id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2305.00454 | Delong Chen | Sai Yang, Fan Liu, Delong Chen, Jun Zhou | Few-shot Classification via Ensemble Learning with Multi-Order
Statistics | Accepted by IJCAI-23 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Transfer learning has been widely adopted for few-shot classification. Recent
studies reveal that obtaining good generalization representation of images on
novel classes is the key to improving the few-shot classification accuracy. To
address this need, we prove theoretically that leveraging ensemble learning on
the base classes can correspondingly reduce the true error in the novel
classes. Following this principle, a novel method named Ensemble Learning with
Multi-Order Statistics (ELMOS) is proposed in this paper. In this method, after
the backbone network, we use multiple branches to create the individual
learners in the ensemble learning, with the goal to reduce the storage cost. We
then introduce different order statistics pooling in each branch to increase
the diversity of the individual learners. The learners are optimized with
supervised losses during the pre-training phase. After pre-training, features
from different branches are concatenated for classifier evaluation. Extensive
experiments demonstrate that each branch can complement the others and our
method can produce a state-of-the-art performance on multiple few-shot
classification benchmark datasets.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 11:41:01 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Yang",
"Sai",
""
],
[
"Liu",
"Fan",
""
],
[
"Chen",
"Delong",
""
],
[
"Zhou",
"Jun",
""
]
] | TITLE: Few-shot Classification via Ensemble Learning with Multi-Order
Statistics
ABSTRACT: Transfer learning has been widely adopted for few-shot classification. Recent
studies reveal that obtaining good generalization representation of images on
novel classes is the key to improving the few-shot classification accuracy. To
address this need, we prove theoretically that leveraging ensemble learning on
the base classes can correspondingly reduce the true error in the novel
classes. Following this principle, a novel method named Ensemble Learning with
Multi-Order Statistics (ELMOS) is proposed in this paper. In this method, after
the backbone network, we use multiple branches to create the individual
learners in the ensemble learning, with the goal to reduce the storage cost. We
then introduce different order statistics pooling in each branch to increase
the diversity of the individual learners. The learners are optimized with
supervised losses during the pre-training phase. After pre-training, features
from different branches are concatenated for classifier evaluation. Extensive
experiments demonstrate that each branch can complement the others and our
method can produce a state-of-the-art performance on multiple few-shot
classification benchmark datasets.
| no_new_dataset | 0.712182 |
2305.00455 | Jia-Hong Huang | Jia-Hong Huang, Chao-Han Huck Yang, Pin-Yu Chen, Min-Hung Chen, Marcel
Worring | Causalainer: Causal Explainer for Automatic Video Summarization | The paper has been accepted by the CVPR Workshop on New Frontiers in
Visual Language Reasoning: Compositionality, Prompts, and Causality, 2023 | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | The goal of video summarization is to automatically shorten videos such that
it conveys the overall story without losing relevant information. In many
application scenarios, improper video summarization can have a large impact.
For example in forensics, the quality of the generated video summary will
affect an investigator's judgment while in journalism it might yield undesired
bias. Because of this, modeling explainability is a key concern. One of the
best ways to address the explainability challenge is to uncover the causal
relations that steer the process and lead to the result. Current machine
learning-based video summarization algorithms learn optimal parameters but do
not uncover causal relationships. Hence, they suffer from a relative lack of
explainability. In this work, a Causal Explainer, dubbed Causalainer, is
proposed to address this issue. Multiple meaningful random variables and their
joint distributions are introduced to characterize the behaviors of key
components in the problem of video summarization. In addition, helper
distributions are introduced to enhance the effectiveness of model training. In
visual-textual input scenarios, the extra input can decrease the model
performance. A causal semantics extractor is designed to tackle this issue by
effectively distilling the mutual information from the visual and textual
inputs. Experimental results on commonly used benchmarks demonstrate that the
proposed method achieves state-of-the-art performance while being more
explainable.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 11:42:06 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Huang",
"Jia-Hong",
""
],
[
"Yang",
"Chao-Han Huck",
""
],
[
"Chen",
"Pin-Yu",
""
],
[
"Chen",
"Min-Hung",
""
],
[
"Worring",
"Marcel",
""
]
] | TITLE: Causalainer: Causal Explainer for Automatic Video Summarization
ABSTRACT: The goal of video summarization is to automatically shorten videos such that
it conveys the overall story without losing relevant information. In many
application scenarios, improper video summarization can have a large impact.
For example in forensics, the quality of the generated video summary will
affect an investigator's judgment while in journalism it might yield undesired
bias. Because of this, modeling explainability is a key concern. One of the
best ways to address the explainability challenge is to uncover the causal
relations that steer the process and lead to the result. Current machine
learning-based video summarization algorithms learn optimal parameters but do
not uncover causal relationships. Hence, they suffer from a relative lack of
explainability. In this work, a Causal Explainer, dubbed Causalainer, is
proposed to address this issue. Multiple meaningful random variables and their
joint distributions are introduced to characterize the behaviors of key
components in the problem of video summarization. In addition, helper
distributions are introduced to enhance the effectiveness of model training. In
visual-textual input scenarios, the extra input can decrease the model
performance. A causal semantics extractor is designed to tackle this issue by
effectively distilling the mutual information from the visual and textual
inputs. Experimental results on commonly used benchmarks demonstrate that the
proposed method achieves state-of-the-art performance while being more
explainable.
| no_new_dataset | 0.708824 |
2305.00462 | Yu Zhu | Yu Zhu, Boning Li, Santiago Segarra | Hypergraphs with Edge-Dependent Vertex Weights: Spectral Clustering
based on the 1-Laplacian | arXiv admin note: text overlap with arXiv:2208.07457 | null | null | null | cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a flexible framework for defining the 1-Laplacian of a hypergraph
that incorporates edge-dependent vertex weights. These weights are able to
reflect varying importance of vertices within a hyperedge, thus conferring the
hypergraph model higher expressivity than homogeneous hypergraphs. We then
utilize the eigenvector associated with the second smallest eigenvalue of the
hypergraph 1-Laplacian to cluster the vertices. From a theoretical standpoint
based on an adequately defined normalized Cheeger cut, this procedure is
expected to achieve higher clustering accuracy than that based on the
traditional Laplacian. Indeed, we confirm that this is the case using
real-world datasets to demonstrate the effectiveness of the proposed spectral
clustering approach. Moreover, we show that for a special case within our
framework, the corresponding hypergraph 1-Laplacian is equivalent to the
1-Laplacian of a related graph, whose eigenvectors can be computed more
efficiently, facilitating the adoption on larger datasets.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 12:21:42 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Zhu",
"Yu",
""
],
[
"Li",
"Boning",
""
],
[
"Segarra",
"Santiago",
""
]
] | TITLE: Hypergraphs with Edge-Dependent Vertex Weights: Spectral Clustering
based on the 1-Laplacian
ABSTRACT: We propose a flexible framework for defining the 1-Laplacian of a hypergraph
that incorporates edge-dependent vertex weights. These weights are able to
reflect varying importance of vertices within a hyperedge, thus conferring the
hypergraph model higher expressivity than homogeneous hypergraphs. We then
utilize the eigenvector associated with the second smallest eigenvalue of the
hypergraph 1-Laplacian to cluster the vertices. From a theoretical standpoint
based on an adequately defined normalized Cheeger cut, this procedure is
expected to achieve higher clustering accuracy than that based on the
traditional Laplacian. Indeed, we confirm that this is the case using
real-world datasets to demonstrate the effectiveness of the proposed spectral
clustering approach. Moreover, we show that for a special case within our
framework, the corresponding hypergraph 1-Laplacian is equivalent to the
1-Laplacian of a related graph, whose eigenvectors can be computed more
efficiently, facilitating the adoption on larger datasets.
| no_new_dataset | 0.710998 |
2305.00473 | \'Angel L\'opez-Oriona | \'Angel L\'opez Oriona, Pablo Montero Manso and Jos\'e Antonio Vilar
Fern\'andez | Time series clustering based on prediction accuracy of global
forecasting models | null | null | null | null | stat.ML cs.LG stat.ME | http://creativecommons.org/licenses/by/4.0/ | In this paper, a novel method to perform model-based clustering of time
series is proposed. The procedure relies on two iterative steps: (i) K global
forecasting models are fitted via pooling by considering the series pertaining
to each cluster and (ii) each series is assigned to the group associated with
the model producing the best forecasts according to a particular criterion.
Unlike most techniques proposed in the literature, the method considers the
predictive accuracy as the main element for constructing the clustering
partition, which contains groups jointly minimizing the overall forecasting
error. Thus, the approach leads to a new clustering paradigm where the quality
of the clustering solution is measured in terms of its predictive capability.
In addition, the procedure gives rise to an effective mechanism for selecting
the number of clusters in a time series database and can be used in combination
with any class of regression model. An extensive simulation study shows that
our method outperforms several alternative techniques concerning both
clustering effectiveness and predictive accuracy. The approach is also applied
to perform clustering in several datasets used as standard benchmarks in the
time series literature, obtaining great results.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 13:12:19 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Oriona",
"Ángel López",
""
],
[
"Manso",
"Pablo Montero",
""
],
[
"Fernández",
"José Antonio Vilar",
""
]
] | TITLE: Time series clustering based on prediction accuracy of global
forecasting models
ABSTRACT: In this paper, a novel method to perform model-based clustering of time
series is proposed. The procedure relies on two iterative steps: (i) K global
forecasting models are fitted via pooling by considering the series pertaining
to each cluster and (ii) each series is assigned to the group associated with
the model producing the best forecasts according to a particular criterion.
Unlike most techniques proposed in the literature, the method considers the
predictive accuracy as the main element for constructing the clustering
partition, which contains groups jointly minimizing the overall forecasting
error. Thus, the approach leads to a new clustering paradigm where the quality
of the clustering solution is measured in terms of its predictive capability.
In addition, the procedure gives rise to an effective mechanism for selecting
the number of clusters in a time series database and can be used in combination
with any class of regression model. An extensive simulation study shows that
our method outperforms several alternative techniques concerning both
clustering effectiveness and predictive accuracy. The approach is also applied
to perform clustering in several datasets used as standard benchmarks in the
time series literature, obtaining great results.
| no_new_dataset | 0.710791 |
2305.00489 | Tong Kedeng | Kedeng Tong, Xin Jin, Yuqing Yang, Chen Wang, Jinshi Kang, Fan Jiang | Learned Focused Plenoptic Image Compression with Microimage
Preprocessing and Global Attention | 14 pages, 15 figures, accepted by IEEE Transactions on Multimedia | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Focused plenoptic cameras can record spatial and angular information of the
light field (LF) simultaneously with higher spatial resolution relative to
traditional plenoptic cameras, which facilitate various applications in
computer vision. However, the existing plenoptic image compression methods
present ineffectiveness to the captured images due to the complex
micro-textures generated by the microlens relay imaging and long-distance
correlations among the microimages. In this paper, a lossy end-to-end learning
architecture is proposed to compress the focused plenoptic images efficiently.
First, a data preprocessing scheme is designed according to the imaging
principle to remove the sub-aperture image ineffective pixels in the recorded
light field and align the microimages to the rectangular grid. Then, the global
attention module with large receptive field is proposed to capture the global
correlation among the feature maps using pixel-wise vector attention computed
in the resampling process. Also, a new image dataset consisting of 1910 focused
plenoptic images with content and depth diversity is built to benefit training
and testing. Extensive experimental evaluations demonstrate the effectiveness
of the proposed approach. It outperforms intra coding of HEVC and VVC by an
average of 62.57% and 51.67% bitrate reduction on the 20 preprocessed focused
plenoptic images, respectively. Also, it achieves 18.73% bitrate saving and
generates perceptually pleasant reconstructions compared to the
state-of-the-art end-to-end image compression methods, which benefits the
applications of focused plenoptic cameras greatly. The dataset and code are
publicly available at https://github.com/VincentChandelier/GACN.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 14:24:56 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Tong",
"Kedeng",
""
],
[
"Jin",
"Xin",
""
],
[
"Yang",
"Yuqing",
""
],
[
"Wang",
"Chen",
""
],
[
"Kang",
"Jinshi",
""
],
[
"Jiang",
"Fan",
""
]
] | TITLE: Learned Focused Plenoptic Image Compression with Microimage
Preprocessing and Global Attention
ABSTRACT: Focused plenoptic cameras can record spatial and angular information of the
light field (LF) simultaneously with higher spatial resolution relative to
traditional plenoptic cameras, which facilitate various applications in
computer vision. However, the existing plenoptic image compression methods
present ineffectiveness to the captured images due to the complex
micro-textures generated by the microlens relay imaging and long-distance
correlations among the microimages. In this paper, a lossy end-to-end learning
architecture is proposed to compress the focused plenoptic images efficiently.
First, a data preprocessing scheme is designed according to the imaging
principle to remove the sub-aperture image ineffective pixels in the recorded
light field and align the microimages to the rectangular grid. Then, the global
attention module with large receptive field is proposed to capture the global
correlation among the feature maps using pixel-wise vector attention computed
in the resampling process. Also, a new image dataset consisting of 1910 focused
plenoptic images with content and depth diversity is built to benefit training
and testing. Extensive experimental evaluations demonstrate the effectiveness
of the proposed approach. It outperforms intra coding of HEVC and VVC by an
average of 62.57% and 51.67% bitrate reduction on the 20 preprocessed focused
plenoptic images, respectively. Also, it achieves 18.73% bitrate saving and
generates perceptually pleasant reconstructions compared to the
state-of-the-art end-to-end image compression methods, which benefits the
applications of focused plenoptic cameras greatly. The dataset and code are
publicly available at https://github.com/VincentChandelier/GACN.
| new_dataset | 0.512693 |
2305.00517 | Lakmal Meegahapola | Yasith Amarasinghe, Darshana Sandaruwan, Thilina Madusanka, Indika
Perera, Lakmal Meegahapola | Multimodal Earable Sensing for Human Energy Expenditure Estimation | IEEE EMBC 2023 (45th Annual International Conference of the IEEE
Engineering in Medicine and Biology Society) | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy Expenditure Estimation (EEE) is vital for maintaining weight, managing
chronic diseases, achieving fitness goals, and improving overall health and
well-being. Gold standard measurements for energy expenditure are expensive and
time-consuming, hence limiting utility and adoption. Prior work has used
wearable sensors for EEE as a workaround. Moreover, earables (ear-worn sensing
devices such as earbuds) have recently emerged as a sub-category of wearables
with unique characteristics (i.e., small form factor, high adoption) and
positioning on the human body (i.e., robust to motion, high stability, facing
thin skin), opening up a novel sensing opportunity. However, earables with
multimodal sensors have rarely been used for EEE, with data collected in
multiple activity types. Further, it is unknown how earable sensors perform
compared to standard wearable sensors worn on other body positions. In this
study, using a publicly available dataset gathered from 17 participants, we
evaluate the EEE performance using multimodal sensors of earable devices to
show that an MAE of 0.5 MET (RMSE = 0.67) can be achieved. Furthermore, we
compare the EEE performance of three commercial wearable devices with the
earable, demonstrating competitive performance of earables
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 16:06:06 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Amarasinghe",
"Yasith",
""
],
[
"Sandaruwan",
"Darshana",
""
],
[
"Madusanka",
"Thilina",
""
],
[
"Perera",
"Indika",
""
],
[
"Meegahapola",
"Lakmal",
""
]
] | TITLE: Multimodal Earable Sensing for Human Energy Expenditure Estimation
ABSTRACT: Energy Expenditure Estimation (EEE) is vital for maintaining weight, managing
chronic diseases, achieving fitness goals, and improving overall health and
well-being. Gold standard measurements for energy expenditure are expensive and
time-consuming, hence limiting utility and adoption. Prior work has used
wearable sensors for EEE as a workaround. Moreover, earables (ear-worn sensing
devices such as earbuds) have recently emerged as a sub-category of wearables
with unique characteristics (i.e., small form factor, high adoption) and
positioning on the human body (i.e., robust to motion, high stability, facing
thin skin), opening up a novel sensing opportunity. However, earables with
multimodal sensors have rarely been used for EEE, with data collected in
multiple activity types. Further, it is unknown how earable sensors perform
compared to standard wearable sensors worn on other body positions. In this
study, using a publicly available dataset gathered from 17 participants, we
evaluate the EEE performance using multimodal sensors of earable devices to
show that an MAE of 0.5 MET (RMSE = 0.67) can be achieved. Furthermore, we
compare the EEE performance of three commercial wearable devices with the
earable, demonstrating competitive performance of earables
| no_new_dataset | 0.695945 |
2305.00540 | Hua Tong | Hua Tong and Kuanren Qian and Eni Halilaj and Yongjie Jessica Zhang | SRL-Assisted AFM: Generating Planar Unstructured Quadrilateral Meshes
with Supervised and Reinforcement Learning-Assisted Advancing Front Method | 18 pages, 11 figures, submitted to Journal of Computational Science | null | null | null | math.NA cs.LG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High-quality mesh generation is the foundation of accurate finite element
analysis. Due to the vast interior vertices search space and complex initial
boundaries, mesh generation for complicated domains requires substantial manual
processing and has long been considered the most challenging and time-consuming
bottleneck of the entire modeling and analysis process. In this paper, we
present a novel computational framework named ``SRL-assisted AFM" for meshing
planar geometries by combining the advancing front method with neural networks
that select reference vertices and update the front boundary using ``policy
networks." These deep neural networks are trained using a unique pipeline that
combines supervised learning with reinforcement learning to iteratively improve
mesh quality. First, we generate different initial boundaries by randomly
sampling points in a square domain and connecting them sequentially. These
boundaries are used for obtaining input meshes and extracting training datasets
in the supervised learning module. We then iteratively improve the
reinforcement learning model performance with reward functions designed for
special requirements, such as improving the mesh quality and controlling the
number and distribution of extraordinary points. Our proposed supervised
learning neural networks achieve an accuracy higher than 98% on predicting
commercial software. The final reinforcement learning neural networks
automatically generate high-quality quadrilateral meshes for complex planar
domains with sharp features and boundary layers.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 17:50:26 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Tong",
"Hua",
""
],
[
"Qian",
"Kuanren",
""
],
[
"Halilaj",
"Eni",
""
],
[
"Zhang",
"Yongjie Jessica",
""
]
] | TITLE: SRL-Assisted AFM: Generating Planar Unstructured Quadrilateral Meshes
with Supervised and Reinforcement Learning-Assisted Advancing Front Method
ABSTRACT: High-quality mesh generation is the foundation of accurate finite element
analysis. Due to the vast interior vertices search space and complex initial
boundaries, mesh generation for complicated domains requires substantial manual
processing and has long been considered the most challenging and time-consuming
bottleneck of the entire modeling and analysis process. In this paper, we
present a novel computational framework named ``SRL-assisted AFM" for meshing
planar geometries by combining the advancing front method with neural networks
that select reference vertices and update the front boundary using ``policy
networks." These deep neural networks are trained using a unique pipeline that
combines supervised learning with reinforcement learning to iteratively improve
mesh quality. First, we generate different initial boundaries by randomly
sampling points in a square domain and connecting them sequentially. These
boundaries are used for obtaining input meshes and extracting training datasets
in the supervised learning module. We then iteratively improve the
reinforcement learning model performance with reward functions designed for
special requirements, such as improving the mesh quality and controlling the
number and distribution of extraordinary points. Our proposed supervised
learning neural networks achieve an accuracy higher than 98% on predicting
commercial software. The final reinforcement learning neural networks
automatically generate high-quality quadrilateral meshes for complex planar
domains with sharp features and boundary layers.
| no_new_dataset | 0.712026 |
2305.00552 | Pangoth Santhosh Kumar | Pangoth Santhosh Kumar, Garika Akshay | Deep Learning-based Spatio Temporal Facial Feature Visual Speech
Recognition | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In low-resource computing contexts, such as smartphones and other tiny
devices, Both deep learning and machine learning are being used in a lot of
identification systems. as authentication techniques. The transparent,
contactless, and non-invasive nature of these face recognition technologies
driven by AI has led to their meteoric rise in popularity in recent years.
While they are mostly successful, there are still methods to get inside without
permission by utilising things like pictures, masks, glasses, etc. In this
research, we present an alternate authentication process that makes use of both
facial recognition and the individual's distinctive temporal facial feature
motions while they speak a password. Because the suggested methodology allows
for a password to be specified in any language, it is not limited by language.
The suggested model attained an accuracy of 96.1% when tested on the
industry-standard MIRACL-VC1 dataset, demonstrating its efficacy as a reliable
and powerful solution. In addition to being data-efficient, the suggested
technique shows promising outcomes with as little as 10 positive video examples
for training the model. The effectiveness of the network's training is further
proved via comparisons with other combined facial recognition and lip reading
models.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 18:52:29 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Kumar",
"Pangoth Santhosh",
""
],
[
"Akshay",
"Garika",
""
]
] | TITLE: Deep Learning-based Spatio Temporal Facial Feature Visual Speech
Recognition
ABSTRACT: In low-resource computing contexts, such as smartphones and other tiny
devices, Both deep learning and machine learning are being used in a lot of
identification systems. as authentication techniques. The transparent,
contactless, and non-invasive nature of these face recognition technologies
driven by AI has led to their meteoric rise in popularity in recent years.
While they are mostly successful, there are still methods to get inside without
permission by utilising things like pictures, masks, glasses, etc. In this
research, we present an alternate authentication process that makes use of both
facial recognition and the individual's distinctive temporal facial feature
motions while they speak a password. Because the suggested methodology allows
for a password to be specified in any language, it is not limited by language.
The suggested model attained an accuracy of 96.1% when tested on the
industry-standard MIRACL-VC1 dataset, demonstrating its efficacy as a reliable
and powerful solution. In addition to being data-efficient, the suggested
technique shows promising outcomes with as little as 10 positive video examples
for training the model. The effectiveness of the network's training is further
proved via comparisons with other combined facial recognition and lip reading
models.
| no_new_dataset | 0.708458 |
2305.00567 | Baiting Zhu | Baiting Zhu, Meihua Dang, Aditya Grover | Scaling Pareto-Efficient Decision Making Via Offline Multi-Objective RL | Published in ICLR 2023 | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | The goal of multi-objective reinforcement learning (MORL) is to learn
policies that simultaneously optimize multiple competing objectives. In
practice, an agent's preferences over the objectives may not be known apriori,
and hence, we require policies that can generalize to arbitrary preferences at
test time. In this work, we propose a new data-driven setup for offline MORL,
where we wish to learn a preference-agnostic policy agent using only a finite
dataset of offline demonstrations of other agents and their preferences. The
key contributions of this work are two-fold. First, we introduce D4MORL,
(D)atasets for MORL that are specifically designed for offline settings. It
contains 1.8 million annotated demonstrations obtained by rolling out reference
policies that optimize for randomly sampled preferences on 6 MuJoCo
environments with 2-3 objectives each. Second, we propose Pareto-Efficient
Decision Agents (PEDA), a family of offline MORL algorithms that builds and
extends Decision Transformers via a novel preference-and-return-conditioned
policy. Empirically, we show that PEDA closely approximates the behavioral
policy on the D4MORL benchmark and provides an excellent approximation of the
Pareto-front with appropriate conditioning, as measured by the hypervolume and
sparsity metrics.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 20:15:26 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Zhu",
"Baiting",
""
],
[
"Dang",
"Meihua",
""
],
[
"Grover",
"Aditya",
""
]
] | TITLE: Scaling Pareto-Efficient Decision Making Via Offline Multi-Objective RL
ABSTRACT: The goal of multi-objective reinforcement learning (MORL) is to learn
policies that simultaneously optimize multiple competing objectives. In
practice, an agent's preferences over the objectives may not be known apriori,
and hence, we require policies that can generalize to arbitrary preferences at
test time. In this work, we propose a new data-driven setup for offline MORL,
where we wish to learn a preference-agnostic policy agent using only a finite
dataset of offline demonstrations of other agents and their preferences. The
key contributions of this work are two-fold. First, we introduce D4MORL,
(D)atasets for MORL that are specifically designed for offline settings. It
contains 1.8 million annotated demonstrations obtained by rolling out reference
policies that optimize for randomly sampled preferences on 6 MuJoCo
environments with 2-3 objectives each. Second, we propose Pareto-Efficient
Decision Agents (PEDA), a family of offline MORL algorithms that builds and
extends Decision Transformers via a novel preference-and-return-conditioned
policy. Empirically, we show that PEDA closely approximates the behavioral
policy on the D4MORL benchmark and provides an excellent approximation of the
Pareto-front with appropriate conditioning, as measured by the hypervolume and
sparsity metrics.
| no_new_dataset | 0.705734 |
2305.00574 | Ziheng Chen | Ziheng Chen, Fabrizio Silvestri, Jia Wang, Yongfeng Zhang and Gabriele
Tolomei | The Dark Side of Explanations: Poisoning Recommender Systems with
Counterfactual Examples | To be published in SIGIR2023 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning-based recommender systems have become an integral part of
several online platforms. However, their black-box nature emphasizes the need
for explainable artificial intelligence (XAI) approaches to provide
human-understandable reasons why a specific item gets recommended to a given
user. One such method is counterfactual explanation (CF). While CFs can be
highly beneficial for users and system designers, malicious actors may also
exploit these explanations to undermine the system's security. In this work, we
propose H-CARS, a novel strategy to poison recommender systems via CFs.
Specifically, we first train a logical-reasoning-based surrogate model on
training data derived from counterfactual explanations. By reversing the
learning process of the recommendation model, we thus develop a proficient
greedy algorithm to generate fabricated user profiles and their associated
interaction records for the aforementioned surrogate model. Our experiments,
which employ a well-known CF generation method and are conducted on two
distinct datasets, show that H-CARS yields significant and successful attack
performance.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 20:54:54 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Chen",
"Ziheng",
""
],
[
"Silvestri",
"Fabrizio",
""
],
[
"Wang",
"Jia",
""
],
[
"Zhang",
"Yongfeng",
""
],
[
"Tolomei",
"Gabriele",
""
]
] | TITLE: The Dark Side of Explanations: Poisoning Recommender Systems with
Counterfactual Examples
ABSTRACT: Deep learning-based recommender systems have become an integral part of
several online platforms. However, their black-box nature emphasizes the need
for explainable artificial intelligence (XAI) approaches to provide
human-understandable reasons why a specific item gets recommended to a given
user. One such method is counterfactual explanation (CF). While CFs can be
highly beneficial for users and system designers, malicious actors may also
exploit these explanations to undermine the system's security. In this work, we
propose H-CARS, a novel strategy to poison recommender systems via CFs.
Specifically, we first train a logical-reasoning-based surrogate model on
training data derived from counterfactual explanations. By reversing the
learning process of the recommendation model, we thus develop a proficient
greedy algorithm to generate fabricated user profiles and their associated
interaction records for the aforementioned surrogate model. Our experiments,
which employ a well-known CF generation method and are conducted on two
distinct datasets, show that H-CARS yields significant and successful attack
performance.
| no_new_dataset | 0.708855 |
2305.00581 | Xuehai He | Xuehai He, Xin Eric Wang | Multimodal Graph Transformer for Multimodal Question Answering | null | null | null | null | cs.CV cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Despite the success of Transformer models in vision and language tasks, they
often learn knowledge from enormous data implicitly and cannot utilize
structured input data directly. On the other hand, structured learning
approaches such as graph neural networks (GNNs) that integrate prior
information can barely compete with Transformer models. In this work, we aim to
benefit from both worlds and propose a novel Multimodal Graph Transformer for
question answering tasks that requires performing reasoning across multiple
modalities. We introduce a graph-involved plug-and-play quasi-attention
mechanism to incorporate multimodal graph information, acquired from text and
visual data, to the vanilla self-attention as effective prior. In particular,
we construct the text graph, dense region graph, and semantic graph to generate
adjacency matrices, and then compose them with input vision and language
features to perform downstream reasoning. Such a way of regularizing
self-attention with graph information significantly improves the inferring
ability and helps align features from different modalities. We validate the
effectiveness of Multimodal Graph Transformer over its Transformer baselines on
GQA, VQAv2, and MultiModalQA datasets.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 21:22:35 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"He",
"Xuehai",
""
],
[
"Wang",
"Xin Eric",
""
]
] | TITLE: Multimodal Graph Transformer for Multimodal Question Answering
ABSTRACT: Despite the success of Transformer models in vision and language tasks, they
often learn knowledge from enormous data implicitly and cannot utilize
structured input data directly. On the other hand, structured learning
approaches such as graph neural networks (GNNs) that integrate prior
information can barely compete with Transformer models. In this work, we aim to
benefit from both worlds and propose a novel Multimodal Graph Transformer for
question answering tasks that requires performing reasoning across multiple
modalities. We introduce a graph-involved plug-and-play quasi-attention
mechanism to incorporate multimodal graph information, acquired from text and
visual data, to the vanilla self-attention as effective prior. In particular,
we construct the text graph, dense region graph, and semantic graph to generate
adjacency matrices, and then compose them with input vision and language
features to perform downstream reasoning. Such a way of regularizing
self-attention with graph information significantly improves the inferring
ability and helps align features from different modalities. We validate the
effectiveness of Multimodal Graph Transformer over its Transformer baselines on
GQA, VQAv2, and MultiModalQA datasets.
| no_new_dataset | 0.709416 |
2305.00596 | Ben Zandonati | Ben Zandonati, Ruohan Wang, Ruihan Gao, Yan Wu | Investigating Vision Foundational Models for Tactile Representation
Learning | null | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | Tactile representation learning (TRL) equips robots with the ability to
leverage touch information, boosting performance in tasks such as environment
perception and object manipulation. However, the heterogeneity of tactile
sensors results in many sensor- and task-specific learning approaches. This
limits the efficacy of existing tactile datasets, and the subsequent
generalisability of any learning outcome. In this work, we investigate the
applicability of vision foundational models to sensor-agnostic TRL, via a
simple yet effective transformation technique to feed the heterogeneous sensor
readouts into the model. Our approach recasts TRL as a computer vision (CV)
problem, which permits the application of various CV techniques for tackling
TRL-specific challenges. We evaluate our approach on multiple benchmark tasks,
using datasets collected from four different tactile sensors. Empirically, we
demonstrate significant improvements in task performance, model robustness, as
well as cross-sensor and cross-task knowledge transferability with limited data
requirements.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 22:38:44 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Zandonati",
"Ben",
""
],
[
"Wang",
"Ruohan",
""
],
[
"Gao",
"Ruihan",
""
],
[
"Wu",
"Yan",
""
]
] | TITLE: Investigating Vision Foundational Models for Tactile Representation
Learning
ABSTRACT: Tactile representation learning (TRL) equips robots with the ability to
leverage touch information, boosting performance in tasks such as environment
perception and object manipulation. However, the heterogeneity of tactile
sensors results in many sensor- and task-specific learning approaches. This
limits the efficacy of existing tactile datasets, and the subsequent
generalisability of any learning outcome. In this work, we investigate the
applicability of vision foundational models to sensor-agnostic TRL, via a
simple yet effective transformation technique to feed the heterogeneous sensor
readouts into the model. Our approach recasts TRL as a computer vision (CV)
problem, which permits the application of various CV techniques for tackling
TRL-specific challenges. We evaluate our approach on multiple benchmark tasks,
using datasets collected from four different tactile sensors. Empirically, we
demonstrate significant improvements in task performance, model robustness, as
well as cross-sensor and cross-task knowledge transferability with limited data
requirements.
| no_new_dataset | 0.709849 |
2305.00606 | Derguene Mbaye | Derguene Mbaye, Moussa Diallo, Thierno Ibrahima Diop | Low-Resourced Machine Translation for Senegalese Wolof Language | 14 pages, 5 figures, 2 Tables, 8th International Congress on
Information and Communication Technology (ICICT 2023) | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Natural Language Processing (NLP) research has made great advancements in
recent years with major breakthroughs that have established new benchmarks.
However, these advances have mainly benefited a certain group of languages
commonly referred to as resource-rich such as English and French. Majority of
other languages with weaker resources are then left behind which is the case
for most African languages including Wolof. In this work, we present a parallel
Wolof/French corpus of 123,000 sentences on which we conducted experiments on
machine translation models based on Recurrent Neural Networks (RNN) in
different data configurations. We noted performance gains with the models
trained on subworded data as well as those trained on the French-English
language pair compared to those trained on the French-Wolof pair under the same
experimental conditions.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 00:04:19 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Mbaye",
"Derguene",
""
],
[
"Diallo",
"Moussa",
""
],
[
"Diop",
"Thierno Ibrahima",
""
]
] | TITLE: Low-Resourced Machine Translation for Senegalese Wolof Language
ABSTRACT: Natural Language Processing (NLP) research has made great advancements in
recent years with major breakthroughs that have established new benchmarks.
However, these advances have mainly benefited a certain group of languages
commonly referred to as resource-rich such as English and French. Majority of
other languages with weaker resources are then left behind which is the case
for most African languages including Wolof. In this work, we present a parallel
Wolof/French corpus of 123,000 sentences on which we conducted experiments on
machine translation models based on Recurrent Neural Networks (RNN) in
different data configurations. We noted performance gains with the models
trained on subworded data as well as those trained on the French-English
language pair compared to those trained on the French-Wolof pair under the same
experimental conditions.
| new_dataset | 0.710208 |
2305.00607 | Guozhang Li | Guozhang Li, De Cheng, Xinpeng Ding, Nannan Wang, Xiaoyu Wang, Xinbo
Gao | Boosting Weakly-Supervised Temporal Action Localization with Text
Information | CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the lack of temporal annotation, current Weakly-supervised Temporal
Action Localization (WTAL) methods are generally stuck into over-complete or
incomplete localization. In this paper, we aim to leverage the text information
to boost WTAL from two aspects, i.e., (a) the discriminative objective to
enlarge the inter-class difference, thus reducing the over-complete; (b) the
generative objective to enhance the intra-class integrity, thus finding more
complete temporal boundaries. For the discriminative objective, we propose a
Text-Segment Mining (TSM) mechanism, which constructs a text description based
on the action class label, and regards the text as the query to mine all
class-related segments. Without the temporal annotation of actions, TSM
compares the text query with the entire videos across the dataset to mine the
best matching segments while ignoring irrelevant ones. Due to the shared
sub-actions in different categories of videos, merely applying TSM is too
strict to neglect the semantic-related segments, which results in incomplete
localization. We further introduce a generative objective named Video-text
Language Completion (VLC), which focuses on all semantic-related segments from
videos to complete the text sentence. We achieve the state-of-the-art
performance on THUMOS14 and ActivityNet1.3. Surprisingly, we also find our
proposed method can be seamlessly applied to existing methods, and improve
their performances with a clear margin. The code is available at
https://github.com/lgzlIlIlI/Boosting-WTAL.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 00:07:09 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Li",
"Guozhang",
""
],
[
"Cheng",
"De",
""
],
[
"Ding",
"Xinpeng",
""
],
[
"Wang",
"Nannan",
""
],
[
"Wang",
"Xiaoyu",
""
],
[
"Gao",
"Xinbo",
""
]
] | TITLE: Boosting Weakly-Supervised Temporal Action Localization with Text
Information
ABSTRACT: Due to the lack of temporal annotation, current Weakly-supervised Temporal
Action Localization (WTAL) methods are generally stuck into over-complete or
incomplete localization. In this paper, we aim to leverage the text information
to boost WTAL from two aspects, i.e., (a) the discriminative objective to
enlarge the inter-class difference, thus reducing the over-complete; (b) the
generative objective to enhance the intra-class integrity, thus finding more
complete temporal boundaries. For the discriminative objective, we propose a
Text-Segment Mining (TSM) mechanism, which constructs a text description based
on the action class label, and regards the text as the query to mine all
class-related segments. Without the temporal annotation of actions, TSM
compares the text query with the entire videos across the dataset to mine the
best matching segments while ignoring irrelevant ones. Due to the shared
sub-actions in different categories of videos, merely applying TSM is too
strict to neglect the semantic-related segments, which results in incomplete
localization. We further introduce a generative objective named Video-text
Language Completion (VLC), which focuses on all semantic-related segments from
videos to complete the text sentence. We achieve the state-of-the-art
performance on THUMOS14 and ActivityNet1.3. Surprisingly, we also find our
proposed method can be seamlessly applied to existing methods, and improve
their performances with a clear margin. The code is available at
https://github.com/lgzlIlIlI/Boosting-WTAL.
| no_new_dataset | 0.710791 |
2305.00618 | Carl Brando | Carl Brando, Minseong Park, Sayma Nowshin Chowdhury, Matthew Chen,
Kyusang Lee, Sahil Shah | Modeling and Analysis of Analog Non-Volatile Devices for
Compute-In-Memory Applications | Submitted to MWSCAS 2023. 5 pages, 4 figures, 1 table | null | null | null | cs.AR | http://creativecommons.org/licenses/by/4.0/ | This paper introduces a novel simulation tool for analyzing and training
neural network models tailored for compute-in-memory hardware. The tool
leverages physics-based device models to enable the design of neural network
models and their parameters that are more hardware-accurate. The initial study
focused on modeling a CMOS-based floating-gate transistor and memristor device
using measurement data from a fabricated device. Additionally, the tool
incorporates hardware constraints, such as the dynamic range of data
converters, and allows users to specify circuit-level constraints. A case study
using the MNIST dataset and LeNet-5 architecture demonstrates the tool's
capability to estimate area, power, and accuracy. The results showcase the
potential of the proposed tool to optimize neural network models for
compute-in-memory hardware.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 01:25:50 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Brando",
"Carl",
""
],
[
"Park",
"Minseong",
""
],
[
"Chowdhury",
"Sayma Nowshin",
""
],
[
"Chen",
"Matthew",
""
],
[
"Lee",
"Kyusang",
""
],
[
"Shah",
"Sahil",
""
]
] | TITLE: Modeling and Analysis of Analog Non-Volatile Devices for
Compute-In-Memory Applications
ABSTRACT: This paper introduces a novel simulation tool for analyzing and training
neural network models tailored for compute-in-memory hardware. The tool
leverages physics-based device models to enable the design of neural network
models and their parameters that are more hardware-accurate. The initial study
focused on modeling a CMOS-based floating-gate transistor and memristor device
using measurement data from a fabricated device. Additionally, the tool
incorporates hardware constraints, such as the dynamic range of data
converters, and allows users to specify circuit-level constraints. A case study
using the MNIST dataset and LeNet-5 architecture demonstrates the tool's
capability to estimate area, power, and accuracy. The results showcase the
potential of the proposed tool to optimize neural network models for
compute-in-memory hardware.
| no_new_dataset | 0.709239 |
2305.00619 | Shohreh Deldari | Jason Liu, Shohreh Deldari, Hao Xue, Van Nguyen, Flora D. Salim | Self-supervised Activity Representation Learning with Incremental Data:
An Empirical Study | 6 pages, accepted in the 24th IEEE International Conference on Mobile
Data Management (MDM2023) | null | null | null | cs.LG eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the context of mobile sensing environments, various sensors on mobile
devices continually generate a vast amount of data. Analyzing this
ever-increasing data presents several challenges, including limited access to
annotated data and a constantly changing environment. Recent advancements in
self-supervised learning have been utilized as a pre-training step to enhance
the performance of conventional supervised models to address the absence of
labelled datasets. This research examines the impact of using a self-supervised
representation learning model for time series classification tasks in which
data is incrementally available. We proposed and evaluated a workflow in which
a model learns to extract informative features using a corpus of unlabeled time
series data and then conducts classification on labelled data using features
extracted by the model. We analyzed the effect of varying the size,
distribution, and source of the unlabeled data on the final classification
performance across four public datasets, including various types of sensors in
diverse applications.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 01:39:55 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Liu",
"Jason",
""
],
[
"Deldari",
"Shohreh",
""
],
[
"Xue",
"Hao",
""
],
[
"Nguyen",
"Van",
""
],
[
"Salim",
"Flora D.",
""
]
] | TITLE: Self-supervised Activity Representation Learning with Incremental Data:
An Empirical Study
ABSTRACT: In the context of mobile sensing environments, various sensors on mobile
devices continually generate a vast amount of data. Analyzing this
ever-increasing data presents several challenges, including limited access to
annotated data and a constantly changing environment. Recent advancements in
self-supervised learning have been utilized as a pre-training step to enhance
the performance of conventional supervised models to address the absence of
labelled datasets. This research examines the impact of using a self-supervised
representation learning model for time series classification tasks in which
data is incrementally available. We proposed and evaluated a workflow in which
a model learns to extract informative features using a corpus of unlabeled time
series data and then conducts classification on labelled data using features
extracted by the model. We analyzed the effect of varying the size,
distribution, and source of the unlabeled data on the final classification
performance across four public datasets, including various types of sensors in
diverse applications.
| no_new_dataset | 0.710641 |
2305.00620 | Liang Bai | Liang Bai, Hangjie Yuan, Tao Feng, Hong Song, Jian Yang | Refined Response Distillation for Class-Incremental Player Detection | 13 pages, 10 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting players from sports broadcast videos is essential for intelligent
event analysis. However, existing methods assume fixed player categories,
incapably accommodating the real-world scenarios where categories continue to
evolve. Directly fine-tuning these methods on newly emerging categories also
exist the catastrophic forgetting due to the non-stationary distribution.
Inspired by recent research on incremental object detection (IOD), we propose a
Refined Response Distillation (R^2D) method to effectively mitigate
catastrophic forgetting for IOD tasks of the players. Firstly, we design a
progressive coarse-to-fine distillation region dividing scheme, separating
high-value and low-value regions from classification and regression responses
for precise and fine-grained regional knowledge distillation. Subsequently, a
tailored refined distillation strategy is developed on regions with varying
significance to address the performance limitations posed by pronounced feature
homogeneity in the IOD tasks of the players. Furthermore, we present the
NBA-IOD and Volleyball-IOD datasets as the benchmark and investigate the IOD
tasks of the players systematically. Extensive experiments conducted on
benchmarks demonstrate that our method achieves state-of-the-art results.The
code and datasets are available at https://github.com/beiyan1911/Players-IOD.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 01:49:48 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Bai",
"Liang",
""
],
[
"Yuan",
"Hangjie",
""
],
[
"Feng",
"Tao",
""
],
[
"Song",
"Hong",
""
],
[
"Yang",
"Jian",
""
]
] | TITLE: Refined Response Distillation for Class-Incremental Player Detection
ABSTRACT: Detecting players from sports broadcast videos is essential for intelligent
event analysis. However, existing methods assume fixed player categories,
incapably accommodating the real-world scenarios where categories continue to
evolve. Directly fine-tuning these methods on newly emerging categories also
exist the catastrophic forgetting due to the non-stationary distribution.
Inspired by recent research on incremental object detection (IOD), we propose a
Refined Response Distillation (R^2D) method to effectively mitigate
catastrophic forgetting for IOD tasks of the players. Firstly, we design a
progressive coarse-to-fine distillation region dividing scheme, separating
high-value and low-value regions from classification and regression responses
for precise and fine-grained regional knowledge distillation. Subsequently, a
tailored refined distillation strategy is developed on regions with varying
significance to address the performance limitations posed by pronounced feature
homogeneity in the IOD tasks of the players. Furthermore, we present the
NBA-IOD and Volleyball-IOD datasets as the benchmark and investigate the IOD
tasks of the players systematically. Extensive experiments conducted on
benchmarks demonstrate that our method achieves state-of-the-art results.The
code and datasets are available at https://github.com/beiyan1911/Players-IOD.
| no_new_dataset | 0.633637 |
2305.00623 | Ilgee Hong | Ilgee Hong, Huy Tran, Claire Donnat | A Simplified Framework for Contrastive Learning for Node Representations | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Contrastive learning has recently established itself as a powerful
self-supervised learning framework for extracting rich and versatile data
representations. Broadly speaking, contrastive learning relies on a data
augmentation scheme to generate two versions of the input data and learns
low-dimensional representations by maximizing a normalized temperature-scaled
cross entropy loss (NT-Xent) to identify augmented samples corresponding to the
same original entity. In this paper, we investigate the potential of deploying
contrastive learning in combination with Graph Neural Networks for embedding
nodes in a graph. Specifically, we show that the quality of the resulting
embeddings and training time can be significantly improved by a simple
column-wise postprocessing of the embedding matrix, instead of the row-wise
postprocessing via multilayer perceptrons (MLPs) that is adopted by the
majority of peer methods. This modification yields improvements in downstream
classification tasks of up to 1.5% and even beats existing state-of-the-art
approaches on 6 out of 8 different benchmarks. We justify our choices of
postprocessing by revisiting the "alignment vs. uniformity paradigm", and show
that column-wise post-processing improves both "alignment" and "uniformity" of
the embeddings.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 02:04:36 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Hong",
"Ilgee",
""
],
[
"Tran",
"Huy",
""
],
[
"Donnat",
"Claire",
""
]
] | TITLE: A Simplified Framework for Contrastive Learning for Node Representations
ABSTRACT: Contrastive learning has recently established itself as a powerful
self-supervised learning framework for extracting rich and versatile data
representations. Broadly speaking, contrastive learning relies on a data
augmentation scheme to generate two versions of the input data and learns
low-dimensional representations by maximizing a normalized temperature-scaled
cross entropy loss (NT-Xent) to identify augmented samples corresponding to the
same original entity. In this paper, we investigate the potential of deploying
contrastive learning in combination with Graph Neural Networks for embedding
nodes in a graph. Specifically, we show that the quality of the resulting
embeddings and training time can be significantly improved by a simple
column-wise postprocessing of the embedding matrix, instead of the row-wise
postprocessing via multilayer perceptrons (MLPs) that is adopted by the
majority of peer methods. This modification yields improvements in downstream
classification tasks of up to 1.5% and even beats existing state-of-the-art
approaches on 6 out of 8 different benchmarks. We justify our choices of
postprocessing by revisiting the "alignment vs. uniformity paradigm", and show
that column-wise post-processing improves both "alignment" and "uniformity" of
the embeddings.
| no_new_dataset | 0.709384 |
2305.00630 | Youngmin Baek | Youngmin Baek, Daehyun Nam, Jaeheung Surh, Seung Shin, Seonghyeon Kim | TRACE: Table Reconstruction Aligned to Corner and Edges | 18 pages, 7 figures, Accepted by ICDAR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A table is an object that captures structured and informative content within
a document, and recognizing a table in an image is challenging due to the
complexity and variety of table layouts. Many previous works typically adopt a
two-stage approach; (1) Table detection(TD) localizes the table region in an
image and (2) Table Structure Recognition(TSR) identifies row- and column-wise
adjacency relations between the cells. The use of a two-stage approach often
entails the consequences of error propagation between the modules and raises
training and inference inefficiency. In this work, we analyze the natural
characteristics of a table, where a table is composed of cells and each cell is
made up of borders consisting of edges. We propose a novel method to
reconstruct the table in a bottom-up manner. Through a simple process, the
proposed method separates cell boundaries from low-level features, such as
corners and edges, and localizes table positions by combining the cells. A
simple design makes the model easier to train and requires less computation
than previous two-stage methods. We achieve state-of-the-art performance on the
ICDAR2013 table competition benchmark and Wired Table in the Wild(WTW) dataset.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 02:26:15 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Baek",
"Youngmin",
""
],
[
"Nam",
"Daehyun",
""
],
[
"Surh",
"Jaeheung",
""
],
[
"Shin",
"Seung",
""
],
[
"Kim",
"Seonghyeon",
""
]
] | TITLE: TRACE: Table Reconstruction Aligned to Corner and Edges
ABSTRACT: A table is an object that captures structured and informative content within
a document, and recognizing a table in an image is challenging due to the
complexity and variety of table layouts. Many previous works typically adopt a
two-stage approach; (1) Table detection(TD) localizes the table region in an
image and (2) Table Structure Recognition(TSR) identifies row- and column-wise
adjacency relations between the cells. The use of a two-stage approach often
entails the consequences of error propagation between the modules and raises
training and inference inefficiency. In this work, we analyze the natural
characteristics of a table, where a table is composed of cells and each cell is
made up of borders consisting of edges. We propose a novel method to
reconstruct the table in a bottom-up manner. Through a simple process, the
proposed method separates cell boundaries from low-level features, such as
corners and edges, and localizes table positions by combining the cells. A
simple design makes the model easier to train and requires less computation
than previous two-stage methods. We achieve state-of-the-art performance on the
ICDAR2013 table competition benchmark and Wired Table in the Wild(WTW) dataset.
| no_new_dataset | 0.710446 |
2305.00671 | Fangjian Lin | Yizhe Ma, Fangjian Lin, Sitong Wu, Shengwei Tian, Long Yu | PRSeg: A Lightweight Patch Rotate MLP Decoder for Semantic Segmentation | Accepted by IEEE TCSVT | null | 10.1109/TCSVT.2023.3271523 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The lightweight MLP-based decoder has become increasingly promising for
semantic segmentation. However, the channel-wise MLP cannot expand the
receptive fields, lacking the context modeling capacity, which is critical to
semantic segmentation. In this paper, we propose a parametric-free patch rotate
operation to reorganize the pixels spatially. It first divides the feature map
into multiple groups and then rotates the patches within each group. Based on
the proposed patch rotate operation, we design a novel segmentation network,
named PRSeg, which includes an off-the-shelf backbone and a lightweight Patch
Rotate MLP decoder containing multiple Dynamic Patch Rotate Blocks
(DPR-Blocks). In each DPR-Block, the fully connected layer is performed
following a Patch Rotate Module (PRM) to exchange spatial information between
pixels. Specifically, in PRM, the feature map is first split into the reserved
part and rotated part along the channel dimension according to the predicted
probability of the Dynamic Channel Selection Module (DCSM), and our proposed
patch rotate operation is only performed on the rotated part. Extensive
experiments on ADE20K, Cityscapes and COCO-Stuff 10K datasets prove the
effectiveness of our approach. We expect that our PRSeg can promote the
development of MLP-based decoder in semantic segmentation.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 06:03:16 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Ma",
"Yizhe",
""
],
[
"Lin",
"Fangjian",
""
],
[
"Wu",
"Sitong",
""
],
[
"Tian",
"Shengwei",
""
],
[
"Yu",
"Long",
""
]
] | TITLE: PRSeg: A Lightweight Patch Rotate MLP Decoder for Semantic Segmentation
ABSTRACT: The lightweight MLP-based decoder has become increasingly promising for
semantic segmentation. However, the channel-wise MLP cannot expand the
receptive fields, lacking the context modeling capacity, which is critical to
semantic segmentation. In this paper, we propose a parametric-free patch rotate
operation to reorganize the pixels spatially. It first divides the feature map
into multiple groups and then rotates the patches within each group. Based on
the proposed patch rotate operation, we design a novel segmentation network,
named PRSeg, which includes an off-the-shelf backbone and a lightweight Patch
Rotate MLP decoder containing multiple Dynamic Patch Rotate Blocks
(DPR-Blocks). In each DPR-Block, the fully connected layer is performed
following a Patch Rotate Module (PRM) to exchange spatial information between
pixels. Specifically, in PRM, the feature map is first split into the reserved
part and rotated part along the channel dimension according to the predicted
probability of the Dynamic Channel Selection Module (DCSM), and our proposed
patch rotate operation is only performed on the rotated part. Extensive
experiments on ADE20K, Cityscapes and COCO-Stuff 10K datasets prove the
effectiveness of our approach. We expect that our PRSeg can promote the
development of MLP-based decoder in semantic segmentation.
| no_new_dataset | 0.712182 |
2305.00673 | Yunhao Bai | Yunhao Bai, Duowen Chen, Qingli Li, Wei Shen and Yan Wang | Bidirectional Copy-Paste for Semi-Supervised Medical Image Segmentation | 8 pages, 6 figures. CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In semi-supervised medical image segmentation, there exist empirical mismatch
problems between labeled and unlabeled data distribution. The knowledge learned
from the labeled data may be largely discarded if treating labeled and
unlabeled data separately or in an inconsistent manner. We propose a
straightforward method for alleviating the problem - copy-pasting labeled and
unlabeled data bidirectionally, in a simple Mean Teacher architecture. The
method encourages unlabeled data to learn comprehensive common semantics from
the labeled data in both inward and outward directions. More importantly, the
consistent learning procedure for labeled and unlabeled data can largely reduce
the empirical distribution gap. In detail, we copy-paste a random crop from a
labeled image (foreground) onto an unlabeled image (background) and an
unlabeled image (foreground) onto a labeled image (background), respectively.
The two mixed images are fed into a Student network and supervised by the mixed
supervisory signals of pseudo-labels and ground-truth. We reveal that the
simple mechanism of copy-pasting bidirectionally between labeled and unlabeled
data is good enough and the experiments show solid gains (e.g., over 21% Dice
improvement on ACDC dataset with 5% labeled data) compared with other
state-of-the-arts on various semi-supervised medical image segmentation
datasets. Code is available at https://github.com/DeepMed-Lab-ECNU/BCP}.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 06:06:51 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Bai",
"Yunhao",
""
],
[
"Chen",
"Duowen",
""
],
[
"Li",
"Qingli",
""
],
[
"Shen",
"Wei",
""
],
[
"Wang",
"Yan",
""
]
] | TITLE: Bidirectional Copy-Paste for Semi-Supervised Medical Image Segmentation
ABSTRACT: In semi-supervised medical image segmentation, there exist empirical mismatch
problems between labeled and unlabeled data distribution. The knowledge learned
from the labeled data may be largely discarded if treating labeled and
unlabeled data separately or in an inconsistent manner. We propose a
straightforward method for alleviating the problem - copy-pasting labeled and
unlabeled data bidirectionally, in a simple Mean Teacher architecture. The
method encourages unlabeled data to learn comprehensive common semantics from
the labeled data in both inward and outward directions. More importantly, the
consistent learning procedure for labeled and unlabeled data can largely reduce
the empirical distribution gap. In detail, we copy-paste a random crop from a
labeled image (foreground) onto an unlabeled image (background) and an
unlabeled image (foreground) onto a labeled image (background), respectively.
The two mixed images are fed into a Student network and supervised by the mixed
supervisory signals of pseudo-labels and ground-truth. We reveal that the
simple mechanism of copy-pasting bidirectionally between labeled and unlabeled
data is good enough and the experiments show solid gains (e.g., over 21% Dice
improvement on ACDC dataset with 5% labeled data) compared with other
state-of-the-arts on various semi-supervised medical image segmentation
datasets. Code is available at https://github.com/DeepMed-Lab-ECNU/BCP}.
| no_new_dataset | 0.710842 |
2305.00678 | Yi Lin | Yi Lin, Dong Zhang, Xiao Fang, Yufan Chen, Kwang-Ting Cheng, Hao Chen | Rethinking Boundary Detection in Deep Learning Models for Medical Image
Segmentation | Accepted by IPMI 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Medical image segmentation is a fundamental task in the community of medical
image analysis. In this paper, a novel network architecture, referred to as
Convolution, Transformer, and Operator (CTO), is proposed. CTO employs a
combination of Convolutional Neural Networks (CNNs), Vision Transformer (ViT),
and an explicit boundary detection operator to achieve high recognition
accuracy while maintaining an optimal balance between accuracy and efficiency.
The proposed CTO follows the standard encoder-decoder segmentation paradigm,
where the encoder network incorporates a popular CNN backbone for capturing
local semantic information, and a lightweight ViT assistant for integrating
long-range dependencies. To enhance the learning capacity on boundary, a
boundary-guided decoder network is proposed that uses a boundary mask obtained
from a dedicated boundary detection operator as explicit supervision to guide
the decoding learning process. The performance of the proposed method is
evaluated on six challenging medical image segmentation datasets, demonstrating
that CTO achieves state-of-the-art accuracy with a competitive model
complexity.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 06:13:08 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Lin",
"Yi",
""
],
[
"Zhang",
"Dong",
""
],
[
"Fang",
"Xiao",
""
],
[
"Chen",
"Yufan",
""
],
[
"Cheng",
"Kwang-Ting",
""
],
[
"Chen",
"Hao",
""
]
] | TITLE: Rethinking Boundary Detection in Deep Learning Models for Medical Image
Segmentation
ABSTRACT: Medical image segmentation is a fundamental task in the community of medical
image analysis. In this paper, a novel network architecture, referred to as
Convolution, Transformer, and Operator (CTO), is proposed. CTO employs a
combination of Convolutional Neural Networks (CNNs), Vision Transformer (ViT),
and an explicit boundary detection operator to achieve high recognition
accuracy while maintaining an optimal balance between accuracy and efficiency.
The proposed CTO follows the standard encoder-decoder segmentation paradigm,
where the encoder network incorporates a popular CNN backbone for capturing
local semantic information, and a lightweight ViT assistant for integrating
long-range dependencies. To enhance the learning capacity on boundary, a
boundary-guided decoder network is proposed that uses a boundary mask obtained
from a dedicated boundary detection operator as explicit supervision to guide
the decoding learning process. The performance of the proposed method is
evaluated on six challenging medical image segmentation datasets, demonstrating
that CTO achieves state-of-the-art accuracy with a competitive model
complexity.
| no_new_dataset | 0.711193 |
2305.00696 | Litao Yang | Litao Yang, Deval Mehta, Sidong Liu, Dwarikanath Mahapatra, Antonio Di
Ieva, Zongyuan Ge | TPMIL: Trainable Prototype Enhanced Multiple Instance Learning for Whole
Slide Image Classification | Accepted for MIDL 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Digital pathology based on whole slide images (WSIs) plays a key role in
cancer diagnosis and clinical practice. Due to the high resolution of the WSI
and the unavailability of patch-level annotations, WSI classification is
usually formulated as a weakly supervised problem, which relies on multiple
instance learning (MIL) based on patches of a WSI. In this paper, we aim to
learn an optimal patch-level feature space by integrating prototype learning
with MIL. To this end, we develop a Trainable Prototype enhanced deep MIL
(TPMIL) framework for weakly supervised WSI classification. In contrast to the
conventional methods which rely on a certain number of selected patches for
feature space refinement, we softly cluster all the instances by allocating
them to their corresponding prototypes. Additionally, our method is able to
reveal the correlations between different tumor subtypes through distances
between corresponding trained prototypes. More importantly, TPMIL also enables
to provide a more accurate interpretability based on the distance of the
instances from the trained prototypes which serves as an alternative to the
conventional attention score-based interpretability. We test our method on two
WSI datasets and it achieves a new SOTA. GitHub repository:
https://github.com/LitaoYang-Jet/TPMIL
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 07:39:19 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Yang",
"Litao",
""
],
[
"Mehta",
"Deval",
""
],
[
"Liu",
"Sidong",
""
],
[
"Mahapatra",
"Dwarikanath",
""
],
[
"Di Ieva",
"Antonio",
""
],
[
"Ge",
"Zongyuan",
""
]
] | TITLE: TPMIL: Trainable Prototype Enhanced Multiple Instance Learning for Whole
Slide Image Classification
ABSTRACT: Digital pathology based on whole slide images (WSIs) plays a key role in
cancer diagnosis and clinical practice. Due to the high resolution of the WSI
and the unavailability of patch-level annotations, WSI classification is
usually formulated as a weakly supervised problem, which relies on multiple
instance learning (MIL) based on patches of a WSI. In this paper, we aim to
learn an optimal patch-level feature space by integrating prototype learning
with MIL. To this end, we develop a Trainable Prototype enhanced deep MIL
(TPMIL) framework for weakly supervised WSI classification. In contrast to the
conventional methods which rely on a certain number of selected patches for
feature space refinement, we softly cluster all the instances by allocating
them to their corresponding prototypes. Additionally, our method is able to
reveal the correlations between different tumor subtypes through distances
between corresponding trained prototypes. More importantly, TPMIL also enables
to provide a more accurate interpretability based on the distance of the
instances from the trained prototypes which serves as an alternative to the
conventional attention score-based interpretability. We test our method on two
WSI datasets and it achieves a new SOTA. GitHub repository:
https://github.com/LitaoYang-Jet/TPMIL
| no_new_dataset | 0.710848 |
2305.00705 | Flip van Spaendonck Msc. | P.H.M. van Spaendonck | Efficient dynamic model based testing using greedy test case selection | null | null | null | null | cs.SE cs.DS | http://creativecommons.org/publicdomain/zero/1.0/ | Model-based testing (MBT) provides an automated approach for finding
discrepancies between software models and their implementation. If we want to
incorporate MBT into the fast and iterative software development process that
is Continuous Integration Continuous Deployment, then MBT must be able to test
the entire model in as little time as possible. However, current academic MBT
tools either traverse models at random, which we show to be ineffective for
this purpose, or use precalculated optimal paths which can not be efficiently
calculated for large industrial models. We provide a new traversal strategy
that provides an improvement in error-detection rate comparable to using
recalculated paths. We show that the new strategy is able to be applied
efficiently to large models. The benchmarks are performed on a mix of
real-world and pseudo-randomly generated models. We observe no significant
difference between these two types of models.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 08:08:50 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"van Spaendonck",
"P. H. M.",
""
]
] | TITLE: Efficient dynamic model based testing using greedy test case selection
ABSTRACT: Model-based testing (MBT) provides an automated approach for finding
discrepancies between software models and their implementation. If we want to
incorporate MBT into the fast and iterative software development process that
is Continuous Integration Continuous Deployment, then MBT must be able to test
the entire model in as little time as possible. However, current academic MBT
tools either traverse models at random, which we show to be ineffective for
this purpose, or use precalculated optimal paths which can not be efficiently
calculated for large industrial models. We provide a new traversal strategy
that provides an improvement in error-detection rate comparable to using
recalculated paths. We show that the new strategy is able to be applied
efficiently to large models. The benchmarks are performed on a mix of
real-world and pseudo-randomly generated models. We observe no significant
difference between these two types of models.
| no_new_dataset | 0.707424 |
2305.00715 | Jatin Nainani | Jatin Nainani, Abhishek Mazumdar, Viraj Sheth | ZeroSearch: Local Image Search from Text with Zero Shot Learning | 8 pages, 8 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The problem of organizing and finding images in a user's directory has become
increasingly challenging due to the rapid growth in the number of images
captured on personal devices. This paper presents a solution that utilizes zero
shot learning to create image queries with only user provided text
descriptions. The paper's primary contribution is the development of an
algorithm that utilizes pre-trained models to extract features from images. The
algorithm uses OWL to check for the presence of bounding boxes and sorts images
based on cosine similarity scores. The algorithm's output is a list of images
sorted in descending order of similarity, helping users to locate specific
images more efficiently. The paper's experiments were conducted using a custom
dataset to simulate a user's image directory and evaluated the accuracy,
inference time, and size of the models. The results showed that the VGG model
achieved the highest accuracy, while the Resnet50 and InceptionV3 models had
the lowest inference time and size. The papers proposed algorithm provides an
effective and efficient solution for organizing and finding images in a users
local directory. The algorithm's performance and flexibility make it suitable
for various applications, including personal image organization and search
engines. Code and dataset for zero-search are available at:
https://github.com/NainaniJatinZ/zero-search
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 08:27:24 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Nainani",
"Jatin",
""
],
[
"Mazumdar",
"Abhishek",
""
],
[
"Sheth",
"Viraj",
""
]
] | TITLE: ZeroSearch: Local Image Search from Text with Zero Shot Learning
ABSTRACT: The problem of organizing and finding images in a user's directory has become
increasingly challenging due to the rapid growth in the number of images
captured on personal devices. This paper presents a solution that utilizes zero
shot learning to create image queries with only user provided text
descriptions. The paper's primary contribution is the development of an
algorithm that utilizes pre-trained models to extract features from images. The
algorithm uses OWL to check for the presence of bounding boxes and sorts images
based on cosine similarity scores. The algorithm's output is a list of images
sorted in descending order of similarity, helping users to locate specific
images more efficiently. The paper's experiments were conducted using a custom
dataset to simulate a user's image directory and evaluated the accuracy,
inference time, and size of the models. The results showed that the VGG model
achieved the highest accuracy, while the Resnet50 and InceptionV3 models had
the lowest inference time and size. The papers proposed algorithm provides an
effective and efficient solution for organizing and finding images in a users
local directory. The algorithm's performance and flexibility make it suitable
for various applications, including personal image organization and search
engines. Code and dataset for zero-search are available at:
https://github.com/NainaniJatinZ/zero-search
| new_dataset | 0.714591 |
2305.00716 | Yingcong Lu | Yipeng Liu, Yingcong Lu, Weiting Ou, Zhen Long, Ce Zhu | Adaptively Topological Tensor Network for Multi-view Subspace Clustering | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-view subspace clustering methods have employed learned
self-representation tensors from different tensor decompositions to exploit low
rank information. However, the data structures embedded with
self-representation tensors may vary in different multi-view datasets.
Therefore, a pre-defined tensor decomposition may not fully exploit low rank
information for a certain dataset, resulting in sub-optimal multi-view
clustering performance. To alleviate the aforementioned limitations, we propose
the adaptively topological tensor network (ATTN) by determining the edge ranks
from the structural information of the self-representation tensor, and it can
give a better tensor representation with the data-driven strategy.
Specifically, in multi-view tensor clustering, we analyze the higher-order
correlations among different modes of a self-representation tensor, and prune
the links of the weakly correlated ones from a fully connected tensor network.
Therefore, the newly obtained tensor networks can efficiently explore the
essential clustering information with self-representation with different tensor
structures for various datasets. A greedy adaptive rank-increasing strategy is
further applied to improve the capture capacity of low rank structure. We apply
ATTN on multi-view subspace clustering and utilize the alternating direction
method of multipliers to solve it. Experimental results show that multi-view
subspace clustering based on ATTN outperforms the counterparts on six
multi-view datasets.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 08:28:33 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Liu",
"Yipeng",
""
],
[
"Lu",
"Yingcong",
""
],
[
"Ou",
"Weiting",
""
],
[
"Long",
"Zhen",
""
],
[
"Zhu",
"Ce",
""
]
] | TITLE: Adaptively Topological Tensor Network for Multi-view Subspace Clustering
ABSTRACT: Multi-view subspace clustering methods have employed learned
self-representation tensors from different tensor decompositions to exploit low
rank information. However, the data structures embedded with
self-representation tensors may vary in different multi-view datasets.
Therefore, a pre-defined tensor decomposition may not fully exploit low rank
information for a certain dataset, resulting in sub-optimal multi-view
clustering performance. To alleviate the aforementioned limitations, we propose
the adaptively topological tensor network (ATTN) by determining the edge ranks
from the structural information of the self-representation tensor, and it can
give a better tensor representation with the data-driven strategy.
Specifically, in multi-view tensor clustering, we analyze the higher-order
correlations among different modes of a self-representation tensor, and prune
the links of the weakly correlated ones from a fully connected tensor network.
Therefore, the newly obtained tensor networks can efficiently explore the
essential clustering information with self-representation with different tensor
structures for various datasets. A greedy adaptive rank-increasing strategy is
further applied to improve the capture capacity of low rank structure. We apply
ATTN on multi-view subspace clustering and utilize the alternating direction
method of multipliers to solve it. Experimental results show that multi-view
subspace clustering based on ATTN outperforms the counterparts on six
multi-view datasets.
| no_new_dataset | 0.709252 |
2305.00724 | Jakub Adamczyk | Jakub Adamczyk, Wojciech Czech | Strengthening structural baselines for graph classification using Local
Topological Profile | International Conference on Computational Science (ICCS) 2023 | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We present the analysis of the topological graph descriptor Local Degree
Profile (LDP), which forms a widely used structural baseline for graph
classification. Our study focuses on model evaluation in the context of the
recently developed fair evaluation framework, which defines rigorous routines
for model selection and evaluation for graph classification, ensuring
reproducibility and comparability of the results. Based on the obtained
insights, we propose a new baseline algorithm called Local Topological Profile
(LTP), which extends LDP by using additional centrality measures and local
vertex descriptors. The new approach provides the results outperforming or very
close to the latest GNNs for all datasets used. Specifically, state-of-the-art
results were obtained for 4 out of 9 benchmark datasets. We also consider
computational aspects of LDP-based feature extraction and model construction to
propose practical improvements affecting execution speed and scalability. This
allows for handling modern, large datasets and extends the portfolio of
benchmarks used in graph representation learning. As the outcome of our work,
we obtained LTP as a simple to understand, fast and scalable, still robust
baseline, capable of outcompeting modern graph classification models such as
Graph Isomorphism Network (GIN). We provide open-source implementation at
\href{https://github.com/j-adamczyk/LTP}{GitHub}.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 08:59:58 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Adamczyk",
"Jakub",
""
],
[
"Czech",
"Wojciech",
""
]
] | TITLE: Strengthening structural baselines for graph classification using Local
Topological Profile
ABSTRACT: We present the analysis of the topological graph descriptor Local Degree
Profile (LDP), which forms a widely used structural baseline for graph
classification. Our study focuses on model evaluation in the context of the
recently developed fair evaluation framework, which defines rigorous routines
for model selection and evaluation for graph classification, ensuring
reproducibility and comparability of the results. Based on the obtained
insights, we propose a new baseline algorithm called Local Topological Profile
(LTP), which extends LDP by using additional centrality measures and local
vertex descriptors. The new approach provides the results outperforming or very
close to the latest GNNs for all datasets used. Specifically, state-of-the-art
results were obtained for 4 out of 9 benchmark datasets. We also consider
computational aspects of LDP-based feature extraction and model construction to
propose practical improvements affecting execution speed and scalability. This
allows for handling modern, large datasets and extends the portfolio of
benchmarks used in graph representation learning. As the outcome of our work,
we obtained LTP as a simple to understand, fast and scalable, still robust
baseline, capable of outcompeting modern graph classification models such as
Graph Isomorphism Network (GIN). We provide open-source implementation at
\href{https://github.com/j-adamczyk/LTP}{GitHub}.
| no_new_dataset | 0.710258 |
2305.00725 | Siddique Latif | Ibrahim Malik, Siddique Latif, Sanaullah Manzoor, Muhammad Usama,
Junaid Qadir, and Raja Jurdak | Emotions Beyond Words: Non-Speech Audio Emotion Recognition With Edge
Computing | Under review | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Non-speech emotion recognition has a wide range of applications including
healthcare, crime control and rescue, and entertainment, to name a few.
Providing these applications using edge computing has great potential, however,
recent studies are focused on speech-emotion recognition using complex
architectures. In this paper, a non-speech-based emotion recognition system is
proposed, which can rely on edge computing to analyse emotions conveyed through
non-speech expressions like screaming and crying. In particular, we explore
knowledge distillation to design a computationally efficient system that can be
deployed on edge devices with limited resources without degrading the
performance significantly. We comprehensively evaluate our proposed framework
using two publicly available datasets and highlight its effectiveness by
comparing the results with the well-known MobileNet model. Our results
demonstrate the feasibility and effectiveness of using edge computing for
non-speech emotion detection, which can potentially improve applications that
rely on emotion detection in communication networks. To the best of our
knowledge, this is the first work on an edge-computing-based framework for
detecting emotions in non-speech audio, offering promising directions for
future research.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 09:01:45 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Malik",
"Ibrahim",
""
],
[
"Latif",
"Siddique",
""
],
[
"Manzoor",
"Sanaullah",
""
],
[
"Usama",
"Muhammad",
""
],
[
"Qadir",
"Junaid",
""
],
[
"Jurdak",
"Raja",
""
]
] | TITLE: Emotions Beyond Words: Non-Speech Audio Emotion Recognition With Edge
Computing
ABSTRACT: Non-speech emotion recognition has a wide range of applications including
healthcare, crime control and rescue, and entertainment, to name a few.
Providing these applications using edge computing has great potential, however,
recent studies are focused on speech-emotion recognition using complex
architectures. In this paper, a non-speech-based emotion recognition system is
proposed, which can rely on edge computing to analyse emotions conveyed through
non-speech expressions like screaming and crying. In particular, we explore
knowledge distillation to design a computationally efficient system that can be
deployed on edge devices with limited resources without degrading the
performance significantly. We comprehensively evaluate our proposed framework
using two publicly available datasets and highlight its effectiveness by
comparing the results with the well-known MobileNet model. Our results
demonstrate the feasibility and effectiveness of using edge computing for
non-speech emotion detection, which can potentially improve applications that
rely on emotion detection in communication networks. To the best of our
knowledge, this is the first work on an edge-computing-based framework for
detecting emotions in non-speech audio, offering promising directions for
future research.
| no_new_dataset | 0.707177 |
2305.00750 | Shirui Zhou | Shirui Zhou, Ying-En Ge, Shaowei Yu, Junfang Tian, Rui Jiang | Experimental features of emissions and fuel consumption in a
car-following platoon | null | null | null | null | physics.soc-ph cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper investigates the features of emissions and fuel consumption (EFC)
in a car-following (CF) platoon based on two experimental datasets. Four
classical EFC models are employed and a universal concave growth pattern of the
EFC along a platoon has been demonstrated. A general framework of coupling EFC
and CF models is tested by calibrating and simulating three classical CF
models. This work first demonstrates that, at vehicle-pair level, all models
perform well on EFC prediction. The intelligent driver model outperforms the
other CF models on calibration accuracy, but this is not true on EFC
prediction. Second, at platoon level, the predicted EFC is nearly constant
along the platoon which qualitatively differs from the experimental
observation. The investigation highlights that accurate estimations at vehicle
level may be insufficient for analysis at platoon level due to the significant
role of oscillation growth and evolution in EFC estimation.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 10:11:09 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Zhou",
"Shirui",
""
],
[
"Ge",
"Ying-En",
""
],
[
"Yu",
"Shaowei",
""
],
[
"Tian",
"Junfang",
""
],
[
"Jiang",
"Rui",
""
]
] | TITLE: Experimental features of emissions and fuel consumption in a
car-following platoon
ABSTRACT: The paper investigates the features of emissions and fuel consumption (EFC)
in a car-following (CF) platoon based on two experimental datasets. Four
classical EFC models are employed and a universal concave growth pattern of the
EFC along a platoon has been demonstrated. A general framework of coupling EFC
and CF models is tested by calibrating and simulating three classical CF
models. This work first demonstrates that, at vehicle-pair level, all models
perform well on EFC prediction. The intelligent driver model outperforms the
other CF models on calibration accuracy, but this is not true on EFC
prediction. Second, at platoon level, the predicted EFC is nearly constant
along the platoon which qualitatively differs from the experimental
observation. The investigation highlights that accurate estimations at vehicle
level may be insufficient for analysis at platoon level due to the significant
role of oscillation growth and evolution in EFC estimation.
| no_new_dataset | 0.709453 |
2305.00762 | Amareshwara Sainadh Chamarthi | Amareshwara Sainadh Chamarthi | Efficient high-order Gradient-based Reconstruction for compressible
flows | null | Journal of Computational Physics, 2023 | 10.1016/j.jcp.2023.112119 | null | physics.flu-dyn cs.NA math.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper extends the gradient-based reconstruction approach of Chamarthi
\cite{chamarthi2023gradient} to genuine high-order accuracy for inviscid test
cases involving smooth flows. A seventh-order accurate scheme is derived using
the same stencil as of the explicit fourth-order scheme proposed in Ref.
\cite{chamarthi2023gradient}, which also has low dissipation properties. The
proposed method is seventh-order accurate under the assumption that the
variables at the \textit{cell centres are point values}. A problem-independent
discontinuity detector is used to obtain high-order accuracy. Accordingly,
primitive or conservative variable reconstruction is performed around regions
of discontinuities, whereas smooth solution regions apply flux reconstruction.
The proposed approach can still share the derivatives between the inviscid and
viscous fluxes, which is the main idea behind the gradient-based
reconstruction. Several standard benchmark test cases are presented. The
proposed method is more efficient than the seventh-order weighted compact
nonlinear scheme (WCNS) for the test cases considered in this paper.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 10:42:50 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Chamarthi",
"Amareshwara Sainadh",
""
]
] | TITLE: Efficient high-order Gradient-based Reconstruction for compressible
flows
ABSTRACT: This paper extends the gradient-based reconstruction approach of Chamarthi
\cite{chamarthi2023gradient} to genuine high-order accuracy for inviscid test
cases involving smooth flows. A seventh-order accurate scheme is derived using
the same stencil as of the explicit fourth-order scheme proposed in Ref.
\cite{chamarthi2023gradient}, which also has low dissipation properties. The
proposed method is seventh-order accurate under the assumption that the
variables at the \textit{cell centres are point values}. A problem-independent
discontinuity detector is used to obtain high-order accuracy. Accordingly,
primitive or conservative variable reconstruction is performed around regions
of discontinuities, whereas smooth solution regions apply flux reconstruction.
The proposed approach can still share the derivatives between the inviscid and
viscous fluxes, which is the main idea behind the gradient-based
reconstruction. Several standard benchmark test cases are presented. The
proposed method is more efficient than the seventh-order weighted compact
nonlinear scheme (WCNS) for the test cases considered in this paper.
| no_new_dataset | 0.710666 |
2305.00771 | Jie Zhang | Jie Zhang, Xiaosong Ma, Song Guo, Wenchao Xu | Towards Unbiased Training in Federated Open-world Semi-supervised
Learning | 12 pages | ICML2023 | null | null | cs.LG cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Federated Semi-supervised Learning (FedSSL) has emerged as a new paradigm for
allowing distributed clients to collaboratively train a machine learning model
over scarce labeled data and abundant unlabeled data. However, existing works
for FedSSL rely on a closed-world assumption that all local training data and
global testing data are from seen classes observed in the labeled dataset. It
is crucial to go one step further: adapting FL models to an open-world setting,
where unseen classes exist in the unlabeled data. In this paper, we propose a
novel Federatedopen-world Semi-Supervised Learning (FedoSSL) framework, which
can solve the key challenge in distributed and open-world settings, i.e., the
biased training process for heterogeneously distributed unseen classes.
Specifically, since the advent of a certain unseen class depends on a client
basis, the locally unseen classes (exist in multiple clients) are likely to
receive differentiated superior aggregation effects than the globally unseen
classes (exist only in one client). We adopt an uncertainty-aware suppressed
loss to alleviate the biased training between locally unseen and globally
unseen classes. Besides, we enable a calibration module supplementary to the
global aggregation to avoid potential conflicting knowledge transfer caused by
inconsistent data distribution among different clients. The proposed FedoSSL
can be easily adapted to state-of-the-art FL methods, which is also validated
via extensive experiments on benchmarks and real-world datasets (CIFAR-10,
CIFAR-100 and CINIC-10).
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 11:12:37 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Zhang",
"Jie",
""
],
[
"Ma",
"Xiaosong",
""
],
[
"Guo",
"Song",
""
],
[
"Xu",
"Wenchao",
""
]
] | TITLE: Towards Unbiased Training in Federated Open-world Semi-supervised
Learning
ABSTRACT: Federated Semi-supervised Learning (FedSSL) has emerged as a new paradigm for
allowing distributed clients to collaboratively train a machine learning model
over scarce labeled data and abundant unlabeled data. However, existing works
for FedSSL rely on a closed-world assumption that all local training data and
global testing data are from seen classes observed in the labeled dataset. It
is crucial to go one step further: adapting FL models to an open-world setting,
where unseen classes exist in the unlabeled data. In this paper, we propose a
novel Federatedopen-world Semi-Supervised Learning (FedoSSL) framework, which
can solve the key challenge in distributed and open-world settings, i.e., the
biased training process for heterogeneously distributed unseen classes.
Specifically, since the advent of a certain unseen class depends on a client
basis, the locally unseen classes (exist in multiple clients) are likely to
receive differentiated superior aggregation effects than the globally unseen
classes (exist only in one client). We adopt an uncertainty-aware suppressed
loss to alleviate the biased training between locally unseen and globally
unseen classes. Besides, we enable a calibration module supplementary to the
global aggregation to avoid potential conflicting knowledge transfer caused by
inconsistent data distribution among different clients. The proposed FedoSSL
can be easily adapted to state-of-the-art FL methods, which is also validated
via extensive experiments on benchmarks and real-world datasets (CIFAR-10,
CIFAR-100 and CINIC-10).
| no_new_dataset | 0.71022 |
2305.00773 | Ivan Martinovi\'c | Ivan Martinovi\'c | Point Cloud Semantic Segmentation | 7 pages, 2 figures, 8 tables Language: Croatian | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Semantic segmentation is an important and well-known task in the field of
computer vision, in which we attempt to assign a corresponding semantic class
to each input element. When it comes to semantic segmentation of 2D images, the
input elements are pixels. On the other hand, the input can also be a point
cloud, where one input element represents one point in the input point cloud.
By the term point cloud, we refer to a set of points defined by spatial
coordinates with respect to some reference coordinate system. In addition to
the position of points in space, other features can also be defined for each
point, such as RGB components. In this paper, we conduct semantic segmentation
on the S3DIS dataset, where each point cloud represents one room. We train
models on the S3DIS dataset, namely PointCNN, PointNet++, Cylinder3D, Point
Transformer, and RepSurf. We compare the obtained results with respect to
standard evaluation metrics for semantic segmentation and present a comparison
of the models based on inference speed.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 11:20:51 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Martinović",
"Ivan",
""
]
] | TITLE: Point Cloud Semantic Segmentation
ABSTRACT: Semantic segmentation is an important and well-known task in the field of
computer vision, in which we attempt to assign a corresponding semantic class
to each input element. When it comes to semantic segmentation of 2D images, the
input elements are pixels. On the other hand, the input can also be a point
cloud, where one input element represents one point in the input point cloud.
By the term point cloud, we refer to a set of points defined by spatial
coordinates with respect to some reference coordinate system. In addition to
the position of points in space, other features can also be defined for each
point, such as RGB components. In this paper, we conduct semantic segmentation
on the S3DIS dataset, where each point cloud represents one room. We train
models on the S3DIS dataset, namely PointCNN, PointNet++, Cylinder3D, Point
Transformer, and RepSurf. We compare the obtained results with respect to
standard evaluation metrics for semantic segmentation and present a comparison
of the models based on inference speed.
| no_new_dataset | 0.712826 |
2305.00783 | Rocky Chen | Xuhui Ren, Tong Chen, Quoc Viet Hung Nguyen, Lizhen Cui, Zi Huang,
Hongzhi Yin | Explicit Knowledge Graph Reasoning for Conversational Recommendation | null | null | null | null | cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Traditional recommender systems estimate user preference on items purely
based on historical interaction records, thus failing to capture fine-grained
yet dynamic user interests and letting users receive recommendation only
passively. Recent conversational recommender systems (CRSs) tackle those
limitations by enabling recommender systems to interact with the user to obtain
her/his current preference through a sequence of clarifying questions. Despite
the progress achieved in CRSs, existing solutions are far from satisfaction in
the following two aspects: 1) current CRSs usually require each user to answer
a quantity of clarifying questions before reaching the final recommendation,
which harms the user experience; 2) there is a semantic gap between the learned
representations of explicitly mentioned attributes and items. To address these
drawbacks, we introduce the knowledge graph (KG) as the auxiliary information
for comprehending and reasoning a user's preference, and propose a new CRS
framework, namely Knowledge Enhanced Conversational Reasoning (KECR) system. As
a user can reflect her/his preference via both attribute- and item-level
expressions, KECR closes the semantic gap between two levels by embedding the
structured knowledge in the KG. Meanwhile, KECR utilizes the connectivity
within the KG to conduct explicit reasoning of the user demand, making the
model less dependent on the user's feedback to clarifying questions. KECR can
find a prominent reasoning chain to make the recommendation explainable and
more rationale, as well as smoothen the conversation process, leading to better
user experience and conversational recommendation accuracy. Extensive
experiments on two real-world datasets demonstrate our approach's superiority
over state-of-the-art baselines in both automatic evaluations and human
judgments.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 11:56:22 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Ren",
"Xuhui",
""
],
[
"Chen",
"Tong",
""
],
[
"Nguyen",
"Quoc Viet Hung",
""
],
[
"Cui",
"Lizhen",
""
],
[
"Huang",
"Zi",
""
],
[
"Yin",
"Hongzhi",
""
]
] | TITLE: Explicit Knowledge Graph Reasoning for Conversational Recommendation
ABSTRACT: Traditional recommender systems estimate user preference on items purely
based on historical interaction records, thus failing to capture fine-grained
yet dynamic user interests and letting users receive recommendation only
passively. Recent conversational recommender systems (CRSs) tackle those
limitations by enabling recommender systems to interact with the user to obtain
her/his current preference through a sequence of clarifying questions. Despite
the progress achieved in CRSs, existing solutions are far from satisfaction in
the following two aspects: 1) current CRSs usually require each user to answer
a quantity of clarifying questions before reaching the final recommendation,
which harms the user experience; 2) there is a semantic gap between the learned
representations of explicitly mentioned attributes and items. To address these
drawbacks, we introduce the knowledge graph (KG) as the auxiliary information
for comprehending and reasoning a user's preference, and propose a new CRS
framework, namely Knowledge Enhanced Conversational Reasoning (KECR) system. As
a user can reflect her/his preference via both attribute- and item-level
expressions, KECR closes the semantic gap between two levels by embedding the
structured knowledge in the KG. Meanwhile, KECR utilizes the connectivity
within the KG to conduct explicit reasoning of the user demand, making the
model less dependent on the user's feedback to clarifying questions. KECR can
find a prominent reasoning chain to make the recommendation explainable and
more rationale, as well as smoothen the conversation process, leading to better
user experience and conversational recommendation accuracy. Extensive
experiments on two real-world datasets demonstrate our approach's superiority
over state-of-the-art baselines in both automatic evaluations and human
judgments.
| no_new_dataset | 0.708364 |
2305.00837 | Qisen Ma | Qisen Ma, Keming Mao, Gao Wang, Lisheng Xu, Yuhai Zhao | LCAUnet: A skin lesion segmentation network with enhanced edge and body
fusion | 14 pages, 10 figures | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurate segmentation of skin lesions in dermatoscopic images is crucial for
the early diagnosis of skin cancer and improving the survival rate of patients.
However, it is still a challenging task due to the irregularity of lesion
areas, the fuzziness of boundaries, and other complex interference factors. In
this paper, a novel LCAUnet is proposed to improve the ability of complementary
representation with fusion of edge and body features, which are often paid
little attentions in traditional methods. First, two separate branches are set
for edge and body segmentation with CNNs and Transformer based architecture
respectively. Then, LCAF module is utilized to fuse feature maps of edge and
body of the same level by local cross-attention operation in encoder stage.
Furthermore, PGMF module is embedded for feature integration with prior guided
multi-scale adaption. Comprehensive experiments on public available dataset
ISIC 2017, ISIC 2018, and PH2 demonstrate that LCAUnet outperforms most
state-of-the-art methods. The ablation studies also verify the effectiveness of
the proposed fusion techniques.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 14:05:53 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Ma",
"Qisen",
""
],
[
"Mao",
"Keming",
""
],
[
"Wang",
"Gao",
""
],
[
"Xu",
"Lisheng",
""
],
[
"Zhao",
"Yuhai",
""
]
] | TITLE: LCAUnet: A skin lesion segmentation network with enhanced edge and body
fusion
ABSTRACT: Accurate segmentation of skin lesions in dermatoscopic images is crucial for
the early diagnosis of skin cancer and improving the survival rate of patients.
However, it is still a challenging task due to the irregularity of lesion
areas, the fuzziness of boundaries, and other complex interference factors. In
this paper, a novel LCAUnet is proposed to improve the ability of complementary
representation with fusion of edge and body features, which are often paid
little attentions in traditional methods. First, two separate branches are set
for edge and body segmentation with CNNs and Transformer based architecture
respectively. Then, LCAF module is utilized to fuse feature maps of edge and
body of the same level by local cross-attention operation in encoder stage.
Furthermore, PGMF module is embedded for feature integration with prior guided
multi-scale adaption. Comprehensive experiments on public available dataset
ISIC 2017, ISIC 2018, and PH2 demonstrate that LCAUnet outperforms most
state-of-the-art methods. The ablation studies also verify the effectiveness of
the proposed fusion techniques.
| no_new_dataset | 0.709868 |
2305.00849 | Kento Uchida | Yohei Watanabe, Kento Uchida, Ryoki Hamano, Shota Saito, Masahiro
Nomura and Shinichi Shirakawa | (1+1)-CMA-ES with Margin for Discrete and Mixed-Integer Problems | null | null | null | null | cs.NE | http://creativecommons.org/licenses/by-sa/4.0/ | The covariance matrix adaptation evolution strategy (CMA-ES) is an efficient
continuous black-box optimization method. The CMA-ES possesses many attractive
features, including invariance properties and a well-tuned default
hyperparameter setting. Moreover, several components to specialize the CMA-ES
have been proposed, such as noise handling and constraint handling. To utilize
these advantages in mixed-integer optimization problems, the CMA-ES with margin
has been proposed. The CMA-ES with margin prevents the premature convergence of
discrete variables by the margin correction, in which the distribution
parameters are modified to leave the generation probability for changing the
discrete variable. The margin correction has been applied to
($\mu/\mu_\mathrm{w}$,$\lambda$)-CMA-ES, while this paper introduces the margin
correction into (1+1)-CMA-ES, an elitist version of CMA-ES. The (1+1)-CMA-ES is
often advantageous for unimodal functions and can be computationally less
expensive. To tackle the performance deterioration on mixed-integer
optimization, we use the discretized elitist solution as the mean of the
sampling distribution and modify the margin correction not to move the elitist
solution. The numerical simulation using benchmark functions on mixed-integer,
integer, and binary domains shows that (1+1)-CMA-ES with margin outperforms the
CMA-ES with margin and is better than or comparable with several specialized
methods to a particular search domain.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 14:34:55 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Watanabe",
"Yohei",
""
],
[
"Uchida",
"Kento",
""
],
[
"Hamano",
"Ryoki",
""
],
[
"Saito",
"Shota",
""
],
[
"Nomura",
"Masahiro",
""
],
[
"Shirakawa",
"Shinichi",
""
]
] | TITLE: (1+1)-CMA-ES with Margin for Discrete and Mixed-Integer Problems
ABSTRACT: The covariance matrix adaptation evolution strategy (CMA-ES) is an efficient
continuous black-box optimization method. The CMA-ES possesses many attractive
features, including invariance properties and a well-tuned default
hyperparameter setting. Moreover, several components to specialize the CMA-ES
have been proposed, such as noise handling and constraint handling. To utilize
these advantages in mixed-integer optimization problems, the CMA-ES with margin
has been proposed. The CMA-ES with margin prevents the premature convergence of
discrete variables by the margin correction, in which the distribution
parameters are modified to leave the generation probability for changing the
discrete variable. The margin correction has been applied to
($\mu/\mu_\mathrm{w}$,$\lambda$)-CMA-ES, while this paper introduces the margin
correction into (1+1)-CMA-ES, an elitist version of CMA-ES. The (1+1)-CMA-ES is
often advantageous for unimodal functions and can be computationally less
expensive. To tackle the performance deterioration on mixed-integer
optimization, we use the discretized elitist solution as the mean of the
sampling distribution and modify the margin correction not to move the elitist
solution. The numerical simulation using benchmark functions on mixed-integer,
integer, and binary domains shows that (1+1)-CMA-ES with margin outperforms the
CMA-ES with margin and is better than or comparable with several specialized
methods to a particular search domain.
| no_new_dataset | 0.710019 |
2305.00869 | Akash Srivastava | Akash Srivastava, Seungwook Han, Kai Xu, Benjamin Rhodes, Michael U.
Gutmann | Estimating the Density Ratio between Distributions with High Discrepancy
using Multinomial Logistic Regression | null | TMLR 2023 | null | null | stat.ML cs.LG | http://creativecommons.org/licenses/by/4.0/ | Functions of the ratio of the densities $p/q$ are widely used in machine
learning to quantify the discrepancy between the two distributions $p$ and $q$.
For high-dimensional distributions, binary classification-based density ratio
estimators have shown great promise. However, when densities are well
separated, estimating the density ratio with a binary classifier is
challenging. In this work, we show that the state-of-the-art density ratio
estimators perform poorly on well-separated cases and demonstrate that this is
due to distribution shifts between training and evaluation time. We present an
alternative method that leverages multi-class classification for density ratio
estimation and does not suffer from distribution shift issues. The method uses
a set of auxiliary densities $\{m_k\}_{k=1}^K$ and trains a multi-class
logistic regression to classify the samples from $p, q$, and $\{m_k\}_{k=1}^K$
into $K+2$ classes. We show that if these auxiliary densities are constructed
such that they overlap with $p$ and $q$, then a multi-class logistic regression
allows for estimating $\log p/q$ on the domain of any of the $K+2$
distributions and resolves the distribution shift problems of the current
state-of-the-art methods. We compare our method to state-of-the-art density
ratio estimators on both synthetic and real datasets and demonstrate its
superior performance on the tasks of density ratio estimation, mutual
information estimation, and representation learning. Code:
https://www.blackswhan.com/mdre/
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 15:10:56 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Srivastava",
"Akash",
""
],
[
"Han",
"Seungwook",
""
],
[
"Xu",
"Kai",
""
],
[
"Rhodes",
"Benjamin",
""
],
[
"Gutmann",
"Michael U.",
""
]
] | TITLE: Estimating the Density Ratio between Distributions with High Discrepancy
using Multinomial Logistic Regression
ABSTRACT: Functions of the ratio of the densities $p/q$ are widely used in machine
learning to quantify the discrepancy between the two distributions $p$ and $q$.
For high-dimensional distributions, binary classification-based density ratio
estimators have shown great promise. However, when densities are well
separated, estimating the density ratio with a binary classifier is
challenging. In this work, we show that the state-of-the-art density ratio
estimators perform poorly on well-separated cases and demonstrate that this is
due to distribution shifts between training and evaluation time. We present an
alternative method that leverages multi-class classification for density ratio
estimation and does not suffer from distribution shift issues. The method uses
a set of auxiliary densities $\{m_k\}_{k=1}^K$ and trains a multi-class
logistic regression to classify the samples from $p, q$, and $\{m_k\}_{k=1}^K$
into $K+2$ classes. We show that if these auxiliary densities are constructed
such that they overlap with $p$ and $q$, then a multi-class logistic regression
allows for estimating $\log p/q$ on the domain of any of the $K+2$
distributions and resolves the distribution shift problems of the current
state-of-the-art methods. We compare our method to state-of-the-art density
ratio estimators on both synthetic and real datasets and demonstrate its
superior performance on the tasks of density ratio estimation, mutual
information estimation, and representation learning. Code:
https://www.blackswhan.com/mdre/
| no_new_dataset | 0.709636 |
2305.00923 | Ananya Sadana | Arunima Jaiswal, Ananya Sadana | Early Detection of Alzheimer's Disease using Bottleneck Transformers | null | Arunima Jaiswal & Ananya Sadana, 2022. "Early Detection of
Alzheimer's Disease Using Bottleneck Transformers," International Journal of
Intelligent Information Technologies (IJIIT), IGI Global, vol. 18(2), pages
1-14, April | 10.4018/IJIIT.296268 | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | Early detection of Alzheimer's Disease (AD) and its prodromal state, Mild
Cognitive Impairment (MCI), is crucial for providing suitable treatment and
preventing the disease from progressing. It can also aid researchers and
clinicians to identify early biomarkers and minister new treatments that have
been a subject of extensive research. The application of deep learning
techniques on structural Magnetic Resonance Imaging (MRI) has shown promising
results in diagnosing the disease. In this research, we intend to introduce a
novel approach of using an ensemble of the self-attention-based Bottleneck
Transformers with a sharpness aware minimizer for early detection of
Alzheimer's Disease. The proposed approach has been tested on the widely
accepted ADNI dataset and evaluated using accuracy, precision, recall, F1
score, and ROC-AUC score as the performance metrics.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 16:17:52 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Jaiswal",
"Arunima",
""
],
[
"Sadana",
"Ananya",
""
]
] | TITLE: Early Detection of Alzheimer's Disease using Bottleneck Transformers
ABSTRACT: Early detection of Alzheimer's Disease (AD) and its prodromal state, Mild
Cognitive Impairment (MCI), is crucial for providing suitable treatment and
preventing the disease from progressing. It can also aid researchers and
clinicians to identify early biomarkers and minister new treatments that have
been a subject of extensive research. The application of deep learning
techniques on structural Magnetic Resonance Imaging (MRI) has shown promising
results in diagnosing the disease. In this research, we intend to introduce a
novel approach of using an ensemble of the self-attention-based Bottleneck
Transformers with a sharpness aware minimizer for early detection of
Alzheimer's Disease. The proposed approach has been tested on the widely
accepted ADNI dataset and evaluated using accuracy, precision, recall, F1
score, and ROC-AUC score as the performance metrics.
| no_new_dataset | 0.708427 |
2305.00934 | Aliaksandr Hubin | Aliaksandr Hubin and Geir Storvik | Variational Inference for Bayesian Neural Networks under Model and
Parameter Uncertainty | arXiv admin note: text overlap with arXiv:1903.07594 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bayesian neural networks (BNNs) have recently regained a significant amount
of attention in the deep learning community due to the development of scalable
approximate Bayesian inference techniques. There are several advantages of
using a Bayesian approach: Parameter and prediction uncertainties become easily
available, facilitating rigorous statistical analysis. Furthermore, prior
knowledge can be incorporated. However, so far, there have been no scalable
techniques capable of combining both structural and parameter uncertainty. In
this paper, we apply the concept of model uncertainty as a framework for
structural learning in BNNs and hence make inference in the joint space of
structures/models and parameters. Moreover, we suggest an adaptation of a
scalable variational inference approach with reparametrization of marginal
inclusion probabilities to incorporate the model space constraints.
Experimental results on a range of benchmark datasets show that we obtain
comparable accuracy results with the competing models, but based on methods
that are much more sparse than ordinary BNNs.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 16:38:17 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Hubin",
"Aliaksandr",
""
],
[
"Storvik",
"Geir",
""
]
] | TITLE: Variational Inference for Bayesian Neural Networks under Model and
Parameter Uncertainty
ABSTRACT: Bayesian neural networks (BNNs) have recently regained a significant amount
of attention in the deep learning community due to the development of scalable
approximate Bayesian inference techniques. There are several advantages of
using a Bayesian approach: Parameter and prediction uncertainties become easily
available, facilitating rigorous statistical analysis. Furthermore, prior
knowledge can be incorporated. However, so far, there have been no scalable
techniques capable of combining both structural and parameter uncertainty. In
this paper, we apply the concept of model uncertainty as a framework for
structural learning in BNNs and hence make inference in the joint space of
structures/models and parameters. Moreover, we suggest an adaptation of a
scalable variational inference approach with reparametrization of marginal
inclusion probabilities to incorporate the model space constraints.
Experimental results on a range of benchmark datasets show that we obtain
comparable accuracy results with the competing models, but based on methods
that are much more sparse than ordinary BNNs.
| no_new_dataset | 0.709787 |
2305.00944 | Eric Wallace | Alexander Wan, Eric Wallace, Sheng Shen, Dan Klein | Poisoning Language Models During Instruction Tuning | ICML 2023 | null | null | null | cs.CL cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Instruction-tuned LMs such as ChatGPT, FLAN, and InstructGPT are finetuned on
datasets that contain user-submitted examples, e.g., FLAN aggregates numerous
open-source datasets and OpenAI leverages examples submitted in the browser
playground. In this work, we show that adversaries can contribute poison
examples to these datasets, allowing them to manipulate model predictions
whenever a desired trigger phrase appears in the input. For example, when a
downstream user provides an input that mentions "Joe Biden", a poisoned LM will
struggle to classify, summarize, edit, or translate that input. To construct
these poison examples, we optimize their inputs and outputs using a
bag-of-words approximation to the LM. We evaluate our method on open-source
instruction-tuned LMs. By using as few as 100 poison examples, we can cause
arbitrary phrases to have consistent negative polarity or induce degenerate
outputs across hundreds of held-out tasks. Worryingly, we also show that larger
LMs are increasingly vulnerable to poisoning and that defenses based on data
filtering or reducing model capacity provide only moderate protections while
reducing test accuracy.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 16:57:33 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Wan",
"Alexander",
""
],
[
"Wallace",
"Eric",
""
],
[
"Shen",
"Sheng",
""
],
[
"Klein",
"Dan",
""
]
] | TITLE: Poisoning Language Models During Instruction Tuning
ABSTRACT: Instruction-tuned LMs such as ChatGPT, FLAN, and InstructGPT are finetuned on
datasets that contain user-submitted examples, e.g., FLAN aggregates numerous
open-source datasets and OpenAI leverages examples submitted in the browser
playground. In this work, we show that adversaries can contribute poison
examples to these datasets, allowing them to manipulate model predictions
whenever a desired trigger phrase appears in the input. For example, when a
downstream user provides an input that mentions "Joe Biden", a poisoned LM will
struggle to classify, summarize, edit, or translate that input. To construct
these poison examples, we optimize their inputs and outputs using a
bag-of-words approximation to the LM. We evaluate our method on open-source
instruction-tuned LMs. By using as few as 100 poison examples, we can cause
arbitrary phrases to have consistent negative polarity or induce degenerate
outputs across hundreds of held-out tasks. Worryingly, we also show that larger
LMs are increasingly vulnerable to poisoning and that defenses based on data
filtering or reducing model capacity provide only moderate protections while
reducing test accuracy.
| no_new_dataset | 0.711224 |
2305.00945 | Lucas Meyer | Lucas Augusto Meyer, Sergio Romero, Gabriele Bertoli, Tom Burt, Alex
Weinert, Juan Lavista Ferres | How effective is multifactor authentication at deterring cyberattacks? | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | This study investigates the effectiveness of multifactor authentication (MFA)
in protecting commercial accounts from unauthorized access, with an additional
focus on accounts with known credential leaks. We employ the
benchmark-multiplier method, coupled with manual account review, to evaluate
the security performance of various MFA methods in a large dataset of Microsoft
Azure Active Directory users exhibiting suspicious activity. Our findings
reveal that MFA implementation offers outstanding protection, with over 99.99%
of MFA-enabled accounts remaining secure during the investigation period.
Moreover, MFA reduces the risk of compromise by 99.22% across the entire
population and by 98.56% in cases of leaked credentials. We further demonstrate
that dedicated MFA applications, such as Microsoft Authenticator, outperform
SMS-based authentication, though both methods provide significantly enhanced
security compared to not using MFA. Based on these results, we strongly
advocate for the default implementation of MFA in commercial accounts to
increase security and mitigate unauthorized access risks.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 16:59:28 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Meyer",
"Lucas Augusto",
""
],
[
"Romero",
"Sergio",
""
],
[
"Bertoli",
"Gabriele",
""
],
[
"Burt",
"Tom",
""
],
[
"Weinert",
"Alex",
""
],
[
"Ferres",
"Juan Lavista",
""
]
] | TITLE: How effective is multifactor authentication at deterring cyberattacks?
ABSTRACT: This study investigates the effectiveness of multifactor authentication (MFA)
in protecting commercial accounts from unauthorized access, with an additional
focus on accounts with known credential leaks. We employ the
benchmark-multiplier method, coupled with manual account review, to evaluate
the security performance of various MFA methods in a large dataset of Microsoft
Azure Active Directory users exhibiting suspicious activity. Our findings
reveal that MFA implementation offers outstanding protection, with over 99.99%
of MFA-enabled accounts remaining secure during the investigation period.
Moreover, MFA reduces the risk of compromise by 99.22% across the entire
population and by 98.56% in cases of leaked credentials. We further demonstrate
that dedicated MFA applications, such as Microsoft Authenticator, outperform
SMS-based authentication, though both methods provide significantly enhanced
security compared to not using MFA. Based on these results, we strongly
advocate for the default implementation of MFA in commercial accounts to
increase security and mitigate unauthorized access risks.
| no_new_dataset | 0.706646 |
2305.00950 | Christiaan Viviers | Christiaan G. A. Viviers, Amaan M. M. Valiuddin, Peter H. N. de With,
Fons van der Sommen | Probabilistic 3D segmentation for aleatoric uncertainty quantification
in full 3D medical data | null | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | Uncertainty quantification in medical images has become an essential addition
to segmentation models for practical application in the real world. Although
there are valuable developments in accurate uncertainty quantification methods
using 2D images and slices of 3D volumes, in clinical practice, the complete 3D
volumes (such as CT and MRI scans) are used to evaluate and plan the medical
procedure. As a result, the existing 2D methods miss the rich 3D spatial
information when resolving the uncertainty. A popular approach for quantifying
the ambiguity in the data is to learn a distribution over the possible
hypotheses. In recent work, this ambiguity has been modeled to be strictly
Gaussian. Normalizing Flows (NFs) are capable of modelling more complex
distributions and thus, better fit the embedding space of the data. To this
end, we have developed a 3D probabilistic segmentation framework augmented with
NFs, to enable capturing the distributions of various complexity. To test the
proposed approach, we evaluate the model on the LIDC-IDRI dataset for lung
nodule segmentation and quantify the aleatoric uncertainty introduced by the
multi-annotator setting and inherent ambiguity in the CT data. Following this
approach, we are the first to present a 3D Squared Generalized Energy Distance
(GED) of 0.401 and a high 0.468 Hungarian-matched 3D IoU. The obtained results
reveal the value in capturing the 3D uncertainty, using a flexible posterior
distribution augmented with a Normalizing Flow. Finally, we present the
aleatoric uncertainty in a visual manner with the aim to provide clinicians
with additional insight into data ambiguity and facilitating more informed
decision-making.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 17:19:20 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Viviers",
"Christiaan G. A.",
""
],
[
"Valiuddin",
"Amaan M. M.",
""
],
[
"de With",
"Peter H. N.",
""
],
[
"van der Sommen",
"Fons",
""
]
] | TITLE: Probabilistic 3D segmentation for aleatoric uncertainty quantification
in full 3D medical data
ABSTRACT: Uncertainty quantification in medical images has become an essential addition
to segmentation models for practical application in the real world. Although
there are valuable developments in accurate uncertainty quantification methods
using 2D images and slices of 3D volumes, in clinical practice, the complete 3D
volumes (such as CT and MRI scans) are used to evaluate and plan the medical
procedure. As a result, the existing 2D methods miss the rich 3D spatial
information when resolving the uncertainty. A popular approach for quantifying
the ambiguity in the data is to learn a distribution over the possible
hypotheses. In recent work, this ambiguity has been modeled to be strictly
Gaussian. Normalizing Flows (NFs) are capable of modelling more complex
distributions and thus, better fit the embedding space of the data. To this
end, we have developed a 3D probabilistic segmentation framework augmented with
NFs, to enable capturing the distributions of various complexity. To test the
proposed approach, we evaluate the model on the LIDC-IDRI dataset for lung
nodule segmentation and quantify the aleatoric uncertainty introduced by the
multi-annotator setting and inherent ambiguity in the CT data. Following this
approach, we are the first to present a 3D Squared Generalized Energy Distance
(GED) of 0.401 and a high 0.468 Hungarian-matched 3D IoU. The obtained results
reveal the value in capturing the 3D uncertainty, using a flexible posterior
distribution augmented with a Normalizing Flow. Finally, we present the
aleatoric uncertainty in a visual manner with the aim to provide clinicians
with additional insight into data ambiguity and facilitating more informed
decision-making.
| no_new_dataset | 0.711074 |
2305.00957 | Euna Mehnaz Khan | Euna Mehnaz Khan, Ayush Ram, Bhavtosh Rath, Emily Vraga, Jaideep
Srivastava | Behavioral Forensics in Social Networks: Identifying Misinformation,
Disinformation and Refutation Spreaders Using Machine Learning | 9 pages, 7 figures, and 3 tables | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the ever-increasing spread of misinformation on online social networks,
it has become very important to identify the spreaders of misinformation
(unintentional), disinformation (intentional), and misinformation refutation.
It can help in educating the first, stopping the second, and soliciting the
help of the third category, respectively, in the overall effort to counter
misinformation spread. Existing research to identify spreaders is limited to
binary classification (true vs false information spreaders). However, people's
intention (whether naive or malicious) behind sharing misinformation can only
be understood after observing their behavior after exposure to both the
misinformation and its refutation which the existing literature lacks to
consider. In this paper, we propose a labeling mechanism to label people as one
of the five defined categories based on the behavioral actions they exhibit
when exposed to misinformation and its refutation. However, everyone does not
show behavioral actions but is part of a network. Therefore, we use their
network features, extracted through deep learning-based graph embedding models,
to train a machine learning model for the prediction of the classes. We name
our approach behavioral forensics since it is an evidence-based investigation
of suspicious behavior which is spreading misinformation and disinformation in
our case. After evaluating our proposed model on a real-world Twitter dataset,
we achieved 77.45% precision and 75.80% recall in detecting the malicious
actors, who shared the misinformation even after receiving its refutation. Such
behavior shows intention, and hence these actors can rightfully be called
agents of disinformation spread.
| [
{
"version": "v1",
"created": "Mon, 1 May 2023 17:44:52 GMT"
}
] | 2023-05-02T00:00:00 | [
[
"Khan",
"Euna Mehnaz",
""
],
[
"Ram",
"Ayush",
""
],
[
"Rath",
"Bhavtosh",
""
],
[
"Vraga",
"Emily",
""
],
[
"Srivastava",
"Jaideep",
""
]
] | TITLE: Behavioral Forensics in Social Networks: Identifying Misinformation,
Disinformation and Refutation Spreaders Using Machine Learning
ABSTRACT: With the ever-increasing spread of misinformation on online social networks,
it has become very important to identify the spreaders of misinformation
(unintentional), disinformation (intentional), and misinformation refutation.
It can help in educating the first, stopping the second, and soliciting the
help of the third category, respectively, in the overall effort to counter
misinformation spread. Existing research to identify spreaders is limited to
binary classification (true vs false information spreaders). However, people's
intention (whether naive or malicious) behind sharing misinformation can only
be understood after observing their behavior after exposure to both the
misinformation and its refutation which the existing literature lacks to
consider. In this paper, we propose a labeling mechanism to label people as one
of the five defined categories based on the behavioral actions they exhibit
when exposed to misinformation and its refutation. However, everyone does not
show behavioral actions but is part of a network. Therefore, we use their
network features, extracted through deep learning-based graph embedding models,
to train a machine learning model for the prediction of the classes. We name
our approach behavioral forensics since it is an evidence-based investigation
of suspicious behavior which is spreading misinformation and disinformation in
our case. After evaluating our proposed model on a real-world Twitter dataset,
we achieved 77.45% precision and 75.80% recall in detecting the malicious
actors, who shared the misinformation even after receiving its refutation. Such
behavior shows intention, and hence these actors can rightfully be called
agents of disinformation spread.
| no_new_dataset | 0.710641 |
1909.08205 | Deying Kong | Deying Kong, Yifei Chen, Haoyu Ma, Xiangyi Yan, Xiaohui Xie | Adaptive Graphical Model Network for 2D Handpose Estimation | 30th British Machine Vision Conference (BMVC) | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In this paper, we propose a new architecture called Adaptive Graphical Model
Network (AGMN) to tackle the task of 2D hand pose estimation from a monocular
RGB image. The AGMN consists of two branches of deep convolutional neural
networks for calculating unary and pairwise potential functions, followed by a
graphical model inference module for integrating unary and pairwise potentials.
Unlike existing architectures proposed to combine DCNNs with graphical models,
our AGMN is novel in that the parameters of its graphical model are conditioned
on and fully adaptive to individual input images. Experiments show that our
approach outperforms the state-of-the-art method used in 2D hand keypoints
estimation by a notable margin on two public datasets. Code can be found at
https://github.com/deyingk/agmn.
| [
{
"version": "v1",
"created": "Wed, 18 Sep 2019 04:19:51 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 04:08:29 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Kong",
"Deying",
""
],
[
"Chen",
"Yifei",
""
],
[
"Ma",
"Haoyu",
""
],
[
"Yan",
"Xiangyi",
""
],
[
"Xie",
"Xiaohui",
""
]
] | TITLE: Adaptive Graphical Model Network for 2D Handpose Estimation
ABSTRACT: In this paper, we propose a new architecture called Adaptive Graphical Model
Network (AGMN) to tackle the task of 2D hand pose estimation from a monocular
RGB image. The AGMN consists of two branches of deep convolutional neural
networks for calculating unary and pairwise potential functions, followed by a
graphical model inference module for integrating unary and pairwise potentials.
Unlike existing architectures proposed to combine DCNNs with graphical models,
our AGMN is novel in that the parameters of its graphical model are conditioned
on and fully adaptive to individual input images. Experiments show that our
approach outperforms the state-of-the-art method used in 2D hand keypoints
estimation by a notable margin on two public datasets. Code can be found at
https://github.com/deyingk/agmn.
| no_new_dataset | 0.709447 |
2103.03133 | \v{S}imon Bil\'ik | Simon Bilik, Lukas Kratochvila, Adam Ligocki, Ondrej Bostik, Tomas
Zemcik, Matous Hybl, Karel Horak, Ludek Zalud | Visual diagnosis of the Varroa destructor parasitic mite in honeybees
using object detector techniques | null | Sensors, 21-8 (2021), 2764-2780 | 10.3390/s21082764 | BUT171160 | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The Varroa destructor mite is one of the most dangerous Honey Bee (Apis
mellifera) parasites worldwide and the bee colonies have to be regularly
monitored in order to control its spread. Here we present an object detector
based method for health state monitoring of bee colonies. This method has the
potential for online measurement and processing. In our experiment, we compare
the YOLO and SSD object detectors along with the Deep SVDD anomaly detector.
Based on the custom dataset with 600 ground-truth images of healthy and
infected bees in various scenes, the detectors reached a high F1 score up to
0.874 in the infected bee detection and up to 0.727 in the detection of the
Varroa Destructor mite itself. The results demonstrate the potential of this
approach, which will be later used in the real-time computer vision based honey
bee inspection system. To the best of our knowledge, this study is the first
one using object detectors for this purpose. We expect that performance of
those object detectors will enable us to inspect the health status of the honey
bee colonies.
| [
{
"version": "v1",
"created": "Fri, 26 Feb 2021 11:01:31 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Bilik",
"Simon",
""
],
[
"Kratochvila",
"Lukas",
""
],
[
"Ligocki",
"Adam",
""
],
[
"Bostik",
"Ondrej",
""
],
[
"Zemcik",
"Tomas",
""
],
[
"Hybl",
"Matous",
""
],
[
"Horak",
"Karel",
""
],
[
"Zalud",
"Ludek",
""
]
] | TITLE: Visual diagnosis of the Varroa destructor parasitic mite in honeybees
using object detector techniques
ABSTRACT: The Varroa destructor mite is one of the most dangerous Honey Bee (Apis
mellifera) parasites worldwide and the bee colonies have to be regularly
monitored in order to control its spread. Here we present an object detector
based method for health state monitoring of bee colonies. This method has the
potential for online measurement and processing. In our experiment, we compare
the YOLO and SSD object detectors along with the Deep SVDD anomaly detector.
Based on the custom dataset with 600 ground-truth images of healthy and
infected bees in various scenes, the detectors reached a high F1 score up to
0.874 in the infected bee detection and up to 0.727 in the detection of the
Varroa Destructor mite itself. The results demonstrate the potential of this
approach, which will be later used in the real-time computer vision based honey
bee inspection system. To the best of our knowledge, this study is the first
one using object detectors for this purpose. We expect that performance of
those object detectors will enable us to inspect the health status of the honey
bee colonies.
| new_dataset | 0.71579 |
2107.09487 | Ekaterina Dudkina | Ekaterina Dudkina, Michelangelo Bin, Jane Breen, Emanuele Crisostomi,
Pietro Ferraro, Steve Kirkland, Jakub Marecek, Roderick Murray-Smith, Thomas
Parisini, Lewi Stone, Serife Yilmaz, Robert Shorten | On node ranking in graphs | null | International Journal of Control, 2023 | 10.1080/00207179.2023.2204969 | null | physics.soc-ph cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ranking of nodes in a network according to their ``importance'' is a
classic problem that has attracted the interest of different scientific
communities in the last decades. The current COVID-19 pandemic has recently
rejuvenated the interest in this problem, as it is related to the selection of
which individuals should be tested in a population of asymptomatic individuals,
or which individuals should be vaccinated first. Motivated by the COVID-19
spreading dynamics, in this paper we review the most popular methods for node
ranking in undirected unweighted graphs, and compare their performance in a
benchmark realistic network, that takes into account the community-based
structure of society. Also, we generalize a classic benchmark network
originally proposed by Newman for ranking nodes in unweighted graphs, to show
how ranks change in the weighted case.
| [
{
"version": "v1",
"created": "Tue, 20 Jul 2021 13:38:03 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Dudkina",
"Ekaterina",
""
],
[
"Bin",
"Michelangelo",
""
],
[
"Breen",
"Jane",
""
],
[
"Crisostomi",
"Emanuele",
""
],
[
"Ferraro",
"Pietro",
""
],
[
"Kirkland",
"Steve",
""
],
[
"Marecek",
"Jakub",
""
],
[
"Murray-Smith",
"Roderick",
""
],
[
"Parisini",
"Thomas",
""
],
[
"Stone",
"Lewi",
""
],
[
"Yilmaz",
"Serife",
""
],
[
"Shorten",
"Robert",
""
]
] | TITLE: On node ranking in graphs
ABSTRACT: The ranking of nodes in a network according to their ``importance'' is a
classic problem that has attracted the interest of different scientific
communities in the last decades. The current COVID-19 pandemic has recently
rejuvenated the interest in this problem, as it is related to the selection of
which individuals should be tested in a population of asymptomatic individuals,
or which individuals should be vaccinated first. Motivated by the COVID-19
spreading dynamics, in this paper we review the most popular methods for node
ranking in undirected unweighted graphs, and compare their performance in a
benchmark realistic network, that takes into account the community-based
structure of society. Also, we generalize a classic benchmark network
originally proposed by Newman for ranking nodes in unweighted graphs, to show
how ranks change in the weighted case.
| no_new_dataset | 0.709648 |
2111.10017 | Heechul Jung | Jaesin Ahn, Jiuk Hong, Jeongwoo Ju and Heechul Jung | Rethinking Query, Key, and Value Embedding in Vision Transformer under
Tiny Model Constraints | null | Mathematics 2023, 11, 1933 | 10.3390/math11081933 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A vision transformer (ViT) is the dominant model in the computer vision
field. Despite numerous studies that mainly focus on dealing with inductive
bias and complexity, there remains the problem of finding better transformer
networks. For example, conventional transformer-based models usually use a
projection layer for each query (Q), key (K), and value (V) embedding before
multi-head self-attention. Insufficient consideration of semantic $Q, K$, and
$V$ embedding may lead to a performance drop. In this paper, we propose three
types of structures for $Q$, $K$, and $V$ embedding. The first structure
utilizes two layers with ReLU, which is a non-linear embedding for $Q, K$, and
$V$. The second involves sharing one of the non-linear layers to share
knowledge among $Q, K$, and $V$. The third proposed structure shares all
non-linear layers with code parameters. The codes are trainable, and the values
determine the embedding process to be performed among $Q$, $K$, and $V$. Hence,
we demonstrate the superior image classification performance of the proposed
approaches in experiments compared to several state-of-the-art approaches. The
proposed method achieved $71.4\%$ with a few parameters (of $3.1M$) on the
ImageNet-1k dataset compared to that required by the original transformer model
of XCiT-N12 ($69.9\%$). Additionally, the method achieved $93.3\%$ with only
$2.9M$ parameters in transfer learning on average for the CIFAR-10, CIFAR-100,
Stanford Cars datasets, and STL-10 datasets, which is better than the accuracy
of $92.2\%$ obtained via the original XCiT-N12 model.
| [
{
"version": "v1",
"created": "Fri, 19 Nov 2021 02:54:57 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Ahn",
"Jaesin",
""
],
[
"Hong",
"Jiuk",
""
],
[
"Ju",
"Jeongwoo",
""
],
[
"Jung",
"Heechul",
""
]
] | TITLE: Rethinking Query, Key, and Value Embedding in Vision Transformer under
Tiny Model Constraints
ABSTRACT: A vision transformer (ViT) is the dominant model in the computer vision
field. Despite numerous studies that mainly focus on dealing with inductive
bias and complexity, there remains the problem of finding better transformer
networks. For example, conventional transformer-based models usually use a
projection layer for each query (Q), key (K), and value (V) embedding before
multi-head self-attention. Insufficient consideration of semantic $Q, K$, and
$V$ embedding may lead to a performance drop. In this paper, we propose three
types of structures for $Q$, $K$, and $V$ embedding. The first structure
utilizes two layers with ReLU, which is a non-linear embedding for $Q, K$, and
$V$. The second involves sharing one of the non-linear layers to share
knowledge among $Q, K$, and $V$. The third proposed structure shares all
non-linear layers with code parameters. The codes are trainable, and the values
determine the embedding process to be performed among $Q$, $K$, and $V$. Hence,
we demonstrate the superior image classification performance of the proposed
approaches in experiments compared to several state-of-the-art approaches. The
proposed method achieved $71.4\%$ with a few parameters (of $3.1M$) on the
ImageNet-1k dataset compared to that required by the original transformer model
of XCiT-N12 ($69.9\%$). Additionally, the method achieved $93.3\%$ with only
$2.9M$ parameters in transfer learning on average for the CIFAR-10, CIFAR-100,
Stanford Cars datasets, and STL-10 datasets, which is better than the accuracy
of $92.2\%$ obtained via the original XCiT-N12 model.
| no_new_dataset | 0.708616 |
2112.06222 | Diandian Gu | Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun
Ma, Haoyu Wang, Xin Jin | Rise of Distributed Deep Learning Training in the Big Model Era: From a
Software Engineering Perspective | Accepted by ACM Transactions on Software Engineering and Methodology
(TOSEM 2023). Please include TOSEM in any citations | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning (DL) has become a key component of modern software. In the "big
model" era, the rich features of DL-based software substantially rely on
powerful DL models, e.g., BERT, GPT-3, and the recently emerging GPT-4, which
are trained on the powerful cloud with large datasets. Hence, training
effective DL models has become a vital stage in the whole software lifecycle.
When training deep learning models, especially those big models, developers
need to parallelize and distribute the computation and memory resources amongst
multiple devices in the training process, which is known as distributed deep
learning training, or distributed training for short. However, the unique
challenges that developers encounter in distributed training process have not
been studied in the software engineering community. Given the increasingly
heavy dependence of current DL-based software on distributed training, this
paper aims to fill in the knowledge gap and presents the first comprehensive
study on developers' issues in distributed training. To this end, we analyze
1,131 real-world developers' issues about using these frameworks reported on
Stack Overflow and GitHub. We construct a fine-grained taxonomy consisting of
30 categories regarding the fault symptoms and summarize common fix patterns
for different symptoms. Based on the results, we suggest actionable
implications on research avenues that can potentially facilitate the
distributed training to develop DL-based software, such as focusing on the
frequent and common fix patterns when designing testing or debugging tools,
developing efficient testing and debugging techniques for communication
configuration along with the synthesis of network configuration analysis,
designing new multi-device checkpoint-and-replay techniques to help
reproduction, and designing serverless APIs for cloud platforms.
| [
{
"version": "v1",
"created": "Sun, 12 Dec 2021 12:58:48 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 05:37:23 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Liu",
"Xuanzhe",
""
],
[
"Gu",
"Diandian",
""
],
[
"Chen",
"Zhenpeng",
""
],
[
"Wen",
"Jinfeng",
""
],
[
"Zhang",
"Zili",
""
],
[
"Ma",
"Yun",
""
],
[
"Wang",
"Haoyu",
""
],
[
"Jin",
"Xin",
""
]
] | TITLE: Rise of Distributed Deep Learning Training in the Big Model Era: From a
Software Engineering Perspective
ABSTRACT: Deep learning (DL) has become a key component of modern software. In the "big
model" era, the rich features of DL-based software substantially rely on
powerful DL models, e.g., BERT, GPT-3, and the recently emerging GPT-4, which
are trained on the powerful cloud with large datasets. Hence, training
effective DL models has become a vital stage in the whole software lifecycle.
When training deep learning models, especially those big models, developers
need to parallelize and distribute the computation and memory resources amongst
multiple devices in the training process, which is known as distributed deep
learning training, or distributed training for short. However, the unique
challenges that developers encounter in distributed training process have not
been studied in the software engineering community. Given the increasingly
heavy dependence of current DL-based software on distributed training, this
paper aims to fill in the knowledge gap and presents the first comprehensive
study on developers' issues in distributed training. To this end, we analyze
1,131 real-world developers' issues about using these frameworks reported on
Stack Overflow and GitHub. We construct a fine-grained taxonomy consisting of
30 categories regarding the fault symptoms and summarize common fix patterns
for different symptoms. Based on the results, we suggest actionable
implications on research avenues that can potentially facilitate the
distributed training to develop DL-based software, such as focusing on the
frequent and common fix patterns when designing testing or debugging tools,
developing efficient testing and debugging techniques for communication
configuration along with the synthesis of network configuration analysis,
designing new multi-device checkpoint-and-replay techniques to help
reproduction, and designing serverless APIs for cloud platforms.
| no_new_dataset | 0.709019 |
2202.10769 | Simon Bartels | Simon Bartels, Kristoffer Stensbo-Smidt, Pablo Moreno-Mu\~noz, Wouter
Boomsma, Jes Frellsen, S{\o}ren Hauberg | Adaptive Cholesky Gaussian Processes | null | Proceedings of The 26th International Conference on Artificial
Intelligence and Statistics (2023) | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | We present a method to approximate Gaussian process regression models for
large datasets by considering only a subset of the data. Our approach is novel
in that the size of the subset is selected on the fly during exact inference
with little computational overhead. From an empirical observation that the
log-marginal likelihood often exhibits a linear trend once a sufficient subset
of a dataset has been observed, we conclude that many large datasets contain
redundant information that only slightly affects the posterior. Based on this,
we provide probabilistic bounds on the full model evidence that can identify
such subsets. Remarkably, these bounds are largely composed of terms that
appear in intermediate steps of the standard Cholesky decomposition, allowing
us to modify the algorithm to adaptively stop the decomposition once enough
data have been observed.
| [
{
"version": "v1",
"created": "Tue, 22 Feb 2022 09:43:46 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Feb 2022 11:23:11 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Feb 2023 17:03:32 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Bartels",
"Simon",
""
],
[
"Stensbo-Smidt",
"Kristoffer",
""
],
[
"Moreno-Muñoz",
"Pablo",
""
],
[
"Boomsma",
"Wouter",
""
],
[
"Frellsen",
"Jes",
""
],
[
"Hauberg",
"Søren",
""
]
] | TITLE: Adaptive Cholesky Gaussian Processes
ABSTRACT: We present a method to approximate Gaussian process regression models for
large datasets by considering only a subset of the data. Our approach is novel
in that the size of the subset is selected on the fly during exact inference
with little computational overhead. From an empirical observation that the
log-marginal likelihood often exhibits a linear trend once a sufficient subset
of a dataset has been observed, we conclude that many large datasets contain
redundant information that only slightly affects the posterior. Based on this,
we provide probabilistic bounds on the full model evidence that can identify
such subsets. Remarkably, these bounds are largely composed of terms that
appear in intermediate steps of the standard Cholesky decomposition, allowing
us to modify the algorithm to adaptively stop the decomposition once enough
data have been observed.
| no_new_dataset | 0.710804 |
2203.06747 | \v{S}imon Bil\'ik | Simon Bilik, Karel Horak | Feature space reduction as data preprocessing for the anomaly detection | 27th Conference STUDENT EEICT 2020, Brno University of Technology | In Proceedings I of the 27th Conference STUDENT EEICT 2021. Brno,
2021. s. 415-419. ISBN: 978-80-214-5942-7 | null | BUT171163 | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In this paper, we present two pipelines in order to reduce the feature space
for anomaly detection using the One Class SVM. As a first stage of both
pipelines, we compare the performance of three convolutional autoencoders. We
use the PCA method together with t-SNE as the first pipeline and the
reconstruction errors based method as the second. Both methods have potential
for the anomaly detection, but the reconstruction error metrics prove to be
more robust for this task. We show that the convolutional autoencoder
architecture doesn't have a significant effect for this task and we prove the
potential of our approach on the real world dataset.
| [
{
"version": "v1",
"created": "Sun, 13 Mar 2022 19:52:47 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Bilik",
"Simon",
""
],
[
"Horak",
"Karel",
""
]
] | TITLE: Feature space reduction as data preprocessing for the anomaly detection
ABSTRACT: In this paper, we present two pipelines in order to reduce the feature space
for anomaly detection using the One Class SVM. As a first stage of both
pipelines, we compare the performance of three convolutional autoencoders. We
use the PCA method together with t-SNE as the first pipeline and the
reconstruction errors based method as the second. Both methods have potential
for the anomaly detection, but the reconstruction error metrics prove to be
more robust for this task. We show that the convolutional autoencoder
architecture doesn't have a significant effect for this task and we prove the
potential of our approach on the real world dataset.
| no_new_dataset | 0.712657 |
2203.13068 | \v{S}imon Bil\'ik | Simon Bilik, Karel Horak | SIFT and SURF based feature extraction for the anomaly detection | 28th Conference STUDENT EEICT 2022, Brno University of Technology | In Proceedings I of the 28th Conference STUDENT EEICT 2022. Brno,
2022. s. 459-464. ISBN: 978-80-214-6029-4 | null | BUT177722 | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this paper, we suggest a way, how to use SIFT and SURF algorithms to
extract the image features for anomaly detection. We use those feature vectors
to train various classifiers on a real-world dataset in the semi -supervised
(with a small number of faulty samples) manner with a large number of
classifiers and in the one-class (with no faulty samples) manner using the SVDD
and SVM classifier. We prove, that the SIFT and SURF algorithms could be used
as feature extractors, that they could be used to train a semi-supervised and
one-class classifier with an accuracy around 89\% and that the performance of
the one-class classifier could be comparable to the semi-supervised one. We
also made our dataset and source code publicly available.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2022 13:46:25 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Oct 2022 14:31:06 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Bilik",
"Simon",
""
],
[
"Horak",
"Karel",
""
]
] | TITLE: SIFT and SURF based feature extraction for the anomaly detection
ABSTRACT: In this paper, we suggest a way, how to use SIFT and SURF algorithms to
extract the image features for anomaly detection. We use those feature vectors
to train various classifiers on a real-world dataset in the semi -supervised
(with a small number of faulty samples) manner with a large number of
classifiers and in the one-class (with no faulty samples) manner using the SVDD
and SVM classifier. We prove, that the SIFT and SURF algorithms could be used
as feature extractors, that they could be used to train a semi-supervised and
one-class classifier with an accuracy around 89\% and that the performance of
the one-class classifier could be comparable to the semi-supervised one. We
also made our dataset and source code publicly available.
| new_dataset | 0.70614 |
2204.00117 | Leszek Pecyna | Leszek Pecyna, Siyuan Dong, Shan Luo | Visual-Tactile Multimodality for Following Deformable Linear Objects
Using Reinforcement Learning | 8 pages, 11 figures | 2022 IEEE/RSJ International Conference on Intelligent Robots and
Systems (IROS) | 10.1109/IROS47612.2022.9982218 | null | cs.RO cs.LG | http://creativecommons.org/licenses/by/4.0/ | Manipulation of deformable objects is a challenging task for a robot. It will
be problematic to use a single sensory input to track the behaviour of such
objects: vision can be subjected to occlusions, whereas tactile inputs cannot
capture the global information that is useful for the task. In this paper, we
study the problem of using vision and tactile inputs together to complete the
task of following deformable linear objects, for the first time. We create a
Reinforcement Learning agent using different sensing modalities and investigate
how its behaviour can be boosted using visual-tactile fusion, compared to using
a single sensing modality. To this end, we developed a benchmark in simulation
for manipulating the deformable linear objects using multimodal sensing inputs.
The policy of the agent uses distilled information, e.g., the pose of the
object in both visual and tactile perspectives, instead of the raw sensing
signals, so that it can be directly transferred to real environments. In this
way, we disentangle the perception system and the learned control policy. Our
extensive experiments show that the use of both vision and tactile inputs,
together with proprioception, allows the agent to complete the task in up to
92% of cases, compared to 77% when only one of the signals is given. Our
results can provide valuable insights for the future design of tactile sensors
and for deformable objects manipulation.
| [
{
"version": "v1",
"created": "Thu, 31 Mar 2022 21:59:08 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Pecyna",
"Leszek",
""
],
[
"Dong",
"Siyuan",
""
],
[
"Luo",
"Shan",
""
]
] | TITLE: Visual-Tactile Multimodality for Following Deformable Linear Objects
Using Reinforcement Learning
ABSTRACT: Manipulation of deformable objects is a challenging task for a robot. It will
be problematic to use a single sensory input to track the behaviour of such
objects: vision can be subjected to occlusions, whereas tactile inputs cannot
capture the global information that is useful for the task. In this paper, we
study the problem of using vision and tactile inputs together to complete the
task of following deformable linear objects, for the first time. We create a
Reinforcement Learning agent using different sensing modalities and investigate
how its behaviour can be boosted using visual-tactile fusion, compared to using
a single sensing modality. To this end, we developed a benchmark in simulation
for manipulating the deformable linear objects using multimodal sensing inputs.
The policy of the agent uses distilled information, e.g., the pose of the
object in both visual and tactile perspectives, instead of the raw sensing
signals, so that it can be directly transferred to real environments. In this
way, we disentangle the perception system and the learned control policy. Our
extensive experiments show that the use of both vision and tactile inputs,
together with proprioception, allows the agent to complete the task in up to
92% of cases, compared to 77% when only one of the signals is given. Our
results can provide valuable insights for the future design of tactile sensors
and for deformable objects manipulation.
| no_new_dataset | 0.710176 |
2205.08714 | Jaeyoung Yoo | Jaeyoung Yoo, Hojun Lee, Seunghyeon Seo, Inseop Chung, Nojun Kwak | End-to-End Multi-Object Detection with a Regularized Mixture Model | Accepted at ICML 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent end-to-end multi-object detectors simplify the inference pipeline by
removing hand-crafted processes such as non-maximum suppression (NMS). However,
during training, they still heavily rely on heuristics and hand-crafted
processes which deteriorate the reliability of the predicted confidence score.
In this paper, we propose a novel framework to train an end-to-end multi-object
detector consisting of only two terms: negative log-likelihood (NLL) and a
regularization term. In doing so, the multi-object detection problem is treated
as density estimation of the ground truth bounding boxes utilizing a
regularized mixture density model. The proposed \textit{end-to-end multi-object
Detection with a Regularized Mixture Model} (D-RMM) is trained by minimizing
the NLL with the proposed regularization term, maximum component maximization
(MCM) loss, preventing duplicate predictions. Our method reduces the heuristics
of the training process and improves the reliability of the predicted
confidence score. Moreover, our D-RMM outperforms the previous end-to-end
detectors on MS COCO dataset.
| [
{
"version": "v1",
"created": "Wed, 18 May 2022 04:20:23 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Sep 2022 01:10:50 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Apr 2023 06:08:12 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Yoo",
"Jaeyoung",
""
],
[
"Lee",
"Hojun",
""
],
[
"Seo",
"Seunghyeon",
""
],
[
"Chung",
"Inseop",
""
],
[
"Kwak",
"Nojun",
""
]
] | TITLE: End-to-End Multi-Object Detection with a Regularized Mixture Model
ABSTRACT: Recent end-to-end multi-object detectors simplify the inference pipeline by
removing hand-crafted processes such as non-maximum suppression (NMS). However,
during training, they still heavily rely on heuristics and hand-crafted
processes which deteriorate the reliability of the predicted confidence score.
In this paper, we propose a novel framework to train an end-to-end multi-object
detector consisting of only two terms: negative log-likelihood (NLL) and a
regularization term. In doing so, the multi-object detection problem is treated
as density estimation of the ground truth bounding boxes utilizing a
regularized mixture density model. The proposed \textit{end-to-end multi-object
Detection with a Regularized Mixture Model} (D-RMM) is trained by minimizing
the NLL with the proposed regularization term, maximum component maximization
(MCM) loss, preventing duplicate predictions. Our method reduces the heuristics
of the training process and improves the reliability of the predicted
confidence score. Moreover, our D-RMM outperforms the previous end-to-end
detectors on MS COCO dataset.
| no_new_dataset | 0.709982 |
2205.13671 | Li Zijie | Zijie Li, Kazem Meidani, Amir Barati Farimani | Transformer for Partial Differential Equations' Operator Learning | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Data-driven learning of partial differential equations' solution operators
has recently emerged as a promising paradigm for approximating the underlying
solutions. The solution operators are usually parameterized by deep learning
models that are built upon problem-specific inductive biases. An example is a
convolutional or a graph neural network that exploits the local grid structure
where functions' values are sampled. The attention mechanism, on the other
hand, provides a flexible way to implicitly exploit the patterns within inputs,
and furthermore, relationship between arbitrary query locations and inputs. In
this work, we present an attention-based framework for data-driven operator
learning, which we term Operator Transformer (OFormer). Our framework is built
upon self-attention, cross-attention, and a set of point-wise multilayer
perceptrons (MLPs), and thus it makes few assumptions on the sampling pattern
of the input function or query locations. We show that the proposed framework
is competitive on standard benchmark problems and can flexibly be adapted to
randomly sampled input.
| [
{
"version": "v1",
"created": "Thu, 26 May 2022 23:17:53 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Oct 2022 19:43:39 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 21:01:23 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Li",
"Zijie",
""
],
[
"Meidani",
"Kazem",
""
],
[
"Farimani",
"Amir Barati",
""
]
] | TITLE: Transformer for Partial Differential Equations' Operator Learning
ABSTRACT: Data-driven learning of partial differential equations' solution operators
has recently emerged as a promising paradigm for approximating the underlying
solutions. The solution operators are usually parameterized by deep learning
models that are built upon problem-specific inductive biases. An example is a
convolutional or a graph neural network that exploits the local grid structure
where functions' values are sampled. The attention mechanism, on the other
hand, provides a flexible way to implicitly exploit the patterns within inputs,
and furthermore, relationship between arbitrary query locations and inputs. In
this work, we present an attention-based framework for data-driven operator
learning, which we term Operator Transformer (OFormer). Our framework is built
upon self-attention, cross-attention, and a set of point-wise multilayer
perceptrons (MLPs), and thus it makes few assumptions on the sampling pattern
of the input function or query locations. We show that the proposed framework
is competitive on standard benchmark problems and can flexibly be adapted to
randomly sampled input.
| no_new_dataset | 0.709233 |
2206.06120 | James Ruffle | James K Ruffle, Samia Mohinta, Robert J Gray, Harpreet Hyare,
Parashkev Nachev | Brain tumour segmentation with incomplete imaging data | 26 pages, 8 figures, 4 supplementary tables | null | 10.1093/braincomms/fcad118 | null | cs.CV cs.AI q-bio.TO | http://creativecommons.org/licenses/by/4.0/ | The complex heterogeneity of brain tumours is increasingly recognized to
demand data of magnitudes and richness only fully-inclusive, large-scale
collections drawn from routine clinical care could plausibly offer. This is a
task contemporary machine learning could facilitate, especially in
neuroimaging, but its ability to deal with incomplete data common in real world
clinical practice remains unknown. Here we apply state-of-the-art methods to
large scale, multi-site MRI data to quantify the comparative fidelity of
automated tumour segmentation models replicating the various levels of sequence
availability observed in the clinical reality. We compare deep learning
(nnU-Net-derived) segmentation models with all possible combinations of T1,
contrast-enhanced T1, T2, and FLAIR sequences, trained and validated with
five-fold cross-validation on the 2021 BraTS-RSNA glioma population of 1251
patients, with further testing on a real-world 50 patient sample diverse in not
only MRI scanner and field strength, but a random selection of pre- and
post-operative imaging also. Models trained on incomplete imaging data
segmented lesions well, often equivalently to those trained on complete data,
exhibiting Dice coefficients of 0.907 (single sequence) to 0.945 (full
datasets) for whole tumours, and 0.701 (single sequence) to 0.891 (full
datasets) for component tissue types. Incomplete data segmentation models could
accurately detect enhancing tumour in the absence of contrast imaging,
quantifying its volume with an R2 between 0.95-0.97, and were invariant to
lesion morphometry. Deep learning segmentation models characterize tumours well
when missing data and can even detect enhancing tissue without the use of
contrast. This suggests translation to clinical practice, where incomplete data
is common, may be easier than hitherto believed, and may be of value in
reducing dependence on contrast use.
| [
{
"version": "v1",
"created": "Mon, 13 Jun 2022 12:58:54 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2023 18:14:44 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Feb 2023 14:12:48 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Ruffle",
"James K",
""
],
[
"Mohinta",
"Samia",
""
],
[
"Gray",
"Robert J",
""
],
[
"Hyare",
"Harpreet",
""
],
[
"Nachev",
"Parashkev",
""
]
] | TITLE: Brain tumour segmentation with incomplete imaging data
ABSTRACT: The complex heterogeneity of brain tumours is increasingly recognized to
demand data of magnitudes and richness only fully-inclusive, large-scale
collections drawn from routine clinical care could plausibly offer. This is a
task contemporary machine learning could facilitate, especially in
neuroimaging, but its ability to deal with incomplete data common in real world
clinical practice remains unknown. Here we apply state-of-the-art methods to
large scale, multi-site MRI data to quantify the comparative fidelity of
automated tumour segmentation models replicating the various levels of sequence
availability observed in the clinical reality. We compare deep learning
(nnU-Net-derived) segmentation models with all possible combinations of T1,
contrast-enhanced T1, T2, and FLAIR sequences, trained and validated with
five-fold cross-validation on the 2021 BraTS-RSNA glioma population of 1251
patients, with further testing on a real-world 50 patient sample diverse in not
only MRI scanner and field strength, but a random selection of pre- and
post-operative imaging also. Models trained on incomplete imaging data
segmented lesions well, often equivalently to those trained on complete data,
exhibiting Dice coefficients of 0.907 (single sequence) to 0.945 (full
datasets) for whole tumours, and 0.701 (single sequence) to 0.891 (full
datasets) for component tissue types. Incomplete data segmentation models could
accurately detect enhancing tumour in the absence of contrast imaging,
quantifying its volume with an R2 between 0.95-0.97, and were invariant to
lesion morphometry. Deep learning segmentation models characterize tumours well
when missing data and can even detect enhancing tissue without the use of
contrast. This suggests translation to clinical practice, where incomplete data
is common, may be easier than hitherto believed, and may be of value in
reducing dependence on contrast use.
| no_new_dataset | 0.709239 |
2207.06400 | Hongwen Zhang | Hongwen Zhang, Yating Tian, Yuxiang Zhang, Mengcheng Li, Liang An,
Zhenan Sun, Yebin Liu | PyMAF-X: Towards Well-aligned Full-body Model Regression from Monocular
Images | Accepted to IEEE TPAMI, Project page:
https://www.liuyebin.com/pymaf-x, An eXpressive extension of PyMAF
[arXiv:2103.16507] for monocular human/hand/face/full-body mesh recovery | null | 10.1109/TPAMI.2023.3271691 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present PyMAF-X, a regression-based approach to recovering parametric
full-body models from monocular images. This task is very challenging since
minor parametric deviation may lead to noticeable misalignment between the
estimated mesh and the input image. Moreover, when integrating part-specific
estimations into the full-body model, existing solutions tend to either degrade
the alignment or produce unnatural wrist poses. To address these issues, we
propose a Pyramidal Mesh Alignment Feedback (PyMAF) loop in our regression
network for well-aligned human mesh recovery and extend it as PyMAF-X for the
recovery of expressive full-body models. The core idea of PyMAF is to leverage
a feature pyramid and rectify the predicted parameters explicitly based on the
mesh-image alignment status. Specifically, given the currently predicted
parameters, mesh-aligned evidence will be extracted from finer-resolution
features accordingly and fed back for parameter rectification. To enhance the
alignment perception, an auxiliary dense supervision is employed to provide
mesh-image correspondence guidance while spatial alignment attention is
introduced to enable the awareness of the global contexts for our network. When
extending PyMAF for full-body mesh recovery, an adaptive integration strategy
is proposed in PyMAF-X to produce natural wrist poses while maintaining the
well-aligned performance of the part-specific estimations. The efficacy of our
approach is validated on several benchmark datasets for body, hand, face, and
full-body mesh recovery, where PyMAF and PyMAF-X effectively improve the
mesh-image alignment and achieve new state-of-the-art results. The project page
with code and video results can be found at https://www.liuyebin.com/pymaf-x.
| [
{
"version": "v1",
"created": "Wed, 13 Jul 2022 17:58:33 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jul 2022 17:41:15 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Apr 2023 02:33:10 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhang",
"Hongwen",
""
],
[
"Tian",
"Yating",
""
],
[
"Zhang",
"Yuxiang",
""
],
[
"Li",
"Mengcheng",
""
],
[
"An",
"Liang",
""
],
[
"Sun",
"Zhenan",
""
],
[
"Liu",
"Yebin",
""
]
] | TITLE: PyMAF-X: Towards Well-aligned Full-body Model Regression from Monocular
Images
ABSTRACT: We present PyMAF-X, a regression-based approach to recovering parametric
full-body models from monocular images. This task is very challenging since
minor parametric deviation may lead to noticeable misalignment between the
estimated mesh and the input image. Moreover, when integrating part-specific
estimations into the full-body model, existing solutions tend to either degrade
the alignment or produce unnatural wrist poses. To address these issues, we
propose a Pyramidal Mesh Alignment Feedback (PyMAF) loop in our regression
network for well-aligned human mesh recovery and extend it as PyMAF-X for the
recovery of expressive full-body models. The core idea of PyMAF is to leverage
a feature pyramid and rectify the predicted parameters explicitly based on the
mesh-image alignment status. Specifically, given the currently predicted
parameters, mesh-aligned evidence will be extracted from finer-resolution
features accordingly and fed back for parameter rectification. To enhance the
alignment perception, an auxiliary dense supervision is employed to provide
mesh-image correspondence guidance while spatial alignment attention is
introduced to enable the awareness of the global contexts for our network. When
extending PyMAF for full-body mesh recovery, an adaptive integration strategy
is proposed in PyMAF-X to produce natural wrist poses while maintaining the
well-aligned performance of the part-specific estimations. The efficacy of our
approach is validated on several benchmark datasets for body, hand, face, and
full-body mesh recovery, where PyMAF and PyMAF-X effectively improve the
mesh-image alignment and achieve new state-of-the-art results. The project page
with code and video results can be found at https://www.liuyebin.com/pymaf-x.
| no_new_dataset | 0.70978 |
2207.11469 | Xiangcheng Du | Xiangcheng Du and Zhao Zhou and Yingbin Zheng and Xingjiao Wu and
Tianlong Ma and Cheng Jin | Progressive Scene Text Erasing with Self-Supervision | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scene text erasing seeks to erase text contents from scene images and current
state-of-the-art text erasing models are trained on large-scale synthetic data.
Although data synthetic engines can provide vast amounts of annotated training
samples, there are differences between synthetic and real-world data. In this
paper, we employ self-supervision for feature representation on unlabeled
real-world scene text images. A novel pretext task is designed to keep
consistent among text stroke masks of image variants. We design the Progressive
Erasing Network in order to remove residual texts. The scene text is erased
progressively by leveraging the intermediate generated results which provide
the foundation for subsequent higher quality results. Experiments show that our
method significantly improves the generalization of the text erasing task and
achieves state-of-the-art performance on public benchmarks.
| [
{
"version": "v1",
"created": "Sat, 23 Jul 2022 09:05:13 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 09:36:53 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Du",
"Xiangcheng",
""
],
[
"Zhou",
"Zhao",
""
],
[
"Zheng",
"Yingbin",
""
],
[
"Wu",
"Xingjiao",
""
],
[
"Ma",
"Tianlong",
""
],
[
"Jin",
"Cheng",
""
]
] | TITLE: Progressive Scene Text Erasing with Self-Supervision
ABSTRACT: Scene text erasing seeks to erase text contents from scene images and current
state-of-the-art text erasing models are trained on large-scale synthetic data.
Although data synthetic engines can provide vast amounts of annotated training
samples, there are differences between synthetic and real-world data. In this
paper, we employ self-supervision for feature representation on unlabeled
real-world scene text images. A novel pretext task is designed to keep
consistent among text stroke masks of image variants. We design the Progressive
Erasing Network in order to remove residual texts. The scene text is erased
progressively by leveraging the intermediate generated results which provide
the foundation for subsequent higher quality results. Experiments show that our
method significantly improves the generalization of the text erasing task and
achieves state-of-the-art performance on public benchmarks.
| no_new_dataset | 0.710258 |
2209.05419 | Zhiyuan Yan | Zhiyuan Yan, Peng Sun, Yubo Lang, Shuo Du, Shanzhuo Zhang, Wei Wang,
Lei Liu | Multimodal Graph Learning for Deepfake Detection | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing deepfake detectors face several challenges in achieving robustness
and generalization. One of the primary reasons is their limited ability to
extract relevant information from forgery videos, especially in the presence of
various artifacts such as spatial, frequency, temporal, and landmark
mismatches. Current detectors rely on pixel-level features that are easily
affected by unknown disturbances or facial landmarks that do not provide
sufficient information. Furthermore, most detectors cannot utilize information
from multiple domains for detection, leading to limited effectiveness in
identifying deepfake videos. To address these limitations, we propose a novel
framework, namely Multimodal Graph Learning (MGL) that leverages information
from multiple modalities using two GNNs and several multimodal fusion modules.
At the frame level, we employ a bi-directional cross-modal transformer and an
adaptive gating mechanism to combine the features from the spatial and
frequency domains with the geometric-enhanced landmark features captured by a
GNN. At the video level, we use a Graph Attention Network (GAT) to represent
each frame in a video as a node in a graph and encode temporal information into
the edges of the graph to extract temporal inconsistency between frames. Our
proposed method aims to effectively identify and utilize distinguishing
features for deepfake detection. We evaluate the effectiveness of our method
through extensive experiments on widely-used benchmarks and demonstrate that
our method outperforms the state-of-the-art detectors in terms of
generalization ability and robustness against unknown disturbances.
| [
{
"version": "v1",
"created": "Mon, 12 Sep 2022 17:17:49 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 09:13:58 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Yan",
"Zhiyuan",
""
],
[
"Sun",
"Peng",
""
],
[
"Lang",
"Yubo",
""
],
[
"Du",
"Shuo",
""
],
[
"Zhang",
"Shanzhuo",
""
],
[
"Wang",
"Wei",
""
],
[
"Liu",
"Lei",
""
]
] | TITLE: Multimodal Graph Learning for Deepfake Detection
ABSTRACT: Existing deepfake detectors face several challenges in achieving robustness
and generalization. One of the primary reasons is their limited ability to
extract relevant information from forgery videos, especially in the presence of
various artifacts such as spatial, frequency, temporal, and landmark
mismatches. Current detectors rely on pixel-level features that are easily
affected by unknown disturbances or facial landmarks that do not provide
sufficient information. Furthermore, most detectors cannot utilize information
from multiple domains for detection, leading to limited effectiveness in
identifying deepfake videos. To address these limitations, we propose a novel
framework, namely Multimodal Graph Learning (MGL) that leverages information
from multiple modalities using two GNNs and several multimodal fusion modules.
At the frame level, we employ a bi-directional cross-modal transformer and an
adaptive gating mechanism to combine the features from the spatial and
frequency domains with the geometric-enhanced landmark features captured by a
GNN. At the video level, we use a Graph Attention Network (GAT) to represent
each frame in a video as a node in a graph and encode temporal information into
the edges of the graph to extract temporal inconsistency between frames. Our
proposed method aims to effectively identify and utilize distinguishing
features for deepfake detection. We evaluate the effectiveness of our method
through extensive experiments on widely-used benchmarks and demonstrate that
our method outperforms the state-of-the-art detectors in terms of
generalization ability and robustness against unknown disturbances.
| no_new_dataset | 0.709837 |
2211.12631 | Yunzhe Zhou | Yunzhe Zhou, Peiru Xu, Giles Hooker | A Generic Approach for Reproducible Model Distillation | 31 pages, 8 figures | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model distillation has been a popular method for producing interpretable
machine learning. It uses an interpretable "student" model to mimic the
predictions made by the black box "teacher" model. However, when the student
model is sensitive to the variability of the data sets used for training even
when keeping the teacher fixed, the corresponded interpretation is not
reliable. Existing strategies stabilize model distillation by checking whether
a large enough corpus of pseudo-data is generated to reliably reproduce student
models, but methods to do so have so far been developed for a specific student
model. In this paper, we develop a generic approach for stable model
distillation based on central limit theorem for the average loss. We start with
a collection of candidate student models and search for candidates that
reasonably agree with the teacher. Then we construct a multiple testing
framework to select a corpus size such that the consistent student model would
be selected under different pseudo samples. We demonstrate the application of
our proposed approach on three commonly used intelligible models: decision
trees, falling rule lists and symbolic regression. Finally, we conduct
simulation experiments on Mammographic Mass and Breast Cancer datasets and
illustrate the testing procedure throughout a theoretical analysis with Markov
process. The code is publicly available at
https://github.com/yunzhe-zhou/GenericDistillation.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2022 23:38:02 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Dec 2022 22:24:43 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 21:04:30 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhou",
"Yunzhe",
""
],
[
"Xu",
"Peiru",
""
],
[
"Hooker",
"Giles",
""
]
] | TITLE: A Generic Approach for Reproducible Model Distillation
ABSTRACT: Model distillation has been a popular method for producing interpretable
machine learning. It uses an interpretable "student" model to mimic the
predictions made by the black box "teacher" model. However, when the student
model is sensitive to the variability of the data sets used for training even
when keeping the teacher fixed, the corresponded interpretation is not
reliable. Existing strategies stabilize model distillation by checking whether
a large enough corpus of pseudo-data is generated to reliably reproduce student
models, but methods to do so have so far been developed for a specific student
model. In this paper, we develop a generic approach for stable model
distillation based on central limit theorem for the average loss. We start with
a collection of candidate student models and search for candidates that
reasonably agree with the teacher. Then we construct a multiple testing
framework to select a corpus size such that the consistent student model would
be selected under different pseudo samples. We demonstrate the application of
our proposed approach on three commonly used intelligible models: decision
trees, falling rule lists and symbolic regression. Finally, we conduct
simulation experiments on Mammographic Mass and Breast Cancer datasets and
illustrate the testing procedure throughout a theoretical analysis with Markov
process. The code is publicly available at
https://github.com/yunzhe-zhou/GenericDistillation.
| no_new_dataset | 0.708616 |
2301.13422 | Jingtao Li | Jingtao Li, Xinyu Wang, Hengwei Zhao, Shaoyu Wang, Yanfei Zhong | Anomaly Segmentation for High-Resolution Remote Sensing Images Based on
Pixel Descriptors | Accepted in AAAI2023 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Anomaly segmentation in high spatial resolution (HSR) remote sensing imagery
is aimed at segmenting anomaly patterns of the earth deviating from normal
patterns, which plays an important role in various Earth vision applications.
However, it is a challenging task due to the complex distribution and the
irregular shapes of objects, and the lack of abnormal samples. To tackle these
problems, an anomaly segmentation model based on pixel descriptors (ASD) is
proposed for anomaly segmentation in HSR imagery. Specifically, deep one-class
classification is introduced for anomaly segmentation in the feature space with
discriminative pixel descriptors. The ASD model incorporates the data argument
for generating virtual ab-normal samples, which can force the pixel descriptors
to be compact for normal data and meanwhile to be diverse to avoid the model
collapse problems when only positive samples participated in the training. In
addition, the ASD introduced a multi-level and multi-scale feature extraction
strategy for learning the low-level and semantic information to make the pixel
descriptors feature-rich. The proposed ASD model was validated using four HSR
datasets and compared with the recent state-of-the-art models, showing its
potential value in Earth vision applications.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2023 05:32:34 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 11:14:33 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Li",
"Jingtao",
""
],
[
"Wang",
"Xinyu",
""
],
[
"Zhao",
"Hengwei",
""
],
[
"Wang",
"Shaoyu",
""
],
[
"Zhong",
"Yanfei",
""
]
] | TITLE: Anomaly Segmentation for High-Resolution Remote Sensing Images Based on
Pixel Descriptors
ABSTRACT: Anomaly segmentation in high spatial resolution (HSR) remote sensing imagery
is aimed at segmenting anomaly patterns of the earth deviating from normal
patterns, which plays an important role in various Earth vision applications.
However, it is a challenging task due to the complex distribution and the
irregular shapes of objects, and the lack of abnormal samples. To tackle these
problems, an anomaly segmentation model based on pixel descriptors (ASD) is
proposed for anomaly segmentation in HSR imagery. Specifically, deep one-class
classification is introduced for anomaly segmentation in the feature space with
discriminative pixel descriptors. The ASD model incorporates the data argument
for generating virtual ab-normal samples, which can force the pixel descriptors
to be compact for normal data and meanwhile to be diverse to avoid the model
collapse problems when only positive samples participated in the training. In
addition, the ASD introduced a multi-level and multi-scale feature extraction
strategy for learning the low-level and semantic information to make the pixel
descriptors feature-rich. The proposed ASD model was validated using four HSR
datasets and compared with the recent state-of-the-art models, showing its
potential value in Earth vision applications.
| no_new_dataset | 0.713057 |
2302.04662 | Adish Singla | Tung Phung, Jos\'e Cambronero, Sumit Gulwani, Tobias Kohn, Rupak
Majumdar, Adish Singla, Gustavo Soares | Generating High-Precision Feedback for Programming Syntax Errors using
Large Language Models | Published in International Conference on Educational Data Mining
(EDM) 2023 | null | null | null | cs.PL cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs), such as Codex, hold great promise in enhancing
programming education by automatically generating feedback for students. We
investigate using LLMs to generate feedback for fixing syntax errors in Python
programs, a key scenario in introductory programming. More concretely, given a
student's buggy program, our goal is to generate feedback comprising a fixed
program along with a natural language explanation describing the errors/fixes,
inspired by how a human tutor would give feedback. While using LLMs is
promising, the critical challenge is to ensure high precision in the generated
feedback, which is imperative before deploying such technology in classrooms.
The main research question we study is: Can we develop LLMs-based feedback
generation techniques with a tunable precision parameter, giving educators
quality control over the feedback that students receive? To this end, we
introduce PyFiXV, our technique to generate high-precision feedback powered by
Codex. The key idea behind PyFiXV is to use a novel run-time validation
mechanism to decide whether the generated feedback is suitable for sharing with
the student; notably, this validation mechanism also provides a precision knob
to educators. We perform an extensive evaluation using two real-world datasets
of Python programs with syntax errors and show the efficacy of PyFiXV in
generating high-precision feedback.
| [
{
"version": "v1",
"created": "Tue, 24 Jan 2023 13:00:25 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 11:33:44 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Phung",
"Tung",
""
],
[
"Cambronero",
"José",
""
],
[
"Gulwani",
"Sumit",
""
],
[
"Kohn",
"Tobias",
""
],
[
"Majumdar",
"Rupak",
""
],
[
"Singla",
"Adish",
""
],
[
"Soares",
"Gustavo",
""
]
] | TITLE: Generating High-Precision Feedback for Programming Syntax Errors using
Large Language Models
ABSTRACT: Large language models (LLMs), such as Codex, hold great promise in enhancing
programming education by automatically generating feedback for students. We
investigate using LLMs to generate feedback for fixing syntax errors in Python
programs, a key scenario in introductory programming. More concretely, given a
student's buggy program, our goal is to generate feedback comprising a fixed
program along with a natural language explanation describing the errors/fixes,
inspired by how a human tutor would give feedback. While using LLMs is
promising, the critical challenge is to ensure high precision in the generated
feedback, which is imperative before deploying such technology in classrooms.
The main research question we study is: Can we develop LLMs-based feedback
generation techniques with a tunable precision parameter, giving educators
quality control over the feedback that students receive? To this end, we
introduce PyFiXV, our technique to generate high-precision feedback powered by
Codex. The key idea behind PyFiXV is to use a novel run-time validation
mechanism to decide whether the generated feedback is suitable for sharing with
the student; notably, this validation mechanism also provides a precision knob
to educators. We perform an extensive evaluation using two real-world datasets
of Python programs with syntax errors and show the efficacy of PyFiXV in
generating high-precision feedback.
| no_new_dataset | 0.708408 |
2302.07363 | Haoran Wang | Haoran Wang, Yingtong Dou, Canyu Chen, Lichao Sun, Philip S. Yu, Kai
Shu | Attacking Fake News Detectors via Manipulating News Social Engagement | ACM Web Conference 2023 (WWW'23) | null | null | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | Social media is one of the main sources for news consumption, especially
among the younger generation. With the increasing popularity of news
consumption on various social media platforms, there has been a surge of
misinformation which includes false information or unfounded claims. As various
text- and social context-based fake news detectors are proposed to detect
misinformation on social media, recent works start to focus on the
vulnerabilities of fake news detectors. In this paper, we present the first
adversarial attack framework against Graph Neural Network (GNN)-based fake news
detectors to probe their robustness. Specifically, we leverage a multi-agent
reinforcement learning (MARL) framework to simulate the adversarial behavior of
fraudsters on social media. Research has shown that in real-world settings,
fraudsters coordinate with each other to share different news in order to evade
the detection of fake news detectors. Therefore, we modeled our MARL framework
as a Markov Game with bot, cyborg, and crowd worker agents, which have their
own distinctive cost, budget, and influence. We then use deep Q-learning to
search for the optimal policy that maximizes the rewards. Extensive
experimental results on two real-world fake news propagation datasets
demonstrate that our proposed framework can effectively sabotage the GNN-based
fake news detector performance. We hope this paper can provide insights for
future research on fake news detection.
| [
{
"version": "v1",
"created": "Tue, 14 Feb 2023 21:51:56 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Feb 2023 19:05:42 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 19:39:43 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wang",
"Haoran",
""
],
[
"Dou",
"Yingtong",
""
],
[
"Chen",
"Canyu",
""
],
[
"Sun",
"Lichao",
""
],
[
"Yu",
"Philip S.",
""
],
[
"Shu",
"Kai",
""
]
] | TITLE: Attacking Fake News Detectors via Manipulating News Social Engagement
ABSTRACT: Social media is one of the main sources for news consumption, especially
among the younger generation. With the increasing popularity of news
consumption on various social media platforms, there has been a surge of
misinformation which includes false information or unfounded claims. As various
text- and social context-based fake news detectors are proposed to detect
misinformation on social media, recent works start to focus on the
vulnerabilities of fake news detectors. In this paper, we present the first
adversarial attack framework against Graph Neural Network (GNN)-based fake news
detectors to probe their robustness. Specifically, we leverage a multi-agent
reinforcement learning (MARL) framework to simulate the adversarial behavior of
fraudsters on social media. Research has shown that in real-world settings,
fraudsters coordinate with each other to share different news in order to evade
the detection of fake news detectors. Therefore, we modeled our MARL framework
as a Markov Game with bot, cyborg, and crowd worker agents, which have their
own distinctive cost, budget, and influence. We then use deep Q-learning to
search for the optimal policy that maximizes the rewards. Extensive
experimental results on two real-world fake news propagation datasets
demonstrate that our proposed framework can effectively sabotage the GNN-based
fake news detector performance. We hope this paper can provide insights for
future research on fake news detection.
| no_new_dataset | 0.71039 |
2302.11097 | Ming-Liang Zhang | Ming-Liang Zhang, Fei Yin, Cheng-Lin Liu | A Multi-Modal Neural Geometric Solver with Textual Clauses Parsed from
Diagram | Accepted to IJCAI 2023 | null | null | null | cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Geometry problem solving (GPS) is a high-level mathematical reasoning
requiring the capacities of multi-modal fusion and geometric knowledge
application. Recently, neural solvers have shown great potential in GPS but
still be short in diagram presentation and modal fusion. In this work, we
convert diagrams into basic textual clauses to describe diagram features
effectively, and propose a new neural solver called PGPSNet to fuse multi-modal
information efficiently. Combining structural and semantic pre-training, data
augmentation and self-limited decoding, PGPSNet is endowed with rich knowledge
of geometry theorems and geometric representation, and therefore promotes
geometric understanding and reasoning. In addition, to facilitate the research
of GPS, we build a new large-scale and fine-annotated GPS dataset named PGPS9K,
labeled with both fine-grained diagram annotation and interpretable solution
program. Experiments on PGPS9K and an existing dataset Geometry3K validate the
superiority of our method over the state-of-the-art neural solvers. Our code,
dataset and appendix material are available at
\url{https://github.com/mingliangzhang2018/PGPS}.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2023 02:38:25 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 10:04:17 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhang",
"Ming-Liang",
""
],
[
"Yin",
"Fei",
""
],
[
"Liu",
"Cheng-Lin",
""
]
] | TITLE: A Multi-Modal Neural Geometric Solver with Textual Clauses Parsed from
Diagram
ABSTRACT: Geometry problem solving (GPS) is a high-level mathematical reasoning
requiring the capacities of multi-modal fusion and geometric knowledge
application. Recently, neural solvers have shown great potential in GPS but
still be short in diagram presentation and modal fusion. In this work, we
convert diagrams into basic textual clauses to describe diagram features
effectively, and propose a new neural solver called PGPSNet to fuse multi-modal
information efficiently. Combining structural and semantic pre-training, data
augmentation and self-limited decoding, PGPSNet is endowed with rich knowledge
of geometry theorems and geometric representation, and therefore promotes
geometric understanding and reasoning. In addition, to facilitate the research
of GPS, we build a new large-scale and fine-annotated GPS dataset named PGPS9K,
labeled with both fine-grained diagram annotation and interpretable solution
program. Experiments on PGPS9K and an existing dataset Geometry3K validate the
superiority of our method over the state-of-the-art neural solvers. Our code,
dataset and appendix material are available at
\url{https://github.com/mingliangzhang2018/PGPS}.
| new_dataset | 0.713045 |
2303.02133 | Zhujun Li | Zhujun Li and Ioannis Stamos | Depth-based 6DoF Object Pose Estimation using Swin Transformer | 8 pages. We have submitted the paper to The IEEE/RSJ International
Conference on Intelligent Robots and Systems (IROS 2023) on March 1st 2023 | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accurately estimating the 6D pose of objects is crucial for many
applications, such as robotic grasping, autonomous driving, and augmented
reality. However, this task becomes more challenging in poor lighting
conditions or when dealing with textureless objects. To address this issue,
depth images are becoming an increasingly popular choice due to their
invariance to a scene's appearance and the implicit incorporation of essential
geometric characteristics. However, fully leveraging depth information to
improve the performance of pose estimation remains a difficult and
under-investigated problem. To tackle this challenge, we propose a novel
framework called SwinDePose, that uses only geometric information from depth
images to achieve accurate 6D pose estimation. SwinDePose first calculates the
angles between each normal vector defined in a depth image and the three
coordinate axes in the camera coordinate system. The resulting angles are then
formed into an image, which is encoded using Swin Transformer. Additionally, we
apply RandLA-Net to learn the representations from point clouds. The resulting
image and point clouds embeddings are concatenated and fed into a semantic
segmentation module and a 3D keypoints localization module. Finally, we
estimate 6D poses using a least-square fitting approach based on the target
object's predicted semantic mask and 3D keypoints. In experiments on the
LineMod and Occlusion LineMod datasets, SwinDePose outperforms existing
state-of-the-art methods for 6D object pose estimation using depth images. This
demonstrates the effectiveness of our approach and highlights its potential for
improving performance in real-world scenarios. Our code is at
https://github.com/zhujunli1993/SwinDePose.
| [
{
"version": "v1",
"created": "Fri, 3 Mar 2023 18:25:07 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 18:07:40 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Li",
"Zhujun",
""
],
[
"Stamos",
"Ioannis",
""
]
] | TITLE: Depth-based 6DoF Object Pose Estimation using Swin Transformer
ABSTRACT: Accurately estimating the 6D pose of objects is crucial for many
applications, such as robotic grasping, autonomous driving, and augmented
reality. However, this task becomes more challenging in poor lighting
conditions or when dealing with textureless objects. To address this issue,
depth images are becoming an increasingly popular choice due to their
invariance to a scene's appearance and the implicit incorporation of essential
geometric characteristics. However, fully leveraging depth information to
improve the performance of pose estimation remains a difficult and
under-investigated problem. To tackle this challenge, we propose a novel
framework called SwinDePose, that uses only geometric information from depth
images to achieve accurate 6D pose estimation. SwinDePose first calculates the
angles between each normal vector defined in a depth image and the three
coordinate axes in the camera coordinate system. The resulting angles are then
formed into an image, which is encoded using Swin Transformer. Additionally, we
apply RandLA-Net to learn the representations from point clouds. The resulting
image and point clouds embeddings are concatenated and fed into a semantic
segmentation module and a 3D keypoints localization module. Finally, we
estimate 6D poses using a least-square fitting approach based on the target
object's predicted semantic mask and 3D keypoints. In experiments on the
LineMod and Occlusion LineMod datasets, SwinDePose outperforms existing
state-of-the-art methods for 6D object pose estimation using depth images. This
demonstrates the effectiveness of our approach and highlights its potential for
improving performance in real-world scenarios. Our code is at
https://github.com/zhujunli1993/SwinDePose.
| no_new_dataset | 0.708648 |
2303.06880 | Bo Zhang | Bo Zhang, Jiakang Yuan, Botian Shi, Tao Chen, Yikang Li, Yu Qiao | Uni3D: A Unified Baseline for Multi-dataset 3D Object Detection | Accepted by CVPR-2023, and our code is available at
https://github.com/PJLab-ADG/3DTrans | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current 3D object detection models follow a single dataset-specific training
and testing paradigm, which often faces a serious detection accuracy drop when
they are directly deployed in another dataset. In this paper, we study the task
of training a unified 3D detector from multiple datasets. We observe that this
appears to be a challenging task, which is mainly due to that these datasets
present substantial data-level differences and taxonomy-level variations caused
by different LiDAR types and data acquisition standards. Inspired by such
observation, we present a Uni3D which leverages a simple data-level correction
operation and a designed semantic-level coupling-and-recoupling module to
alleviate the unavoidable data-level and taxonomy-level differences,
respectively. Our method is simple and easily combined with many 3D object
detection baselines such as PV-RCNN and Voxel-RCNN, enabling them to
effectively learn from multiple off-the-shelf 3D datasets to obtain more
discriminative and generalizable representations. Experiments are conducted on
many dataset consolidation settings including Waymo-nuScenes, nuScenes-KITTI,
Waymo-KITTI, and Waymo-nuScenes-KITTI consolidations. Their results demonstrate
that Uni3D exceeds a series of individual detectors trained on a single
dataset, with a 1.04x parameter increase over a selected baseline detector. We
expect this work will inspire the research of 3D generalization since it will
push the limits of perceptual performance.
| [
{
"version": "v1",
"created": "Mon, 13 Mar 2023 05:54:13 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 05:25:22 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhang",
"Bo",
""
],
[
"Yuan",
"Jiakang",
""
],
[
"Shi",
"Botian",
""
],
[
"Chen",
"Tao",
""
],
[
"Li",
"Yikang",
""
],
[
"Qiao",
"Yu",
""
]
] | TITLE: Uni3D: A Unified Baseline for Multi-dataset 3D Object Detection
ABSTRACT: Current 3D object detection models follow a single dataset-specific training
and testing paradigm, which often faces a serious detection accuracy drop when
they are directly deployed in another dataset. In this paper, we study the task
of training a unified 3D detector from multiple datasets. We observe that this
appears to be a challenging task, which is mainly due to that these datasets
present substantial data-level differences and taxonomy-level variations caused
by different LiDAR types and data acquisition standards. Inspired by such
observation, we present a Uni3D which leverages a simple data-level correction
operation and a designed semantic-level coupling-and-recoupling module to
alleviate the unavoidable data-level and taxonomy-level differences,
respectively. Our method is simple and easily combined with many 3D object
detection baselines such as PV-RCNN and Voxel-RCNN, enabling them to
effectively learn from multiple off-the-shelf 3D datasets to obtain more
discriminative and generalizable representations. Experiments are conducted on
many dataset consolidation settings including Waymo-nuScenes, nuScenes-KITTI,
Waymo-KITTI, and Waymo-nuScenes-KITTI consolidations. Their results demonstrate
that Uni3D exceeds a series of individual detectors trained on a single
dataset, with a 1.04x parameter increase over a selected baseline detector. We
expect this work will inspire the research of 3D generalization since it will
push the limits of perceptual performance.
| no_new_dataset | 0.709057 |
2303.17610 | Peter Mlakar | Peter Mlakar, Janko Mer\v{s}e, Jana Faganeli Pucer | Ensemble weather forecast post-processing with a flexible probabilistic
neural network approach | null | null | null | null | cs.LG physics.ao-ph | http://creativecommons.org/licenses/by/4.0/ | Ensemble forecast post-processing is a necessary step in producing accurate
probabilistic forecasts. Conventional post-processing methods operate by
estimating the parameters of a parametric distribution, frequently on a
per-location or per-lead-time basis. We propose a novel, neural network-based
method, which produces forecasts for all locations and lead times, jointly. To
relax the distributional assumption of many post-processing methods, our
approach incorporates normalizing flows as flexible parametric distribution
estimators. This enables us to model varying forecast distributions in a
mathematically exact way. We demonstrate the effectiveness of our method in the
context of the EUPPBench benchmark, where we conduct temperature forecast
post-processing for stations in a sub-region of western Europe. We show that
our novel method exhibits state-of-the-art performance on the benchmark,
outclassing our previous, well-performing entry. Additionally, by providing a
detailed comparison of three variants of our novel post-processing method, we
elucidate the reasons why our method outperforms per-lead-time-based approaches
and approaches with distributional assumptions.
| [
{
"version": "v1",
"created": "Wed, 29 Mar 2023 15:18:00 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2023 09:36:18 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 18:34:54 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Mlakar",
"Peter",
""
],
[
"Merše",
"Janko",
""
],
[
"Pucer",
"Jana Faganeli",
""
]
] | TITLE: Ensemble weather forecast post-processing with a flexible probabilistic
neural network approach
ABSTRACT: Ensemble forecast post-processing is a necessary step in producing accurate
probabilistic forecasts. Conventional post-processing methods operate by
estimating the parameters of a parametric distribution, frequently on a
per-location or per-lead-time basis. We propose a novel, neural network-based
method, which produces forecasts for all locations and lead times, jointly. To
relax the distributional assumption of many post-processing methods, our
approach incorporates normalizing flows as flexible parametric distribution
estimators. This enables us to model varying forecast distributions in a
mathematically exact way. We demonstrate the effectiveness of our method in the
context of the EUPPBench benchmark, where we conduct temperature forecast
post-processing for stations in a sub-region of western Europe. We show that
our novel method exhibits state-of-the-art performance on the benchmark,
outclassing our previous, well-performing entry. Additionally, by providing a
detailed comparison of three variants of our novel post-processing method, we
elucidate the reasons why our method outperforms per-lead-time-based approaches
and approaches with distributional assumptions.
| no_new_dataset | 0.708629 |
2304.05351 | Qianqian Xie | Qianqian Xie, Weiguang Han, Yanzhao Lai, Min Peng, Jimin Huang | The Wall Street Neophyte: A Zero-Shot Analysis of ChatGPT Over
MultiModal Stock Movement Prediction Challenges | 13 pages | null | null | null | cs.CL cs.LG q-fin.ST | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, large language models (LLMs) like ChatGPT have demonstrated
remarkable performance across a variety of natural language processing tasks.
However, their effectiveness in the financial domain, specifically in
predicting stock market movements, remains to be explored. In this paper, we
conduct an extensive zero-shot analysis of ChatGPT's capabilities in multimodal
stock movement prediction, on three tweets and historical stock price datasets.
Our findings indicate that ChatGPT is a "Wall Street Neophyte" with limited
success in predicting stock movements, as it underperforms not only
state-of-the-art methods but also traditional methods like linear regression
using price features. Despite the potential of Chain-of-Thought prompting
strategies and the inclusion of tweets, ChatGPT's performance remains subpar.
Furthermore, we observe limitations in its explainability and stability,
suggesting the need for more specialized training or fine-tuning. This research
provides insights into ChatGPT's capabilities and serves as a foundation for
future work aimed at improving financial market analysis and prediction by
leveraging social media sentiment and historical stock data.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2023 04:31:00 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 12:06:43 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Xie",
"Qianqian",
""
],
[
"Han",
"Weiguang",
""
],
[
"Lai",
"Yanzhao",
""
],
[
"Peng",
"Min",
""
],
[
"Huang",
"Jimin",
""
]
] | TITLE: The Wall Street Neophyte: A Zero-Shot Analysis of ChatGPT Over
MultiModal Stock Movement Prediction Challenges
ABSTRACT: Recently, large language models (LLMs) like ChatGPT have demonstrated
remarkable performance across a variety of natural language processing tasks.
However, their effectiveness in the financial domain, specifically in
predicting stock market movements, remains to be explored. In this paper, we
conduct an extensive zero-shot analysis of ChatGPT's capabilities in multimodal
stock movement prediction, on three tweets and historical stock price datasets.
Our findings indicate that ChatGPT is a "Wall Street Neophyte" with limited
success in predicting stock movements, as it underperforms not only
state-of-the-art methods but also traditional methods like linear regression
using price features. Despite the potential of Chain-of-Thought prompting
strategies and the inclusion of tweets, ChatGPT's performance remains subpar.
Furthermore, we observe limitations in its explainability and stability,
suggesting the need for more specialized training or fine-tuning. This research
provides insights into ChatGPT's capabilities and serves as a foundation for
future work aimed at improving financial market analysis and prediction by
leveraging social media sentiment and historical stock data.
| no_new_dataset | 0.708988 |
2304.10254 | Xu Zhang Zhang | Xu Zhang, Xinzheng Niu, Philippe Fournier-Viger, Xudong Dai | Image-text Retrieval via Preserving Main Semantics of Vision | 6 pages, 3 figures, accepted by ICME2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image-text retrieval is one of the major tasks of cross-modal retrieval.
Several approaches for this task map images and texts into a common space to
create correspondences between the two modalities. However, due to the content
(semantics) richness of an image, redundant secondary information in an image
may cause false matches. To address this issue, this paper presents a semantic
optimization approach, implemented as a Visual Semantic Loss (VSL), to assist
the model in focusing on an image's main content. This approach is inspired by
how people typically annotate the content of an image by describing its main
content. Thus, we leverage the annotated texts corresponding to an image to
assist the model in capturing the main content of the image, reducing the
negative impact of secondary content. Extensive experiments on two benchmark
datasets (MSCOCO and Flickr30K) demonstrate the superior performance of our
method. The code is available at: https://github.com/ZhangXu0963/VSL.
| [
{
"version": "v1",
"created": "Thu, 20 Apr 2023 12:23:29 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 08:09:54 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhang",
"Xu",
""
],
[
"Niu",
"Xinzheng",
""
],
[
"Fournier-Viger",
"Philippe",
""
],
[
"Dai",
"Xudong",
""
]
] | TITLE: Image-text Retrieval via Preserving Main Semantics of Vision
ABSTRACT: Image-text retrieval is one of the major tasks of cross-modal retrieval.
Several approaches for this task map images and texts into a common space to
create correspondences between the two modalities. However, due to the content
(semantics) richness of an image, redundant secondary information in an image
may cause false matches. To address this issue, this paper presents a semantic
optimization approach, implemented as a Visual Semantic Loss (VSL), to assist
the model in focusing on an image's main content. This approach is inspired by
how people typically annotate the content of an image by describing its main
content. Thus, we leverage the annotated texts corresponding to an image to
assist the model in capturing the main content of the image, reducing the
negative impact of secondary content. Extensive experiments on two benchmark
datasets (MSCOCO and Flickr30K) demonstrate the superior performance of our
method. The code is available at: https://github.com/ZhangXu0963/VSL.
| no_new_dataset | 0.711844 |
2304.10637 | Iker Garc\'ia-Ferrero | Iker Garc\'ia-Ferrero, Jon Ander Campos, Oscar Sainz, Ander
Salaberria, Dan Roth | IXA/Cogcomp at SemEval-2023 Task 2: Context-enriched Multilingual Named
Entity Recognition using Knowledge Bases | SemEval 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Named Entity Recognition (NER) is a core natural language processing task in
which pre-trained language models have shown remarkable performance. However,
standard benchmarks like CoNLL 2003 do not address many of the challenges that
deployed NER systems face, such as having to classify emerging or complex
entities in a fine-grained way. In this paper we present a novel NER cascade
approach comprising three steps: first, identifying candidate entities in the
input sentence; second, linking the each candidate to an existing knowledge
base; third, predicting the fine-grained category for each entity candidate. We
empirically demonstrate the significance of external knowledge bases in
accurately classifying fine-grained and emerging entities. Our system exhibits
robust performance in the MultiCoNER2 shared task, even in the low-resource
language setting where we leverage knowledge bases of high-resource languages.
| [
{
"version": "v1",
"created": "Thu, 20 Apr 2023 20:30:34 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2023 10:21:20 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 20:51:36 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"García-Ferrero",
"Iker",
""
],
[
"Campos",
"Jon Ander",
""
],
[
"Sainz",
"Oscar",
""
],
[
"Salaberria",
"Ander",
""
],
[
"Roth",
"Dan",
""
]
] | TITLE: IXA/Cogcomp at SemEval-2023 Task 2: Context-enriched Multilingual Named
Entity Recognition using Knowledge Bases
ABSTRACT: Named Entity Recognition (NER) is a core natural language processing task in
which pre-trained language models have shown remarkable performance. However,
standard benchmarks like CoNLL 2003 do not address many of the challenges that
deployed NER systems face, such as having to classify emerging or complex
entities in a fine-grained way. In this paper we present a novel NER cascade
approach comprising three steps: first, identifying candidate entities in the
input sentence; second, linking the each candidate to an existing knowledge
base; third, predicting the fine-grained category for each entity candidate. We
empirically demonstrate the significance of external knowledge bases in
accurately classifying fine-grained and emerging entities. Our system exhibits
robust performance in the MultiCoNER2 shared task, even in the low-resource
language setting where we leverage knowledge bases of high-resource languages.
| no_new_dataset | 0.709585 |
2304.12412 | Arya Rachman | Arya Rachman, J\"urgen Seiler, and Andr\'e Kaup | End-to-End Lidar-Camera Self-Calibration for Autonomous Vehicles | Accepted for The 35th IEEE Intelligent Vehicles Symposium (IV 2023) | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Autonomous vehicles are equipped with a multi-modal sensor setup to enable
the car to drive safely. The initial calibration of such perception sensors is
a highly matured topic and is routinely done in an automated factory
environment. However, an intriguing question arises on how to maintain the
calibration quality throughout the vehicle's operating duration. Another
challenge is to calibrate multiple sensors jointly to ensure no propagation of
systemic errors. In this paper, we propose CaLiCa, an end-to-end deep
self-calibration network which addresses the automatic calibration problem for
pinhole camera and Lidar. We jointly predict the camera intrinsic parameters
(focal length and distortion) as well as Lidar-Camera extrinsic parameters
(rotation and translation), by regressing feature correlation between the
camera image and the Lidar point cloud. The network is arranged in a
Siamese-twin structure to constrain the network features learning to a mutually
shared feature in both point cloud and camera (Lidar-camera constraint).
Evaluation using KITTI datasets shows that we achieve 0.154 {\deg} and 0.059 m
accuracy with a reprojection error of 0.028 pixel with a single-pass inference.
We also provide an ablative study of how our end-to-end learning architecture
offers lower terminal loss (21% decrease in rotation loss) compared to isolated
calibration
| [
{
"version": "v1",
"created": "Mon, 24 Apr 2023 19:44:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 01:12:36 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Rachman",
"Arya",
""
],
[
"Seiler",
"Jürgen",
""
],
[
"Kaup",
"André",
""
]
] | TITLE: End-to-End Lidar-Camera Self-Calibration for Autonomous Vehicles
ABSTRACT: Autonomous vehicles are equipped with a multi-modal sensor setup to enable
the car to drive safely. The initial calibration of such perception sensors is
a highly matured topic and is routinely done in an automated factory
environment. However, an intriguing question arises on how to maintain the
calibration quality throughout the vehicle's operating duration. Another
challenge is to calibrate multiple sensors jointly to ensure no propagation of
systemic errors. In this paper, we propose CaLiCa, an end-to-end deep
self-calibration network which addresses the automatic calibration problem for
pinhole camera and Lidar. We jointly predict the camera intrinsic parameters
(focal length and distortion) as well as Lidar-Camera extrinsic parameters
(rotation and translation), by regressing feature correlation between the
camera image and the Lidar point cloud. The network is arranged in a
Siamese-twin structure to constrain the network features learning to a mutually
shared feature in both point cloud and camera (Lidar-camera constraint).
Evaluation using KITTI datasets shows that we achieve 0.154 {\deg} and 0.059 m
accuracy with a reprojection error of 0.028 pixel with a single-pass inference.
We also provide an ablative study of how our end-to-end learning architecture
offers lower terminal loss (21% decrease in rotation loss) compared to isolated
calibration
| no_new_dataset | 0.711406 |
2304.13902 | Dingzirui Wang | Dingzirui Wang, Longxu Dou, Wanxiang Che | Controllable Data Augmentation for Context-Dependent Text-to-SQL | fix overlap | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | The limited scale of annotated data constraints existing context-dependent
text-to-SQL models because of the complexity of labeling. The data augmentation
method is a commonly used method to solve this problem. However, the data
generated by current augmentation methods often lack diversity. In this paper,
we introduce ConDA, which generates interactive questions and corresponding SQL
results. We designed the SQL dialogue state to enhance the data diversity
through the state transition. Meanwhile, we also present a filter method to
ensure the data quality by a grounding model. Additionally, we utilize a
grounding model to identify and filter low-quality questions that mismatch the
state information. Experimental results on the SParC and CoSQL datasets show
that ConDA boosts the baseline model to achieve an average improvement of
$3.3\%$ on complex questions. Moreover, we analyze the augmented data, which
reveals that the data generated by ConDA are of high quality in both SQL
template hardness and types, turns, and question consistency.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 01:00:10 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 02:45:31 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wang",
"Dingzirui",
""
],
[
"Dou",
"Longxu",
""
],
[
"Che",
"Wanxiang",
""
]
] | TITLE: Controllable Data Augmentation for Context-Dependent Text-to-SQL
ABSTRACT: The limited scale of annotated data constraints existing context-dependent
text-to-SQL models because of the complexity of labeling. The data augmentation
method is a commonly used method to solve this problem. However, the data
generated by current augmentation methods often lack diversity. In this paper,
we introduce ConDA, which generates interactive questions and corresponding SQL
results. We designed the SQL dialogue state to enhance the data diversity
through the state transition. Meanwhile, we also present a filter method to
ensure the data quality by a grounding model. Additionally, we utilize a
grounding model to identify and filter low-quality questions that mismatch the
state information. Experimental results on the SParC and CoSQL datasets show
that ConDA boosts the baseline model to achieve an average improvement of
$3.3\%$ on complex questions. Moreover, we analyze the augmented data, which
reveals that the data generated by ConDA are of high quality in both SQL
template hardness and types, turns, and question consistency.
| no_new_dataset | 0.711055 |
2304.14132 | Pengfei Song | Pengfei Song, Luoyu Mei, Han Cheng | Human Semantic Segmentation using Millimeter-Wave Radar Sparse Point
Clouds | null | null | null | null | cs.CV cs.AI math.GN | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper presents a framework for semantic segmentation on sparse
sequential point clouds of millimeter-wave radar. Compared with cameras and
lidars, millimeter-wave radars have the advantage of not revealing privacy,
having a strong anti-interference ability, and having long detection distance.
The sparsity and capturing temporal-topological features of mmWave data is
still a problem. However, the issue of capturing the temporal-topological
coupling features under the human semantic segmentation task prevents previous
advanced segmentation methods (e.g PointNet, PointCNN, Point Transformer) from
being well utilized in practical scenarios. To address the challenge caused by
the sparsity and temporal-topological feature of the data, we (i) introduce
graph structure and topological features to the point cloud, (ii) propose a
semantic segmentation framework including a global feature-extracting module
and a sequential feature-extracting module. In addition, we design an efficient
and more fitting loss function for a better training process and segmentation
results based on graph clustering. Experimentally, we deploy representative
semantic segmentation algorithms (Transformer, GCNN, etc.) on a custom dataset.
Experimental results indicate that our model achieves mean accuracy on the
custom dataset by $\mathbf{82.31}\%$ and outperforms the state-of-the-art
algorithms. Moreover, to validate the model's robustness, we deploy our model
on the well-known S3DIS dataset. On the S3DIS dataset, our model achieves mean
accuracy by $\mathbf{92.6}\%$, outperforming baseline algorithms.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 12:28:06 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 01:39:05 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Song",
"Pengfei",
""
],
[
"Mei",
"Luoyu",
""
],
[
"Cheng",
"Han",
""
]
] | TITLE: Human Semantic Segmentation using Millimeter-Wave Radar Sparse Point
Clouds
ABSTRACT: This paper presents a framework for semantic segmentation on sparse
sequential point clouds of millimeter-wave radar. Compared with cameras and
lidars, millimeter-wave radars have the advantage of not revealing privacy,
having a strong anti-interference ability, and having long detection distance.
The sparsity and capturing temporal-topological features of mmWave data is
still a problem. However, the issue of capturing the temporal-topological
coupling features under the human semantic segmentation task prevents previous
advanced segmentation methods (e.g PointNet, PointCNN, Point Transformer) from
being well utilized in practical scenarios. To address the challenge caused by
the sparsity and temporal-topological feature of the data, we (i) introduce
graph structure and topological features to the point cloud, (ii) propose a
semantic segmentation framework including a global feature-extracting module
and a sequential feature-extracting module. In addition, we design an efficient
and more fitting loss function for a better training process and segmentation
results based on graph clustering. Experimentally, we deploy representative
semantic segmentation algorithms (Transformer, GCNN, etc.) on a custom dataset.
Experimental results indicate that our model achieves mean accuracy on the
custom dataset by $\mathbf{82.31}\%$ and outperforms the state-of-the-art
algorithms. Moreover, to validate the model's robustness, we deploy our model
on the well-known S3DIS dataset. On the S3DIS dataset, our model achieves mean
accuracy by $\mathbf{92.6}\%$, outperforming baseline algorithms.
| no_new_dataset | 0.712414 |
2304.14412 | Emilien Valat | Emilien Valat, Loth Valat | HandCT: hands-on computational dataset for X-Ray Computed Tomography and
Machine-Learning | null | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | Machine-learning methods rely on sufficiently large dataset to learn data
distributions. They are widely used in research in X-Ray Computed Tomography,
from low-dose scan denoising to optimisation of the reconstruction process. The
lack of datasets prevents the scalability of these methods to realistic 3D
problems. We develop a 3D procedural dataset in order to produce samples for
data-driven algorithms. It is made of a meshed model of a left hand and a
script to randomly change its anatomic properties and pose whilst conserving
realistic features. This open-source solution relies on the freeware Blender
and its Python core. Blender handles the modelling, the mesh and the generation
of the hand's pose, whilst Python processes file format conversion from obj
file to matrix and functions to scale and center the volume for further
processing. Dataset availability and quality drives research in
machine-learning. We design a dataset that weighs few megabytes, provides
truthful samples and proposes continuous enhancements using version control. We
anticipate this work to be a starting point for anatomically accurate
procedural datasets. For instance, by adding more internal features and fine
tuning their X-Ray attenuation properties.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2023 13:26:28 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Valat",
"Emilien",
""
],
[
"Valat",
"Loth",
""
]
] | TITLE: HandCT: hands-on computational dataset for X-Ray Computed Tomography and
Machine-Learning
ABSTRACT: Machine-learning methods rely on sufficiently large dataset to learn data
distributions. They are widely used in research in X-Ray Computed Tomography,
from low-dose scan denoising to optimisation of the reconstruction process. The
lack of datasets prevents the scalability of these methods to realistic 3D
problems. We develop a 3D procedural dataset in order to produce samples for
data-driven algorithms. It is made of a meshed model of a left hand and a
script to randomly change its anatomic properties and pose whilst conserving
realistic features. This open-source solution relies on the freeware Blender
and its Python core. Blender handles the modelling, the mesh and the generation
of the hand's pose, whilst Python processes file format conversion from obj
file to matrix and functions to scale and center the volume for further
processing. Dataset availability and quality drives research in
machine-learning. We design a dataset that weighs few megabytes, provides
truthful samples and proposes continuous enhancements using version control. We
anticipate this work to be a starting point for anatomically accurate
procedural datasets. For instance, by adding more internal features and fine
tuning their X-Ray attenuation properties.
| new_dataset | 0.718786 |
2304.14447 | Tu Nguyen Anh | Nguyen Anh Tu, Hoang Thi Thu Uyen, Tu Minh Phuong, Ngo Xuan Bach | Analyzing Vietnamese Legal Questions Using Deep Neural Networks with
Biaffine Classifiers | accepted as the oral presentation at ICONIP 2021 | null | 10.1007/978-3-030-92270-2_44 | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | In this paper, we propose using deep neural networks to extract important
information from Vietnamese legal questions, a fundamental task towards
building a question answering system in the legal domain. Given a legal
question in natural language, the goal is to extract all the segments that
contain the needed information to answer the question. We introduce a deep
model that solves the task in three stages. First, our model leverages recent
advanced autoencoding language models to produce contextual word embeddings,
which are then combined with character-level and POS-tag information to form
word representations. Next, bidirectional long short-term memory networks are
employed to capture the relations among words and generate sentence-level
representations. At the third stage, borrowing ideas from graph-based
dependency parsing methods which provide a global view on the input sentence,
we use biaffine classifiers to estimate the probability of each pair of
start-end words to be an important segment. Experimental results on a public
Vietnamese legal dataset show that our model outperforms the previous work by a
large margin, achieving 94.79% in the F1 score. The results also prove the
effectiveness of using contextual features extracted from pre-trained language
models combined with other types of features such as character-level and
POS-tag features when training on a limited dataset.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 18:19:24 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Tu",
"Nguyen Anh",
""
],
[
"Uyen",
"Hoang Thi Thu",
""
],
[
"Phuong",
"Tu Minh",
""
],
[
"Bach",
"Ngo Xuan",
""
]
] | TITLE: Analyzing Vietnamese Legal Questions Using Deep Neural Networks with
Biaffine Classifiers
ABSTRACT: In this paper, we propose using deep neural networks to extract important
information from Vietnamese legal questions, a fundamental task towards
building a question answering system in the legal domain. Given a legal
question in natural language, the goal is to extract all the segments that
contain the needed information to answer the question. We introduce a deep
model that solves the task in three stages. First, our model leverages recent
advanced autoencoding language models to produce contextual word embeddings,
which are then combined with character-level and POS-tag information to form
word representations. Next, bidirectional long short-term memory networks are
employed to capture the relations among words and generate sentence-level
representations. At the third stage, borrowing ideas from graph-based
dependency parsing methods which provide a global view on the input sentence,
we use biaffine classifiers to estimate the probability of each pair of
start-end words to be an important segment. Experimental results on a public
Vietnamese legal dataset show that our model outperforms the previous work by a
large margin, achieving 94.79% in the F1 score. The results also prove the
effectiveness of using contextual features extracted from pre-trained language
models combined with other types of features such as character-level and
POS-tag features when training on a limited dataset.
| no_new_dataset | 0.710641 |
2304.14462 | Hamam Mokayed Dr | Hamam Mokayed and Palaiahnakote Shivakumara and Lama Alkhaled and
Rajkumar Saini and Muhammad Zeshan Afzal and Yan Chai Hum and Marcus Liwicki | Robust and Fast Vehicle Detection using Augmented Confidence Map | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Vehicle detection in real-time scenarios is challenging because of the time
constraints and the presence of multiple types of vehicles with different
speeds, shapes, structures, etc. This paper presents a new method relied on
generating a confidence map-for robust and faster vehicle detection. To reduce
the adverse effect of different speeds, shapes, structures, and the presence of
several vehicles in a single image, we introduce the concept of augmentation
which highlights the region of interest containing the vehicles. The augmented
map is generated by exploring the combination of multiresolution analysis and
maximally stable extremal regions (MR-MSER). The output of MR-MSER is supplied
to fast CNN to generate a confidence map, which results in candidate regions.
Furthermore, unlike existing models that implement complicated models for
vehicle detection, we explore the combination of a rough set and fuzzy-based
models for robust vehicle detection. To show the effectiveness of the proposed
method, we conduct experiments on our dataset captured by drones and on several
vehicle detection benchmark datasets, namely, KITTI and UA-DETRAC. The results
on our dataset and the benchmark datasets show that the proposed method
outperforms the existing methods in terms of time efficiency and achieves a
good detection rate.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 18:41:16 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Mokayed",
"Hamam",
""
],
[
"Shivakumara",
"Palaiahnakote",
""
],
[
"Alkhaled",
"Lama",
""
],
[
"Saini",
"Rajkumar",
""
],
[
"Afzal",
"Muhammad Zeshan",
""
],
[
"Hum",
"Yan Chai",
""
],
[
"Liwicki",
"Marcus",
""
]
] | TITLE: Robust and Fast Vehicle Detection using Augmented Confidence Map
ABSTRACT: Vehicle detection in real-time scenarios is challenging because of the time
constraints and the presence of multiple types of vehicles with different
speeds, shapes, structures, etc. This paper presents a new method relied on
generating a confidence map-for robust and faster vehicle detection. To reduce
the adverse effect of different speeds, shapes, structures, and the presence of
several vehicles in a single image, we introduce the concept of augmentation
which highlights the region of interest containing the vehicles. The augmented
map is generated by exploring the combination of multiresolution analysis and
maximally stable extremal regions (MR-MSER). The output of MR-MSER is supplied
to fast CNN to generate a confidence map, which results in candidate regions.
Furthermore, unlike existing models that implement complicated models for
vehicle detection, we explore the combination of a rough set and fuzzy-based
models for robust vehicle detection. To show the effectiveness of the proposed
method, we conduct experiments on our dataset captured by drones and on several
vehicle detection benchmark datasets, namely, KITTI and UA-DETRAC. The results
on our dataset and the benchmark datasets show that the proposed method
outperforms the existing methods in terms of time efficiency and achieves a
good detection rate.
| new_dataset | 0.503418 |
2304.14466 | Hamam Mokayed Dr | Hamam Mokayed and Amirhossein Nayebiastaneh and Kanjar De and Stergios
Sozos and Olle Hagner and Bjorn Backe | Nordic Vehicle Dataset (NVD): Performance of vehicle detectors using
newly captured NVD from UAV in different snowy weather conditions | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Vehicle detection and recognition in drone images is a complex problem that
has been used for different safety purposes. The main challenge of these images
is captured at oblique angles and poses several challenges like non-uniform
illumination effect, degradations, blur, occlusion, loss of visibility, etc.
Additionally, weather conditions play a crucial role in causing safety concerns
and add another high level of challenge to the collected data. Over the past
few decades, various techniques have been employed to detect and track vehicles
in different weather conditions. However, detecting vehicles in heavy snow is
still in the early stages because of a lack of available data. Furthermore,
there has been no research on detecting vehicles in snowy weather using real
images captured by unmanned aerial vehicles (UAVs). This study aims to address
this gap by providing the scientific community with data on vehicles captured
by UAVs in different settings and under various snow cover conditions in the
Nordic region. The data covers different adverse weather conditions like
overcast with snowfall, low light and low contrast conditions with patchy snow
cover, high brightness, sunlight, fresh snow, and the temperature reaching far
below -0 degrees Celsius. The study also evaluates the performance of commonly
used object detection methods such as Yolo v8, Yolo v5, and fast RCNN.
Additionally, data augmentation techniques are explored, and those that enhance
the detectors' performance in such scenarios are proposed. The code and the
dataset will be available at https://nvd.ltu-ai.dev
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 18:55:43 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Mokayed",
"Hamam",
""
],
[
"Nayebiastaneh",
"Amirhossein",
""
],
[
"De",
"Kanjar",
""
],
[
"Sozos",
"Stergios",
""
],
[
"Hagner",
"Olle",
""
],
[
"Backe",
"Bjorn",
""
]
] | TITLE: Nordic Vehicle Dataset (NVD): Performance of vehicle detectors using
newly captured NVD from UAV in different snowy weather conditions
ABSTRACT: Vehicle detection and recognition in drone images is a complex problem that
has been used for different safety purposes. The main challenge of these images
is captured at oblique angles and poses several challenges like non-uniform
illumination effect, degradations, blur, occlusion, loss of visibility, etc.
Additionally, weather conditions play a crucial role in causing safety concerns
and add another high level of challenge to the collected data. Over the past
few decades, various techniques have been employed to detect and track vehicles
in different weather conditions. However, detecting vehicles in heavy snow is
still in the early stages because of a lack of available data. Furthermore,
there has been no research on detecting vehicles in snowy weather using real
images captured by unmanned aerial vehicles (UAVs). This study aims to address
this gap by providing the scientific community with data on vehicles captured
by UAVs in different settings and under various snow cover conditions in the
Nordic region. The data covers different adverse weather conditions like
overcast with snowfall, low light and low contrast conditions with patchy snow
cover, high brightness, sunlight, fresh snow, and the temperature reaching far
below -0 degrees Celsius. The study also evaluates the performance of commonly
used object detection methods such as Yolo v8, Yolo v5, and fast RCNN.
Additionally, data augmentation techniques are explored, and those that enhance
the detectors' performance in such scenarios are proposed. The code and the
dataset will be available at https://nvd.ltu-ai.dev
| no_new_dataset | 0.655557 |
2304.14475 | Zhuofeng Wu | Jiazhao Li, Yijin Yang, Zhuofeng Wu, V.G. Vinod Vydiswaran, Chaowei
Xiao | ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox
Generative Model Trigger | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Textual backdoor attacks pose a practical threat to existing systems, as they
can compromise the model by inserting imperceptible triggers into inputs and
manipulating labels in the training dataset. With cutting-edge generative
models such as GPT-4 pushing rewriting to extraordinary levels, such attacks
are becoming even harder to detect. We conduct a comprehensive investigation of
the role of black-box generative models as a backdoor attack tool, highlighting
the importance of researching relative defense strategies. In this paper, we
reveal that the proposed generative model-based attack, BGMAttack, could
effectively deceive textual classifiers. Compared with the traditional attack
methods, BGMAttack makes the backdoor trigger less conspicuous by leveraging
state-of-the-art generative models. Our extensive evaluation of attack
effectiveness across five datasets, complemented by three distinct human
cognition assessments, reveals that Figure 4 achieves comparable attack
performance while maintaining superior stealthiness relative to baseline
methods.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 19:26:25 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Li",
"Jiazhao",
""
],
[
"Yang",
"Yijin",
""
],
[
"Wu",
"Zhuofeng",
""
],
[
"Vydiswaran",
"V. G. Vinod",
""
],
[
"Xiao",
"Chaowei",
""
]
] | TITLE: ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox
Generative Model Trigger
ABSTRACT: Textual backdoor attacks pose a practical threat to existing systems, as they
can compromise the model by inserting imperceptible triggers into inputs and
manipulating labels in the training dataset. With cutting-edge generative
models such as GPT-4 pushing rewriting to extraordinary levels, such attacks
are becoming even harder to detect. We conduct a comprehensive investigation of
the role of black-box generative models as a backdoor attack tool, highlighting
the importance of researching relative defense strategies. In this paper, we
reveal that the proposed generative model-based attack, BGMAttack, could
effectively deceive textual classifiers. Compared with the traditional attack
methods, BGMAttack makes the backdoor trigger less conspicuous by leveraging
state-of-the-art generative models. Our extensive evaluation of attack
effectiveness across five datasets, complemented by three distinct human
cognition assessments, reveals that Figure 4 achieves comparable attack
performance while maintaining superior stealthiness relative to baseline
methods.
| no_new_dataset | 0.70825 |
2304.14483 | Muhammad Umer | Muhammad Umer and Robi Polikar | Adversary Aware Continual Learning | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Class incremental learning approaches are useful as they help the model to
learn new information (classes) sequentially, while also retaining the
previously acquired information (classes). However, it has been shown that such
approaches are extremely vulnerable to the adversarial backdoor attacks, where
an intelligent adversary can introduce small amount of misinformation to the
model in the form of imperceptible backdoor pattern during training to cause
deliberate forgetting of a specific task or class at test time. In this work,
we propose a novel defensive framework to counter such an insidious attack
where, we use the attacker's primary strength-hiding the backdoor pattern by
making it imperceptible to humans-against it, and propose to learn a
perceptible (stronger) pattern (also during the training) that can overpower
the attacker's imperceptible (weaker) pattern. We demonstrate the effectiveness
of the proposed defensive mechanism through various commonly used Replay-based
(both generative and exact replay-based) class incremental learning algorithms
using continual learning benchmark variants of CIFAR-10, CIFAR-100, and MNIST
datasets. Most noteworthy, our proposed defensive framework does not assume
that the attacker's target task and target class is known to the defender. The
defender is also unaware of the shape, size, and location of the attacker's
pattern. We show that our proposed defensive framework considerably improves
the performance of class incremental learning algorithms with no knowledge of
the attacker's target task, attacker's target class, and attacker's
imperceptible pattern. We term our defensive framework as Adversary Aware
Continual Learning (AACL).
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 19:49:50 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Umer",
"Muhammad",
""
],
[
"Polikar",
"Robi",
""
]
] | TITLE: Adversary Aware Continual Learning
ABSTRACT: Class incremental learning approaches are useful as they help the model to
learn new information (classes) sequentially, while also retaining the
previously acquired information (classes). However, it has been shown that such
approaches are extremely vulnerable to the adversarial backdoor attacks, where
an intelligent adversary can introduce small amount of misinformation to the
model in the form of imperceptible backdoor pattern during training to cause
deliberate forgetting of a specific task or class at test time. In this work,
we propose a novel defensive framework to counter such an insidious attack
where, we use the attacker's primary strength-hiding the backdoor pattern by
making it imperceptible to humans-against it, and propose to learn a
perceptible (stronger) pattern (also during the training) that can overpower
the attacker's imperceptible (weaker) pattern. We demonstrate the effectiveness
of the proposed defensive mechanism through various commonly used Replay-based
(both generative and exact replay-based) class incremental learning algorithms
using continual learning benchmark variants of CIFAR-10, CIFAR-100, and MNIST
datasets. Most noteworthy, our proposed defensive framework does not assume
that the attacker's target task and target class is known to the defender. The
defender is also unaware of the shape, size, and location of the attacker's
pattern. We show that our proposed defensive framework considerably improves
the performance of class incremental learning algorithms with no knowledge of
the attacker's target task, attacker's target class, and attacker's
imperceptible pattern. We term our defensive framework as Adversary Aware
Continual Learning (AACL).
| no_new_dataset | 0.707234 |
2304.14499 | Bala Murugan MS | Sheryl Mathew, Annapoorani Subramanian, Pooja, Balamurugan MS, Manoj
Kumar Rajagopal | Human activity recognition using deep learning approaches and single
frame cnn and convolutional lstm | Sixteen pages and five figures | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human activity recognition is one of the most important tasks in computer
vision and has proved useful in different fields such as healthcare, sports
training and security. There are a number of approaches that have been explored
to solve this task, some of them involving sensor data, and some involving
video data. In this paper, we aim to explore two deep learning-based
approaches, namely single frame Convolutional Neural Networks (CNNs) and
convolutional Long Short-Term Memory to recognise human actions from videos.
Using a convolutional neural networks-based method is advantageous as CNNs can
extract features automatically and Long Short-Term Memory networks are great
when it comes to working on sequence data such as video. The two models were
trained and evaluated on a benchmark action recognition dataset, UCF50, and
another dataset that was created for the experimentation. Though both models
exhibit good accuracies, the single frame CNN model outperforms the
Convolutional LSTM model by having an accuracy of 99.8% with the UCF50 dataset.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2023 01:33:29 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Mathew",
"Sheryl",
""
],
[
"Subramanian",
"Annapoorani",
""
],
[
"Pooja",
"",
""
],
[
"MS",
"Balamurugan",
""
],
[
"Rajagopal",
"Manoj Kumar",
""
]
] | TITLE: Human activity recognition using deep learning approaches and single
frame cnn and convolutional lstm
ABSTRACT: Human activity recognition is one of the most important tasks in computer
vision and has proved useful in different fields such as healthcare, sports
training and security. There are a number of approaches that have been explored
to solve this task, some of them involving sensor data, and some involving
video data. In this paper, we aim to explore two deep learning-based
approaches, namely single frame Convolutional Neural Networks (CNNs) and
convolutional Long Short-Term Memory to recognise human actions from videos.
Using a convolutional neural networks-based method is advantageous as CNNs can
extract features automatically and Long Short-Term Memory networks are great
when it comes to working on sequence data such as video. The two models were
trained and evaluated on a benchmark action recognition dataset, UCF50, and
another dataset that was created for the experimentation. Though both models
exhibit good accuracies, the single frame CNN model outperforms the
Convolutional LSTM model by having an accuracy of 99.8% with the UCF50 dataset.
| new_dataset | 0.714815 |
2304.14501 | Jiafei Duan | Jiafei Duan, Samson Yu, Nicholas Tan, Yi Ru Wang, Cheston Tan | Read My Mind: A Multi-Modal Dataset for Human Belief Prediction | Accepted to ICRA 2023 Communicating Robot Learning Across Human-Robot
Interaction Workshop | null | null | null | cs.CV cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding human intentions is key to enabling effective and efficient
human-robot interaction (HRI) in collaborative settings. To enable developments
and evaluation of the ability of artificial intelligence (AI) systems to infer
human beliefs, we introduce a large-scale multi-modal video dataset for intent
prediction based on object-context relations.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2023 06:19:38 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Duan",
"Jiafei",
""
],
[
"Yu",
"Samson",
""
],
[
"Tan",
"Nicholas",
""
],
[
"Wang",
"Yi Ru",
""
],
[
"Tan",
"Cheston",
""
]
] | TITLE: Read My Mind: A Multi-Modal Dataset for Human Belief Prediction
ABSTRACT: Understanding human intentions is key to enabling effective and efficient
human-robot interaction (HRI) in collaborative settings. To enable developments
and evaluation of the ability of artificial intelligence (AI) systems to infer
human beliefs, we introduce a large-scale multi-modal video dataset for intent
prediction based on object-context relations.
| new_dataset | 0.713382 |
2304.14504 | Mounika Vanamala | Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave | Hybrid Deepfake Detection Utilizing MLP and LSTM | 5 Pages | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | The growing reliance of society on social media for authentic information has
done nothing but increase over the past years. This has only raised the
potential consequences of the spread of misinformation. One of the growing
methods in popularity is to deceive users using a deepfake. A deepfake is an
invention that has come with the latest technological advancements, which
enables nefarious online users to replace their face with a computer generated,
synthetic face of numerous powerful members of society. Deepfake images and
videos now provide the means to mimic important political and cultural figures
to spread massive amounts of false information. Models that can detect these
deepfakes to prevent the spread of misinformation are now of tremendous
necessity. In this paper, we propose a new deepfake detection schema utilizing
two deep learning algorithms: long short term memory and multilayer perceptron.
We evaluate our model using a publicly available dataset named 140k Real and
Fake Faces to detect images altered by a deepfake with accuracies achieved as
high as 74.7%
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2023 16:38:26 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Mallet",
"Jacob",
""
],
[
"Krueger",
"Natalie",
""
],
[
"Vanamala",
"Mounika",
""
],
[
"Dave",
"Rushit",
""
]
] | TITLE: Hybrid Deepfake Detection Utilizing MLP and LSTM
ABSTRACT: The growing reliance of society on social media for authentic information has
done nothing but increase over the past years. This has only raised the
potential consequences of the spread of misinformation. One of the growing
methods in popularity is to deceive users using a deepfake. A deepfake is an
invention that has come with the latest technological advancements, which
enables nefarious online users to replace their face with a computer generated,
synthetic face of numerous powerful members of society. Deepfake images and
videos now provide the means to mimic important political and cultural figures
to spread massive amounts of false information. Models that can detect these
deepfakes to prevent the spread of misinformation are now of tremendous
necessity. In this paper, we propose a new deepfake detection schema utilizing
two deep learning algorithms: long short term memory and multilayer perceptron.
We evaluate our model using a publicly available dataset named 140k Real and
Fake Faces to detect images altered by a deepfake with accuracies achieved as
high as 74.7%
| no_new_dataset | 0.699421 |
2304.14508 | Rui Nian | Rui Nian, Guoyao Zhang, Yao Sui, Yuqi Qian, Qiuying Li, Mingzhang
Zhao, Jianhui Li, Ali Gholipour, and Simon K. Warfield | 3D Brainformer: 3D Fusion Transformer for Brain Tumor Segmentation | 10 pages, 4 figures | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Magnetic resonance imaging (MRI) is critically important for brain mapping in
both scientific research and clinical studies. Precise segmentation of brain
tumors facilitates clinical diagnosis, evaluations, and surgical planning. Deep
learning has recently emerged to improve brain tumor segmentation and achieved
impressive results. Convolutional architectures are widely used to implement
those neural networks. By the nature of limited receptive fields, however,
those architectures are subject to representing long-range spatial dependencies
of the voxel intensities in MRI images. Transformers have been leveraged
recently to address the above limitations of convolutional networks.
Unfortunately, the majority of current Transformers-based methods in
segmentation are performed with 2D MRI slices, instead of 3D volumes. Moreover,
it is difficult to incorporate the structures between layers because each head
is calculated independently in the Multi-Head Self-Attention mechanism (MHSA).
In this work, we proposed a 3D Transformer-based segmentation approach. We
developed a Fusion-Head Self-Attention mechanism (FHSA) to combine each
attention head through attention logic and weight mapping, for the exploration
of the long-range spatial dependencies in 3D MRI images. We implemented a
plug-and-play self-attention module, named the Infinite Deformable Fusion
Transformer Module (IDFTM), to extract features on any deformable feature maps.
We applied our approach to the task of brain tumor segmentation, and assessed
it on the public BRATS datasets. The experimental results demonstrated that our
proposed approach achieved superior performance, in comparison to several
state-of-the-art segmentation methods.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 02:11:29 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Nian",
"Rui",
""
],
[
"Zhang",
"Guoyao",
""
],
[
"Sui",
"Yao",
""
],
[
"Qian",
"Yuqi",
""
],
[
"Li",
"Qiuying",
""
],
[
"Zhao",
"Mingzhang",
""
],
[
"Li",
"Jianhui",
""
],
[
"Gholipour",
"Ali",
""
],
[
"Warfield",
"Simon K.",
""
]
] | TITLE: 3D Brainformer: 3D Fusion Transformer for Brain Tumor Segmentation
ABSTRACT: Magnetic resonance imaging (MRI) is critically important for brain mapping in
both scientific research and clinical studies. Precise segmentation of brain
tumors facilitates clinical diagnosis, evaluations, and surgical planning. Deep
learning has recently emerged to improve brain tumor segmentation and achieved
impressive results. Convolutional architectures are widely used to implement
those neural networks. By the nature of limited receptive fields, however,
those architectures are subject to representing long-range spatial dependencies
of the voxel intensities in MRI images. Transformers have been leveraged
recently to address the above limitations of convolutional networks.
Unfortunately, the majority of current Transformers-based methods in
segmentation are performed with 2D MRI slices, instead of 3D volumes. Moreover,
it is difficult to incorporate the structures between layers because each head
is calculated independently in the Multi-Head Self-Attention mechanism (MHSA).
In this work, we proposed a 3D Transformer-based segmentation approach. We
developed a Fusion-Head Self-Attention mechanism (FHSA) to combine each
attention head through attention logic and weight mapping, for the exploration
of the long-range spatial dependencies in 3D MRI images. We implemented a
plug-and-play self-attention module, named the Infinite Deformable Fusion
Transformer Module (IDFTM), to extract features on any deformable feature maps.
We applied our approach to the task of brain tumor segmentation, and assessed
it on the public BRATS datasets. The experimental results demonstrated that our
proposed approach achieved superior performance, in comparison to several
state-of-the-art segmentation methods.
| no_new_dataset | 0.71222 |
2304.14509 | Rudresh Dwivedi | Rudresh Dwivedi, Ritesh Kumar, Deepak Chopra, Pranay Kothari, Manjot
Singh | An Efficient Ensemble Explainable AI (XAI) Approach for Morphed Face
Detection | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The extensive utilization of biometric authentication systems have emanated
attackers / imposters to forge user identity based on morphed images. In this
attack, a synthetic image is produced and merged with genuine. Next, the
resultant image is user for authentication. Numerous deep neural convolutional
architectures have been proposed in literature for face Morphing Attack
Detection (MADs) to prevent such attacks and lessen the risks associated with
them. Although, deep learning models achieved optimal results in terms of
performance, it is difficult to understand and analyse these networks since
they are black box/opaque in nature. As a consequence, incorrect judgments may
be made. There is, however, a dearth of literature that explains
decision-making methods of black box deep learning models for biometric
Presentation Attack Detection (PADs) or MADs that can aid the biometric
community to have trust in deep learning-based biometric systems for
identification and authentication in various security applications such as
border control, criminal database establishment etc. In this work, we present a
novel visual explanation approach named Ensemble XAI integrating Saliency maps,
Class Activation Maps (CAM) and Gradient-CAM (Grad-CAM) to provide a more
comprehensive visual explanation for a deep learning prognostic model
(EfficientNet-B1) that we have employed to predict whether the input presented
to a biometric authentication system is morphed or genuine. The
experimentations have been performed on three publicly available datasets
namely Face Research Lab London Set, Wide Multi-Channel Presentation Attack
(WMCA), and Makeup Induced Face Spoofing (MIFS). The experimental evaluations
affirms that the resultant visual explanations highlight more fine-grained
details of image features/areas focused by EfficientNet-B1 to reach decisions
along with appropriate reasoning.
| [
{
"version": "v1",
"created": "Sun, 23 Apr 2023 13:43:06 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Dwivedi",
"Rudresh",
""
],
[
"Kumar",
"Ritesh",
""
],
[
"Chopra",
"Deepak",
""
],
[
"Kothari",
"Pranay",
""
],
[
"Singh",
"Manjot",
""
]
] | TITLE: An Efficient Ensemble Explainable AI (XAI) Approach for Morphed Face
Detection
ABSTRACT: The extensive utilization of biometric authentication systems have emanated
attackers / imposters to forge user identity based on morphed images. In this
attack, a synthetic image is produced and merged with genuine. Next, the
resultant image is user for authentication. Numerous deep neural convolutional
architectures have been proposed in literature for face Morphing Attack
Detection (MADs) to prevent such attacks and lessen the risks associated with
them. Although, deep learning models achieved optimal results in terms of
performance, it is difficult to understand and analyse these networks since
they are black box/opaque in nature. As a consequence, incorrect judgments may
be made. There is, however, a dearth of literature that explains
decision-making methods of black box deep learning models for biometric
Presentation Attack Detection (PADs) or MADs that can aid the biometric
community to have trust in deep learning-based biometric systems for
identification and authentication in various security applications such as
border control, criminal database establishment etc. In this work, we present a
novel visual explanation approach named Ensemble XAI integrating Saliency maps,
Class Activation Maps (CAM) and Gradient-CAM (Grad-CAM) to provide a more
comprehensive visual explanation for a deep learning prognostic model
(EfficientNet-B1) that we have employed to predict whether the input presented
to a biometric authentication system is morphed or genuine. The
experimentations have been performed on three publicly available datasets
namely Face Research Lab London Set, Wide Multi-Channel Presentation Attack
(WMCA), and Makeup Induced Face Spoofing (MIFS). The experimental evaluations
affirms that the resultant visual explanations highlight more fine-grained
details of image features/areas focused by EfficientNet-B1 to reach decisions
along with appropriate reasoning.
| no_new_dataset | 0.712589 |
2304.14522 | Hamed Zamani | Hamed Zamani and Michael Bendersky | Multivariate Representation Learning for Information Retrieval | Accepted for publication at SIGIR 2023 | null | null | null | cs.IR cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Dense retrieval models use bi-encoder network architectures for learning
query and document representations. These representations are often in the form
of a vector representation and their similarities are often computed using the
dot product function. In this paper, we propose a new representation learning
framework for dense retrieval. Instead of learning a vector for each query and
document, our framework learns a multivariate distribution and uses negative
multivariate KL divergence to compute the similarity between distributions. For
simplicity and efficiency reasons, we assume that the distributions are
multivariate normals and then train large language models to produce mean and
variance vectors for these distributions. We provide a theoretical foundation
for the proposed framework and show that it can be seamlessly integrated into
the existing approximate nearest neighbor algorithms to perform retrieval
efficiently. We conduct an extensive suite of experiments on a wide range of
datasets, and demonstrate significant improvements compared to competitive
dense retrieval models.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 20:30:46 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zamani",
"Hamed",
""
],
[
"Bendersky",
"Michael",
""
]
] | TITLE: Multivariate Representation Learning for Information Retrieval
ABSTRACT: Dense retrieval models use bi-encoder network architectures for learning
query and document representations. These representations are often in the form
of a vector representation and their similarities are often computed using the
dot product function. In this paper, we propose a new representation learning
framework for dense retrieval. Instead of learning a vector for each query and
document, our framework learns a multivariate distribution and uses negative
multivariate KL divergence to compute the similarity between distributions. For
simplicity and efficiency reasons, we assume that the distributions are
multivariate normals and then train large language models to produce mean and
variance vectors for these distributions. We provide a theoretical foundation
for the proposed framework and show that it can be seamlessly integrated into
the existing approximate nearest neighbor algorithms to perform retrieval
efficiently. We conduct an extensive suite of experiments on a wide range of
datasets, and demonstrate significant improvements compared to competitive
dense retrieval models.
| no_new_dataset | 0.709435 |
2304.14571 | Yousef Yeganeh | Yousef Yeganeh, Azade Farshad, Peter Weinberger, Seyed-Ahmad Ahmadi,
Ehsan Adeli, Nassir Navab | DIAMANT: Dual Image-Attention Map Encoders For Medical Image
Segmentation | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although purely transformer-based architectures showed promising performance
in many computer vision tasks, many hybrid models consisting of CNN and
transformer blocks are introduced to fit more specialized tasks. Nevertheless,
despite the performance gain of both pure and hybrid transformer-based
architectures compared to CNNs in medical imaging segmentation, their high
training cost and complexity make it challenging to use them in real scenarios.
In this work, we propose simple architectures based on purely convolutional
layers, and show that by just taking advantage of the attention map
visualizations obtained from a self-supervised pretrained vision transformer
network (e.g., DINO) one can outperform complex transformer-based networks with
much less computation costs. The proposed architecture is composed of two
encoder branches with the original image as input in one branch and the
attention map visualizations of the same image from multiple self-attention
heads from a pre-trained DINO model (as multiple channels) in the other branch.
The results of our experiments on two publicly available medical imaging
datasets show that the proposed pipeline outperforms U-Net and the
state-of-the-art medical image segmentation models.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 00:11:18 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Yeganeh",
"Yousef",
""
],
[
"Farshad",
"Azade",
""
],
[
"Weinberger",
"Peter",
""
],
[
"Ahmadi",
"Seyed-Ahmad",
""
],
[
"Adeli",
"Ehsan",
""
],
[
"Navab",
"Nassir",
""
]
] | TITLE: DIAMANT: Dual Image-Attention Map Encoders For Medical Image
Segmentation
ABSTRACT: Although purely transformer-based architectures showed promising performance
in many computer vision tasks, many hybrid models consisting of CNN and
transformer blocks are introduced to fit more specialized tasks. Nevertheless,
despite the performance gain of both pure and hybrid transformer-based
architectures compared to CNNs in medical imaging segmentation, their high
training cost and complexity make it challenging to use them in real scenarios.
In this work, we propose simple architectures based on purely convolutional
layers, and show that by just taking advantage of the attention map
visualizations obtained from a self-supervised pretrained vision transformer
network (e.g., DINO) one can outperform complex transformer-based networks with
much less computation costs. The proposed architecture is composed of two
encoder branches with the original image as input in one branch and the
attention map visualizations of the same image from multiple self-attention
heads from a pre-trained DINO model (as multiple channels) in the other branch.
The results of our experiments on two publicly available medical imaging
datasets show that the proposed pipeline outperforms U-Net and the
state-of-the-art medical image segmentation models.
| no_new_dataset | 0.71027 |
2304.14572 | Yousef Yeganeh | Yousef Yeganeh, Azade Farshad, Goktug Guevercin, Amr Abu-zer, Rui
Xiao, Yongjian Tang, Ehsan Adeli, Nassir Navab | SCOPE: Structural Continuity Preservation for Medical Image Segmentation | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the preservation of shape continuity and physiological anatomy is a
natural assumption in the segmentation of medical images, it is often neglected
by deep learning methods that mostly aim for the statistical modeling of input
data as pixels rather than interconnected structures. In biological structures,
however, organs are not separate entities; for example, in reality, a severed
vessel is an indication of an underlying problem, but traditional segmentation
models are not designed to strictly enforce the continuity of anatomy,
potentially leading to inaccurate medical diagnoses. To address this issue, we
propose a graph-based approach that enforces the continuity and connectivity of
anatomical topology in medical images. Our method encodes the continuity of
shapes as a graph constraint, ensuring that the network's predictions maintain
this continuity. We evaluate our method on two public benchmarks on retinal
vessel segmentation, showing significant improvements in connectivity metrics
compared to traditional methods while getting better or on-par performance on
segmentation metrics.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 00:11:35 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Yeganeh",
"Yousef",
""
],
[
"Farshad",
"Azade",
""
],
[
"Guevercin",
"Goktug",
""
],
[
"Abu-zer",
"Amr",
""
],
[
"Xiao",
"Rui",
""
],
[
"Tang",
"Yongjian",
""
],
[
"Adeli",
"Ehsan",
""
],
[
"Navab",
"Nassir",
""
]
] | TITLE: SCOPE: Structural Continuity Preservation for Medical Image Segmentation
ABSTRACT: Although the preservation of shape continuity and physiological anatomy is a
natural assumption in the segmentation of medical images, it is often neglected
by deep learning methods that mostly aim for the statistical modeling of input
data as pixels rather than interconnected structures. In biological structures,
however, organs are not separate entities; for example, in reality, a severed
vessel is an indication of an underlying problem, but traditional segmentation
models are not designed to strictly enforce the continuity of anatomy,
potentially leading to inaccurate medical diagnoses. To address this issue, we
propose a graph-based approach that enforces the continuity and connectivity of
anatomical topology in medical images. Our method encodes the continuity of
shapes as a graph constraint, ensuring that the network's predictions maintain
this continuity. We evaluate our method on two public benchmarks on retinal
vessel segmentation, showing significant improvements in connectivity metrics
compared to traditional methods while getting better or on-par performance on
segmentation metrics.
| no_new_dataset | 0.712207 |
2304.14573 | Azade Farshad | Azade Farshad, Yousef Yeganeh, Yu Chi, Chengzhi Shen, Bj\"orn Ommer,
Nassir Navab | SceneGenie: Scene Graph Guided Diffusion Models for Image Synthesis | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text-conditioned image generation has made significant progress in recent
years with generative adversarial networks and more recently, diffusion models.
While diffusion models conditioned on text prompts have produced impressive and
high-quality images, accurately representing complex text prompts such as the
number of instances of a specific object remains challenging.
To address this limitation, we propose a novel guidance approach for the
sampling process in the diffusion model that leverages bounding box and
segmentation map information at inference time without additional training
data. Through a novel loss in the sampling process, our approach guides the
model with semantic features from CLIP embeddings and enforces geometric
constraints, leading to high-resolution images that accurately represent the
scene. To obtain bounding box and segmentation map information, we structure
the text prompt as a scene graph and enrich the nodes with CLIP embeddings. Our
proposed model achieves state-of-the-art performance on two public benchmarks
for image generation from scene graphs, surpassing both scene graph to image
and text-based diffusion models in various metrics. Our results demonstrate the
effectiveness of incorporating bounding box and segmentation map guidance in
the diffusion model sampling process for more accurate text-to-image
generation.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 00:14:28 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Farshad",
"Azade",
""
],
[
"Yeganeh",
"Yousef",
""
],
[
"Chi",
"Yu",
""
],
[
"Shen",
"Chengzhi",
""
],
[
"Ommer",
"Björn",
""
],
[
"Navab",
"Nassir",
""
]
] | TITLE: SceneGenie: Scene Graph Guided Diffusion Models for Image Synthesis
ABSTRACT: Text-conditioned image generation has made significant progress in recent
years with generative adversarial networks and more recently, diffusion models.
While diffusion models conditioned on text prompts have produced impressive and
high-quality images, accurately representing complex text prompts such as the
number of instances of a specific object remains challenging.
To address this limitation, we propose a novel guidance approach for the
sampling process in the diffusion model that leverages bounding box and
segmentation map information at inference time without additional training
data. Through a novel loss in the sampling process, our approach guides the
model with semantic features from CLIP embeddings and enforces geometric
constraints, leading to high-resolution images that accurately represent the
scene. To obtain bounding box and segmentation map information, we structure
the text prompt as a scene graph and enrich the nodes with CLIP embeddings. Our
proposed model achieves state-of-the-art performance on two public benchmarks
for image generation from scene graphs, surpassing both scene graph to image
and text-based diffusion models in various metrics. Our results demonstrate the
effectiveness of incorporating bounding box and segmentation map guidance in
the diffusion model sampling process for more accurate text-to-image
generation.
| no_new_dataset | 0.712864 |
2304.14585 | Feng Xie | Feng Xie, Xiang Zeng, Bin Zhou, Yusong Tan | Improving Knowledge Graph Entity Alignment with Graph Augmentation | Accepted by PAKDD 2023; 12 pages, 2 figures | null | null | null | cs.CL cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity alignment (EA) which links equivalent entities across different
knowledge graphs (KGs) plays a crucial role in knowledge fusion. In recent
years, graph neural networks (GNNs) have been successfully applied in many
embedding-based EA methods. However, existing GNN-based methods either suffer
from the structural heterogeneity issue that especially appears in the real KG
distributions or ignore the heterogeneous representation learning for unseen
(unlabeled) entities, which would lead the model to overfit on few alignment
seeds (i.e., training data) and thus cause unsatisfactory alignment
performance. To enhance the EA ability, we propose GAEA, a novel EA approach
based on graph augmentation. In this model, we design a simple Entity-Relation
(ER) Encoder to generate latent representations for entities via jointly
modeling comprehensive structural information and rich relation semantics.
Moreover, we use graph augmentation to create two graph views for margin-based
alignment learning and contrastive entity representation learning, thus
mitigating structural heterogeneity and further improving the model's alignment
performance. Extensive experiments conducted on benchmark datasets demonstrate
the effectiveness of our method.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 01:22:47 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Xie",
"Feng",
""
],
[
"Zeng",
"Xiang",
""
],
[
"Zhou",
"Bin",
""
],
[
"Tan",
"Yusong",
""
]
] | TITLE: Improving Knowledge Graph Entity Alignment with Graph Augmentation
ABSTRACT: Entity alignment (EA) which links equivalent entities across different
knowledge graphs (KGs) plays a crucial role in knowledge fusion. In recent
years, graph neural networks (GNNs) have been successfully applied in many
embedding-based EA methods. However, existing GNN-based methods either suffer
from the structural heterogeneity issue that especially appears in the real KG
distributions or ignore the heterogeneous representation learning for unseen
(unlabeled) entities, which would lead the model to overfit on few alignment
seeds (i.e., training data) and thus cause unsatisfactory alignment
performance. To enhance the EA ability, we propose GAEA, a novel EA approach
based on graph augmentation. In this model, we design a simple Entity-Relation
(ER) Encoder to generate latent representations for entities via jointly
modeling comprehensive structural information and rich relation semantics.
Moreover, we use graph augmentation to create two graph views for margin-based
alignment learning and contrastive entity representation learning, thus
mitigating structural heterogeneity and further improving the model's alignment
performance. Extensive experiments conducted on benchmark datasets demonstrate
the effectiveness of our method.
| no_new_dataset | 0.708862 |
2304.14593 | Yongcheng Jing | Yongcheng Jing, Chongbin Yuan, Li Ju, Yiding Yang, Xinchao Wang,
Dacheng Tao | Deep Graph Reprogramming | CVPR 2023 Highlight | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore a novel model reusing task tailored for graph
neural networks (GNNs), termed as "deep graph reprogramming". We strive to
reprogram a pre-trained GNN, without amending raw node features nor model
parameters, to handle a bunch of cross-level downstream tasks in various
domains. To this end, we propose an innovative Data Reprogramming paradigm
alongside a Model Reprogramming paradigm. The former one aims to address the
challenge of diversified graph feature dimensions for various tasks on the
input side, while the latter alleviates the dilemma of fixed per-task-per-model
behavior on the model side. For data reprogramming, we specifically devise an
elaborated Meta-FeatPadding method to deal with heterogeneous input dimensions,
and also develop a transductive Edge-Slimming as well as an inductive
Meta-GraPadding approach for diverse homogenous samples. Meanwhile, for model
reprogramming, we propose a novel task-adaptive Reprogrammable-Aggregator, to
endow the frozen model with larger expressive capacities in handling
cross-domain tasks. Experiments on fourteen datasets across node/graph
classification/regression, 3D object recognition, and distributed action
recognition, demonstrate that the proposed methods yield gratifying results, on
par with those by re-training from scratch.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 02:04:29 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Jing",
"Yongcheng",
""
],
[
"Yuan",
"Chongbin",
""
],
[
"Ju",
"Li",
""
],
[
"Yang",
"Yiding",
""
],
[
"Wang",
"Xinchao",
""
],
[
"Tao",
"Dacheng",
""
]
] | TITLE: Deep Graph Reprogramming
ABSTRACT: In this paper, we explore a novel model reusing task tailored for graph
neural networks (GNNs), termed as "deep graph reprogramming". We strive to
reprogram a pre-trained GNN, without amending raw node features nor model
parameters, to handle a bunch of cross-level downstream tasks in various
domains. To this end, we propose an innovative Data Reprogramming paradigm
alongside a Model Reprogramming paradigm. The former one aims to address the
challenge of diversified graph feature dimensions for various tasks on the
input side, while the latter alleviates the dilemma of fixed per-task-per-model
behavior on the model side. For data reprogramming, we specifically devise an
elaborated Meta-FeatPadding method to deal with heterogeneous input dimensions,
and also develop a transductive Edge-Slimming as well as an inductive
Meta-GraPadding approach for diverse homogenous samples. Meanwhile, for model
reprogramming, we propose a novel task-adaptive Reprogrammable-Aggregator, to
endow the frozen model with larger expressive capacities in handling
cross-domain tasks. Experiments on fourteen datasets across node/graph
classification/regression, 3D object recognition, and distributed action
recognition, demonstrate that the proposed methods yield gratifying results, on
par with those by re-training from scratch.
| no_new_dataset | 0.708011 |
2304.14599 | Gunther Jikeli Jr. | Gunther Jikeli, Sameer Karali, Daniel Miehling, and Katharina Soemer | Antisemitic Messages? A Guide to High-Quality Annotation and a Labeled
Dataset of Tweets | null | null | null | null | cs.CL cs.CY | http://creativecommons.org/licenses/by/4.0/ | One of the major challenges in automatic hate speech detection is the lack of
datasets that cover a wide range of biased and unbiased messages and that are
consistently labeled. We propose a labeling procedure that addresses some of
the common weaknesses of labeled datasets. We focus on antisemitic speech on
Twitter and create a labeled dataset of 6,941 tweets that cover a wide range of
topics common in conversations about Jews, Israel, and antisemitism between
January 2019 and December 2021 by drawing from representative samples with
relevant keywords. Our annotation process aims to strictly apply a commonly
used definition of antisemitism by forcing annotators to specify which part of
the definition applies, and by giving them the option to personally disagree
with the definition on a case-by-case basis. Labeling tweets that call out
antisemitism, report antisemitism, or are otherwise related to antisemitism
(such as the Holocaust) but are not actually antisemitic can help reduce false
positives in automated detection. The dataset includes 1,250 tweets (18%) that
are antisemitic according to the International Holocaust Remembrance Alliance
(IHRA) definition of antisemitism. It is important to note, however, that the
dataset is not comprehensive. Many topics are still not covered, and it only
includes tweets collected from Twitter between January 2019 and December 2021.
Additionally, the dataset only includes tweets that were written in English.
Despite these limitations, we hope that this is a meaningful contribution to
improving the automated detection of antisemitic speech.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 02:52:38 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Jikeli",
"Gunther",
""
],
[
"Karali",
"Sameer",
""
],
[
"Miehling",
"Daniel",
""
],
[
"Soemer",
"Katharina",
""
]
] | TITLE: Antisemitic Messages? A Guide to High-Quality Annotation and a Labeled
Dataset of Tweets
ABSTRACT: One of the major challenges in automatic hate speech detection is the lack of
datasets that cover a wide range of biased and unbiased messages and that are
consistently labeled. We propose a labeling procedure that addresses some of
the common weaknesses of labeled datasets. We focus on antisemitic speech on
Twitter and create a labeled dataset of 6,941 tweets that cover a wide range of
topics common in conversations about Jews, Israel, and antisemitism between
January 2019 and December 2021 by drawing from representative samples with
relevant keywords. Our annotation process aims to strictly apply a commonly
used definition of antisemitism by forcing annotators to specify which part of
the definition applies, and by giving them the option to personally disagree
with the definition on a case-by-case basis. Labeling tweets that call out
antisemitism, report antisemitism, or are otherwise related to antisemitism
(such as the Holocaust) but are not actually antisemitic can help reduce false
positives in automated detection. The dataset includes 1,250 tweets (18%) that
are antisemitic according to the International Holocaust Remembrance Alliance
(IHRA) definition of antisemitism. It is important to note, however, that the
dataset is not comprehensive. Many topics are still not covered, and it only
includes tweets collected from Twitter between January 2019 and December 2021.
Additionally, the dataset only includes tweets that were written in English.
Despite these limitations, we hope that this is a meaningful contribution to
improving the automated detection of antisemitic speech.
| new_dataset | 0.715871 |
2304.14605 | Dhinakaran D | D. Dhinakaran and P. M. Joe Prathap | Preserving Data Confidentiality in Association Rule Mining Using Data
Share Allocator Algorithm | null | null | 10.32604/iasc.2022.024509 | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | These days, investigations of information are becoming essential for various
associations all over the globe. By and large, different associations need to
perform information examinations on their joined data sets. Privacy and
security have become a relentless concern wherein business experts do not
desire to contribute their classified transaction data. Therefore, there is a
requirement to build a proficient methodology that can process the broad
mixture of data and convert those data into meaningful knowledge for the user
without forfeiting the security and privacy of individuals crude information.
We devised two unique protocols for frequent mining itemsets in horizontally
partitioned datasets while maintaining privacy. In such a scenario, data
possessors outwork mining tasks on their multiparty data by preserving privacy.
The proposed framework model encompasses two or more data possessors who
encrypt their information and dispense their encrypted data to two or more
clouds by a data share allocator algorithm. This methodology protects the data
possessor raw data from other data possessors and the other clouds. To
guarantee data privacy, we plan a proficient enhanced homomorphic encryption
conspire. Our approach ensures privacy during communication and accumulation of
data and guarantees no information or data adversity and no incidental
consequences for data utility.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 03:20:12 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Dhinakaran",
"D.",
""
],
[
"Prathap",
"P. M. Joe",
""
]
] | TITLE: Preserving Data Confidentiality in Association Rule Mining Using Data
Share Allocator Algorithm
ABSTRACT: These days, investigations of information are becoming essential for various
associations all over the globe. By and large, different associations need to
perform information examinations on their joined data sets. Privacy and
security have become a relentless concern wherein business experts do not
desire to contribute their classified transaction data. Therefore, there is a
requirement to build a proficient methodology that can process the broad
mixture of data and convert those data into meaningful knowledge for the user
without forfeiting the security and privacy of individuals crude information.
We devised two unique protocols for frequent mining itemsets in horizontally
partitioned datasets while maintaining privacy. In such a scenario, data
possessors outwork mining tasks on their multiparty data by preserving privacy.
The proposed framework model encompasses two or more data possessors who
encrypt their information and dispense their encrypted data to two or more
clouds by a data share allocator algorithm. This methodology protects the data
possessor raw data from other data possessors and the other clouds. To
guarantee data privacy, we plan a proficient enhanced homomorphic encryption
conspire. Our approach ensures privacy during communication and accumulation of
data and guarantees no information or data adversity and no incidental
consequences for data utility.
| no_new_dataset | 0.709384 |
2304.14618 | Yilin Lyu | Yilin Lyu, Xin Liu, Mingyang Song, Xinyue Wang, Yaxin Peng, Tieyong
Zeng, Liping Jing | Recognizable Information Bottleneck | 12 pages. To appear in IJCAI 2023 | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information Bottlenecks (IBs) learn representations that generalize to unseen
data by information compression. However, existing IBs are practically unable
to guarantee generalization in real-world scenarios due to the vacuous
generalization bound. The recent PAC-Bayes IB uses information complexity
instead of information compression to establish a connection with the mutual
information generalization bound. However, it requires the computation of
expensive second-order curvature, which hinders its practical application. In
this paper, we establish the connection between the recognizability of
representations and the recent functional conditional mutual information
(f-CMI) generalization bound, which is significantly easier to estimate. On
this basis we propose a Recognizable Information Bottleneck (RIB) which
regularizes the recognizability of representations through a recognizability
critic optimized by density ratio matching under the Bregman divergence.
Extensive experiments on several commonly used datasets demonstrate the
effectiveness of the proposed method in regularizing the model and estimating
the generalization gap.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 03:55:33 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Lyu",
"Yilin",
""
],
[
"Liu",
"Xin",
""
],
[
"Song",
"Mingyang",
""
],
[
"Wang",
"Xinyue",
""
],
[
"Peng",
"Yaxin",
""
],
[
"Zeng",
"Tieyong",
""
],
[
"Jing",
"Liping",
""
]
] | TITLE: Recognizable Information Bottleneck
ABSTRACT: Information Bottlenecks (IBs) learn representations that generalize to unseen
data by information compression. However, existing IBs are practically unable
to guarantee generalization in real-world scenarios due to the vacuous
generalization bound. The recent PAC-Bayes IB uses information complexity
instead of information compression to establish a connection with the mutual
information generalization bound. However, it requires the computation of
expensive second-order curvature, which hinders its practical application. In
this paper, we establish the connection between the recognizability of
representations and the recent functional conditional mutual information
(f-CMI) generalization bound, which is significantly easier to estimate. On
this basis we propose a Recognizable Information Bottleneck (RIB) which
regularizes the recognizability of representations through a recognizability
critic optimized by density ratio matching under the Bregman divergence.
Extensive experiments on several commonly used datasets demonstrate the
effectiveness of the proposed method in regularizing the model and estimating
the generalization gap.
| no_new_dataset | 0.711268 |
2304.14619 | Ailing Pan | Ailing Pan, Chao Dai, Chen Pan, Dongping Zhang and Yunchao Xu | A positive feedback method based on F-measure value for Salient Object
Detection | 13 pages, 4 figures, 3 table | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The majority of current salient object detection (SOD) models are focused on
designing a series of decoders based on fully convolutional networks (FCNs) or
Transformer architectures and integrating them in a skillful manner. These
models have achieved remarkable high performance and made significant
contributions to the development of SOD. Their primary research objective is to
develop novel algorithms that can outperform state-of-the-art models, a task
that is extremely difficult and time-consuming. In contrast, this paper
proposes a positive feedback method based on F-measure value for SOD, aiming to
improve the accuracy of saliency prediction using existing methods.
Specifically, our proposed method takes an image to be detected and inputs it
into several existing models to obtain their respective prediction maps. These
prediction maps are then fed into our positive feedback method to generate the
final prediction result, without the need for careful decoder design or model
training. Moreover, our method is adaptive and can be implemented based on
existing models without any restrictions. Experimental results on five publicly
available datasets show that our proposed positive feedback method outperforms
the latest 12 methods in five evaluation metrics for saliency map prediction.
Additionally, we conducted a robustness experiment, which shows that when at
least one good prediction result exists in the selected existing model, our
proposed approach can ensure that the prediction result is not worse. Our
approach achieves a prediction speed of 20 frames per second (FPS) when
evaluated on a low configuration host and after removing the prediction time
overhead of inserted models. These results highlight the effectiveness,
efficiency, and robustness of our proposed approach for salient object
detection.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 04:05:13 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Pan",
"Ailing",
""
],
[
"Dai",
"Chao",
""
],
[
"Pan",
"Chen",
""
],
[
"Zhang",
"Dongping",
""
],
[
"Xu",
"Yunchao",
""
]
] | TITLE: A positive feedback method based on F-measure value for Salient Object
Detection
ABSTRACT: The majority of current salient object detection (SOD) models are focused on
designing a series of decoders based on fully convolutional networks (FCNs) or
Transformer architectures and integrating them in a skillful manner. These
models have achieved remarkable high performance and made significant
contributions to the development of SOD. Their primary research objective is to
develop novel algorithms that can outperform state-of-the-art models, a task
that is extremely difficult and time-consuming. In contrast, this paper
proposes a positive feedback method based on F-measure value for SOD, aiming to
improve the accuracy of saliency prediction using existing methods.
Specifically, our proposed method takes an image to be detected and inputs it
into several existing models to obtain their respective prediction maps. These
prediction maps are then fed into our positive feedback method to generate the
final prediction result, without the need for careful decoder design or model
training. Moreover, our method is adaptive and can be implemented based on
existing models without any restrictions. Experimental results on five publicly
available datasets show that our proposed positive feedback method outperforms
the latest 12 methods in five evaluation metrics for saliency map prediction.
Additionally, we conducted a robustness experiment, which shows that when at
least one good prediction result exists in the selected existing model, our
proposed approach can ensure that the prediction result is not worse. Our
approach achieves a prediction speed of 20 frames per second (FPS) when
evaluated on a low configuration host and after removing the prediction time
overhead of inserted models. These results highlight the effectiveness,
efficiency, and robustness of our proposed approach for salient object
detection.
| no_new_dataset | 0.708591 |
2304.14622 | Babar Shahzaad | Babar Shahzaad, Balsam Alkouz, Jermaine Janszen, Athman Bouguettaya | Optimizing Drone Delivery in Smart Cities | 8 pages, 3 figures. This is an accepted paper and it is going to
appear in IEEE Internet Computing magazine | null | null | null | cs.RO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel context-aware drone delivery framework for optimizing
package delivery through skyway networks in smart cities. We reformulate the
problem of finding an optimal drone service delivery pathway as a more
congruent and elegant drone delivery service composition problem. In this
respect, we propose a novel line-of-sight heuristic-based context-aware
composition algorithm that selects and composes near-optimal drone delivery
services. We conducted an extensive experiment using a real dataset to show the
robustness of our proposed approach.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 04:32:26 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Shahzaad",
"Babar",
""
],
[
"Alkouz",
"Balsam",
""
],
[
"Janszen",
"Jermaine",
""
],
[
"Bouguettaya",
"Athman",
""
]
] | TITLE: Optimizing Drone Delivery in Smart Cities
ABSTRACT: We propose a novel context-aware drone delivery framework for optimizing
package delivery through skyway networks in smart cities. We reformulate the
problem of finding an optimal drone service delivery pathway as a more
congruent and elegant drone delivery service composition problem. In this
respect, we propose a novel line-of-sight heuristic-based context-aware
composition algorithm that selects and composes near-optimal drone delivery
services. We conducted an extensive experiment using a real dataset to show the
robustness of our proposed approach.
| no_new_dataset | 0.711656 |
2304.14629 | Zijun Li | Zijun Li, Chuhao Xu, Quan Chen, Jieru Zhao, Chen Chen, Minyi Guo | DataFlower: Exploiting the Data-flow Paradigm for Serverless Workflow
Orchestration | Note: This manuscript is our major version, and is accepted after
revision in ASPLOS 2024 | null | null | null | cs.DC | http://creativecommons.org/publicdomain/zero/1.0/ | Serverless computing that runs functions with auto-scaling is a popular task
execution pattern in the cloud-native era. By connecting serverless functions
into workflows, tenants can achieve complex functionality. Prior researches
adopt the control-flow paradigm to orchestrate a serverless workflow. However,
the control-flow paradigm inherently results in long response latency, due to
the heavy data persistence overhead, sequential resource usage, and late
function triggering. Our investigation shows that the data-flow paradigm has
the potential to resolve the above problems, with careful design and
optimization. We propose DataFlower, a scheme that achieves the data-flow
paradigm for serverless workflows. In DataFlower, a container is abstracted to
be a function logic unit and a data logic unit. The function logic unit runs
the functions, and the data logic unit handles the data transmission
asynchronously. Moreover, a host-container collaborative communication
mechanism is used to support efficient data transfer. Our experimental results
show that compared to state-of-the-art serverless designs, DataFlower reduces
the 99\%-ile latency of the benchmarks by up to 35.4\%, and improves the peak
throughput by up to 3.8X.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 05:16:44 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Li",
"Zijun",
""
],
[
"Xu",
"Chuhao",
""
],
[
"Chen",
"Quan",
""
],
[
"Zhao",
"Jieru",
""
],
[
"Chen",
"Chen",
""
],
[
"Guo",
"Minyi",
""
]
] | TITLE: DataFlower: Exploiting the Data-flow Paradigm for Serverless Workflow
Orchestration
ABSTRACT: Serverless computing that runs functions with auto-scaling is a popular task
execution pattern in the cloud-native era. By connecting serverless functions
into workflows, tenants can achieve complex functionality. Prior researches
adopt the control-flow paradigm to orchestrate a serverless workflow. However,
the control-flow paradigm inherently results in long response latency, due to
the heavy data persistence overhead, sequential resource usage, and late
function triggering. Our investigation shows that the data-flow paradigm has
the potential to resolve the above problems, with careful design and
optimization. We propose DataFlower, a scheme that achieves the data-flow
paradigm for serverless workflows. In DataFlower, a container is abstracted to
be a function logic unit and a data logic unit. The function logic unit runs
the functions, and the data logic unit handles the data transmission
asynchronously. Moreover, a host-container collaborative communication
mechanism is used to support efficient data transfer. Our experimental results
show that compared to state-of-the-art serverless designs, DataFlower reduces
the 99\%-ile latency of the benchmarks by up to 35.4\%, and improves the peak
throughput by up to 3.8X.
| no_new_dataset | 0.710025 |
2304.14635 | Jie Liu | Jie Liu, Mengting He, Guangtao Wang, Nguyen Quoc Viet Hung, Xuequn
Shang, Hongzhi Yin | Imbalanced Node Classification Beyond Homophilic Assumption | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | Imbalanced node classification widely exists in real-world networks where
graph neural networks (GNNs) are usually highly inclined to majority classes
and suffer from severe performance degradation on classifying minority class
nodes. Various imbalanced node classification methods have been proposed
recently which construct synthetic nodes and edges w.r.t. minority classes to
balance the label and topology distribution. However, they are all based on the
homophilic assumption that nodes of the same label tend to connect despite the
wide existence of heterophilic edges in real-world graphs. Thus, they uniformly
aggregate features from both homophilic and heterophilic neighbors and rely on
feature similarity to generate synthetic edges, which cannot be applied to
imbalanced graphs in high heterophily. To address this problem, we propose a
novel GraphSANN for imbalanced node classification on both homophilic and
heterophilic graphs. Firstly, we propose a unified feature mixer to generate
synthetic nodes with both homophilic and heterophilic interpolation in a
unified way. Next, by randomly sampling edges between synthetic nodes and
existing nodes as candidate edges, we design an adaptive subgraph extractor to
adaptively extract the contextual subgraphs of candidate edges with flexible
ranges. Finally, we develop a multi-filter subgraph encoder that constructs
different filter channels to discriminatively aggregate neighbor's information
along the homophilic and heterophilic edges. Extensive experiments on eight
datasets demonstrate the superiority of our model for imbalanced node
classification on both homophilic and heterophilic graphs.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 05:33:19 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Liu",
"Jie",
""
],
[
"He",
"Mengting",
""
],
[
"Wang",
"Guangtao",
""
],
[
"Hung",
"Nguyen Quoc Viet",
""
],
[
"Shang",
"Xuequn",
""
],
[
"Yin",
"Hongzhi",
""
]
] | TITLE: Imbalanced Node Classification Beyond Homophilic Assumption
ABSTRACT: Imbalanced node classification widely exists in real-world networks where
graph neural networks (GNNs) are usually highly inclined to majority classes
and suffer from severe performance degradation on classifying minority class
nodes. Various imbalanced node classification methods have been proposed
recently which construct synthetic nodes and edges w.r.t. minority classes to
balance the label and topology distribution. However, they are all based on the
homophilic assumption that nodes of the same label tend to connect despite the
wide existence of heterophilic edges in real-world graphs. Thus, they uniformly
aggregate features from both homophilic and heterophilic neighbors and rely on
feature similarity to generate synthetic edges, which cannot be applied to
imbalanced graphs in high heterophily. To address this problem, we propose a
novel GraphSANN for imbalanced node classification on both homophilic and
heterophilic graphs. Firstly, we propose a unified feature mixer to generate
synthetic nodes with both homophilic and heterophilic interpolation in a
unified way. Next, by randomly sampling edges between synthetic nodes and
existing nodes as candidate edges, we design an adaptive subgraph extractor to
adaptively extract the contextual subgraphs of candidate edges with flexible
ranges. Finally, we develop a multi-filter subgraph encoder that constructs
different filter channels to discriminatively aggregate neighbor's information
along the homophilic and heterophilic edges. Extensive experiments on eight
datasets demonstrate the superiority of our model for imbalanced node
classification on both homophilic and heterophilic graphs.
| no_new_dataset | 0.712864 |
2304.14647 | Weisen Jiang | Weisen Jiang, Hansi Yang, Yu Zhang, James Kwok | An Adaptive Policy to Employ Sharpness-Aware Minimization | Accepted by ICLR 2023 | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Sharpness-aware minimization (SAM), which searches for flat minima by min-max
optimization, has been shown to be useful in improving model generalization.
However, since each SAM update requires computing two gradients, its
computational cost and training time are both doubled compared to standard
empirical risk minimization (ERM). Recent state-of-the-arts reduce the fraction
of SAM updates and thus accelerate SAM by switching between SAM and ERM updates
randomly or periodically. In this paper, we design an adaptive policy to employ
SAM based on the loss landscape geometry. Two efficient algorithms, AE-SAM and
AE-LookSAM, are proposed. We theoretically show that AE-SAM has the same
convergence rate as SAM. Experimental results on various datasets and
architectures demonstrate the efficiency and effectiveness of the adaptive
policy.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 06:23:32 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Jiang",
"Weisen",
""
],
[
"Yang",
"Hansi",
""
],
[
"Zhang",
"Yu",
""
],
[
"Kwok",
"James",
""
]
] | TITLE: An Adaptive Policy to Employ Sharpness-Aware Minimization
ABSTRACT: Sharpness-aware minimization (SAM), which searches for flat minima by min-max
optimization, has been shown to be useful in improving model generalization.
However, since each SAM update requires computing two gradients, its
computational cost and training time are both doubled compared to standard
empirical risk minimization (ERM). Recent state-of-the-arts reduce the fraction
of SAM updates and thus accelerate SAM by switching between SAM and ERM updates
randomly or periodically. In this paper, we design an adaptive policy to employ
SAM based on the loss landscape geometry. Two efficient algorithms, AE-SAM and
AE-LookSAM, are proposed. We theoretically show that AE-SAM has the same
convergence rate as SAM. Experimental results on various datasets and
architectures demonstrate the efficiency and effectiveness of the adaptive
policy.
| no_new_dataset | 0.709617 |
2304.14657 | Jieting Chen | Jieting Chen, Junkai Ding, Wenping Chen, Qin Jin | Knowledge Enhanced Model for Live Video Comment Generation | null | null | null | null | cs.CV cs.MM | http://creativecommons.org/licenses/by/4.0/ | Live video commenting is popular on video media platforms, as it can create a
chatting atmosphere and provide supplementary information for users while
watching videos. Automatically generating live video comments can improve user
experience and enable human-like generation for bot chatting. Existing works
mostly focus on short video datasets while ignoring other important video types
such as long videos like movies. In this work, we collect a new Movie Live
Comments (MovieLC) dataset to support research on live video comment generation
for long videos. We also propose a knowledge enhanced generation model inspired
by the divergent and informative nature of live video comments. Our model
adopts a pre-training encoder-decoder framework and incorporates external
knowledge. Extensive experiments show that both objective metrics and human
evaluation demonstrate the effectiveness of our proposed model. The MovieLC
dataset and our code will be released.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 07:03:50 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Chen",
"Jieting",
""
],
[
"Ding",
"Junkai",
""
],
[
"Chen",
"Wenping",
""
],
[
"Jin",
"Qin",
""
]
] | TITLE: Knowledge Enhanced Model for Live Video Comment Generation
ABSTRACT: Live video commenting is popular on video media platforms, as it can create a
chatting atmosphere and provide supplementary information for users while
watching videos. Automatically generating live video comments can improve user
experience and enable human-like generation for bot chatting. Existing works
mostly focus on short video datasets while ignoring other important video types
such as long videos like movies. In this work, we collect a new Movie Live
Comments (MovieLC) dataset to support research on live video comment generation
for long videos. We also propose a knowledge enhanced generation model inspired
by the divergent and informative nature of live video comments. Our model
adopts a pre-training encoder-decoder framework and incorporates external
knowledge. Extensive experiments show that both objective metrics and human
evaluation demonstrate the effectiveness of our proposed model. The MovieLC
dataset and our code will be released.
| new_dataset | 0.713862 |
2304.14659 | Alexandre Quemy | Alexandre Quemy, Marc Schoenauer, Johann Dreo | MultiZenoTravel: a Tunable Benchmark for Multi-Objective Planning with
Known Pareto Front | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | Multi-objective AI planning suffers from a lack of benchmarks exhibiting
known Pareto Fronts. In this work, we propose a tunable benchmark generator,
together with a dedicated solver that provably computes the true Pareto front
of the resulting instances. First, we prove a proposition allowing us to
characterize the optimal plans for a constrained version of the problem, and
then show how to reduce the general problem to the constrained one. Second, we
provide a constructive way to find all the Pareto-optimal plans and discuss the
complexity of the algorithm. We provide an implementation that allows the
solver to handle realistic instances in a reasonable time. Finally, as a
practical demonstration, we used this solver to find all Pareto-optimal plans
between the two largest airports in the world, considering the routes between
the 50 largest airports, spherical distances between airports and a made-up
risk.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 07:09:23 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Quemy",
"Alexandre",
""
],
[
"Schoenauer",
"Marc",
""
],
[
"Dreo",
"Johann",
""
]
] | TITLE: MultiZenoTravel: a Tunable Benchmark for Multi-Objective Planning with
Known Pareto Front
ABSTRACT: Multi-objective AI planning suffers from a lack of benchmarks exhibiting
known Pareto Fronts. In this work, we propose a tunable benchmark generator,
together with a dedicated solver that provably computes the true Pareto front
of the resulting instances. First, we prove a proposition allowing us to
characterize the optimal plans for a constrained version of the problem, and
then show how to reduce the general problem to the constrained one. Second, we
provide a constructive way to find all the Pareto-optimal plans and discuss the
complexity of the algorithm. We provide an implementation that allows the
solver to handle realistic instances in a reasonable time. Finally, as a
practical demonstration, we used this solver to find all Pareto-optimal plans
between the two largest airports in the world, considering the routes between
the 50 largest airports, spherical distances between airports and a made-up
risk.
| no_new_dataset | 0.705341 |
2304.14662 | Tong Zhu | Tong Zhu, Guoliang Zhang, Zechang Li, Zijian Yu, Junfei Ren, Mengsong
Wu, Zhefeng Wang, Baoxing Huai, Pingfu Chao, Wenliang Chen | CED: Catalog Extraction from Documents | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Sentence-by-sentence information extraction from long documents is an
exhausting and error-prone task. As the indicator of document skeleton,
catalogs naturally chunk documents into segments and provide informative
cascade semantics, which can help to reduce the search space. Despite their
usefulness, catalogs are hard to be extracted without the assist from external
knowledge. For documents that adhere to a specific template, regular
expressions are practical to extract catalogs. However, handcrafted heuristics
are not applicable when processing documents from different sources with
diverse formats. To address this problem, we build a large manually annotated
corpus, which is the first dataset for the Catalog Extraction from Documents
(CED) task. Based on this corpus, we propose a transition-based framework for
parsing documents into catalog trees. The experimental results demonstrate that
our proposed method outperforms baseline systems and shows a good ability to
transfer. We believe the CED task could fill the gap between raw text segments
and information extraction tasks on extremely long documents. Data and code are
available at \url{https://github.com/Spico197/CatalogExtraction}
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 07:32:00 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhu",
"Tong",
""
],
[
"Zhang",
"Guoliang",
""
],
[
"Li",
"Zechang",
""
],
[
"Yu",
"Zijian",
""
],
[
"Ren",
"Junfei",
""
],
[
"Wu",
"Mengsong",
""
],
[
"Wang",
"Zhefeng",
""
],
[
"Huai",
"Baoxing",
""
],
[
"Chao",
"Pingfu",
""
],
[
"Chen",
"Wenliang",
""
]
] | TITLE: CED: Catalog Extraction from Documents
ABSTRACT: Sentence-by-sentence information extraction from long documents is an
exhausting and error-prone task. As the indicator of document skeleton,
catalogs naturally chunk documents into segments and provide informative
cascade semantics, which can help to reduce the search space. Despite their
usefulness, catalogs are hard to be extracted without the assist from external
knowledge. For documents that adhere to a specific template, regular
expressions are practical to extract catalogs. However, handcrafted heuristics
are not applicable when processing documents from different sources with
diverse formats. To address this problem, we build a large manually annotated
corpus, which is the first dataset for the Catalog Extraction from Documents
(CED) task. Based on this corpus, we propose a transition-based framework for
parsing documents into catalog trees. The experimental results demonstrate that
our proposed method outperforms baseline systems and shows a good ability to
transfer. We believe the CED task could fill the gap between raw text segments
and information extraction tasks on extremely long documents. Data and code are
available at \url{https://github.com/Spico197/CatalogExtraction}
| new_dataset | 0.7134 |
2304.14672 | Haoning Wu Mr | Haoning Wu, Liang Liao, Annan Wang, Chaofeng Chen, Jingwen Hou, Wenxiu
Sun, Qiong Yan, Weisi Lin | Towards Robust Text-Prompted Semantic Criterion for In-the-Wild Video
Quality Assessment | 13 pages, 10 figures, under review | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The proliferation of videos collected during in-the-wild natural settings has
pushed the development of effective Video Quality Assessment (VQA)
methodologies. Contemporary supervised opinion-driven VQA strategies
predominantly hinge on training from expensive human annotations for quality
scores, which limited the scale and distribution of VQA datasets and
consequently led to unsatisfactory generalization capacity of methods driven by
these data. On the other hand, although several handcrafted zero-shot quality
indices do not require training from human opinions, they are unable to account
for the semantics of videos, rendering them ineffective in comprehending
complex authentic distortions (e.g., white balance, exposure) and assessing the
quality of semantic content within videos. To address these challenges, we
introduce the text-prompted Semantic Affinity Quality Index (SAQI) and its
localized version (SAQI-Local) using Contrastive Language-Image Pre-training
(CLIP) to ascertain the affinity between textual prompts and visual features,
facilitating a comprehensive examination of semantic quality concerns without
the reliance on human quality annotations. By amalgamating SAQI with existing
low-level metrics, we propose the unified Blind Video Quality Index (BVQI) and
its improved version, BVQI-Local, which demonstrates unprecedented performance,
surpassing existing zero-shot indices by at least 24\% on all datasets.
Moreover, we devise an efficient fine-tuning scheme for BVQI-Local that jointly
optimizes text prompts and final fusion weights, resulting in state-of-the-art
performance and superior generalization ability in comparison to prevalent
opinion-driven VQA methods. We conduct comprehensive analyses to investigate
different quality concerns of distinct indices, demonstrating the effectiveness
and rationality of our design.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 08:06:05 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wu",
"Haoning",
""
],
[
"Liao",
"Liang",
""
],
[
"Wang",
"Annan",
""
],
[
"Chen",
"Chaofeng",
""
],
[
"Hou",
"Jingwen",
""
],
[
"Sun",
"Wenxiu",
""
],
[
"Yan",
"Qiong",
""
],
[
"Lin",
"Weisi",
""
]
] | TITLE: Towards Robust Text-Prompted Semantic Criterion for In-the-Wild Video
Quality Assessment
ABSTRACT: The proliferation of videos collected during in-the-wild natural settings has
pushed the development of effective Video Quality Assessment (VQA)
methodologies. Contemporary supervised opinion-driven VQA strategies
predominantly hinge on training from expensive human annotations for quality
scores, which limited the scale and distribution of VQA datasets and
consequently led to unsatisfactory generalization capacity of methods driven by
these data. On the other hand, although several handcrafted zero-shot quality
indices do not require training from human opinions, they are unable to account
for the semantics of videos, rendering them ineffective in comprehending
complex authentic distortions (e.g., white balance, exposure) and assessing the
quality of semantic content within videos. To address these challenges, we
introduce the text-prompted Semantic Affinity Quality Index (SAQI) and its
localized version (SAQI-Local) using Contrastive Language-Image Pre-training
(CLIP) to ascertain the affinity between textual prompts and visual features,
facilitating a comprehensive examination of semantic quality concerns without
the reliance on human quality annotations. By amalgamating SAQI with existing
low-level metrics, we propose the unified Blind Video Quality Index (BVQI) and
its improved version, BVQI-Local, which demonstrates unprecedented performance,
surpassing existing zero-shot indices by at least 24\% on all datasets.
Moreover, we devise an efficient fine-tuning scheme for BVQI-Local that jointly
optimizes text prompts and final fusion weights, resulting in state-of-the-art
performance and superior generalization ability in comparison to prevalent
opinion-driven VQA methods. We conduct comprehensive analyses to investigate
different quality concerns of distinct indices, demonstrating the effectiveness
and rationality of our design.
| no_new_dataset | 0.710616 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.