id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2304.14674 | An Wang | An Wang, Mobarakol Islam, Mengya Xu, Yang Zhang, Hongliang Ren | SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective | Work under active progress | null | null | null | eess.IV cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Segment Anything Model (SAM) is a foundation model for semantic segmentation
and shows excellent generalization capability with the prompts. In this
empirical study, we investigate the robustness and zero-shot generalizability
of the SAM in the domain of robotic surgery in various settings of (i) prompted
vs. unprompted; (ii) bounding box vs. points-based prompt; (iii) generalization
under corruptions and perturbations with five severity levels; and (iv)
state-of-the-art supervised model vs. SAM. We conduct all the observations with
two well-known robotic instrument segmentation datasets of MICCAI EndoVis 2017
and 2018 challenges. Our extensive evaluation results reveal that although SAM
shows remarkable zero-shot generalization ability with bounding box prompts, it
struggles to segment the whole instrument with point-based prompts and
unprompted settings. Furthermore, our qualitative figures demonstrate that the
model either failed to predict the parts of the instrument mask (e.g., jaws,
wrist) or predicted parts of the instrument as different classes in the
scenario of overlapping instruments within the same bounding box or with the
point-based prompt. In fact, it is unable to identify instruments in some
complex surgical scenarios of blood, reflection, blur, and shade. Additionally,
SAM is insufficiently robust to maintain high performance when subjected to
various forms of data corruption. Therefore, we can argue that SAM is not ready
for downstream surgical tasks without further domain-specific fine-tuning.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 08:06:33 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wang",
"An",
""
],
[
"Islam",
"Mobarakol",
""
],
[
"Xu",
"Mengya",
""
],
[
"Zhang",
"Yang",
""
],
[
"Ren",
"Hongliang",
""
]
] | TITLE: SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective
ABSTRACT: Segment Anything Model (SAM) is a foundation model for semantic segmentation
and shows excellent generalization capability with the prompts. In this
empirical study, we investigate the robustness and zero-shot generalizability
of the SAM in the domain of robotic surgery in various settings of (i) prompted
vs. unprompted; (ii) bounding box vs. points-based prompt; (iii) generalization
under corruptions and perturbations with five severity levels; and (iv)
state-of-the-art supervised model vs. SAM. We conduct all the observations with
two well-known robotic instrument segmentation datasets of MICCAI EndoVis 2017
and 2018 challenges. Our extensive evaluation results reveal that although SAM
shows remarkable zero-shot generalization ability with bounding box prompts, it
struggles to segment the whole instrument with point-based prompts and
unprompted settings. Furthermore, our qualitative figures demonstrate that the
model either failed to predict the parts of the instrument mask (e.g., jaws,
wrist) or predicted parts of the instrument as different classes in the
scenario of overlapping instruments within the same bounding box or with the
point-based prompt. In fact, it is unable to identify instruments in some
complex surgical scenarios of blood, reflection, blur, and shade. Additionally,
SAM is insufficiently robust to maintain high performance when subjected to
various forms of data corruption. Therefore, we can argue that SAM is not ready
for downstream surgical tasks without further domain-specific fine-tuning.
| no_new_dataset | 0.710635 |
2304.14714 | Binqiang Wang | Binqiang Wang and Gang Dong and Yaqian Zhao and Rengang Li and Lu Cao
and Lihua Lu | SGED: A Benchmark dataset for Performance Evaluation of Spiking Gesture
Emotion Recognition | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the field of affective computing, researchers in the community have
promoted the performance of models and algorithms by using the complementarity
of multimodal information. However, the emergence of more and more modal
information makes the development of datasets unable to keep up with the
progress of existing modal sensing equipment. Collecting and studying
multimodal data is a complex and significant work. In order to supplement the
challenge of partial missing of community data. We collected and labeled a new
homogeneous multimodal gesture emotion recognition dataset based on the
analysis of the existing data sets. This data set complements the defects of
homogeneous multimodal data and provides a new research direction for emotion
recognition. Moreover, we propose a pseudo dual-flow network based on this
dataset, and verify the application potential of this dataset in the affective
computing community. The experimental results demonstrate that it is feasible
to use the traditional visual information and spiking visual information based
on homogeneous multimodal data for visual emotion recognition.The dataset is
available at \url{https://github.com/201528014227051/SGED}
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 09:32:09 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wang",
"Binqiang",
""
],
[
"Dong",
"Gang",
""
],
[
"Zhao",
"Yaqian",
""
],
[
"Li",
"Rengang",
""
],
[
"Cao",
"Lu",
""
],
[
"Lu",
"Lihua",
""
]
] | TITLE: SGED: A Benchmark dataset for Performance Evaluation of Spiking Gesture
Emotion Recognition
ABSTRACT: In the field of affective computing, researchers in the community have
promoted the performance of models and algorithms by using the complementarity
of multimodal information. However, the emergence of more and more modal
information makes the development of datasets unable to keep up with the
progress of existing modal sensing equipment. Collecting and studying
multimodal data is a complex and significant work. In order to supplement the
challenge of partial missing of community data. We collected and labeled a new
homogeneous multimodal gesture emotion recognition dataset based on the
analysis of the existing data sets. This data set complements the defects of
homogeneous multimodal data and provides a new research direction for emotion
recognition. Moreover, we propose a pseudo dual-flow network based on this
dataset, and verify the application potential of this dataset in the affective
computing community. The experimental results demonstrate that it is feasible
to use the traditional visual information and spiking visual information based
on homogeneous multimodal data for visual emotion recognition.The dataset is
available at \url{https://github.com/201528014227051/SGED}
| new_dataset | 0.716181 |
2304.14738 | Harsh Rangwani | Harsh Rangwani, Shrinivas Ramasubramanian, Sho Takemori, Kato Takashi,
Yuhei Umeda, Venkatesh Babu Radhakrishnan | Cost-Sensitive Self-Training for Optimizing Non-Decomposable Metrics | NeurIPS 2022. Code:
https://github.com/val-iisc/CostSensitiveSelfTraining | null | null | null | cs.LG cs.CL cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-training based semi-supervised learning algorithms have enabled the
learning of highly accurate deep neural networks, using only a fraction of
labeled data. However, the majority of work on self-training has focused on the
objective of improving accuracy, whereas practical machine learning systems can
have complex goals (e.g. maximizing the minimum of recall across classes, etc.)
that are non-decomposable in nature. In this work, we introduce the
Cost-Sensitive Self-Training (CSST) framework which generalizes the
self-training-based methods for optimizing non-decomposable metrics. We prove
that our framework can better optimize the desired non-decomposable metric
utilizing unlabeled data, under similar data distribution assumptions made for
the analysis of self-training. Using the proposed CSST framework, we obtain
practical self-training methods (for both vision and NLP tasks) for optimizing
different non-decomposable metrics using deep neural networks. Our results
demonstrate that CSST achieves an improvement over the state-of-the-art in
majority of the cases across datasets and objectives.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 10:31:12 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Rangwani",
"Harsh",
""
],
[
"Ramasubramanian",
"Shrinivas",
""
],
[
"Takemori",
"Sho",
""
],
[
"Takashi",
"Kato",
""
],
[
"Umeda",
"Yuhei",
""
],
[
"Radhakrishnan",
"Venkatesh Babu",
""
]
] | TITLE: Cost-Sensitive Self-Training for Optimizing Non-Decomposable Metrics
ABSTRACT: Self-training based semi-supervised learning algorithms have enabled the
learning of highly accurate deep neural networks, using only a fraction of
labeled data. However, the majority of work on self-training has focused on the
objective of improving accuracy, whereas practical machine learning systems can
have complex goals (e.g. maximizing the minimum of recall across classes, etc.)
that are non-decomposable in nature. In this work, we introduce the
Cost-Sensitive Self-Training (CSST) framework which generalizes the
self-training-based methods for optimizing non-decomposable metrics. We prove
that our framework can better optimize the desired non-decomposable metric
utilizing unlabeled data, under similar data distribution assumptions made for
the analysis of self-training. Using the proposed CSST framework, we obtain
practical self-training methods (for both vision and NLP tasks) for optimizing
different non-decomposable metrics using deep neural networks. Our results
demonstrate that CSST achieves an improvement over the state-of-the-art in
majority of the cases across datasets and objectives.
| no_new_dataset | 0.707626 |
2304.14742 | Caglar Demir | Caglar Demir, Michel Wiebesiek, Renzhong Lu, Axel-Cyrille Ngonga
Ngomo, Stefan Heindorf | LitCQD: Multi-Hop Reasoning in Incomplete Knowledge Graphs with Numeric
Literals | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Most real-world knowledge graphs, including Wikidata, DBpedia, and Yago are
incomplete. Answering queries on such incomplete graphs is an important, but
challenging problem. Recently, a number of approaches, including complex query
decomposition (CQD), have been proposed to answer complex, multi-hop queries
with conjunctions and disjunctions on such graphs. However, all
state-of-the-art approaches only consider graphs consisting of entities and
relations, neglecting literal values. In this paper, we propose LitCQD -- an
approach to answer complex, multi-hop queries where both the query and the
knowledge graph can contain numeric literal values: LitCQD can answer queries
having numerical answers or having entity answers satisfying numerical
constraints. For example, it allows to query (1)~persons living in New York
having a certain age, and (2)~the average age of persons living in New York. We
evaluate LitCQD on query types with and without literal values. To evaluate
LitCQD, we generate complex, multi-hop queries and their expected answers on a
version of the FB15k-237 dataset that was extended by literal values.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 10:33:49 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Demir",
"Caglar",
""
],
[
"Wiebesiek",
"Michel",
""
],
[
"Lu",
"Renzhong",
""
],
[
"Ngomo",
"Axel-Cyrille Ngonga",
""
],
[
"Heindorf",
"Stefan",
""
]
] | TITLE: LitCQD: Multi-Hop Reasoning in Incomplete Knowledge Graphs with Numeric
Literals
ABSTRACT: Most real-world knowledge graphs, including Wikidata, DBpedia, and Yago are
incomplete. Answering queries on such incomplete graphs is an important, but
challenging problem. Recently, a number of approaches, including complex query
decomposition (CQD), have been proposed to answer complex, multi-hop queries
with conjunctions and disjunctions on such graphs. However, all
state-of-the-art approaches only consider graphs consisting of entities and
relations, neglecting literal values. In this paper, we propose LitCQD -- an
approach to answer complex, multi-hop queries where both the query and the
knowledge graph can contain numeric literal values: LitCQD can answer queries
having numerical answers or having entity answers satisfying numerical
constraints. For example, it allows to query (1)~persons living in New York
having a certain age, and (2)~the average age of persons living in New York. We
evaluate LitCQD on query types with and without literal values. To evaluate
LitCQD, we generate complex, multi-hop queries and their expected answers on a
version of the FB15k-237 dataset that was extended by literal values.
| no_new_dataset | 0.702964 |
2304.14745 | Annerose Eichel | Annerose Eichel, Helena Schlipf, and Sabine Schulte im Walde | Made of Steel? Learning Plausible Materials for Components in the
Vehicle Repair Domain | Accepted at EACL 2023 Main Conference | null | null | null | cs.CL cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel approach to learn domain-specific plausible materials for
components in the vehicle repair domain by probing Pretrained Language Models
(PLMs) in a cloze task style setting to overcome the lack of annotated
datasets. We devise a new method to aggregate salient predictions from a set of
cloze query templates and show that domain-adaptation using either a small,
high-quality or a customized Wikipedia corpus boosts performance. When
exploring resource-lean alternatives, we find a distilled PLM clearly
outperforming a classic pattern-based algorithm. Further, given that 98% of our
domain-specific components are multiword expressions, we successfully exploit
the compositionality assumption as a way to address data sparsity.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 10:39:44 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Eichel",
"Annerose",
""
],
[
"Schlipf",
"Helena",
""
],
[
"Walde",
"Sabine Schulte im",
""
]
] | TITLE: Made of Steel? Learning Plausible Materials for Components in the
Vehicle Repair Domain
ABSTRACT: We propose a novel approach to learn domain-specific plausible materials for
components in the vehicle repair domain by probing Pretrained Language Models
(PLMs) in a cloze task style setting to overcome the lack of annotated
datasets. We devise a new method to aggregate salient predictions from a set of
cloze query templates and show that domain-adaptation using either a small,
high-quality or a customized Wikipedia corpus boosts performance. When
exploring resource-lean alternatives, we find a distilled PLM clearly
outperforming a classic pattern-based algorithm. Further, given that 98% of our
domain-specific components are multiword expressions, we successfully exploit
the compositionality assumption as a way to address data sparsity.
| no_new_dataset | 0.709447 |
2304.14773 | Vassilis Lyberatos | Vassilis Lyberatos, Paraskevi-Antonia Theofilou, Jason Liartis and
Georgios Siolas | Synergy of Machine and Deep Learning Models for Multi-Painter
Recognition | Github Repository: https://github.com/jliartis/art-recognition | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | The growing availability of digitized art collections has created the need to
manage, analyze and categorize large amounts of data related to abstract
concepts, highlighting a demanding problem of computer science and leading to
new research perspectives. Advances in artificial intelligence and neural
networks provide the right tools for this challenge. The analysis of artworks
to extract features useful in certain works is at the heart of the era. In the
present work, we approach the problem of painter recognition in a set of
digitized paintings, derived from the WikiArt repository, using transfer
learning to extract the appropriate features and classical machine learning
methods to evaluate the result. Through the testing of various models and their
fine tuning we came to the conclusion that RegNet performs better in exporting
features, while SVM makes the best classification of images based on the
painter with a performance of up to 85%. Also, we introduced a new large
dataset for painting recognition task including 62 artists achieving good
results.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 11:34:53 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Lyberatos",
"Vassilis",
""
],
[
"Theofilou",
"Paraskevi-Antonia",
""
],
[
"Liartis",
"Jason",
""
],
[
"Siolas",
"Georgios",
""
]
] | TITLE: Synergy of Machine and Deep Learning Models for Multi-Painter
Recognition
ABSTRACT: The growing availability of digitized art collections has created the need to
manage, analyze and categorize large amounts of data related to abstract
concepts, highlighting a demanding problem of computer science and leading to
new research perspectives. Advances in artificial intelligence and neural
networks provide the right tools for this challenge. The analysis of artworks
to extract features useful in certain works is at the heart of the era. In the
present work, we approach the problem of painter recognition in a set of
digitized paintings, derived from the WikiArt repository, using transfer
learning to extract the appropriate features and classical machine learning
methods to evaluate the result. Through the testing of various models and their
fine tuning we came to the conclusion that RegNet performs better in exporting
features, while SVM makes the best classification of images based on the
painter with a performance of up to 85%. Also, we introduced a new large
dataset for painting recognition task including 62 artists achieving good
results.
| new_dataset | 0.712851 |
2304.14789 | Constantino \'Alvarez Casado | Nhi Nguyen, Le Nguyen, Constantino \'Alvarez Casado, Olli Silv\'en,
Miguel Bordallo L\'opez | Non-Contact Heart Rate Measurement from Deteriorated Videos | 8 pages, 7 figures, 4 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Remote photoplethysmography (rPPG) offers a state-of-the-art, non-contact
methodology for estimating human pulse by analyzing facial videos. Despite its
potential, rPPG methods can be susceptible to various artifacts, such as noise,
occlusions, and other obstructions caused by sunglasses, masks, or even
involuntary facial contact, such as individuals inadvertently touching their
faces. In this study, we apply image processing transformations to
intentionally degrade video quality, mimicking these challenging conditions,
and subsequently evaluate the performance of both non-learning and
learning-based rPPG methods on the deteriorated data. Our results reveal a
significant decrease in accuracy in the presence of these artifacts, prompting
us to propose the application of restoration techniques, such as denoising and
inpainting, to improve heart-rate estimation outcomes. By addressing these
challenging conditions and occlusion artifacts, our approach aims to make rPPG
methods more robust and adaptable to real-world situations. To assess the
effectiveness of our proposed methods, we undertake comprehensive experiments
on three publicly available datasets, encompassing a wide range of scenarios
and artifact types. Our findings underscore the potential to construct a robust
rPPG system by employing an optimal combination of restoration algorithms and
rPPG techniques. Moreover, our study contributes to the advancement of
privacy-conscious rPPG methodologies, thereby bolstering the overall utility
and impact of this innovative technology in the field of remote heart-rate
estimation under realistic and diverse conditions.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 11:58:36 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Nguyen",
"Nhi",
""
],
[
"Nguyen",
"Le",
""
],
[
"Casado",
"Constantino Álvarez",
""
],
[
"Silvén",
"Olli",
""
],
[
"López",
"Miguel Bordallo",
""
]
] | TITLE: Non-Contact Heart Rate Measurement from Deteriorated Videos
ABSTRACT: Remote photoplethysmography (rPPG) offers a state-of-the-art, non-contact
methodology for estimating human pulse by analyzing facial videos. Despite its
potential, rPPG methods can be susceptible to various artifacts, such as noise,
occlusions, and other obstructions caused by sunglasses, masks, or even
involuntary facial contact, such as individuals inadvertently touching their
faces. In this study, we apply image processing transformations to
intentionally degrade video quality, mimicking these challenging conditions,
and subsequently evaluate the performance of both non-learning and
learning-based rPPG methods on the deteriorated data. Our results reveal a
significant decrease in accuracy in the presence of these artifacts, prompting
us to propose the application of restoration techniques, such as denoising and
inpainting, to improve heart-rate estimation outcomes. By addressing these
challenging conditions and occlusion artifacts, our approach aims to make rPPG
methods more robust and adaptable to real-world situations. To assess the
effectiveness of our proposed methods, we undertake comprehensive experiments
on three publicly available datasets, encompassing a wide range of scenarios
and artifact types. Our findings underscore the potential to construct a robust
rPPG system by employing an optimal combination of restoration algorithms and
rPPG techniques. Moreover, our study contributes to the advancement of
privacy-conscious rPPG methodologies, thereby bolstering the overall utility
and impact of this innovative technology in the field of remote heart-rate
estimation under realistic and diverse conditions.
| no_new_dataset | 0.709453 |
2304.14790 | Jose Manuel S\'anchez Ruiz | Jos\'e Manuel S\'anchez Ruiz, Francisco Jos\'e Dom\'inguez Mayo,
Xavier Oriol, Jos\'e Francisco Crespo, David Benavides, Ernest Teniente | A Benchmarking Proposal for DevOps Practices on Open Source Software
Projects | 18 pages, 10 figures | null | null | null | cs.SE cs.PF | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The popularity of open-source software (OSS) projects has grown significantly
over the last few years with more organizations relying on them. As these
projects become larger, the need for higher quality also increases. DevOps
practices have been shown to improve quality and performance. The DORA
benchmarking reports provide useful information to compare DevOps practices
performance between organizations, but they focus on continuous deployment and
delivery to production, while OSS projects focus on the continuous release of
code and its impact on third parties. The DORA reports mention the increasing
presence of OSS projects as they are widely used in the industry, but they have
never been used to measure OSS projects performance levels. This study reveals
that the DORA benchmark cannot be applied to OSS projects and proposes
benchmarking metrics for OSS projects, being the first one that adapts the DORA
metrics and applies them in OSS projects. The metrics proposed in this study
for benchmarking OSS projects include Release Frequency and Lead Time For
Released Changes to measure throughput, and Time To Repair Code and Bug Issues
Rate to assess stability. In contrast to the DORA reports, where data is
collected through manual surveys, in our proposal, data is collected
automatically by a tool we developed that retrieves information from public
GitHub repositories. This reduces the risk of survey-based data collection. Our
study also shows the benchmark feasibility by applying it to four popular OSS
projects: Angular, Kubernetes, Tensorflow, and VS Code. In addition, we
proposed challenges that address the topics and future works to expand the
knowledge and findings of this study. Overall, the findings of the study can
help to improve future research on OSS projects and provide a better
understanding and challenges of the role of DevOps practices in OSS projects.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:00:16 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Ruiz",
"José Manuel Sánchez",
""
],
[
"Mayo",
"Francisco José Domínguez",
""
],
[
"Oriol",
"Xavier",
""
],
[
"Crespo",
"José Francisco",
""
],
[
"Benavides",
"David",
""
],
[
"Teniente",
"Ernest",
""
]
] | TITLE: A Benchmarking Proposal for DevOps Practices on Open Source Software
Projects
ABSTRACT: The popularity of open-source software (OSS) projects has grown significantly
over the last few years with more organizations relying on them. As these
projects become larger, the need for higher quality also increases. DevOps
practices have been shown to improve quality and performance. The DORA
benchmarking reports provide useful information to compare DevOps practices
performance between organizations, but they focus on continuous deployment and
delivery to production, while OSS projects focus on the continuous release of
code and its impact on third parties. The DORA reports mention the increasing
presence of OSS projects as they are widely used in the industry, but they have
never been used to measure OSS projects performance levels. This study reveals
that the DORA benchmark cannot be applied to OSS projects and proposes
benchmarking metrics for OSS projects, being the first one that adapts the DORA
metrics and applies them in OSS projects. The metrics proposed in this study
for benchmarking OSS projects include Release Frequency and Lead Time For
Released Changes to measure throughput, and Time To Repair Code and Bug Issues
Rate to assess stability. In contrast to the DORA reports, where data is
collected through manual surveys, in our proposal, data is collected
automatically by a tool we developed that retrieves information from public
GitHub repositories. This reduces the risk of survey-based data collection. Our
study also shows the benchmark feasibility by applying it to four popular OSS
projects: Angular, Kubernetes, Tensorflow, and VS Code. In addition, we
proposed challenges that address the topics and future works to expand the
knowledge and findings of this study. Overall, the findings of the study can
help to improve future research on OSS projects and provide a better
understanding and challenges of the role of DevOps practices in OSS projects.
| no_new_dataset | 0.706962 |
2304.14793 | Stijn Vansummeren | Jeroen Bollen, Jasper Steegmans, Jan Van den Bussche, Stijn
Vansummeren | Learning Graph Neural Networks using Exact Compression | Extended version of the paper to be published in the proceedings of
the 6th Joint Workshop on Graph Data Management Experiences & Systems
(GRADES) and Network Data Analytics (NDA), held in conjunction with
SIGMOD/PODS 2023 | null | 10.1145/3594778.3594878 | null | cs.LG cs.AI cs.DB | http://creativecommons.org/licenses/by/4.0/ | Graph Neural Networks (GNNs) are a form of deep learning that enable a wide
range of machine learning applications on graph-structured data. The learning
of GNNs, however, is known to pose challenges for memory-constrained devices
such as GPUs. In this paper, we study exact compression as a way to reduce the
memory requirements of learning GNNs on large graphs. In particular, we adopt a
formal approach to compression and propose a methodology that transforms GNN
learning problems into provably equivalent compressed GNN learning problems. In
a preliminary experimental evaluation, we give insights into the compression
ratios that can be obtained on real-world graphs and apply our methodology to
an existing GNN benchmark.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:04:28 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Bollen",
"Jeroen",
""
],
[
"Steegmans",
"Jasper",
""
],
[
"Bussche",
"Jan Van den",
""
],
[
"Vansummeren",
"Stijn",
""
]
] | TITLE: Learning Graph Neural Networks using Exact Compression
ABSTRACT: Graph Neural Networks (GNNs) are a form of deep learning that enable a wide
range of machine learning applications on graph-structured data. The learning
of GNNs, however, is known to pose challenges for memory-constrained devices
such as GPUs. In this paper, we study exact compression as a way to reduce the
memory requirements of learning GNNs on large graphs. In particular, we adopt a
formal approach to compression and propose a methodology that transforms GNN
learning problems into provably equivalent compressed GNN learning problems. In
a preliminary experimental evaluation, we give insights into the compression
ratios that can be obtained on real-world graphs and apply our methodology to
an existing GNN benchmark.
| no_new_dataset | 0.710829 |
2304.14795 | Weidong Wang | Weidong Wang, Cheng Luo, Jiancheng An, Lu Gan, Hongshu Liao, and Chau
Yuen | Semi-Supervised RF Fingerprinting with Consistency-Based Regularization | 12 pages, 15 figures, submitted to IEEE Internet of Things Journal | null | null | null | eess.SP cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a promising non-password authentication technology, radio frequency (RF)
fingerprinting can greatly improve wireless security. Recent work has shown
that RF fingerprinting based on deep learning can significantly outperform
conventional approaches. The superiority, however, is mainly attributed to
supervised learning using a large amount of labeled data, and it significantly
degrades if only limited labeled data is available, making many existing
algorithms lack practicability. Considering that it is often easier to obtain
enough unlabeled data in practice with minimal resources, we leverage deep
semi-supervised learning for RF fingerprinting, which largely relies on a
composite data augmentation scheme designed for radio signals, combined with
two popular techniques: consistency-based regularization and pseudo-labeling.
Experimental results on both simulated and real-world datasets demonstrate that
our proposed method for semi-supervised RF fingerprinting is far superior to
other competing ones, and it can achieve remarkable performance almost close to
that of fully supervised learning with a very limited number of examples.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:08:07 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wang",
"Weidong",
""
],
[
"Luo",
"Cheng",
""
],
[
"An",
"Jiancheng",
""
],
[
"Gan",
"Lu",
""
],
[
"Liao",
"Hongshu",
""
],
[
"Yuen",
"Chau",
""
]
] | TITLE: Semi-Supervised RF Fingerprinting with Consistency-Based Regularization
ABSTRACT: As a promising non-password authentication technology, radio frequency (RF)
fingerprinting can greatly improve wireless security. Recent work has shown
that RF fingerprinting based on deep learning can significantly outperform
conventional approaches. The superiority, however, is mainly attributed to
supervised learning using a large amount of labeled data, and it significantly
degrades if only limited labeled data is available, making many existing
algorithms lack practicability. Considering that it is often easier to obtain
enough unlabeled data in practice with minimal resources, we leverage deep
semi-supervised learning for RF fingerprinting, which largely relies on a
composite data augmentation scheme designed for radio signals, combined with
two popular techniques: consistency-based regularization and pseudo-labeling.
Experimental results on both simulated and real-world datasets demonstrate that
our proposed method for semi-supervised RF fingerprinting is far superior to
other competing ones, and it can achieve remarkable performance almost close to
that of fully supervised learning with a very limited number of examples.
| no_new_dataset | 0.710842 |
2304.14800 | Shoumeng Qiu | Shoumeng Qiu, Feng Jiang, Haiqiang Zhang, Xiangyang Xue and Jian Pu | Multi-to-Single Knowledge Distillation for Point Cloud Semantic
Segmentation | null | ICRA 2023 | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | 3D point cloud semantic segmentation is one of the fundamental tasks for
environmental understanding. Although significant progress has been made in
recent years, the performance of classes with few examples or few points is
still far from satisfactory. In this paper, we propose a novel multi-to-single
knowledge distillation framework for the 3D point cloud semantic segmentation
task to boost the performance of those hard classes. Instead of fusing all the
points of multi-scans directly, only the instances that belong to the
previously defined hard classes are fused. To effectively and sufficiently
distill valuable knowledge from multi-scans, we leverage a multilevel
distillation framework, i.e., feature representation distillation, logit
distillation, and affinity distillation. We further develop a novel
instance-aware affinity distillation algorithm for capturing high-level
structural knowledge to enhance the distillation efficacy for hard classes.
Finally, we conduct experiments on the SemanticKITTI dataset, and the results
on both the validation and test sets demonstrate that our method yields
substantial improvements compared with the baseline method. The code is
available at \Url{https://github.com/skyshoumeng/M2SKD}.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:17:08 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Qiu",
"Shoumeng",
""
],
[
"Jiang",
"Feng",
""
],
[
"Zhang",
"Haiqiang",
""
],
[
"Xue",
"Xiangyang",
""
],
[
"Pu",
"Jian",
""
]
] | TITLE: Multi-to-Single Knowledge Distillation for Point Cloud Semantic
Segmentation
ABSTRACT: 3D point cloud semantic segmentation is one of the fundamental tasks for
environmental understanding. Although significant progress has been made in
recent years, the performance of classes with few examples or few points is
still far from satisfactory. In this paper, we propose a novel multi-to-single
knowledge distillation framework for the 3D point cloud semantic segmentation
task to boost the performance of those hard classes. Instead of fusing all the
points of multi-scans directly, only the instances that belong to the
previously defined hard classes are fused. To effectively and sufficiently
distill valuable knowledge from multi-scans, we leverage a multilevel
distillation framework, i.e., feature representation distillation, logit
distillation, and affinity distillation. We further develop a novel
instance-aware affinity distillation algorithm for capturing high-level
structural knowledge to enhance the distillation efficacy for hard classes.
Finally, we conduct experiments on the SemanticKITTI dataset, and the results
on both the validation and test sets demonstrate that our method yields
substantial improvements compared with the baseline method. The code is
available at \Url{https://github.com/skyshoumeng/M2SKD}.
| no_new_dataset | 0.710672 |
2304.14802 | Shufang Xie | Shufang Xie, Huishuai Zhang, Junliang Guo, Xu Tan, Jiang Bian, Hany
Hassan Awadalla, Arul Menezes, Tao Qin, Rui Yan | ResiDual: Transformer with Dual Residual Connections | null | null | null | null | cs.CL cs.AI cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transformer networks have become the preferred architecture for many tasks
due to their state-of-the-art performance. However, the optimal way to
implement residual connections in Transformer, which are essential for
effective training, is still debated. Two widely used variants are the
Post-Layer-Normalization (Post-LN) and Pre-Layer-Normalization (Pre-LN)
Transformers, which apply layer normalization after each residual block's
output or before each residual block's input, respectively. While both variants
enjoy their advantages, they also suffer from severe limitations: Post-LN
causes gradient vanishing issue that hinders training deep Transformers, and
Pre-LN causes representation collapse issue that limits model capacity. In this
paper, we propose ResiDual, a novel Transformer architecture with Pre-Post-LN
(PPLN), which fuses the connections in Post-LN and Pre-LN together and inherits
their advantages while avoids their limitations. We conduct both theoretical
analyses and empirical experiments to verify the effectiveness of ResiDual.
Theoretically, we prove that ResiDual has a lower bound on the gradient to
avoid the vanishing issue due to the residual connection from Pre-LN. Moreover,
ResiDual also has diverse model representations to avoid the collapse issue due
to the residual connection from Post-LN. Empirically, ResiDual outperforms both
Post-LN and Pre-LN on several machine translation benchmarks across different
network depths and data sizes. Thanks to the good theoretical and empirical
performance, ResiDual Transformer can serve as a foundation architecture for
different AI models (e.g., large language models). Our code is available at
https://github.com/microsoft/ResiDual.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:19:47 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Xie",
"Shufang",
""
],
[
"Zhang",
"Huishuai",
""
],
[
"Guo",
"Junliang",
""
],
[
"Tan",
"Xu",
""
],
[
"Bian",
"Jiang",
""
],
[
"Awadalla",
"Hany Hassan",
""
],
[
"Menezes",
"Arul",
""
],
[
"Qin",
"Tao",
""
],
[
"Yan",
"Rui",
""
]
] | TITLE: ResiDual: Transformer with Dual Residual Connections
ABSTRACT: Transformer networks have become the preferred architecture for many tasks
due to their state-of-the-art performance. However, the optimal way to
implement residual connections in Transformer, which are essential for
effective training, is still debated. Two widely used variants are the
Post-Layer-Normalization (Post-LN) and Pre-Layer-Normalization (Pre-LN)
Transformers, which apply layer normalization after each residual block's
output or before each residual block's input, respectively. While both variants
enjoy their advantages, they also suffer from severe limitations: Post-LN
causes gradient vanishing issue that hinders training deep Transformers, and
Pre-LN causes representation collapse issue that limits model capacity. In this
paper, we propose ResiDual, a novel Transformer architecture with Pre-Post-LN
(PPLN), which fuses the connections in Post-LN and Pre-LN together and inherits
their advantages while avoids their limitations. We conduct both theoretical
analyses and empirical experiments to verify the effectiveness of ResiDual.
Theoretically, we prove that ResiDual has a lower bound on the gradient to
avoid the vanishing issue due to the residual connection from Pre-LN. Moreover,
ResiDual also has diverse model representations to avoid the collapse issue due
to the residual connection from Post-LN. Empirically, ResiDual outperforms both
Post-LN and Pre-LN on several machine translation benchmarks across different
network depths and data sizes. Thanks to the good theoretical and empirical
performance, ResiDual Transformer can serve as a foundation architecture for
different AI models (e.g., large language models). Our code is available at
https://github.com/microsoft/ResiDual.
| no_new_dataset | 0.709416 |
2304.14803 | Elisa Leonardelli | Elisa Leonardelli, Alexandra Uma, Gavin Abercrombie, Dina Almanea,
Valerio Basile, Tommaso Fornaciari, Barbara Plank, Verena Rieser, Massimo
Poesio | SemEval-2023 Task 11: Learning With Disagreements (LeWiDi) | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | NLP datasets annotated with human judgments are rife with disagreements
between the judges. This is especially true for tasks depending on subjective
judgments such as sentiment analysis or offensive language detection.
Particularly in these latter cases, the NLP community has come to realize that
the approach of 'reconciling' these different subjective interpretations is
inappropriate. Many NLP researchers have therefore concluded that rather than
eliminating disagreements from annotated corpora, we should preserve
them-indeed, some argue that corpora should aim to preserve all annotator
judgments. But this approach to corpus creation for NLP has not yet been widely
accepted. The objective of the LeWiDi series of shared tasks is to promote this
approach to developing NLP models by providing a unified framework for training
and evaluating with such datasets. We report on the second LeWiDi shared task,
which differs from the first edition in three crucial respects: (i) it focuses
entirely on NLP, instead of both NLP and computer vision tasks in its first
edition; (ii) it focuses on subjective tasks, instead of covering different
types of disagreements-as training with aggregated labels for subjective NLP
tasks is a particularly obvious misrepresentation of the data; and (iii) for
the evaluation, we concentrate on soft approaches to evaluation. This second
edition of LeWiDi attracted a wide array of participants resulting in 13 shared
task submission papers.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 12:20:35 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Leonardelli",
"Elisa",
""
],
[
"Uma",
"Alexandra",
""
],
[
"Abercrombie",
"Gavin",
""
],
[
"Almanea",
"Dina",
""
],
[
"Basile",
"Valerio",
""
],
[
"Fornaciari",
"Tommaso",
""
],
[
"Plank",
"Barbara",
""
],
[
"Rieser",
"Verena",
""
],
[
"Poesio",
"Massimo",
""
]
] | TITLE: SemEval-2023 Task 11: Learning With Disagreements (LeWiDi)
ABSTRACT: NLP datasets annotated with human judgments are rife with disagreements
between the judges. This is especially true for tasks depending on subjective
judgments such as sentiment analysis or offensive language detection.
Particularly in these latter cases, the NLP community has come to realize that
the approach of 'reconciling' these different subjective interpretations is
inappropriate. Many NLP researchers have therefore concluded that rather than
eliminating disagreements from annotated corpora, we should preserve
them-indeed, some argue that corpora should aim to preserve all annotator
judgments. But this approach to corpus creation for NLP has not yet been widely
accepted. The objective of the LeWiDi series of shared tasks is to promote this
approach to developing NLP models by providing a unified framework for training
and evaluating with such datasets. We report on the second LeWiDi shared task,
which differs from the first edition in three crucial respects: (i) it focuses
entirely on NLP, instead of both NLP and computer vision tasks in its first
edition; (ii) it focuses on subjective tasks, instead of covering different
types of disagreements-as training with aggregated labels for subjective NLP
tasks is a particularly obvious misrepresentation of the data; and (iii) for
the evaluation, we concentrate on soft approaches to evaluation. This second
edition of LeWiDi attracted a wide array of participants resulting in 13 shared
task submission papers.
| no_new_dataset | 0.707556 |
2304.14856 | Jiangui Chen | Jiangui Chen, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Yiqun Liu,
Yixing Fan, Xueqi Cheng | A Unified Generative Retriever for Knowledge-Intensive Language Tasks
via Prompt Learning | Accepted by SIGIR 2023 | null | 10.1145/3539618.3591631 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge-intensive language tasks (KILTs) benefit from retrieving
high-quality relevant contexts from large external knowledge corpora. Learning
task-specific retrievers that return relevant contexts at an appropriate level
of semantic granularity, such as a document retriever, passage retriever,
sentence retriever, and entity retriever, may help to achieve better
performance on the end-to-end task. But a task-specific retriever usually has
poor generalization ability to new domains and tasks, and it may be costly to
deploy a variety of specialised retrievers in practice. We propose a unified
generative retriever (UGR) that combines task-specific effectiveness with
robust performance over different retrieval tasks in KILTs. To achieve this
goal, we make two major contributions: (i) To unify different retrieval tasks
into a single generative form, we introduce an n-gram-based identifier for
relevant contexts at different levels of granularity in KILTs. And (ii) to
address different retrieval tasks with a single model, we employ a prompt
learning strategy and investigate three methods to design prompt tokens for
each task. In this way, the proposed UGR model can not only share common
knowledge across tasks for better generalization, but also perform different
retrieval tasks effectively by distinguishing task-specific characteristics. We
train UGR on a heterogeneous set of retrieval corpora with well-designed
prompts in a supervised and multi-task fashion. Experimental results on the
KILT benchmark demonstrate the effectiveness of UGR on in-domain datasets,
out-of-domain datasets, and unseen tasks.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 14:08:08 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Chen",
"Jiangui",
""
],
[
"Zhang",
"Ruqing",
""
],
[
"Guo",
"Jiafeng",
""
],
[
"de Rijke",
"Maarten",
""
],
[
"Liu",
"Yiqun",
""
],
[
"Fan",
"Yixing",
""
],
[
"Cheng",
"Xueqi",
""
]
] | TITLE: A Unified Generative Retriever for Knowledge-Intensive Language Tasks
via Prompt Learning
ABSTRACT: Knowledge-intensive language tasks (KILTs) benefit from retrieving
high-quality relevant contexts from large external knowledge corpora. Learning
task-specific retrievers that return relevant contexts at an appropriate level
of semantic granularity, such as a document retriever, passage retriever,
sentence retriever, and entity retriever, may help to achieve better
performance on the end-to-end task. But a task-specific retriever usually has
poor generalization ability to new domains and tasks, and it may be costly to
deploy a variety of specialised retrievers in practice. We propose a unified
generative retriever (UGR) that combines task-specific effectiveness with
robust performance over different retrieval tasks in KILTs. To achieve this
goal, we make two major contributions: (i) To unify different retrieval tasks
into a single generative form, we introduce an n-gram-based identifier for
relevant contexts at different levels of granularity in KILTs. And (ii) to
address different retrieval tasks with a single model, we employ a prompt
learning strategy and investigate three methods to design prompt tokens for
each task. In this way, the proposed UGR model can not only share common
knowledge across tasks for better generalization, but also perform different
retrieval tasks effectively by distinguishing task-specific characteristics. We
train UGR on a heterogeneous set of retrieval corpora with well-designed
prompts in a supervised and multi-task fashion. Experimental results on the
KILT benchmark demonstrate the effectiveness of UGR on in-domain datasets,
out-of-domain datasets, and unseen tasks.
| no_new_dataset | 0.709598 |
2304.14874 | Linqing Zhao | Yuejian Wu, Linqing Zhao, Jiwen Lu, Haibin Yan | Dense Hybrid Proposal Modulation for Lane Detection | Accepted by T-CSVT | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a dense hybrid proposal modulation (DHPM) method
for lane detection. Most existing methods perform sparse supervision on a
subset of high-scoring proposals, while other proposals fail to obtain
effective shape and location guidance, resulting in poor overall quality. To
address this, we densely modulate all proposals to generate topologically and
spatially high-quality lane predictions with discriminative representations.
Specifically, we first ensure that lane proposals are physically meaningful by
applying single-lane shape and location constraints. Benefitting from the
proposed proposal-to-label matching algorithm, we assign each proposal a target
ground truth lane to efficiently learn from spatial layout priors. To enhance
the generalization and model the inter-proposal relations, we diversify the
shape difference of proposals matching the same ground-truth lane. In addition
to the shape and location constraints, we design a quality-aware classification
loss to adaptively supervise each positive proposal so that the discriminative
power can be further boosted. Our DHPM achieves very competitive performances
on four popular benchmark datasets. Moreover, we consistently outperform the
baseline model on most metrics without introducing new parameters and reducing
inference speed.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 14:31:11 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Wu",
"Yuejian",
""
],
[
"Zhao",
"Linqing",
""
],
[
"Lu",
"Jiwen",
""
],
[
"Yan",
"Haibin",
""
]
] | TITLE: Dense Hybrid Proposal Modulation for Lane Detection
ABSTRACT: In this paper, we present a dense hybrid proposal modulation (DHPM) method
for lane detection. Most existing methods perform sparse supervision on a
subset of high-scoring proposals, while other proposals fail to obtain
effective shape and location guidance, resulting in poor overall quality. To
address this, we densely modulate all proposals to generate topologically and
spatially high-quality lane predictions with discriminative representations.
Specifically, we first ensure that lane proposals are physically meaningful by
applying single-lane shape and location constraints. Benefitting from the
proposed proposal-to-label matching algorithm, we assign each proposal a target
ground truth lane to efficiently learn from spatial layout priors. To enhance
the generalization and model the inter-proposal relations, we diversify the
shape difference of proposals matching the same ground-truth lane. In addition
to the shape and location constraints, we design a quality-aware classification
loss to adaptively supervise each positive proposal so that the discriminative
power can be further boosted. Our DHPM achieves very competitive performances
on four popular benchmark datasets. Moreover, we consistently outperform the
baseline model on most metrics without introducing new parameters and reducing
inference speed.
| no_new_dataset | 0.709585 |
2304.14908 | Mingxuan Zhu | Mingxuan Zhu, Dan Hao and Junjie Chen | Compiler Auto-tuning through Multiple Phase Learning | null | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Widely used compilers like GCC and LLVM usually have hundreds of
optimizations controlled by optimization flags, which are enabled or disabled
during compilation to improve runtime performance (e.g., small execution time)
of the compiler program. Due to the large number of optimization flags and
their combination, it is difficult for compiler users to manually tune compiler
optimization flags. In the literature, a number of auto-tuning techniques have
been proposed, which tune optimization flags for a compiled program by
comparing its actual runtime performance with different optimization flag
combination. Due to the huge search space and heavy actual runtime cost, these
techniques suffer from the widely-recognized efficiency problem. To reduce the
heavy runtime cost, in this paper we propose a lightweight learning approach
which uses a small number of actual runtime performance data to predict the
runtime performance of a compiled program with various optimization flag
combination. Furthermore, to reduce the search space, we design a novel
particle swarm algorithm which tunes compiler optimization flags with the
prediction model. To evaluate the performance of the proposed approach
CompTuner, we conduct an extensive experimental study on two popular C
compilers GCC and LLVM with two widely used benchmarks cBench and PolyBench.
The experimental results show that CompTuner significantly outperforms the five
compared techniques, including the state-of-art technique BOCA.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 04:41:36 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhu",
"Mingxuan",
""
],
[
"Hao",
"Dan",
""
],
[
"Chen",
"Junjie",
""
]
] | TITLE: Compiler Auto-tuning through Multiple Phase Learning
ABSTRACT: Widely used compilers like GCC and LLVM usually have hundreds of
optimizations controlled by optimization flags, which are enabled or disabled
during compilation to improve runtime performance (e.g., small execution time)
of the compiler program. Due to the large number of optimization flags and
their combination, it is difficult for compiler users to manually tune compiler
optimization flags. In the literature, a number of auto-tuning techniques have
been proposed, which tune optimization flags for a compiled program by
comparing its actual runtime performance with different optimization flag
combination. Due to the huge search space and heavy actual runtime cost, these
techniques suffer from the widely-recognized efficiency problem. To reduce the
heavy runtime cost, in this paper we propose a lightweight learning approach
which uses a small number of actual runtime performance data to predict the
runtime performance of a compiled program with various optimization flag
combination. Furthermore, to reduce the search space, we design a novel
particle swarm algorithm which tunes compiler optimization flags with the
prediction model. To evaluate the performance of the proposed approach
CompTuner, we conduct an extensive experimental study on two popular C
compilers GCC and LLVM with two widely used benchmarks cBench and PolyBench.
The experimental results show that CompTuner significantly outperforms the five
compared techniques, including the state-of-art technique BOCA.
| no_new_dataset | 0.708792 |
2304.14912 | Maximilien Burq | Maximilien Burq and Niranjan Sridhar | Human Activity Recognition Using Self-Supervised Representations of
Wearable Data | this article expands work introduced in arXiv:2112.12272 | null | null | null | eess.SP cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Automated and accurate human activity recognition (HAR) using body-worn
sensors enables practical and cost efficient remote monitoring of Activity of
DailyLiving (ADL), which are shown to provide clinical insights across multiple
therapeutic areas. Development of accurate algorithms for human activity
recognition(HAR) is hindered by the lack of large real-world labeled datasets.
Furthermore, algorithms seldom work beyond the specific sensor on which they
are prototyped, prompting debate about whether accelerometer-based HAR is even
possible [Tong et al., 2020]. Here we develop a 6-class HAR model with strong
performance when evaluated on real-world datasets not seen during training. Our
model is based on a frozen self-supervised representation learned on a large
unlabeled dataset, combined with a shallow multi-layer perceptron with temporal
smoothing. The model obtains in-dataset state-of-the art performance on the
Capture24 dataset ($\kappa= 0.86$). Out-of-distribution (OOD) performance is
$\kappa = 0.7$, with both the representation and the perceptron models being
trained on data from a different sensor. This work represents a key step
towards device-agnostic HAR models, which can help contribute to increased
standardization of model evaluation in the HAR field.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 07:33:54 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Burq",
"Maximilien",
""
],
[
"Sridhar",
"Niranjan",
""
]
] | TITLE: Human Activity Recognition Using Self-Supervised Representations of
Wearable Data
ABSTRACT: Automated and accurate human activity recognition (HAR) using body-worn
sensors enables practical and cost efficient remote monitoring of Activity of
DailyLiving (ADL), which are shown to provide clinical insights across multiple
therapeutic areas. Development of accurate algorithms for human activity
recognition(HAR) is hindered by the lack of large real-world labeled datasets.
Furthermore, algorithms seldom work beyond the specific sensor on which they
are prototyped, prompting debate about whether accelerometer-based HAR is even
possible [Tong et al., 2020]. Here we develop a 6-class HAR model with strong
performance when evaluated on real-world datasets not seen during training. Our
model is based on a frozen self-supervised representation learned on a large
unlabeled dataset, combined with a shallow multi-layer perceptron with temporal
smoothing. The model obtains in-dataset state-of-the art performance on the
Capture24 dataset ($\kappa= 0.86$). Out-of-distribution (OOD) performance is
$\kappa = 0.7$, with both the representation and the perceptron models being
trained on data from a different sensor. This work represents a key step
towards device-agnostic HAR models, which can help contribute to increased
standardization of model evaluation in the HAR field.
| no_new_dataset | 0.711205 |
2304.14919 | Ruizhe Zheng | Ruizhe Zheng, Jun Li, Yi Wang, Tian Luo, Yuguo Yu | ScatterFormer: Locally-Invariant Scattering Transformer for
Patient-Independent Multispectral Detection of Epileptiform Discharges | 11 pages | Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI
2023) | null | null | eess.SP cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Patient-independent detection of epileptic activities based on visual
spectral representation of continuous EEG (cEEG) has been widely used for
diagnosing epilepsy. However, precise detection remains a considerable
challenge due to subtle variabilities across subjects, channels and time
points. Thus, capturing fine-grained, discriminative features of EEG patterns,
which is associated with high-frequency textural information, is yet to be
resolved. In this work, we propose Scattering Transformer (ScatterFormer), an
invariant scattering transform-based hierarchical Transformer that specifically
pays attention to subtle features. In particular, the disentangled
frequency-aware attention (FAA) enables the Transformer to capture clinically
informative high-frequency components, offering a novel clinical explainability
based on visual encoding of multichannel EEG signals. Evaluations on two
distinct tasks of epileptiform detection demonstrate the effectiveness our
method. Our proposed model achieves median AUCROC and accuracy of 98.14%,
96.39% in patients with Rolandic epilepsy. On a neonatal seizure detection
benchmark, it outperforms the state-of-the-art by 9% in terms of average
AUCROC.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 10:10:58 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zheng",
"Ruizhe",
""
],
[
"Li",
"Jun",
""
],
[
"Wang",
"Yi",
""
],
[
"Luo",
"Tian",
""
],
[
"Yu",
"Yuguo",
""
]
] | TITLE: ScatterFormer: Locally-Invariant Scattering Transformer for
Patient-Independent Multispectral Detection of Epileptiform Discharges
ABSTRACT: Patient-independent detection of epileptic activities based on visual
spectral representation of continuous EEG (cEEG) has been widely used for
diagnosing epilepsy. However, precise detection remains a considerable
challenge due to subtle variabilities across subjects, channels and time
points. Thus, capturing fine-grained, discriminative features of EEG patterns,
which is associated with high-frequency textural information, is yet to be
resolved. In this work, we propose Scattering Transformer (ScatterFormer), an
invariant scattering transform-based hierarchical Transformer that specifically
pays attention to subtle features. In particular, the disentangled
frequency-aware attention (FAA) enables the Transformer to capture clinically
informative high-frequency components, offering a novel clinical explainability
based on visual encoding of multichannel EEG signals. Evaluations on two
distinct tasks of epileptiform detection demonstrate the effectiveness our
method. Our proposed model achieves median AUCROC and accuracy of 98.14%,
96.39% in patients with Rolandic epilepsy. On a neonatal seizure detection
benchmark, it outperforms the state-of-the-art by 9% in terms of average
AUCROC.
| no_new_dataset | 0.709585 |
2304.14920 | Xinliang Zhou | Xinliang Zhou, Dan Lin, Ziyu Jia, Jiaping Xiao, Chenyu Liu, Liming
Zhai and Yang Liu | An EEG Channel Selection Framework for Driver Drowsiness Detection via
Interpretability Guidance | null | null | null | null | eess.SP cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Drowsy driving has a crucial influence on driving safety, creating an urgent
demand for driver drowsiness detection. Electroencephalogram (EEG) signal can
accurately reflect the mental fatigue state and thus has been widely studied in
drowsiness monitoring. However, the raw EEG data is inherently noisy and
redundant, which is neglected by existing works that just use single-channel
EEG data or full-head channel EEG data for model training, resulting in limited
performance of driver drowsiness detection. In this paper, we are the first to
propose an Interpretability-guided Channel Selection (ICS) framework for the
driver drowsiness detection task. Specifically, we design a two-stage training
strategy to progressively select the key contributing channels with the
guidance of interpretability. We first train a teacher network in the first
stage using full-head channel EEG data. Then we apply the class activation
mapping (CAM) to the trained teacher model to highlight the high-contributing
EEG channels and further propose a channel voting scheme to select the top N
contributing EEG channels. Finally, we train a student network with the
selected channels of EEG data in the second stage for driver drowsiness
detection. Experiments are designed on a public dataset, and the results
demonstrate that our method is highly applicable and can significantly improve
the performance of cross-subject driver drowsiness detection.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 13:24:37 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhou",
"Xinliang",
""
],
[
"Lin",
"Dan",
""
],
[
"Jia",
"Ziyu",
""
],
[
"Xiao",
"Jiaping",
""
],
[
"Liu",
"Chenyu",
""
],
[
"Zhai",
"Liming",
""
],
[
"Liu",
"Yang",
""
]
] | TITLE: An EEG Channel Selection Framework for Driver Drowsiness Detection via
Interpretability Guidance
ABSTRACT: Drowsy driving has a crucial influence on driving safety, creating an urgent
demand for driver drowsiness detection. Electroencephalogram (EEG) signal can
accurately reflect the mental fatigue state and thus has been widely studied in
drowsiness monitoring. However, the raw EEG data is inherently noisy and
redundant, which is neglected by existing works that just use single-channel
EEG data or full-head channel EEG data for model training, resulting in limited
performance of driver drowsiness detection. In this paper, we are the first to
propose an Interpretability-guided Channel Selection (ICS) framework for the
driver drowsiness detection task. Specifically, we design a two-stage training
strategy to progressively select the key contributing channels with the
guidance of interpretability. We first train a teacher network in the first
stage using full-head channel EEG data. Then we apply the class activation
mapping (CAM) to the trained teacher model to highlight the high-contributing
EEG channels and further propose a channel voting scheme to select the top N
contributing EEG channels. Finally, we train a student network with the
selected channels of EEG data in the second stage for driver drowsiness
detection. Experiments are designed on a public dataset, and the results
demonstrate that our method is highly applicable and can significantly improve
the performance of cross-subject driver drowsiness detection.
| no_new_dataset | 0.709837 |
2304.14936 | Seif Laatiri SL | Seif Laatiri, Pirashanth Ratnamogan, Joel Tang, Laurent Lam, William
Vanhuffel, Fabien Caspani | Information Redundancy and Biases in Public Document Information
Extraction Benchmarks | 15 pages, ICDAR 2023 (17th International Conference on Document
Analysis and Recognition) | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Advances in the Visually-rich Document Understanding (VrDU) field and
particularly the Key-Information Extraction (KIE) task are marked with the
emergence of efficient Transformer-based approaches such as the LayoutLM
models. Despite the good performance of KIE models when fine-tuned on public
benchmarks, they still struggle to generalize on complex real-life use-cases
lacking sufficient document annotations. Our research highlighted that KIE
standard benchmarks such as SROIE and FUNSD contain significant similarity
between training and testing documents and can be adjusted to better evaluate
the generalization of models. In this work, we designed experiments to quantify
the information redundancy in public benchmarks, revealing a 75% template
replication in SROIE official test set and 16% in FUNSD. We also proposed
resampling strategies to provide benchmarks more representative of the
generalization ability of models. We showed that models not suited for document
analysis struggle on the adjusted splits dropping on average 10,5% F1 score on
SROIE and 3.5% on FUNSD compared to multi-modal models dropping only 7,5% F1 on
SROIE and 0.5% F1 on FUNSD.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 15:48:26 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Laatiri",
"Seif",
""
],
[
"Ratnamogan",
"Pirashanth",
""
],
[
"Tang",
"Joel",
""
],
[
"Lam",
"Laurent",
""
],
[
"Vanhuffel",
"William",
""
],
[
"Caspani",
"Fabien",
""
]
] | TITLE: Information Redundancy and Biases in Public Document Information
Extraction Benchmarks
ABSTRACT: Advances in the Visually-rich Document Understanding (VrDU) field and
particularly the Key-Information Extraction (KIE) task are marked with the
emergence of efficient Transformer-based approaches such as the LayoutLM
models. Despite the good performance of KIE models when fine-tuned on public
benchmarks, they still struggle to generalize on complex real-life use-cases
lacking sufficient document annotations. Our research highlighted that KIE
standard benchmarks such as SROIE and FUNSD contain significant similarity
between training and testing documents and can be adjusted to better evaluate
the generalization of models. In this work, we designed experiments to quantify
the information redundancy in public benchmarks, revealing a 75% template
replication in SROIE official test set and 16% in FUNSD. We also proposed
resampling strategies to provide benchmarks more representative of the
generalization ability of models. We showed that models not suited for document
analysis struggle on the adjusted splits dropping on average 10,5% F1 score on
SROIE and 3.5% on FUNSD compared to multi-modal models dropping only 7,5% F1 on
SROIE and 0.5% F1 on FUNSD.
| no_new_dataset | 0.707967 |
2304.14942 | Fabio Carrara PhD | Alessio Serra, Fabio Carrara, Maurizio Tesconi and Fabrizio Falchi | The Emotions of the Crowd: Learning Image Sentiment from Tweets via
Cross-modal Distillation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Trends and opinion mining in social media increasingly focus on novel
interactions involving visual media, like images and short videos, in addition
to text. In this work, we tackle the problem of visual sentiment analysis of
social media images -- specifically, the prediction of image sentiment
polarity. While previous work relied on manually labeled training sets, we
propose an automated approach for building sentiment polarity classifiers based
on a cross-modal distillation paradigm; starting from scraped multimodal (text
+ images) data, we train a student model on the visual modality based on the
outputs of a textual teacher model that analyses the sentiment of the
corresponding textual modality. We applied our method to randomly collected
images crawled from Twitter over three months and produced, after automatic
cleaning, a weakly-labeled dataset of $\sim$1.5 million images. Despite
exploiting noisy labeled samples, our training pipeline produces classifiers
showing strong generalization capabilities and outperforming the current state
of the art on five manually labeled benchmarks for image sentiment polarity
prediction.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 15:56:02 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Serra",
"Alessio",
""
],
[
"Carrara",
"Fabio",
""
],
[
"Tesconi",
"Maurizio",
""
],
[
"Falchi",
"Fabrizio",
""
]
] | TITLE: The Emotions of the Crowd: Learning Image Sentiment from Tweets via
Cross-modal Distillation
ABSTRACT: Trends and opinion mining in social media increasingly focus on novel
interactions involving visual media, like images and short videos, in addition
to text. In this work, we tackle the problem of visual sentiment analysis of
social media images -- specifically, the prediction of image sentiment
polarity. While previous work relied on manually labeled training sets, we
propose an automated approach for building sentiment polarity classifiers based
on a cross-modal distillation paradigm; starting from scraped multimodal (text
+ images) data, we train a student model on the visual modality based on the
outputs of a textual teacher model that analyses the sentiment of the
corresponding textual modality. We applied our method to randomly collected
images crawled from Twitter over three months and produced, after automatic
cleaning, a weakly-labeled dataset of $\sim$1.5 million images. Despite
exploiting noisy labeled samples, our training pipeline produces classifiers
showing strong generalization capabilities and outperforming the current state
of the art on five manually labeled benchmarks for image sentiment polarity
prediction.
| new_dataset | 0.713201 |
2304.14956 | Max Champneys | Max D. Champneys and Timothy J. Rogers | PAO: A general particle swarm algorithm with exact dynamics and
closed-form transition densities | Preprint | null | null | null | cs.NE cs.LG math.OC | http://creativecommons.org/licenses/by/4.0/ | A great deal of research has been conducted in the consideration of
meta-heuristic optimisation methods that are able to find global optima in
settings that gradient based optimisers have traditionally struggled. Of these,
so-called particle swarm optimisation (PSO) approaches have proven to be highly
effective in a number of application areas. Given the maturity of the PSO
field, it is likely that novel variants of the PSO algorithm stand to offer
only marginal gains in terms of performance -- there is, after all, no free
lunch. Instead of only chasing performance on suites of benchmark optimisation
functions, it is argued herein that research effort is better placed in the
pursuit of algorithms that also have other useful properties. In this work, a
highly-general, interpretable variant of the PSO algorithm -- particle
attractor algorithm (PAO) -- is proposed. Furthermore, the algorithm is
designed such that the transition densities (describing the motions of the
particles from one generation to the next) can be computed exactly in closed
form for each step. Access to closed-form transition densities has important
ramifications for the closely-related field of Sequential Monte Carlo (SMC). In
order to demonstrate that the useful properties do not come at the cost of
performance, PAO is compared to several other state-of-the art heuristic
optimisation algorithms in a benchmark comparison study.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 16:19:27 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Champneys",
"Max D.",
""
],
[
"Rogers",
"Timothy J.",
""
]
] | TITLE: PAO: A general particle swarm algorithm with exact dynamics and
closed-form transition densities
ABSTRACT: A great deal of research has been conducted in the consideration of
meta-heuristic optimisation methods that are able to find global optima in
settings that gradient based optimisers have traditionally struggled. Of these,
so-called particle swarm optimisation (PSO) approaches have proven to be highly
effective in a number of application areas. Given the maturity of the PSO
field, it is likely that novel variants of the PSO algorithm stand to offer
only marginal gains in terms of performance -- there is, after all, no free
lunch. Instead of only chasing performance on suites of benchmark optimisation
functions, it is argued herein that research effort is better placed in the
pursuit of algorithms that also have other useful properties. In this work, a
highly-general, interpretable variant of the PSO algorithm -- particle
attractor algorithm (PAO) -- is proposed. Furthermore, the algorithm is
designed such that the transition densities (describing the motions of the
particles from one generation to the next) can be computed exactly in closed
form for each step. Access to closed-form transition densities has important
ramifications for the closely-related field of Sequential Monte Carlo (SMC). In
order to demonstrate that the useful properties do not come at the cost of
performance, PAO is compared to several other state-of-the art heuristic
optimisation algorithms in a benchmark comparison study.
| no_new_dataset | 0.707803 |
2304.14963 | John Andrew Raine | Malte Algren, Tobias Golling, Manuel Guth, Chris Pollard, John Andrew
Raine | Flow Away your Differences: Conditional Normalizing Flows as an
Improvement to Reweighting | 21 pages, 9 figures | null | null | null | hep-ph cs.LG | http://creativecommons.org/licenses/by/4.0/ | We present an alternative to reweighting techniques for modifying
distributions to account for a desired change in an underlying conditional
distribution, as is often needed to correct for mis-modelling in a simulated
sample. We employ conditional normalizing flows to learn the full conditional
probability distribution from which we sample new events for conditional values
drawn from the target distribution to produce the desired, altered
distribution. In contrast to common reweighting techniques, this procedure is
independent of binning choice and does not rely on an estimate of the density
ratio between two distributions.
In several toy examples we show that normalizing flows outperform reweighting
approaches to match the distribution of the target.We demonstrate that the
corrected distribution closes well with the ground truth, and a statistical
uncertainty on the training dataset can be ascertained with bootstrapping. In
our examples, this leads to a statistical precision up to three times greater
than using reweighting techniques with identical sample sizes for the source
and target distributions. We also explore an application in the context of high
energy particle physics.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 16:33:50 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Algren",
"Malte",
""
],
[
"Golling",
"Tobias",
""
],
[
"Guth",
"Manuel",
""
],
[
"Pollard",
"Chris",
""
],
[
"Raine",
"John Andrew",
""
]
] | TITLE: Flow Away your Differences: Conditional Normalizing Flows as an
Improvement to Reweighting
ABSTRACT: We present an alternative to reweighting techniques for modifying
distributions to account for a desired change in an underlying conditional
distribution, as is often needed to correct for mis-modelling in a simulated
sample. We employ conditional normalizing flows to learn the full conditional
probability distribution from which we sample new events for conditional values
drawn from the target distribution to produce the desired, altered
distribution. In contrast to common reweighting techniques, this procedure is
independent of binning choice and does not rely on an estimate of the density
ratio between two distributions.
In several toy examples we show that normalizing flows outperform reweighting
approaches to match the distribution of the target.We demonstrate that the
corrected distribution closes well with the ground truth, and a statistical
uncertainty on the training dataset can be ascertained with bootstrapping. In
our examples, this leads to a statistical precision up to three times greater
than using reweighting techniques with identical sample sizes for the source
and target distributions. We also explore an application in the context of high
energy particle physics.
| no_new_dataset | 0.710584 |
2304.14972 | Anzhu Yu | Xin Chen, Anzhu Yu, Qun Sun, Wenyue Guo, Qing Xu and Bowei Wen | Semi-supervised Road Updating Network (SRUNet): A Deep Learning Method
for Road Updating from Remote Sensing Imagery and Historical Vector Maps | 22 pages, 8 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A road is the skeleton of a city and is a fundamental and important
geographical component. Currently, many countries have built geo-information
databases and gathered large amounts of geographic data. However, with the
extensive construction of infrastructure and rapid expansion of cities,
automatic updating of road data is imperative to maintain the high quality of
current basic geographic information. However, obtaining bi-phase images for
the same area is difficult, and complex post-processing methods are required to
update the existing databases.To solve these problems, we proposed a road
detection method based on semi-supervised learning (SRUNet) specifically for
road-updating applications; in this approach, historical road information was
fused with the latest images to directly obtain the latest state of the
road.Considering that the texture of a road is complex, a multi-branch network,
named the Map Encoding Branch (MEB) was proposed for representation learning,
where the Boundary Enhancement Module (BEM) was used to improve the accuracy of
boundary prediction, and the Residual Refinement Module (RRM) was used to
optimize the prediction results. Further, to fully utilize the limited amount
of label information and to enhance the prediction accuracy on unlabeled
images, we utilized the mean teacher framework as the basic semi-supervised
learning framework and introduced Regional Contrast (ReCo) in our work to
improve the model capacity for distinguishing between the characteristics of
roads and background elements.We applied our method to two datasets. Our model
can effectively improve the performance of a model with fewer labels. Overall,
the proposed SRUNet can provide stable, up-to-date, and reliable prediction
results for a wide range of road renewal tasks.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 16:51:35 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Chen",
"Xin",
""
],
[
"Yu",
"Anzhu",
""
],
[
"Sun",
"Qun",
""
],
[
"Guo",
"Wenyue",
""
],
[
"Xu",
"Qing",
""
],
[
"Wen",
"Bowei",
""
]
] | TITLE: Semi-supervised Road Updating Network (SRUNet): A Deep Learning Method
for Road Updating from Remote Sensing Imagery and Historical Vector Maps
ABSTRACT: A road is the skeleton of a city and is a fundamental and important
geographical component. Currently, many countries have built geo-information
databases and gathered large amounts of geographic data. However, with the
extensive construction of infrastructure and rapid expansion of cities,
automatic updating of road data is imperative to maintain the high quality of
current basic geographic information. However, obtaining bi-phase images for
the same area is difficult, and complex post-processing methods are required to
update the existing databases.To solve these problems, we proposed a road
detection method based on semi-supervised learning (SRUNet) specifically for
road-updating applications; in this approach, historical road information was
fused with the latest images to directly obtain the latest state of the
road.Considering that the texture of a road is complex, a multi-branch network,
named the Map Encoding Branch (MEB) was proposed for representation learning,
where the Boundary Enhancement Module (BEM) was used to improve the accuracy of
boundary prediction, and the Residual Refinement Module (RRM) was used to
optimize the prediction results. Further, to fully utilize the limited amount
of label information and to enhance the prediction accuracy on unlabeled
images, we utilized the mean teacher framework as the basic semi-supervised
learning framework and introduced Regional Contrast (ReCo) in our work to
improve the model capacity for distinguishing between the characteristics of
roads and background elements.We applied our method to two datasets. Our model
can effectively improve the performance of a model with fewer labels. Overall,
the proposed SRUNet can provide stable, up-to-date, and reliable prediction
results for a wide range of road renewal tasks.
| no_new_dataset | 0.712001 |
2304.14987 | Xinjun Zhu | Xinjun Zhu, Yuntao Du, Yuren Mao, Lu Chen, Yujia Hu and Yunjun Gao | Knowledge-refined Denoising Network for Robust Recommendation | null | null | 10.1145/3539618.3591707 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge graph (KG), which contains rich side information, becomes an
essential part to boost the recommendation performance and improve its
explainability. However, existing knowledge-aware recommendation methods
directly perform information propagation on KG and user-item bipartite graph,
ignoring the impacts of \textit{task-irrelevant knowledge propagation} and
\textit{vulnerability to interaction noise}, which limits their performance. To
solve these issues, we propose a robust knowledge-aware recommendation
framework, called \textit{Knowledge-refined Denoising Network} (KRDN), to prune
the task-irrelevant knowledge associations and noisy implicit feedback
simultaneously. KRDN consists of an adaptive knowledge refining strategy and a
contrastive denoising mechanism, which are able to automatically distill
high-quality KG triplets for aggregation and prune noisy implicit feedback
respectively. Besides, we also design the self-adapted loss function and the
gradient estimator for model optimization. The experimental results on three
benchmark datasets demonstrate the effectiveness and robustness of KRDN over
the state-of-the-art knowledge-aware methods like KGIN, MCCLK, and KGCL, and
also outperform robust recommendation models like SGL and SimGCL.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 17:10:16 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Zhu",
"Xinjun",
""
],
[
"Du",
"Yuntao",
""
],
[
"Mao",
"Yuren",
""
],
[
"Chen",
"Lu",
""
],
[
"Hu",
"Yujia",
""
],
[
"Gao",
"Yunjun",
""
]
] | TITLE: Knowledge-refined Denoising Network for Robust Recommendation
ABSTRACT: Knowledge graph (KG), which contains rich side information, becomes an
essential part to boost the recommendation performance and improve its
explainability. However, existing knowledge-aware recommendation methods
directly perform information propagation on KG and user-item bipartite graph,
ignoring the impacts of \textit{task-irrelevant knowledge propagation} and
\textit{vulnerability to interaction noise}, which limits their performance. To
solve these issues, we propose a robust knowledge-aware recommendation
framework, called \textit{Knowledge-refined Denoising Network} (KRDN), to prune
the task-irrelevant knowledge associations and noisy implicit feedback
simultaneously. KRDN consists of an adaptive knowledge refining strategy and a
contrastive denoising mechanism, which are able to automatically distill
high-quality KG triplets for aggregation and prune noisy implicit feedback
respectively. Besides, we also design the self-adapted loss function and the
gradient estimator for model optimization. The experimental results on three
benchmark datasets demonstrate the effectiveness and robustness of KRDN over
the state-of-the-art knowledge-aware methods like KGIN, MCCLK, and KGCL, and
also outperform robust recommendation models like SGL and SimGCL.
| no_new_dataset | 0.708175 |
2304.14999 | George Pu | George Pu, Anirudh Jain, Jihan Yin, Russell Kaplan | Empirical Analysis of the Strengths and Weaknesses of PEFT Techniques
for LLMs | Short paper, ICLR '23 Workshop on Understanding Foundation Models | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | As foundation models continue to exponentially scale in size, efficient
methods of adaptation become increasingly critical. Parameter-efficient
fine-tuning (PEFT), a recent class of techniques that require only modifying a
small percentage of the model parameters, is currently the most popular method
for adapting large language models (LLMs). Several PEFT techniques have
recently been proposed with varying tradeoffs. We provide a comprehensive and
uniform benchmark of various PEFT techniques across a representative LLM, the
FLAN-T5 model, and evaluate model performance across different data scales of
classification and generation datasets. Based on this, we provide a framework
for choosing the optimal fine-tuning techniques given the task type and data
availability. Contrary to popular belief, we also empirically prove that PEFT
techniques converge slower than full tuning in low data scenarios, and posit
the amount of data required for PEFT methods to both perform well and converge
efficiently. Lastly, we further optimize these PEFT techniques by selectively
choosing which parts of the model to train, and find that these techniques can
be applied with significantly fewer parameters while maintaining and even
improving performance.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 17:39:49 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Pu",
"George",
""
],
[
"Jain",
"Anirudh",
""
],
[
"Yin",
"Jihan",
""
],
[
"Kaplan",
"Russell",
""
]
] | TITLE: Empirical Analysis of the Strengths and Weaknesses of PEFT Techniques
for LLMs
ABSTRACT: As foundation models continue to exponentially scale in size, efficient
methods of adaptation become increasingly critical. Parameter-efficient
fine-tuning (PEFT), a recent class of techniques that require only modifying a
small percentage of the model parameters, is currently the most popular method
for adapting large language models (LLMs). Several PEFT techniques have
recently been proposed with varying tradeoffs. We provide a comprehensive and
uniform benchmark of various PEFT techniques across a representative LLM, the
FLAN-T5 model, and evaluate model performance across different data scales of
classification and generation datasets. Based on this, we provide a framework
for choosing the optimal fine-tuning techniques given the task type and data
availability. Contrary to popular belief, we also empirically prove that PEFT
techniques converge slower than full tuning in low data scenarios, and posit
the amount of data required for PEFT methods to both perform well and converge
efficiently. Lastly, we further optimize these PEFT techniques by selectively
choosing which parts of the model to train, and find that these techniques can
be applied with significantly fewer parameters while maintaining and even
improving performance.
| no_new_dataset | 0.707847 |
2304.15010 | Renrui Zhang | Peng Gao, Jiaming Han, Renrui Zhang, Ziyi Lin, Shijie Geng, Aojun
Zhou, Wei Zhang, Pan Lu, Conghui He, Xiangyu Yue, Hongsheng Li, Yu Qiao | LLaMA-Adapter V2: Parameter-Efficient Visual Instruction Model | Code and models are available at
https://github.com/ZrrSkywalker/LLaMA-Adapter | null | null | null | cs.CV cs.AI cs.CL cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | How to efficiently transform large language models (LLMs) into instruction
followers is recently a popular research direction, while training LLM for
multi-modal reasoning remains less explored. Although the recent LLaMA-Adapter
demonstrates the potential to handle visual inputs with LLMs, it still cannot
generalize well to open-ended visual instructions and lags behind GPT-4. In
this paper, we present LLaMA-Adapter V2, a parameter-efficient visual
instruction model. Specifically, we first augment LLaMA-Adapter by unlocking
more learnable parameters (e.g., norm, bias and scale), which distribute the
instruction-following ability across the entire LLaMA model besides adapters.
Secondly, we propose an early fusion strategy to feed visual tokens only into
the early LLM layers, contributing to better visual knowledge incorporation.
Thirdly, a joint training paradigm of image-text pairs and
instruction-following data is introduced by optimizing disjoint groups of
learnable parameters. This strategy effectively alleviates the interference
between the two tasks of image-text alignment and instruction following and
achieves strong multi-modal reasoning with only a small-scale image-text and
instruction dataset. During inference, we incorporate additional expert models
(e.g. captioning/OCR systems) into LLaMA-Adapter to further enhance its image
understanding capability without incurring training costs. Compared to the
original LLaMA-Adapter, our LLaMA-Adapter V2 can perform open-ended multi-modal
instructions by merely introducing 14M parameters over LLaMA. The newly
designed framework also exhibits stronger language-only instruction-following
capabilities and even excels in chat interactions. Our code and models are
available at https://github.com/ZrrSkywalker/LLaMA-Adapter.
| [
{
"version": "v1",
"created": "Fri, 28 Apr 2023 17:59:25 GMT"
}
] | 2023-05-01T00:00:00 | [
[
"Gao",
"Peng",
""
],
[
"Han",
"Jiaming",
""
],
[
"Zhang",
"Renrui",
""
],
[
"Lin",
"Ziyi",
""
],
[
"Geng",
"Shijie",
""
],
[
"Zhou",
"Aojun",
""
],
[
"Zhang",
"Wei",
""
],
[
"Lu",
"Pan",
""
],
[
"He",
"Conghui",
""
],
[
"Yue",
"Xiangyu",
""
],
[
"Li",
"Hongsheng",
""
],
[
"Qiao",
"Yu",
""
]
] | TITLE: LLaMA-Adapter V2: Parameter-Efficient Visual Instruction Model
ABSTRACT: How to efficiently transform large language models (LLMs) into instruction
followers is recently a popular research direction, while training LLM for
multi-modal reasoning remains less explored. Although the recent LLaMA-Adapter
demonstrates the potential to handle visual inputs with LLMs, it still cannot
generalize well to open-ended visual instructions and lags behind GPT-4. In
this paper, we present LLaMA-Adapter V2, a parameter-efficient visual
instruction model. Specifically, we first augment LLaMA-Adapter by unlocking
more learnable parameters (e.g., norm, bias and scale), which distribute the
instruction-following ability across the entire LLaMA model besides adapters.
Secondly, we propose an early fusion strategy to feed visual tokens only into
the early LLM layers, contributing to better visual knowledge incorporation.
Thirdly, a joint training paradigm of image-text pairs and
instruction-following data is introduced by optimizing disjoint groups of
learnable parameters. This strategy effectively alleviates the interference
between the two tasks of image-text alignment and instruction following and
achieves strong multi-modal reasoning with only a small-scale image-text and
instruction dataset. During inference, we incorporate additional expert models
(e.g. captioning/OCR systems) into LLaMA-Adapter to further enhance its image
understanding capability without incurring training costs. Compared to the
original LLaMA-Adapter, our LLaMA-Adapter V2 can perform open-ended multi-modal
instructions by merely introducing 14M parameters over LLaMA. The newly
designed framework also exhibits stronger language-only instruction-following
capabilities and even excels in chat interactions. Our code and models are
available at https://github.com/ZrrSkywalker/LLaMA-Adapter.
| no_new_dataset | 0.710804 |
1608.06037 | SeyyedHossein Hasanpour Matikolaee | Seyyed Hossein Hasanpour, Mohammad Rouhani, Mohsen Fayyaz, Mohammad
Sabokrou | Lets keep it simple, Using simple architectures to outperform deeper and
more complex architectures | Added the long-overdue ImageNet results and updated the missed
cifar10/100 results from 2018 | null | null | null | cs.CV cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Major winning Convolutional Neural Networks (CNNs), such as AlexNet, VGGNet,
ResNet, GoogleNet, include tens to hundreds of millions of parameters, which
impose considerable computation and memory overhead. This limits their
practical use for training, optimization and memory efficiency. On the
contrary, light-weight architectures, being proposed to address this issue,
mainly suffer from low accuracy. These inefficiencies mostly stem from
following an ad hoc procedure. We propose a simple architecture, called
SimpleNet, based on a set of designing principles, with which we empirically
show, a well-crafted yet simple and reasonably deep architecture can perform on
par with deeper and more complex architectures. SimpleNet provides a good
tradeoff between the computation/memory efficiency and the accuracy. Our simple
13-layer architecture outperforms most of the deeper and complex architectures
to date such as VGGNet, ResNet, and GoogleNet on several well-known benchmarks
while having 2 to 25 times fewer number of parameters and operations. This
makes it very handy for embedded systems or systems with computational and
memory limitations. We achieved state-of-the-art result on CIFAR10
outperforming several heavier architectures, near state of the art on MNIST and
competitive results on CIFAR100 and SVHN. We also outperformed the much larger
and deeper architectures such as VGGNet and popular variants of ResNets among
others on the ImageNet dataset. Models are made available at:
https://github.com/Coderx7/SimpleNet
| [
{
"version": "v1",
"created": "Mon, 22 Aug 2016 02:50:57 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2016 18:36:14 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Nov 2016 14:08:46 GMT"
},
{
"version": "v4",
"created": "Mon, 15 May 2017 17:30:05 GMT"
},
{
"version": "v5",
"created": "Sat, 6 Jan 2018 19:08:55 GMT"
},
{
"version": "v6",
"created": "Tue, 13 Feb 2018 18:09:24 GMT"
},
{
"version": "v7",
"created": "Wed, 14 Feb 2018 09:19:10 GMT"
},
{
"version": "v8",
"created": "Thu, 27 Apr 2023 16:20:03 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hasanpour",
"Seyyed Hossein",
""
],
[
"Rouhani",
"Mohammad",
""
],
[
"Fayyaz",
"Mohsen",
""
],
[
"Sabokrou",
"Mohammad",
""
]
] | TITLE: Lets keep it simple, Using simple architectures to outperform deeper and
more complex architectures
ABSTRACT: Major winning Convolutional Neural Networks (CNNs), such as AlexNet, VGGNet,
ResNet, GoogleNet, include tens to hundreds of millions of parameters, which
impose considerable computation and memory overhead. This limits their
practical use for training, optimization and memory efficiency. On the
contrary, light-weight architectures, being proposed to address this issue,
mainly suffer from low accuracy. These inefficiencies mostly stem from
following an ad hoc procedure. We propose a simple architecture, called
SimpleNet, based on a set of designing principles, with which we empirically
show, a well-crafted yet simple and reasonably deep architecture can perform on
par with deeper and more complex architectures. SimpleNet provides a good
tradeoff between the computation/memory efficiency and the accuracy. Our simple
13-layer architecture outperforms most of the deeper and complex architectures
to date such as VGGNet, ResNet, and GoogleNet on several well-known benchmarks
while having 2 to 25 times fewer number of parameters and operations. This
makes it very handy for embedded systems or systems with computational and
memory limitations. We achieved state-of-the-art result on CIFAR10
outperforming several heavier architectures, near state of the art on MNIST and
competitive results on CIFAR100 and SVHN. We also outperformed the much larger
and deeper architectures such as VGGNet and popular variants of ResNets among
others on the ImageNet dataset. Models are made available at:
https://github.com/Coderx7/SimpleNet
| no_new_dataset | 0.709655 |
2104.04891 | Qingyong Hu | Qingyong Hu, Bo Yang, Guangchi Fang, Yulan Guo, Ales Leonardis, Niki
Trigoni, Andrew Markham | SQN: Weakly-Supervised Semantic Segmentation of Large-Scale 3D Point
Clouds | ECCV2022 | null | null | null | cs.CV cs.AI cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Labelling point clouds fully is highly time-consuming and costly. As larger
point cloud datasets with billions of points become more common, we ask whether
the full annotation is even necessary, demonstrating that existing baselines
designed under a fully annotated assumption only degrade slightly even when
faced with 1% random point annotations. However, beyond this point, e.g., at
0.1% annotations, segmentation accuracy is unacceptably low. We observe that,
as point clouds are samples of the 3D world, the distribution of points in a
local neighborhood is relatively homogeneous, exhibiting strong semantic
similarity. Motivated by this, we propose a new weak supervision method to
implicitly augment highly sparse supervision signals. Extensive experiments
demonstrate the proposed Semantic Query Network (SQN) achieves promising
performance on seven large-scale open datasets under weak supervision schemes,
while requiring only 0.1% randomly annotated points for training, greatly
reducing annotation cost and effort. The code is available at
https://github.com/QingyongHu/SQN.
| [
{
"version": "v1",
"created": "Sun, 11 Apr 2021 01:29:50 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Mar 2022 04:07:45 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 10:02:23 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hu",
"Qingyong",
""
],
[
"Yang",
"Bo",
""
],
[
"Fang",
"Guangchi",
""
],
[
"Guo",
"Yulan",
""
],
[
"Leonardis",
"Ales",
""
],
[
"Trigoni",
"Niki",
""
],
[
"Markham",
"Andrew",
""
]
] | TITLE: SQN: Weakly-Supervised Semantic Segmentation of Large-Scale 3D Point
Clouds
ABSTRACT: Labelling point clouds fully is highly time-consuming and costly. As larger
point cloud datasets with billions of points become more common, we ask whether
the full annotation is even necessary, demonstrating that existing baselines
designed under a fully annotated assumption only degrade slightly even when
faced with 1% random point annotations. However, beyond this point, e.g., at
0.1% annotations, segmentation accuracy is unacceptably low. We observe that,
as point clouds are samples of the 3D world, the distribution of points in a
local neighborhood is relatively homogeneous, exhibiting strong semantic
similarity. Motivated by this, we propose a new weak supervision method to
implicitly augment highly sparse supervision signals. Extensive experiments
demonstrate the proposed Semantic Query Network (SQN) achieves promising
performance on seven large-scale open datasets under weak supervision schemes,
while requiring only 0.1% randomly annotated points for training, greatly
reducing annotation cost and effort. The code is available at
https://github.com/QingyongHu/SQN.
| no_new_dataset | 0.71086 |
2105.03692 | Charles Jin | Charles Jin, Melinda Sun, Martin Rinard | Incompatibility Clustering as a Defense Against Backdoor Poisoning
Attacks | ICLR 2023. Code is available at
https://github.com/charlesjin/compatibility_clustering/ | null | null | null | cs.LG cs.CR stat.ML | http://creativecommons.org/licenses/by/4.0/ | We propose a novel clustering mechanism based on an incompatibility property
between subsets of data that emerges during model training. This mechanism
partitions the dataset into subsets that generalize only to themselves, i.e.,
training on one subset does not improve performance on the other subsets.
Leveraging the interaction between the dataset and the training process, our
clustering mechanism partitions datasets into clusters that are defined by--and
therefore meaningful to--the objective of the training process.
We apply our clustering mechanism to defend against data poisoning attacks,
in which the attacker injects malicious poisoned data into the training dataset
to affect the trained model's output. Our evaluation focuses on backdoor
attacks against deep neural networks trained to perform image classification
using the GTSRB and CIFAR-10 datasets. Our results show that (1) these attacks
produce poisoned datasets in which the poisoned and clean data are incompatible
and (2) our technique successfully identifies (and removes) the poisoned data.
In an end-to-end evaluation, our defense reduces the attack success rate to
below 1% on 134 out of 165 scenarios, with only a 2% drop in clean accuracy on
CIFAR-10 and a negligible drop in clean accuracy on GTSRB.
| [
{
"version": "v1",
"created": "Sat, 8 May 2021 13:01:42 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Sep 2022 18:34:50 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Oct 2022 15:46:59 GMT"
},
{
"version": "v4",
"created": "Thu, 27 Apr 2023 04:38:45 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Jin",
"Charles",
""
],
[
"Sun",
"Melinda",
""
],
[
"Rinard",
"Martin",
""
]
] | TITLE: Incompatibility Clustering as a Defense Against Backdoor Poisoning
Attacks
ABSTRACT: We propose a novel clustering mechanism based on an incompatibility property
between subsets of data that emerges during model training. This mechanism
partitions the dataset into subsets that generalize only to themselves, i.e.,
training on one subset does not improve performance on the other subsets.
Leveraging the interaction between the dataset and the training process, our
clustering mechanism partitions datasets into clusters that are defined by--and
therefore meaningful to--the objective of the training process.
We apply our clustering mechanism to defend against data poisoning attacks,
in which the attacker injects malicious poisoned data into the training dataset
to affect the trained model's output. Our evaluation focuses on backdoor
attacks against deep neural networks trained to perform image classification
using the GTSRB and CIFAR-10 datasets. Our results show that (1) these attacks
produce poisoned datasets in which the poisoned and clean data are incompatible
and (2) our technique successfully identifies (and removes) the poisoned data.
In an end-to-end evaluation, our defense reduces the attack success rate to
below 1% on 134 out of 165 scenarios, with only a 2% drop in clean accuracy on
CIFAR-10 and a negligible drop in clean accuracy on GTSRB.
| no_new_dataset | 0.710867 |
2110.08866 | Ziqi Zhang | Ziqi Zhang, Yuexiang Li, Hongxin Wei, Kai Ma, Tao Xu, Yefeng Zheng | Alleviating Noisy-label Effects in Image Classification via Probability
Transition Matrix | null | The British Machine Vision Conference (BMVC), 2021 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep-learning-based image classification frameworks often suffer from the
noisy label problem caused by the inter-observer variation. Recent studies
employed learning-to-learn paradigms (e.g., Co-teaching and JoCoR) to filter
the samples with noisy labels from the training set. However, most of them use
a simple cross-entropy loss as the criterion for noisy label identification.
The hard samples, which are beneficial for classifier learning, are often
mistakenly treated as noises in such a setting since both the hard samples and
ones with noisy labels lead to a relatively larger loss value than the easy
cases. In this paper, we propose a plugin module, namely noise ignoring block
(NIB), consisting of a probability transition matrix and an inter-class
correlation (IC) loss, to separate the hard samples from the mislabeled ones,
and further boost the accuracy of image classification network trained with
noisy labels. Concretely, our IC loss is calculated as Kullback-Leibler
divergence between the network prediction and the accumulative soft label
generated by the probability transition matrix. Such that, with the lower value
of IC loss, the hard cases can be easily distinguished from mislabeled cases.
Extensive experiments are conducted on natural and medical image datasets
(CIFAR-10 and ISIC 2019). The experimental results show that our NIB module
consistently improves the performances of the state-of-the-art robust training
methods.
| [
{
"version": "v1",
"created": "Sun, 17 Oct 2021 17:01:57 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Oct 2021 16:56:14 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhang",
"Ziqi",
""
],
[
"Li",
"Yuexiang",
""
],
[
"Wei",
"Hongxin",
""
],
[
"Ma",
"Kai",
""
],
[
"Xu",
"Tao",
""
],
[
"Zheng",
"Yefeng",
""
]
] | TITLE: Alleviating Noisy-label Effects in Image Classification via Probability
Transition Matrix
ABSTRACT: Deep-learning-based image classification frameworks often suffer from the
noisy label problem caused by the inter-observer variation. Recent studies
employed learning-to-learn paradigms (e.g., Co-teaching and JoCoR) to filter
the samples with noisy labels from the training set. However, most of them use
a simple cross-entropy loss as the criterion for noisy label identification.
The hard samples, which are beneficial for classifier learning, are often
mistakenly treated as noises in such a setting since both the hard samples and
ones with noisy labels lead to a relatively larger loss value than the easy
cases. In this paper, we propose a plugin module, namely noise ignoring block
(NIB), consisting of a probability transition matrix and an inter-class
correlation (IC) loss, to separate the hard samples from the mislabeled ones,
and further boost the accuracy of image classification network trained with
noisy labels. Concretely, our IC loss is calculated as Kullback-Leibler
divergence between the network prediction and the accumulative soft label
generated by the probability transition matrix. Such that, with the lower value
of IC loss, the hard cases can be easily distinguished from mislabeled cases.
Extensive experiments are conducted on natural and medical image datasets
(CIFAR-10 and ISIC 2019). The experimental results show that our NIB module
consistently improves the performances of the state-of-the-art robust training
methods.
| no_new_dataset | 0.709849 |
2111.12278 | Tomohiko Hironaka | Tomohiko Hironaka, Takashi Goda | An efficient estimation of nested expectations without conditional
sampling | null | Journal of Computational and Applied Mathematics, Volume 412,
Article 114811, 2023 | 10.1016/j.cam.2022.114811 | null | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Estimating nested expectations is an important task in computational
mathematics and statistics. In this paper we propose a new Monte Carlo method
using post-stratification to estimate nested expectations efficiently without
taking samples of the inner random variable from the conditional distribution
given the outer random variable. This property provides the advantage over many
existing methods that it enables us to estimate nested expectations only with a
dataset on the pair of the inner and outer variables drawn from the joint
distribution. We show an upper bound on the mean squared error of the proposed
method under some assumptions. Numerical experiments are conducted to compare
our proposed method with several existing methods (nested Monte Carlo method,
multilevel Monte Carlo method, and regression-based method), and we see that
our proposed method is superior to the compared methods in terms of efficiency
and applicability.
| [
{
"version": "v1",
"created": "Wed, 24 Nov 2021 05:31:41 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jun 2022 09:53:30 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hironaka",
"Tomohiko",
""
],
[
"Goda",
"Takashi",
""
]
] | TITLE: An efficient estimation of nested expectations without conditional
sampling
ABSTRACT: Estimating nested expectations is an important task in computational
mathematics and statistics. In this paper we propose a new Monte Carlo method
using post-stratification to estimate nested expectations efficiently without
taking samples of the inner random variable from the conditional distribution
given the outer random variable. This property provides the advantage over many
existing methods that it enables us to estimate nested expectations only with a
dataset on the pair of the inner and outer variables drawn from the joint
distribution. We show an upper bound on the mean squared error of the proposed
method under some assumptions. Numerical experiments are conducted to compare
our proposed method with several existing methods (nested Monte Carlo method,
multilevel Monte Carlo method, and regression-based method), and we see that
our proposed method is superior to the compared methods in terms of efficiency
and applicability.
| no_new_dataset | 0.710434 |
2202.09553 | Wei Liu | Wei Liu, Cheng Chen, Rui Jiang, Tao Lu and Zixiang Xiong | Unpaired Quad-Path Cycle Consistent Adversarial Networks for Single
Image Defogging | 13 pages, 11 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Adversarial learning-based image defogging methods have been extensively
studied in computer vision due to their remarkable performance. However, most
existing methods have limited defogging capabilities for real cases because
they are trained on the paired clear and synthesized foggy images of the same
scenes. In addition, they have limitations in preserving vivid color and rich
textual details in defogging. To address these issues, we develop a novel
generative adversarial network, called quad-path cycle consistent adversarial
network (QPC-Net), for single image defogging. QPC-Net consists of a
Fog2Fogfree block and a Fogfree2Fog block. In each block, there are three
learning-based modules, namely, fog removal, color-texture recovery, and fog
synthetic, which sequentially compose dual-path that constrain each other to
generate high quality images. Specifically, the color-texture recovery model is
designed to exploit the self-similarity of texture and structure information by
learning the holistic channel-spatial feature correlations between the foggy
image with its several derived images. Moreover, in the fog synthetic module,
we utilize the atmospheric scattering model to guide it to improve the
generative quality by focusing on an atmospheric light optimization with a
novel sky segmentation network. Extensive experiments on both synthetic and
real-world datasets show that QPC-Net outperforms state-of-the-art defogging
methods in terms of quantitative accuracy and subjective visual quality.
| [
{
"version": "v1",
"created": "Sat, 19 Feb 2022 09:00:37 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Sep 2022 08:38:13 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 02:30:20 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Liu",
"Wei",
""
],
[
"Chen",
"Cheng",
""
],
[
"Jiang",
"Rui",
""
],
[
"Lu",
"Tao",
""
],
[
"Xiong",
"Zixiang",
""
]
] | TITLE: Unpaired Quad-Path Cycle Consistent Adversarial Networks for Single
Image Defogging
ABSTRACT: Adversarial learning-based image defogging methods have been extensively
studied in computer vision due to their remarkable performance. However, most
existing methods have limited defogging capabilities for real cases because
they are trained on the paired clear and synthesized foggy images of the same
scenes. In addition, they have limitations in preserving vivid color and rich
textual details in defogging. To address these issues, we develop a novel
generative adversarial network, called quad-path cycle consistent adversarial
network (QPC-Net), for single image defogging. QPC-Net consists of a
Fog2Fogfree block and a Fogfree2Fog block. In each block, there are three
learning-based modules, namely, fog removal, color-texture recovery, and fog
synthetic, which sequentially compose dual-path that constrain each other to
generate high quality images. Specifically, the color-texture recovery model is
designed to exploit the self-similarity of texture and structure information by
learning the holistic channel-spatial feature correlations between the foggy
image with its several derived images. Moreover, in the fog synthetic module,
we utilize the atmospheric scattering model to guide it to improve the
generative quality by focusing on an atmospheric light optimization with a
novel sky segmentation network. Extensive experiments on both synthetic and
real-world datasets show that QPC-Net outperforms state-of-the-art defogging
methods in terms of quantitative accuracy and subjective visual quality.
| no_new_dataset | 0.71039 |
2203.07281 | Archiki Prasad | Archiki Prasad, Peter Hase, Xiang Zhou, Mohit Bansal | GrIPS: Gradient-free, Edit-based Instruction Search for Prompting Large
Language Models | EACL 2023 (20 pages) | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Providing natural language instructions in prompts is a useful new paradigm
for improving task performance of large language models in a zero-shot setting.
Recent work has aimed to improve such prompts via manual rewriting or
gradient-based tuning. However, manual rewriting is time-consuming and requires
subjective interpretation, while gradient-based tuning can be extremely
computationally demanding for large models and may not be feasible for
API-based models. In this work, we introduce Gradient-free Instructional Prompt
Search (GrIPS), a gradient-free, edit-based search approach for improving task
instructions for large language models. GrIPS takes in instructions designed
for humans and automatically returns an improved, edited prompt, while allowing
for API-based tuning. With InstructGPT models, GrIPS improves the average task
performance by up to 4.30 percentage points on eight classification tasks from
the Natural Instructions dataset (with similar improvements for OPT, BLOOM, and
FLAN-T5). We see improvements for both instruction-only prompts and instruction
+ k-shot examples prompts. Notably, GrIPS outperforms manual rewriting and
purely example-based prompts while controlling for the available compute and
data budget. Further, performance of GrIPS is comparable to select
gradient-based tuning approaches. Qualitatively, we show our edits can simplify
instructions and at times make them incoherent but nonetheless improve
accuracy. Our code is available at: https://github.com/archiki/GrIPS
| [
{
"version": "v1",
"created": "Mon, 14 Mar 2022 16:54:46 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2023 19:20:57 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Prasad",
"Archiki",
""
],
[
"Hase",
"Peter",
""
],
[
"Zhou",
"Xiang",
""
],
[
"Bansal",
"Mohit",
""
]
] | TITLE: GrIPS: Gradient-free, Edit-based Instruction Search for Prompting Large
Language Models
ABSTRACT: Providing natural language instructions in prompts is a useful new paradigm
for improving task performance of large language models in a zero-shot setting.
Recent work has aimed to improve such prompts via manual rewriting or
gradient-based tuning. However, manual rewriting is time-consuming and requires
subjective interpretation, while gradient-based tuning can be extremely
computationally demanding for large models and may not be feasible for
API-based models. In this work, we introduce Gradient-free Instructional Prompt
Search (GrIPS), a gradient-free, edit-based search approach for improving task
instructions for large language models. GrIPS takes in instructions designed
for humans and automatically returns an improved, edited prompt, while allowing
for API-based tuning. With InstructGPT models, GrIPS improves the average task
performance by up to 4.30 percentage points on eight classification tasks from
the Natural Instructions dataset (with similar improvements for OPT, BLOOM, and
FLAN-T5). We see improvements for both instruction-only prompts and instruction
+ k-shot examples prompts. Notably, GrIPS outperforms manual rewriting and
purely example-based prompts while controlling for the available compute and
data budget. Further, performance of GrIPS is comparable to select
gradient-based tuning approaches. Qualitatively, we show our edits can simplify
instructions and at times make them incoherent but nonetheless improve
accuracy. Our code is available at: https://github.com/archiki/GrIPS
| no_new_dataset | 0.711212 |
2204.05080 | Allison Tam | Allison C. Tam, Neil C. Rabinowitz, Andrew K. Lampinen, Nicholas A.
Roy, Stephanie C. Y. Chan, DJ Strouse, Jane X. Wang, Andrea Banino, Felix
Hill | Semantic Exploration from Language Abstractions and Pretrained
Representations | NeurIPS 2022 | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Effective exploration is a challenge in reinforcement learning (RL).
Novelty-based exploration methods can suffer in high-dimensional state spaces,
such as continuous partially-observable 3D environments. We address this
challenge by defining novelty using semantically meaningful state abstractions,
which can be found in learned representations shaped by natural language. In
particular, we evaluate vision-language representations, pretrained on natural
image captioning datasets. We show that these pretrained representations drive
meaningful, task-relevant exploration and improve performance on 3D simulated
environments. We also characterize why and how language provides useful
abstractions for exploration by considering the impacts of using
representations from a pretrained model, a language oracle, and several
ablations. We demonstrate the benefits of our approach in two very different
task domains -- one that stresses the identification and manipulation of
everyday objects, and one that requires navigational exploration in an
expansive world. Our results suggest that using language-shaped representations
could improve exploration for various algorithms and agents in challenging
environments.
| [
{
"version": "v1",
"created": "Fri, 8 Apr 2022 17:08:00 GMT"
},
{
"version": "v2",
"created": "Fri, 27 May 2022 01:38:59 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Apr 2023 22:21:46 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Tam",
"Allison C.",
""
],
[
"Rabinowitz",
"Neil C.",
""
],
[
"Lampinen",
"Andrew K.",
""
],
[
"Roy",
"Nicholas A.",
""
],
[
"Chan",
"Stephanie C. Y.",
""
],
[
"Strouse",
"DJ",
""
],
[
"Wang",
"Jane X.",
""
],
[
"Banino",
"Andrea",
""
],
[
"Hill",
"Felix",
""
]
] | TITLE: Semantic Exploration from Language Abstractions and Pretrained
Representations
ABSTRACT: Effective exploration is a challenge in reinforcement learning (RL).
Novelty-based exploration methods can suffer in high-dimensional state spaces,
such as continuous partially-observable 3D environments. We address this
challenge by defining novelty using semantically meaningful state abstractions,
which can be found in learned representations shaped by natural language. In
particular, we evaluate vision-language representations, pretrained on natural
image captioning datasets. We show that these pretrained representations drive
meaningful, task-relevant exploration and improve performance on 3D simulated
environments. We also characterize why and how language provides useful
abstractions for exploration by considering the impacts of using
representations from a pretrained model, a language oracle, and several
ablations. We demonstrate the benefits of our approach in two very different
task domains -- one that stresses the identification and manipulation of
everyday objects, and one that requires navigational exploration in an
expansive world. Our results suggest that using language-shaped representations
could improve exploration for various algorithms and agents in challenging
environments.
| no_new_dataset | 0.709806 |
2204.09573 | Kelly Payette | Kelly Payette, Hongwei Li, Priscille de Dumast, Roxane Licandro, Hui
Ji, Md Mahfuzur Rahman Siddiquee, Daguang Xu, Andriy Myronenko, Hao Liu,
Yuchen Pei, Lisheng Wang, Ying Peng, Juanying Xie, Huiquan Zhang, Guiming
Dong, Hao Fu, Guotai Wang, ZunHyan Rieu, Donghyeon Kim, Hyun Gi Kim, Davood
Karimi, Ali Gholipour, Helena R. Torres, Bruno Oliveira, Jo\~ao L.
Vila\c{c}a, Yang Lin, Netanell Avisdris, Ori Ben-Zvi, Dafna Ben Bashat, Lucas
Fidon, Michael Aertsen, Tom Vercauteren, Daniel Sobotka, Georg Langs, Mireia
Aleny\`a, Maria Inmaculada Villanueva, Oscar Camara, Bella Specktor Fadida,
Leo Joskowicz, Liao Weibin, Lv Yi, Li Xuesong, Moona Mazher, Abdul Qayyum,
Domenec Puig, Hamza Kebiri, Zelin Zhang, Xinyi Xu, Dan Wu, KuanLun Liao,
YiXuan Wu, JinTai Chen, Yunzhi Xu, Li Zhao, Lana Vasung, Bjoern Menze,
Meritxell Bach Cuadra, Andras Jakab | Fetal Brain Tissue Annotation and Segmentation Challenge Results | Results from FeTA Challenge 2021, held at MICCAI; Manuscript
submitted | null | 10.1016/j.media.2023.102833 | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | In-utero fetal MRI is emerging as an important tool in the diagnosis and
analysis of the developing human brain. Automatic segmentation of the
developing fetal brain is a vital step in the quantitative analysis of prenatal
neurodevelopment both in the research and clinical context. However, manual
segmentation of cerebral structures is time-consuming and prone to error and
inter-observer variability. Therefore, we organized the Fetal Tissue Annotation
(FeTA) Challenge in 2021 in order to encourage the development of automatic
segmentation algorithms on an international level. The challenge utilized FeTA
Dataset, an open dataset of fetal brain MRI reconstructions segmented into
seven different tissues (external cerebrospinal fluid, grey matter, white
matter, ventricles, cerebellum, brainstem, deep grey matter). 20 international
teams participated in this challenge, submitting a total of 21 algorithms for
evaluation. In this paper, we provide a detailed analysis of the results from
both a technical and clinical perspective. All participants relied on deep
learning methods, mainly U-Nets, with some variability present in the network
architecture, optimization, and image pre- and post-processing. The majority of
teams used existing medical imaging deep learning frameworks. The main
differences between the submissions were the fine tuning done during training,
and the specific pre- and post-processing steps performed. The challenge
results showed that almost all submissions performed similarly. Four of the top
five teams used ensemble learning methods. However, one team's algorithm
performed significantly superior to the other submissions, and consisted of an
asymmetrical U-Net network architecture. This paper provides a first of its
kind benchmark for future automatic multi-tissue segmentation algorithms for
the developing human brain in utero.
| [
{
"version": "v1",
"created": "Wed, 20 Apr 2022 16:14:43 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Payette",
"Kelly",
""
],
[
"Li",
"Hongwei",
""
],
[
"de Dumast",
"Priscille",
""
],
[
"Licandro",
"Roxane",
""
],
[
"Ji",
"Hui",
""
],
[
"Siddiquee",
"Md Mahfuzur Rahman",
""
],
[
"Xu",
"Daguang",
""
],
[
"Myronenko",
"Andriy",
""
],
[
"Liu",
"Hao",
""
],
[
"Pei",
"Yuchen",
""
],
[
"Wang",
"Lisheng",
""
],
[
"Peng",
"Ying",
""
],
[
"Xie",
"Juanying",
""
],
[
"Zhang",
"Huiquan",
""
],
[
"Dong",
"Guiming",
""
],
[
"Fu",
"Hao",
""
],
[
"Wang",
"Guotai",
""
],
[
"Rieu",
"ZunHyan",
""
],
[
"Kim",
"Donghyeon",
""
],
[
"Kim",
"Hyun Gi",
""
],
[
"Karimi",
"Davood",
""
],
[
"Gholipour",
"Ali",
""
],
[
"Torres",
"Helena R.",
""
],
[
"Oliveira",
"Bruno",
""
],
[
"Vilaça",
"João L.",
""
],
[
"Lin",
"Yang",
""
],
[
"Avisdris",
"Netanell",
""
],
[
"Ben-Zvi",
"Ori",
""
],
[
"Bashat",
"Dafna Ben",
""
],
[
"Fidon",
"Lucas",
""
],
[
"Aertsen",
"Michael",
""
],
[
"Vercauteren",
"Tom",
""
],
[
"Sobotka",
"Daniel",
""
],
[
"Langs",
"Georg",
""
],
[
"Alenyà",
"Mireia",
""
],
[
"Villanueva",
"Maria Inmaculada",
""
],
[
"Camara",
"Oscar",
""
],
[
"Fadida",
"Bella Specktor",
""
],
[
"Joskowicz",
"Leo",
""
],
[
"Weibin",
"Liao",
""
],
[
"Yi",
"Lv",
""
],
[
"Xuesong",
"Li",
""
],
[
"Mazher",
"Moona",
""
],
[
"Qayyum",
"Abdul",
""
],
[
"Puig",
"Domenec",
""
],
[
"Kebiri",
"Hamza",
""
],
[
"Zhang",
"Zelin",
""
],
[
"Xu",
"Xinyi",
""
],
[
"Wu",
"Dan",
""
],
[
"Liao",
"KuanLun",
""
],
[
"Wu",
"YiXuan",
""
],
[
"Chen",
"JinTai",
""
],
[
"Xu",
"Yunzhi",
""
],
[
"Zhao",
"Li",
""
],
[
"Vasung",
"Lana",
""
],
[
"Menze",
"Bjoern",
""
],
[
"Cuadra",
"Meritxell Bach",
""
],
[
"Jakab",
"Andras",
""
]
] | TITLE: Fetal Brain Tissue Annotation and Segmentation Challenge Results
ABSTRACT: In-utero fetal MRI is emerging as an important tool in the diagnosis and
analysis of the developing human brain. Automatic segmentation of the
developing fetal brain is a vital step in the quantitative analysis of prenatal
neurodevelopment both in the research and clinical context. However, manual
segmentation of cerebral structures is time-consuming and prone to error and
inter-observer variability. Therefore, we organized the Fetal Tissue Annotation
(FeTA) Challenge in 2021 in order to encourage the development of automatic
segmentation algorithms on an international level. The challenge utilized FeTA
Dataset, an open dataset of fetal brain MRI reconstructions segmented into
seven different tissues (external cerebrospinal fluid, grey matter, white
matter, ventricles, cerebellum, brainstem, deep grey matter). 20 international
teams participated in this challenge, submitting a total of 21 algorithms for
evaluation. In this paper, we provide a detailed analysis of the results from
both a technical and clinical perspective. All participants relied on deep
learning methods, mainly U-Nets, with some variability present in the network
architecture, optimization, and image pre- and post-processing. The majority of
teams used existing medical imaging deep learning frameworks. The main
differences between the submissions were the fine tuning done during training,
and the specific pre- and post-processing steps performed. The challenge
results showed that almost all submissions performed similarly. Four of the top
five teams used ensemble learning methods. However, one team's algorithm
performed significantly superior to the other submissions, and consisted of an
asymmetrical U-Net network architecture. This paper provides a first of its
kind benchmark for future automatic multi-tissue segmentation algorithms for
the developing human brain in utero.
| no_new_dataset | 0.586108 |
2204.10598 | Svetlana Pavlitska | Svetlana Pavlitska, Christian Hubschneider, Lukas Struppek and J.
Marius Z\"ollner | Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability | Accepted for publication at IJCNN 2023 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sparsely-gated Mixture of Expert (MoE) layers have been recently successfully
applied for scaling large transformers, especially for language modeling tasks.
An intriguing side effect of sparse MoE layers is that they convey inherent
interpretability to a model via natural expert specialization. In this work, we
apply sparse MoE layers to CNNs for computer vision tasks and analyze the
resulting effect on model interpretability. To stabilize MoE training, we
present both soft and hard constraint-based approaches. With hard constraints,
the weights of certain experts are allowed to become zero, while soft
constraints balance the contribution of experts with an additional auxiliary
loss. As a result, soft constraints handle expert utilization better and
support the expert specialization process, while hard constraints maintain more
generalized experts and increase overall model performance. Our findings
demonstrate that experts can implicitly focus on individual sub-domains of the
input space. For example, experts trained for CIFAR-100 image classification
specialize in recognizing different domains such as flowers or animals without
previous data clustering. Experiments with RetinaNet and the COCO dataset
further indicate that object detection experts can also specialize in detecting
objects of distinct sizes.
| [
{
"version": "v1",
"created": "Fri, 22 Apr 2022 09:40:23 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2022 10:06:59 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 07:02:25 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Pavlitska",
"Svetlana",
""
],
[
"Hubschneider",
"Christian",
""
],
[
"Struppek",
"Lukas",
""
],
[
"Zöllner",
"J. Marius",
""
]
] | TITLE: Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability
ABSTRACT: Sparsely-gated Mixture of Expert (MoE) layers have been recently successfully
applied for scaling large transformers, especially for language modeling tasks.
An intriguing side effect of sparse MoE layers is that they convey inherent
interpretability to a model via natural expert specialization. In this work, we
apply sparse MoE layers to CNNs for computer vision tasks and analyze the
resulting effect on model interpretability. To stabilize MoE training, we
present both soft and hard constraint-based approaches. With hard constraints,
the weights of certain experts are allowed to become zero, while soft
constraints balance the contribution of experts with an additional auxiliary
loss. As a result, soft constraints handle expert utilization better and
support the expert specialization process, while hard constraints maintain more
generalized experts and increase overall model performance. Our findings
demonstrate that experts can implicitly focus on individual sub-domains of the
input space. For example, experts trained for CIFAR-100 image classification
specialize in recognizing different domains such as flowers or animals without
previous data clustering. Experiments with RetinaNet and the COCO dataset
further indicate that object detection experts can also specialize in detecting
objects of distinct sizes.
| no_new_dataset | 0.711794 |
2204.10975 | Hengrui Luo | Hengrui Luo, Jeremy E. Purvis, Didong Li | Spherical Rotation Dimension Reduction with Geometric Loss Functions | 60 pages | null | null | null | stat.ML cs.LG math.ST stat.ME stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern datasets often exhibit high dimensionality, yet the data reside in
low-dimensional manifolds that can reveal underlying geometric structures
critical for data analysis. A prime example of such a dataset is a collection
of cell cycle measurements, where the inherently cyclical nature of the process
can be represented as a circle or sphere. Motivated by the need to analyze
these types of datasets, we propose a nonlinear dimension reduction method,
Spherical Rotation Component Analysis (SRCA), that incorporates geometric
information to better approximate low-dimensional manifolds. SRCA is a
versatile method designed to work in both high-dimensional and small sample
size settings. By employing spheres or ellipsoids, SRCA provides a low-rank
spherical representation of the data with general theoretic guarantees,
effectively retaining the geometric structure of the dataset during
dimensionality reduction. A comprehensive simulation study, along with a
successful application to human cell cycle data, further highlights the
advantages of SRCA compared to state-of-the-art alternatives, demonstrating its
superior performance in approximating the manifold while preserving inherent
geometric structures.
| [
{
"version": "v1",
"created": "Sat, 23 Apr 2022 02:03:55 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 15:47:22 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Luo",
"Hengrui",
""
],
[
"Purvis",
"Jeremy E.",
""
],
[
"Li",
"Didong",
""
]
] | TITLE: Spherical Rotation Dimension Reduction with Geometric Loss Functions
ABSTRACT: Modern datasets often exhibit high dimensionality, yet the data reside in
low-dimensional manifolds that can reveal underlying geometric structures
critical for data analysis. A prime example of such a dataset is a collection
of cell cycle measurements, where the inherently cyclical nature of the process
can be represented as a circle or sphere. Motivated by the need to analyze
these types of datasets, we propose a nonlinear dimension reduction method,
Spherical Rotation Component Analysis (SRCA), that incorporates geometric
information to better approximate low-dimensional manifolds. SRCA is a
versatile method designed to work in both high-dimensional and small sample
size settings. By employing spheres or ellipsoids, SRCA provides a low-rank
spherical representation of the data with general theoretic guarantees,
effectively retaining the geometric structure of the dataset during
dimensionality reduction. A comprehensive simulation study, along with a
successful application to human cell cycle data, further highlights the
advantages of SRCA compared to state-of-the-art alternatives, demonstrating its
superior performance in approximating the manifold while preserving inherent
geometric structures.
| no_new_dataset | 0.709629 |
2205.06234 | Antonio Jesus Banegas-Luna | Antonio Jes\'us Banegas-Luna, Horacio P\'erez-S\'anchez | SIBILA: A novel interpretable ensemble of general-purpose machine
learning models applied to medical contexts | 23 pages, 4 figures, 6 tables, 2 equations | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalized medicine remains a major challenge for scientists. The rapid
growth of Machine learning and Deep learning has made them a feasible al-
ternative for predicting the most appropriate therapy for individual patients.
However, the need to develop a custom model for every dataset, the lack of
interpretation of their results and high computational requirements make many
reluctant to use these methods. Aiming to save time and bring light to the way
models work internally, SIBILA has been developed. SIBILA is an ensemble of
machine learning and deep learning models that applies a range of
interpretability algorithms to identify the most relevant input features. Since
the interpretability algo- rithms may not be in line with each other, a
consensus stage has been imple- mented to estimate the global attribution of
each variable to the predictions. SIBILA is containerized to be run on any
high-performance computing plat- form. Although conceived as a command-line
tool, it is also available to all users free of charge as a web server at
https://bio-hpc.ucam.edu/sibila. Thus, even users with few technological skills
can take advantage of it. SIBILA has been applied to two medical case studies
to show its ability to predict in classification problems. Even though it is a
general-purpose tool, it has been developed with the aim of becoming a powerful
decision-making tool for clinicians, but can actually be used in many other
domains. Thus, other two non-medical examples are supplied as supplementary
material to prove that SIBILA still works well with noise and in regression
problems.
| [
{
"version": "v1",
"created": "Thu, 12 May 2022 17:23:24 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 15:25:13 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Banegas-Luna",
"Antonio Jesús",
""
],
[
"Pérez-Sánchez",
"Horacio",
""
]
] | TITLE: SIBILA: A novel interpretable ensemble of general-purpose machine
learning models applied to medical contexts
ABSTRACT: Personalized medicine remains a major challenge for scientists. The rapid
growth of Machine learning and Deep learning has made them a feasible al-
ternative for predicting the most appropriate therapy for individual patients.
However, the need to develop a custom model for every dataset, the lack of
interpretation of their results and high computational requirements make many
reluctant to use these methods. Aiming to save time and bring light to the way
models work internally, SIBILA has been developed. SIBILA is an ensemble of
machine learning and deep learning models that applies a range of
interpretability algorithms to identify the most relevant input features. Since
the interpretability algo- rithms may not be in line with each other, a
consensus stage has been imple- mented to estimate the global attribution of
each variable to the predictions. SIBILA is containerized to be run on any
high-performance computing plat- form. Although conceived as a command-line
tool, it is also available to all users free of charge as a web server at
https://bio-hpc.ucam.edu/sibila. Thus, even users with few technological skills
can take advantage of it. SIBILA has been applied to two medical case studies
to show its ability to predict in classification problems. Even though it is a
general-purpose tool, it has been developed with the aim of becoming a powerful
decision-making tool for clinicians, but can actually be used in many other
domains. Thus, other two non-medical examples are supplied as supplementary
material to prove that SIBILA still works well with noise and in regression
problems.
| no_new_dataset | 0.703524 |
2206.03079 | Nibir Chandra Mandal | Nibir Chandra Mandal and Gias Uddin | An Empirical Study of IoT Security Aspects at Sentence-Level in
Developer Textual Discussions | null | null | 10.1016/j.infsof.2022.106970 | null | cs.CR cs.IR cs.LG cs.SE | http://creativecommons.org/licenses/by/4.0/ | IoT is a rapidly emerging paradigm that now encompasses almost every aspect
of our modern life. As such, ensuring the security of IoT devices is crucial.
IoT devices can differ from traditional computing, thereby the design and
implementation of proper security measures can be challenging in IoT devices.
We observed that IoT developers discuss their security-related challenges in
developer forums like Stack Overflow(SO). However, we find that IoT security
discussions can also be buried inside non-security discussions in SO. In this
paper, we aim to understand the challenges IoT developers face while applying
security practices and techniques to IoT devices. We have two goals: (1)
Develop a model that can automatically find security-related IoT discussions in
SO, and (2) Study the model output to learn about IoT developer
security-related challenges. First, we download 53K posts from SO that contain
discussions about IoT. Second, we manually labeled 5,919 sentences from 53K
posts as 1 or 0. Third, we use this benchmark to investigate a suite of deep
learning transformer models. The best performing model is called SecBot.
Fourth, we apply SecBot on the entire posts and find around 30K security
related sentences. Fifth, we apply topic modeling to the security-related
sentences. Then we label and categorize the topics. Sixth, we analyze the
evolution of the topics in SO. We found that (1) SecBot is based on the
retraining of the deep learning model RoBERTa. SecBot offers the best F1-Score
of 0.935, (2) there are six error categories in misclassified samples by
SecBot. SecBot was mostly wrong when the keywords/contexts were ambiguous
(e.g., gateway can be a security gateway or a simple gateway), (3) there are 9
security topics grouped into three categories: Software, Hardware, and Network,
and (4) the highest number of topics belongs to software security, followed by
network security.
| [
{
"version": "v1",
"created": "Tue, 7 Jun 2022 07:54:35 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Mandal",
"Nibir Chandra",
""
],
[
"Uddin",
"Gias",
""
]
] | TITLE: An Empirical Study of IoT Security Aspects at Sentence-Level in
Developer Textual Discussions
ABSTRACT: IoT is a rapidly emerging paradigm that now encompasses almost every aspect
of our modern life. As such, ensuring the security of IoT devices is crucial.
IoT devices can differ from traditional computing, thereby the design and
implementation of proper security measures can be challenging in IoT devices.
We observed that IoT developers discuss their security-related challenges in
developer forums like Stack Overflow(SO). However, we find that IoT security
discussions can also be buried inside non-security discussions in SO. In this
paper, we aim to understand the challenges IoT developers face while applying
security practices and techniques to IoT devices. We have two goals: (1)
Develop a model that can automatically find security-related IoT discussions in
SO, and (2) Study the model output to learn about IoT developer
security-related challenges. First, we download 53K posts from SO that contain
discussions about IoT. Second, we manually labeled 5,919 sentences from 53K
posts as 1 or 0. Third, we use this benchmark to investigate a suite of deep
learning transformer models. The best performing model is called SecBot.
Fourth, we apply SecBot on the entire posts and find around 30K security
related sentences. Fifth, we apply topic modeling to the security-related
sentences. Then we label and categorize the topics. Sixth, we analyze the
evolution of the topics in SO. We found that (1) SecBot is based on the
retraining of the deep learning model RoBERTa. SecBot offers the best F1-Score
of 0.935, (2) there are six error categories in misclassified samples by
SecBot. SecBot was mostly wrong when the keywords/contexts were ambiguous
(e.g., gateway can be a security gateway or a simple gateway), (3) there are 9
security topics grouped into three categories: Software, Hardware, and Network,
and (4) the highest number of topics belongs to software security, followed by
network security.
| no_new_dataset | 0.704732 |
2207.06613 | Nikhil Pratap Ghanathe | Nikhil P Ghanathe, Steve Wilton | T-RECX: Tiny-Resource Efficient Convolutional neural networks with
early-eXit | Accepted at 20th ACM International Conference on Computing Frontiers | null | null | null | cs.LG cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Deploying Machine learning (ML) on milliwatt-scale edge devices (tinyML) is
gaining popularity due to recent breakthroughs in ML and Internet of Things
(IoT). Most tinyML research focuses on model compression techniques that trade
accuracy (and model capacity) for compact models to fit into the KB-sized
tiny-edge devices. In this paper, we show how such models can be enhanced by
the addition of an early exit intermediate classifier. If the intermediate
classifier exhibits sufficient confidence in its prediction, the network exits
early thereby, resulting in considerable savings in time. Although early exit
classifiers have been proposed in previous work, these previous proposals focus
on large networks, making their techniques suboptimal/impractical for tinyML
applications. Our technique is optimized specifically for tiny-CNN sized
models. In addition, we present a method to alleviate the effect of network
overthinking by leveraging the representations learned by the early exit. We
evaluate T-RecX on three CNNs from the MLPerf tiny benchmark suite for image
classification, keyword spotting and visual wake word detection tasks. Our
results show that T-RecX 1) improves the accuracy of baseline network, 2)
achieves 31.58% average reduction in FLOPS in exchange for one percent accuracy
across all evaluated models. Furthermore, we show that our methods consistently
outperform popular prior works on the tiny-CNNs we evaluate.
| [
{
"version": "v1",
"created": "Thu, 14 Jul 2022 02:05:43 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2023 23:09:57 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Ghanathe",
"Nikhil P",
""
],
[
"Wilton",
"Steve",
""
]
] | TITLE: T-RECX: Tiny-Resource Efficient Convolutional neural networks with
early-eXit
ABSTRACT: Deploying Machine learning (ML) on milliwatt-scale edge devices (tinyML) is
gaining popularity due to recent breakthroughs in ML and Internet of Things
(IoT). Most tinyML research focuses on model compression techniques that trade
accuracy (and model capacity) for compact models to fit into the KB-sized
tiny-edge devices. In this paper, we show how such models can be enhanced by
the addition of an early exit intermediate classifier. If the intermediate
classifier exhibits sufficient confidence in its prediction, the network exits
early thereby, resulting in considerable savings in time. Although early exit
classifiers have been proposed in previous work, these previous proposals focus
on large networks, making their techniques suboptimal/impractical for tinyML
applications. Our technique is optimized specifically for tiny-CNN sized
models. In addition, we present a method to alleviate the effect of network
overthinking by leveraging the representations learned by the early exit. We
evaluate T-RecX on three CNNs from the MLPerf tiny benchmark suite for image
classification, keyword spotting and visual wake word detection tasks. Our
results show that T-RecX 1) improves the accuracy of baseline network, 2)
achieves 31.58% average reduction in FLOPS in exchange for one percent accuracy
across all evaluated models. Furthermore, we show that our methods consistently
outperform popular prior works on the tiny-CNNs we evaluate.
| no_new_dataset | 0.712076 |
2207.14542 | Nibir Chandra Mandal | Nibir Chandra Mandal, G. M. Shahariar, and Md. Tanvir Rouf Shawon | Effectiveness of Transformer Models on IoT Security Detection in
StackOverflow Discussions | null | null | 10.1007/978-981-19-7528-8_10 | null | cs.CR cs.LG cs.SE | http://creativecommons.org/licenses/by/4.0/ | The Internet of Things (IoT) is an emerging concept that directly links to
the billions of physical items, or "things", that are connected to the Internet
and are all gathering and exchanging information between devices and systems.
However, IoT devices were not built with security in mind, which might lead to
security vulnerabilities in a multi-device system. Traditionally, we
investigated IoT issues by polling IoT developers and specialists. This
technique, however, is not scalable since surveying all IoT developers is not
feasible. Another way to look into IoT issues is to look at IoT developer
discussions on major online development forums like Stack Overflow (SO).
However, finding discussions that are relevant to IoT issues is challenging
since they are frequently not categorized with IoT-related terms. In this
paper, we present the "IoT Security Dataset", a domain-specific dataset of 7147
samples focused solely on IoT security discussions. As there are no automated
tools to label these samples, we manually labeled them. We further employed
multiple transformer models to automatically detect security discussions.
Through rigorous investigations, we found that IoT security discussions are
different and more complex than traditional security discussions. We
demonstrated a considerable performance loss (up to 44%) of transformer models
on cross-domain datasets when we transferred knowledge from a general-purpose
dataset "Opiner", supporting our claim. Thus, we built a domain-specific IoT
security detector with an F1-Score of 0.69. We have made the dataset public in
the hope that developers would learn more about the security discussion and
vendors would enhance their concerns about product security.
| [
{
"version": "v1",
"created": "Fri, 29 Jul 2022 08:18:03 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Mandal",
"Nibir Chandra",
""
],
[
"Shahariar",
"G. M.",
""
],
[
"Shawon",
"Md. Tanvir Rouf",
""
]
] | TITLE: Effectiveness of Transformer Models on IoT Security Detection in
StackOverflow Discussions
ABSTRACT: The Internet of Things (IoT) is an emerging concept that directly links to
the billions of physical items, or "things", that are connected to the Internet
and are all gathering and exchanging information between devices and systems.
However, IoT devices were not built with security in mind, which might lead to
security vulnerabilities in a multi-device system. Traditionally, we
investigated IoT issues by polling IoT developers and specialists. This
technique, however, is not scalable since surveying all IoT developers is not
feasible. Another way to look into IoT issues is to look at IoT developer
discussions on major online development forums like Stack Overflow (SO).
However, finding discussions that are relevant to IoT issues is challenging
since they are frequently not categorized with IoT-related terms. In this
paper, we present the "IoT Security Dataset", a domain-specific dataset of 7147
samples focused solely on IoT security discussions. As there are no automated
tools to label these samples, we manually labeled them. We further employed
multiple transformer models to automatically detect security discussions.
Through rigorous investigations, we found that IoT security discussions are
different and more complex than traditional security discussions. We
demonstrated a considerable performance loss (up to 44%) of transformer models
on cross-domain datasets when we transferred knowledge from a general-purpose
dataset "Opiner", supporting our claim. Thus, we built a domain-specific IoT
security detector with an F1-Score of 0.69. We have made the dataset public in
the hope that developers would learn more about the security discussion and
vendors would enhance their concerns about product security.
| new_dataset | 0.716975 |
2208.14024 | Robert Schmier | Robert Schmier, Ullrich K\"othe, Christoph-Nikolas Straehle | Positive Difference Distribution for Image Outlier Detection using
Normalizing Flows and Contrastive Data | null | Transactions on Machine Learning Research (04/2023) | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting test data deviating from training data is a central problem for
safe and robust machine learning. Likelihoods learned by a generative model,
e.g., a normalizing flow via standard log-likelihood training, perform poorly
as an outlier score. We propose to use an unlabelled auxiliary dataset and a
probabilistic outlier score for outlier detection. We use a self-supervised
feature extractor trained on the auxiliary dataset and train a normalizing flow
on the extracted features by maximizing the likelihood on in-distribution data
and minimizing the likelihood on the contrastive dataset. We show that this is
equivalent to learning the normalized positive difference between the
in-distribution and the contrastive feature density. We conduct experiments on
benchmark datasets and compare to the likelihood, the likelihood ratio and
state-of-the-art anomaly detection methods.
| [
{
"version": "v1",
"created": "Tue, 30 Aug 2022 07:00:46 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2023 07:46:01 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Schmier",
"Robert",
""
],
[
"Köthe",
"Ullrich",
""
],
[
"Straehle",
"Christoph-Nikolas",
""
]
] | TITLE: Positive Difference Distribution for Image Outlier Detection using
Normalizing Flows and Contrastive Data
ABSTRACT: Detecting test data deviating from training data is a central problem for
safe and robust machine learning. Likelihoods learned by a generative model,
e.g., a normalizing flow via standard log-likelihood training, perform poorly
as an outlier score. We propose to use an unlabelled auxiliary dataset and a
probabilistic outlier score for outlier detection. We use a self-supervised
feature extractor trained on the auxiliary dataset and train a normalizing flow
on the extracted features by maximizing the likelihood on in-distribution data
and minimizing the likelihood on the contrastive dataset. We show that this is
equivalent to learning the normalized positive difference between the
in-distribution and the contrastive feature density. We conduct experiments on
benchmark datasets and compare to the likelihood, the likelihood ratio and
state-of-the-art anomaly detection methods.
| no_new_dataset | 0.710879 |
2209.12880 | Philip Jacobson | Philip Jacobson, Yiyang Zhou, Wei Zhan, Masayoshi Tomizuka, Ming C. Wu | Center Feature Fusion: Selective Multi-Sensor Fusion of Center-based
Objects | Accepted by ICRA 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Leveraging multi-modal fusion, especially between camera and LiDAR, has
become essential for building accurate and robust 3D object detection systems
for autonomous vehicles. Until recently, point decorating approaches, in which
point clouds are augmented with camera features, have been the dominant
approach in the field. However, these approaches fail to utilize the higher
resolution images from cameras. Recent works projecting camera features to the
bird's-eye-view (BEV) space for fusion have also been proposed, however they
require projecting millions of pixels, most of which only contain background
information. In this work, we propose a novel approach Center Feature Fusion
(CFF), in which we leverage center-based detection networks in both the camera
and LiDAR streams to identify relevant object locations. We then use the
center-based detection to identify the locations of pixel features relevant to
object locations, a small fraction of the total number in the image. These are
then projected and fused in the BEV frame. On the nuScenes dataset, we
outperform the LiDAR-only baseline by 4.9% mAP while fusing up to 100x fewer
features than other fusion methods.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2022 17:51:18 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2023 23:55:31 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Jacobson",
"Philip",
""
],
[
"Zhou",
"Yiyang",
""
],
[
"Zhan",
"Wei",
""
],
[
"Tomizuka",
"Masayoshi",
""
],
[
"Wu",
"Ming C.",
""
]
] | TITLE: Center Feature Fusion: Selective Multi-Sensor Fusion of Center-based
Objects
ABSTRACT: Leveraging multi-modal fusion, especially between camera and LiDAR, has
become essential for building accurate and robust 3D object detection systems
for autonomous vehicles. Until recently, point decorating approaches, in which
point clouds are augmented with camera features, have been the dominant
approach in the field. However, these approaches fail to utilize the higher
resolution images from cameras. Recent works projecting camera features to the
bird's-eye-view (BEV) space for fusion have also been proposed, however they
require projecting millions of pixels, most of which only contain background
information. In this work, we propose a novel approach Center Feature Fusion
(CFF), in which we leverage center-based detection networks in both the camera
and LiDAR streams to identify relevant object locations. We then use the
center-based detection to identify the locations of pixel features relevant to
object locations, a small fraction of the total number in the image. These are
then projected and fused in the BEV frame. On the nuScenes dataset, we
outperform the LiDAR-only baseline by 4.9% mAP while fusing up to 100x fewer
features than other fusion methods.
| no_new_dataset | 0.71103 |
2209.14102 | Zhiwei Song Szw | Zhiwei Song, Hui Yao | Segmentation method of U-net sheet metal engineering drawing based on
CBAM attention mechanism | null | null | null | null | cs.CV cs.LG eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the manufacturing process of heavy industrial equipment, the specific unit
in the welding diagram is first manually redrawn and then the corresponding
sheet metal parts are cut, which is inefficient. To this end, this paper
proposes a U-net-based method for the segmentation and extraction of specific
units in welding engineering drawings. This method enables the cutting device
to automatically segment specific graphic units according to visual information
and automatically cut out sheet metal parts of corresponding shapes according
to the segmentation results. This process is more efficient than traditional
human-assisted cutting. Two weaknesses in the U-net network will lead to a
decrease in segmentation performance: first, the focus on global semantic
feature information is weak, and second, there is a large dimensional
difference between shallow encoder features and deep decoder features. Based on
the CBAM (Convolutional Block Attention Module) attention mechanism, this paper
proposes a U-net jump structure model with an attention mechanism to improve
the network's global semantic feature extraction ability. In addition, a U-net
attention mechanism model with dual pooling convolution fusion is designed, the
deep encoder's maximum pooling + convolution features and the shallow encoder's
average pooling + convolution features are fused vertically to reduce the
dimension difference between the shallow encoder and deep decoder. The
dual-pool convolutional attention jump structure replaces the traditional U-net
jump structure, which can effectively improve the specific unit segmentation
performance of the welding engineering drawing. Using vgg16 as the backbone
network, experiments have verified that the IoU, mAP, and Accu of our model in
the welding engineering drawing dataset segmentation task are 84.72%, 86.84%,
and 99.42%, respectively.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2022 13:49:45 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 06:19:51 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Song",
"Zhiwei",
""
],
[
"Yao",
"Hui",
""
]
] | TITLE: Segmentation method of U-net sheet metal engineering drawing based on
CBAM attention mechanism
ABSTRACT: In the manufacturing process of heavy industrial equipment, the specific unit
in the welding diagram is first manually redrawn and then the corresponding
sheet metal parts are cut, which is inefficient. To this end, this paper
proposes a U-net-based method for the segmentation and extraction of specific
units in welding engineering drawings. This method enables the cutting device
to automatically segment specific graphic units according to visual information
and automatically cut out sheet metal parts of corresponding shapes according
to the segmentation results. This process is more efficient than traditional
human-assisted cutting. Two weaknesses in the U-net network will lead to a
decrease in segmentation performance: first, the focus on global semantic
feature information is weak, and second, there is a large dimensional
difference between shallow encoder features and deep decoder features. Based on
the CBAM (Convolutional Block Attention Module) attention mechanism, this paper
proposes a U-net jump structure model with an attention mechanism to improve
the network's global semantic feature extraction ability. In addition, a U-net
attention mechanism model with dual pooling convolution fusion is designed, the
deep encoder's maximum pooling + convolution features and the shallow encoder's
average pooling + convolution features are fused vertically to reduce the
dimension difference between the shallow encoder and deep decoder. The
dual-pool convolutional attention jump structure replaces the traditional U-net
jump structure, which can effectively improve the specific unit segmentation
performance of the welding engineering drawing. Using vgg16 as the backbone
network, experiments have verified that the IoU, mAP, and Accu of our model in
the welding engineering drawing dataset segmentation task are 84.72%, 86.84%,
and 99.42%, respectively.
| no_new_dataset | 0.713045 |
2209.14359 | Daniel McGann | Daniel McGann, John G. Rogers III, and Michael Kaess | Robust Incremental Smoothing and Mapping (riSAM) | Accepted to ICRA 2023 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a method for robust optimization for online incremental
Simultaneous Localization and Mapping (SLAM). Due to the NP-Hardness of data
association in the presence of perceptual aliasing, tractable (approximate)
approaches to data association will produce erroneous measurements. We require
SLAM back-ends that can converge to accurate solutions in the presence of
outlier measurements while meeting online efficiency constraints. Existing
robust SLAM methods either remain sensitive to outliers, become increasingly
sensitive to initialization, or fail to provide online efficiency. We present
the robust incremental Smoothing and Mapping (riSAM) algorithm, a robust
back-end optimizer for incremental SLAM based on Graduated Non-Convexity. We
demonstrate on benchmarking datasets that our algorithm achieves online
efficiency, outperforms existing online approaches, and matches or improves the
performance of existing offline methods.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2022 18:43:48 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 15:45:24 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"McGann",
"Daniel",
""
],
[
"Rogers",
"John G.",
"III"
],
[
"Kaess",
"Michael",
""
]
] | TITLE: Robust Incremental Smoothing and Mapping (riSAM)
ABSTRACT: This paper presents a method for robust optimization for online incremental
Simultaneous Localization and Mapping (SLAM). Due to the NP-Hardness of data
association in the presence of perceptual aliasing, tractable (approximate)
approaches to data association will produce erroneous measurements. We require
SLAM back-ends that can converge to accurate solutions in the presence of
outlier measurements while meeting online efficiency constraints. Existing
robust SLAM methods either remain sensitive to outliers, become increasingly
sensitive to initialization, or fail to provide online efficiency. We present
the robust incremental Smoothing and Mapping (riSAM) algorithm, a robust
back-end optimizer for incremental SLAM based on Graduated Non-Convexity. We
demonstrate on benchmarking datasets that our algorithm achieves online
efficiency, outperforms existing online approaches, and matches or improves the
performance of existing offline methods.
| no_new_dataset | 0.707367 |
2209.15605 | Maan Qraitem | Maan Qraitem, Kate Saenko, Bryan A. Plummer | Bias Mimicking: A Simple Sampling Approach for Bias Mitigation | Accepted at CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Prior work has shown that Visual Recognition datasets frequently
underrepresent bias groups $B$ (\eg Female) within class labels $Y$ (\eg
Programmers). This dataset bias can lead to models that learn spurious
correlations between class labels and bias groups such as age, gender, or race.
Most recent methods that address this problem require significant architectural
changes or additional loss functions requiring more hyper-parameter tuning.
Alternatively, data sampling baselines from the class imbalance literature (\eg
Undersampling, Upweighting), which can often be implemented in a single line of
code and often have no hyperparameters, offer a cheaper and more efficient
solution. However, these methods suffer from significant shortcomings. For
example, Undersampling drops a significant part of the input distribution per
epoch while Oversampling repeats samples, causing overfitting. To address these
shortcomings, we introduce a new class-conditioned sampling method: Bias
Mimicking. The method is based on the observation that if a class $c$ bias
distribution, \ie $P_D(B|Y=c)$ is mimicked across every $c^{\prime}\neq c$,
then $Y$ and $B$ are statistically independent. Using this notion, BM, through
a novel training procedure, ensures that the model is exposed to the entire
distribution per epoch without repeating samples. Consequently, Bias Mimicking
improves underrepresented groups' accuracy of sampling methods by 3\% over four
benchmarks while maintaining and sometimes improving performance over
nonsampling methods. Code: \url{https://github.com/mqraitem/Bias-Mimicking}
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2022 17:33:00 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Oct 2022 14:28:13 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Nov 2022 04:23:31 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Nov 2022 01:50:58 GMT"
},
{
"version": "v5",
"created": "Mon, 5 Dec 2022 17:24:56 GMT"
},
{
"version": "v6",
"created": "Tue, 6 Dec 2022 03:18:23 GMT"
},
{
"version": "v7",
"created": "Sat, 25 Mar 2023 19:34:55 GMT"
},
{
"version": "v8",
"created": "Thu, 27 Apr 2023 17:29:44 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Qraitem",
"Maan",
""
],
[
"Saenko",
"Kate",
""
],
[
"Plummer",
"Bryan A.",
""
]
] | TITLE: Bias Mimicking: A Simple Sampling Approach for Bias Mitigation
ABSTRACT: Prior work has shown that Visual Recognition datasets frequently
underrepresent bias groups $B$ (\eg Female) within class labels $Y$ (\eg
Programmers). This dataset bias can lead to models that learn spurious
correlations between class labels and bias groups such as age, gender, or race.
Most recent methods that address this problem require significant architectural
changes or additional loss functions requiring more hyper-parameter tuning.
Alternatively, data sampling baselines from the class imbalance literature (\eg
Undersampling, Upweighting), which can often be implemented in a single line of
code and often have no hyperparameters, offer a cheaper and more efficient
solution. However, these methods suffer from significant shortcomings. For
example, Undersampling drops a significant part of the input distribution per
epoch while Oversampling repeats samples, causing overfitting. To address these
shortcomings, we introduce a new class-conditioned sampling method: Bias
Mimicking. The method is based on the observation that if a class $c$ bias
distribution, \ie $P_D(B|Y=c)$ is mimicked across every $c^{\prime}\neq c$,
then $Y$ and $B$ are statistically independent. Using this notion, BM, through
a novel training procedure, ensures that the model is exposed to the entire
distribution per epoch without repeating samples. Consequently, Bias Mimicking
improves underrepresented groups' accuracy of sampling methods by 3\% over four
benchmarks while maintaining and sometimes improving performance over
nonsampling methods. Code: \url{https://github.com/mqraitem/Bias-Mimicking}
| no_new_dataset | 0.708055 |
2210.06349 | Dan Su | Dan Su, Mostofa Patwary, Shrimai Prabhumoye, Peng Xu, Ryan Prenger,
Mohammad Shoeybi, Pascale Fung, Anima Anandkumar, Bryan Catanzaro | Context Generation Improves Open Domain Question Answering | 8 pages; Accepted at EACL2023 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Closed-book question answering (QA) requires a model to directly answer an
open-domain question without access to any external knowledge. Prior work on
closed-book QA either directly finetunes or prompts a pretrained language model
(LM) to leverage the stored knowledge. However, they do not fully exploit the
parameterized knowledge. To address this issue, we propose a two-stage,
closed-book QA framework which employs a coarse-to-fine approach to extract
relevant knowledge and answer a question. Our approach first generates a
related context for a given question by prompting a pretrained LM. We then
prompt the same LM for answer prediction using the generated context and the
question. Additionally, to eliminate failure caused by context uncertainty, we
marginalize over generated contexts. Experimental results on three QA
benchmarks show that our method significantly outperforms previous closed-book
QA methods (e.g. exact matching 68.6% vs. 55.3%), and is on par with open-book
methods that exploit external knowledge sources (e.g. 68.6% vs. 68.0%). Our
method is able to better exploit the stored knowledge in pretrained LMs without
adding extra learnable parameters or needing finetuning, and paves the way for
hybrid models that integrate pretrained LMs with external knowledge.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 2022 16:00:50 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 05:55:28 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Su",
"Dan",
""
],
[
"Patwary",
"Mostofa",
""
],
[
"Prabhumoye",
"Shrimai",
""
],
[
"Xu",
"Peng",
""
],
[
"Prenger",
"Ryan",
""
],
[
"Shoeybi",
"Mohammad",
""
],
[
"Fung",
"Pascale",
""
],
[
"Anandkumar",
"Anima",
""
],
[
"Catanzaro",
"Bryan",
""
]
] | TITLE: Context Generation Improves Open Domain Question Answering
ABSTRACT: Closed-book question answering (QA) requires a model to directly answer an
open-domain question without access to any external knowledge. Prior work on
closed-book QA either directly finetunes or prompts a pretrained language model
(LM) to leverage the stored knowledge. However, they do not fully exploit the
parameterized knowledge. To address this issue, we propose a two-stage,
closed-book QA framework which employs a coarse-to-fine approach to extract
relevant knowledge and answer a question. Our approach first generates a
related context for a given question by prompting a pretrained LM. We then
prompt the same LM for answer prediction using the generated context and the
question. Additionally, to eliminate failure caused by context uncertainty, we
marginalize over generated contexts. Experimental results on three QA
benchmarks show that our method significantly outperforms previous closed-book
QA methods (e.g. exact matching 68.6% vs. 55.3%), and is on par with open-book
methods that exploit external knowledge sources (e.g. 68.6% vs. 68.0%). Our
method is able to better exploit the stored knowledge in pretrained LMs without
adding extra learnable parameters or needing finetuning, and paves the way for
hybrid models that integrate pretrained LMs with external knowledge.
| no_new_dataset | 0.711443 |
2210.08794 | Zihao Chen | Zihao Chen, Wenyong Wang, Sai Zou | Break The Spell Of Total Correlation In betaTCVAE | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the absence of artificial labels, the independent and dependent features
in the data are cluttered. How to construct the inductive biases of the model
to flexibly divide and effectively contain features with different complexity
is the main focal point of unsupervised disentangled representation learning.
This paper proposes a new iterative decomposition path of total correlation and
explains the disentangled representation ability of VAE from the perspective of
model capacity allocation. The newly developed objective function combines
latent variable dimensions into joint distribution while relieving the
independence constraints of marginal distributions in combination, leading to
latent variables with a more manipulable prior distribution. The novel model
enables VAE to adjust the parameter capacity to divide dependent and
independent data features flexibly. Experimental results on various datasets
show an interesting relevance between model capacity and the latent variable
grouping size, called the "V"-shaped best ELBO trajectory. Additionally, we
empirically demonstrate that the proposed method obtains better disentangling
performance with reasonable parameter capacity allocation.
| [
{
"version": "v1",
"created": "Mon, 17 Oct 2022 07:16:53 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 08:56:25 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Chen",
"Zihao",
""
],
[
"Wang",
"Wenyong",
""
],
[
"Zou",
"Sai",
""
]
] | TITLE: Break The Spell Of Total Correlation In betaTCVAE
ABSTRACT: In the absence of artificial labels, the independent and dependent features
in the data are cluttered. How to construct the inductive biases of the model
to flexibly divide and effectively contain features with different complexity
is the main focal point of unsupervised disentangled representation learning.
This paper proposes a new iterative decomposition path of total correlation and
explains the disentangled representation ability of VAE from the perspective of
model capacity allocation. The newly developed objective function combines
latent variable dimensions into joint distribution while relieving the
independence constraints of marginal distributions in combination, leading to
latent variables with a more manipulable prior distribution. The novel model
enables VAE to adjust the parameter capacity to divide dependent and
independent data features flexibly. Experimental results on various datasets
show an interesting relevance between model capacity and the latent variable
grouping size, called the "V"-shaped best ELBO trajectory. Additionally, we
empirically demonstrate that the proposed method obtains better disentangling
performance with reasonable parameter capacity allocation.
| no_new_dataset | 0.708011 |
2211.01886 | Margherita Rosnati | Margherita Rosnati, Fabio De Sousa Ribeiro, Miguel Monteiro, Daniel
Coelho de Castro, Ben Glocker | Analysing the effectiveness of a generative model for semi-supervised
medical image segmentation | Accepted at ML4H 2022 | null | null | https://proceedings.mlr.press/v193/rosnati22a.html | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Image segmentation is important in medical imaging, providing valuable,
quantitative information for clinical decision-making in diagnosis, therapy,
and intervention. The state-of-the-art in automated segmentation remains
supervised learning, employing discriminative models such as U-Net. However,
training these models requires access to large amounts of manually labelled
data which is often difficult to obtain in real medical applications. In such
settings, semi-supervised learning (SSL) attempts to leverage the abundance of
unlabelled data to obtain more robust and reliable models. Recently, generative
models have been proposed for semantic segmentation, as they make an attractive
choice for SSL. Their ability to capture the joint distribution over input
images and output label maps provides a natural way to incorporate information
from unlabelled images. This paper analyses whether deep generative models such
as the SemanticGAN are truly viable alternatives to tackle challenging medical
image segmentation problems. To that end, we thoroughly evaluate the
segmentation performance, robustness, and potential subgroup disparities of
discriminative and generative segmentation methods when applied to large-scale,
publicly available chest X-ray datasets.
| [
{
"version": "v1",
"created": "Thu, 3 Nov 2022 15:19:59 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Rosnati",
"Margherita",
""
],
[
"Ribeiro",
"Fabio De Sousa",
""
],
[
"Monteiro",
"Miguel",
""
],
[
"de Castro",
"Daniel Coelho",
""
],
[
"Glocker",
"Ben",
""
]
] | TITLE: Analysing the effectiveness of a generative model for semi-supervised
medical image segmentation
ABSTRACT: Image segmentation is important in medical imaging, providing valuable,
quantitative information for clinical decision-making in diagnosis, therapy,
and intervention. The state-of-the-art in automated segmentation remains
supervised learning, employing discriminative models such as U-Net. However,
training these models requires access to large amounts of manually labelled
data which is often difficult to obtain in real medical applications. In such
settings, semi-supervised learning (SSL) attempts to leverage the abundance of
unlabelled data to obtain more robust and reliable models. Recently, generative
models have been proposed for semantic segmentation, as they make an attractive
choice for SSL. Their ability to capture the joint distribution over input
images and output label maps provides a natural way to incorporate information
from unlabelled images. This paper analyses whether deep generative models such
as the SemanticGAN are truly viable alternatives to tackle challenging medical
image segmentation problems. To that end, we thoroughly evaluate the
segmentation performance, robustness, and potential subgroup disparities of
discriminative and generative segmentation methods when applied to large-scale,
publicly available chest X-ray datasets.
| no_new_dataset | 0.710829 |
2211.02504 | Alex Morehead | Alex Morehead, Jianlin Cheng | Geometry-Complete Perceptron Networks for 3D Molecular Graphs | 36 pages, 3 figures, 12 tables. Under review. Also presented at
DLG-AAAI 2023 and AI2ASE-AAAI 2023. Code available at
https://github.com/BioinfoMachineLearning/GCPNet | null | null | null | cs.LG cs.AI q-bio.BM q-bio.QM stat.ML | http://creativecommons.org/licenses/by/4.0/ | The field of geometric deep learning has had a profound impact on the
development of innovative and powerful graph neural network architectures.
Disciplines such as computer vision and computational biology have benefited
significantly from such methodological advances, which has led to breakthroughs
in scientific domains such as protein structure prediction and design. In this
work, we introduce GCPNet, a new geometry-complete, SE(3)-equivariant graph
neural network designed for 3D molecular graph representation learning.
Rigorous experiments across four distinct geometric tasks demonstrate that
GCPNet's predictions (1) for protein-ligand binding affinity achieve a
statistically significant correlation of 0.608, more than 5% greater than
current state-of-the-art methods; (2) for protein structure ranking achieve
statistically significant target-local and dataset-global correlations of 0.616
and 0.871, respectively; (3) for Newtownian many-body systems modeling achieve
a task-averaged mean squared error less than 0.01, more than 15% better than
current methods; and (4) for molecular chirality recognition achieve a
state-of-the-art prediction accuracy of 98.7%, better than any other machine
learning method to date. The source code, data, and instructions to train new
models or reproduce our results are freely available at
https://github.com/BioinfoMachineLearning/GCPNet.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2022 15:05:40 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jan 2023 16:05:26 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Feb 2023 03:32:08 GMT"
},
{
"version": "v4",
"created": "Wed, 26 Apr 2023 20:19:32 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Morehead",
"Alex",
""
],
[
"Cheng",
"Jianlin",
""
]
] | TITLE: Geometry-Complete Perceptron Networks for 3D Molecular Graphs
ABSTRACT: The field of geometric deep learning has had a profound impact on the
development of innovative and powerful graph neural network architectures.
Disciplines such as computer vision and computational biology have benefited
significantly from such methodological advances, which has led to breakthroughs
in scientific domains such as protein structure prediction and design. In this
work, we introduce GCPNet, a new geometry-complete, SE(3)-equivariant graph
neural network designed for 3D molecular graph representation learning.
Rigorous experiments across four distinct geometric tasks demonstrate that
GCPNet's predictions (1) for protein-ligand binding affinity achieve a
statistically significant correlation of 0.608, more than 5% greater than
current state-of-the-art methods; (2) for protein structure ranking achieve
statistically significant target-local and dataset-global correlations of 0.616
and 0.871, respectively; (3) for Newtownian many-body systems modeling achieve
a task-averaged mean squared error less than 0.01, more than 15% better than
current methods; and (4) for molecular chirality recognition achieve a
state-of-the-art prediction accuracy of 98.7%, better than any other machine
learning method to date. The source code, data, and instructions to train new
models or reproduce our results are freely available at
https://github.com/BioinfoMachineLearning/GCPNet.
| no_new_dataset | 0.709416 |
2211.12874 | Arijit Nandi | Ayushi Chaudhuri and Arijit Nandi and Buddhadeb Pradhan | A Dynamic Weighted Federated Learning for Android Malware Classification | Accepted in SoCTA 2022 | 25 April 2023 | 10.1007/978-981-19-9858-4_13 | Lecture Notes in Networks and Systems book series (LNNS,volume
627)-978-981-19-9857-7 | cs.CR cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | Android malware attacks are increasing daily at a tremendous volume, making
Android users more vulnerable to cyber-attacks. Researchers have developed many
machine learning (ML)/ deep learning (DL) techniques to detect and mitigate
android malware attacks. However, due to technological advancement, there is a
rise in android mobile devices. Furthermore, the devices are geographically
dispersed, resulting in distributed data. In such scenario, traditional ML/DL
techniques are infeasible since all of these approaches require the data to be
kept in a central system; this may provide a problem for user privacy because
of the massive proliferation of Android mobile devices; putting the data in a
central system creates an overhead. Also, the traditional ML/DL-based android
malware classification techniques are not scalable. Researchers have proposed
federated learning (FL) based android malware classification system to solve
the privacy preservation and scalability with high classification performance.
In traditional FL, Federated Averaging (FedAvg) is utilized to construct the
global model at each round by merging all of the local models obtained from all
of the customers that participated in the FL. However, the conventional FedAvg
has a disadvantage: if one poor-performing local model is included in global
model development for each round, it may result in an under-performing global
model. Because FedAvg favors all local models equally when averaging. To
address this issue, our main objective in this work is to design a dynamic
weighted federated averaging (DW-FedAvg) strategy in which the weights for each
local model are automatically updated based on their performance at the client.
The DW-FedAvg is evaluated using four popular benchmark datasets, Melgenome,
Drebin, Kronodroid and Tuandromd used in android malware classification
research.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2022 11:30:09 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Chaudhuri",
"Ayushi",
""
],
[
"Nandi",
"Arijit",
""
],
[
"Pradhan",
"Buddhadeb",
""
]
] | TITLE: A Dynamic Weighted Federated Learning for Android Malware Classification
ABSTRACT: Android malware attacks are increasing daily at a tremendous volume, making
Android users more vulnerable to cyber-attacks. Researchers have developed many
machine learning (ML)/ deep learning (DL) techniques to detect and mitigate
android malware attacks. However, due to technological advancement, there is a
rise in android mobile devices. Furthermore, the devices are geographically
dispersed, resulting in distributed data. In such scenario, traditional ML/DL
techniques are infeasible since all of these approaches require the data to be
kept in a central system; this may provide a problem for user privacy because
of the massive proliferation of Android mobile devices; putting the data in a
central system creates an overhead. Also, the traditional ML/DL-based android
malware classification techniques are not scalable. Researchers have proposed
federated learning (FL) based android malware classification system to solve
the privacy preservation and scalability with high classification performance.
In traditional FL, Federated Averaging (FedAvg) is utilized to construct the
global model at each round by merging all of the local models obtained from all
of the customers that participated in the FL. However, the conventional FedAvg
has a disadvantage: if one poor-performing local model is included in global
model development for each round, it may result in an under-performing global
model. Because FedAvg favors all local models equally when averaging. To
address this issue, our main objective in this work is to design a dynamic
weighted federated averaging (DW-FedAvg) strategy in which the weights for each
local model are automatically updated based on their performance at the client.
The DW-FedAvg is evaluated using four popular benchmark datasets, Melgenome,
Drebin, Kronodroid and Tuandromd used in android malware classification
research.
| no_new_dataset | 0.711055 |
2211.13126 | Seyed Mojtaba Marvasti-Zadeh | Seyed Mojtaba Marvasti-Zadeh, Devin Goodsman, Nilanjan Ray, Nadir
Erbilgin | Crown-CAM: Interpretable Visual Explanations for Tree Crown Detection in
Aerial Images | Accepted manuscript in IEEE Geoscience and Remote Sensing Letters
(GRSL) | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual explanation of ``black-box'' models allows researchers in explainable
artificial intelligence (XAI) to interpret the model's decisions in a
human-understandable manner. In this paper, we propose interpretable class
activation mapping for tree crown detection (Crown-CAM) that overcomes
inaccurate localization & computational complexity of previous methods while
generating reliable visual explanations for the challenging and dynamic problem
of tree crown detection in aerial images. It consists of an unsupervised
selection of activation maps, computation of local score maps, and
non-contextual background suppression to efficiently provide fine-grain
localization of tree crowns in scenarios with dense forest trees or scenes
without tree crowns. Additionally, two Intersection over Union (IoU)-based
metrics are introduced to effectively quantify both the accuracy and inaccuracy
of generated explanations with respect to regions with or even without tree
crowns in the image. Empirical evaluations demonstrate that the proposed
Crown-CAM outperforms the Score-CAM, Augmented Score-CAM, and Eigen-CAM methods
by an average IoU margin of 8.7, 5.3, and 21.7 (and 3.3, 9.8, and 16.5)
respectively in improving the accuracy (and decreasing inaccuracy) of visual
explanations on the challenging NEON tree crown dataset.
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2022 17:01:33 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 03:34:01 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Marvasti-Zadeh",
"Seyed Mojtaba",
""
],
[
"Goodsman",
"Devin",
""
],
[
"Ray",
"Nilanjan",
""
],
[
"Erbilgin",
"Nadir",
""
]
] | TITLE: Crown-CAM: Interpretable Visual Explanations for Tree Crown Detection in
Aerial Images
ABSTRACT: Visual explanation of ``black-box'' models allows researchers in explainable
artificial intelligence (XAI) to interpret the model's decisions in a
human-understandable manner. In this paper, we propose interpretable class
activation mapping for tree crown detection (Crown-CAM) that overcomes
inaccurate localization & computational complexity of previous methods while
generating reliable visual explanations for the challenging and dynamic problem
of tree crown detection in aerial images. It consists of an unsupervised
selection of activation maps, computation of local score maps, and
non-contextual background suppression to efficiently provide fine-grain
localization of tree crowns in scenarios with dense forest trees or scenes
without tree crowns. Additionally, two Intersection over Union (IoU)-based
metrics are introduced to effectively quantify both the accuracy and inaccuracy
of generated explanations with respect to regions with or even without tree
crowns in the image. Empirical evaluations demonstrate that the proposed
Crown-CAM outperforms the Score-CAM, Augmented Score-CAM, and Eigen-CAM methods
by an average IoU margin of 8.7, 5.3, and 21.7 (and 3.3, 9.8, and 16.5)
respectively in improving the accuracy (and decreasing inaccuracy) of visual
explanations on the challenging NEON tree crown dataset.
| no_new_dataset | 0.712063 |
2212.07430 | Rishabh Tiwari | Kushal Chauhan, Rishabh Tiwari, Jan Freyberg, Pradeep Shenoy,
Krishnamurthy Dvijotham | Interactive Concept Bottleneck Models | Accepted at AAAI 2023 | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/4.0/ | Concept bottleneck models (CBMs) are interpretable neural networks that first
predict labels for human-interpretable concepts relevant to the prediction
task, and then predict the final label based on the concept label predictions.
We extend CBMs to interactive prediction settings where the model can query a
human collaborator for the label to some concepts. We develop an interaction
policy that, at prediction time, chooses which concepts to request a label for
so as to maximally improve the final prediction. We demonstrate that a simple
policy combining concept prediction uncertainty and influence of the concept on
the final prediction achieves strong performance and outperforms static
approaches as well as active feature acquisition methods proposed in the
literature. We show that the interactive CBM can achieve accuracy gains of
5-10% with only 5 interactions over competitive baselines on the Caltech-UCSD
Birds, CheXpert and OAI datasets.
| [
{
"version": "v1",
"created": "Wed, 14 Dec 2022 11:39:18 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Dec 2022 13:31:07 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 17:32:18 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Chauhan",
"Kushal",
""
],
[
"Tiwari",
"Rishabh",
""
],
[
"Freyberg",
"Jan",
""
],
[
"Shenoy",
"Pradeep",
""
],
[
"Dvijotham",
"Krishnamurthy",
""
]
] | TITLE: Interactive Concept Bottleneck Models
ABSTRACT: Concept bottleneck models (CBMs) are interpretable neural networks that first
predict labels for human-interpretable concepts relevant to the prediction
task, and then predict the final label based on the concept label predictions.
We extend CBMs to interactive prediction settings where the model can query a
human collaborator for the label to some concepts. We develop an interaction
policy that, at prediction time, chooses which concepts to request a label for
so as to maximally improve the final prediction. We demonstrate that a simple
policy combining concept prediction uncertainty and influence of the concept on
the final prediction achieves strong performance and outperforms static
approaches as well as active feature acquisition methods proposed in the
literature. We show that the interactive CBM can achieve accuracy gains of
5-10% with only 5 interactions over competitive baselines on the Caltech-UCSD
Birds, CheXpert and OAI datasets.
| no_new_dataset | 0.710226 |
2212.12873 | Aydogan Ozcan | Bijie Bai, Heming Wei, Xilin Yang, Deniz Mengu, Aydogan Ozcan | Data class-specific all-optical transformations and encryption | 27 Pages, 9 Figures, 1 Table | Advanced Materials (2023) | 10.1002/adma.202212091 | null | physics.optics cs.CV physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffractive optical networks provide rich opportunities for visual computing
tasks since the spatial information of a scene can be directly accessed by a
diffractive processor without requiring any digital pre-processing steps. Here
we present data class-specific transformations all-optically performed between
the input and output fields-of-view (FOVs) of a diffractive network. The visual
information of the objects is encoded into the amplitude (A), phase (P), or
intensity (I) of the optical field at the input, which is all-optically
processed by a data class-specific diffractive network. At the output, an image
sensor-array directly measures the transformed patterns, all-optically
encrypted using the transformation matrices pre-assigned to different data
classes, i.e., a separate matrix for each data class. The original input images
can be recovered by applying the correct decryption key (the inverse
transformation) corresponding to the matching data class, while applying any
other key will lead to loss of information. The class-specificity of these
all-optical diffractive transformations creates opportunities where different
keys can be distributed to different users; each user can only decode the
acquired images of only one data class, serving multiple users in an
all-optically encrypted manner. We numerically demonstrated all-optical
class-specific transformations covering A-->A, I-->I, and P-->I transformations
using various image datasets. We also experimentally validated the feasibility
of this framework by fabricating a class-specific I-->I transformation
diffractive network using two-photon polymerization and successfully tested it
at 1550 nm wavelength. Data class-specific all-optical transformations provide
a fast and energy-efficient method for image and data encryption, enhancing
data security and privacy.
| [
{
"version": "v1",
"created": "Sun, 25 Dec 2022 08:31:03 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Bai",
"Bijie",
""
],
[
"Wei",
"Heming",
""
],
[
"Yang",
"Xilin",
""
],
[
"Mengu",
"Deniz",
""
],
[
"Ozcan",
"Aydogan",
""
]
] | TITLE: Data class-specific all-optical transformations and encryption
ABSTRACT: Diffractive optical networks provide rich opportunities for visual computing
tasks since the spatial information of a scene can be directly accessed by a
diffractive processor without requiring any digital pre-processing steps. Here
we present data class-specific transformations all-optically performed between
the input and output fields-of-view (FOVs) of a diffractive network. The visual
information of the objects is encoded into the amplitude (A), phase (P), or
intensity (I) of the optical field at the input, which is all-optically
processed by a data class-specific diffractive network. At the output, an image
sensor-array directly measures the transformed patterns, all-optically
encrypted using the transformation matrices pre-assigned to different data
classes, i.e., a separate matrix for each data class. The original input images
can be recovered by applying the correct decryption key (the inverse
transformation) corresponding to the matching data class, while applying any
other key will lead to loss of information. The class-specificity of these
all-optical diffractive transformations creates opportunities where different
keys can be distributed to different users; each user can only decode the
acquired images of only one data class, serving multiple users in an
all-optically encrypted manner. We numerically demonstrated all-optical
class-specific transformations covering A-->A, I-->I, and P-->I transformations
using various image datasets. We also experimentally validated the feasibility
of this framework by fabricating a class-specific I-->I transformation
diffractive network using two-photon polymerization and successfully tested it
at 1550 nm wavelength. Data class-specific all-optical transformations provide
a fast and energy-efficient method for image and data encryption, enhancing
data security and privacy.
| no_new_dataset | 0.713232 |
2301.00582 | Erlend Lundby | Erlend Torje Berg Lundby, Haakon Robinsson, Adil Rasheed, Ivar Johan
Halvorsen, Jan Tommy Gravdahl | Sparse neural networks with skip-connections for identification of
aluminum electrolysis cell | 8 pages, 5 figures, 2 tables | null | null | null | eess.SY cs.LG cs.SY | http://creativecommons.org/licenses/by/4.0/ | Neural networks are rapidly gaining interest in nonlinear system
identification due to the model's ability to capture complex input-output
relations directly from data. However, despite the flexibility of the approach,
there are still concerns about the safety of these models in this context, as
well as the need for large amounts of potentially expensive data. Aluminum
electrolysis is a highly nonlinear production process, and most of the data
must be sampled manually, making the sampling process expensive and infrequent.
In the case of infrequent measurements of state variables, the accuracy and
open-loop stability of the long-term predictions become highly important.
Standard neural networks struggle to provide stable long-term predictions with
limited training data. In this work, we investigate the effect of combining
concatenated skip-connections and the sparsity-promoting $\ell_1$
regularization on the open-loop stability and accuracy of forecasts with short,
medium, and long prediction horizons. The case study is conducted on a
high-dimensional and nonlinear simulator representing an aluminum electrolysis
cell's mass and energy balance. The proposed model structure contains
concatenated skip connections from the input layer and all intermittent layers
to the output layer, referred to as InputSkip. $\ell_1$ regularized InputSkip
is called sparse InputSkip. The results show that sparse InputSkip outperforms
dense and sparse standard feedforward neural networks and dense InputSkip
regarding open-loop stability and long-term predictive accuracy. The results
are significant when models are trained on datasets of all sizes (small,
medium, and large training sets) and for all prediction horizons (short,
medium, and long prediction horizons.)
| [
{
"version": "v1",
"created": "Mon, 2 Jan 2023 10:13:33 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 10:09:25 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Lundby",
"Erlend Torje Berg",
""
],
[
"Robinsson",
"Haakon",
""
],
[
"Rasheed",
"Adil",
""
],
[
"Halvorsen",
"Ivar Johan",
""
],
[
"Gravdahl",
"Jan Tommy",
""
]
] | TITLE: Sparse neural networks with skip-connections for identification of
aluminum electrolysis cell
ABSTRACT: Neural networks are rapidly gaining interest in nonlinear system
identification due to the model's ability to capture complex input-output
relations directly from data. However, despite the flexibility of the approach,
there are still concerns about the safety of these models in this context, as
well as the need for large amounts of potentially expensive data. Aluminum
electrolysis is a highly nonlinear production process, and most of the data
must be sampled manually, making the sampling process expensive and infrequent.
In the case of infrequent measurements of state variables, the accuracy and
open-loop stability of the long-term predictions become highly important.
Standard neural networks struggle to provide stable long-term predictions with
limited training data. In this work, we investigate the effect of combining
concatenated skip-connections and the sparsity-promoting $\ell_1$
regularization on the open-loop stability and accuracy of forecasts with short,
medium, and long prediction horizons. The case study is conducted on a
high-dimensional and nonlinear simulator representing an aluminum electrolysis
cell's mass and energy balance. The proposed model structure contains
concatenated skip connections from the input layer and all intermittent layers
to the output layer, referred to as InputSkip. $\ell_1$ regularized InputSkip
is called sparse InputSkip. The results show that sparse InputSkip outperforms
dense and sparse standard feedforward neural networks and dense InputSkip
regarding open-loop stability and long-term predictive accuracy. The results
are significant when models are trained on datasets of all sizes (small,
medium, and large training sets) and for all prediction horizons (short,
medium, and long prediction horizons.)
| no_new_dataset | 0.712807 |
2301.06087 | Roozbeh Bostandoost | Roozbeh Bostandoost, Bo Sun, Carlee Joe-Wong, Mohammad Hajiesmaili | Near-optimal Online Algorithms for Joint Pricing and Scheduling in EV
Charging Networks | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid acceleration of transportation electrification, public
charging stations are becoming vital infrastructure in a smart sustainable city
to provide on-demand electric vehicle (EV) charging services. As more consumers
seek to utilize public charging services, the pricing and scheduling of such
services will become vital, complementary tools to mediate competition for
charging resources. However, determining the right prices to charge is
difficult due to the online nature of EV arrivals. This paper studies a joint
pricing and scheduling problem for the operator of EV charging networks with
limited charging capacity and time-varying energy cost. Upon receiving a
charging request, the operator offers a price, and the EV decides whether to
admit the offer based on its own value and the posted price. The operator then
schedules the real-time charging process to satisfy the charging request if the
EV admits the offer. We propose an online pricing algorithm that can determine
the posted price and EV charging schedule to maximize social welfare, i.e., the
total value of EVs minus the energy cost of charging stations. Theoretically,
we prove the devised algorithm can achieve the order-optimal competitive ratio
under the competitive analysis framework. Practically, we show the empirical
performance of our algorithm outperforms other benchmark algorithms in
experiments using real EV charging data.
| [
{
"version": "v1",
"created": "Wed, 11 Jan 2023 03:40:44 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 00:33:44 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Bostandoost",
"Roozbeh",
""
],
[
"Sun",
"Bo",
""
],
[
"Joe-Wong",
"Carlee",
""
],
[
"Hajiesmaili",
"Mohammad",
""
]
] | TITLE: Near-optimal Online Algorithms for Joint Pricing and Scheduling in EV
Charging Networks
ABSTRACT: With the rapid acceleration of transportation electrification, public
charging stations are becoming vital infrastructure in a smart sustainable city
to provide on-demand electric vehicle (EV) charging services. As more consumers
seek to utilize public charging services, the pricing and scheduling of such
services will become vital, complementary tools to mediate competition for
charging resources. However, determining the right prices to charge is
difficult due to the online nature of EV arrivals. This paper studies a joint
pricing and scheduling problem for the operator of EV charging networks with
limited charging capacity and time-varying energy cost. Upon receiving a
charging request, the operator offers a price, and the EV decides whether to
admit the offer based on its own value and the posted price. The operator then
schedules the real-time charging process to satisfy the charging request if the
EV admits the offer. We propose an online pricing algorithm that can determine
the posted price and EV charging schedule to maximize social welfare, i.e., the
total value of EVs minus the energy cost of charging stations. Theoretically,
we prove the devised algorithm can achieve the order-optimal competitive ratio
under the competitive analysis framework. Practically, we show the empirical
performance of our algorithm outperforms other benchmark algorithms in
experiments using real EV charging data.
| no_new_dataset | 0.711186 |
2301.08851 | Yongqi Han | Yongqi Han, Qingfeng Du, Jincheng Xu, Shengjie Zhao, Zhekang Chen, Li
Cao, Kanglin Yin, Dan Pei | LWS: A Framework for Log-based Workload Simulation in Session-based SUT | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial intelligence for IT Operations (AIOps) plays a critical role in
operating and managing cloud-native systems and microservice-based applications
but is limited by the lack of high-quality datasets with diverse scenarios.
Realistic workloads are the premise and basis of generating such AIOps
datasets, with the session-based workload being one of the most typical
examples. Due to privacy concerns, complexity, variety, and requirements for
reasonable intervention, it is difficult to copy or generate such workloads
directly, showing the importance of effective and intervenable workload
simulation. In this paper, we formulate the task of workload simulation and
propose a framework for Log-based Workload Simulation (LWS) in session-based
systems. LWS extracts the workload specification including the user behavior
abstraction based on agglomerative clustering as well as relational models and
the intervenable workload intensity from session logs. Then LWS combines the
user behavior abstraction with the workload intensity to generate simulated
workloads. The experimental evaluation is performed on an open-source
cloud-native application with both well-designed and public real-world
workloads, showing that the simulated workload generated by LWS is effective
and intervenable, which provides the foundation of generating high-quality
AIOps datasets.
| [
{
"version": "v1",
"created": "Sat, 21 Jan 2023 01:58:34 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 12:00:07 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Han",
"Yongqi",
""
],
[
"Du",
"Qingfeng",
""
],
[
"Xu",
"Jincheng",
""
],
[
"Zhao",
"Shengjie",
""
],
[
"Chen",
"Zhekang",
""
],
[
"Cao",
"Li",
""
],
[
"Yin",
"Kanglin",
""
],
[
"Pei",
"Dan",
""
]
] | TITLE: LWS: A Framework for Log-based Workload Simulation in Session-based SUT
ABSTRACT: Artificial intelligence for IT Operations (AIOps) plays a critical role in
operating and managing cloud-native systems and microservice-based applications
but is limited by the lack of high-quality datasets with diverse scenarios.
Realistic workloads are the premise and basis of generating such AIOps
datasets, with the session-based workload being one of the most typical
examples. Due to privacy concerns, complexity, variety, and requirements for
reasonable intervention, it is difficult to copy or generate such workloads
directly, showing the importance of effective and intervenable workload
simulation. In this paper, we formulate the task of workload simulation and
propose a framework for Log-based Workload Simulation (LWS) in session-based
systems. LWS extracts the workload specification including the user behavior
abstraction based on agglomerative clustering as well as relational models and
the intervenable workload intensity from session logs. Then LWS combines the
user behavior abstraction with the workload intensity to generate simulated
workloads. The experimental evaluation is performed on an open-source
cloud-native application with both well-designed and public real-world
workloads, showing that the simulated workload generated by LWS is effective
and intervenable, which provides the foundation of generating high-quality
AIOps datasets.
| no_new_dataset | 0.709372 |
2301.13808 | Binyuan Hui | Yunhu Ye, Binyuan Hui, Min Yang, Binhua Li, Fei Huang, Yongbin Li | Large Language Models are Versatile Decomposers: Decompose Evidence and
Questions for Table-based Reasoning | SIGIR 2023 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Table-based reasoning has shown remarkable progress in combining deep models
with discrete reasoning, which requires reasoning over both free-form natural
language (NL) questions and structured tabular data. However, previous
table-based reasoning solutions usually suffer from significant performance
degradation on huge evidence (tables). In addition, most existing methods
struggle to reason over complex questions since the required information is
scattered in different places. To alleviate the above challenges, we exploit
large language models (LLMs) as decomposers for effective table-based
reasoning, which (i) decompose huge evidence (a huge table) into sub-evidence
(a small table) to mitigate the interference of useless information for table
reasoning; and (ii) decompose complex questions into simpler sub-questions for
text reasoning. Specifically, we first use the LLMs to break down the evidence
(tables) involved in the current question, retaining the relevant evidence and
excluding the remaining irrelevant evidence from the huge table. In addition,
we propose a "parsing-execution-filling" strategy to alleviate the
hallucination dilemma of the chain of thought by decoupling logic and numerical
computation in each step. Extensive experiments show that our method can
effectively leverage decomposed evidence and questions and outperforms the
strong baselines on TabFact, WikiTableQuestion, and FetaQA datasets. Notably,
our model outperforms human performance for the first time on the TabFact
dataset.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2023 17:51:45 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2023 03:52:32 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2023 11:24:10 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Ye",
"Yunhu",
""
],
[
"Hui",
"Binyuan",
""
],
[
"Yang",
"Min",
""
],
[
"Li",
"Binhua",
""
],
[
"Huang",
"Fei",
""
],
[
"Li",
"Yongbin",
""
]
] | TITLE: Large Language Models are Versatile Decomposers: Decompose Evidence and
Questions for Table-based Reasoning
ABSTRACT: Table-based reasoning has shown remarkable progress in combining deep models
with discrete reasoning, which requires reasoning over both free-form natural
language (NL) questions and structured tabular data. However, previous
table-based reasoning solutions usually suffer from significant performance
degradation on huge evidence (tables). In addition, most existing methods
struggle to reason over complex questions since the required information is
scattered in different places. To alleviate the above challenges, we exploit
large language models (LLMs) as decomposers for effective table-based
reasoning, which (i) decompose huge evidence (a huge table) into sub-evidence
(a small table) to mitigate the interference of useless information for table
reasoning; and (ii) decompose complex questions into simpler sub-questions for
text reasoning. Specifically, we first use the LLMs to break down the evidence
(tables) involved in the current question, retaining the relevant evidence and
excluding the remaining irrelevant evidence from the huge table. In addition,
we propose a "parsing-execution-filling" strategy to alleviate the
hallucination dilemma of the chain of thought by decoupling logic and numerical
computation in each step. Extensive experiments show that our method can
effectively leverage decomposed evidence and questions and outperforms the
strong baselines on TabFact, WikiTableQuestion, and FetaQA datasets. Notably,
our model outperforms human performance for the first time on the TabFact
dataset.
| no_new_dataset | 0.71039 |
2303.03229 | Petra Galu\v{s}\v{c}\'akov\'a | Petra Galu\v{s}\v{c}\'akov\'a Romain Deveaud, Gabriela Gonzalez-Saez,
Philippe Mulhem, Lorraine Goeuriot, Florina Piroi, Martin Popel | LongEval-Retrieval: French-English Dynamic Test Collection for
Continuous Web Search Evaluation | null | null | null | null | cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | LongEval-Retrieval is a Web document retrieval benchmark that focuses on
continuous retrieval evaluation. This test collection is intended to be used to
study the temporal persistence of Information Retrieval systems and will be
used as the test collection in the Longitudinal Evaluation of Model Performance
Track (LongEval) at CLEF 2023. This benchmark simulates an evolving information
system environment - such as the one a Web search engine operates in - where
the document collection, the query distribution, and relevance all move
continuously, while following the Cranfield paradigm for offline evaluation. To
do that, we introduce the concept of a dynamic test collection that is composed
of successive sub-collections each representing the state of an information
system at a given time step. In LongEval-Retrieval, each sub-collection
contains a set of queries, documents, and soft relevance assessments built from
click models. The data comes from Qwant, a privacy-preserving Web search engine
that primarily focuses on the French market. LongEval-Retrieval also provides a
'mirror' collection: it is initially constructed in the French language to
benefit from the majority of Qwant's traffic, before being translated to
English. This paper presents the creation process of LongEval-Retrieval and
provides baseline runs and analysis.
| [
{
"version": "v1",
"created": "Mon, 6 Mar 2023 15:47:45 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 09:51:56 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Deveaud",
"Petra Galuščáková Romain",
""
],
[
"Gonzalez-Saez",
"Gabriela",
""
],
[
"Mulhem",
"Philippe",
""
],
[
"Goeuriot",
"Lorraine",
""
],
[
"Piroi",
"Florina",
""
],
[
"Popel",
"Martin",
""
]
] | TITLE: LongEval-Retrieval: French-English Dynamic Test Collection for
Continuous Web Search Evaluation
ABSTRACT: LongEval-Retrieval is a Web document retrieval benchmark that focuses on
continuous retrieval evaluation. This test collection is intended to be used to
study the temporal persistence of Information Retrieval systems and will be
used as the test collection in the Longitudinal Evaluation of Model Performance
Track (LongEval) at CLEF 2023. This benchmark simulates an evolving information
system environment - such as the one a Web search engine operates in - where
the document collection, the query distribution, and relevance all move
continuously, while following the Cranfield paradigm for offline evaluation. To
do that, we introduce the concept of a dynamic test collection that is composed
of successive sub-collections each representing the state of an information
system at a given time step. In LongEval-Retrieval, each sub-collection
contains a set of queries, documents, and soft relevance assessments built from
click models. The data comes from Qwant, a privacy-preserving Web search engine
that primarily focuses on the French market. LongEval-Retrieval also provides a
'mirror' collection: it is initially constructed in the French language to
benefit from the majority of Qwant's traffic, before being translated to
English. This paper presents the creation process of LongEval-Retrieval and
provides baseline runs and analysis.
| new_dataset | 0.628892 |
2304.01184 | Lianghui Zhu | Lianghui Zhu, Yingyue Li, Jiemin Fang, Yan Liu, Hao Xin, Wenyu Liu,
Xinggang Wang | WeakTr: Exploring Plain Vision Transformer for Weakly-supervised
Semantic Segmentation | 20 pages, 11 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper explores the properties of the plain Vision Transformer (ViT) for
Weakly-supervised Semantic Segmentation (WSSS). The class activation map (CAM)
is of critical importance for understanding a classification network and
launching WSSS. We observe that different attention heads of ViT focus on
different image areas. Thus a novel weight-based method is proposed to
end-to-end estimate the importance of attention heads, while the self-attention
maps are adaptively fused for high-quality CAM results that tend to have more
complete objects. Besides, we propose a ViT-based gradient clipping decoder for
online retraining with the CAM results to complete the WSSS task. We name this
plain Transformer-based Weakly-supervised learning framework WeakTr. It
achieves the state-of-the-art WSSS performance on standard benchmarks, i.e.,
78.4% mIoU on the val set of PASCAL VOC 2012 and 50.3% mIoU on the val set of
COCO 2014. Code is available at https://github.com/hustvl/WeakTr.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 17:54:10 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 03:03:50 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhu",
"Lianghui",
""
],
[
"Li",
"Yingyue",
""
],
[
"Fang",
"Jiemin",
""
],
[
"Liu",
"Yan",
""
],
[
"Xin",
"Hao",
""
],
[
"Liu",
"Wenyu",
""
],
[
"Wang",
"Xinggang",
""
]
] | TITLE: WeakTr: Exploring Plain Vision Transformer for Weakly-supervised
Semantic Segmentation
ABSTRACT: This paper explores the properties of the plain Vision Transformer (ViT) for
Weakly-supervised Semantic Segmentation (WSSS). The class activation map (CAM)
is of critical importance for understanding a classification network and
launching WSSS. We observe that different attention heads of ViT focus on
different image areas. Thus a novel weight-based method is proposed to
end-to-end estimate the importance of attention heads, while the self-attention
maps are adaptively fused for high-quality CAM results that tend to have more
complete objects. Besides, we propose a ViT-based gradient clipping decoder for
online retraining with the CAM results to complete the WSSS task. We name this
plain Transformer-based Weakly-supervised learning framework WeakTr. It
achieves the state-of-the-art WSSS performance on standard benchmarks, i.e.,
78.4% mIoU on the val set of PASCAL VOC 2012 and 50.3% mIoU on the val set of
COCO 2014. Code is available at https://github.com/hustvl/WeakTr.
| no_new_dataset | 0.711017 |
2304.05350 | Rishit Dagli | Rishit Dagli | Astroformer: More Data Might not be all you need for Classification | 21 pages, 7 figures. ICLR 2023 | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advancements in areas such as natural language processing and computer
vision rely on intricate and massive models that have been trained using vast
amounts of unlabelled or partly labeled data and training or deploying these
state-of-the-art methods to resource constraint environments has been a
challenge. Galaxy morphologies are crucial to understanding the processes by
which galaxies form and evolve. Efficient methods to classify galaxy
morphologies are required to extract physical information from modern-day
astronomy surveys. In this paper, we introduce Astroformer, a method to learn
from less amount of data. We propose using a hybrid transformer-convolutional
architecture drawing much inspiration from the success of CoAtNet and MaxViT.
Concretely, we use the transformer-convolutional hybrid with a new stack design
for the network, a different way of creating a relative self-attention layer,
and pair it with a careful selection of data augmentation and regularization
techniques. Our approach sets a new state-of-the-art on predicting galaxy
morphologies from images on the Galaxy10 DECals dataset, a science objective,
which consists of 17736 labeled images achieving 94.86% top-$1$ accuracy,
beating the current state-of-the-art for this task by 4.62%. Furthermore, this
approach also sets a new state-of-the-art on CIFAR-100 and Tiny ImageNet. We
also find that models and training methods used for larger datasets would often
not work very well in the low-data regime.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 09:38:05 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2023 20:33:41 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Dagli",
"Rishit",
""
]
] | TITLE: Astroformer: More Data Might not be all you need for Classification
ABSTRACT: Recent advancements in areas such as natural language processing and computer
vision rely on intricate and massive models that have been trained using vast
amounts of unlabelled or partly labeled data and training or deploying these
state-of-the-art methods to resource constraint environments has been a
challenge. Galaxy morphologies are crucial to understanding the processes by
which galaxies form and evolve. Efficient methods to classify galaxy
morphologies are required to extract physical information from modern-day
astronomy surveys. In this paper, we introduce Astroformer, a method to learn
from less amount of data. We propose using a hybrid transformer-convolutional
architecture drawing much inspiration from the success of CoAtNet and MaxViT.
Concretely, we use the transformer-convolutional hybrid with a new stack design
for the network, a different way of creating a relative self-attention layer,
and pair it with a careful selection of data augmentation and regularization
techniques. Our approach sets a new state-of-the-art on predicting galaxy
morphologies from images on the Galaxy10 DECals dataset, a science objective,
which consists of 17736 labeled images achieving 94.86% top-$1$ accuracy,
beating the current state-of-the-art for this task by 4.62%. Furthermore, this
approach also sets a new state-of-the-art on CIFAR-100 and Tiny ImageNet. We
also find that models and training methods used for larger datasets would often
not work very well in the low-data regime.
| no_new_dataset | 0.709019 |
2304.12223 | Andac Demir | Andac Demir, Elie Massaad, Bulent Kiziltan | Topology-Aware Focal Loss for 3D Image Segmentation | CVPR 2023 Workshops | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The efficacy of segmentation algorithms is frequently compromised by
topological errors like overlapping regions, disrupted connections, and voids.
To tackle this problem, we introduce a novel loss function, namely
Topology-Aware Focal Loss (TAFL), that incorporates the conventional Focal Loss
with a topological constraint term based on the Wasserstein distance between
the ground truth and predicted segmentation masks' persistence diagrams. By
enforcing identical topology as the ground truth, the topological constraint
can effectively resolve topological errors, while Focal Loss tackles class
imbalance. We begin by constructing persistence diagrams from filtered cubical
complexes of the ground truth and predicted segmentation masks. We subsequently
utilize the Sinkhorn-Knopp algorithm to determine the optimal transport plan
between the two persistence diagrams. The resultant transport plan minimizes
the cost of transporting mass from one distribution to the other and provides a
mapping between the points in the two persistence diagrams. We then compute the
Wasserstein distance based on this travel plan to measure the topological
dissimilarity between the ground truth and predicted masks. We evaluate our
approach by training a 3D U-Net with the MICCAI Brain Tumor Segmentation
(BraTS) challenge validation dataset, which requires accurate segmentation of
3D MRI scans that integrate various modalities for the precise identification
and tracking of malignant brain tumors. Then, we demonstrate that the quality
of segmentation performance is enhanced by regularizing the focal loss through
the addition of a topological constraint as a penalty term.
| [
{
"version": "v1",
"created": "Mon, 24 Apr 2023 16:07:17 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 15:54:41 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Demir",
"Andac",
""
],
[
"Massaad",
"Elie",
""
],
[
"Kiziltan",
"Bulent",
""
]
] | TITLE: Topology-Aware Focal Loss for 3D Image Segmentation
ABSTRACT: The efficacy of segmentation algorithms is frequently compromised by
topological errors like overlapping regions, disrupted connections, and voids.
To tackle this problem, we introduce a novel loss function, namely
Topology-Aware Focal Loss (TAFL), that incorporates the conventional Focal Loss
with a topological constraint term based on the Wasserstein distance between
the ground truth and predicted segmentation masks' persistence diagrams. By
enforcing identical topology as the ground truth, the topological constraint
can effectively resolve topological errors, while Focal Loss tackles class
imbalance. We begin by constructing persistence diagrams from filtered cubical
complexes of the ground truth and predicted segmentation masks. We subsequently
utilize the Sinkhorn-Knopp algorithm to determine the optimal transport plan
between the two persistence diagrams. The resultant transport plan minimizes
the cost of transporting mass from one distribution to the other and provides a
mapping between the points in the two persistence diagrams. We then compute the
Wasserstein distance based on this travel plan to measure the topological
dissimilarity between the ground truth and predicted masks. We evaluate our
approach by training a 3D U-Net with the MICCAI Brain Tumor Segmentation
(BraTS) challenge validation dataset, which requires accurate segmentation of
3D MRI scans that integrate various modalities for the precise identification
and tracking of malignant brain tumors. Then, we demonstrate that the quality
of segmentation performance is enhanced by regularizing the focal loss through
the addition of a topological constraint as a penalty term.
| no_new_dataset | 0.710258 |
2304.12568 | Akash Dutta | Akash Dutta, Jordi Alcaraz, Ali TehraniJamsaz, Eduardo Cesar, Anna
Sikora, Ali Jannesari | Performance Optimization using Multimodal Modeling and Heterogeneous GNN | 14 pages, 9 figures, 3 tables | null | null | null | cs.DC cs.LG cs.PF | http://creativecommons.org/licenses/by/4.0/ | Growing heterogeneity and configurability in HPC architectures has made
auto-tuning applications and runtime parameters on these systems very complex.
Users are presented with a multitude of options to configure parameters. In
addition to application specific solutions, a common approach is to use general
purpose search strategies, which often might not identify the best
configurations or their time to convergence is a significant barrier. There is,
thus, a need for a general purpose and efficient tuning approach that can be
easily scaled and adapted to various tuning tasks. We propose a technique for
tuning parallel code regions that is general enough to be adapted to multiple
tasks. In this paper, we analyze IR-based programming models to make
task-specific performance optimizations. To this end, we propose the Multimodal
Graph Neural Network and Autoencoder (MGA) tuner, a multimodal deep learning
based approach that adapts Heterogeneous Graph Neural Networks and Denoizing
Autoencoders for modeling IR-based code representations that serve as separate
modalities. This approach is used as part of our pipeline to model a syntax,
semantics, and structure-aware IR-based code representation for tuning parallel
code regions/kernels. We extensively experiment on OpenMP and OpenCL code
regions/kernels obtained from PolyBench, Rodinia, STREAM, DataRaceBench, AMD
SDK, NPB, NVIDIA SDK, Parboil, SHOC, and LULESH benchmarks. We apply our
multimodal learning techniques to the tasks of i) optimizing the number of
threads, scheduling policy and chunk size in OpenMP loops and, ii) identifying
the best device for heterogeneous device mapping of OpenCL kernels. Our
experiments show that this multimodal learning based approach outperforms the
state-of-the-art in all experiments.
| [
{
"version": "v1",
"created": "Tue, 25 Apr 2023 04:27:43 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 15:34:39 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Dutta",
"Akash",
""
],
[
"Alcaraz",
"Jordi",
""
],
[
"TehraniJamsaz",
"Ali",
""
],
[
"Cesar",
"Eduardo",
""
],
[
"Sikora",
"Anna",
""
],
[
"Jannesari",
"Ali",
""
]
] | TITLE: Performance Optimization using Multimodal Modeling and Heterogeneous GNN
ABSTRACT: Growing heterogeneity and configurability in HPC architectures has made
auto-tuning applications and runtime parameters on these systems very complex.
Users are presented with a multitude of options to configure parameters. In
addition to application specific solutions, a common approach is to use general
purpose search strategies, which often might not identify the best
configurations or their time to convergence is a significant barrier. There is,
thus, a need for a general purpose and efficient tuning approach that can be
easily scaled and adapted to various tuning tasks. We propose a technique for
tuning parallel code regions that is general enough to be adapted to multiple
tasks. In this paper, we analyze IR-based programming models to make
task-specific performance optimizations. To this end, we propose the Multimodal
Graph Neural Network and Autoencoder (MGA) tuner, a multimodal deep learning
based approach that adapts Heterogeneous Graph Neural Networks and Denoizing
Autoencoders for modeling IR-based code representations that serve as separate
modalities. This approach is used as part of our pipeline to model a syntax,
semantics, and structure-aware IR-based code representation for tuning parallel
code regions/kernels. We extensively experiment on OpenMP and OpenCL code
regions/kernels obtained from PolyBench, Rodinia, STREAM, DataRaceBench, AMD
SDK, NPB, NVIDIA SDK, Parboil, SHOC, and LULESH benchmarks. We apply our
multimodal learning techniques to the tasks of i) optimizing the number of
threads, scheduling policy and chunk size in OpenMP loops and, ii) identifying
the best device for heterogeneous device mapping of OpenCL kernels. Our
experiments show that this multimodal learning based approach outperforms the
state-of-the-art in all experiments.
| no_new_dataset | 0.710867 |
2304.12950 | Koustubh Phalak | Koustubh Phalak, Swaroop Ghosh | Shot Optimization in Quantum Machine Learning Architectures to
Accelerate Training | 10 pages, 6 figures, 1 table | null | null | null | quant-ph cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | In this paper, we propose shot optimization method for QML models at the
expense of minimal impact on model performance. We use classification task as a
test case for MNIST and FMNIST datasets using a hybrid quantum-classical QML
model. First, we sweep the number of shots for short and full versions of the
dataset. We observe that training the full version provides 5-6% higher testing
accuracy than short version of dataset with up to 10X higher number of shots
for training. Therefore, one can reduce the dataset size to accelerate the
training time. Next, we propose adaptive shot allocation on short version
dataset to optimize the number of shots over training epochs and evaluate the
impact on classification accuracy. We use a (a) linear function where the
number of shots reduce linearly with epochs, and (b) step function where the
number of shots reduce in step with epochs. We note around 0.01 increase in
loss and around 4% (1%) reduction in testing accuracy for reduction in shots by
up to 100X (10X) for linear (step) shot function compared to conventional
constant shot function for MNIST dataset, and 0.05 increase in loss and around
5-7% (5-7%) reduction in testing accuracy with similar reduction in shots using
linear (step) shot function on FMNIST dataset. For comparison, we also use the
proposed shot optimization methods to perform ground state energy estimation of
different molecules and observe that step function gives the best and most
stable ground state energy prediction at 1000X less number of shots.
| [
{
"version": "v1",
"created": "Fri, 21 Apr 2023 14:38:14 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 10:30:33 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Phalak",
"Koustubh",
""
],
[
"Ghosh",
"Swaroop",
""
]
] | TITLE: Shot Optimization in Quantum Machine Learning Architectures to
Accelerate Training
ABSTRACT: In this paper, we propose shot optimization method for QML models at the
expense of minimal impact on model performance. We use classification task as a
test case for MNIST and FMNIST datasets using a hybrid quantum-classical QML
model. First, we sweep the number of shots for short and full versions of the
dataset. We observe that training the full version provides 5-6% higher testing
accuracy than short version of dataset with up to 10X higher number of shots
for training. Therefore, one can reduce the dataset size to accelerate the
training time. Next, we propose adaptive shot allocation on short version
dataset to optimize the number of shots over training epochs and evaluate the
impact on classification accuracy. We use a (a) linear function where the
number of shots reduce linearly with epochs, and (b) step function where the
number of shots reduce in step with epochs. We note around 0.01 increase in
loss and around 4% (1%) reduction in testing accuracy for reduction in shots by
up to 100X (10X) for linear (step) shot function compared to conventional
constant shot function for MNIST dataset, and 0.05 increase in loss and around
5-7% (5-7%) reduction in testing accuracy with similar reduction in shots using
linear (step) shot function on FMNIST dataset. For comparison, we also use the
proposed shot optimization methods to perform ground state energy estimation of
different molecules and observe that step function gives the best and most
stable ground state energy prediction at 1000X less number of shots.
| no_new_dataset | 0.713606 |
2304.13393 | Sergey Nikolenko | Aleksei Shabanov, Aleksei Tarasov, Sergey Nikolenko | STIR: Siamese Transformer for Image Retrieval Postprocessing | 14 pages, 3 figures | null | null | null | cs.IR cs.CV | http://creativecommons.org/licenses/by/4.0/ | Current metric learning approaches for image retrieval are usually based on
learning a space of informative latent representations where simple approaches
such as the cosine distance will work well. Recent state of the art methods
such as HypViT move to more complex embedding spaces that may yield better
results but are harder to scale to production environments. In this work, we
first construct a simpler model based on triplet loss with hard negatives
mining that performs at the state of the art level but does not have these
drawbacks. Second, we introduce a novel approach for image retrieval
postprocessing called Siamese Transformer for Image Retrieval (STIR) that
reranks several top outputs in a single forward pass. Unlike previously
proposed Reranking Transformers, STIR does not rely on global/local feature
extraction and directly compares a query image and a retrieved candidate on
pixel level with the usage of attention mechanism. The resulting approach
defines a new state of the art on standard image retrieval datasets: Stanford
Online Products and DeepFashion In-shop. We also release the source code at
https://github.com/OML-Team/open-metric-learning/tree/main/pipelines/postprocessing/
and an interactive demo of our approach at
https://dapladoc-oml-postprocessing-demo-srcappmain-pfh2g0.streamlit.app/
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 09:10:15 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 05:35:46 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Shabanov",
"Aleksei",
""
],
[
"Tarasov",
"Aleksei",
""
],
[
"Nikolenko",
"Sergey",
""
]
] | TITLE: STIR: Siamese Transformer for Image Retrieval Postprocessing
ABSTRACT: Current metric learning approaches for image retrieval are usually based on
learning a space of informative latent representations where simple approaches
such as the cosine distance will work well. Recent state of the art methods
such as HypViT move to more complex embedding spaces that may yield better
results but are harder to scale to production environments. In this work, we
first construct a simpler model based on triplet loss with hard negatives
mining that performs at the state of the art level but does not have these
drawbacks. Second, we introduce a novel approach for image retrieval
postprocessing called Siamese Transformer for Image Retrieval (STIR) that
reranks several top outputs in a single forward pass. Unlike previously
proposed Reranking Transformers, STIR does not rely on global/local feature
extraction and directly compares a query image and a retrieved candidate on
pixel level with the usage of attention mechanism. The resulting approach
defines a new state of the art on standard image retrieval datasets: Stanford
Online Products and DeepFashion In-shop. We also release the source code at
https://github.com/OML-Team/open-metric-learning/tree/main/pipelines/postprocessing/
and an interactive demo of our approach at
https://dapladoc-oml-postprocessing-demo-srcappmain-pfh2g0.streamlit.app/
| no_new_dataset | 0.710842 |
2304.13614 | Yisu Zhang | Yisu Zhang and Jianke Zhu and Lixiang Lin | Multi-View Stereo Representation Revisit: Region-Aware MVSNet | CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning-based multi-view stereo has emerged as a powerful paradigm for
reconstructing the complete geometrically-detailed objects from multi-views.
Most of the existing approaches only estimate the pixel-wise depth value by
minimizing the gap between the predicted point and the intersection of ray and
surface, which usually ignore the surface topology. It is essential to the
textureless regions and surface boundary that cannot be properly reconstructed.
To address this issue, we suggest to take advantage of point-to-surface
distance so that the model is able to perceive a wider range of surfaces. To
this end, we predict the distance volume from cost volume to estimate the
signed distance of points around the surface. Our proposed RA-MVSNet is
patch-awared, since the perception range is enhanced by associating
hypothetical planes with a patch of surface. Therefore, it could increase the
completion of textureless regions and reduce the outliers at the boundary.
Moreover, the mesh topologies with fine details can be generated by the
introduced distance volume. Comparing to the conventional deep learning-based
multi-view stereo methods, our proposed RA-MVSNet approach obtains more
complete reconstruction results by taking advantage of signed distance
supervision. The experiments on both the DTU and Tanks \& Temples datasets
demonstrate that our proposed approach achieves the state-of-the-art results.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 15:17:51 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2023 07:08:37 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhang",
"Yisu",
""
],
[
"Zhu",
"Jianke",
""
],
[
"Lin",
"Lixiang",
""
]
] | TITLE: Multi-View Stereo Representation Revisit: Region-Aware MVSNet
ABSTRACT: Deep learning-based multi-view stereo has emerged as a powerful paradigm for
reconstructing the complete geometrically-detailed objects from multi-views.
Most of the existing approaches only estimate the pixel-wise depth value by
minimizing the gap between the predicted point and the intersection of ray and
surface, which usually ignore the surface topology. It is essential to the
textureless regions and surface boundary that cannot be properly reconstructed.
To address this issue, we suggest to take advantage of point-to-surface
distance so that the model is able to perceive a wider range of surfaces. To
this end, we predict the distance volume from cost volume to estimate the
signed distance of points around the surface. Our proposed RA-MVSNet is
patch-awared, since the perception range is enhanced by associating
hypothetical planes with a patch of surface. Therefore, it could increase the
completion of textureless regions and reduce the outliers at the boundary.
Moreover, the mesh topologies with fine details can be generated by the
introduced distance volume. Comparing to the conventional deep learning-based
multi-view stereo methods, our proposed RA-MVSNet approach obtains more
complete reconstruction results by taking advantage of signed distance
supervision. The experiments on both the DTU and Tanks \& Temples datasets
demonstrate that our proposed approach achieves the state-of-the-art results.
| no_new_dataset | 0.711481 |
2304.13725 | Tongxue Zhou | Tongxue Zhou, Alexandra Noeuveglise, Romain Modzelewski, Fethi
Ghazouani, S\'ebastien Thureau, Maxime Fontanilles and Su Ruan | Prediction of brain tumor recurrence location based on multi-modal
fusion and nonlinear correlation learning | 23 pages, 4 figures | Computerized Medical Imaging and Graphics, 2023 | 10.1016/j.compmedimag.2023.102218 | null | eess.IV cs.AI cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Brain tumor is one of the leading causes of cancer death. The high-grade
brain tumors are easier to recurrent even after standard treatment. Therefore,
developing a method to predict brain tumor recurrence location plays an
important role in the treatment planning and it can potentially prolong
patient's survival time. There is still little work to deal with this issue. In
this paper, we present a deep learning-based brain tumor recurrence location
prediction network. Since the dataset is usually small, we propose to use
transfer learning to improve the prediction. We first train a multi-modal brain
tumor segmentation network on the public dataset BraTS 2021. Then, the
pre-trained encoder is transferred to our private dataset for extracting the
rich semantic features. Following that, a multi-scale multi-channel feature
fusion model and a nonlinear correlation learning module are developed to learn
the effective features. The correlation between multi-channel features is
modeled by a nonlinear equation. To measure the similarity between the
distributions of original features of one modality and the estimated correlated
features of another modality, we propose to use Kullback-Leibler divergence.
Based on this divergence, a correlation loss function is designed to maximize
the similarity between the two feature distributions. Finally, two decoders are
constructed to jointly segment the present brain tumor and predict its future
tumor recurrence location. To the best of our knowledge, this is the first work
that can segment the present tumor and at the same time predict future tumor
recurrence location, making the treatment planning more efficient and precise.
The experimental results demonstrated the effectiveness of our proposed method
to predict the brain tumor recurrence location from the limited dataset.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2023 02:45:38 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhou",
"Tongxue",
""
],
[
"Noeuveglise",
"Alexandra",
""
],
[
"Modzelewski",
"Romain",
""
],
[
"Ghazouani",
"Fethi",
""
],
[
"Thureau",
"Sébastien",
""
],
[
"Fontanilles",
"Maxime",
""
],
[
"Ruan",
"Su",
""
]
] | TITLE: Prediction of brain tumor recurrence location based on multi-modal
fusion and nonlinear correlation learning
ABSTRACT: Brain tumor is one of the leading causes of cancer death. The high-grade
brain tumors are easier to recurrent even after standard treatment. Therefore,
developing a method to predict brain tumor recurrence location plays an
important role in the treatment planning and it can potentially prolong
patient's survival time. There is still little work to deal with this issue. In
this paper, we present a deep learning-based brain tumor recurrence location
prediction network. Since the dataset is usually small, we propose to use
transfer learning to improve the prediction. We first train a multi-modal brain
tumor segmentation network on the public dataset BraTS 2021. Then, the
pre-trained encoder is transferred to our private dataset for extracting the
rich semantic features. Following that, a multi-scale multi-channel feature
fusion model and a nonlinear correlation learning module are developed to learn
the effective features. The correlation between multi-channel features is
modeled by a nonlinear equation. To measure the similarity between the
distributions of original features of one modality and the estimated correlated
features of another modality, we propose to use Kullback-Leibler divergence.
Based on this divergence, a correlation loss function is designed to maximize
the similarity between the two feature distributions. Finally, two decoders are
constructed to jointly segment the present brain tumor and predict its future
tumor recurrence location. To the best of our knowledge, this is the first work
that can segment the present tumor and at the same time predict future tumor
recurrence location, making the treatment planning more efficient and precise.
The experimental results demonstrated the effectiveness of our proposed method
to predict the brain tumor recurrence location from the limited dataset.
| no_new_dataset | 0.707815 |
2304.13727 | Muhammad Umar Farooq | Muhammad Umar Farooq (1), Zahid Ullah (1), Jeonghwan Gwak (1) ((1)
Korea National University of Transportation) | Ensemble CNNs for Breast Tumor Classification | SMA 2021: The 10th International Conference on Smart Media and
Applications Gunsan Saemangeum Convention Center and Kunsan National
University Gunsan-si, South Korea, September 9-11, 2021 | null | null | null | eess.IV cs.AI cs.CV cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | To improve the recognition ability of computer-aided breast mass
classification among mammographic images, in this work we explore the
state-of-the-art classification networks to develop an ensemble mechanism.
First, the regions of interest (ROIs) are obtained from the original dataset,
and then three models, i.e., XceptionNet, DenseNet, and EfficientNet, are
trained individually. After training, we ensemble the mechanism by summing the
probabilities outputted from each network which enhances the performance up to
5%. The scheme has been validated on a public dataset and we achieved accuracy,
precision, and recall 88%, 85%, and 76% respectively.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2023 10:59:38 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Farooq",
"Muhammad Umar",
""
],
[
"Ullah",
"Zahid",
""
],
[
"Gwak",
"Jeonghwan",
""
]
] | TITLE: Ensemble CNNs for Breast Tumor Classification
ABSTRACT: To improve the recognition ability of computer-aided breast mass
classification among mammographic images, in this work we explore the
state-of-the-art classification networks to develop an ensemble mechanism.
First, the regions of interest (ROIs) are obtained from the original dataset,
and then three models, i.e., XceptionNet, DenseNet, and EfficientNet, are
trained individually. After training, we ensemble the mechanism by summing the
probabilities outputted from each network which enhances the performance up to
5%. The scheme has been validated on a public dataset and we achieved accuracy,
precision, and recall 88%, 85%, and 76% respectively.
| no_new_dataset | 0.7116 |
2304.13738 | Neelesh Mungoli | Neelesh Mungoli | Scalable, Distributed AI Frameworks: Leveraging Cloud Computing for
Enhanced Deep Learning Performance and Efficiency | null | null | null | null | cs.LG cs.AI cs.NI | http://creativecommons.org/publicdomain/zero/1.0/ | In recent years, the integration of artificial intelligence (AI) and cloud
computing has emerged as a promising avenue for addressing the growing
computational demands of AI applications. This paper presents a comprehensive
study of scalable, distributed AI frameworks leveraging cloud computing for
enhanced deep learning performance and efficiency. We first provide an overview
of popular AI frameworks and cloud services, highlighting their respective
strengths and weaknesses. Next, we delve into the critical aspects of data
storage and management in cloud-based AI systems, discussing data
preprocessing, feature engineering, privacy, and security. We then explore
parallel and distributed training techniques for AI models, focusing on model
partitioning, communication strategies, and cloud-based training architectures.
In subsequent chapters, we discuss optimization strategies for AI workloads
in the cloud, covering load balancing, resource allocation, auto-scaling, and
performance benchmarking. We also examine AI model deployment and serving in
the cloud, outlining containerization, serverless deployment options, and
monitoring best practices. To ensure the cost-effectiveness of cloud-based AI
solutions, we present a thorough analysis of costs, optimization strategies,
and case studies showcasing successful deployments. Finally, we summarize the
key findings of this study, discuss the challenges and limitations of
cloud-based AI, and identify emerging trends and future research opportunities
in the field.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 15:38:00 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Mungoli",
"Neelesh",
""
]
] | TITLE: Scalable, Distributed AI Frameworks: Leveraging Cloud Computing for
Enhanced Deep Learning Performance and Efficiency
ABSTRACT: In recent years, the integration of artificial intelligence (AI) and cloud
computing has emerged as a promising avenue for addressing the growing
computational demands of AI applications. This paper presents a comprehensive
study of scalable, distributed AI frameworks leveraging cloud computing for
enhanced deep learning performance and efficiency. We first provide an overview
of popular AI frameworks and cloud services, highlighting their respective
strengths and weaknesses. Next, we delve into the critical aspects of data
storage and management in cloud-based AI systems, discussing data
preprocessing, feature engineering, privacy, and security. We then explore
parallel and distributed training techniques for AI models, focusing on model
partitioning, communication strategies, and cloud-based training architectures.
In subsequent chapters, we discuss optimization strategies for AI workloads
in the cloud, covering load balancing, resource allocation, auto-scaling, and
performance benchmarking. We also examine AI model deployment and serving in
the cloud, outlining containerization, serverless deployment options, and
monitoring best practices. To ensure the cost-effectiveness of cloud-based AI
solutions, we present a thorough analysis of costs, optimization strategies,
and case studies showcasing successful deployments. Finally, we summarize the
key findings of this study, discuss the challenges and limitations of
cloud-based AI, and identify emerging trends and future research opportunities
in the field.
| no_new_dataset | 0.710597 |
2304.13774 | Joey Hejna | Joey Hejna, Jensen Gao, Dorsa Sadigh | Distance Weighted Supervised Learning for Offline Interaction Data | ICML 2023 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequential decision making algorithms often struggle to leverage different
sources of unstructured offline interaction data. Imitation learning (IL)
methods based on supervised learning are robust, but require optimal
demonstrations, which are hard to collect. Offline goal-conditioned
reinforcement learning (RL) algorithms promise to learn from sub-optimal data,
but face optimization challenges especially with high-dimensional data. To
bridge the gap between IL and RL, we introduce Distance Weighted Supervised
Learning or DWSL, a supervised method for learning goal-conditioned policies
from offline data. DWSL models the entire distribution of time-steps between
states in offline data with only supervised learning, and uses this
distribution to approximate shortest path distances. To extract a policy, we
weight actions by their reduction in distance estimates. Theoretically, DWSL
converges to an optimal policy constrained to the data distribution, an
attractive property for offline learning, without any bootstrapping. Across all
datasets we test, DWSL empirically maintains behavior cloning as a lower bound
while still exhibiting policy improvement. In high-dimensional image domains,
DWSL surpasses the performance of both prior goal-conditioned IL and RL
algorithms. Visualizations and code can be found at
https://sites.google.com/view/dwsl/home .
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 18:35:49 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hejna",
"Joey",
""
],
[
"Gao",
"Jensen",
""
],
[
"Sadigh",
"Dorsa",
""
]
] | TITLE: Distance Weighted Supervised Learning for Offline Interaction Data
ABSTRACT: Sequential decision making algorithms often struggle to leverage different
sources of unstructured offline interaction data. Imitation learning (IL)
methods based on supervised learning are robust, but require optimal
demonstrations, which are hard to collect. Offline goal-conditioned
reinforcement learning (RL) algorithms promise to learn from sub-optimal data,
but face optimization challenges especially with high-dimensional data. To
bridge the gap between IL and RL, we introduce Distance Weighted Supervised
Learning or DWSL, a supervised method for learning goal-conditioned policies
from offline data. DWSL models the entire distribution of time-steps between
states in offline data with only supervised learning, and uses this
distribution to approximate shortest path distances. To extract a policy, we
weight actions by their reduction in distance estimates. Theoretically, DWSL
converges to an optimal policy constrained to the data distribution, an
attractive property for offline learning, without any bootstrapping. Across all
datasets we test, DWSL empirically maintains behavior cloning as a lower bound
while still exhibiting policy improvement. In high-dimensional image domains,
DWSL surpasses the performance of both prior goal-conditioned IL and RL
algorithms. Visualizations and code can be found at
https://sites.google.com/view/dwsl/home .
| no_new_dataset | 0.710025 |
2304.13783 | William Rieger | Will Rieger | Fine Tuning with Abnormal Examples | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Given the prevalence of crowd sourced labor in creating Natural Language
processing datasets, these aforementioned sets have become increasingly large.
For instance, the SQUAD dataset currently sits at over 80,000 records. However,
because the English language is rather repetitive in structure, the
distribution of word frequencies in the SQUAD dataset's contexts are relatively
unchanged. By measuring each sentences distance from the co-variate distance of
frequencies of all sentences in the dataset, we identify 10,500 examples that
create a more uniform distribution for training. While fine-tuning ELECTRA [4]
on this subset of examples reaches better performance to a model trained on all
87,000 examples. Herein we introduce a methodology for systematically pruning
datasets for fine tuning reaching better out of sample performance.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 18:59:48 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Rieger",
"Will",
""
]
] | TITLE: Fine Tuning with Abnormal Examples
ABSTRACT: Given the prevalence of crowd sourced labor in creating Natural Language
processing datasets, these aforementioned sets have become increasingly large.
For instance, the SQUAD dataset currently sits at over 80,000 records. However,
because the English language is rather repetitive in structure, the
distribution of word frequencies in the SQUAD dataset's contexts are relatively
unchanged. By measuring each sentences distance from the co-variate distance of
frequencies of all sentences in the dataset, we identify 10,500 examples that
create a more uniform distribution for training. While fine-tuning ELECTRA [4]
on this subset of examples reaches better performance to a model trained on all
87,000 examples. Herein we introduce a methodology for systematically pruning
datasets for fine tuning reaching better out of sample performance.
| no_new_dataset | 0.708629 |
2304.13803 | Terra Blevins | Haoqiang Kang and Terra Blevins and Luke Zettlemoyer | Translate to Disambiguate: Zero-shot Multilingual Word Sense
Disambiguation with Pretrained Language Models | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Pretrained Language Models (PLMs) learn rich cross-lingual knowledge and can
be finetuned to perform well on diverse tasks such as translation and
multilingual word sense disambiguation (WSD). However, they often struggle at
disambiguating word sense in a zero-shot setting. To better understand this
contrast, we present a new study investigating how well PLMs capture
cross-lingual word sense with Contextual Word-Level Translation (C-WLT), an
extension of word-level translation that prompts the model to translate a given
word in context. We find that as the model size increases, PLMs encode more
cross-lingual word sense knowledge and better use context to improve WLT
performance. Building on C-WLT, we introduce a zero-shot approach for WSD,
tested on 18 languages from the XL-WSD dataset. Our method outperforms fully
supervised baselines on recall for many evaluation languages without additional
training or finetuning. This study presents a first step towards understanding
how to best leverage the cross-lingual knowledge inside PLMs for robust
zero-shot reasoning in any language.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 19:55:52 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Kang",
"Haoqiang",
""
],
[
"Blevins",
"Terra",
""
],
[
"Zettlemoyer",
"Luke",
""
]
] | TITLE: Translate to Disambiguate: Zero-shot Multilingual Word Sense
Disambiguation with Pretrained Language Models
ABSTRACT: Pretrained Language Models (PLMs) learn rich cross-lingual knowledge and can
be finetuned to perform well on diverse tasks such as translation and
multilingual word sense disambiguation (WSD). However, they often struggle at
disambiguating word sense in a zero-shot setting. To better understand this
contrast, we present a new study investigating how well PLMs capture
cross-lingual word sense with Contextual Word-Level Translation (C-WLT), an
extension of word-level translation that prompts the model to translate a given
word in context. We find that as the model size increases, PLMs encode more
cross-lingual word sense knowledge and better use context to improve WLT
performance. Building on C-WLT, we introduce a zero-shot approach for WSD,
tested on 18 languages from the XL-WSD dataset. Our method outperforms fully
supervised baselines on recall for many evaluation languages without additional
training or finetuning. This study presents a first step towards understanding
how to best leverage the cross-lingual knowledge inside PLMs for robust
zero-shot reasoning in any language.
| no_new_dataset | 0.699678 |
2304.13846 | Nicholas Walker | Nicholas Walker, John Dagdelen, Kevin Cruse, Sanghoon Lee, Samuel
Gleason, Alexander Dunn, Gerbrand Ceder, A. Paul Alivisatos, Kristin A.
Persson, Anubhav Jain | Extracting Structured Seed-Mediated Gold Nanorod Growth Procedures from
Literature with GPT-3 | null | null | null | null | physics.app-ph cs.CL cs.IR | http://creativecommons.org/licenses/by/4.0/ | Although gold nanorods have been the subject of much research, the pathways
for controlling their shape and thereby their optical properties remain largely
heuristically understood. Although it is apparent that the simultaneous
presence of and interaction between various reagents during synthesis control
these properties, computational and experimental approaches for exploring the
synthesis space can be either intractable or too time-consuming in practice.
This motivates an alternative approach leveraging the wealth of synthesis
information already embedded in the body of scientific literature by developing
tools to extract relevant structured data in an automated, high-throughput
manner. To that end, we present an approach using the powerful GPT-3 language
model to extract structured multi-step seed-mediated growth procedures and
outcomes for gold nanorods from unstructured scientific text. GPT-3 prompt
completions are fine-tuned to predict synthesis templates in the form of JSON
documents from unstructured text input with an overall accuracy of $86\%$. The
performance is notable, considering the model is performing simultaneous entity
recognition and relation extraction. We present a dataset of 11,644 entities
extracted from 1,137 papers, resulting in 268 papers with at least one complete
seed-mediated gold nanorod growth procedure and outcome for a total of 332
complete procedures.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 22:21:33 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Walker",
"Nicholas",
""
],
[
"Dagdelen",
"John",
""
],
[
"Cruse",
"Kevin",
""
],
[
"Lee",
"Sanghoon",
""
],
[
"Gleason",
"Samuel",
""
],
[
"Dunn",
"Alexander",
""
],
[
"Ceder",
"Gerbrand",
""
],
[
"Alivisatos",
"A. Paul",
""
],
[
"Persson",
"Kristin A.",
""
],
[
"Jain",
"Anubhav",
""
]
] | TITLE: Extracting Structured Seed-Mediated Gold Nanorod Growth Procedures from
Literature with GPT-3
ABSTRACT: Although gold nanorods have been the subject of much research, the pathways
for controlling their shape and thereby their optical properties remain largely
heuristically understood. Although it is apparent that the simultaneous
presence of and interaction between various reagents during synthesis control
these properties, computational and experimental approaches for exploring the
synthesis space can be either intractable or too time-consuming in practice.
This motivates an alternative approach leveraging the wealth of synthesis
information already embedded in the body of scientific literature by developing
tools to extract relevant structured data in an automated, high-throughput
manner. To that end, we present an approach using the powerful GPT-3 language
model to extract structured multi-step seed-mediated growth procedures and
outcomes for gold nanorods from unstructured scientific text. GPT-3 prompt
completions are fine-tuned to predict synthesis templates in the form of JSON
documents from unstructured text input with an overall accuracy of $86\%$. The
performance is notable, considering the model is performing simultaneous entity
recognition and relation extraction. We present a dataset of 11,644 entities
extracted from 1,137 papers, resulting in 268 papers with at least one complete
seed-mediated gold nanorod growth procedure and outcome for a total of 332
complete procedures.
| new_dataset | 0.718943 |
2304.13854 | Mingchen Li | Mingchen Li and Lifu Huang | Understand the Dynamic World: An End-to-End Knowledge Informed Framework
for Open Domain Entity State Tracking | Published as a conference paper at SIGIR 2023 | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | Open domain entity state tracking aims to predict reasonable state changes of
entities (i.e., [attribute] of [entity] was [before_state] and [after_state]
afterwards) given the action descriptions. It's important to many reasoning
tasks to support human everyday activities. However, it's challenging as the
model needs to predict an arbitrary number of entity state changes caused by
the action while most of the entities are implicitly relevant to the actions
and their attributes as well as states are from open vocabularies. To tackle
these challenges, we propose a novel end-to-end Knowledge Informed framework
for open domain Entity State Tracking, namely KIEST, which explicitly retrieves
the relevant entities and attributes from external knowledge graph (i.e.,
ConceptNet) and incorporates them to autoregressively generate all the entity
state changes with a novel dynamic knowledge grained encoder-decoder framework.
To enforce the logical coherence among the predicted entities, attributes, and
states, we design a new constraint decoding strategy and employ a coherence
reward to improve the decoding process. Experimental results show that our
proposed KIEST framework significantly outperforms the strong baselines on the
public benchmark dataset OpenPI.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 22:45:30 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Li",
"Mingchen",
""
],
[
"Huang",
"Lifu",
""
]
] | TITLE: Understand the Dynamic World: An End-to-End Knowledge Informed Framework
for Open Domain Entity State Tracking
ABSTRACT: Open domain entity state tracking aims to predict reasonable state changes of
entities (i.e., [attribute] of [entity] was [before_state] and [after_state]
afterwards) given the action descriptions. It's important to many reasoning
tasks to support human everyday activities. However, it's challenging as the
model needs to predict an arbitrary number of entity state changes caused by
the action while most of the entities are implicitly relevant to the actions
and their attributes as well as states are from open vocabularies. To tackle
these challenges, we propose a novel end-to-end Knowledge Informed framework
for open domain Entity State Tracking, namely KIEST, which explicitly retrieves
the relevant entities and attributes from external knowledge graph (i.e.,
ConceptNet) and incorporates them to autoregressively generate all the entity
state changes with a novel dynamic knowledge grained encoder-decoder framework.
To enforce the logical coherence among the predicted entities, attributes, and
states, we design a new constraint decoding strategy and employ a coherence
reward to improve the decoding process. Experimental results show that our
proposed KIEST framework significantly outperforms the strong baselines on the
public benchmark dataset OpenPI.
| no_new_dataset | 0.707443 |
2304.13880 | Fares Bougourzi | Mohamed Fadhlallah Guerri, Cosimo Distante, Paolo Spagnolo, Fares
Bougourzi, and Abdelmalik Taleb-Ahmed | Deep Learning Techniques for Hyperspectral Image Analysis in
Agriculture: A Review | null | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In the recent years, hyperspectral imaging (HSI) has gained considerably
popularity among computer vision researchers for its potential in solving
remote sensing problems, especially in agriculture field. However, HSI
classification is a complex task due to the high redundancy of spectral bands,
limited training samples, and non-linear relationship between spatial position
and spectral bands. Fortunately, deep learning techniques have shown promising
results in HSI analysis. This literature review explores recent applications of
deep learning approaches such as Autoencoders, Convolutional Neural Networks
(1D, 2D, and 3D), Recurrent Neural Networks, Deep Belief Networks, and
Generative Adversarial Networks in agriculture. The performance of these
approaches has been evaluated and discussed on well-known land cover datasets
including Indian Pines, Salinas Valley, and Pavia University.
| [
{
"version": "v1",
"created": "Wed, 26 Apr 2023 23:58:18 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Guerri",
"Mohamed Fadhlallah",
""
],
[
"Distante",
"Cosimo",
""
],
[
"Spagnolo",
"Paolo",
""
],
[
"Bougourzi",
"Fares",
""
],
[
"Taleb-Ahmed",
"Abdelmalik",
""
]
] | TITLE: Deep Learning Techniques for Hyperspectral Image Analysis in
Agriculture: A Review
ABSTRACT: In the recent years, hyperspectral imaging (HSI) has gained considerably
popularity among computer vision researchers for its potential in solving
remote sensing problems, especially in agriculture field. However, HSI
classification is a complex task due to the high redundancy of spectral bands,
limited training samples, and non-linear relationship between spatial position
and spectral bands. Fortunately, deep learning techniques have shown promising
results in HSI analysis. This literature review explores recent applications of
deep learning approaches such as Autoencoders, Convolutional Neural Networks
(1D, 2D, and 3D), Recurrent Neural Networks, Deep Belief Networks, and
Generative Adversarial Networks in agriculture. The performance of these
approaches has been evaluated and discussed on well-known land cover datasets
including Indian Pines, Salinas Valley, and Pavia University.
| no_new_dataset | 0.709202 |
2304.13894 | Kahraman Kostas Mr | Kahraman Kostas | CNN based IoT Device Identification | null | null | null | null | cs.CR cs.AI | http://creativecommons.org/licenses/by/4.0/ | While the use of the Internet of Things is becoming more and more popular,
many security vulnerabilities are emerging with the large number of devices
being introduced to the market. In this environment, IoT device identification
methods provide a preventive security measure as an important factor in
identifying these devices and detecting the vulnerabilities they suffer from.
In this study, we present a method that identifies devices in the Aalto dataset
using the convolutional neural network (CNN).
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 00:37:16 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Kostas",
"Kahraman",
""
]
] | TITLE: CNN based IoT Device Identification
ABSTRACT: While the use of the Internet of Things is becoming more and more popular,
many security vulnerabilities are emerging with the large number of devices
being introduced to the market. In this environment, IoT device identification
methods provide a preventive security measure as an important factor in
identifying these devices and detecting the vulnerabilities they suffer from.
In this study, we present a method that identifies devices in the Aalto dataset
using the convolutional neural network (CNN).
| no_new_dataset | 0.71247 |
2304.13895 | Qi Zhang | Qi Zhang, Yayi Yang, Chongyang Shi, An Lao, Liang Hu, Shoujin Wang,
Usman Naseem | Rumor Detection with Hierarchical Representation on Bipartite Adhoc
Event Trees | null | null | null | null | cs.SI cs.AI | http://creativecommons.org/licenses/by/4.0/ | The rapid growth of social media has caused tremendous effects on information
propagation, raising extreme challenges in detecting rumors. Existing rumor
detection methods typically exploit the reposting propagation of a rumor
candidate for detection by regarding all reposts to a rumor candidate as a
temporal sequence and learning semantics representations of the repost
sequence. However, extracting informative support from the topological
structure of propagation and the influence of reposting authors for debunking
rumors is crucial, which generally has not been well addressed by existing
methods. In this paper, we organize a claim post in circulation as an adhoc
event tree, extract event elements, and convert it to bipartite adhoc event
trees in terms of both posts and authors, i.e., author tree and post tree.
Accordingly, we propose a novel rumor detection model with hierarchical
representation on the bipartite adhoc event trees called BAET. Specifically, we
introduce word embedding and feature encoder for the author and post tree,
respectively, and design a root-aware attention module to perform node
representation. Then we adopt the tree-like RNN model to capture the structural
correlations and propose a tree-aware attention module to learn tree
representation for the author tree and post tree, respectively. Extensive
experimental results on two public Twitter datasets demonstrate the
effectiveness of BAET in exploring and exploiting the rumor propagation
structure and the superior detection performance of BAET over state-of-the-art
baseline methods.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 00:37:27 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhang",
"Qi",
""
],
[
"Yang",
"Yayi",
""
],
[
"Shi",
"Chongyang",
""
],
[
"Lao",
"An",
""
],
[
"Hu",
"Liang",
""
],
[
"Wang",
"Shoujin",
""
],
[
"Naseem",
"Usman",
""
]
] | TITLE: Rumor Detection with Hierarchical Representation on Bipartite Adhoc
Event Trees
ABSTRACT: The rapid growth of social media has caused tremendous effects on information
propagation, raising extreme challenges in detecting rumors. Existing rumor
detection methods typically exploit the reposting propagation of a rumor
candidate for detection by regarding all reposts to a rumor candidate as a
temporal sequence and learning semantics representations of the repost
sequence. However, extracting informative support from the topological
structure of propagation and the influence of reposting authors for debunking
rumors is crucial, which generally has not been well addressed by existing
methods. In this paper, we organize a claim post in circulation as an adhoc
event tree, extract event elements, and convert it to bipartite adhoc event
trees in terms of both posts and authors, i.e., author tree and post tree.
Accordingly, we propose a novel rumor detection model with hierarchical
representation on the bipartite adhoc event trees called BAET. Specifically, we
introduce word embedding and feature encoder for the author and post tree,
respectively, and design a root-aware attention module to perform node
representation. Then we adopt the tree-like RNN model to capture the structural
correlations and propose a tree-aware attention module to learn tree
representation for the author tree and post tree, respectively. Extensive
experimental results on two public Twitter datasets demonstrate the
effectiveness of BAET in exploring and exploiting the rumor propagation
structure and the superior detection performance of BAET over state-of-the-art
baseline methods.
| no_new_dataset | 0.711281 |
2304.13905 | Kahraman Kostas Mr | Kahraman Kostas | LSTM based IoT Device Identification | null | null | null | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | While the use of the Internet of Things is becoming more and more popular,
many security vulnerabilities are emerging with the large number of devices
being introduced to the market. In this environment, IoT device identification
methods provide a preventive security measure as an important factor in
identifying these devices and detecting the vulnerabilities they suffer from.
In this study, we present a method that identifies devices in the Aalto dataset
using Long short-term memory (LSTM)
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 01:13:12 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Kostas",
"Kahraman",
""
]
] | TITLE: LSTM based IoT Device Identification
ABSTRACT: While the use of the Internet of Things is becoming more and more popular,
many security vulnerabilities are emerging with the large number of devices
being introduced to the market. In this environment, IoT device identification
methods provide a preventive security measure as an important factor in
identifying these devices and detecting the vulnerabilities they suffer from.
In this study, we present a method that identifies devices in the Aalto dataset
using Long short-term memory (LSTM)
| no_new_dataset | 0.711443 |
2304.13907 | Xiou Ge | Xiou Ge, Sarah E. Brown, Pushpendra Rana, Lav R. Varshney, Daniel C.
Miller | Network Analysis as a Tool for Shaping Conservation and Development
Policy: A Case Study of Timber Market Optimization in India | Paper accepted to proceedings of the 5th Data for Good Exchange
(D4GX) | null | null | null | cs.SI | http://creativecommons.org/licenses/by-sa/4.0/ | The incorporation of trees on farms can help to improve livelihoods and build
resilience among small-holder farmers in developing countries. On-farm trees
can help gen- erate additional income from commercial tree harvest as well as
contribute significant environmental benefits and ecosystem services to
increase resiliency. Long-term benefits from tree-based livelihoods, however,
depend on sustainable timber harvesting. In this paper, we discuss the
potential for network analysis as a tool to inform conservation and development
decision-making. Specifically, we formulate the commercial tree market between
farmers and traders as a transportation problem and optimize the transactions.
We create a model of the commercial tree market in the Bilaspur district of
Himachal Pradesh, India based on a detailed dataset of market interactions
between farmers and timber traders, using the existing road network of this
region. Using this model, we perform a maximum-flow-minimum-cost optimization
for tree commodity flow. We compare the results of our optimized model with
actual flow within the network, and we find a high potential to increase
efficiency of market transactions within this region, noting a significant
reduction to the minimum- cost flow value for our optimized model compared to
the flow cost for actual transactions. We propose that using this network flow
optimization model to strategically distribute permits can reduce costs
associated with market transactions. Our results suggest that this direct
policy action would be beneficial to the region. Finally, we suggest that cost
savings could be used to establish tree planting programs to support a
long-term sustainable tree market. Shaping policies to address these market
inefficiencies in developing regions could help support and elevate tree-based
livelihoods for farmers, traders, and industries.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 01:19:06 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Ge",
"Xiou",
""
],
[
"Brown",
"Sarah E.",
""
],
[
"Rana",
"Pushpendra",
""
],
[
"Varshney",
"Lav R.",
""
],
[
"Miller",
"Daniel C.",
""
]
] | TITLE: Network Analysis as a Tool for Shaping Conservation and Development
Policy: A Case Study of Timber Market Optimization in India
ABSTRACT: The incorporation of trees on farms can help to improve livelihoods and build
resilience among small-holder farmers in developing countries. On-farm trees
can help gen- erate additional income from commercial tree harvest as well as
contribute significant environmental benefits and ecosystem services to
increase resiliency. Long-term benefits from tree-based livelihoods, however,
depend on sustainable timber harvesting. In this paper, we discuss the
potential for network analysis as a tool to inform conservation and development
decision-making. Specifically, we formulate the commercial tree market between
farmers and traders as a transportation problem and optimize the transactions.
We create a model of the commercial tree market in the Bilaspur district of
Himachal Pradesh, India based on a detailed dataset of market interactions
between farmers and timber traders, using the existing road network of this
region. Using this model, we perform a maximum-flow-minimum-cost optimization
for tree commodity flow. We compare the results of our optimized model with
actual flow within the network, and we find a high potential to increase
efficiency of market transactions within this region, noting a significant
reduction to the minimum- cost flow value for our optimized model compared to
the flow cost for actual transactions. We propose that using this network flow
optimization model to strategically distribute permits can reduce costs
associated with market transactions. Our results suggest that this direct
policy action would be beneficial to the region. Finally, we suggest that cost
savings could be used to establish tree planting programs to support a
long-term sustainable tree market. Shaping policies to address these market
inefficiencies in developing regions could help support and elevate tree-based
livelihoods for farmers, traders, and industries.
| no_new_dataset | 0.71 |
2304.13916 | Qingpeng Zhu | Qingpeng Zhu, Wenxiu Sun, Yuekun Dai, Chongyi Li, Shangchen Zhou,
Ruicheng Feng, Qianhui Sun, Chen Change Loy, Jinwei Gu, Yi Yu, Yangke Huang,
Kang Zhang, Meiya Chen, Yu Wang, Yongchao Li, Hao Jiang, Amrit Kumar Muduli,
Vikash Kumar, Kunal Swami, Pankaj Kumar Bajpai, Yunchao Ma, Jiajun Xiao, Zhi
Ling | MIPI 2023 Challenge on RGB+ToF Depth Completion: Methods and Results | arXiv admin note: substantial text overlap with arXiv:2209.07057 | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Depth completion from RGB images and sparse Time-of-Flight (ToF) measurements
is an important problem in computer vision and robotics. While traditional
methods for depth completion have relied on stereo vision or structured light
techniques, recent advances in deep learning have enabled more accurate and
efficient completion of depth maps from RGB images and sparse ToF measurements.
To evaluate the performance of different depth completion methods, we organized
an RGB+sparse ToF depth completion competition. The competition aimed to
encourage research in this area by providing a standardized dataset and
evaluation metrics to compare the accuracy of different approaches. In this
report, we present the results of the competition and analyze the strengths and
weaknesses of the top-performing methods. We also discuss the implications of
our findings for future research in RGB+sparse ToF depth completion. We hope
that this competition and report will help to advance the state-of-the-art in
this important area of research. More details of this challenge and the link to
the dataset can be found at https://mipi-challenge.org/MIPI2023.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 02:00:04 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhu",
"Qingpeng",
""
],
[
"Sun",
"Wenxiu",
""
],
[
"Dai",
"Yuekun",
""
],
[
"Li",
"Chongyi",
""
],
[
"Zhou",
"Shangchen",
""
],
[
"Feng",
"Ruicheng",
""
],
[
"Sun",
"Qianhui",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Gu",
"Jinwei",
""
],
[
"Yu",
"Yi",
""
],
[
"Huang",
"Yangke",
""
],
[
"Zhang",
"Kang",
""
],
[
"Chen",
"Meiya",
""
],
[
"Wang",
"Yu",
""
],
[
"Li",
"Yongchao",
""
],
[
"Jiang",
"Hao",
""
],
[
"Muduli",
"Amrit Kumar",
""
],
[
"Kumar",
"Vikash",
""
],
[
"Swami",
"Kunal",
""
],
[
"Bajpai",
"Pankaj Kumar",
""
],
[
"Ma",
"Yunchao",
""
],
[
"Xiao",
"Jiajun",
""
],
[
"Ling",
"Zhi",
""
]
] | TITLE: MIPI 2023 Challenge on RGB+ToF Depth Completion: Methods and Results
ABSTRACT: Depth completion from RGB images and sparse Time-of-Flight (ToF) measurements
is an important problem in computer vision and robotics. While traditional
methods for depth completion have relied on stereo vision or structured light
techniques, recent advances in deep learning have enabled more accurate and
efficient completion of depth maps from RGB images and sparse ToF measurements.
To evaluate the performance of different depth completion methods, we organized
an RGB+sparse ToF depth completion competition. The competition aimed to
encourage research in this area by providing a standardized dataset and
evaluation metrics to compare the accuracy of different approaches. In this
report, we present the results of the competition and analyze the strengths and
weaknesses of the top-performing methods. We also discuss the implications of
our findings for future research in RGB+sparse ToF depth completion. We hope
that this competition and report will help to advance the state-of-the-art in
this important area of research. More details of this challenge and the link to
the dataset can be found at https://mipi-challenge.org/MIPI2023.
| new_dataset | 0.705943 |
2304.13918 | Madhuvanthi Srivatsav Ms | Madhuvanthi Srivatsav R, Shantanu Chakrabartty and Chetan Singh Thakur | Neuromorphic Computing with AER using Time-to-Event-Margin Propagation | null | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Address-Event-Representation (AER) is a spike-routing protocol that allows
the scaling of neuromorphic and spiking neural network (SNN) architectures to a
size that is comparable to that of digital neural network architectures.
However, in conventional neuromorphic architectures, the AER protocol and, in
general, any virtual interconnect plays only a passive role in computation,
i.e., only for routing spikes and events. In this paper, we show how causal
temporal primitives like delay, triggering, and sorting inherent in the AER
protocol itself can be exploited for scalable neuromorphic computing using our
proposed technique called Time-to-Event Margin Propagation (TEMP). The proposed
TEMP-based AER architecture is fully asynchronous and relies on interconnect
delays for memory and computing as opposed to conventional and local
multiply-and-accumulate (MAC) operations. We show that the time-based encoding
in the TEMP neural network produces a spatio-temporal representation that can
encode a large number of discriminatory patterns. As a proof-of-concept, we
show that a trained TEMP-based convolutional neural network (CNN) can
demonstrate an accuracy greater than 99% on the MNIST dataset. Overall, our
work is a biologically inspired computing paradigm that brings forth a new
dimension of research to the field of neuromorphic computing.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 02:01:54 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"R",
"Madhuvanthi Srivatsav",
""
],
[
"Chakrabartty",
"Shantanu",
""
],
[
"Thakur",
"Chetan Singh",
""
]
] | TITLE: Neuromorphic Computing with AER using Time-to-Event-Margin Propagation
ABSTRACT: Address-Event-Representation (AER) is a spike-routing protocol that allows
the scaling of neuromorphic and spiking neural network (SNN) architectures to a
size that is comparable to that of digital neural network architectures.
However, in conventional neuromorphic architectures, the AER protocol and, in
general, any virtual interconnect plays only a passive role in computation,
i.e., only for routing spikes and events. In this paper, we show how causal
temporal primitives like delay, triggering, and sorting inherent in the AER
protocol itself can be exploited for scalable neuromorphic computing using our
proposed technique called Time-to-Event Margin Propagation (TEMP). The proposed
TEMP-based AER architecture is fully asynchronous and relies on interconnect
delays for memory and computing as opposed to conventional and local
multiply-and-accumulate (MAC) operations. We show that the time-based encoding
in the TEMP neural network produces a spatio-temporal representation that can
encode a large number of discriminatory patterns. As a proof-of-concept, we
show that a trained TEMP-based convolutional neural network (CNN) can
demonstrate an accuracy greater than 99% on the MNIST dataset. Overall, our
work is a biologically inspired computing paradigm that brings forth a new
dimension of research to the field of neuromorphic computing.
| no_new_dataset | 0.710867 |
2304.13937 | Yuntao Du | Yuntao Du, Jianxun Lian, Jing Yao, Xiting Wang, Mingqi Wu, Lu Chen,
Yunjun Gao, Xing Xie | Towards Explainable Collaborative Filtering with Taste Clusters Learning | Accepted to WWW 2023 | null | 10.1145/3543507.3583303 | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | Collaborative Filtering (CF) is a widely used and effective technique for
recommender systems. In recent decades, there have been significant
advancements in latent embedding-based CF methods for improved accuracy, such
as matrix factorization, neural collaborative filtering, and LightGCN. However,
the explainability of these models has not been fully explored. Adding
explainability to recommendation models can not only increase trust in the
decisionmaking process, but also have multiple benefits such as providing
persuasive explanations for item recommendations, creating explicit profiles
for users and items, and assisting item producers in design improvements.
In this paper, we propose a neat and effective Explainable Collaborative
Filtering (ECF) model that leverages interpretable cluster learning to achieve
the two most demanding objectives: (1) Precise - the model should not
compromise accuracy in the pursuit of explainability; and (2) Self-explainable
- the model's explanations should truly reflect its decision-making process,
not generated from post-hoc methods. The core of ECF is mining taste clusters
from user-item interactions and item profiles.We map each user and item to a
sparse set of taste clusters, and taste clusters are distinguished by a few
representative tags. The user-item preference, users/items' cluster
affiliations, and the generation of taste clusters are jointly optimized in an
end-to-end manner. Additionally, we introduce a forest mechanism to ensure the
model's accuracy, explainability, and diversity. To comprehensively evaluate
the explainability quality of taste clusters, we design several quantitative
metrics, including in-cluster item coverage, tag utilization, silhouette, and
informativeness. Our model's effectiveness is demonstrated through extensive
experiments on three real-world datasets.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 03:08:15 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Du",
"Yuntao",
""
],
[
"Lian",
"Jianxun",
""
],
[
"Yao",
"Jing",
""
],
[
"Wang",
"Xiting",
""
],
[
"Wu",
"Mingqi",
""
],
[
"Chen",
"Lu",
""
],
[
"Gao",
"Yunjun",
""
],
[
"Xie",
"Xing",
""
]
] | TITLE: Towards Explainable Collaborative Filtering with Taste Clusters Learning
ABSTRACT: Collaborative Filtering (CF) is a widely used and effective technique for
recommender systems. In recent decades, there have been significant
advancements in latent embedding-based CF methods for improved accuracy, such
as matrix factorization, neural collaborative filtering, and LightGCN. However,
the explainability of these models has not been fully explored. Adding
explainability to recommendation models can not only increase trust in the
decisionmaking process, but also have multiple benefits such as providing
persuasive explanations for item recommendations, creating explicit profiles
for users and items, and assisting item producers in design improvements.
In this paper, we propose a neat and effective Explainable Collaborative
Filtering (ECF) model that leverages interpretable cluster learning to achieve
the two most demanding objectives: (1) Precise - the model should not
compromise accuracy in the pursuit of explainability; and (2) Self-explainable
- the model's explanations should truly reflect its decision-making process,
not generated from post-hoc methods. The core of ECF is mining taste clusters
from user-item interactions and item profiles.We map each user and item to a
sparse set of taste clusters, and taste clusters are distinguished by a few
representative tags. The user-item preference, users/items' cluster
affiliations, and the generation of taste clusters are jointly optimized in an
end-to-end manner. Additionally, we introduce a forest mechanism to ensure the
model's accuracy, explainability, and diversity. To comprehensively evaluate
the explainability quality of taste clusters, we design several quantitative
metrics, including in-cluster item coverage, tag utilization, silhouette, and
informativeness. Our model's effectiveness is demonstrated through extensive
experiments on three real-world datasets.
| no_new_dataset | 0.709868 |
2304.13941 | Sevvandi Kandanaarachchi | Sevvandi Kandanaarachchi, Mahdi Abolghasemi, Hideya Ochiai, Asha Rao | Detecting inner-LAN anomalies using hierarchical forecasting | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Increasing activity and the number of devices online are leading to
increasing and more diverse cyber attacks. This continuously evolving attack
activity makes signature-based detection methods ineffective. Once malware has
infiltrated into a LAN, bypassing an external gateway or entering via an
unsecured mobile device, it can potentially infect all nodes in the LAN as well
as carry out nefarious activities such as stealing valuable data, leading to
financial damage and loss of reputation. Such infiltration could be viewed as
an insider attack, increasing the need for LAN monitoring and security. In this
paper we aim to detect such inner-LAN activity by studying the variations in
Address Resolution Protocol (ARP) calls within the LAN. We find anomalous nodes
by modelling inner-LAN traffic using hierarchical forecasting methods. We
substantially reduce the false positives ever present in anomaly detection, by
using an extreme value theory based method. We use a dataset from a real
inner-LAN monitoring project, containing over 10M ARP calls from 362 nodes.
Furthermore, the small number of false positives generated using our methods,
is a potential solution to the "alert fatigue" commonly reported by security
experts.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 03:19:26 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Kandanaarachchi",
"Sevvandi",
""
],
[
"Abolghasemi",
"Mahdi",
""
],
[
"Ochiai",
"Hideya",
""
],
[
"Rao",
"Asha",
""
]
] | TITLE: Detecting inner-LAN anomalies using hierarchical forecasting
ABSTRACT: Increasing activity and the number of devices online are leading to
increasing and more diverse cyber attacks. This continuously evolving attack
activity makes signature-based detection methods ineffective. Once malware has
infiltrated into a LAN, bypassing an external gateway or entering via an
unsecured mobile device, it can potentially infect all nodes in the LAN as well
as carry out nefarious activities such as stealing valuable data, leading to
financial damage and loss of reputation. Such infiltration could be viewed as
an insider attack, increasing the need for LAN monitoring and security. In this
paper we aim to detect such inner-LAN activity by studying the variations in
Address Resolution Protocol (ARP) calls within the LAN. We find anomalous nodes
by modelling inner-LAN traffic using hierarchical forecasting methods. We
substantially reduce the false positives ever present in anomaly detection, by
using an extreme value theory based method. We use a dataset from a real
inner-LAN monitoring project, containing over 10M ARP calls from 362 nodes.
Furthermore, the small number of false positives generated using our methods,
is a potential solution to the "alert fatigue" commonly reported by security
experts.
| no_new_dataset | 0.699293 |
2304.13950 | Abhishek Roy | Abhishek Roy, Prasant Mohapatra | Fairness Uncertainty Quantification: How certain are you that the model
is fair? | null | null | null | null | stat.ML cs.CY cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fairness-aware machine learning has garnered significant attention in recent
years because of extensive use of machine learning in sensitive applications
like judiciary systems. Various heuristics, and optimization frameworks have
been proposed to enforce fairness in classification \cite{del2020review} where
the later approaches either provides empirical results or provides fairness
guarantee for the exact minimizer of the objective function
\cite{celis2019classification}. In modern machine learning, Stochastic Gradient
Descent (SGD) type algorithms are almost always used as training algorithms
implying that the learned model, and consequently, its fairness properties are
random. Hence, especially for crucial applications, it is imperative to
construct Confidence Interval (CI) for the fairness of the learned model. In
this work we provide CI for test unfairness when a group-fairness-aware,
specifically, Disparate Impact (DI), and Disparate Mistreatment (DM) aware
linear binary classifier is trained using online SGD-type algorithms. We show
that asymptotically a Central Limit Theorem holds for the estimated model
parameter of both DI and DM-aware models. We provide online multiplier
bootstrap method to estimate the asymptotic covariance to construct online CI.
To do so, we extend the known theoretical guarantees shown on the consistency
of the online bootstrap method for unconstrained SGD to constrained
optimization which could be of independent interest. We illustrate our results
on synthetic and real datasets.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 04:07:58 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Roy",
"Abhishek",
""
],
[
"Mohapatra",
"Prasant",
""
]
] | TITLE: Fairness Uncertainty Quantification: How certain are you that the model
is fair?
ABSTRACT: Fairness-aware machine learning has garnered significant attention in recent
years because of extensive use of machine learning in sensitive applications
like judiciary systems. Various heuristics, and optimization frameworks have
been proposed to enforce fairness in classification \cite{del2020review} where
the later approaches either provides empirical results or provides fairness
guarantee for the exact minimizer of the objective function
\cite{celis2019classification}. In modern machine learning, Stochastic Gradient
Descent (SGD) type algorithms are almost always used as training algorithms
implying that the learned model, and consequently, its fairness properties are
random. Hence, especially for crucial applications, it is imperative to
construct Confidence Interval (CI) for the fairness of the learned model. In
this work we provide CI for test unfairness when a group-fairness-aware,
specifically, Disparate Impact (DI), and Disparate Mistreatment (DM) aware
linear binary classifier is trained using online SGD-type algorithms. We show
that asymptotically a Central Limit Theorem holds for the estimated model
parameter of both DI and DM-aware models. We provide online multiplier
bootstrap method to estimate the asymptotic covariance to construct online CI.
To do so, we extend the known theoretical guarantees shown on the consistency
of the online bootstrap method for unconstrained SGD to constrained
optimization which could be of independent interest. We illustrate our results
on synthetic and real datasets.
| no_new_dataset | 0.709069 |
2304.13960 | Frederik Kunstner | Frederik Kunstner, Jacques Chen, Jonathan Wilder Lavington, Mark
Schmidt | Noise Is Not the Main Factor Behind the Gap Between SGD and Adam on
Transformers, but Sign Descent Might Be | null | null | null | null | cs.LG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The success of the Adam optimizer on a wide array of architectures has made
it the default in settings where stochastic gradient descent (SGD) performs
poorly. However, our theoretical understanding of this discrepancy is lagging,
preventing the development of significant improvements on either algorithm.
Recent work advances the hypothesis that Adam and other heuristics like
gradient clipping outperform SGD on language tasks because the distribution of
the error induced by sampling has heavy tails. This suggests that Adam
outperform SGD because it uses a more robust gradient estimate. We evaluate
this hypothesis by varying the batch size, up to the entire dataset, to control
for stochasticity. We present evidence that stochasticity and heavy-tailed
noise are not major factors in the performance gap between SGD and Adam.
Rather, Adam performs better as the batch size increases, while SGD is less
effective at taking advantage of the reduction in noise. This raises the
question as to why Adam outperforms SGD in the full-batch setting. Through
further investigation of simpler variants of SGD, we find that the behavior of
Adam with large batches is similar to sign descent with momentum.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 05:41:13 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Kunstner",
"Frederik",
""
],
[
"Chen",
"Jacques",
""
],
[
"Lavington",
"Jonathan Wilder",
""
],
[
"Schmidt",
"Mark",
""
]
] | TITLE: Noise Is Not the Main Factor Behind the Gap Between SGD and Adam on
Transformers, but Sign Descent Might Be
ABSTRACT: The success of the Adam optimizer on a wide array of architectures has made
it the default in settings where stochastic gradient descent (SGD) performs
poorly. However, our theoretical understanding of this discrepancy is lagging,
preventing the development of significant improvements on either algorithm.
Recent work advances the hypothesis that Adam and other heuristics like
gradient clipping outperform SGD on language tasks because the distribution of
the error induced by sampling has heavy tails. This suggests that Adam
outperform SGD because it uses a more robust gradient estimate. We evaluate
this hypothesis by varying the batch size, up to the entire dataset, to control
for stochasticity. We present evidence that stochasticity and heavy-tailed
noise are not major factors in the performance gap between SGD and Adam.
Rather, Adam performs better as the batch size increases, while SGD is less
effective at taking advantage of the reduction in noise. This raises the
question as to why Adam outperforms SGD in the full-batch setting. Through
further investigation of simpler variants of SGD, we find that the behavior of
Adam with large batches is similar to sign descent with momentum.
| no_new_dataset | 0.707367 |
2304.13973 | Mingzhe Hu | Mingzhe Hu, Yuheng Li, Xiaofeng Yang | SkinSAM: Empowering Skin Cancer Segmentation with Segment Anything Model | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Skin cancer is a prevalent and potentially fatal disease that requires
accurate and efficient diagnosis and treatment. Although manual tracing is the
current standard in clinics, automated tools are desired to reduce human labor
and improve accuracy. However, developing such tools is challenging due to the
highly variable appearance of skin cancers and complex objects in the
background. In this paper, we present SkinSAM, a fine-tuned model based on the
Segment Anything Model that showed outstanding segmentation performance. The
models are validated on HAM10000 dataset which includes 10015 dermatoscopic
images. While larger models (ViT_L, ViT_H) performed better than the smaller
one (ViT_b), the finetuned model (ViT_b_finetuned) exhibited the greatest
improvement, with a Mean pixel accuracy of 0.945, Mean dice score of 0.8879,
and Mean IoU score of 0.7843. Among the lesion types, vascular lesions showed
the best segmentation results. Our research demonstrates the great potential of
adapting SAM to medical image segmentation tasks.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 06:42:59 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hu",
"Mingzhe",
""
],
[
"Li",
"Yuheng",
""
],
[
"Yang",
"Xiaofeng",
""
]
] | TITLE: SkinSAM: Empowering Skin Cancer Segmentation with Segment Anything Model
ABSTRACT: Skin cancer is a prevalent and potentially fatal disease that requires
accurate and efficient diagnosis and treatment. Although manual tracing is the
current standard in clinics, automated tools are desired to reduce human labor
and improve accuracy. However, developing such tools is challenging due to the
highly variable appearance of skin cancers and complex objects in the
background. In this paper, we present SkinSAM, a fine-tuned model based on the
Segment Anything Model that showed outstanding segmentation performance. The
models are validated on HAM10000 dataset which includes 10015 dermatoscopic
images. While larger models (ViT_L, ViT_H) performed better than the smaller
one (ViT_b), the finetuned model (ViT_b_finetuned) exhibited the greatest
improvement, with a Mean pixel accuracy of 0.945, Mean dice score of 0.8879,
and Mean IoU score of 0.7843. Among the lesion types, vascular lesions showed
the best segmentation results. Our research demonstrates the great potential of
adapting SAM to medical image segmentation tasks.
| no_new_dataset | 0.712451 |
2304.13979 | Zhen Feng | Zhen Feng, Yuchao Feng, Yanning Guo, Yuxiang Sun | Adaptive-Mask Fusion Network for Segmentation of Drivable Road and
Negative Obstacle With Untrustworthy Features | This paper has been accepted by 2023 IEEE Intelligent Vehicles
Symposium (IV) (IEEE IV 2023) | null | null | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Segmentation of drivable roads and negative obstacles is critical to the safe
driving of autonomous vehicles. Currently, many multi-modal fusion methods have
been proposed to improve segmentation accuracy, such as fusing RGB and depth
images. However, we find that when fusing two modals of data with untrustworthy
features, the performance of multi-modal networks could be degraded, even lower
than those using a single modality. In this paper, the untrustworthy features
refer to those extracted from regions (e.g., far objects that are beyond the
depth measurement range) with invalid depth data (i.e., 0 pixel value) in depth
images. The untrustworthy features can confuse the segmentation results, and
hence lead to inferior results. To provide a solution to this issue, we propose
the Adaptive-Mask Fusion Network (AMFNet) by introducing adaptive-weight masks
in the fusion module to fuse features from RGB and depth images with
inconsistency. In addition, we release a large-scale RGB-depth dataset with
manually-labeled ground truth based on the NPO dataset for drivable roads and
negative obstacles segmentation. Extensive experimental results demonstrate
that our network achieves state-of-the-art performance compared with other
networks. Our code and dataset are available at:
https://github.com/lab-sun/AMFNet.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 07:00:45 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Feng",
"Zhen",
""
],
[
"Feng",
"Yuchao",
""
],
[
"Guo",
"Yanning",
""
],
[
"Sun",
"Yuxiang",
""
]
] | TITLE: Adaptive-Mask Fusion Network for Segmentation of Drivable Road and
Negative Obstacle With Untrustworthy Features
ABSTRACT: Segmentation of drivable roads and negative obstacles is critical to the safe
driving of autonomous vehicles. Currently, many multi-modal fusion methods have
been proposed to improve segmentation accuracy, such as fusing RGB and depth
images. However, we find that when fusing two modals of data with untrustworthy
features, the performance of multi-modal networks could be degraded, even lower
than those using a single modality. In this paper, the untrustworthy features
refer to those extracted from regions (e.g., far objects that are beyond the
depth measurement range) with invalid depth data (i.e., 0 pixel value) in depth
images. The untrustworthy features can confuse the segmentation results, and
hence lead to inferior results. To provide a solution to this issue, we propose
the Adaptive-Mask Fusion Network (AMFNet) by introducing adaptive-weight masks
in the fusion module to fuse features from RGB and depth images with
inconsistency. In addition, we release a large-scale RGB-depth dataset with
manually-labeled ground truth based on the NPO dataset for drivable roads and
negative obstacles segmentation. Extensive experimental results demonstrate
that our network achieves state-of-the-art performance compared with other
networks. Our code and dataset are available at:
https://github.com/lab-sun/AMFNet.
| no_new_dataset | 0.685726 |
2304.13989 | Rob van der Goot | Kia Kirstein Hansen, Rob van der Goot | Cross-Domain Evaluation of POS Taggers: From Wall Street Journal to
Fandom Wiki | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | The Wall Street Journal section of the Penn Treebank has been the de-facto
standard for evaluating POS taggers for a long time, and accuracies over 97\%
have been reported. However, less is known about out-of-domain tagger
performance, especially with fine-grained label sets. Using data from Elder
Scrolls Fandom, a wiki about the \textit{Elder Scrolls} video game universe, we
create a modest dataset for qualitatively evaluating the cross-domain
performance of two POS taggers: the Stanford tagger (Toutanova et al. 2003) and
Bilty (Plank et al. 2016), both trained on WSJ. Our analyses show that
performance on tokens seen during training is almost as good as in-domain
performance, but accuracy on unknown tokens decreases from 90.37% to 78.37%
(Stanford) and 87.84\% to 80.41\% (Bilty) across domains. Both taggers struggle
with proper nouns and inconsistent capitalization.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 07:24:29 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Hansen",
"Kia Kirstein",
""
],
[
"van der Goot",
"Rob",
""
]
] | TITLE: Cross-Domain Evaluation of POS Taggers: From Wall Street Journal to
Fandom Wiki
ABSTRACT: The Wall Street Journal section of the Penn Treebank has been the de-facto
standard for evaluating POS taggers for a long time, and accuracies over 97\%
have been reported. However, less is known about out-of-domain tagger
performance, especially with fine-grained label sets. Using data from Elder
Scrolls Fandom, a wiki about the \textit{Elder Scrolls} video game universe, we
create a modest dataset for qualitatively evaluating the cross-domain
performance of two POS taggers: the Stanford tagger (Toutanova et al. 2003) and
Bilty (Plank et al. 2016), both trained on WSJ. Our analyses show that
performance on tokens seen during training is almost as good as in-domain
performance, but accuracy on unknown tokens decreases from 90.37% to 78.37%
(Stanford) and 87.84\% to 80.41\% (Bilty) across domains. Both taggers struggle
with proper nouns and inconsistent capitalization.
| new_dataset | 0.710434 |
2304.13998 | Tung Nguyen Thanh | Thanh-Tung Nguyen, Viktor Schlegel, Abhinav Kashyap, Stefan Winkler,
Shao-Syuan Huang, Jie-Jyun Liu, Chih-Jen Lin | Mimic-IV-ICD: A new benchmark for eXtreme MultiLabel Classification | Benchmark, Multilabel, Classification | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clinical notes are assigned ICD codes - sets of codes for diagnoses and
procedures. In the recent years, predictive machine learning models have been
built for automatic ICD coding. However, there is a lack of widely accepted
benchmarks for automated ICD coding models based on large-scale public EHR
data.
This paper proposes a public benchmark suite for ICD-10 coding using a large
EHR dataset derived from MIMIC-IV, the most recent public EHR dataset. We
implement and compare several popular methods for ICD coding prediction tasks
to standardize data preprocessing and establish a comprehensive ICD coding
benchmark dataset. This approach fosters reproducibility and model comparison,
accelerating progress toward employing automated ICD coding in future studies.
Furthermore, we create a new ICD-9 benchmark using MIMIC-IV data, providing
more data points and a higher number of ICD codes than MIMIC-III. Our
open-source code offers easy access to data processing steps, benchmark
creation, and experiment replication for those with MIMIC-IV access, providing
insights, guidance, and protocols to efficiently develop ICD coding models.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 07:36:14 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Nguyen",
"Thanh-Tung",
""
],
[
"Schlegel",
"Viktor",
""
],
[
"Kashyap",
"Abhinav",
""
],
[
"Winkler",
"Stefan",
""
],
[
"Huang",
"Shao-Syuan",
""
],
[
"Liu",
"Jie-Jyun",
""
],
[
"Lin",
"Chih-Jen",
""
]
] | TITLE: Mimic-IV-ICD: A new benchmark for eXtreme MultiLabel Classification
ABSTRACT: Clinical notes are assigned ICD codes - sets of codes for diagnoses and
procedures. In the recent years, predictive machine learning models have been
built for automatic ICD coding. However, there is a lack of widely accepted
benchmarks for automated ICD coding models based on large-scale public EHR
data.
This paper proposes a public benchmark suite for ICD-10 coding using a large
EHR dataset derived from MIMIC-IV, the most recent public EHR dataset. We
implement and compare several popular methods for ICD coding prediction tasks
to standardize data preprocessing and establish a comprehensive ICD coding
benchmark dataset. This approach fosters reproducibility and model comparison,
accelerating progress toward employing automated ICD coding in future studies.
Furthermore, we create a new ICD-9 benchmark using MIMIC-IV data, providing
more data points and a higher number of ICD codes than MIMIC-III. Our
open-source code offers easy access to data processing steps, benchmark
creation, and experiment replication for those with MIMIC-IV access, providing
insights, guidance, and protocols to efficiently develop ICD coding models.
| no_new_dataset | 0.704757 |
2304.14045 | Ti Wang | Ti Wang, Hong Liu, Runwei Ding, Wenhao Li, Yingxuan You, Xia Li | Interweaved Graph and Attention Network for 3D Human Pose Estimation | Accepted by ICASSP2023 | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite substantial progress in 3D human pose estimation from a single-view
image, prior works rarely explore global and local correlations, leading to
insufficient learning of human skeleton representations. To address this issue,
we propose a novel Interweaved Graph and Attention Network (IGANet) that allows
bidirectional communications between graph convolutional networks (GCNs) and
attentions. Specifically, we introduce an IGA module, where attentions are
provided with local information from GCNs and GCNs are injected with global
information from attentions. Additionally, we design a simple yet effective
U-shaped multi-layer perceptron (uMLP), which can capture multi-granularity
information for body joints. Extensive experiments on two popular benchmark
datasets (i.e. Human3.6M and MPI-INF-3DHP) are conducted to evaluate our
proposed method.The results show that IGANet achieves state-of-the-art
performance on both datasets. Code is available at
https://github.com/xiu-cs/IGANet.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 09:21:15 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Wang",
"Ti",
""
],
[
"Liu",
"Hong",
""
],
[
"Ding",
"Runwei",
""
],
[
"Li",
"Wenhao",
""
],
[
"You",
"Yingxuan",
""
],
[
"Li",
"Xia",
""
]
] | TITLE: Interweaved Graph and Attention Network for 3D Human Pose Estimation
ABSTRACT: Despite substantial progress in 3D human pose estimation from a single-view
image, prior works rarely explore global and local correlations, leading to
insufficient learning of human skeleton representations. To address this issue,
we propose a novel Interweaved Graph and Attention Network (IGANet) that allows
bidirectional communications between graph convolutional networks (GCNs) and
attentions. Specifically, we introduce an IGA module, where attentions are
provided with local information from GCNs and GCNs are injected with global
information from attentions. Additionally, we design a simple yet effective
U-shaped multi-layer perceptron (uMLP), which can capture multi-granularity
information for body joints. Extensive experiments on two popular benchmark
datasets (i.e. Human3.6M and MPI-INF-3DHP) are conducted to evaluate our
proposed method.The results show that IGANet achieves state-of-the-art
performance on both datasets. Code is available at
https://github.com/xiu-cs/IGANet.
| no_new_dataset | 0.709988 |
2304.14053 | Sheng Chen | Sheng Chen, Zihao Tang, Dongnan Liu, Ch\'e Fornusek, Michael Barnett,
Chenyu Wang, Mariano Cabezas, Weidong Cai | Precise Few-shot Fat-free Thigh Muscle Segmentation in T1-weighted MRI | ISBI2023, Few-shot, Intra-muscular fat, Thigh muscle segmentation,
Pseudo-label denoising, MRI | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Precise thigh muscle volumes are crucial to monitor the motor functionality
of patients with diseases that may result in various degrees of thigh muscle
loss. T1-weighted MRI is the default surrogate to obtain thigh muscle masks due
to its contrast between muscle and fat signals. Deep learning approaches have
recently been widely used to obtain these masks through segmentation. However,
due to the insufficient amount of precise annotations, thigh muscle masks
generated by deep learning approaches tend to misclassify intra-muscular fat
(IMF) as muscle impacting the analysis of muscle volumetrics. As IMF is
infiltrated inside the muscle, human annotations require expertise and time.
Thus, precise muscle masks where IMF is excluded are limited in practice. To
alleviate this, we propose a few-shot segmentation framework to generate thigh
muscle masks excluding IMF. In our framework, we design a novel pseudo-label
correction and evaluation scheme, together with a new noise robust loss for
exploiting high certainty areas. The proposed framework only takes $1\%$ of the
fine-annotated training dataset, and achieves comparable performance with fully
supervised methods according to the experimental results.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 09:33:29 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Chen",
"Sheng",
""
],
[
"Tang",
"Zihao",
""
],
[
"Liu",
"Dongnan",
""
],
[
"Fornusek",
"Ché",
""
],
[
"Barnett",
"Michael",
""
],
[
"Wang",
"Chenyu",
""
],
[
"Cabezas",
"Mariano",
""
],
[
"Cai",
"Weidong",
""
]
] | TITLE: Precise Few-shot Fat-free Thigh Muscle Segmentation in T1-weighted MRI
ABSTRACT: Precise thigh muscle volumes are crucial to monitor the motor functionality
of patients with diseases that may result in various degrees of thigh muscle
loss. T1-weighted MRI is the default surrogate to obtain thigh muscle masks due
to its contrast between muscle and fat signals. Deep learning approaches have
recently been widely used to obtain these masks through segmentation. However,
due to the insufficient amount of precise annotations, thigh muscle masks
generated by deep learning approaches tend to misclassify intra-muscular fat
(IMF) as muscle impacting the analysis of muscle volumetrics. As IMF is
infiltrated inside the muscle, human annotations require expertise and time.
Thus, precise muscle masks where IMF is excluded are limited in practice. To
alleviate this, we propose a few-shot segmentation framework to generate thigh
muscle masks excluding IMF. In our framework, we design a novel pseudo-label
correction and evaluation scheme, together with a new noise robust loss for
exploiting high certainty areas. The proposed framework only takes $1\%$ of the
fine-annotated training dataset, and achieves comparable performance with fully
supervised methods according to the experimental results.
| no_new_dataset | 0.710998 |
2304.14071 | Yanda Meng | Yuchen Zhang, Yanda Meng, Yalin Zheng | Automatically Segment the Left Atrium and Scars from LGE-MRIs Using a
Boundary-focused nnU-Net | MICCAI2022 LaScar Challenge Best Paper Runner-up | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Atrial fibrillation (AF) is the most common cardiac arrhythmia. Accurate
segmentation of the left atrial (LA) and LA scars can provide valuable
information to predict treatment outcomes in AF. In this paper, we proposed to
automatically segment LA cavity and quantify LA scars with late gadolinium
enhancement Magnetic Resonance Imagings (LGE-MRIs). We adopted nnU-Net as the
baseline model and exploited the importance of LA boundary characteristics with
the TopK loss as the loss function. Specifically, a focus on LA boundary pixels
is achieved during training, which provides a more accurate boundary
prediction. On the other hand, a distance map transformation of the predicted
LA boundary is regarded as an additional input for the LA scar prediction,
which provides marginal constraint on scar locations. We further designed a
novel uncertainty-aware module (UAM) to produce better results for predictions
with high uncertainty. Experiments on the LAScarQS 2022 dataset demonstrated
our model's superior performance on the LA cavity and LA scar segmentation.
Specifically, we achieved 88.98\% and 64.08\% Dice coefficient for LA cavity
and scar segmentation, respectively. We will make our implementation code
public available at https://github.com/level6626/Boundary-focused-nnU-Net.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 10:05:37 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Zhang",
"Yuchen",
""
],
[
"Meng",
"Yanda",
""
],
[
"Zheng",
"Yalin",
""
]
] | TITLE: Automatically Segment the Left Atrium and Scars from LGE-MRIs Using a
Boundary-focused nnU-Net
ABSTRACT: Atrial fibrillation (AF) is the most common cardiac arrhythmia. Accurate
segmentation of the left atrial (LA) and LA scars can provide valuable
information to predict treatment outcomes in AF. In this paper, we proposed to
automatically segment LA cavity and quantify LA scars with late gadolinium
enhancement Magnetic Resonance Imagings (LGE-MRIs). We adopted nnU-Net as the
baseline model and exploited the importance of LA boundary characteristics with
the TopK loss as the loss function. Specifically, a focus on LA boundary pixels
is achieved during training, which provides a more accurate boundary
prediction. On the other hand, a distance map transformation of the predicted
LA boundary is regarded as an additional input for the LA scar prediction,
which provides marginal constraint on scar locations. We further designed a
novel uncertainty-aware module (UAM) to produce better results for predictions
with high uncertainty. Experiments on the LAScarQS 2022 dataset demonstrated
our model's superior performance on the LA cavity and LA scar segmentation.
Specifically, we achieved 88.98\% and 64.08\% Dice coefficient for LA cavity
and scar segmentation, respectively. We will make our implementation code
public available at https://github.com/level6626/Boundary-focused-nnU-Net.
| no_new_dataset | 0.712445 |
2304.14072 | Linyang Li | Linyang Li, Pengyu Wang, Ke Ren, Tianxiang Sun, Xipeng Qiu | Origin Tracing and Detecting of LLMs | working in progress | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The extraordinary performance of large language models (LLMs) heightens the
importance of detecting whether the context is generated by an AI system. More
importantly, while more and more companies and institutions release their LLMs,
the origin can be hard to trace. Since LLMs are heading towards the time of
AGI, similar to the origin tracing in anthropology, it is of great importance
to trace the origin of LLMs. In this paper, we first raise the concern of the
origin tracing of LLMs and propose an effective method to trace and detect
AI-generated contexts. We introduce a novel algorithm that leverages the
contrastive features between LLMs and extracts model-wise features to trace the
text origins. Our proposed method works under both white-box and black-box
settings therefore can be widely generalized to detect various LLMs.(e.g. can
be generalized to detect GPT-3 models without the GPT-3 models). Also, our
proposed method requires only limited data compared with the supervised
learning methods and can be extended to trace new-coming model origins. We
construct extensive experiments to examine whether we can trace the origins of
given texts. We provide valuable observations based on the experimental
results, such as the difficulty level of AI origin tracing, and the AI origin
similarities, and call for ethical concerns of LLM providers. We are releasing
all codes and data as a toolkit and benchmark for future AI origin tracing and
detecting studies. \footnote{We are releasing all available resource at
\url{https://github.com/OpenLMLab/}.}
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 10:05:57 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Li",
"Linyang",
""
],
[
"Wang",
"Pengyu",
""
],
[
"Ren",
"Ke",
""
],
[
"Sun",
"Tianxiang",
""
],
[
"Qiu",
"Xipeng",
""
]
] | TITLE: Origin Tracing and Detecting of LLMs
ABSTRACT: The extraordinary performance of large language models (LLMs) heightens the
importance of detecting whether the context is generated by an AI system. More
importantly, while more and more companies and institutions release their LLMs,
the origin can be hard to trace. Since LLMs are heading towards the time of
AGI, similar to the origin tracing in anthropology, it is of great importance
to trace the origin of LLMs. In this paper, we first raise the concern of the
origin tracing of LLMs and propose an effective method to trace and detect
AI-generated contexts. We introduce a novel algorithm that leverages the
contrastive features between LLMs and extracts model-wise features to trace the
text origins. Our proposed method works under both white-box and black-box
settings therefore can be widely generalized to detect various LLMs.(e.g. can
be generalized to detect GPT-3 models without the GPT-3 models). Also, our
proposed method requires only limited data compared with the supervised
learning methods and can be extended to trace new-coming model origins. We
construct extensive experiments to examine whether we can trace the origins of
given texts. We provide valuable observations based on the experimental
results, such as the difficulty level of AI origin tracing, and the AI origin
similarities, and call for ethical concerns of LLM providers. We are releasing
all codes and data as a toolkit and benchmark for future AI origin tracing and
detecting studies. \footnote{We are releasing all available resource at
\url{https://github.com/OpenLMLab/}.}
| no_new_dataset | 0.710616 |
2304.14081 | Ella Gale | Ella Gale, Oliver Matthews | Cluster Flow: how a hierarchical clustering layer make allows deep-NNs
more resilient to hacking, more human-like and easily implements relational
reasoning | 21 pages, 12 figures | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the huge recent breakthroughs in neural networks (NNs) for artificial
intelligence (specifically deep convolutional networks) such NNs do not achieve
human-level performance: they can be hacked by images that would fool no human
and lack `common sense'. It has been argued that a basis of human-level
intelligence is mankind's ability to perform relational reasoning: the
comparison of different objects, measuring similarity, grasping of relations
between objects and the converse, figuring out the odd one out in a set of
objects. Mankind can even do this with objects they have never seen before.
Here we show how ClusterFlow, a semi-supervised hierarchical clustering
framework can operate on trained NNs utilising the rich multi-dimensional class
and feature data found at the pre-SoftMax layer to build a hyperspacial map of
classes/features and this adds more human-like functionality to modern deep
convolutional neural networks. We demonstrate this with 3 tasks. 1. the
statistical learning based `mistakes' made by infants when attending to images
of cats and dogs. 2. improving both the resilience to hacking images and the
accurate measure of certainty in deep-NNs. 3. Relational reasoning over sets of
images, including those not known to the NN nor seen before. We also
demonstrate that ClusterFlow can work on non-NN data and deal with missing data
by testing it on a Chemistry dataset. This work suggests that modern deep NNs
can be made more human-like without re-training of the NNs. As it is known that
some methods used in deep and convolutional NNs are not biologically plausible
or perhaps even the best approach: the ClusterFlow framework can sit on top of
any NN and will be a useful tool to add as NNs are improved in this regard.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 10:41:03 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Gale",
"Ella",
""
],
[
"Matthews",
"Oliver",
""
]
] | TITLE: Cluster Flow: how a hierarchical clustering layer make allows deep-NNs
more resilient to hacking, more human-like and easily implements relational
reasoning
ABSTRACT: Despite the huge recent breakthroughs in neural networks (NNs) for artificial
intelligence (specifically deep convolutional networks) such NNs do not achieve
human-level performance: they can be hacked by images that would fool no human
and lack `common sense'. It has been argued that a basis of human-level
intelligence is mankind's ability to perform relational reasoning: the
comparison of different objects, measuring similarity, grasping of relations
between objects and the converse, figuring out the odd one out in a set of
objects. Mankind can even do this with objects they have never seen before.
Here we show how ClusterFlow, a semi-supervised hierarchical clustering
framework can operate on trained NNs utilising the rich multi-dimensional class
and feature data found at the pre-SoftMax layer to build a hyperspacial map of
classes/features and this adds more human-like functionality to modern deep
convolutional neural networks. We demonstrate this with 3 tasks. 1. the
statistical learning based `mistakes' made by infants when attending to images
of cats and dogs. 2. improving both the resilience to hacking images and the
accurate measure of certainty in deep-NNs. 3. Relational reasoning over sets of
images, including those not known to the NN nor seen before. We also
demonstrate that ClusterFlow can work on non-NN data and deal with missing data
by testing it on a Chemistry dataset. This work suggests that modern deep NNs
can be made more human-like without re-training of the NNs. As it is known that
some methods used in deep and convolutional NNs are not biologically plausible
or perhaps even the best approach: the ClusterFlow framework can sit on top of
any NN and will be a useful tool to add as NNs are improved in this regard.
| no_new_dataset | 0.708843 |
2304.14088 | Kourosh Parand | Alireza Afzal Aghaei, Kourosh Parand | Hyperparameter optimization of orthogonal functions in the numerical
solution of differential equations | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | This paper considers the hyperparameter optimization problem of mathematical
techniques that arise in the numerical solution of differential and integral
equations. The well-known approaches grid and random search, in a parallel
algorithm manner, are developed to find the optimal set of hyperparameters.
Employing rational Jacobi functions, we ran these algorithms on two nonlinear
benchmark differential equations on the semi-infinite domain. The
configurations contain different rational mappings along with their length
scale parameter and the Jacobi functions parameters. These trials are
configured on the collocation Least-Squares Support Vector Regression
(CLS-SVR), a novel numerical simulation approach based on spectral methods. In
addition, we have addressed the sensitivity of these hyperparameters on the
numerical stability and convergence of the CLS-SVR model. The experiments show
that this technique can effectively improve state-of-the-art results.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 11:00:00 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Aghaei",
"Alireza Afzal",
""
],
[
"Parand",
"Kourosh",
""
]
] | TITLE: Hyperparameter optimization of orthogonal functions in the numerical
solution of differential equations
ABSTRACT: This paper considers the hyperparameter optimization problem of mathematical
techniques that arise in the numerical solution of differential and integral
equations. The well-known approaches grid and random search, in a parallel
algorithm manner, are developed to find the optimal set of hyperparameters.
Employing rational Jacobi functions, we ran these algorithms on two nonlinear
benchmark differential equations on the semi-infinite domain. The
configurations contain different rational mappings along with their length
scale parameter and the Jacobi functions parameters. These trials are
configured on the collocation Least-Squares Support Vector Regression
(CLS-SVR), a novel numerical simulation approach based on spectral methods. In
addition, we have addressed the sensitivity of these hyperparameters on the
numerical stability and convergence of the CLS-SVR model. The experiments show
that this technique can effectively improve state-of-the-art results.
| no_new_dataset | 0.710051 |
2304.14089 | Varsha Behrunani | Varsha Behrunani, Hanmin Cai, Philipp Heer, Roy S. Smith, John Lygeros | Distributed Multi-Horizon Model Predictive Control for Network of Energy
Hubs | 14 pages, 11 Figures | null | null | null | eess.SY cs.SY | http://creativecommons.org/licenses/by/4.0/ | The increasing penetration of renewable energy resources has transformed the
energy system from traditional hierarchical energy delivery paradigm to a
distributed structure. Such development is accompanied with continuous
liberalization in the energy sector, giving rise to possible energy trading
among networked local energy hub. Joint operation of such hubs can improve
energy efficiency and support the integration of renewable energy resource.
Acknowledging peer-to-peer trading between hubs, their optimal operation within
the network can maximize consumption of locally produced energy. However, for
such complex systems involving multiple stakeholders, both computational
tractability and privacy concerns need to be accounted for. We investigate both
decentralized and centralized model predictive control (MPC) approaches for a
network of energy hubs. While the centralized control strategy offers superior
performance to the decentralized method, its implementation is computationally
prohibitive and raises privacy concerns, as the information of each hub has to
be shared extensively. On the other hand, a classical decentralized control
approach can ease the implementation at the expense of sub-optimal performance
of the overall system. In this work, a distributed scheme based on a consensus
alternating direction method of multipliers (ADMM) algorithm is proposed. It
combines the performance of the centralized approach with the privacy
preservation of decentralized approach. A novel multi-horizon MPC framework is
also introduced to increase the prediction horizon without compromising the
time discretization or making the problem computationally intractable. A
benchmark three-hub network is used to compare the performance of the mentioned
methods. The results show superior performance in terms of total cost,
computational time, robustness to demand and prices variations.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 11:06:19 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Behrunani",
"Varsha",
""
],
[
"Cai",
"Hanmin",
""
],
[
"Heer",
"Philipp",
""
],
[
"Smith",
"Roy S.",
""
],
[
"Lygeros",
"John",
""
]
] | TITLE: Distributed Multi-Horizon Model Predictive Control for Network of Energy
Hubs
ABSTRACT: The increasing penetration of renewable energy resources has transformed the
energy system from traditional hierarchical energy delivery paradigm to a
distributed structure. Such development is accompanied with continuous
liberalization in the energy sector, giving rise to possible energy trading
among networked local energy hub. Joint operation of such hubs can improve
energy efficiency and support the integration of renewable energy resource.
Acknowledging peer-to-peer trading between hubs, their optimal operation within
the network can maximize consumption of locally produced energy. However, for
such complex systems involving multiple stakeholders, both computational
tractability and privacy concerns need to be accounted for. We investigate both
decentralized and centralized model predictive control (MPC) approaches for a
network of energy hubs. While the centralized control strategy offers superior
performance to the decentralized method, its implementation is computationally
prohibitive and raises privacy concerns, as the information of each hub has to
be shared extensively. On the other hand, a classical decentralized control
approach can ease the implementation at the expense of sub-optimal performance
of the overall system. In this work, a distributed scheme based on a consensus
alternating direction method of multipliers (ADMM) algorithm is proposed. It
combines the performance of the centralized approach with the privacy
preservation of decentralized approach. A novel multi-horizon MPC framework is
also introduced to increase the prediction horizon without compromising the
time discretization or making the problem computationally intractable. A
benchmark three-hub network is used to compare the performance of the mentioned
methods. The results show superior performance in terms of total cost,
computational time, robustness to demand and prices variations.
| no_new_dataset | 0.710025 |
2304.14109 | Jarry Chen | Jarry Chen, Haytham M.Fayek | The Structurally Complex with Additive Parent Causality (SCARY) Dataset | 5 pages, 5 figures, accepted to CLeaR (Causal Learning and Reasoning)
2023 | null | null | null | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Causal datasets play a critical role in advancing the field of causality.
However, existing datasets often lack the complexity of real-world issues such
as selection bias, unfaithful data, and confounding. To address this gap, we
propose a new synthetic causal dataset, the Structurally Complex with Additive
paRent causalitY (SCARY) dataset, which includes the following features. The
dataset comprises 40 scenarios, each generated with three different seeds,
allowing researchers to leverage relevant subsets of the dataset. Additionally,
we use two different data generation mechanisms for generating the causal
relationship between parents and child nodes, including linear and mixed causal
mechanisms with multiple sub-types. Our dataset generator is inspired by the
Causal Discovery Toolbox and generates only additive models. The dataset has a
Varsortability of 0.5. Our SCARY dataset provides a valuable resource for
researchers to explore causal discovery under more realistic scenarios. The
dataset is available at https://github.com/JayJayc/SCARY.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 11:38:40 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Chen",
"Jarry",
""
],
[
"Fayek",
"Haytham M.",
""
]
] | TITLE: The Structurally Complex with Additive Parent Causality (SCARY) Dataset
ABSTRACT: Causal datasets play a critical role in advancing the field of causality.
However, existing datasets often lack the complexity of real-world issues such
as selection bias, unfaithful data, and confounding. To address this gap, we
propose a new synthetic causal dataset, the Structurally Complex with Additive
paRent causalitY (SCARY) dataset, which includes the following features. The
dataset comprises 40 scenarios, each generated with three different seeds,
allowing researchers to leverage relevant subsets of the dataset. Additionally,
we use two different data generation mechanisms for generating the causal
relationship between parents and child nodes, including linear and mixed causal
mechanisms with multiple sub-types. Our dataset generator is inspired by the
Causal Discovery Toolbox and generates only additive models. The dataset has a
Varsortability of 0.5. Our SCARY dataset provides a valuable resource for
researchers to explore causal discovery under more realistic scenarios. The
dataset is available at https://github.com/JayJayc/SCARY.
| new_dataset | 0.715412 |
2304.14122 | Pingping Zhang Dr | Xuehu Liu, Chenyang Yu, Pingping Zhang and Huchuan Lu | Deeply-Coupled Convolution-Transformer with Spatial-temporal
Complementary Learning for Video-based Person Re-identification | Accepted by TNNLS, including 11 pages,8 figures,8 tables.
Modifications may be performed | null | null | null | cs.CV cs.IR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Advanced deep Convolutional Neural Networks (CNNs) have shown great success
in video-based person Re-Identification (Re-ID). However, they usually focus on
the most obvious regions of persons with a limited global representation
ability. Recently, it witnesses that Transformers explore the inter-patch
relations with global observations for performance improvements. In this work,
we take both sides and propose a novel spatial-temporal complementary learning
framework named Deeply-Coupled Convolution-Transformer (DCCT) for
high-performance video-based person Re-ID. Firstly, we couple CNNs and
Transformers to extract two kinds of visual features and experimentally verify
their complementarity. Further, in spatial, we propose a Complementary Content
Attention (CCA) to take advantages of the coupled structure and guide
independent features for spatial complementary learning. In temporal, a
Hierarchical Temporal Aggregation (HTA) is proposed to progressively capture
the inter-frame dependencies and encode temporal information. Besides, a gated
attention is utilized to deliver aggregated temporal information into the CNN
and Transformer branches for temporal complementary learning. Finally, we
introduce a self-distillation training strategy to transfer the superior
spatial-temporal knowledge to backbone networks for higher accuracy and more
efficiency. In this way, two kinds of typical features from same videos are
integrated mechanically for more informative representations. Extensive
experiments on four public Re-ID benchmarks demonstrate that our framework
could attain better performances than most state-of-the-art methods.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 12:16:44 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Liu",
"Xuehu",
""
],
[
"Yu",
"Chenyang",
""
],
[
"Zhang",
"Pingping",
""
],
[
"Lu",
"Huchuan",
""
]
] | TITLE: Deeply-Coupled Convolution-Transformer with Spatial-temporal
Complementary Learning for Video-based Person Re-identification
ABSTRACT: Advanced deep Convolutional Neural Networks (CNNs) have shown great success
in video-based person Re-Identification (Re-ID). However, they usually focus on
the most obvious regions of persons with a limited global representation
ability. Recently, it witnesses that Transformers explore the inter-patch
relations with global observations for performance improvements. In this work,
we take both sides and propose a novel spatial-temporal complementary learning
framework named Deeply-Coupled Convolution-Transformer (DCCT) for
high-performance video-based person Re-ID. Firstly, we couple CNNs and
Transformers to extract two kinds of visual features and experimentally verify
their complementarity. Further, in spatial, we propose a Complementary Content
Attention (CCA) to take advantages of the coupled structure and guide
independent features for spatial complementary learning. In temporal, a
Hierarchical Temporal Aggregation (HTA) is proposed to progressively capture
the inter-frame dependencies and encode temporal information. Besides, a gated
attention is utilized to deliver aggregated temporal information into the CNN
and Transformer branches for temporal complementary learning. Finally, we
introduce a self-distillation training strategy to transfer the superior
spatial-temporal knowledge to backbone networks for higher accuracy and more
efficiency. In this way, two kinds of typical features from same videos are
integrated mechanically for more informative representations. Extensive
experiments on four public Re-ID benchmarks demonstrate that our framework
could attain better performances than most state-of-the-art methods.
| no_new_dataset | 0.709787 |
2304.14189 | Egil R{\o}nningstad | Egil R{\o}nningstad | UIO at SemEval-2023 Task 12: Multilingual fine-tuning for sentiment
classification in low-resource languages | Submitted to SemEval-2023, The 17th International Workshop on
Semantic Evaluation | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our contribution to the 2023 AfriSenti-SemEval shared task 12: Sentiment
Analysis for African Languages, provides insight into how a multilingual large
language model can be a resource for sentiment analysis in languages not seen
during pretraining. The shared task provides datasets of a variety of African
languages from different language families. The languages are to various
degrees related to languages used during pretraining, and the language data
contain various degrees of code-switching. We experiment with both monolingual
and multilingual datasets for the final fine-tuning, and find that with the
provided datasets that contain samples in the thousands, monolingual
fine-tuning yields the best results.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 13:51:18 GMT"
}
] | 2023-04-28T00:00:00 | [
[
"Rønningstad",
"Egil",
""
]
] | TITLE: UIO at SemEval-2023 Task 12: Multilingual fine-tuning for sentiment
classification in low-resource languages
ABSTRACT: Our contribution to the 2023 AfriSenti-SemEval shared task 12: Sentiment
Analysis for African Languages, provides insight into how a multilingual large
language model can be a resource for sentiment analysis in languages not seen
during pretraining. The shared task provides datasets of a variety of African
languages from different language families. The languages are to various
degrees related to languages used during pretraining, and the language data
contain various degrees of code-switching. We experiment with both monolingual
and multilingual datasets for the final fine-tuning, and find that with the
provided datasets that contain samples in the thousands, monolingual
fine-tuning yields the best results.
| no_new_dataset | 0.704109 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.