. Furthermore, our AID is
also shown to be useful for self-distillation to improve the teacher model's
performance.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2022 18:06:33 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2023 17:02:59 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Lan",
"Qizhen",
""
],
[
"Tian",
"Qing",
""
]
] | TITLE: Adaptive Instance Distillation for Object Detection in Autonomous
Driving
ABSTRACT: In recent years, knowledge distillation (KD) has been widely used to derive
efficient models. Through imitating a large teacher model, a lightweight
student model can achieve comparable performance with more efficiency. However,
most existing knowledge distillation methods are focused on classification
tasks. Only a limited number of studies have applied knowledge distillation to
object detection, especially in time-sensitive autonomous driving scenarios. In
this paper, we propose Adaptive Instance Distillation (AID) to selectively
impart teacher's knowledge to the student to improve the performance of
knowledge distillation. Unlike previous KD methods that treat all instances
equally, our AID can attentively adjust the distillation weights of instances
based on the teacher model's prediction loss. We verified the effectiveness of
our AID method through experiments on the KITTI and the COCO traffic datasets.
The results show that our method improves the performance of state-of-the-art
attention-guided and non-local distillation methods and achieves better
distillation results on both single-stage and two-stage detectors. Compared to
the baseline, our AID led to an average of 2.7% and 2.1% mAP increases for
single-stage and two-stage detectors, respectively. Furthermore, our AID is
also shown to be useful for self-distillation to improve the teacher model's
performance.
| no_new_dataset | 0.947962 |
2202.02892 | Berivan Isik | Berivan Isik, Tsachy Weissman | Lossy Compression of Noisy Data for Private and Data-Efficient Learning | Published at the IEEE Journal on Selected Areas in Information Theory
(JSAIT). Preliminary version was presented at the IEEE International
Symposium on Information Theory (ISIT), 2022, with a slightly different
title, "Learning under Storage and Privacy Constraints." | null | null | null | cs.IT cs.LG eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Storage-efficient privacy-preserving learning is crucial due to increasing
amounts of sensitive user data required for modern learning tasks. We propose a
framework for reducing the storage cost of user data while at the same time
providing privacy guarantees, without essential loss in the utility of the data
for learning. Our method comprises noise injection followed by lossy
compression. We show that, when appropriately matching the lossy compression to
the distribution of the added noise, the compressed examples converge, in
distribution, to that of the noise-free training data as the sample size of the
training data (or the dimension of the training data) increases. In this sense,
the utility of the data for learning is essentially maintained, while reducing
storage and privacy leakage by quantifiable amounts. We present experimental
results on the CelebA dataset for gender classification and find that our
suggested pipeline delivers in practice on the promise of the theory: the
individuals in the images are unrecognizable (or less recognizable, depending
on the noise level), overall storage of the data is substantially reduced, with
no essential loss (and in some cases a slight boost) to the classification
accuracy. As an added bonus, our experiments suggest that our method yields a
substantial boost to robustness in the face of adversarial test data.
| [
{
"version": "v1",
"created": "Mon, 7 Feb 2022 00:15:03 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Jan 2023 12:21:32 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Mar 2023 21:06:06 GMT"
},
{
"version": "v4",
"created": "Wed, 22 Mar 2023 05:23:53 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Isik",
"Berivan",
""
],
[
"Weissman",
"Tsachy",
""
]
] | TITLE: Lossy Compression of Noisy Data for Private and Data-Efficient Learning
ABSTRACT: Storage-efficient privacy-preserving learning is crucial due to increasing
amounts of sensitive user data required for modern learning tasks. We propose a
framework for reducing the storage cost of user data while at the same time
providing privacy guarantees, without essential loss in the utility of the data
for learning. Our method comprises noise injection followed by lossy
compression. We show that, when appropriately matching the lossy compression to
the distribution of the added noise, the compressed examples converge, in
distribution, to that of the noise-free training data as the sample size of the
training data (or the dimension of the training data) increases. In this sense,
the utility of the data for learning is essentially maintained, while reducing
storage and privacy leakage by quantifiable amounts. We present experimental
results on the CelebA dataset for gender classification and find that our
suggested pipeline delivers in practice on the promise of the theory: the
individuals in the images are unrecognizable (or less recognizable, depending
on the noise level), overall storage of the data is substantially reduced, with
no essential loss (and in some cases a slight boost) to the classification
accuracy. As an added bonus, our experiments suggest that our method yields a
substantial boost to robustness in the face of adversarial test data.
| no_new_dataset | 0.949623 |
2202.04235 | Lei Hsiung | Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, Tsung-Yi Ho | Towards Compositional Adversarial Robustness: Generalizing Adversarial
Training to Composite Semantic Perturbations | CVPR 2023. The research demo is at https://hsiung.cc/CARBEN/ | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model robustness against adversarial examples of single perturbation type
such as the $\ell_{p}$-norm has been widely studied, yet its generalization to
more realistic scenarios involving multiple semantic perturbations and their
composition remains largely unexplored. In this paper, we first propose a novel
method for generating composite adversarial examples. Our method can find the
optimal attack composition by utilizing component-wise projected gradient
descent and automatic attack-order scheduling. We then propose generalized
adversarial training (GAT) to extend model robustness from $\ell_{p}$-ball to
composite semantic perturbations, such as the combination of Hue, Saturation,
Brightness, Contrast, and Rotation. Results obtained using ImageNet and
CIFAR-10 datasets indicate that GAT can be robust not only to all the tested
types of a single attack, but also to any combination of such attacks. GAT also
outperforms baseline $\ell_{\infty}$-norm bounded adversarial training
approaches by a significant margin.
| [
{
"version": "v1",
"created": "Wed, 9 Feb 2022 02:41:56 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Nov 2022 04:07:49 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Mar 2023 19:38:39 GMT"
}
] | 2023-03-23T00:00:00 | [
[
"Hsiung",
"Lei",
""
],
[
"Tsai",
"Yun-Yun",
""
],
[
"Chen",
"Pin-Yu",
""
],
[
"Ho",
"Tsung-Yi",
""
]
] | TITLE: Towards Compositional Adversarial Robustness: Generalizing Adversarial
Training to Composite Semantic Perturbations
ABSTRACT: Model robustness against adversarial examples of single perturbation type
such as the $\ell_{p}$-norm has been widely studied, yet its generalization to
more realistic scenarios involving multiple semantic perturbations and their
composition remains largely unexplored. In this paper, we first propose a novel
method for generating composite adversarial examples. Our method can find the
optimal attack composition by utilizing component-wise projected gradient
descent and automatic attack-order scheduling. We then propose generalized
adversarial training (GAT) to extend model robustness from $\ell_{p}$-ball to
composite semantic perturbations, such as the combination of Hue, Saturation,
Brightness, Contrast, and Rotation. Results obtained using ImageNet and
CIFAR-10 datasets indicate that GAT can be robust not only to all the tested
types of a single attack, but also to any combination of such attacks. GAT also
outperforms baseline $\ell_{\infty}$-norm bounded adversarial training
approaches by a significant margin.
| no_new_dataset | 0.942771 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.