id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2206.10210 | Gregory Gay | Afonso Fontes and Gregory Gay | The Integration of Machine Learning into Automated Test Generation: A
Systematic Mapping Study | Accepted for Software Testing, Verification, and Reliability journal.
(arXiv admin note: text overlap with arXiv:2107.00906 - This is an earlier
study that this study extends) | null | null | null | cs.SE cs.LG | http://creativecommons.org/licenses/by/4.0/ | Context: Machine learning (ML) may enable effective automated test
generation.
Objective: We characterize emerging research, examining testing practices,
researcher goals, ML techniques applied, evaluation, and challenges.
Methods: We perform a systematic mapping on a sample of 124 publications.
Results: ML generates input for system, GUI, unit, performance, and
combinatorial testing or improves the performance of existing generation
methods. ML is also used to generate test verdicts, property-based, and
expected output oracles. Supervised learning - often based on neural networks -
and reinforcement learning - often based on Q-learning - are common, and some
publications also employ unsupervised or semi-supervised learning.
(Semi-/Un-)Supervised approaches are evaluated using both traditional testing
metrics and ML-related metrics (e.g., accuracy), while reinforcement learning
is often evaluated using testing metrics tied to the reward function.
Conclusion: Work-to-date shows great promise, but there are open challenges
regarding training data, retraining, scalability, evaluation complexity, ML
algorithms employed - and how they are applied - benchmarks, and replicability.
Our findings can serve as a roadmap and inspiration for researchers in this
field.
| [
{
"version": "v1",
"created": "Tue, 21 Jun 2022 09:26:25 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jun 2022 13:42:02 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Dec 2022 07:09:38 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Mar 2023 07:45:50 GMT"
},
{
"version": "v5",
"created": "Sun, 16 Apr 2023 03:43:15 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Fontes",
"Afonso",
""
],
[
"Gay",
"Gregory",
""
]
] | TITLE: The Integration of Machine Learning into Automated Test Generation: A
Systematic Mapping Study
ABSTRACT: Context: Machine learning (ML) may enable effective automated test
generation.
Objective: We characterize emerging research, examining testing practices,
researcher goals, ML techniques applied, evaluation, and challenges.
Methods: We perform a systematic mapping on a sample of 124 publications.
Results: ML generates input for system, GUI, unit, performance, and
combinatorial testing or improves the performance of existing generation
methods. ML is also used to generate test verdicts, property-based, and
expected output oracles. Supervised learning - often based on neural networks -
and reinforcement learning - often based on Q-learning - are common, and some
publications also employ unsupervised or semi-supervised learning.
(Semi-/Un-)Supervised approaches are evaluated using both traditional testing
metrics and ML-related metrics (e.g., accuracy), while reinforcement learning
is often evaluated using testing metrics tied to the reward function.
Conclusion: Work-to-date shows great promise, but there are open challenges
regarding training data, retraining, scalability, evaluation complexity, ML
algorithms employed - and how they are applied - benchmarks, and replicability.
Our findings can serve as a roadmap and inspiration for researchers in this
field.
| no_new_dataset | 0.707657 |
2206.15331 | Arghavan Moradi Dakhel | Arghavan Moradi Dakhel, Vahid Majdinasab, Amin Nikanjam, Foutse Khomh,
Michel C. Desmarais, Zhen Ming (Jack) Jiang | GitHub Copilot AI pair programmer: Asset or Liability? | 27 pages, 8 figures | null | null | null | cs.SE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic program synthesis is a long-lasting dream in software engineering.
Recently, a promising Deep Learning (DL) based solution, called Copilot, has
been proposed by OpenAI and Microsoft as an industrial product. Although some
studies evaluate the correctness of Copilot solutions and report its issues,
more empirical evaluations are necessary to understand how developers can
benefit from it effectively. In this paper, we study the capabilities of
Copilot in two different programming tasks: (i) generating (and reproducing)
correct and efficient solutions for fundamental algorithmic problems, and (ii)
comparing Copilot's proposed solutions with those of human programmers on a set
of programming tasks. For the former, we assess the performance and
functionality of Copilot in solving selected fundamental problems in computer
science, like sorting and implementing data structures. In the latter, a
dataset of programming problems with human-provided solutions is used. The
results show that Copilot is capable of providing solutions for almost all
fundamental algorithmic problems, however, some solutions are buggy and
non-reproducible. Moreover, Copilot has some difficulties in combining multiple
methods to generate a solution. Comparing Copilot to humans, our results show
that the correct ratio of humans' solutions is greater than Copilot's
suggestions, while the buggy solutions generated by Copilot require less effort
to be repaired.
| [
{
"version": "v1",
"created": "Thu, 30 Jun 2022 15:00:03 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 20:52:00 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Dakhel",
"Arghavan Moradi",
"",
"Jack"
],
[
"Majdinasab",
"Vahid",
"",
"Jack"
],
[
"Nikanjam",
"Amin",
"",
"Jack"
],
[
"Khomh",
"Foutse",
"",
"Jack"
],
[
"Desmarais",
"Michel C.",
"",
"Jack"
],
[
"Ming",
"Zhen",
"",
"Jack"
],
[
"Jiang",
"",
""
]
] | TITLE: GitHub Copilot AI pair programmer: Asset or Liability?
ABSTRACT: Automatic program synthesis is a long-lasting dream in software engineering.
Recently, a promising Deep Learning (DL) based solution, called Copilot, has
been proposed by OpenAI and Microsoft as an industrial product. Although some
studies evaluate the correctness of Copilot solutions and report its issues,
more empirical evaluations are necessary to understand how developers can
benefit from it effectively. In this paper, we study the capabilities of
Copilot in two different programming tasks: (i) generating (and reproducing)
correct and efficient solutions for fundamental algorithmic problems, and (ii)
comparing Copilot's proposed solutions with those of human programmers on a set
of programming tasks. For the former, we assess the performance and
functionality of Copilot in solving selected fundamental problems in computer
science, like sorting and implementing data structures. In the latter, a
dataset of programming problems with human-provided solutions is used. The
results show that Copilot is capable of providing solutions for almost all
fundamental algorithmic problems, however, some solutions are buggy and
non-reproducible. Moreover, Copilot has some difficulties in combining multiple
methods to generate a solution. Comparing Copilot to humans, our results show
that the correct ratio of humans' solutions is greater than Copilot's
suggestions, while the buggy solutions generated by Copilot require less effort
to be repaired.
| no_new_dataset | 0.705417 |
2207.01472 | Rui Wang | Rui Wang, Chongwei Liu, Xudong Mou, Kai Gao, Xiaohui Guo, Pin Liu,
Tianyu Wo, Xudong Liu | Deep Contrastive One-Class Time Series Anomaly Detection | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The accumulation of time-series data and the absence of labels make
time-series Anomaly Detection (AD) a self-supervised deep learning task.
Single-normality-assumption-based methods, which reveal only a certain aspect
of the whole normality, are incapable of tasks involved with a large number of
anomalies. Specifically, Contrastive Learning (CL) methods distance negative
pairs, many of which consist of both normal samples, thus reducing the AD
performance. Existing multi-normality-assumption-based methods are usually
two-staged, firstly pre-training through certain tasks whose target may differ
from AD, limiting their performance. To overcome the shortcomings, a deep
Contrastive One-Class Anomaly detection method of time series (COCA) is
proposed by authors, following the normality assumptions of CL and one-class
classification. It treats the original and reconstructed representations as the
positive pair of negative-sample-free CL, namely "sequence contrast". Next,
invariance terms and variance terms compose a contrastive one-class loss
function in which the loss of the assumptions is optimized by invariance terms
simultaneously and the "hypersphere collapse" is prevented by variance terms.
In addition, extensive experiments on two real-world time-series datasets show
the superior performance of the proposed method achieves state-of-the-art.
| [
{
"version": "v1",
"created": "Mon, 4 Jul 2022 15:08:06 GMT"
},
{
"version": "v2",
"created": "Sat, 8 Oct 2022 06:58:32 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Apr 2023 08:57:57 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Rui",
""
],
[
"Liu",
"Chongwei",
""
],
[
"Mou",
"Xudong",
""
],
[
"Gao",
"Kai",
""
],
[
"Guo",
"Xiaohui",
""
],
[
"Liu",
"Pin",
""
],
[
"Wo",
"Tianyu",
""
],
[
"Liu",
"Xudong",
""
]
] | TITLE: Deep Contrastive One-Class Time Series Anomaly Detection
ABSTRACT: The accumulation of time-series data and the absence of labels make
time-series Anomaly Detection (AD) a self-supervised deep learning task.
Single-normality-assumption-based methods, which reveal only a certain aspect
of the whole normality, are incapable of tasks involved with a large number of
anomalies. Specifically, Contrastive Learning (CL) methods distance negative
pairs, many of which consist of both normal samples, thus reducing the AD
performance. Existing multi-normality-assumption-based methods are usually
two-staged, firstly pre-training through certain tasks whose target may differ
from AD, limiting their performance. To overcome the shortcomings, a deep
Contrastive One-Class Anomaly detection method of time series (COCA) is
proposed by authors, following the normality assumptions of CL and one-class
classification. It treats the original and reconstructed representations as the
positive pair of negative-sample-free CL, namely "sequence contrast". Next,
invariance terms and variance terms compose a contrastive one-class loss
function in which the loss of the assumptions is optimized by invariance terms
simultaneously and the "hypersphere collapse" is prevented by variance terms.
In addition, extensive experiments on two real-world time-series datasets show
the superior performance of the proposed method achieves state-of-the-art.
| no_new_dataset | 0.711638 |
2207.05378 | Zhewei Huang | Zuzeng Lin, Ailin Huang, Zhewei Huang | Collaborative Neural Rendering using Anime Character Sheets | The three authors contribute equally. In the Arts and Creativity
Track of IJCAI2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Drawing images of characters with desired poses is an essential but laborious
task in anime production. Assisting artists to create is a research hotspot in
recent years. In this paper, we present the Collaborative Neural Rendering
(CoNR) method, which creates new images for specified poses from a few
reference images (AKA Character Sheets). In general, the diverse hairstyles and
garments of anime characters defies the employment of universal body models
like SMPL, which fits in most nude human shapes. To overcome this, CoNR uses a
compact and easy-to-obtain landmark encoding to avoid creating a unified UV
mapping in the pipeline. In addition, the performance of CoNR can be
significantly improved when referring to multiple reference images, thanks to
feature space cross-view warping in a carefully designed neural network.
Moreover, we have collected a character sheet dataset containing over 700,000
hand-drawn and synthesized images of diverse poses to facilitate research in
this area. Our code and demo are available at
https://github.com/megvii-research/IJCAI2023-CoNR.
| [
{
"version": "v1",
"created": "Tue, 12 Jul 2022 08:21:35 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Aug 2022 10:48:20 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Aug 2022 16:49:40 GMT"
},
{
"version": "v4",
"created": "Mon, 10 Apr 2023 15:28:35 GMT"
},
{
"version": "v5",
"created": "Fri, 14 Apr 2023 18:28:33 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Lin",
"Zuzeng",
""
],
[
"Huang",
"Ailin",
""
],
[
"Huang",
"Zhewei",
""
]
] | TITLE: Collaborative Neural Rendering using Anime Character Sheets
ABSTRACT: Drawing images of characters with desired poses is an essential but laborious
task in anime production. Assisting artists to create is a research hotspot in
recent years. In this paper, we present the Collaborative Neural Rendering
(CoNR) method, which creates new images for specified poses from a few
reference images (AKA Character Sheets). In general, the diverse hairstyles and
garments of anime characters defies the employment of universal body models
like SMPL, which fits in most nude human shapes. To overcome this, CoNR uses a
compact and easy-to-obtain landmark encoding to avoid creating a unified UV
mapping in the pipeline. In addition, the performance of CoNR can be
significantly improved when referring to multiple reference images, thanks to
feature space cross-view warping in a carefully designed neural network.
Moreover, we have collected a character sheet dataset containing over 700,000
hand-drawn and synthesized images of diverse poses to facilitate research in
this area. Our code and demo are available at
https://github.com/megvii-research/IJCAI2023-CoNR.
| new_dataset | 0.713818 |
2207.06551 | Kaiwen Xu | Kaiwen Xu, Thomas Li, Mirza S. Khan, Riqiang Gao, Sanja L. Antic,
Yuankai Huo, Kim L. Sandler, Fabien Maldonado, Bennett A. Landman | Body Composition Assessment with Limited Field-of-view Computed
Tomography: A Semantic Image Extension Perspective | Updated with additional evaluation and clarification | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | Field-of-view (FOV) tissue truncation beyond the lungs is common in routine
lung screening computed tomography (CT). This poses limitations for
opportunistic CT- based body composition (BC) assessment as key anatomical
structures are missing. Traditionally, extending the FOV of CT is considered as
a CT reconstruction problem using limited data. However, this approach relies
on the projection domain data which might not be available in application. In
this work, we formulate the problem from the semantic image extension
perspective which only requires image data as inputs. The proposed two-stage
method identifies a new FOV border based on the estimated extent of the
complete body and imputes missing tissues in the truncated region. The training
samples are simulated using CT slices with complete body in FOV, making the
model development self-supervised. We evaluate the validity of the proposed
method in automatic BC assessment using lung screening CT with limited FOV. The
proposed method effectively restores the missing tissues and reduces BC
assessment error introduced by FOV tissue truncation. In the BC assessment for
a large-scale lung screening CT dataset, this correction improves both the
intra-subject consistency and the correlation with anthropometric
approximations. The developed method is available at
https://github.com/MASILab/S-EFOV.
| [
{
"version": "v1",
"created": "Wed, 13 Jul 2022 23:19:22 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 00:40:40 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Xu",
"Kaiwen",
""
],
[
"Li",
"Thomas",
""
],
[
"Khan",
"Mirza S.",
""
],
[
"Gao",
"Riqiang",
""
],
[
"Antic",
"Sanja L.",
""
],
[
"Huo",
"Yuankai",
""
],
[
"Sandler",
"Kim L.",
""
],
[
"Maldonado",
"Fabien",
""
],
[
"Landman",
"Bennett A.",
""
]
] | TITLE: Body Composition Assessment with Limited Field-of-view Computed
Tomography: A Semantic Image Extension Perspective
ABSTRACT: Field-of-view (FOV) tissue truncation beyond the lungs is common in routine
lung screening computed tomography (CT). This poses limitations for
opportunistic CT- based body composition (BC) assessment as key anatomical
structures are missing. Traditionally, extending the FOV of CT is considered as
a CT reconstruction problem using limited data. However, this approach relies
on the projection domain data which might not be available in application. In
this work, we formulate the problem from the semantic image extension
perspective which only requires image data as inputs. The proposed two-stage
method identifies a new FOV border based on the estimated extent of the
complete body and imputes missing tissues in the truncated region. The training
samples are simulated using CT slices with complete body in FOV, making the
model development self-supervised. We evaluate the validity of the proposed
method in automatic BC assessment using lung screening CT with limited FOV. The
proposed method effectively restores the missing tissues and reduces BC
assessment error introduced by FOV tissue truncation. In the BC assessment for
a large-scale lung screening CT dataset, this correction improves both the
intra-subject consistency and the correlation with anthropometric
approximations. The developed method is available at
https://github.com/MASILab/S-EFOV.
| no_new_dataset | 0.713257 |
2208.00812 | Shahnawaz Ahmed | Shahnawaz Ahmed, Fernando Quijandr\'ia, Anton Frisk Kockum | Gradient-descent quantum process tomography by learning Kraus operators | 10 pages, 5 figures, Code and data available at
https://github.com/quantshah/gd-qpt | Physical Review Letters 130, 150402 (2023) | 10.1103/PhysRevLett.130.150402 | null | quant-ph cs.LG physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform quantum process tomography (QPT) for both discrete- and
continuous-variable quantum systems by learning a process representation using
Kraus operators. The Kraus form ensures that the reconstructed process is
completely positive. To make the process trace-preserving, we use a constrained
gradient-descent (GD) approach on the so-called Stiefel manifold during
optimization to obtain the Kraus operators. Our ansatz uses a few Kraus
operators to avoid direct estimation of large process matrices, e.g., the Choi
matrix, for low-rank quantum processes. The GD-QPT matches the performance of
both compressed-sensing (CS) and projected least-squares (PLS) QPT in
benchmarks with two-qubit random processes, but shines by combining the best
features of these two methods. Similar to CS (but unlike PLS), GD-QPT can
reconstruct a process from just a small number of random measurements, and
similar to PLS (but unlike CS) it also works for larger system sizes, up to at
least five qubits. We envisage that the data-driven approach of GD-QPT can
become a practical tool that greatly reduces the cost and computational effort
for QPT in intermediate-scale quantum systems.
| [
{
"version": "v1",
"created": "Mon, 1 Aug 2022 12:48:48 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Ahmed",
"Shahnawaz",
""
],
[
"Quijandría",
"Fernando",
""
],
[
"Kockum",
"Anton Frisk",
""
]
] | TITLE: Gradient-descent quantum process tomography by learning Kraus operators
ABSTRACT: We perform quantum process tomography (QPT) for both discrete- and
continuous-variable quantum systems by learning a process representation using
Kraus operators. The Kraus form ensures that the reconstructed process is
completely positive. To make the process trace-preserving, we use a constrained
gradient-descent (GD) approach on the so-called Stiefel manifold during
optimization to obtain the Kraus operators. Our ansatz uses a few Kraus
operators to avoid direct estimation of large process matrices, e.g., the Choi
matrix, for low-rank quantum processes. The GD-QPT matches the performance of
both compressed-sensing (CS) and projected least-squares (PLS) QPT in
benchmarks with two-qubit random processes, but shines by combining the best
features of these two methods. Similar to CS (but unlike PLS), GD-QPT can
reconstruct a process from just a small number of random measurements, and
similar to PLS (but unlike CS) it also works for larger system sizes, up to at
least five qubits. We envisage that the data-driven approach of GD-QPT can
become a practical tool that greatly reduces the cost and computational effort
for QPT in intermediate-scale quantum systems.
| no_new_dataset | 0.71 |
2208.11148 | Xiao Guo | Xiao Guo, Yaojie Liu, Anil Jain, and Xiaoming Liu | Multi-domain Learning for Updating Face Anti-spoofing Models | To appear at ECCV 2022 as an oral presentation. The SiW-Mv2 dataset
is detailed in the Appendix | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In this work, we study multi-domain learning for face anti-spoofing(MD-FAS),
where a pre-trained FAS model needs to be updated to perform equally well on
both source and target domains while only using target domain data for
updating. We present a new model for MD-FAS, which addresses the forgetting
issue when learning new domain data, while possessing a high level of
adaptability. First, we devise a simple yet effective module, called spoof
region estimator(SRE), to identify spoof traces in the spoof image. Such spoof
traces reflect the source pre-trained model's responses that help upgraded
models combat catastrophic forgetting during updating. Unlike prior works that
estimate spoof traces which generate multiple outputs or a low-resolution
binary mask, SRE produces one single, detailed pixel-wise estimate in an
unsupervised manner. Secondly, we propose a novel framework, named FAS-wrapper,
which transfers knowledge from the pre-trained models and seamlessly integrates
with different FAS models. Lastly, to help the community further advance
MD-FAS, we construct a new benchmark based on SIW, SIW-Mv2 and Oulu-NPU, and
introduce four distinct protocols for evaluation, where source and target
domains are different in terms of spoof type, age, ethnicity, and illumination.
Our proposed method achieves superior performance on the MD-FAS benchmark than
previous methods. Our code and newly curated SIW-Mv2 are publicly available.
| [
{
"version": "v1",
"created": "Tue, 23 Aug 2022 18:28:34 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 03:47:27 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Guo",
"Xiao",
""
],
[
"Liu",
"Yaojie",
""
],
[
"Jain",
"Anil",
""
],
[
"Liu",
"Xiaoming",
""
]
] | TITLE: Multi-domain Learning for Updating Face Anti-spoofing Models
ABSTRACT: In this work, we study multi-domain learning for face anti-spoofing(MD-FAS),
where a pre-trained FAS model needs to be updated to perform equally well on
both source and target domains while only using target domain data for
updating. We present a new model for MD-FAS, which addresses the forgetting
issue when learning new domain data, while possessing a high level of
adaptability. First, we devise a simple yet effective module, called spoof
region estimator(SRE), to identify spoof traces in the spoof image. Such spoof
traces reflect the source pre-trained model's responses that help upgraded
models combat catastrophic forgetting during updating. Unlike prior works that
estimate spoof traces which generate multiple outputs or a low-resolution
binary mask, SRE produces one single, detailed pixel-wise estimate in an
unsupervised manner. Secondly, we propose a novel framework, named FAS-wrapper,
which transfers knowledge from the pre-trained models and seamlessly integrates
with different FAS models. Lastly, to help the community further advance
MD-FAS, we construct a new benchmark based on SIW, SIW-Mv2 and Oulu-NPU, and
introduce four distinct protocols for evaluation, where source and target
domains are different in terms of spoof type, age, ethnicity, and illumination.
Our proposed method achieves superior performance on the MD-FAS benchmark than
previous methods. Our code and newly curated SIW-Mv2 are publicly available.
| no_new_dataset | 0.70676 |
2208.13404 | Junjie Hu | Junjie Hu and Chenyou Fan and Mete Ozay and Hua Feng and Yuan Gao and
Tin Lun Lam | Progressive Self-Distillation for Ground-to-Aerial Perception Knowledge
Transfer | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We study a practical yet hasn't been explored problem: how a drone can
perceive in an environment from different flight heights. Unlike autonomous
driving, where the perception is always conducted from a ground viewpoint, a
flying drone may flexibly change its flight height due to specific tasks,
requiring the capability for viewpoint invariant perception. Tackling the such
problem with supervised learning will incur tremendous costs for data
annotation of different flying heights. On the other hand, current
semi-supervised learning methods are not effective under viewpoint differences.
In this paper, we introduce the ground-to-aerial perception knowledge transfer
and propose a progressive semi-supervised learning framework that enables drone
perception using only labeled data of ground viewpoint and unlabeled data of
flying viewpoints. Our framework has four core components: i) a dense viewpoint
sampling strategy that splits the range of vertical flight height into a set of
small pieces with evenly-distributed intervals, ii) nearest neighbor
pseudo-labeling that infers labels of the nearest neighbor viewpoint with a
model learned on the preceding viewpoint, iii) MixView that generates augmented
images among different viewpoints to alleviate viewpoint differences, and iv) a
progressive distillation strategy to gradually learn until reaching the maximum
flying height. We collect a synthesized and a real-world dataset, and we
perform extensive experimental analyses to show that our method yields 22.2%
and 16.9% accuracy improvement for the synthesized dataset and the real world.
Code and datasets are available on
https://github.com/FreeformRobotics/Progressive-Self-Distillation-for-Ground-to-Aerial-Perception-Knowledge-Transfer.
| [
{
"version": "v1",
"created": "Mon, 29 Aug 2022 07:30:35 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jan 2023 10:23:09 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Apr 2023 06:31:23 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Hu",
"Junjie",
""
],
[
"Fan",
"Chenyou",
""
],
[
"Ozay",
"Mete",
""
],
[
"Feng",
"Hua",
""
],
[
"Gao",
"Yuan",
""
],
[
"Lam",
"Tin Lun",
""
]
] | TITLE: Progressive Self-Distillation for Ground-to-Aerial Perception Knowledge
Transfer
ABSTRACT: We study a practical yet hasn't been explored problem: how a drone can
perceive in an environment from different flight heights. Unlike autonomous
driving, where the perception is always conducted from a ground viewpoint, a
flying drone may flexibly change its flight height due to specific tasks,
requiring the capability for viewpoint invariant perception. Tackling the such
problem with supervised learning will incur tremendous costs for data
annotation of different flying heights. On the other hand, current
semi-supervised learning methods are not effective under viewpoint differences.
In this paper, we introduce the ground-to-aerial perception knowledge transfer
and propose a progressive semi-supervised learning framework that enables drone
perception using only labeled data of ground viewpoint and unlabeled data of
flying viewpoints. Our framework has four core components: i) a dense viewpoint
sampling strategy that splits the range of vertical flight height into a set of
small pieces with evenly-distributed intervals, ii) nearest neighbor
pseudo-labeling that infers labels of the nearest neighbor viewpoint with a
model learned on the preceding viewpoint, iii) MixView that generates augmented
images among different viewpoints to alleviate viewpoint differences, and iv) a
progressive distillation strategy to gradually learn until reaching the maximum
flying height. We collect a synthesized and a real-world dataset, and we
perform extensive experimental analyses to show that our method yields 22.2%
and 16.9% accuracy improvement for the synthesized dataset and the real world.
Code and datasets are available on
https://github.com/FreeformRobotics/Progressive-Self-Distillation-for-Ground-to-Aerial-Perception-Knowledge-Transfer.
| no_new_dataset | 0.697802 |
2209.12157 | Chuyan Zhang | Chuyan Zhang and Yun Gu | Dive into Self-Supervised Learning for Medical Image Analysis: Data,
Models and Tasks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-supervised learning (SSL) has achieved remarkable performance in various
medical imaging tasks by dint of priors from massive unlabelled data. However,
regarding a specific downstream task, there is still a lack of an instruction
book on how to select suitable pretext tasks and implementation details
throughout the standard ``pretrain-then-finetune'' workflow. In this work, we
focus on exploiting the capacity of SSL in terms of four realistic and
significant issues: (1) the impact of SSL on imbalanced datasets, (2) the
network architecture, (3) the applicability of upstream tasks to downstream
tasks and (4) the stacking effect of SSL and common policies for deep learning.
We provide a large-scale, in-depth and fine-grained study through extensive
experiments on predictive, contrastive, generative and multi-SSL algorithms.
Based on the results, we have uncovered several insights. Positively, SSL
advances class-imbalanced learning mainly by boosting the performance of the
rare class, which is of interest to clinical diagnosis. Unfortunately, SSL
offers marginal or even negative returns in some cases, including severely
imbalanced and relatively balanced data regimes, as well as combinations with
common training policies. Our intriguing findings provide practical guidelines
for the usage of SSL in the medical context and highlight the need for
developing universal pretext tasks to accommodate diverse application
scenarios.
| [
{
"version": "v1",
"created": "Sun, 25 Sep 2022 06:04:11 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 03:16:02 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zhang",
"Chuyan",
""
],
[
"Gu",
"Yun",
""
]
] | TITLE: Dive into Self-Supervised Learning for Medical Image Analysis: Data,
Models and Tasks
ABSTRACT: Self-supervised learning (SSL) has achieved remarkable performance in various
medical imaging tasks by dint of priors from massive unlabelled data. However,
regarding a specific downstream task, there is still a lack of an instruction
book on how to select suitable pretext tasks and implementation details
throughout the standard ``pretrain-then-finetune'' workflow. In this work, we
focus on exploiting the capacity of SSL in terms of four realistic and
significant issues: (1) the impact of SSL on imbalanced datasets, (2) the
network architecture, (3) the applicability of upstream tasks to downstream
tasks and (4) the stacking effect of SSL and common policies for deep learning.
We provide a large-scale, in-depth and fine-grained study through extensive
experiments on predictive, contrastive, generative and multi-SSL algorithms.
Based on the results, we have uncovered several insights. Positively, SSL
advances class-imbalanced learning mainly by boosting the performance of the
rare class, which is of interest to clinical diagnosis. Unfortunately, SSL
offers marginal or even negative returns in some cases, including severely
imbalanced and relatively balanced data regimes, as well as combinations with
common training policies. Our intriguing findings provide practical guidelines
for the usage of SSL in the medical context and highlight the need for
developing universal pretext tasks to accommodate diverse application
scenarios.
| no_new_dataset | 0.709019 |
2209.12195 | Ehsan Nowroozi | Ehsan Nowroozi, Mohammadreza Mohammadi, Erkay Savas, Mauro Conti,
Yassine Mekdad | Employing Deep Ensemble Learning for Improving the Security of Computer
Networks against Adversarial Attacks | null | null | null | null | cs.CR cs.AI cs.LG cs.NI | http://creativecommons.org/licenses/by/4.0/ | In the past few years, Convolutional Neural Networks (CNN) have demonstrated
promising performance in various real-world cybersecurity applications, such as
network and multimedia security. However, the underlying fragility of CNN
structures poses major security problems, making them inappropriate for use in
security-oriented applications including such computer networks. Protecting
these architectures from adversarial attacks necessitates using security-wise
architectures that are challenging to attack.
In this study, we present a novel architecture based on an ensemble
classifier that combines the enhanced security of 1-Class classification (known
as 1C) with the high performance of conventional 2-Class classification (known
as 2C) in the absence of attacks.Our architecture is referred to as the
1.5-Class (SPRITZ-1.5C) classifier and constructed using a final dense
classifier, one 2C classifier (i.e., CNNs), and two parallel 1C classifiers
(i.e., auto-encoders). In our experiments, we evaluated the robustness of our
proposed architecture by considering eight possible adversarial attacks in
various scenarios. We performed these attacks on the 2C and SPRITZ-1.5C
architectures separately. The experimental results of our study showed that the
Attack Success Rate (ASR) of the I-FGSM attack against a 2C classifier trained
with the N-BaIoT dataset is 0.9900. In contrast, the ASR is 0.0000 for the
SPRITZ-1.5C classifier.
| [
{
"version": "v1",
"created": "Sun, 25 Sep 2022 10:25:59 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 13:40:38 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Nowroozi",
"Ehsan",
""
],
[
"Mohammadi",
"Mohammadreza",
""
],
[
"Savas",
"Erkay",
""
],
[
"Conti",
"Mauro",
""
],
[
"Mekdad",
"Yassine",
""
]
] | TITLE: Employing Deep Ensemble Learning for Improving the Security of Computer
Networks against Adversarial Attacks
ABSTRACT: In the past few years, Convolutional Neural Networks (CNN) have demonstrated
promising performance in various real-world cybersecurity applications, such as
network and multimedia security. However, the underlying fragility of CNN
structures poses major security problems, making them inappropriate for use in
security-oriented applications including such computer networks. Protecting
these architectures from adversarial attacks necessitates using security-wise
architectures that are challenging to attack.
In this study, we present a novel architecture based on an ensemble
classifier that combines the enhanced security of 1-Class classification (known
as 1C) with the high performance of conventional 2-Class classification (known
as 2C) in the absence of attacks.Our architecture is referred to as the
1.5-Class (SPRITZ-1.5C) classifier and constructed using a final dense
classifier, one 2C classifier (i.e., CNNs), and two parallel 1C classifiers
(i.e., auto-encoders). In our experiments, we evaluated the robustness of our
proposed architecture by considering eight possible adversarial attacks in
various scenarios. We performed these attacks on the 2C and SPRITZ-1.5C
architectures separately. The experimental results of our study showed that the
Attack Success Rate (ASR) of the I-FGSM attack against a 2C classifier trained
with the N-BaIoT dataset is 0.9900. In contrast, the ASR is 0.0000 for the
SPRITZ-1.5C classifier.
| no_new_dataset | 0.707436 |
2209.15137 | Gideon Vos | Gideon Vos, Kelly Trinh, Zoltan Sarnyai, Mostafa Rahimi Azghadi | Generalizable machine learning for stress monitoring from wearable
devices: A systematic literature review | https://www.sciencedirect.com/science/article/pii/S1386505623000436 | International Journal of Medical Informatics Volume 173, May 2023,
105026 | 10.1016/j.ijmedinf.2023.105026 | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | Introduction. The stress response has both subjective, psychological and
objectively measurable, biological components. Both of them can be expressed
differently from person to person, complicating the development of a generic
stress measurement model. This is further compounded by the lack of large,
labeled datasets that can be utilized to build machine learning models for
accurately detecting periods and levels of stress. The aim of this review is to
provide an overview of the current state of stress detection and monitoring
using wearable devices, and where applicable, machine learning techniques
utilized.
Methods. This study reviewed published works contributing and/or using
datasets designed for detecting stress and their associated machine learning
methods, with a systematic review and meta-analysis of those that utilized
wearable sensor data as stress biomarkers. The electronic databases of Google
Scholar, Crossref, DOAJ and PubMed were searched for relevant articles and a
total of 24 articles were identified and included in the final analysis. The
reviewed works were synthesized into three categories of publicly available
stress datasets, machine learning, and future research directions.
Results. A wide variety of study-specific test and measurement protocols were
noted in the literature. A number of public datasets were identified that are
labeled for stress detection. In addition, we discuss that previous works show
shortcomings in areas such as their labeling protocols, lack of statistical
power, validity of stress biomarkers, and generalization ability.
Conclusion. Generalization of existing machine learning models still require
further study, and research in this area will continue to provide improvements
as newer and more substantial datasets become available for study.
| [
{
"version": "v1",
"created": "Thu, 29 Sep 2022 23:40:38 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Mar 2023 02:44:04 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2023 07:47:11 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Vos",
"Gideon",
""
],
[
"Trinh",
"Kelly",
""
],
[
"Sarnyai",
"Zoltan",
""
],
[
"Azghadi",
"Mostafa Rahimi",
""
]
] | TITLE: Generalizable machine learning for stress monitoring from wearable
devices: A systematic literature review
ABSTRACT: Introduction. The stress response has both subjective, psychological and
objectively measurable, biological components. Both of them can be expressed
differently from person to person, complicating the development of a generic
stress measurement model. This is further compounded by the lack of large,
labeled datasets that can be utilized to build machine learning models for
accurately detecting periods and levels of stress. The aim of this review is to
provide an overview of the current state of stress detection and monitoring
using wearable devices, and where applicable, machine learning techniques
utilized.
Methods. This study reviewed published works contributing and/or using
datasets designed for detecting stress and their associated machine learning
methods, with a systematic review and meta-analysis of those that utilized
wearable sensor data as stress biomarkers. The electronic databases of Google
Scholar, Crossref, DOAJ and PubMed were searched for relevant articles and a
total of 24 articles were identified and included in the final analysis. The
reviewed works were synthesized into three categories of publicly available
stress datasets, machine learning, and future research directions.
Results. A wide variety of study-specific test and measurement protocols were
noted in the literature. A number of public datasets were identified that are
labeled for stress detection. In addition, we discuss that previous works show
shortcomings in areas such as their labeling protocols, lack of statistical
power, validity of stress biomarkers, and generalization ability.
Conclusion. Generalization of existing machine learning models still require
further study, and research in this area will continue to provide improvements
as newer and more substantial datasets become available for study.
| no_new_dataset | 0.708862 |
2210.00063 | Donghan Yu | Donghan Yu, Sheng Zhang, Patrick Ng, Henghui Zhu, Alexander Hanbo Li,
Jun Wang, Yiqun Hu, William Wang, Zhiguo Wang, Bing Xiang | DecAF: Joint Decoding of Answers and Logical Forms for Question
Answering over Knowledge Bases | ICLR 2023. Code link:
https://github.com/awslabs/decode-answer-logical-form | null | null | null | cs.CL cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Question answering over knowledge bases (KBs) aims to answer natural language
questions with factual information such as entities and relations in KBs.
Previous methods either generate logical forms that can be executed over KBs to
obtain final answers or predict answers directly. Empirical results show that
the former often produces more accurate answers, but it suffers from
non-execution issues due to potential syntactic and semantic errors in the
generated logical forms. In this work, we propose a novel framework DecAF that
jointly generates both logical forms and direct answers, and then combines the
merits of them to get the final answers. Moreover, different from most of the
previous methods, DecAF is based on simple free-text retrieval without relying
on any entity linking tools -- this simplification eases its adaptation to
different datasets. DecAF achieves new state-of-the-art accuracy on WebQSP,
FreebaseQA, and GrailQA benchmarks, while getting competitive results on the
ComplexWebQuestions benchmark.
| [
{
"version": "v1",
"created": "Fri, 30 Sep 2022 19:51:52 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 22:34:26 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Yu",
"Donghan",
""
],
[
"Zhang",
"Sheng",
""
],
[
"Ng",
"Patrick",
""
],
[
"Zhu",
"Henghui",
""
],
[
"Li",
"Alexander Hanbo",
""
],
[
"Wang",
"Jun",
""
],
[
"Hu",
"Yiqun",
""
],
[
"Wang",
"William",
""
],
[
"Wang",
"Zhiguo",
""
],
[
"Xiang",
"Bing",
""
]
] | TITLE: DecAF: Joint Decoding of Answers and Logical Forms for Question
Answering over Knowledge Bases
ABSTRACT: Question answering over knowledge bases (KBs) aims to answer natural language
questions with factual information such as entities and relations in KBs.
Previous methods either generate logical forms that can be executed over KBs to
obtain final answers or predict answers directly. Empirical results show that
the former often produces more accurate answers, but it suffers from
non-execution issues due to potential syntactic and semantic errors in the
generated logical forms. In this work, we propose a novel framework DecAF that
jointly generates both logical forms and direct answers, and then combines the
merits of them to get the final answers. Moreover, different from most of the
previous methods, DecAF is based on simple free-text retrieval without relying
on any entity linking tools -- this simplification eases its adaptation to
different datasets. DecAF achieves new state-of-the-art accuracy on WebQSP,
FreebaseQA, and GrailQA benchmarks, while getting competitive results on the
ComplexWebQuestions benchmark.
| no_new_dataset | 0.710189 |
2210.03112 | Aishwarya Kamath | Aishwarya Kamath, Peter Anderson, Su Wang, Jing Yu Koh, Alexander Ku,
Austin Waters, Yinfei Yang, Jason Baldridge and Zarana Parekh | A New Path: Scaling Vision-and-Language Navigation with Synthetic
Instructions and Imitation Learning | CVPR 2023 | null | null | null | cs.LG cs.CL cs.CV cs.RO | http://creativecommons.org/licenses/by/4.0/ | Recent studies in Vision-and-Language Navigation (VLN) train RL agents to
execute natural-language navigation instructions in photorealistic
environments, as a step towards robots that can follow human instructions.
However, given the scarcity of human instruction data and limited diversity in
the training environments, these agents still struggle with complex language
grounding and spatial language understanding. Pretraining on large text and
image-text datasets from the web has been extensively explored but the
improvements are limited. We investigate large-scale augmentation with
synthetic instructions. We take 500+ indoor environments captured in
densely-sampled 360 degree panoramas, construct navigation trajectories through
these panoramas, and generate a visually-grounded instruction for each
trajectory using Marky, a high-quality multilingual navigation instruction
generator. We also synthesize image observations from novel viewpoints using an
image-to-image GAN. The resulting dataset of 4.2M instruction-trajectory pairs
is two orders of magnitude larger than existing human-annotated datasets, and
contains a wider variety of environments and viewpoints. To efficiently
leverage data at this scale, we train a simple transformer agent with imitation
learning. On the challenging RxR dataset, our approach outperforms all existing
RL agents, improving the state-of-the-art NDTW from 71.1 to 79.1 in seen
environments, and from 64.6 to 66.8 in unseen test environments. Our work
points to a new path to improving instruction-following agents, emphasizing
large-scale imitation learning and the development of synthetic instruction
generation capabilities.
| [
{
"version": "v1",
"created": "Thu, 6 Oct 2022 17:59:08 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Dec 2022 00:57:11 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Apr 2023 11:17:35 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kamath",
"Aishwarya",
""
],
[
"Anderson",
"Peter",
""
],
[
"Wang",
"Su",
""
],
[
"Koh",
"Jing Yu",
""
],
[
"Ku",
"Alexander",
""
],
[
"Waters",
"Austin",
""
],
[
"Yang",
"Yinfei",
""
],
[
"Baldridge",
"Jason",
""
],
[
"Parekh",
"Zarana",
""
]
] | TITLE: A New Path: Scaling Vision-and-Language Navigation with Synthetic
Instructions and Imitation Learning
ABSTRACT: Recent studies in Vision-and-Language Navigation (VLN) train RL agents to
execute natural-language navigation instructions in photorealistic
environments, as a step towards robots that can follow human instructions.
However, given the scarcity of human instruction data and limited diversity in
the training environments, these agents still struggle with complex language
grounding and spatial language understanding. Pretraining on large text and
image-text datasets from the web has been extensively explored but the
improvements are limited. We investigate large-scale augmentation with
synthetic instructions. We take 500+ indoor environments captured in
densely-sampled 360 degree panoramas, construct navigation trajectories through
these panoramas, and generate a visually-grounded instruction for each
trajectory using Marky, a high-quality multilingual navigation instruction
generator. We also synthesize image observations from novel viewpoints using an
image-to-image GAN. The resulting dataset of 4.2M instruction-trajectory pairs
is two orders of magnitude larger than existing human-annotated datasets, and
contains a wider variety of environments and viewpoints. To efficiently
leverage data at this scale, we train a simple transformer agent with imitation
learning. On the challenging RxR dataset, our approach outperforms all existing
RL agents, improving the state-of-the-art NDTW from 71.1 to 79.1 in seen
environments, and from 64.6 to 66.8 in unseen test environments. Our work
points to a new path to improving instruction-following agents, emphasizing
large-scale imitation learning and the development of synthetic instruction
generation capabilities.
| new_dataset | 0.602003 |
2210.05301 | Maximilian Stubbemann | Maximilian Stubbemann, Tom Hanika, Friedrich Martin Schneider | Intrinsic Dimension for Large-Scale Geometric Learning | 18 pages, 4 tables, 3 figures. This is the version accepted to TMLR,
see: https://openreview.net/forum?id=85BfDdYMBY | Transactions on Machine Learning Research, 2023 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of dimension is essential to grasp the complexity of data. A
naive approach to determine the dimension of a dataset is based on the number
of attributes. More sophisticated methods derive a notion of intrinsic
dimension (ID) that employs more complex feature functions, e.g., distances
between data points. Yet, many of these approaches are based on empirical
observations, cannot cope with the geometric character of contemporary
datasets, and do lack an axiomatic foundation. A different approach was
proposed by V. Pestov, who links the intrinsic dimension axiomatically to the
mathematical concentration of measure phenomenon. First methods to compute this
and related notions for ID were computationally intractable for large-scale
real-world datasets. In the present work, we derive a computationally feasible
method for determining said axiomatic ID functions. Moreover, we demonstrate
how the geometric properties of complex data are accounted for in our modeling.
In particular, we propose a principle way to incorporate neighborhood
information, as in graph data, into the ID. This allows for new insights into
common graph learning procedures, which we illustrate by experiments on the
Open Graph Benchmark.
| [
{
"version": "v1",
"created": "Tue, 11 Oct 2022 09:50:50 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 11:08:46 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Stubbemann",
"Maximilian",
""
],
[
"Hanika",
"Tom",
""
],
[
"Schneider",
"Friedrich Martin",
""
]
] | TITLE: Intrinsic Dimension for Large-Scale Geometric Learning
ABSTRACT: The concept of dimension is essential to grasp the complexity of data. A
naive approach to determine the dimension of a dataset is based on the number
of attributes. More sophisticated methods derive a notion of intrinsic
dimension (ID) that employs more complex feature functions, e.g., distances
between data points. Yet, many of these approaches are based on empirical
observations, cannot cope with the geometric character of contemporary
datasets, and do lack an axiomatic foundation. A different approach was
proposed by V. Pestov, who links the intrinsic dimension axiomatically to the
mathematical concentration of measure phenomenon. First methods to compute this
and related notions for ID were computationally intractable for large-scale
real-world datasets. In the present work, we derive a computationally feasible
method for determining said axiomatic ID functions. Moreover, we demonstrate
how the geometric properties of complex data are accounted for in our modeling.
In particular, we propose a principle way to incorporate neighborhood
information, as in graph data, into the ID. This allows for new insights into
common graph learning procedures, which we illustrate by experiments on the
Open Graph Benchmark.
| no_new_dataset | 0.708843 |
2210.12922 | Wenhui Chen | Wenhui Chen and Zhijiang Zhang and Liang Yu and Yichun Tai | BARS: A Benchmark for Airport Runway Segmentation | Applied Intelligence 2023 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Airport runway segmentation can effectively reduce the accident rate during
the landing phase, which has the largest risk of flight accidents. With the
rapid development of deep learning (DL), related methods achieve good
performance on segmentation tasks and can be well adapted to complex scenes.
However, the lack of large-scale, publicly available datasets in this field
makes the development of methods based on DL difficult. Therefore, we propose a
benchmark for airport runway segmentation, named BARS. Additionally, a
semiautomatic annotation pipeline is designed to reduce the annotation
workload. BARS has the largest dataset with the richest categories and the only
instance annotation in the field. The dataset, which was collected using the
X-Plane simulation platform, contains 10,256 images and 30,201 instances with
three categories. We evaluate eleven representative instance segmentation
methods on BARS and analyze their performance. Based on the characteristic of
an airport runway with a regular shape, we propose a plug-and-play smoothing
postprocessing module (SPM) and a contour point constraint loss (CPCL) function
to smooth segmentation results for mask-based and contour-based methods,
respectively. Furthermore, a novel evaluation metric named average smoothness
(AS) is developed to measure smoothness. The experiments show that existing
instance segmentation methods can achieve prediction results with good
performance on BARS. SPM and CPCL can effectively enhance the AS metric while
modestly improving accuracy. Our work will be available at
https://github.com/c-wenhui/BARS.
| [
{
"version": "v1",
"created": "Mon, 24 Oct 2022 02:26:05 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Nov 2022 02:19:44 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Apr 2023 16:00:19 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Chen",
"Wenhui",
""
],
[
"Zhang",
"Zhijiang",
""
],
[
"Yu",
"Liang",
""
],
[
"Tai",
"Yichun",
""
]
] | TITLE: BARS: A Benchmark for Airport Runway Segmentation
ABSTRACT: Airport runway segmentation can effectively reduce the accident rate during
the landing phase, which has the largest risk of flight accidents. With the
rapid development of deep learning (DL), related methods achieve good
performance on segmentation tasks and can be well adapted to complex scenes.
However, the lack of large-scale, publicly available datasets in this field
makes the development of methods based on DL difficult. Therefore, we propose a
benchmark for airport runway segmentation, named BARS. Additionally, a
semiautomatic annotation pipeline is designed to reduce the annotation
workload. BARS has the largest dataset with the richest categories and the only
instance annotation in the field. The dataset, which was collected using the
X-Plane simulation platform, contains 10,256 images and 30,201 instances with
three categories. We evaluate eleven representative instance segmentation
methods on BARS and analyze their performance. Based on the characteristic of
an airport runway with a regular shape, we propose a plug-and-play smoothing
postprocessing module (SPM) and a contour point constraint loss (CPCL) function
to smooth segmentation results for mask-based and contour-based methods,
respectively. Furthermore, a novel evaluation metric named average smoothness
(AS) is developed to measure smoothness. The experiments show that existing
instance segmentation methods can achieve prediction results with good
performance on BARS. SPM and CPCL can effectively enhance the AS metric while
modestly improving accuracy. Our work will be available at
https://github.com/c-wenhui/BARS.
| no_new_dataset | 0.693097 |
2210.15997 | Farzan Farnia | Ching Lam Choi, Farzan Farnia | Universal Adversarial Directions | null | null | null | null | cs.LG cs.AI cs.CR stat.ML | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Despite their great success in image recognition tasks, deep neural networks
(DNNs) have been observed to be susceptible to universal adversarial
perturbations (UAPs) which perturb all input samples with a single perturbation
vector. However, UAPs often struggle in transferring across DNN architectures
and lead to challenging optimization problems. In this work, we study the
transferability of UAPs by analyzing equilibrium in the universal adversarial
example game between the classifier and UAP adversary players. We show that
under mild assumptions the universal adversarial example game lacks a pure Nash
equilibrium, indicating UAPs' suboptimal transferability across DNN
classifiers. To address this issue, we propose Universal Adversarial Directions
(UADs) which only fix a universal direction for adversarial perturbations and
allow the perturbations' magnitude to be chosen freely across samples. We prove
that the UAD adversarial example game can possess a Nash equilibrium with a
pure UAD strategy, implying the potential transferability of UADs. We also
connect the UAD optimization problem to the well-known principal component
analysis (PCA) and develop an efficient PCA-based algorithm for optimizing
UADs. We evaluate UADs over multiple benchmark image datasets. Our numerical
results show the superior transferability of UADs over standard gradient-based
UAPs.
| [
{
"version": "v1",
"created": "Fri, 28 Oct 2022 09:03:45 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 16:10:24 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Choi",
"Ching Lam",
""
],
[
"Farnia",
"Farzan",
""
]
] | TITLE: Universal Adversarial Directions
ABSTRACT: Despite their great success in image recognition tasks, deep neural networks
(DNNs) have been observed to be susceptible to universal adversarial
perturbations (UAPs) which perturb all input samples with a single perturbation
vector. However, UAPs often struggle in transferring across DNN architectures
and lead to challenging optimization problems. In this work, we study the
transferability of UAPs by analyzing equilibrium in the universal adversarial
example game between the classifier and UAP adversary players. We show that
under mild assumptions the universal adversarial example game lacks a pure Nash
equilibrium, indicating UAPs' suboptimal transferability across DNN
classifiers. To address this issue, we propose Universal Adversarial Directions
(UADs) which only fix a universal direction for adversarial perturbations and
allow the perturbations' magnitude to be chosen freely across samples. We prove
that the UAD adversarial example game can possess a Nash equilibrium with a
pure UAD strategy, implying the potential transferability of UADs. We also
connect the UAD optimization problem to the well-known principal component
analysis (PCA) and develop an efficient PCA-based algorithm for optimizing
UADs. We evaluate UADs over multiple benchmark image datasets. Our numerical
results show the superior transferability of UADs over standard gradient-based
UAPs.
| no_new_dataset | 0.708824 |
2211.05778 | Wenhai Wang | Wenhai Wang, Jifeng Dai, Zhe Chen, Zhenhang Huang, Zhiqi Li, Xizhou
Zhu, Xiaowei Hu, Tong Lu, Lewei Lu, Hongsheng Li, Xiaogang Wang, Yu Qiao | InternImage: Exploring Large-Scale Vision Foundation Models with
Deformable Convolutions | Accepted to CVPR 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Compared to the great progress of large-scale vision transformers (ViTs) in
recent years, large-scale models based on convolutional neural networks (CNNs)
are still in an early state. This work presents a new large-scale CNN-based
foundation model, termed InternImage, which can obtain the gain from increasing
parameters and training data like ViTs. Different from the recent CNNs that
focus on large dense kernels, InternImage takes deformable convolution as the
core operator, so that our model not only has the large effective receptive
field required for downstream tasks such as detection and segmentation, but
also has the adaptive spatial aggregation conditioned by input and task
information. As a result, the proposed InternImage reduces the strict inductive
bias of traditional CNNs and makes it possible to learn stronger and more
robust patterns with large-scale parameters from massive data like ViTs. The
effectiveness of our model is proven on challenging benchmarks including
ImageNet, COCO, and ADE20K. It is worth mentioning that InternImage-H achieved
a new record 65.4 mAP on COCO test-dev and 62.9 mIoU on ADE20K, outperforming
current leading CNNs and ViTs. The code will be released at
https://github.com/OpenGVLab/InternImage.
| [
{
"version": "v1",
"created": "Thu, 10 Nov 2022 18:59:04 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Nov 2022 09:46:48 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Mar 2023 18:13:33 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Apr 2023 11:51:12 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Wenhai",
""
],
[
"Dai",
"Jifeng",
""
],
[
"Chen",
"Zhe",
""
],
[
"Huang",
"Zhenhang",
""
],
[
"Li",
"Zhiqi",
""
],
[
"Zhu",
"Xizhou",
""
],
[
"Hu",
"Xiaowei",
""
],
[
"Lu",
"Tong",
""
],
[
"Lu",
"Lewei",
""
],
[
"Li",
"Hongsheng",
""
],
[
"Wang",
"Xiaogang",
""
],
[
"Qiao",
"Yu",
""
]
] | TITLE: InternImage: Exploring Large-Scale Vision Foundation Models with
Deformable Convolutions
ABSTRACT: Compared to the great progress of large-scale vision transformers (ViTs) in
recent years, large-scale models based on convolutional neural networks (CNNs)
are still in an early state. This work presents a new large-scale CNN-based
foundation model, termed InternImage, which can obtain the gain from increasing
parameters and training data like ViTs. Different from the recent CNNs that
focus on large dense kernels, InternImage takes deformable convolution as the
core operator, so that our model not only has the large effective receptive
field required for downstream tasks such as detection and segmentation, but
also has the adaptive spatial aggregation conditioned by input and task
information. As a result, the proposed InternImage reduces the strict inductive
bias of traditional CNNs and makes it possible to learn stronger and more
robust patterns with large-scale parameters from massive data like ViTs. The
effectiveness of our model is proven on challenging benchmarks including
ImageNet, COCO, and ADE20K. It is worth mentioning that InternImage-H achieved
a new record 65.4 mAP on COCO test-dev and 62.9 mIoU on ADE20K, outperforming
current leading CNNs and ViTs. The code will be released at
https://github.com/OpenGVLab/InternImage.
| no_new_dataset | 0.710415 |
2211.08367 | Magdalena Fuentes | Rajsuryan Singh, Pablo Zinemanas, Xavier Serra, Juan Pablo Bello,
Magdalena Fuentes | FlowGrad: Using Motion for Visual Sound Source Localization | Accepted in ICASSP 2023 | null | null | null | cs.SD cs.CV cs.MM eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most recent work in visual sound source localization relies on semantic
audio-visual representations learned in a self-supervised manner, and by design
excludes temporal information present in videos. While it proves to be
effective for widely used benchmark datasets, the method falls short for
challenging scenarios like urban traffic. This work introduces temporal context
into the state-of-the-art methods for sound source localization in urban scenes
using optical flow as a means to encode motion information. An analysis of the
strengths and weaknesses of our methods helps us better understand the problem
of visual sound source localization and sheds light on open challenges for
audio-visual scene understanding.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 2022 18:12:10 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 18:14:19 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Singh",
"Rajsuryan",
""
],
[
"Zinemanas",
"Pablo",
""
],
[
"Serra",
"Xavier",
""
],
[
"Bello",
"Juan Pablo",
""
],
[
"Fuentes",
"Magdalena",
""
]
] | TITLE: FlowGrad: Using Motion for Visual Sound Source Localization
ABSTRACT: Most recent work in visual sound source localization relies on semantic
audio-visual representations learned in a self-supervised manner, and by design
excludes temporal information present in videos. While it proves to be
effective for widely used benchmark datasets, the method falls short for
challenging scenarios like urban traffic. This work introduces temporal context
into the state-of-the-art methods for sound source localization in urban scenes
using optical flow as a means to encode motion information. An analysis of the
strengths and weaknesses of our methods helps us better understand the problem
of visual sound source localization and sheds light on open challenges for
audio-visual scene understanding.
| no_new_dataset | 0.71365 |
2211.12703 | Joshua Gardner | Josh Gardner, Zoran Popovi\'c, Ludwig Schmidt | Subgroup Robustness Grows On Trees: An Empirical Baseline Investigation | To appear at Neural Information Processing Systems (NeurIPS) 2022.
Code at https://github.com/jpgard/subgroup-robustness-grows-on-trees | null | null | null | cs.LG cs.CY | http://creativecommons.org/licenses/by/4.0/ | Researchers have proposed many methods for fair and robust machine learning,
but comprehensive empirical evaluation of their subgroup robustness is lacking.
In this work, we address this gap in the context of tabular data, where
sensitive subgroups are clearly-defined, real-world fairness problems abound,
and prior works often do not compare to state-of-the-art tree-based models as
baselines. We conduct an empirical comparison of several previously-proposed
methods for fair and robust learning alongside state-of-the-art tree-based
methods and other baselines. Via experiments with more than $340{,}000$ model
configurations on eight datasets, we show that tree-based methods have strong
subgroup robustness, even when compared to robustness- and fairness-enhancing
methods. Moreover, the best tree-based models tend to show good performance
over a range of metrics, while robust or group-fair models can show
brittleness, with significant performance differences across different metrics
for a fixed model. We also demonstrate that tree-based models show less
sensitivity to hyperparameter configurations, and are less costly to train. Our
work suggests that tree-based ensemble models make an effective baseline for
tabular data, and are a sensible default when subgroup robustness is desired.
For associated code and detailed results, see
https://github.com/jpgard/subgroup-robustness-grows-on-trees .
| [
{
"version": "v1",
"created": "Wed, 23 Nov 2022 04:49:18 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 15:54:03 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Gardner",
"Josh",
""
],
[
"Popović",
"Zoran",
""
],
[
"Schmidt",
"Ludwig",
""
]
] | TITLE: Subgroup Robustness Grows On Trees: An Empirical Baseline Investigation
ABSTRACT: Researchers have proposed many methods for fair and robust machine learning,
but comprehensive empirical evaluation of their subgroup robustness is lacking.
In this work, we address this gap in the context of tabular data, where
sensitive subgroups are clearly-defined, real-world fairness problems abound,
and prior works often do not compare to state-of-the-art tree-based models as
baselines. We conduct an empirical comparison of several previously-proposed
methods for fair and robust learning alongside state-of-the-art tree-based
methods and other baselines. Via experiments with more than $340{,}000$ model
configurations on eight datasets, we show that tree-based methods have strong
subgroup robustness, even when compared to robustness- and fairness-enhancing
methods. Moreover, the best tree-based models tend to show good performance
over a range of metrics, while robust or group-fair models can show
brittleness, with significant performance differences across different metrics
for a fixed model. We also demonstrate that tree-based models show less
sensitivity to hyperparameter configurations, and are less costly to train. Our
work suggests that tree-based ensemble models make an effective baseline for
tabular data, and are a sensible default when subgroup robustness is desired.
For associated code and detailed results, see
https://github.com/jpgard/subgroup-robustness-grows-on-trees .
| no_new_dataset | 0.709837 |
2212.06152 | Zhang Lei | Lei Zhang, Jie Zhang, Bowen Lei, Subhabrata Mukherjee, Xiang Pan, Bo
Zhao, Caiwen Ding, Yao Li, Dongkuan Xu | Accelerating Dataset Distillation via Model Augmentation | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dataset Distillation (DD), a newly emerging field, aims at generating much
smaller but efficient synthetic training datasets from large ones. Existing DD
methods based on gradient matching achieve leading performance; however, they
are extremely computationally intensive as they require continuously optimizing
a dataset among thousands of randomly initialized models. In this paper, we
assume that training the synthetic data with diverse models leads to better
generalization performance. Thus we propose two model augmentation techniques,
i.e. using early-stage models and parameter perturbation to learn an
informative synthetic set with significantly reduced training cost. Extensive
experiments demonstrate that our method achieves up to 20x speedup and
comparable performance on par with state-of-the-art methods.
| [
{
"version": "v1",
"created": "Mon, 12 Dec 2022 07:36:05 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 15:58:53 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zhang",
"Lei",
""
],
[
"Zhang",
"Jie",
""
],
[
"Lei",
"Bowen",
""
],
[
"Mukherjee",
"Subhabrata",
""
],
[
"Pan",
"Xiang",
""
],
[
"Zhao",
"Bo",
""
],
[
"Ding",
"Caiwen",
""
],
[
"Li",
"Yao",
""
],
[
"Xu",
"Dongkuan",
""
]
] | TITLE: Accelerating Dataset Distillation via Model Augmentation
ABSTRACT: Dataset Distillation (DD), a newly emerging field, aims at generating much
smaller but efficient synthetic training datasets from large ones. Existing DD
methods based on gradient matching achieve leading performance; however, they
are extremely computationally intensive as they require continuously optimizing
a dataset among thousands of randomly initialized models. In this paper, we
assume that training the synthetic data with diverse models leads to better
generalization performance. Thus we propose two model augmentation techniques,
i.e. using early-stage models and parameter perturbation to learn an
informative synthetic set with significantly reduced training cost. Extensive
experiments demonstrate that our method achieves up to 20x speedup and
comparable performance on par with state-of-the-art methods.
| no_new_dataset | 0.710377 |
2212.08356 | Junha Song | Junha Song, Kwanyong Park, InKyu Shin, Sanghyun Woo, Chaoning Zhang,
and In So Kweon | Test-time Adaptation in the Dynamic World with Compound Domain Knowledge
Management | 8 pages | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Prior to the deployment of robotic systems, pre-training the deep-recognition
models on all potential visual cases is infeasible in practice. Hence,
test-time adaptation (TTA) allows the model to adapt itself to novel
environments and improve its performance during test time (i.e., lifelong
adaptation). Several works for TTA have shown promising adaptation performances
in continuously changing environments. However, our investigation reveals that
existing methods are vulnerable to dynamic distributional changes and often
lead to overfitting of TTA models. To address this problem, this paper first
presents a robust TTA framework with compound domain knowledge management. Our
framework helps the TTA model to harvest the knowledge of multiple
representative domains (i.e., compound domain) and conduct the TTA based on the
compound domain knowledge. In addition, to prevent overfitting of the TTA
model, we devise novel regularization which modulates the adaptation rates
using domain-similarity between the source and the current target domain. With
the synergy of the proposed framework and regularization, we achieve consistent
performance improvements in diverse TTA scenarios, especially on dynamic domain
shifts. We demonstrate the generality of proposals via extensive experiments
including image classification on ImageNet-C and semantic segmentation on GTA5,
C-driving, and corrupted Cityscapes datasets.
| [
{
"version": "v1",
"created": "Fri, 16 Dec 2022 09:02:01 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2023 15:07:46 GMT"
},
{
"version": "v3",
"created": "Sat, 15 Apr 2023 04:03:04 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Song",
"Junha",
""
],
[
"Park",
"Kwanyong",
""
],
[
"Shin",
"InKyu",
""
],
[
"Woo",
"Sanghyun",
""
],
[
"Zhang",
"Chaoning",
""
],
[
"Kweon",
"In So",
""
]
] | TITLE: Test-time Adaptation in the Dynamic World with Compound Domain Knowledge
Management
ABSTRACT: Prior to the deployment of robotic systems, pre-training the deep-recognition
models on all potential visual cases is infeasible in practice. Hence,
test-time adaptation (TTA) allows the model to adapt itself to novel
environments and improve its performance during test time (i.e., lifelong
adaptation). Several works for TTA have shown promising adaptation performances
in continuously changing environments. However, our investigation reveals that
existing methods are vulnerable to dynamic distributional changes and often
lead to overfitting of TTA models. To address this problem, this paper first
presents a robust TTA framework with compound domain knowledge management. Our
framework helps the TTA model to harvest the knowledge of multiple
representative domains (i.e., compound domain) and conduct the TTA based on the
compound domain knowledge. In addition, to prevent overfitting of the TTA
model, we devise novel regularization which modulates the adaptation rates
using domain-similarity between the source and the current target domain. With
the synergy of the proposed framework and regularization, we achieve consistent
performance improvements in diverse TTA scenarios, especially on dynamic domain
shifts. We demonstrate the generality of proposals via extensive experiments
including image classification on ImageNet-C and semantic segmentation on GTA5,
C-driving, and corrupted Cityscapes datasets.
| no_new_dataset | 0.709648 |
2212.10108 | Philipp Hofer | Philipp Hofer, Michael Roland, Philipp Schwarz, Ren\'e Mayrhofer | Efficient aggregation of face embeddings for decentralized face
recognition deployments (extended version) | null | Advances in Artificial Intelligence and Machine Learning 3(1), pp.
693-711, 2023 | 10.54364/AAIML.2023.1146 | null | cs.CR cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biometrics are one of the most privacy-sensitive data. Ubiquitous
authentication systems with a focus on privacy favor decentralized approaches
as they reduce potential attack vectors, both on a technical and organizational
level. The gold standard is to let the user be in control of where their own
data is stored, which consequently leads to a high variety of devices used.
Moreover, in comparison with a centralized system, designs with higher end-user
freedom often incur additional network overhead. Therefore, when using face
recognition for biometric authentication, an efficient way to compare faces is
important in practical deployments, because it reduces both network and
hardware requirements that are essential to encourage device diversity. This
paper proposes an efficient way to aggregate embeddings used for face
recognition based on an extensive analysis on different datasets and the use of
different aggregation strategies. As part of this analysis, a new dataset has
been collected, which is available for research purposes. Our proposed method
supports the construction of massively scalable, decentralized face recognition
systems with a focus on both privacy and long-term usability.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2022 09:28:25 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 13:16:50 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Hofer",
"Philipp",
""
],
[
"Roland",
"Michael",
""
],
[
"Schwarz",
"Philipp",
""
],
[
"Mayrhofer",
"René",
""
]
] | TITLE: Efficient aggregation of face embeddings for decentralized face
recognition deployments (extended version)
ABSTRACT: Biometrics are one of the most privacy-sensitive data. Ubiquitous
authentication systems with a focus on privacy favor decentralized approaches
as they reduce potential attack vectors, both on a technical and organizational
level. The gold standard is to let the user be in control of where their own
data is stored, which consequently leads to a high variety of devices used.
Moreover, in comparison with a centralized system, designs with higher end-user
freedom often incur additional network overhead. Therefore, when using face
recognition for biometric authentication, an efficient way to compare faces is
important in practical deployments, because it reduces both network and
hardware requirements that are essential to encourage device diversity. This
paper proposes an efficient way to aggregate embeddings used for face
recognition based on an extensive analysis on different datasets and the use of
different aggregation strategies. As part of this analysis, a new dataset has
been collected, which is available for research purposes. Our proposed method
supports the construction of massively scalable, decentralized face recognition
systems with a focus on both privacy and long-term usability.
| new_dataset | 0.713675 |
2212.13326 | Andrew Melnik | Federico Malato, Florian Leopold, Amogh Raut, Ville Hautam\"aki,
Andrew Melnik | Behavioral Cloning via Search in Video PreTraining Latent Space | null | null | null | null | cs.LG cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Our aim is to build autonomous agents that can solve tasks in environments
like Minecraft. To do so, we used an imitation learning-based approach. We
formulate our control problem as a search problem over a dataset of experts'
demonstrations, where the agent copies actions from a similar demonstration
trajectory of image-action pairs. We perform a proximity search over the BASALT
MineRL-dataset in the latent representation of a Video PreTraining model. The
agent copies the actions from the expert trajectory as long as the distance
between the state representations of the agent and the selected expert
trajectory from the dataset do not diverge. Then the proximity search is
repeated. Our approach can effectively recover meaningful demonstration
trajectories and show human-like behavior of an agent in the Minecraft
environment.
| [
{
"version": "v1",
"created": "Tue, 27 Dec 2022 00:20:37 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 05:38:15 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Malato",
"Federico",
""
],
[
"Leopold",
"Florian",
""
],
[
"Raut",
"Amogh",
""
],
[
"Hautamäki",
"Ville",
""
],
[
"Melnik",
"Andrew",
""
]
] | TITLE: Behavioral Cloning via Search in Video PreTraining Latent Space
ABSTRACT: Our aim is to build autonomous agents that can solve tasks in environments
like Minecraft. To do so, we used an imitation learning-based approach. We
formulate our control problem as a search problem over a dataset of experts'
demonstrations, where the agent copies actions from a similar demonstration
trajectory of image-action pairs. We perform a proximity search over the BASALT
MineRL-dataset in the latent representation of a Video PreTraining model. The
agent copies the actions from the expert trajectory as long as the distance
between the state representations of the agent and the selected expert
trajectory from the dataset do not diverge. Then the proximity search is
repeated. Our approach can effectively recover meaningful demonstration
trajectories and show human-like behavior of an agent in the Minecraft
environment.
| no_new_dataset | 0.711387 |
2301.01405 | Cuong Nguyen | Cuong Nguyen, Thanh-Toan Do, Gustavo Carneiro | Towards the Identifiability in Noisy Label Learning: A Multinomial
Mixture Approach | Clarify further the motivation, finding results and the method
proposed | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Learning from noisy labels (LNL) plays a crucial role in deep learning. The
most promising LNL methods rely on identifying clean-label samples from a
dataset with noisy annotations. Such an identification is challenging because
the conventional LNL problem, which assumes a single noisy label per instance,
is non-identifiable, i.e., clean labels cannot be estimated theoretically
without additional heuristics. In this paper, we aim to formally investigate
this identifiability issue using multinomial mixture models to determine the
constraints that make the problem identifiable. Specifically, we discover that
the LNL problem becomes identifiable if there are at least $2C - 1$ noisy
labels per instance, where $C$ is the number of classes. To meet this
requirement without relying on additional $2C - 2$ manual annotations per
instance, we propose a method that automatically generates additional noisy
labels by estimating the noisy label distribution based on nearest neighbours.
These additional noisy labels enable us to apply the Expectation-Maximisation
algorithm to estimate the posterior probabilities of clean labels, which are
then used to train the model of interest. We empirically demonstrate that our
proposed method is capable of estimating clean labels without any heuristics in
several label noise benchmarks, including synthetic, web-controlled, and
real-world label noises. Furthermore, our method performs competitively with
many state-of-the-art methods.
| [
{
"version": "v1",
"created": "Wed, 4 Jan 2023 01:54:33 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 07:48:11 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Nguyen",
"Cuong",
""
],
[
"Do",
"Thanh-Toan",
""
],
[
"Carneiro",
"Gustavo",
""
]
] | TITLE: Towards the Identifiability in Noisy Label Learning: A Multinomial
Mixture Approach
ABSTRACT: Learning from noisy labels (LNL) plays a crucial role in deep learning. The
most promising LNL methods rely on identifying clean-label samples from a
dataset with noisy annotations. Such an identification is challenging because
the conventional LNL problem, which assumes a single noisy label per instance,
is non-identifiable, i.e., clean labels cannot be estimated theoretically
without additional heuristics. In this paper, we aim to formally investigate
this identifiability issue using multinomial mixture models to determine the
constraints that make the problem identifiable. Specifically, we discover that
the LNL problem becomes identifiable if there are at least $2C - 1$ noisy
labels per instance, where $C$ is the number of classes. To meet this
requirement without relying on additional $2C - 2$ manual annotations per
instance, we propose a method that automatically generates additional noisy
labels by estimating the noisy label distribution based on nearest neighbours.
These additional noisy labels enable us to apply the Expectation-Maximisation
algorithm to estimate the posterior probabilities of clean labels, which are
then used to train the model of interest. We empirically demonstrate that our
proposed method is capable of estimating clean labels without any heuristics in
several label noise benchmarks, including synthetic, web-controlled, and
real-world label noises. Furthermore, our method performs competitively with
many state-of-the-art methods.
| no_new_dataset | 0.706431 |
2301.03663 | Tuomas Takko M.Sc. | Tuomas Takko, Kunal Bhattacharya and Kimmo Kaski | Modelling exposure between populations using networks of mobility during
Covid-19 | Supplementary information appended to manuscript. Contents: 15+3
pages, 5+3 figures, 2+1 tables. Submitted to Frontiers in Physics, Social
Physics | null | null | null | physics.soc-ph cs.SI | http://creativecommons.org/licenses/by/4.0/ | The use of mobile phone call detail records and device location data for the
calling patterns, movements, and social contacts of individuals, has proven to
be valuable for devising models and understanding of their mobility and
behaviour patterns. In this study we investigate weighted exposure-networks of
human daily activities in the capital region of Finland as a proxy for contacts
between postal code areas during the pre-pandemic year 2019 and pandemic years
2020, 2021 and early 2022. We investigate the suitability of gravity and
radiation type models for reconstructing the exposure-networks based on
geo-spatial and population mobility information. For this we use a mobile phone
dataset of aggregated daily visits from a postal code area to cellphone grid
locations, and treat it as a bipartite network to create weighted one mode
projections using a weighted co-occurrence function. We fit a gravitation model
and a radiation model to the averaged weekly and yearly projection networks
with geo-spatial and socioeconomic variables of the postal code areas and their
populations. We also consider an extended gravity type model comprising of
additional postal area information such as distance via public transportation
and population density. The results show that the co-occurrence of human
activities, or exposure, between postal code areas follows both the gravity and
radiation type interactions, once fitted to the empirical network. The effects
of the pandemic beginning in 2020 can be observed as a decrease of the overall
activity as well as of the exposure of the projected networks. In general, the
results show that the postal code level networks changed to be more proximity
weighted after the pandemic began, following the government imposed
non-pharmaceutical interventions, with differences based on the geo-spatial and
socioeconomic structure of the areas.
| [
{
"version": "v1",
"created": "Mon, 9 Jan 2023 20:15:54 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 08:32:47 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Takko",
"Tuomas",
""
],
[
"Bhattacharya",
"Kunal",
""
],
[
"Kaski",
"Kimmo",
""
]
] | TITLE: Modelling exposure between populations using networks of mobility during
Covid-19
ABSTRACT: The use of mobile phone call detail records and device location data for the
calling patterns, movements, and social contacts of individuals, has proven to
be valuable for devising models and understanding of their mobility and
behaviour patterns. In this study we investigate weighted exposure-networks of
human daily activities in the capital region of Finland as a proxy for contacts
between postal code areas during the pre-pandemic year 2019 and pandemic years
2020, 2021 and early 2022. We investigate the suitability of gravity and
radiation type models for reconstructing the exposure-networks based on
geo-spatial and population mobility information. For this we use a mobile phone
dataset of aggregated daily visits from a postal code area to cellphone grid
locations, and treat it as a bipartite network to create weighted one mode
projections using a weighted co-occurrence function. We fit a gravitation model
and a radiation model to the averaged weekly and yearly projection networks
with geo-spatial and socioeconomic variables of the postal code areas and their
populations. We also consider an extended gravity type model comprising of
additional postal area information such as distance via public transportation
and population density. The results show that the co-occurrence of human
activities, or exposure, between postal code areas follows both the gravity and
radiation type interactions, once fitted to the empirical network. The effects
of the pandemic beginning in 2020 can be observed as a decrease of the overall
activity as well as of the exposure of the projected networks. In general, the
results show that the postal code level networks changed to be more proximity
weighted after the pandemic began, following the government imposed
non-pharmaceutical interventions, with differences based on the geo-spatial and
socioeconomic structure of the areas.
| no_new_dataset | 0.710051 |
2301.06660 | Yida Mu | Yida Mu, Mali Jin, Charlie Grimshaw, Carolina Scarton, Kalina
Bontcheva, Xingyi Song | VaxxHesitancy: A Dataset for Studying Hesitancy towards COVID-19
Vaccination on Twitter | Accepted at ICWSM 2023 | null | null | null | cs.CL | http://creativecommons.org/publicdomain/zero/1.0/ | Vaccine hesitancy has been a common concern, probably since vaccines were
created and, with the popularisation of social media, people started to express
their concerns about vaccines online alongside those posting pro- and
anti-vaccine content. Predictably, since the first mentions of a COVID-19
vaccine, social media users posted about their fears and concerns or about
their support and belief into the effectiveness of these rapidly developing
vaccines. Identifying and understanding the reasons behind public hesitancy
towards COVID-19 vaccines is important for policy markers that need to develop
actions to better inform the population with the aim of increasing vaccine
take-up. In the case of COVID-19, where the fast development of the vaccines
was mirrored closely by growth in anti-vaxx disinformation, automatic means of
detecting citizen attitudes towards vaccination became necessary. This is an
important computational social sciences task that requires data analysis in
order to gain in-depth understanding of the phenomena at hand. Annotated data
is also necessary for training data-driven models for more nuanced analysis of
attitudes towards vaccination. To this end, we created a new collection of over
3,101 tweets annotated with users' attitudes towards COVID-19 vaccination
(stance). Besides, we also develop a domain-specific language model (VaxxBERT)
that achieves the best predictive performance (73.0 accuracy and 69.3 F1-score)
as compared to a robust set of baselines. To the best of our knowledge, these
are the first dataset and model that model vaccine hesitancy as a category
distinct from pro- and anti-vaccine stance.
| [
{
"version": "v1",
"created": "Tue, 17 Jan 2023 02:00:31 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Feb 2023 03:28:03 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Apr 2023 18:58:33 GMT"
},
{
"version": "v4",
"created": "Sat, 15 Apr 2023 15:32:43 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Mu",
"Yida",
""
],
[
"Jin",
"Mali",
""
],
[
"Grimshaw",
"Charlie",
""
],
[
"Scarton",
"Carolina",
""
],
[
"Bontcheva",
"Kalina",
""
],
[
"Song",
"Xingyi",
""
]
] | TITLE: VaxxHesitancy: A Dataset for Studying Hesitancy towards COVID-19
Vaccination on Twitter
ABSTRACT: Vaccine hesitancy has been a common concern, probably since vaccines were
created and, with the popularisation of social media, people started to express
their concerns about vaccines online alongside those posting pro- and
anti-vaccine content. Predictably, since the first mentions of a COVID-19
vaccine, social media users posted about their fears and concerns or about
their support and belief into the effectiveness of these rapidly developing
vaccines. Identifying and understanding the reasons behind public hesitancy
towards COVID-19 vaccines is important for policy markers that need to develop
actions to better inform the population with the aim of increasing vaccine
take-up. In the case of COVID-19, where the fast development of the vaccines
was mirrored closely by growth in anti-vaxx disinformation, automatic means of
detecting citizen attitudes towards vaccination became necessary. This is an
important computational social sciences task that requires data analysis in
order to gain in-depth understanding of the phenomena at hand. Annotated data
is also necessary for training data-driven models for more nuanced analysis of
attitudes towards vaccination. To this end, we created a new collection of over
3,101 tweets annotated with users' attitudes towards COVID-19 vaccination
(stance). Besides, we also develop a domain-specific language model (VaxxBERT)
that achieves the best predictive performance (73.0 accuracy and 69.3 F1-score)
as compared to a robust set of baselines. To the best of our knowledge, these
are the first dataset and model that model vaccine hesitancy as a category
distinct from pro- and anti-vaccine stance.
| no_new_dataset | 0.53443 |
2301.10872 | Abu Reyan Ahmed | Reyan Ahmed, Patrizio Angelini, Michael A. Bekos, Giuseppe Di
Battista, Michael Kaufmann, Philipp Kindermann, Stephen Kobourov, Martin
N\"ollenburg, Antonios Symvonis, Ana\"is Villedieu, Markus Wallinger | Splitting Vertices in 2-Layer Graph Drawings | null | null | null | null | cs.CG | http://creativecommons.org/licenses/by/4.0/ | Bipartite graphs model the relationships between two disjoint sets of
entities in several applications and are naturally drawn as 2-layer graph
drawings. In such drawings, the two sets of entities (vertices) are placed on
two parallel lines (layers), and their relationships (edges) are represented by
segments connecting vertices. Methods for constructing 2-layer drawings often
try to minimize the number of edge crossings. We use vertex splitting to reduce
the number of crossings, by replacing selected vertices on one layer by two (or
more) copies and suitably distributing their incident edges among these copies.
We study several optimization problems related to vertex splitting, either
minimizing the number of crossings or removing all crossings with fewest
splits. While we prove that some variants are \NP-complete, we obtain
polynomial-time algorithms for others. We run our algorithms on a benchmark set
of bipartite graphs representing the relationships between human anatomical
structures and cell types.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2023 23:36:28 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 14:26:19 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Ahmed",
"Reyan",
""
],
[
"Angelini",
"Patrizio",
""
],
[
"Bekos",
"Michael A.",
""
],
[
"Di Battista",
"Giuseppe",
""
],
[
"Kaufmann",
"Michael",
""
],
[
"Kindermann",
"Philipp",
""
],
[
"Kobourov",
"Stephen",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Symvonis",
"Antonios",
""
],
[
"Villedieu",
"Anaïs",
""
],
[
"Wallinger",
"Markus",
""
]
] | TITLE: Splitting Vertices in 2-Layer Graph Drawings
ABSTRACT: Bipartite graphs model the relationships between two disjoint sets of
entities in several applications and are naturally drawn as 2-layer graph
drawings. In such drawings, the two sets of entities (vertices) are placed on
two parallel lines (layers), and their relationships (edges) are represented by
segments connecting vertices. Methods for constructing 2-layer drawings often
try to minimize the number of edge crossings. We use vertex splitting to reduce
the number of crossings, by replacing selected vertices on one layer by two (or
more) copies and suitably distributing their incident edges among these copies.
We study several optimization problems related to vertex splitting, either
minimizing the number of crossings or removing all crossings with fewest
splits. While we prove that some variants are \NP-complete, we obtain
polynomial-time algorithms for others. We run our algorithms on a benchmark set
of bipartite graphs representing the relationships between human anatomical
structures and cell types.
| no_new_dataset | 0.710666 |
2302.00947 | Bowen Tang | Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie,
Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang | SPECWANDS: An Efficient Priority-based Scheduler Against Speculation
Contention Attacks | null | null | null | null | cs.CR cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Transient Execution Attacks (TEAs) have gradually become a major security
threat to modern high-performance processors. They exploit the vulnerability of
speculative execution to illegally access private data, and transmit them
through timing-based covert channels. While new vulnerabilities are discovered
continuously, the covert channels can be categorised to two types: 1)
Persistent Type, in which covert channels are based on the layout changes of
buffering, e.g. through caches or TLBs; 2) Volatile Type, in which covert
channels are based on the contention of sharing resources, e.g. through
execution units or issuing ports. The defenses against the persistent-type
covert channels have been well addressed, while those for the volatile-type are
still rather inadequate. Existing mitigation schemes for the volatile type such
as Speculative Compression and Time-Division-Multiplexing will introduce
significant overhead due to the need to stall the pipeline or to disallow
resource sharing. In this paper, we look into such attacks and defenses with a
new perspective, and propose a scheduling-based mitigation scheme, called
SPECWANDS. It consists of three priority-based scheduling policies to prevent
an attacker from transmitting the secret in different contention situations.
SPECWANDS not only can defend against both inter-thread and intra-thread based
attacks, but also can keep most of the performance benefit from speculative
execution and resource-sharing. We evaluate its runtime overhead on SPEC 2017
benchmarks and realistic programs. The experimental results show that SPECWANDS
has a significant performance advantage over the other two representative
schemes.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2023 08:37:32 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 09:13:12 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Tang",
"Bowen",
""
],
[
"Wu",
"Chenggang",
""
],
[
"Yew",
"Pen-Chung",
""
],
[
"Zhang",
"Yinqian",
""
],
[
"Xie",
"Mengyao",
""
],
[
"Lai",
"Yuanming",
""
],
[
"Kang",
"Yan",
""
],
[
"Wang",
"Wei",
""
],
[
"Wei",
"Qiang",
""
],
[
"Wang",
"Zhe",
""
]
] | TITLE: SPECWANDS: An Efficient Priority-based Scheduler Against Speculation
Contention Attacks
ABSTRACT: Transient Execution Attacks (TEAs) have gradually become a major security
threat to modern high-performance processors. They exploit the vulnerability of
speculative execution to illegally access private data, and transmit them
through timing-based covert channels. While new vulnerabilities are discovered
continuously, the covert channels can be categorised to two types: 1)
Persistent Type, in which covert channels are based on the layout changes of
buffering, e.g. through caches or TLBs; 2) Volatile Type, in which covert
channels are based on the contention of sharing resources, e.g. through
execution units or issuing ports. The defenses against the persistent-type
covert channels have been well addressed, while those for the volatile-type are
still rather inadequate. Existing mitigation schemes for the volatile type such
as Speculative Compression and Time-Division-Multiplexing will introduce
significant overhead due to the need to stall the pipeline or to disallow
resource sharing. In this paper, we look into such attacks and defenses with a
new perspective, and propose a scheduling-based mitigation scheme, called
SPECWANDS. It consists of three priority-based scheduling policies to prevent
an attacker from transmitting the secret in different contention situations.
SPECWANDS not only can defend against both inter-thread and intra-thread based
attacks, but also can keep most of the performance benefit from speculative
execution and resource-sharing. We evaluate its runtime overhead on SPEC 2017
benchmarks and realistic programs. The experimental results show that SPECWANDS
has a significant performance advantage over the other two representative
schemes.
| no_new_dataset | 0.704986 |
2302.01857 | Nan Jiang | Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, and
Xiangyu Zhang | KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program
Repair | This paper is accepted by 2023 IEEE/ACM 45th International Conference
on Software Engineering (ICSE) | null | null | null | cs.SE cs.AI | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Automated Program Repair (APR) improves software reliability by generating
patches for a buggy program automatically. Recent APR techniques leverage deep
learning (DL) to build models to learn to generate patches from existing
patches and code corpora. While promising, DL-based APR techniques suffer from
the abundant syntactically or semantically incorrect patches in the patch
space. These patches often disobey the syntactic and semantic domain knowledge
of source code and thus cannot be the correct patches to fix a bug.
We propose a DL-based APR approach KNOD, which incorporates domain knowledge
to guide patch generation in a direct and comprehensive way. KNOD has two major
novelties, including (1) a novel three-stage tree decoder, which directly
generates Abstract Syntax Trees of patched code according to the inherent tree
structure, and (2) a novel domain-rule distillation, which leverages syntactic
and semantic rules and teacher-student distributions to explicitly inject the
domain knowledge into the decoding procedure during both the training and
inference phases.
We evaluate KNOD on three widely-used benchmarks. KNOD fixes 72 bugs on the
Defects4J v1.2, 25 bugs on the QuixBugs, and 50 bugs on the additional
Defects4J v2.0 benchmarks, outperforming all existing APR tools.
| [
{
"version": "v1",
"created": "Fri, 3 Feb 2023 17:02:56 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Feb 2023 07:43:51 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Apr 2023 20:29:38 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Jiang",
"Nan",
""
],
[
"Lutellier",
"Thibaud",
""
],
[
"Lou",
"Yiling",
""
],
[
"Tan",
"Lin",
""
],
[
"Goldwasser",
"Dan",
""
],
[
"Zhang",
"Xiangyu",
""
]
] | TITLE: KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program
Repair
ABSTRACT: Automated Program Repair (APR) improves software reliability by generating
patches for a buggy program automatically. Recent APR techniques leverage deep
learning (DL) to build models to learn to generate patches from existing
patches and code corpora. While promising, DL-based APR techniques suffer from
the abundant syntactically or semantically incorrect patches in the patch
space. These patches often disobey the syntactic and semantic domain knowledge
of source code and thus cannot be the correct patches to fix a bug.
We propose a DL-based APR approach KNOD, which incorporates domain knowledge
to guide patch generation in a direct and comprehensive way. KNOD has two major
novelties, including (1) a novel three-stage tree decoder, which directly
generates Abstract Syntax Trees of patched code according to the inherent tree
structure, and (2) a novel domain-rule distillation, which leverages syntactic
and semantic rules and teacher-student distributions to explicitly inject the
domain knowledge into the decoding procedure during both the training and
inference phases.
We evaluate KNOD on three widely-used benchmarks. KNOD fixes 72 bugs on the
Defects4J v1.2, 25 bugs on the QuixBugs, and 50 bugs on the additional
Defects4J v2.0 benchmarks, outperforming all existing APR tools.
| no_new_dataset | 0.709655 |
2302.03015 | Yuancheng Xu | Yuancheng Xu, Yanchao Sun, Micah Goldblum, Tom Goldstein, Furong Huang | Exploring and Exploiting Decision Boundary Dynamics for Adversarial
Robustness | Published at International Conference on Learning Representations
(ICLR) 2023 | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The robustness of a deep classifier can be characterized by its margins: the
decision boundary's distances to natural data points. However, it is unclear
whether existing robust training methods effectively increase the margin for
each vulnerable point during training. To understand this, we propose a
continuous-time framework for quantifying the relative speed of the decision
boundary with respect to each individual point. Through visualizing the moving
speed of the decision boundary under Adversarial Training, one of the most
effective robust training algorithms, a surprising moving-behavior is revealed:
the decision boundary moves away from some vulnerable points but simultaneously
moves closer to others, decreasing their margins. To alleviate these
conflicting dynamics of the decision boundary, we propose Dynamics-aware Robust
Training (DyART), which encourages the decision boundary to engage in movement
that prioritizes increasing smaller margins. In contrast to prior works, DyART
directly operates on the margins rather than their indirect approximations,
allowing for more targeted and effective robustness improvement. Experiments on
the CIFAR-10 and Tiny-ImageNet datasets verify that DyART alleviates the
conflicting dynamics of the decision boundary and obtains improved robustness
under various perturbation sizes compared to the state-of-the-art defenses. Our
code is available at
https://github.com/Yuancheng-Xu/Dynamics-Aware-Robust-Training.
| [
{
"version": "v1",
"created": "Mon, 6 Feb 2023 18:54:58 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 21:18:41 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Xu",
"Yuancheng",
""
],
[
"Sun",
"Yanchao",
""
],
[
"Goldblum",
"Micah",
""
],
[
"Goldstein",
"Tom",
""
],
[
"Huang",
"Furong",
""
]
] | TITLE: Exploring and Exploiting Decision Boundary Dynamics for Adversarial
Robustness
ABSTRACT: The robustness of a deep classifier can be characterized by its margins: the
decision boundary's distances to natural data points. However, it is unclear
whether existing robust training methods effectively increase the margin for
each vulnerable point during training. To understand this, we propose a
continuous-time framework for quantifying the relative speed of the decision
boundary with respect to each individual point. Through visualizing the moving
speed of the decision boundary under Adversarial Training, one of the most
effective robust training algorithms, a surprising moving-behavior is revealed:
the decision boundary moves away from some vulnerable points but simultaneously
moves closer to others, decreasing their margins. To alleviate these
conflicting dynamics of the decision boundary, we propose Dynamics-aware Robust
Training (DyART), which encourages the decision boundary to engage in movement
that prioritizes increasing smaller margins. In contrast to prior works, DyART
directly operates on the margins rather than their indirect approximations,
allowing for more targeted and effective robustness improvement. Experiments on
the CIFAR-10 and Tiny-ImageNet datasets verify that DyART alleviates the
conflicting dynamics of the decision boundary and obtains improved robustness
under various perturbation sizes compared to the state-of-the-art defenses. Our
code is available at
https://github.com/Yuancheng-Xu/Dynamics-Aware-Robust-Training.
| no_new_dataset | 0.710986 |
2302.03221 | Jinyu Zhang | Jinyu Zhang, Huichuan Duan, Lei Guo, Liancheng Xu and Xinhua Wang | Towards Lightweight Cross-domain Sequential Recommendation via External
Attention-enhanced Graph Convolution Network | 16 pages, 4 figures, conference paper, accepted by DASFAA 2023 | null | 10.1007/978-3-031-30672-3_14 | null | cs.IR cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-domain Sequential Recommendation (CSR) is an emerging yet challenging
task that depicts the evolution of behavior patterns for overlapped users by
modeling their interactions from multiple domains. Existing studies on CSR
mainly focus on using composite or in-depth structures that achieve significant
improvement in accuracy but bring a huge burden to the model training.
Moreover, to learn the user-specific sequence representations, existing works
usually adopt the global relevance weighting strategy (e.g., self-attention
mechanism), which has quadratic computational complexity. In this work, we
introduce a lightweight external attention-enhanced GCN-based framework to
solve the above challenges, namely LEA-GCN. Specifically, by only keeping the
neighborhood aggregation component and using the Single-Layer Aggregating
Protocol (SLAP), our lightweight GCN encoder performs more efficiently to
capture the collaborative filtering signals of the items from both domains. To
further alleviate the framework structure and aggregate the user-specific
sequential pattern, we devise a novel dual-channel External Attention (EA)
component, which calculates the correlation among all items via a lightweight
linear structure. Extensive experiments are conducted on two real-world
datasets, demonstrating that LEA-GCN requires a smaller volume and less
training time without affecting the accuracy compared with several
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2023 03:06:29 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zhang",
"Jinyu",
""
],
[
"Duan",
"Huichuan",
""
],
[
"Guo",
"Lei",
""
],
[
"Xu",
"Liancheng",
""
],
[
"Wang",
"Xinhua",
""
]
] | TITLE: Towards Lightweight Cross-domain Sequential Recommendation via External
Attention-enhanced Graph Convolution Network
ABSTRACT: Cross-domain Sequential Recommendation (CSR) is an emerging yet challenging
task that depicts the evolution of behavior patterns for overlapped users by
modeling their interactions from multiple domains. Existing studies on CSR
mainly focus on using composite or in-depth structures that achieve significant
improvement in accuracy but bring a huge burden to the model training.
Moreover, to learn the user-specific sequence representations, existing works
usually adopt the global relevance weighting strategy (e.g., self-attention
mechanism), which has quadratic computational complexity. In this work, we
introduce a lightweight external attention-enhanced GCN-based framework to
solve the above challenges, namely LEA-GCN. Specifically, by only keeping the
neighborhood aggregation component and using the Single-Layer Aggregating
Protocol (SLAP), our lightweight GCN encoder performs more efficiently to
capture the collaborative filtering signals of the items from both domains. To
further alleviate the framework structure and aggregate the user-specific
sequential pattern, we devise a novel dual-channel External Attention (EA)
component, which calculates the correlation among all items via a lightweight
linear structure. Extensive experiments are conducted on two real-world
datasets, demonstrating that LEA-GCN requires a smaller volume and less
training time without affecting the accuracy compared with several
state-of-the-art methods.
| no_new_dataset | 0.709837 |
2302.03298 | Jordan Shipard | Jordan Shipard, Arnold Wiliem, Kien Nguyen Thanh, Wei Xiang, Clinton
Fookes | Diversity is Definitely Needed: Improving Model-Agnostic Zero-shot
Classification via Stable Diffusion | (10 pages, 6 figures, 3 tables, preprint) | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we investigate the problem of Model-Agnostic Zero-Shot
Classification (MA-ZSC), which refers to training non-specific classification
architectures (downstream models) to classify real images without using any
real images during training. Recent research has demonstrated that generating
synthetic training images using diffusion models provides a potential solution
to address MA-ZSC. However, the performance of this approach currently falls
short of that achieved by large-scale vision-language models. One possible
explanation is a potential significant domain gap between synthetic and real
images. Our work offers a fresh perspective on the problem by providing initial
insights that MA-ZSC performance can be improved by improving the diversity of
images in the generated dataset. We propose a set of modifications to the
text-to-image generation process using a pre-trained diffusion model to enhance
diversity, which we refer to as our $\textbf{bag of tricks}$. Our approach
shows notable improvements in various classification architectures, with
results comparable to state-of-the-art models such as CLIP. To validate our
approach, we conduct experiments on CIFAR10, CIFAR100, and EuroSAT, which is
particularly difficult for zero-shot classification due to its satellite image
domain. We evaluate our approach with five classification architectures,
including ResNet and ViT. Our findings provide initial insights into the
problem of MA-ZSC using diffusion models. All code will be available on GitHub.
| [
{
"version": "v1",
"created": "Tue, 7 Feb 2023 07:13:53 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2023 04:11:17 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Mar 2023 03:08:25 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Apr 2023 01:00:24 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Shipard",
"Jordan",
""
],
[
"Wiliem",
"Arnold",
""
],
[
"Thanh",
"Kien Nguyen",
""
],
[
"Xiang",
"Wei",
""
],
[
"Fookes",
"Clinton",
""
]
] | TITLE: Diversity is Definitely Needed: Improving Model-Agnostic Zero-shot
Classification via Stable Diffusion
ABSTRACT: In this work, we investigate the problem of Model-Agnostic Zero-Shot
Classification (MA-ZSC), which refers to training non-specific classification
architectures (downstream models) to classify real images without using any
real images during training. Recent research has demonstrated that generating
synthetic training images using diffusion models provides a potential solution
to address MA-ZSC. However, the performance of this approach currently falls
short of that achieved by large-scale vision-language models. One possible
explanation is a potential significant domain gap between synthetic and real
images. Our work offers a fresh perspective on the problem by providing initial
insights that MA-ZSC performance can be improved by improving the diversity of
images in the generated dataset. We propose a set of modifications to the
text-to-image generation process using a pre-trained diffusion model to enhance
diversity, which we refer to as our $\textbf{bag of tricks}$. Our approach
shows notable improvements in various classification architectures, with
results comparable to state-of-the-art models such as CLIP. To validate our
approach, we conduct experiments on CIFAR10, CIFAR100, and EuroSAT, which is
particularly difficult for zero-shot classification due to its satellite image
domain. We evaluate our approach with five classification architectures,
including ResNet and ViT. Our findings provide initial insights into the
problem of MA-ZSC using diffusion models. All code will be available on GitHub.
| no_new_dataset | 0.710176 |
2302.05016 | Avinash Madasu | Avinash Madasu, Vasudev Lal | Is Multimodal Vision Supervision Beneficial to Language? | null | null | null | null | cs.CV cs.AI cs.CL | http://creativecommons.org/licenses/by/4.0/ | Vision (image and video) - Language (VL) pre-training is the recent popular
paradigm that achieved state-of-the-art results on multi-modal tasks like
image-retrieval, video-retrieval, visual question answering etc. These models
are trained in an unsupervised way and greatly benefit from the complementary
modality supervision. In this paper, we explore if the language representations
trained using vision supervision perform better than vanilla language
representations on Natural Language Understanding and commonsense reasoning
benchmarks. We experiment with a diverse set of image-text models such as
ALBEF, BLIP, METER and video-text models like ALPRO, Frozen-in-Time (FiT),
VIOLET. We compare the performance of language representations of stand-alone
text encoders of these models to the language representations of text encoders
learnt through vision supervision. Our experiments suggest that vanilla
language representations show superior performance on most of the tasks. These
results shed light on the current drawbacks of the vision-language models.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2023 02:22:44 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 00:04:54 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Madasu",
"Avinash",
""
],
[
"Lal",
"Vasudev",
""
]
] | TITLE: Is Multimodal Vision Supervision Beneficial to Language?
ABSTRACT: Vision (image and video) - Language (VL) pre-training is the recent popular
paradigm that achieved state-of-the-art results on multi-modal tasks like
image-retrieval, video-retrieval, visual question answering etc. These models
are trained in an unsupervised way and greatly benefit from the complementary
modality supervision. In this paper, we explore if the language representations
trained using vision supervision perform better than vanilla language
representations on Natural Language Understanding and commonsense reasoning
benchmarks. We experiment with a diverse set of image-text models such as
ALBEF, BLIP, METER and video-text models like ALPRO, Frozen-in-Time (FiT),
VIOLET. We compare the performance of language representations of stand-alone
text encoders of these models to the language representations of text encoders
learnt through vision supervision. Our experiments suggest that vanilla
language representations show superior performance on most of the tasks. These
results shed light on the current drawbacks of the vision-language models.
| no_new_dataset | 0.709057 |
2302.05020 | Nan Jiang | Nan Jiang, Kevin Liu, Thibaud Lutellier and Lin Tan | Impact of Code Language Models on Automated Program Repair | This paper is accepted by 2023 IEEE/ACM 45th International Conference
on Software Engineering (ICSE) | null | null | null | cs.SE | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Automated program repair (APR) aims to help developers improve software
reliability by generating patches for buggy programs. Although many code
language models (CLM) are developed and effective in many software tasks such
as code completion, there has been little comprehensive, in-depth work to
evaluate CLMs' fixing capabilities and to fine-tune CLMs for the APR task.
Firstly, this work is the first to evaluate ten CLMs on four APR benchmarks,
which shows that surprisingly, the best CLM, as is, fixes 72% more bugs than
the state-of-the-art deep-learning (DL)-based APR techniques. Secondly, one of
the four APR benchmarks was created by us in this paper to avoid data leaking
for a fair evaluation. Thirdly, it is the first work to fine-tune CLMs with APR
training data, which shows that fine-tuning brings 31%-1,267% improvement to
CLMs and enables them to fix 46%-164% more bugs than existing DL-based APR
techniques. Fourthly, this work studies the impact of buggy lines, showing that
CLMs, as is, cannot make good use of the buggy lines to fix bugs, yet
fine-tuned CLMs could potentially over-rely on buggy lines. Lastly, this work
analyzes the size, time, and memory efficiency of different CLMs.
This work shows promising directions for the APR domain, such as fine-tuning
CLMs with APR-specific designs, and also raises awareness of fair and
comprehensive evaluations of CLMs and calls for more transparent reporting of
open-source repositories used in the pre-training data to address the data
leaking problem.
| [
{
"version": "v1",
"created": "Fri, 10 Feb 2023 02:29:37 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Feb 2023 07:46:40 GMT"
},
{
"version": "v3",
"created": "Sun, 16 Apr 2023 20:32:27 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Jiang",
"Nan",
""
],
[
"Liu",
"Kevin",
""
],
[
"Lutellier",
"Thibaud",
""
],
[
"Tan",
"Lin",
""
]
] | TITLE: Impact of Code Language Models on Automated Program Repair
ABSTRACT: Automated program repair (APR) aims to help developers improve software
reliability by generating patches for buggy programs. Although many code
language models (CLM) are developed and effective in many software tasks such
as code completion, there has been little comprehensive, in-depth work to
evaluate CLMs' fixing capabilities and to fine-tune CLMs for the APR task.
Firstly, this work is the first to evaluate ten CLMs on four APR benchmarks,
which shows that surprisingly, the best CLM, as is, fixes 72% more bugs than
the state-of-the-art deep-learning (DL)-based APR techniques. Secondly, one of
the four APR benchmarks was created by us in this paper to avoid data leaking
for a fair evaluation. Thirdly, it is the first work to fine-tune CLMs with APR
training data, which shows that fine-tuning brings 31%-1,267% improvement to
CLMs and enables them to fix 46%-164% more bugs than existing DL-based APR
techniques. Fourthly, this work studies the impact of buggy lines, showing that
CLMs, as is, cannot make good use of the buggy lines to fix bugs, yet
fine-tuned CLMs could potentially over-rely on buggy lines. Lastly, this work
analyzes the size, time, and memory efficiency of different CLMs.
This work shows promising directions for the APR domain, such as fine-tuning
CLMs with APR-specific designs, and also raises awareness of fair and
comprehensive evaluations of CLMs and calls for more transparent reporting of
open-source repositories used in the pre-training data to address the data
leaking problem.
| no_new_dataset | 0.710616 |
2302.05630 | Shreshth Tuli | Shreshth Tuli and Giuliano Casale and Nicholas R. Jennings | CILP: Co-simulation based Imitation Learner for Dynamic Resource
Provisioning in Cloud Computing Environments | Accepted in IEEE Transactions on Network and Service Management | null | null | null | eess.SY cs.LG cs.SY | http://creativecommons.org/licenses/by/4.0/ | Intelligent Virtual Machine (VM) provisioning is central to cost and resource
efficient computation in cloud computing environments. As bootstrapping VMs is
time-consuming, a key challenge for latency-critical tasks is to predict future
workload demands to provision VMs proactively. However, existing AI-based
solutions tend to not holistically consider all crucial aspects such as
provisioning overheads, heterogeneous VM costs and Quality of Service (QoS) of
the cloud system. To address this, we propose a novel method, called CILP, that
formulates the VM provisioning problem as two sub-problems of prediction and
optimization, where the provisioning plan is optimized based on predicted
workload demands. CILP leverages a neural network as a surrogate model to
predict future workload demands with a co-simulated digital-twin of the
infrastructure to compute QoS scores. We extend the neural network to also act
as an imitation learner that dynamically decides the optimal VM provisioning
plan. A transformer based neural model reduces training and inference overheads
while our novel two-phase decision making loop facilitates in making informed
provisioning decisions. Crucially, we address limitations of prior work by
including resource utilization, deployment costs and provisioning overheads to
inform the provisioning decisions in our imitation learning framework.
Experiments with three public benchmarks demonstrate that CILP gives up to 22%
higher resource utilization, 14% higher QoS scores and 44% lower execution
costs compared to the current online and offline optimization based
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Sat, 11 Feb 2023 09:15:34 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 18:29:50 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Tuli",
"Shreshth",
""
],
[
"Casale",
"Giuliano",
""
],
[
"Jennings",
"Nicholas R.",
""
]
] | TITLE: CILP: Co-simulation based Imitation Learner for Dynamic Resource
Provisioning in Cloud Computing Environments
ABSTRACT: Intelligent Virtual Machine (VM) provisioning is central to cost and resource
efficient computation in cloud computing environments. As bootstrapping VMs is
time-consuming, a key challenge for latency-critical tasks is to predict future
workload demands to provision VMs proactively. However, existing AI-based
solutions tend to not holistically consider all crucial aspects such as
provisioning overheads, heterogeneous VM costs and Quality of Service (QoS) of
the cloud system. To address this, we propose a novel method, called CILP, that
formulates the VM provisioning problem as two sub-problems of prediction and
optimization, where the provisioning plan is optimized based on predicted
workload demands. CILP leverages a neural network as a surrogate model to
predict future workload demands with a co-simulated digital-twin of the
infrastructure to compute QoS scores. We extend the neural network to also act
as an imitation learner that dynamically decides the optimal VM provisioning
plan. A transformer based neural model reduces training and inference overheads
while our novel two-phase decision making loop facilitates in making informed
provisioning decisions. Crucially, we address limitations of prior work by
including resource utilization, deployment costs and provisioning overheads to
inform the provisioning decisions in our imitation learning framework.
Experiments with three public benchmarks demonstrate that CILP gives up to 22%
higher resource utilization, 14% higher QoS scores and 44% lower execution
costs compared to the current online and offline optimization based
state-of-the-art methods.
| no_new_dataset | 0.710377 |
2302.07727 | Bingyan Wang | Bingyan Wang, Rongpeng Li, Jianhang Zhu, Zhifeng Zhao, and Honggang
Zhang | Knowledge Enhanced Semantic Communication Receiver | null | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, with the rapid development of deep learning and natural
language processing technologies, semantic communication has become a topic of
great interest in the field of communication. Although existing deep
learning-based semantic communication approaches have shown many advantages,
they still do not make sufficient use of prior knowledge. Moreover, most
existing semantic communication methods focus on the semantic encoding at the
transmitter side, while we believe that the semantic decoding capability of the
receiver should also be concerned. In this paper, we propose a knowledge
enhanced semantic communication framework in which the receiver can more
actively utilize the facts in the knowledge base for semantic reasoning and
decoding, on the basis of only affecting the parameters rather than the
structure of the neural networks at the transmitter side. Specifically, we
design a transformer-based knowledge extractor to find relevant factual triples
for the received noisy signal. Extensive simulation results on the WebNLG
dataset demonstrate that the proposed receiver yields superior performance on
top of the knowledge graph enhanced decoding.
| [
{
"version": "v1",
"created": "Mon, 13 Feb 2023 01:49:51 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 10:25:24 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Bingyan",
""
],
[
"Li",
"Rongpeng",
""
],
[
"Zhu",
"Jianhang",
""
],
[
"Zhao",
"Zhifeng",
""
],
[
"Zhang",
"Honggang",
""
]
] | TITLE: Knowledge Enhanced Semantic Communication Receiver
ABSTRACT: In recent years, with the rapid development of deep learning and natural
language processing technologies, semantic communication has become a topic of
great interest in the field of communication. Although existing deep
learning-based semantic communication approaches have shown many advantages,
they still do not make sufficient use of prior knowledge. Moreover, most
existing semantic communication methods focus on the semantic encoding at the
transmitter side, while we believe that the semantic decoding capability of the
receiver should also be concerned. In this paper, we propose a knowledge
enhanced semantic communication framework in which the receiver can more
actively utilize the facts in the knowledge base for semantic reasoning and
decoding, on the basis of only affecting the parameters rather than the
structure of the neural networks at the transmitter side. Specifically, we
design a transformer-based knowledge extractor to find relevant factual triples
for the received noisy signal. Extensive simulation results on the WebNLG
dataset demonstrate that the proposed receiver yields superior performance on
top of the knowledge graph enhanced decoding.
| no_new_dataset | 0.709799 |
2302.07769 | Abhiroop Bhattacharjee | Abhiroop Bhattacharjee, Abhishek Moitra, and Priyadarshini Panda | XploreNAS: Explore Adversarially Robust & Hardware-efficient Neural
Architectures for Non-ideal Xbars | Accepted to ACM Transactions on Embedded Computing Systems in April
2023 | ACM Transactions on Embedded Computing Systems (2023) | 10.1145/3593045 | null | cs.LG cs.ET | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compute In-Memory platforms such as memristive crossbars are gaining focus as
they facilitate acceleration of Deep Neural Networks (DNNs) with high area and
compute-efficiencies. However, the intrinsic non-idealities associated with the
analog nature of computing in crossbars limits the performance of the deployed
DNNs. Furthermore, DNNs are shown to be vulnerable to adversarial attacks
leading to severe security threats in their large-scale deployment. Thus,
finding adversarially robust DNN architectures for non-ideal crossbars is
critical to the safe and secure deployment of DNNs on the edge. This work
proposes a two-phase algorithm-hardware co-optimization approach called
XploreNAS that searches for hardware-efficient & adversarially robust neural
architectures for non-ideal crossbar platforms. We use the one-shot Neural
Architecture Search (NAS) approach to train a large Supernet with
crossbar-awareness and sample adversarially robust Subnets therefrom,
maintaining competitive hardware-efficiency. Our experiments on crossbars with
benchmark datasets (SVHN, CIFAR10 & CIFAR100) show upto ~8-16% improvement in
the adversarial robustness of the searched Subnets against a baseline ResNet-18
model subjected to crossbar-aware adversarial training. We benchmark our robust
Subnets for Energy-Delay-Area-Products (EDAPs) using the Neurosim tool and find
that with additional hardware-efficiency driven optimizations, the Subnets
attain ~1.5-1.6x lower EDAPs than ResNet-18 baseline.
| [
{
"version": "v1",
"created": "Wed, 15 Feb 2023 16:44:18 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2023 18:51:32 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Bhattacharjee",
"Abhiroop",
""
],
[
"Moitra",
"Abhishek",
""
],
[
"Panda",
"Priyadarshini",
""
]
] | TITLE: XploreNAS: Explore Adversarially Robust & Hardware-efficient Neural
Architectures for Non-ideal Xbars
ABSTRACT: Compute In-Memory platforms such as memristive crossbars are gaining focus as
they facilitate acceleration of Deep Neural Networks (DNNs) with high area and
compute-efficiencies. However, the intrinsic non-idealities associated with the
analog nature of computing in crossbars limits the performance of the deployed
DNNs. Furthermore, DNNs are shown to be vulnerable to adversarial attacks
leading to severe security threats in their large-scale deployment. Thus,
finding adversarially robust DNN architectures for non-ideal crossbars is
critical to the safe and secure deployment of DNNs on the edge. This work
proposes a two-phase algorithm-hardware co-optimization approach called
XploreNAS that searches for hardware-efficient & adversarially robust neural
architectures for non-ideal crossbar platforms. We use the one-shot Neural
Architecture Search (NAS) approach to train a large Supernet with
crossbar-awareness and sample adversarially robust Subnets therefrom,
maintaining competitive hardware-efficiency. Our experiments on crossbars with
benchmark datasets (SVHN, CIFAR10 & CIFAR100) show upto ~8-16% improvement in
the adversarial robustness of the searched Subnets against a baseline ResNet-18
model subjected to crossbar-aware adversarial training. We benchmark our robust
Subnets for Energy-Delay-Area-Products (EDAPs) using the Neurosim tool and find
that with additional hardware-efficiency driven optimizations, the Subnets
attain ~1.5-1.6x lower EDAPs than ResNet-18 baseline.
| no_new_dataset | 0.710208 |
2302.10413 | Huy Hieu Pham | Nang Hung Nguyen, Duc Long Nguyen, Trong Bang Nguyen, Thanh-Hung
Nguyen, Huy Hieu Pham, Truong Thao Nguyen, Phi Le Nguyen | CADIS: Handling Cluster-skewed Non-IID Data in Federated Learning with
Clustered Aggregation and Knowledge DIStilled Regularization | Accepted for presentation at the 23rd International Symposium on
Cluster, Cloud and Internet Computing (CCGrid 2023) | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | Federated learning enables edge devices to train a global model
collaboratively without exposing their data. Despite achieving outstanding
advantages in computing efficiency and privacy protection, federated learning
faces a significant challenge when dealing with non-IID data, i.e., data
generated by clients that are typically not independent and identically
distributed. In this paper, we tackle a new type of Non-IID data, called
cluster-skewed non-IID, discovered in actual data sets. The cluster-skewed
non-IID is a phenomenon in which clients can be grouped into clusters with
similar data distributions. By performing an in-depth analysis of the behavior
of a classification model's penultimate layer, we introduce a metric that
quantifies the similarity between two clients' data distributions without
violating their privacy. We then propose an aggregation scheme that guarantees
equality between clusters. In addition, we offer a novel local training
regularization based on the knowledge-distillation technique that reduces the
overfitting problem at clients and dramatically boosts the training scheme's
performance. We theoretically prove the superiority of the proposed aggregation
over the benchmark FedAvg. Extensive experimental results on both standard
public datasets and our in-house real-world dataset demonstrate that the
proposed approach improves accuracy by up to 16% compared to the FedAvg
algorithm.
| [
{
"version": "v1",
"created": "Tue, 21 Feb 2023 02:53:37 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Mar 2023 19:52:19 GMT"
},
{
"version": "v3",
"created": "Sat, 15 Apr 2023 04:06:52 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Nguyen",
"Nang Hung",
""
],
[
"Nguyen",
"Duc Long",
""
],
[
"Nguyen",
"Trong Bang",
""
],
[
"Nguyen",
"Thanh-Hung",
""
],
[
"Pham",
"Huy Hieu",
""
],
[
"Nguyen",
"Truong Thao",
""
],
[
"Nguyen",
"Phi Le",
""
]
] | TITLE: CADIS: Handling Cluster-skewed Non-IID Data in Federated Learning with
Clustered Aggregation and Knowledge DIStilled Regularization
ABSTRACT: Federated learning enables edge devices to train a global model
collaboratively without exposing their data. Despite achieving outstanding
advantages in computing efficiency and privacy protection, federated learning
faces a significant challenge when dealing with non-IID data, i.e., data
generated by clients that are typically not independent and identically
distributed. In this paper, we tackle a new type of Non-IID data, called
cluster-skewed non-IID, discovered in actual data sets. The cluster-skewed
non-IID is a phenomenon in which clients can be grouped into clusters with
similar data distributions. By performing an in-depth analysis of the behavior
of a classification model's penultimate layer, we introduce a metric that
quantifies the similarity between two clients' data distributions without
violating their privacy. We then propose an aggregation scheme that guarantees
equality between clusters. In addition, we offer a novel local training
regularization based on the knowledge-distillation technique that reduces the
overfitting problem at clients and dramatically boosts the training scheme's
performance. We theoretically prove the superiority of the proposed aggregation
over the benchmark FedAvg. Extensive experimental results on both standard
public datasets and our in-house real-world dataset demonstrate that the
proposed approach improves accuracy by up to 16% compared to the FedAvg
algorithm.
| no_new_dataset | 0.709629 |
2302.11102 | Haiyu Wu | Haiyu Wu, Grace Bezold, Aman Bhatta, Kevin W. Bowyer | Logical Consistency and Greater Descriptive Power for Facial Hair
Attribute Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Face attribute research has so far used only simple binary attributes for
facial hair; e.g., beard / no beard. We have created a new, more descriptive
facial hair annotation scheme and applied it to create a new facial hair
attribute dataset, FH37K. Face attribute research also so far has not dealt
with logical consistency and completeness. For example, in prior research, an
image might be classified as both having no beard and also having a goatee (a
type of beard). We show that the test accuracy of previous classification
methods on facial hair attribute classification drops significantly if logical
consistency of classifications is enforced. We propose a logically consistent
prediction loss, LCPLoss, to aid learning of logical consistency across
attributes, and also a label compensation training strategy to eliminate the
problem of no positive prediction across a set of related attributes. Using an
attribute classifier trained on FH37K, we investigate how facial hair affects
face recognition accuracy, including variation across demographics. Results
show that similarity and difference in facial hairstyle have important effects
on the impostor and genuine score distributions in face recognition. The code
is at https:// github.com/ HaiyuWu/ LogicalConsistency.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2023 02:49:21 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 14:04:19 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wu",
"Haiyu",
""
],
[
"Bezold",
"Grace",
""
],
[
"Bhatta",
"Aman",
""
],
[
"Bowyer",
"Kevin W.",
""
]
] | TITLE: Logical Consistency and Greater Descriptive Power for Facial Hair
Attribute Learning
ABSTRACT: Face attribute research has so far used only simple binary attributes for
facial hair; e.g., beard / no beard. We have created a new, more descriptive
facial hair annotation scheme and applied it to create a new facial hair
attribute dataset, FH37K. Face attribute research also so far has not dealt
with logical consistency and completeness. For example, in prior research, an
image might be classified as both having no beard and also having a goatee (a
type of beard). We show that the test accuracy of previous classification
methods on facial hair attribute classification drops significantly if logical
consistency of classifications is enforced. We propose a logically consistent
prediction loss, LCPLoss, to aid learning of logical consistency across
attributes, and also a label compensation training strategy to eliminate the
problem of no positive prediction across a set of related attributes. Using an
attribute classifier trained on FH37K, we investigate how facial hair affects
face recognition accuracy, including variation across demographics. Results
show that similarity and difference in facial hairstyle have important effects
on the impostor and genuine score distributions in face recognition. The code
is at https:// github.com/ HaiyuWu/ LogicalConsistency.
| new_dataset | 0.712595 |
2302.11494 | J\'er\'emy Anger | Ngoc Long Nguyen, J\'er\'emy Anger, Lara Raad, Bruno Galerne, Gabriele
Facciolo | On The Role of Alias and Band-Shift for Sentinel-2 Super-Resolution | 4 pages, 3 figures | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | In this work, we study the problem of single-image super-resolution (SISR) of
Sentinel-2 imagery. We show that thanks to its unique sensor specification,
namely the inter-band shift and alias, that deep-learning methods are able to
recover fine details. By training a model using a simple $L_1$ loss, results
are free of hallucinated details. For this study, we build a dataset of pairs
of images Sentinel-2/PlanetScope to train and evaluate our super-resolution
(SR) model.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2023 17:08:45 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 16:24:05 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Nguyen",
"Ngoc Long",
""
],
[
"Anger",
"Jérémy",
""
],
[
"Raad",
"Lara",
""
],
[
"Galerne",
"Bruno",
""
],
[
"Facciolo",
"Gabriele",
""
]
] | TITLE: On The Role of Alias and Band-Shift for Sentinel-2 Super-Resolution
ABSTRACT: In this work, we study the problem of single-image super-resolution (SISR) of
Sentinel-2 imagery. We show that thanks to its unique sensor specification,
namely the inter-band shift and alias, that deep-learning methods are able to
recover fine details. By training a model using a simple $L_1$ loss, results
are free of hallucinated details. For this study, we build a dataset of pairs
of images Sentinel-2/PlanetScope to train and evaluate our super-resolution
(SR) model.
| new_dataset | 0.712664 |
2302.14284 | Zhengzhuo Xu | Zhengzhuo Xu, Shuo Yang, Xingjun Wang, Chun Yuan | Rethink Long-tailed Recognition with Vision Transformers | Accepted by ICASSP 2023 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In the real world, data tends to follow long-tailed distributions w.r.t.
class or attribution, motivating the challenging Long-Tailed Recognition (LTR)
problem. In this paper, we revisit recent LTR methods with promising Vision
Transformers (ViT). We figure out that 1) ViT is hard to train with long-tailed
data. 2) ViT learns generalized features in an unsupervised manner, like mask
generative training, either on long-tailed or balanced datasets. Hence, we
propose to adopt unsupervised learning to utilize long-tailed data.
Furthermore, we propose the Predictive Distribution Calibration (PDC) as a
novel metric for LTR, where the model tends to simply classify inputs into
common classes. Our PDC can measure the model calibration of predictive
preferences quantitatively. On this basis, we find many LTR approaches
alleviate it slightly, despite the accuracy improvement. Extensive experiments
on benchmark datasets validate that PDC reflects the model's predictive
preference precisely, which is consistent with the visualization.
| [
{
"version": "v1",
"created": "Tue, 28 Feb 2023 03:36:48 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 08:35:02 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Xu",
"Zhengzhuo",
""
],
[
"Yang",
"Shuo",
""
],
[
"Wang",
"Xingjun",
""
],
[
"Yuan",
"Chun",
""
]
] | TITLE: Rethink Long-tailed Recognition with Vision Transformers
ABSTRACT: In the real world, data tends to follow long-tailed distributions w.r.t.
class or attribution, motivating the challenging Long-Tailed Recognition (LTR)
problem. In this paper, we revisit recent LTR methods with promising Vision
Transformers (ViT). We figure out that 1) ViT is hard to train with long-tailed
data. 2) ViT learns generalized features in an unsupervised manner, like mask
generative training, either on long-tailed or balanced datasets. Hence, we
propose to adopt unsupervised learning to utilize long-tailed data.
Furthermore, we propose the Predictive Distribution Calibration (PDC) as a
novel metric for LTR, where the model tends to simply classify inputs into
common classes. Our PDC can measure the model calibration of predictive
preferences quantitatively. On this basis, we find many LTR approaches
alleviate it slightly, despite the accuracy improvement. Extensive experiments
on benchmark datasets validate that PDC reflects the model's predictive
preference precisely, which is consistent with the visualization.
| no_new_dataset | 0.711055 |
2303.03599 | Yili Jin | Kaiyuan Hu, Yili Jin, Haowen Yang, Junhua Liu, Fangxin Wang | FSVVD: A Dataset of Full Scene Volumetric Video | Accepted by MMSys'23 Open Dataset and Software Track. The dataset and
additional tools can be accessed via
https://cuhksz-inml.github.io/full_scene_volumetric_video_dataset/ | null | null | null | cs.MM cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Recent years have witnessed a rapid development of immersive multimedia which
bridges the gap between the real world and virtual space. Volumetric videos, as
an emerging representative 3D video paradigm that empowers extended reality,
stand out to provide unprecedented immersive and interactive video watching
experience. Despite the tremendous potential, the research towards 3D
volumetric video is still in its infancy, relying on sufficient and complete
datasets for further exploration. However, existing related volumetric video
datasets mostly only include a single object, lacking details about the scene
and the interaction between them. In this paper, we focus on the current most
widely used data format, point cloud, and for the first time release a
full-scene volumetric video dataset that includes multiple people and their
daily activities interacting with the external environments. Comprehensive
dataset description and analysis are conducted, with potential usage of this
dataset. The dataset and additional tools can be accessed via the following
website: https://cuhksz-inml.github.io/full_scene_volumetric_video_dataset/.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2023 02:31:08 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 08:50:55 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Hu",
"Kaiyuan",
""
],
[
"Jin",
"Yili",
""
],
[
"Yang",
"Haowen",
""
],
[
"Liu",
"Junhua",
""
],
[
"Wang",
"Fangxin",
""
]
] | TITLE: FSVVD: A Dataset of Full Scene Volumetric Video
ABSTRACT: Recent years have witnessed a rapid development of immersive multimedia which
bridges the gap between the real world and virtual space. Volumetric videos, as
an emerging representative 3D video paradigm that empowers extended reality,
stand out to provide unprecedented immersive and interactive video watching
experience. Despite the tremendous potential, the research towards 3D
volumetric video is still in its infancy, relying on sufficient and complete
datasets for further exploration. However, existing related volumetric video
datasets mostly only include a single object, lacking details about the scene
and the interaction between them. In this paper, we focus on the current most
widely used data format, point cloud, and for the first time release a
full-scene volumetric video dataset that includes multiple people and their
daily activities interacting with the external environments. Comprehensive
dataset description and analysis are conducted, with potential usage of this
dataset. The dataset and additional tools can be accessed via the following
website: https://cuhksz-inml.github.io/full_scene_volumetric_video_dataset/.
| new_dataset | 0.715648 |
2303.09830 | Shuai Wang | Shuai Wang, Zipei Yan, Daoan Zhang, Haining Wei, Zhongsen Li, Rui Li | Prototype Knowledge Distillation for Medical Segmentation with Missing
Modality | ICASSP 2023. v1:camera ready version; v2: fix typos and release code | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-modality medical imaging is crucial in clinical treatment as it can
provide complementary information for medical image segmentation. However,
collecting multi-modal data in clinical is difficult due to the limitation of
the scan time and other clinical situations. As such, it is clinically
meaningful to develop an image segmentation paradigm to handle this missing
modality problem. In this paper, we propose a prototype knowledge distillation
(ProtoKD) method to tackle the challenging problem, especially for the toughest
scenario when only single modal data can be accessed. Specifically, our ProtoKD
can not only distillate the pixel-wise knowledge of multi-modality data to
single-modality data but also transfer intra-class and inter-class feature
variations, such that the student model could learn more robust feature
representation from the teacher model and inference with only one single
modality data. Our method achieves state-of-the-art performance on BraTS
benchmark. The code is available at
\url{https://github.com/SakurajimaMaiii/ProtoKD}.
| [
{
"version": "v1",
"created": "Fri, 17 Mar 2023 08:29:54 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 07:53:32 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Shuai",
""
],
[
"Yan",
"Zipei",
""
],
[
"Zhang",
"Daoan",
""
],
[
"Wei",
"Haining",
""
],
[
"Li",
"Zhongsen",
""
],
[
"Li",
"Rui",
""
]
] | TITLE: Prototype Knowledge Distillation for Medical Segmentation with Missing
Modality
ABSTRACT: Multi-modality medical imaging is crucial in clinical treatment as it can
provide complementary information for medical image segmentation. However,
collecting multi-modal data in clinical is difficult due to the limitation of
the scan time and other clinical situations. As such, it is clinically
meaningful to develop an image segmentation paradigm to handle this missing
modality problem. In this paper, we propose a prototype knowledge distillation
(ProtoKD) method to tackle the challenging problem, especially for the toughest
scenario when only single modal data can be accessed. Specifically, our ProtoKD
can not only distillate the pixel-wise knowledge of multi-modality data to
single-modality data but also transfer intra-class and inter-class feature
variations, such that the student model could learn more robust feature
representation from the teacher model and inference with only one single
modality data. Our method achieves state-of-the-art performance on BraTS
benchmark. The code is available at
\url{https://github.com/SakurajimaMaiii/ProtoKD}.
| no_new_dataset | 0.710226 |
2303.10404 | Zheng Qin | Zheng Qin and Sanping Zhou and Le Wang and Jinghai Duan and Gang Hua
and Wei Tang | MotionTrack: Learning Robust Short-term and Long-term Motions for
Multi-Object Tracking | Accepted by CVPR2023! | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main challenge of Multi-Object Tracking~(MOT) lies in maintaining a
continuous trajectory for each target. Existing methods often learn reliable
motion patterns to match the same target between adjacent frames and
discriminative appearance features to re-identify the lost targets after a long
period. However, the reliability of motion prediction and the discriminability
of appearances can be easily hurt by dense crowds and extreme occlusions in the
tracking process. In this paper, we propose a simple yet effective multi-object
tracker, i.e., MotionTrack, which learns robust short-term and long-term
motions in a unified framework to associate trajectories from a short to long
range. For dense crowds, we design a novel Interaction Module to learn
interaction-aware motions from short-term trajectories, which can estimate the
complex movement of each target. For extreme occlusions, we build a novel
Refind Module to learn reliable long-term motions from the target's history
trajectory, which can link the interrupted trajectory with its corresponding
detection. Our Interaction Module and Refind Module are embedded in the
well-known tracking-by-detection paradigm, which can work in tandem to maintain
superior performance. Extensive experimental results on MOT17 and MOT20
datasets demonstrate the superiority of our approach in challenging scenarios,
and it achieves state-of-the-art performances at various MOT metrics.
| [
{
"version": "v1",
"created": "Sat, 18 Mar 2023 12:38:33 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 03:39:11 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Qin",
"Zheng",
""
],
[
"Zhou",
"Sanping",
""
],
[
"Wang",
"Le",
""
],
[
"Duan",
"Jinghai",
""
],
[
"Hua",
"Gang",
""
],
[
"Tang",
"Wei",
""
]
] | TITLE: MotionTrack: Learning Robust Short-term and Long-term Motions for
Multi-Object Tracking
ABSTRACT: The main challenge of Multi-Object Tracking~(MOT) lies in maintaining a
continuous trajectory for each target. Existing methods often learn reliable
motion patterns to match the same target between adjacent frames and
discriminative appearance features to re-identify the lost targets after a long
period. However, the reliability of motion prediction and the discriminability
of appearances can be easily hurt by dense crowds and extreme occlusions in the
tracking process. In this paper, we propose a simple yet effective multi-object
tracker, i.e., MotionTrack, which learns robust short-term and long-term
motions in a unified framework to associate trajectories from a short to long
range. For dense crowds, we design a novel Interaction Module to learn
interaction-aware motions from short-term trajectories, which can estimate the
complex movement of each target. For extreme occlusions, we build a novel
Refind Module to learn reliable long-term motions from the target's history
trajectory, which can link the interrupted trajectory with its corresponding
detection. Our Interaction Module and Refind Module are embedded in the
well-known tracking-by-detection paradigm, which can work in tandem to maintain
superior performance. Extensive experimental results on MOT17 and MOT20
datasets demonstrate the superiority of our approach in challenging scenarios,
and it achieves state-of-the-art performances at various MOT metrics.
| no_new_dataset | 0.709057 |
2303.15718 | Feida Zhu | Congyi Wang, Feida Zhu, Shilei Wen | MeMaHand: Exploiting Mesh-Mano Interaction for Single Image Two-Hand
Reconstruction | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Existing methods proposed for hand reconstruction tasks usually parameterize
a generic 3D hand model or predict hand mesh positions directly. The parametric
representations consisting of hand shapes and rotational poses are more stable,
while the non-parametric methods can predict more accurate mesh positions. In
this paper, we propose to reconstruct meshes and estimate MANO parameters of
two hands from a single RGB image simultaneously to utilize the merits of two
kinds of hand representations. To fulfill this target, we propose novel
Mesh-Mano interaction blocks (MMIBs), which take mesh vertices positions and
MANO parameters as two kinds of query tokens. MMIB consists of one graph
residual block to aggregate local information and two transformer encoders to
model long-range dependencies. The transformer encoders are equipped with
different asymmetric attention masks to model the intra-hand and inter-hand
attention, respectively. Moreover, we introduce the mesh alignment refinement
module to further enhance the mesh-image alignment. Extensive experiments on
the InterHand2.6M benchmark demonstrate promising results over the
state-of-the-art hand reconstruction methods.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2023 04:06:02 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 02:44:54 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Congyi",
""
],
[
"Zhu",
"Feida",
""
],
[
"Wen",
"Shilei",
""
]
] | TITLE: MeMaHand: Exploiting Mesh-Mano Interaction for Single Image Two-Hand
Reconstruction
ABSTRACT: Existing methods proposed for hand reconstruction tasks usually parameterize
a generic 3D hand model or predict hand mesh positions directly. The parametric
representations consisting of hand shapes and rotational poses are more stable,
while the non-parametric methods can predict more accurate mesh positions. In
this paper, we propose to reconstruct meshes and estimate MANO parameters of
two hands from a single RGB image simultaneously to utilize the merits of two
kinds of hand representations. To fulfill this target, we propose novel
Mesh-Mano interaction blocks (MMIBs), which take mesh vertices positions and
MANO parameters as two kinds of query tokens. MMIB consists of one graph
residual block to aggregate local information and two transformer encoders to
model long-range dependencies. The transformer encoders are equipped with
different asymmetric attention masks to model the intra-hand and inter-hand
attention, respectively. Moreover, we introduce the mesh alignment refinement
module to further enhance the mesh-image alignment. Extensive experiments on
the InterHand2.6M benchmark demonstrate promising results over the
state-of-the-art hand reconstruction methods.
| no_new_dataset | 0.710377 |
2303.15747 | Soma Onishi | Soma Onishi, Kenta Oono, and Kohei Hayashi | TabRet: Pre-training Transformer-based Tabular Models for Unseen Columns | Accepted at the Workshop on Understanding Foundation Models at ICLR
2023 | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present \emph{TabRet}, a pre-trainable Transformer-based model for tabular
data. TabRet is designed to work on a downstream task that contains columns not
seen in pre-training. Unlike other methods, TabRet has an extra learning step
before fine-tuning called \emph{retokenizing}, which calibrates feature
embeddings based on the masked autoencoding loss. In experiments, we
pre-trained TabRet with a large collection of public health surveys and
fine-tuned it on classification tasks in healthcare, and TabRet achieved the
best AUC performance on four datasets. In addition, an ablation study shows
retokenizing and random shuffle augmentation of columns during pre-training
contributed to performance gains. The code is available at
https://github.com/pfnet-research/tabret .
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2023 06:03:41 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2023 07:08:49 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Apr 2023 10:57:44 GMT"
},
{
"version": "v4",
"created": "Sun, 16 Apr 2023 03:42:52 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Onishi",
"Soma",
""
],
[
"Oono",
"Kenta",
""
],
[
"Hayashi",
"Kohei",
""
]
] | TITLE: TabRet: Pre-training Transformer-based Tabular Models for Unseen Columns
ABSTRACT: We present \emph{TabRet}, a pre-trainable Transformer-based model for tabular
data. TabRet is designed to work on a downstream task that contains columns not
seen in pre-training. Unlike other methods, TabRet has an extra learning step
before fine-tuning called \emph{retokenizing}, which calibrates feature
embeddings based on the masked autoencoding loss. In experiments, we
pre-trained TabRet with a large collection of public health surveys and
fine-tuned it on classification tasks in healthcare, and TabRet achieved the
best AUC performance on four datasets. In addition, an ablation study shows
retokenizing and random shuffle augmentation of columns during pre-training
contributed to performance gains. The code is available at
https://github.com/pfnet-research/tabret .
| no_new_dataset | 0.708427 |
2304.00276 | Bingxi Liu | Bingxi Liu, Yujie Fu, Feng Lu, Jinqiang Cui, Yihong Wu, Hong Zhang | NPR: Nocturnal Place Recognition in Streets | 10 pages, 6 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Visual Place Recognition (VPR) is the task of retrieving database images
similar to a query photo by comparing it to a large database of known images.
In real-world applications, extreme illumination changes caused by query images
taken at night pose a significant obstacle that VPR needs to overcome. However,
a training set with day-night correspondence for city-scale, street-level VPR
does not exist. To address this challenge, we propose a novel pipeline that
divides VPR and conquers Nocturnal Place Recognition (NPR). Specifically, we
first established a street-level day-night dataset, NightStreet, and used it to
train an unpaired image-to-image translation model. Then we used this model to
process existing large-scale VPR datasets to generate the VPR-Night datasets
and demonstrated how to combine them with two popular VPR pipelines. Finally,
we proposed a divide-and-conquer VPR framework and provided explanations at the
theoretical, experimental, and application levels. Under our framework,
previous methods can significantly improve performance on two public datasets,
including the top-ranked method.
| [
{
"version": "v1",
"created": "Sat, 1 Apr 2023 09:43:58 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 16:28:47 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Liu",
"Bingxi",
""
],
[
"Fu",
"Yujie",
""
],
[
"Lu",
"Feng",
""
],
[
"Cui",
"Jinqiang",
""
],
[
"Wu",
"Yihong",
""
],
[
"Zhang",
"Hong",
""
]
] | TITLE: NPR: Nocturnal Place Recognition in Streets
ABSTRACT: Visual Place Recognition (VPR) is the task of retrieving database images
similar to a query photo by comparing it to a large database of known images.
In real-world applications, extreme illumination changes caused by query images
taken at night pose a significant obstacle that VPR needs to overcome. However,
a training set with day-night correspondence for city-scale, street-level VPR
does not exist. To address this challenge, we propose a novel pipeline that
divides VPR and conquers Nocturnal Place Recognition (NPR). Specifically, we
first established a street-level day-night dataset, NightStreet, and used it to
train an unpaired image-to-image translation model. Then we used this model to
process existing large-scale VPR datasets to generate the VPR-Night datasets
and demonstrated how to combine them with two popular VPR pipelines. Finally,
we proposed a divide-and-conquer VPR framework and provided explanations at the
theoretical, experimental, and application levels. Under our framework,
previous methods can significantly improve performance on two public datasets,
including the top-ranked method.
| new_dataset | 0.660665 |
2304.00879 | Pietro Totis | Pietro Totis, Angelika Kimmig, Luc De Raedt | smProbLog: Stable Model Semantics in ProbLog for Probabilistic
Argumentation | Under consideration in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Argumentation problems are concerned with determining the acceptability of a
set of arguments from their relational structure. When the available
information is uncertain, probabilistic argumentation frameworks provide
modelling tools to account for it. The first contribution of this paper is a
novel interpretation of probabilistic argumentation frameworks as probabilistic
logic programs. Probabilistic logic programs are logic programs in which some
of the facts are annotated with probabilities. We show that the programs
representing probabilistic argumentation frameworks do not satisfy a common
assumption in probabilistic logic programming (PLP) semantics, which is, that
probabilistic facts fully capture the uncertainty in the domain under
investigation. The second contribution of this paper is then a novel PLP
semantics for programs where a choice of probabilistic facts does not uniquely
determine the truth assignment of the logical atoms. The third contribution of
this paper is the implementation of a PLP system supporting this semantics:
smProbLog. smProbLog is a novel PLP framework based on the probabilistic logic
programming language ProbLog. smProbLog supports many inference and learning
tasks typical of PLP, which, together with our first contribution, provide
novel reasoning tools for probabilistic argumentation. We evaluate our approach
with experiments analyzing the computational cost of the proposed algorithms
and their application to a dataset of argumentation problems.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 10:59:25 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 09:21:03 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Totis",
"Pietro",
""
],
[
"Kimmig",
"Angelika",
""
],
[
"De Raedt",
"Luc",
""
]
] | TITLE: smProbLog: Stable Model Semantics in ProbLog for Probabilistic
Argumentation
ABSTRACT: Argumentation problems are concerned with determining the acceptability of a
set of arguments from their relational structure. When the available
information is uncertain, probabilistic argumentation frameworks provide
modelling tools to account for it. The first contribution of this paper is a
novel interpretation of probabilistic argumentation frameworks as probabilistic
logic programs. Probabilistic logic programs are logic programs in which some
of the facts are annotated with probabilities. We show that the programs
representing probabilistic argumentation frameworks do not satisfy a common
assumption in probabilistic logic programming (PLP) semantics, which is, that
probabilistic facts fully capture the uncertainty in the domain under
investigation. The second contribution of this paper is then a novel PLP
semantics for programs where a choice of probabilistic facts does not uniquely
determine the truth assignment of the logical atoms. The third contribution of
this paper is the implementation of a PLP system supporting this semantics:
smProbLog. smProbLog is a novel PLP framework based on the probabilistic logic
programming language ProbLog. smProbLog supports many inference and learning
tasks typical of PLP, which, together with our first contribution, provide
novel reasoning tools for probabilistic argumentation. We evaluate our approach
with experiments analyzing the computational cost of the proposed algorithms
and their application to a dataset of argumentation problems.
| no_new_dataset | 0.709038 |
2304.02455 | Maximilian Stubbemann | Maximilian Stubbemann, Tobias Hille, Tom Hanika | Selecting Features by their Resilience to the Curse of Dimensionality | 16 pages, 1 figure, 2 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real-world datasets are often of high dimension and effected by the curse of
dimensionality. This hinders their comprehensibility and interpretability. To
reduce the complexity feature selection aims to identify features that are
crucial to learn from said data. While measures of relevance and pairwise
similarities are commonly used, the curse of dimensionality is rarely
incorporated into the process of selecting features. Here we step in with a
novel method that identifies the features that allow to discriminate data
subsets of different sizes. By adapting recent work on computing intrinsic
dimensionalities, our method is able to select the features that can
discriminate data and thus weaken the curse of dimensionality. Our experiments
show that our method is competitive and commonly outperforms established
feature selection methods. Furthermore, we propose an approximation that allows
our method to scale to datasets consisting of millions of data points. Our
findings suggest that features that discriminate data and are connected to a
low intrinsic dimensionality are meaningful for learning procedures.
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2023 14:26:23 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 11:56:50 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Stubbemann",
"Maximilian",
""
],
[
"Hille",
"Tobias",
""
],
[
"Hanika",
"Tom",
""
]
] | TITLE: Selecting Features by their Resilience to the Curse of Dimensionality
ABSTRACT: Real-world datasets are often of high dimension and effected by the curse of
dimensionality. This hinders their comprehensibility and interpretability. To
reduce the complexity feature selection aims to identify features that are
crucial to learn from said data. While measures of relevance and pairwise
similarities are commonly used, the curse of dimensionality is rarely
incorporated into the process of selecting features. Here we step in with a
novel method that identifies the features that allow to discriminate data
subsets of different sizes. By adapting recent work on computing intrinsic
dimensionalities, our method is able to select the features that can
discriminate data and thus weaken the curse of dimensionality. Our experiments
show that our method is competitive and commonly outperforms established
feature selection methods. Furthermore, we propose an approximation that allows
our method to scale to datasets consisting of millions of data points. Our
findings suggest that features that discriminate data and are connected to a
low intrinsic dimensionality are meaningful for learning procedures.
| no_new_dataset | 0.709453 |
2304.02531 | Heejong Kim | Heejong Kim and Mert R. Sabuncu | Learning to Compare Longitudinal Images | to be published in MIDL 2023 | null | null | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Longitudinal studies, where a series of images from the same set of
individuals are acquired at different time-points, represent a popular
technique for studying and characterizing temporal dynamics in biomedical
applications. The classical approach for longitudinal comparison involves
normalizing for nuisance variations, such as image orientation or contrast
differences, via pre-processing. Statistical analysis is, in turn, conducted to
detect changes of interest, either at the individual or population level. This
classical approach can suffer from pre-processing issues and limitations of the
statistical modeling. For example, normalizing for nuisance variation might be
hard in settings where there are a lot of idiosyncratic changes. In this paper,
we present a simple machine learning-based approach that can alleviate these
issues. In our approach, we train a deep learning model (called PaIRNet, for
Pairwise Image Ranking Network) to compare pairs of longitudinal images, with
or without supervision. In the self-supervised setup, for instance, the model
is trained to temporally order the images, which requires learning to recognize
time-irreversible changes. Our results from four datasets demonstrate that
PaIRNet can be very effective in localizing and quantifying meaningful
longitudinal changes while discounting nuisance variation. Our code is
available at
\url{https://github.com/heejong-kim/learning-to-compare-longitudinal-images.git}
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2023 15:52:07 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 15:38:56 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kim",
"Heejong",
""
],
[
"Sabuncu",
"Mert R.",
""
]
] | TITLE: Learning to Compare Longitudinal Images
ABSTRACT: Longitudinal studies, where a series of images from the same set of
individuals are acquired at different time-points, represent a popular
technique for studying and characterizing temporal dynamics in biomedical
applications. The classical approach for longitudinal comparison involves
normalizing for nuisance variations, such as image orientation or contrast
differences, via pre-processing. Statistical analysis is, in turn, conducted to
detect changes of interest, either at the individual or population level. This
classical approach can suffer from pre-processing issues and limitations of the
statistical modeling. For example, normalizing for nuisance variation might be
hard in settings where there are a lot of idiosyncratic changes. In this paper,
we present a simple machine learning-based approach that can alleviate these
issues. In our approach, we train a deep learning model (called PaIRNet, for
Pairwise Image Ranking Network) to compare pairs of longitudinal images, with
or without supervision. In the self-supervised setup, for instance, the model
is trained to temporally order the images, which requires learning to recognize
time-irreversible changes. Our results from four datasets demonstrate that
PaIRNet can be very effective in localizing and quantifying meaningful
longitudinal changes while discounting nuisance variation. Our code is
available at
\url{https://github.com/heejong-kim/learning-to-compare-longitudinal-images.git}
| no_new_dataset | 0.71 |
2304.02971 | Dong Hengkui | Hengkui Dong, Xianzhong Long, Yun Li, Lei Chen | Synthetic Hard Negative Samples for Contrastive Learning | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contrastive learning has emerged as an essential approach for self-supervised
learning in visual representation learning. The central objective of
contrastive learning is to maximize the similarities between two augmented
versions of an image (positive pairs), while minimizing the similarities
between different images (negative pairs). Recent studies have demonstrated
that harder negative samples, i.e., those that are more difficult to
differentiate from the anchor sample, perform a more crucial function in
contrastive learning. This paper proposes a novel feature-level method, namely
sampling synthetic hard negative samples for contrastive learning (SSCL), to
exploit harder negative samples more effectively. Specifically, 1) we generate
more and harder negative samples by mixing negative samples, and then sample
them by controlling the contrast of anchor sample with the other negative
samples; 2) considering the possibility of false negative samples, we further
debias the negative samples. Our proposed method improves the classification
performance on different image datasets and can be readily integrated into
existing methods.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 09:54:35 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 15:44:10 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Dong",
"Hengkui",
""
],
[
"Long",
"Xianzhong",
""
],
[
"Li",
"Yun",
""
],
[
"Chen",
"Lei",
""
]
] | TITLE: Synthetic Hard Negative Samples for Contrastive Learning
ABSTRACT: Contrastive learning has emerged as an essential approach for self-supervised
learning in visual representation learning. The central objective of
contrastive learning is to maximize the similarities between two augmented
versions of an image (positive pairs), while minimizing the similarities
between different images (negative pairs). Recent studies have demonstrated
that harder negative samples, i.e., those that are more difficult to
differentiate from the anchor sample, perform a more crucial function in
contrastive learning. This paper proposes a novel feature-level method, namely
sampling synthetic hard negative samples for contrastive learning (SSCL), to
exploit harder negative samples more effectively. Specifically, 1) we generate
more and harder negative samples by mixing negative samples, and then sample
them by controlling the contrast of anchor sample with the other negative
samples; 2) considering the possibility of false negative samples, we further
debias the negative samples. Our proposed method improves the classification
performance on different image datasets and can be readily integrated into
existing methods.
| no_new_dataset | 0.710427 |
2304.03054 | Wei Yuan | Wei Yuan, Quoc Viet Hung Nguyen, Tieke He, Liang Chen, Hongzhi Yin | Manipulating Federated Recommender Systems: Poisoning with Synthetic
Users and Its Countermeasures | This paper has been accepted by SIGIR2023 | null | null | null | cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Federated Recommender Systems (FedRecs) are considered privacy-preserving
techniques to collaboratively learn a recommendation model without sharing user
data. Since all participants can directly influence the systems by uploading
gradients, FedRecs are vulnerable to poisoning attacks of malicious clients.
However, most existing poisoning attacks on FedRecs are either based on some
prior knowledge or with less effectiveness. To reveal the real vulnerability of
FedRecs, in this paper, we present a new poisoning attack method to manipulate
target items' ranks and exposure rates effectively in the top-$K$
recommendation without relying on any prior knowledge. Specifically, our attack
manipulates target items' exposure rate by a group of synthetic malicious users
who upload poisoned gradients considering target items' alternative products.
We conduct extensive experiments with two widely used FedRecs (Fed-NCF and
Fed-LightGCN) on two real-world recommendation datasets. The experimental
results show that our attack can significantly improve the exposure rate of
unpopular target items with extremely fewer malicious users and fewer global
epochs than state-of-the-art attacks. In addition to disclosing the security
hole, we design a novel countermeasure for poisoning attacks on FedRecs.
Specifically, we propose a hierarchical gradient clipping with sparsified
updating to defend against existing poisoning attacks. The empirical results
demonstrate that the proposed defending mechanism improves the robustness of
FedRecs.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 13:13:53 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2023 01:34:31 GMT"
},
{
"version": "v3",
"created": "Sat, 15 Apr 2023 11:30:53 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Yuan",
"Wei",
""
],
[
"Nguyen",
"Quoc Viet Hung",
""
],
[
"He",
"Tieke",
""
],
[
"Chen",
"Liang",
""
],
[
"Yin",
"Hongzhi",
""
]
] | TITLE: Manipulating Federated Recommender Systems: Poisoning with Synthetic
Users and Its Countermeasures
ABSTRACT: Federated Recommender Systems (FedRecs) are considered privacy-preserving
techniques to collaboratively learn a recommendation model without sharing user
data. Since all participants can directly influence the systems by uploading
gradients, FedRecs are vulnerable to poisoning attacks of malicious clients.
However, most existing poisoning attacks on FedRecs are either based on some
prior knowledge or with less effectiveness. To reveal the real vulnerability of
FedRecs, in this paper, we present a new poisoning attack method to manipulate
target items' ranks and exposure rates effectively in the top-$K$
recommendation without relying on any prior knowledge. Specifically, our attack
manipulates target items' exposure rate by a group of synthetic malicious users
who upload poisoned gradients considering target items' alternative products.
We conduct extensive experiments with two widely used FedRecs (Fed-NCF and
Fed-LightGCN) on two real-world recommendation datasets. The experimental
results show that our attack can significantly improve the exposure rate of
unpopular target items with extremely fewer malicious users and fewer global
epochs than state-of-the-art attacks. In addition to disclosing the security
hole, we design a novel countermeasure for poisoning attacks on FedRecs.
Specifically, we propose a hierarchical gradient clipping with sparsified
updating to defend against existing poisoning attacks. The empirical results
demonstrate that the proposed defending mechanism improves the robustness of
FedRecs.
| no_new_dataset | 0.708843 |
2304.04494 | Liang Chen | Liang Chen, Yong Zhang, Yibing Song, Ying Shan, Lingqiao Liu | Improved Test-Time Adaptation for Domain Generalization | Accepted by CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main challenge in domain generalization (DG) is to handle the
distribution shift problem that lies between the training and test data. Recent
studies suggest that test-time training (TTT), which adapts the learned model
with test data, might be a promising solution to the problem. Generally, a TTT
strategy hinges its performance on two main factors: selecting an appropriate
auxiliary TTT task for updating and identifying reliable parameters to update
during the test phase. Both previous arts and our experiments indicate that TTT
may not improve but be detrimental to the learned model if those two factors
are not properly considered. This work addresses those two factors by proposing
an Improved Test-Time Adaptation (ITTA) method. First, instead of heuristically
defining an auxiliary objective, we propose a learnable consistency loss for
the TTT task, which contains learnable parameters that can be adjusted toward
better alignment between our TTT task and the main prediction task. Second, we
introduce additional adaptive parameters for the trained model, and we suggest
only updating the adaptive parameters during the test phase. Through extensive
experiments, we show that the proposed two strategies are beneficial for the
learned model (see Figure 1), and ITTA could achieve superior performance to
the current state-of-the-art methods on several DG benchmarks. Code is
available at https://github.com/liangchen527/ITTA.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2023 10:12:38 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 12:30:38 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Chen",
"Liang",
""
],
[
"Zhang",
"Yong",
""
],
[
"Song",
"Yibing",
""
],
[
"Shan",
"Ying",
""
],
[
"Liu",
"Lingqiao",
""
]
] | TITLE: Improved Test-Time Adaptation for Domain Generalization
ABSTRACT: The main challenge in domain generalization (DG) is to handle the
distribution shift problem that lies between the training and test data. Recent
studies suggest that test-time training (TTT), which adapts the learned model
with test data, might be a promising solution to the problem. Generally, a TTT
strategy hinges its performance on two main factors: selecting an appropriate
auxiliary TTT task for updating and identifying reliable parameters to update
during the test phase. Both previous arts and our experiments indicate that TTT
may not improve but be detrimental to the learned model if those two factors
are not properly considered. This work addresses those two factors by proposing
an Improved Test-Time Adaptation (ITTA) method. First, instead of heuristically
defining an auxiliary objective, we propose a learnable consistency loss for
the TTT task, which contains learnable parameters that can be adjusted toward
better alignment between our TTT task and the main prediction task. Second, we
introduce additional adaptive parameters for the trained model, and we suggest
only updating the adaptive parameters during the test phase. Through extensive
experiments, we show that the proposed two strategies are beneficial for the
learned model (see Figure 1), and ITTA could achieve superior performance to
the current state-of-the-art methods on several DG benchmarks. Code is
available at https://github.com/liangchen527/ITTA.
| no_new_dataset | 0.70825 |
2304.04579 | Cristiano Patr\'icio | Cristiano Patr\'icio, Jo\~ao C. Neves, Lu\'is F. Teixeira | Coherent Concept-based Explanations in Medical Image and Its Application
to Skin Lesion Diagnosis | Under IEEE Copyright. Accepted for publication at CVPR 2023 Workshop
Safe Artificial Intelligence for All Domains (SAIAD) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Early detection of melanoma is crucial for preventing severe complications
and increasing the chances of successful treatment. Existing deep learning
approaches for melanoma skin lesion diagnosis are deemed black-box models, as
they omit the rationale behind the model prediction, compromising the
trustworthiness and acceptability of these diagnostic methods. Attempts to
provide concept-based explanations are based on post-hoc approaches, which
depend on an additional model to derive interpretations. In this paper, we
propose an inherently interpretable framework to improve the interpretability
of concept-based models by incorporating a hard attention mechanism and a
coherence loss term to assure the visual coherence of concept activations by
the concept encoder, without requiring the supervision of additional
annotations. The proposed framework explains its decision in terms of
human-interpretable concepts and their respective contribution to the final
prediction, as well as a visual interpretation of the locations where the
concept is present in the image. Experiments on skin image datasets demonstrate
that our method outperforms existing black-box and concept-based models for
skin lesion classification.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2023 13:32:04 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 09:20:43 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Patrício",
"Cristiano",
""
],
[
"Neves",
"João C.",
""
],
[
"Teixeira",
"Luís F.",
""
]
] | TITLE: Coherent Concept-based Explanations in Medical Image and Its Application
to Skin Lesion Diagnosis
ABSTRACT: Early detection of melanoma is crucial for preventing severe complications
and increasing the chances of successful treatment. Existing deep learning
approaches for melanoma skin lesion diagnosis are deemed black-box models, as
they omit the rationale behind the model prediction, compromising the
trustworthiness and acceptability of these diagnostic methods. Attempts to
provide concept-based explanations are based on post-hoc approaches, which
depend on an additional model to derive interpretations. In this paper, we
propose an inherently interpretable framework to improve the interpretability
of concept-based models by incorporating a hard attention mechanism and a
coherence loss term to assure the visual coherence of concept activations by
the concept encoder, without requiring the supervision of additional
annotations. The proposed framework explains its decision in terms of
human-interpretable concepts and their respective contribution to the final
prediction, as well as a visual interpretation of the locations where the
concept is present in the image. Experiments on skin image datasets demonstrate
that our method outperforms existing black-box and concept-based models for
skin lesion classification.
| no_new_dataset | 0.709648 |
2304.04971 | Yiyan Xu | Wenjie Wang, Yiyan Xu, Fuli Feng, Xinyu Lin, Xiangnan He, Tat-Seng
Chua | Diffusion Recommender Model | 10 pages, 7 figures, accepted for publication in SIGIR'23 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generative models such as Generative Adversarial Networks (GANs) and
Variational Auto-Encoders (VAEs) are widely utilized to model the generative
process of user interactions. However, these generative models suffer from
intrinsic limitations such as the instability of GANs and the restricted
representation ability of VAEs. Such limitations hinder the accurate modeling
of the complex user interaction generation procedure, such as noisy
interactions caused by various interference factors. In light of the impressive
advantages of Diffusion Models (DMs) over traditional generative models in
image synthesis, we propose a novel Diffusion Recommender Model (named DiffRec)
to learn the generative process in a denoising manner. To retain personalized
information in user interactions, DiffRec reduces the added noises and avoids
corrupting users' interactions into pure noises like in image synthesis. In
addition, we extend traditional DMs to tackle the unique challenges in
practical recommender systems: high resource costs for large-scale item
prediction and temporal shifts of user preference. To this end, we propose two
extensions of DiffRec: L-DiffRec clusters items for dimension compression and
conducts the diffusion processes in the latent space; and T-DiffRec reweights
user interactions based on the interaction timestamps to encode temporal
information. We conduct extensive experiments on three datasets under multiple
settings (e.g. clean training, noisy training, and temporal training). The
empirical results and in-depth analysis validate the superiority of DiffRec
with two extensions over competitive baselines.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2023 04:31:00 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 13:20:22 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Wenjie",
""
],
[
"Xu",
"Yiyan",
""
],
[
"Feng",
"Fuli",
""
],
[
"Lin",
"Xinyu",
""
],
[
"He",
"Xiangnan",
""
],
[
"Chua",
"Tat-Seng",
""
]
] | TITLE: Diffusion Recommender Model
ABSTRACT: Generative models such as Generative Adversarial Networks (GANs) and
Variational Auto-Encoders (VAEs) are widely utilized to model the generative
process of user interactions. However, these generative models suffer from
intrinsic limitations such as the instability of GANs and the restricted
representation ability of VAEs. Such limitations hinder the accurate modeling
of the complex user interaction generation procedure, such as noisy
interactions caused by various interference factors. In light of the impressive
advantages of Diffusion Models (DMs) over traditional generative models in
image synthesis, we propose a novel Diffusion Recommender Model (named DiffRec)
to learn the generative process in a denoising manner. To retain personalized
information in user interactions, DiffRec reduces the added noises and avoids
corrupting users' interactions into pure noises like in image synthesis. In
addition, we extend traditional DMs to tackle the unique challenges in
practical recommender systems: high resource costs for large-scale item
prediction and temporal shifts of user preference. To this end, we propose two
extensions of DiffRec: L-DiffRec clusters items for dimension compression and
conducts the diffusion processes in the latent space; and T-DiffRec reweights
user interactions based on the interaction timestamps to encode temporal
information. We conduct extensive experiments on three datasets under multiple
settings (e.g. clean training, noisy training, and temporal training). The
empirical results and in-depth analysis validate the superiority of DiffRec
with two extensions over competitive baselines.
| no_new_dataset | 0.710415 |
2304.05172 | Hui Li | Hui Li, Tianyang Xu, Xiao-Jun Wu, Jiwen Lu, Josef Kittler | LRRNet: A Novel Representation Learning Guided Fusion Network for
Infrared and Visible Images | 14 pages, 15 figures, 8 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning based fusion methods have been achieving promising performance
in image fusion tasks. This is attributed to the network architecture that
plays a very important role in the fusion process. However, in general, it is
hard to specify a good fusion architecture, and consequently, the design of
fusion networks is still a black art, rather than science. To address this
problem, we formulate the fusion task mathematically, and establish a
connection between its optimal solution and the network architecture that can
implement it. This approach leads to a novel method proposed in the paper of
constructing a lightweight fusion network. It avoids the time-consuming
empirical network design by a trial-and-test strategy. In particular we adopt a
learnable representation approach to the fusion task, in which the construction
of the fusion network architecture is guided by the optimisation algorithm
producing the learnable model. The low-rank representation (LRR) objective is
the foundation of our learnable model. The matrix multiplications, which are at
the heart of the solution are transformed into convolutional operations, and
the iterative process of optimisation is replaced by a special feed-forward
network. Based on this novel network architecture, an end-to-end lightweight
fusion network is constructed to fuse infrared and visible light images. Its
successful training is facilitated by a detail-to-semantic information loss
function proposed to preserve the image details and to enhance the salient
features of the source images. Our experiments show that the proposed fusion
network exhibits better fusion performance than the state-of-the-art fusion
methods on public datasets. Interestingly, our network requires a fewer
training parameters than other existing methods. The codes are available at
https://github.com/hli1221/imagefusion-LRRNet
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2023 12:11:23 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 12:42:14 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Li",
"Hui",
""
],
[
"Xu",
"Tianyang",
""
],
[
"Wu",
"Xiao-Jun",
""
],
[
"Lu",
"Jiwen",
""
],
[
"Kittler",
"Josef",
""
]
] | TITLE: LRRNet: A Novel Representation Learning Guided Fusion Network for
Infrared and Visible Images
ABSTRACT: Deep learning based fusion methods have been achieving promising performance
in image fusion tasks. This is attributed to the network architecture that
plays a very important role in the fusion process. However, in general, it is
hard to specify a good fusion architecture, and consequently, the design of
fusion networks is still a black art, rather than science. To address this
problem, we formulate the fusion task mathematically, and establish a
connection between its optimal solution and the network architecture that can
implement it. This approach leads to a novel method proposed in the paper of
constructing a lightweight fusion network. It avoids the time-consuming
empirical network design by a trial-and-test strategy. In particular we adopt a
learnable representation approach to the fusion task, in which the construction
of the fusion network architecture is guided by the optimisation algorithm
producing the learnable model. The low-rank representation (LRR) objective is
the foundation of our learnable model. The matrix multiplications, which are at
the heart of the solution are transformed into convolutional operations, and
the iterative process of optimisation is replaced by a special feed-forward
network. Based on this novel network architecture, an end-to-end lightweight
fusion network is constructed to fuse infrared and visible light images. Its
successful training is facilitated by a detail-to-semantic information loss
function proposed to preserve the image details and to enhance the salient
features of the source images. Our experiments show that the proposed fusion
network exhibits better fusion performance than the state-of-the-art fusion
methods on public datasets. Interestingly, our network requires a fewer
training parameters than other existing methods. The codes are available at
https://github.com/hli1221/imagefusion-LRRNet
| no_new_dataset | 0.710396 |
2304.06002 | Hao Xu | Bo Li, YiHua Chen, Hao Xu and Fei Zhong | Fast vehicle detection algorithm based on lightweight YOLO7-tiny | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The swift and precise detection of vehicles plays a significant role in
intelligent transportation systems. Current vehicle detection algorithms
encounter challenges of high computational complexity, low detection rate, and
limited feasibility on mobile devices. To address these issues, this paper
proposes a lightweight vehicle detection algorithm based on YOLOv7-tiny (You
Only Look Once version seven) called Ghost-YOLOv7. The width of model is scaled
to 0.5 and the standard convolution of the backbone network is replaced with
Ghost convolution to achieve a lighter network and improve the detection speed;
then a self-designed Ghost bi-directional feature pyramid network (Ghost-BiFPN)
is embedded into the neck network to enhance feature extraction capability of
the algorithm and enriches semantic information; and a Ghost Decouoled Head
(GDH) is employed for accurate prediction of vehicle location and species;
finally, a coordinate attention mechanism is introduced into the output layer
to suppress environmental interference. The WIoU loss function is employed to
further enhance the detection accuracy. Ablation experiments results on the
PASCAL VOC dataset demonstrate that Ghost-YOLOv7 outperforms the original
YOLOv7-tiny model. It achieving a 29.8% reduction in computation, 37.3%
reduction in the number of parameters, 35.1% reduction in model weights, 1.1%
higher mean average precision (mAP), the detection speed is higher 27FPS
compared with the original algorithm. Ghost-YOLOv7 was also compared on KITTI
and BIT-vehicle datasets as well, and the results show that this algorithm has
the overall best performance.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2023 17:28:30 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2023 03:38:22 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Apr 2023 06:47:01 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Li",
"Bo",
""
],
[
"Chen",
"YiHua",
""
],
[
"Xu",
"Hao",
""
],
[
"Zhong",
"Fei",
""
]
] | TITLE: Fast vehicle detection algorithm based on lightweight YOLO7-tiny
ABSTRACT: The swift and precise detection of vehicles plays a significant role in
intelligent transportation systems. Current vehicle detection algorithms
encounter challenges of high computational complexity, low detection rate, and
limited feasibility on mobile devices. To address these issues, this paper
proposes a lightweight vehicle detection algorithm based on YOLOv7-tiny (You
Only Look Once version seven) called Ghost-YOLOv7. The width of model is scaled
to 0.5 and the standard convolution of the backbone network is replaced with
Ghost convolution to achieve a lighter network and improve the detection speed;
then a self-designed Ghost bi-directional feature pyramid network (Ghost-BiFPN)
is embedded into the neck network to enhance feature extraction capability of
the algorithm and enriches semantic information; and a Ghost Decouoled Head
(GDH) is employed for accurate prediction of vehicle location and species;
finally, a coordinate attention mechanism is introduced into the output layer
to suppress environmental interference. The WIoU loss function is employed to
further enhance the detection accuracy. Ablation experiments results on the
PASCAL VOC dataset demonstrate that Ghost-YOLOv7 outperforms the original
YOLOv7-tiny model. It achieving a 29.8% reduction in computation, 37.3%
reduction in the number of parameters, 35.1% reduction in model weights, 1.1%
higher mean average precision (mAP), the detection speed is higher 27FPS
compared with the original algorithm. Ghost-YOLOv7 was also compared on KITTI
and BIT-vehicle datasets as well, and the results show that this algorithm has
the overall best performance.
| no_new_dataset | 0.709221 |
2304.06017 | Cory Merkel | Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning
Accelerators | Accepted in GLSVLSI 2023 | null | null | null | cs.CR cs.AI cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logic locking has been proposed to safeguard intellectual property (IP)
during chip fabrication. Logic locking techniques protect hardware IP by making
a subset of combinational modules in a design dependent on a secret key that is
withheld from untrusted parties. If an incorrect secret key is used, a set of
deterministic errors is produced in locked modules, restricting unauthorized
use. A common target for logic locking is neural accelerators, especially as
machine-learning-as-a-service becomes more prevalent. In this work, we explore
how logic locking can be used to compromise the security of a neural
accelerator it protects. Specifically, we show how the deterministic errors
caused by incorrect keys can be harnessed to produce neural-trojan-style
backdoors. To do so, we first outline a motivational attack scenario where a
carefully chosen incorrect key, which we call a trojan key, produces
misclassifications for an attacker-specified input class in a locked
accelerator. We then develop a theoretically-robust attack methodology to
automatically identify trojan keys. To evaluate this attack, we launch it on
several locked accelerators. In our largest benchmark accelerator, our attack
identified a trojan key that caused a 74\% decrease in classification accuracy
for attacker-specified trigger inputs, while degrading accuracy by only 1.7\%
for other inputs on average.
| [
{
"version": "v1",
"created": "Wed, 12 Apr 2023 17:55:34 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 20:52:23 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Xu",
"Hongye",
""
],
[
"Liu",
"Dongfang",
""
],
[
"Merkel",
"Cory",
""
],
[
"Zuzak",
"Michael",
""
]
] | TITLE: Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning
Accelerators
ABSTRACT: Logic locking has been proposed to safeguard intellectual property (IP)
during chip fabrication. Logic locking techniques protect hardware IP by making
a subset of combinational modules in a design dependent on a secret key that is
withheld from untrusted parties. If an incorrect secret key is used, a set of
deterministic errors is produced in locked modules, restricting unauthorized
use. A common target for logic locking is neural accelerators, especially as
machine-learning-as-a-service becomes more prevalent. In this work, we explore
how logic locking can be used to compromise the security of a neural
accelerator it protects. Specifically, we show how the deterministic errors
caused by incorrect keys can be harnessed to produce neural-trojan-style
backdoors. To do so, we first outline a motivational attack scenario where a
carefully chosen incorrect key, which we call a trojan key, produces
misclassifications for an attacker-specified input class in a locked
accelerator. We then develop a theoretically-robust attack methodology to
automatically identify trojan keys. To evaluate this attack, we launch it on
several locked accelerators. In our largest benchmark accelerator, our attack
identified a trojan key that caused a 74\% decrease in classification accuracy
for attacker-specified trigger inputs, while degrading accuracy by only 1.7\%
for other inputs on average.
| no_new_dataset | 0.707209 |
2304.06446 | Badri Narayana Patro | Badri N. Patro, Vinay P. Namboodiri, Vijay Srinivas Agneeswaran | SpectFormer: Frequency and Attention is what you need in a Vision
Transformer | The project page is available at this webpage
\url{https://badripatro.github.io/SpectFormers/} | null | null | null | cs.CV cs.AI cs.CL cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Vision transformers have been applied successfully for image recognition
tasks. There have been either multi-headed self-attention based (ViT
\cite{dosovitskiy2020image}, DeIT, \cite{touvron2021training}) similar to the
original work in textual models or more recently based on spectral layers
(Fnet\cite{lee2021fnet}, GFNet\cite{rao2021global},
AFNO\cite{guibas2021efficient}). We hypothesize that both spectral and
multi-headed attention plays a major role. We investigate this hypothesis
through this work and observe that indeed combining spectral and multi-headed
attention layers provides a better transformer architecture. We thus propose
the novel Spectformer architecture for transformers that combines spectral and
multi-headed attention layers. We believe that the resulting representation
allows the transformer to capture the feature representation appropriately and
it yields improved performance over other transformer representations. For
instance, it improves the top-1 accuracy by 2\% on ImageNet compared to both
GFNet-H and LiT. SpectFormer-S reaches 84.25\% top-1 accuracy on ImageNet-1K
(state of the art for small version). Further, Spectformer-L achieves 85.7\%
that is the state of the art for the comparable base version of the
transformers. We further ensure that we obtain reasonable results in other
scenarios such as transfer learning on standard datasets such as CIFAR-10,
CIFAR-100, Oxford-IIIT-flower, and Standford Car datasets. We then investigate
its use in downstream tasks such of object detection and instance segmentation
on the MS-COCO dataset and observe that Spectformer shows consistent
performance that is comparable to the best backbones and can be further
optimized and improved. Hence, we believe that combined spectral and attention
layers are what are needed for vision transformers.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2023 12:27:17 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 22:20:46 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Patro",
"Badri N.",
""
],
[
"Namboodiri",
"Vinay P.",
""
],
[
"Agneeswaran",
"Vijay Srinivas",
""
]
] | TITLE: SpectFormer: Frequency and Attention is what you need in a Vision
Transformer
ABSTRACT: Vision transformers have been applied successfully for image recognition
tasks. There have been either multi-headed self-attention based (ViT
\cite{dosovitskiy2020image}, DeIT, \cite{touvron2021training}) similar to the
original work in textual models or more recently based on spectral layers
(Fnet\cite{lee2021fnet}, GFNet\cite{rao2021global},
AFNO\cite{guibas2021efficient}). We hypothesize that both spectral and
multi-headed attention plays a major role. We investigate this hypothesis
through this work and observe that indeed combining spectral and multi-headed
attention layers provides a better transformer architecture. We thus propose
the novel Spectformer architecture for transformers that combines spectral and
multi-headed attention layers. We believe that the resulting representation
allows the transformer to capture the feature representation appropriately and
it yields improved performance over other transformer representations. For
instance, it improves the top-1 accuracy by 2\% on ImageNet compared to both
GFNet-H and LiT. SpectFormer-S reaches 84.25\% top-1 accuracy on ImageNet-1K
(state of the art for small version). Further, Spectformer-L achieves 85.7\%
that is the state of the art for the comparable base version of the
transformers. We further ensure that we obtain reasonable results in other
scenarios such as transfer learning on standard datasets such as CIFAR-10,
CIFAR-100, Oxford-IIIT-flower, and Standford Car datasets. We then investigate
its use in downstream tasks such of object detection and instance segmentation
on the MS-COCO dataset and observe that Spectformer shows consistent
performance that is comparable to the best backbones and can be further
optimized and improved. Hence, we believe that combined spectral and attention
layers are what are needed for vision transformers.
| no_new_dataset | 0.710226 |
2304.06943 | Qingsen Yan | Qingsen Yan, Weiye Chen, Song Zhang, Yu Zhu, Jinqiu Sun, Yanning Zhang | A Unified HDR Imaging Method with Pixel and Patch Level | accepted by CVPR2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mapping Low Dynamic Range (LDR) images with different exposures to High
Dynamic Range (HDR) remains nontrivial and challenging on dynamic scenes due to
ghosting caused by object motion or camera jitting. With the success of Deep
Neural Networks (DNNs), several DNNs-based methods have been proposed to
alleviate ghosting, they cannot generate approving results when motion and
saturation occur. To generate visually pleasing HDR images in various cases, we
propose a hybrid HDR deghosting network, called HyHDRNet, to learn the
complicated relationship between reference and non-reference images. The
proposed HyHDRNet consists of a content alignment subnetwork and a
Transformer-based fusion subnetwork. Specifically, to effectively avoid
ghosting from the source, the content alignment subnetwork uses patch
aggregation and ghost attention to integrate similar content from other
non-reference images with patch level and suppress undesired components with
pixel level. To achieve mutual guidance between patch-level and pixel-level, we
leverage a gating module to sufficiently swap useful information both in
ghosted and saturated regions. Furthermore, to obtain a high-quality HDR image,
the Transformer-based fusion subnetwork uses a Residual Deformable Transformer
Block (RDTB) to adaptively merge information for different exposed regions. We
examined the proposed method on four widely used public HDR image deghosting
datasets. Experiments demonstrate that HyHDRNet outperforms state-of-the-art
methods both quantitatively and qualitatively, achieving appealing HDR
visualization with unified textures and colors.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 06:21:57 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2023 01:38:17 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Yan",
"Qingsen",
""
],
[
"Chen",
"Weiye",
""
],
[
"Zhang",
"Song",
""
],
[
"Zhu",
"Yu",
""
],
[
"Sun",
"Jinqiu",
""
],
[
"Zhang",
"Yanning",
""
]
] | TITLE: A Unified HDR Imaging Method with Pixel and Patch Level
ABSTRACT: Mapping Low Dynamic Range (LDR) images with different exposures to High
Dynamic Range (HDR) remains nontrivial and challenging on dynamic scenes due to
ghosting caused by object motion or camera jitting. With the success of Deep
Neural Networks (DNNs), several DNNs-based methods have been proposed to
alleviate ghosting, they cannot generate approving results when motion and
saturation occur. To generate visually pleasing HDR images in various cases, we
propose a hybrid HDR deghosting network, called HyHDRNet, to learn the
complicated relationship between reference and non-reference images. The
proposed HyHDRNet consists of a content alignment subnetwork and a
Transformer-based fusion subnetwork. Specifically, to effectively avoid
ghosting from the source, the content alignment subnetwork uses patch
aggregation and ghost attention to integrate similar content from other
non-reference images with patch level and suppress undesired components with
pixel level. To achieve mutual guidance between patch-level and pixel-level, we
leverage a gating module to sufficiently swap useful information both in
ghosted and saturated regions. Furthermore, to obtain a high-quality HDR image,
the Transformer-based fusion subnetwork uses a Residual Deformable Transformer
Block (RDTB) to adaptively merge information for different exposed regions. We
examined the proposed method on four widely used public HDR image deghosting
datasets. Experiments demonstrate that HyHDRNet outperforms state-of-the-art
methods both quantitatively and qualitatively, achieving appealing HDR
visualization with unified textures and colors.
| no_new_dataset | 0.710208 |
2304.07299 | Khaoula Chtouki | Khaoula Chtouki, Maryem Rhanoui, Mounia Mikram, Kamelia Amazian, Siham
Yousfi | Supervised Machine Learning for Breast Cancer Risk Factors Analysis and
Survival Prediction | null | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The choice of the most effective treatment may eventually be influenced by
breast cancer survival prediction. To predict the chances of a patient
surviving, a variety of techniques were employed, such as statistical, machine
learning, and deep learning models. In the current study, 1904 patient records
from the METABRIC dataset were utilized to predict a 5-year breast cancer
survival using a machine learning approach. In this study, we compare the
outcomes of seven classification models to evaluate how well they perform using
the following metrics: recall, AUC, confusion matrix, accuracy, precision,
false positive rate, and true positive rate. The findings demonstrate that the
classifiers for Logistic Regression (LR), Support Vector Machines (SVM),
Decision Tree (DT), Random Forest (RD), Extremely Randomized Trees (ET),
K-Nearest Neighbor (KNN), and Adaptive Boosting (AdaBoost) can accurately
predict the survival rate of the tested samples, which is 75,4\%, 74,7\%,
71,5\%, 75,5\%, 70,3\%, and 78 percent.
| [
{
"version": "v1",
"created": "Thu, 13 Apr 2023 12:32:14 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Chtouki",
"Khaoula",
""
],
[
"Rhanoui",
"Maryem",
""
],
[
"Mikram",
"Mounia",
""
],
[
"Amazian",
"Kamelia",
""
],
[
"Yousfi",
"Siham",
""
]
] | TITLE: Supervised Machine Learning for Breast Cancer Risk Factors Analysis and
Survival Prediction
ABSTRACT: The choice of the most effective treatment may eventually be influenced by
breast cancer survival prediction. To predict the chances of a patient
surviving, a variety of techniques were employed, such as statistical, machine
learning, and deep learning models. In the current study, 1904 patient records
from the METABRIC dataset were utilized to predict a 5-year breast cancer
survival using a machine learning approach. In this study, we compare the
outcomes of seven classification models to evaluate how well they perform using
the following metrics: recall, AUC, confusion matrix, accuracy, precision,
false positive rate, and true positive rate. The findings demonstrate that the
classifiers for Logistic Regression (LR), Support Vector Machines (SVM),
Decision Tree (DT), Random Forest (RD), Extremely Randomized Trees (ET),
K-Nearest Neighbor (KNN), and Adaptive Boosting (AdaBoost) can accurately
predict the survival rate of the tested samples, which is 75,4\%, 74,7\%,
71,5\%, 75,5\%, 70,3\%, and 78 percent.
| no_new_dataset | 0.71022 |
2304.07306 | Patrick Hemmer | Patrick Hemmer, Lukas Thede, Michael V\"ossing, Johannes Jakubik,
Niklas K\"uhl | Learning to Defer with Limited Expert Predictions | 37th AAAI Conference on Artificial Intelligence (AAAI-23) | null | null | null | cs.LG cs.AI cs.HC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Recent research suggests that combining AI models with a human expert can
exceed the performance of either alone. The combination of their capabilities
is often realized by learning to defer algorithms that enable the AI to learn
to decide whether to make a prediction for a particular instance or defer it to
the human expert. However, to accurately learn which instances should be
deferred to the human expert, a large number of expert predictions that
accurately reflect the expert's capabilities are required -- in addition to the
ground truth labels needed to train the AI. This requirement shared by many
learning to defer algorithms hinders their adoption in scenarios where the
responsible expert regularly changes or where acquiring a sufficient number of
expert predictions is costly. In this paper, we propose a three-step approach
to reduce the number of expert predictions required to train learning to defer
algorithms. It encompasses (1) the training of an embedding model with ground
truth labels to generate feature representations that serve as a basis for (2)
the training of an expertise predictor model to approximate the expert's
capabilities. (3) The expertise predictor generates artificial expert
predictions for instances not yet labeled by the expert, which are required by
the learning to defer algorithms. We evaluate our approach on two public
datasets. One with "synthetically" generated human experts and another from the
medical domain containing real-world radiologists' predictions. Our experiments
show that the approach allows the training of various learning to defer
algorithms with a minimal number of human expert predictions. Furthermore, we
demonstrate that even a small number of expert predictions per class is
sufficient for these algorithms to exceed the performance the AI and the human
expert can achieve individually.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 09:22:34 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Hemmer",
"Patrick",
""
],
[
"Thede",
"Lukas",
""
],
[
"Vössing",
"Michael",
""
],
[
"Jakubik",
"Johannes",
""
],
[
"Kühl",
"Niklas",
""
]
] | TITLE: Learning to Defer with Limited Expert Predictions
ABSTRACT: Recent research suggests that combining AI models with a human expert can
exceed the performance of either alone. The combination of their capabilities
is often realized by learning to defer algorithms that enable the AI to learn
to decide whether to make a prediction for a particular instance or defer it to
the human expert. However, to accurately learn which instances should be
deferred to the human expert, a large number of expert predictions that
accurately reflect the expert's capabilities are required -- in addition to the
ground truth labels needed to train the AI. This requirement shared by many
learning to defer algorithms hinders their adoption in scenarios where the
responsible expert regularly changes or where acquiring a sufficient number of
expert predictions is costly. In this paper, we propose a three-step approach
to reduce the number of expert predictions required to train learning to defer
algorithms. It encompasses (1) the training of an embedding model with ground
truth labels to generate feature representations that serve as a basis for (2)
the training of an expertise predictor model to approximate the expert's
capabilities. (3) The expertise predictor generates artificial expert
predictions for instances not yet labeled by the expert, which are required by
the learning to defer algorithms. We evaluate our approach on two public
datasets. One with "synthetically" generated human experts and another from the
medical domain containing real-world radiologists' predictions. Our experiments
show that the approach allows the training of various learning to defer
algorithms with a minimal number of human expert predictions. Furthermore, we
demonstrate that even a small number of expert predictions per class is
sufficient for these algorithms to exceed the performance the AI and the human
expert can achieve individually.
| no_new_dataset | 0.711588 |
2304.07314 | Alexander Koenig | Alexander Koenig, Maximilian Schambach, Johannes Otterbach | Uncovering the Inner Workings of STEGO for Safe Unsupervised Semantic
Segmentation | 8 Pages + 2 Pages Appendix. Accepted at CVPR 2023 SAIAD Workshop | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-supervised pre-training strategies have recently shown impressive
results for training general-purpose feature extraction backbones in computer
vision. In combination with the Vision Transformer architecture, the DINO
self-distillation technique has interesting emerging properties, such as
unsupervised clustering in the latent space and semantic correspondences of the
produced features without using explicit human-annotated labels. The STEGO
method for unsupervised semantic segmentation contrastively distills feature
correspondences of a DINO-pre-trained Vision Transformer and recently set a new
state of the art. However, the detailed workings of STEGO have yet to be
disentangled, preventing its usage in safety-critical applications. This paper
provides a deeper understanding of the STEGO architecture and training strategy
by conducting studies that uncover the working mechanisms behind STEGO,
reproduce and extend its experimental validation, and investigate the ability
of STEGO to transfer to different datasets. Results demonstrate that the STEGO
architecture can be interpreted as a semantics-preserving dimensionality
reduction technique.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 15:30:26 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Koenig",
"Alexander",
""
],
[
"Schambach",
"Maximilian",
""
],
[
"Otterbach",
"Johannes",
""
]
] | TITLE: Uncovering the Inner Workings of STEGO for Safe Unsupervised Semantic
Segmentation
ABSTRACT: Self-supervised pre-training strategies have recently shown impressive
results for training general-purpose feature extraction backbones in computer
vision. In combination with the Vision Transformer architecture, the DINO
self-distillation technique has interesting emerging properties, such as
unsupervised clustering in the latent space and semantic correspondences of the
produced features without using explicit human-annotated labels. The STEGO
method for unsupervised semantic segmentation contrastively distills feature
correspondences of a DINO-pre-trained Vision Transformer and recently set a new
state of the art. However, the detailed workings of STEGO have yet to be
disentangled, preventing its usage in safety-critical applications. This paper
provides a deeper understanding of the STEGO architecture and training strategy
by conducting studies that uncover the working mechanisms behind STEGO,
reproduce and extend its experimental validation, and investigate the ability
of STEGO to transfer to different datasets. Results demonstrate that the STEGO
architecture can be interpreted as a semantics-preserving dimensionality
reduction technique.
| no_new_dataset | 0.709019 |
2304.07338 | David Bauer | David Bauer, Qi Wu, Kwan-Liu Ma | Photon Field Networks for Dynamic Real-Time Volumetric Global
Illumination | null | null | null | null | cs.GR cs.LG | http://creativecommons.org/licenses/by/4.0/ | Volume data is commonly found in many scientific disciplines, like medicine,
physics, and biology. Experts rely on robust scientific visualization
techniques to extract valuable insights from the data. Recent years have shown
path tracing to be the preferred approach for volumetric rendering, given its
high levels of realism. However, real-time volumetric path tracing often
suffers from stochastic noise and long convergence times, limiting interactive
exploration. In this paper, we present a novel method to enable real-time
global illumination for volume data visualization. We develop Photon Field
Networks -- a phase-function-aware, multi-light neural representation of
indirect volumetric global illumination. The fields are trained on multi-phase
photon caches that we compute a priori. Training can be done within seconds,
after which the fields can be used in various rendering tasks. To showcase
their potential, we develop a custom neural path tracer, with which our photon
fields achieve interactive framerates even on large datasets. We conduct
in-depth evaluations of the method's performance, including visual quality,
stochastic noise, inference and rendering speeds, and accuracy regarding
illumination and phase function awareness. Results are compared to ray
marching, path tracing and photon mapping. Our findings show that Photon Field
Networks can faithfully represent indirect global illumination across the phase
spectrum while exhibiting less stochastic noise and rendering at a
significantly faster rate than traditional methods.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 18:17:34 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Bauer",
"David",
""
],
[
"Wu",
"Qi",
""
],
[
"Ma",
"Kwan-Liu",
""
]
] | TITLE: Photon Field Networks for Dynamic Real-Time Volumetric Global
Illumination
ABSTRACT: Volume data is commonly found in many scientific disciplines, like medicine,
physics, and biology. Experts rely on robust scientific visualization
techniques to extract valuable insights from the data. Recent years have shown
path tracing to be the preferred approach for volumetric rendering, given its
high levels of realism. However, real-time volumetric path tracing often
suffers from stochastic noise and long convergence times, limiting interactive
exploration. In this paper, we present a novel method to enable real-time
global illumination for volume data visualization. We develop Photon Field
Networks -- a phase-function-aware, multi-light neural representation of
indirect volumetric global illumination. The fields are trained on multi-phase
photon caches that we compute a priori. Training can be done within seconds,
after which the fields can be used in various rendering tasks. To showcase
their potential, we develop a custom neural path tracer, with which our photon
fields achieve interactive framerates even on large datasets. We conduct
in-depth evaluations of the method's performance, including visual quality,
stochastic noise, inference and rendering speeds, and accuracy regarding
illumination and phase function awareness. Results are compared to ray
marching, path tracing and photon mapping. Our findings show that Photon Field
Networks can faithfully represent indirect global illumination across the phase
spectrum while exhibiting less stochastic noise and rendering at a
significantly faster rate than traditional methods.
| no_new_dataset | 0.713793 |
2304.07349 | Jingrong Chen | Jingrong Chen and Yongji Wu and Shihan Lin and Yechen Xu and Xinhao
Kong and Thomas Anderson and Matthew Lentz and Xiaowei Yang and Danyang Zhuo | Remote Procedure Call as a Managed System Service | NSDI 2023 | null | null | null | cs.NI cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Remote Procedure Call (RPC) is a widely used abstraction for cloud computing.
The programmer specifies type information for each remote procedure, and a
compiler generates stub code linked into each application to marshal and
unmarshal arguments into message buffers. Increasingly, however, application
and service operations teams need a high degree of visibility and control over
the flow of RPCs between services, leading many installations to use sidecars
or service mesh proxies for manageability and policy flexibility. These
sidecars typically involve inspection and modification of RPC data that the
stub compiler had just carefully assembled, adding needless overhead. Further,
upgrading diverse application RPC stubs to use advanced hardware capabilities
such as RDMA or DPDK is a long and involved process, and often incompatible
with sidecar policy control.
In this paper, we propose, implement, and evaluate a novel approach, where
RPC marshalling and policy enforcement are done as a system service rather than
as a library linked into each application. Applications specify type
information to the RPC system as before, while the RPC service executes policy
engines and arbitrates resource use, and then marshals data customized to the
underlying network hardware capabilities. Our system, mRPC, also supports live
upgrades so that both policy and marshalling code can be updated transparently
to application code. Compared with using a sidecar, mRPC speeds up a standard
microservice benchmark, DeathStarBench, by up to 2.5$\times$ while having a
higher level of policy flexibility and availability.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 18:47:55 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Chen",
"Jingrong",
""
],
[
"Wu",
"Yongji",
""
],
[
"Lin",
"Shihan",
""
],
[
"Xu",
"Yechen",
""
],
[
"Kong",
"Xinhao",
""
],
[
"Anderson",
"Thomas",
""
],
[
"Lentz",
"Matthew",
""
],
[
"Yang",
"Xiaowei",
""
],
[
"Zhuo",
"Danyang",
""
]
] | TITLE: Remote Procedure Call as a Managed System Service
ABSTRACT: Remote Procedure Call (RPC) is a widely used abstraction for cloud computing.
The programmer specifies type information for each remote procedure, and a
compiler generates stub code linked into each application to marshal and
unmarshal arguments into message buffers. Increasingly, however, application
and service operations teams need a high degree of visibility and control over
the flow of RPCs between services, leading many installations to use sidecars
or service mesh proxies for manageability and policy flexibility. These
sidecars typically involve inspection and modification of RPC data that the
stub compiler had just carefully assembled, adding needless overhead. Further,
upgrading diverse application RPC stubs to use advanced hardware capabilities
such as RDMA or DPDK is a long and involved process, and often incompatible
with sidecar policy control.
In this paper, we propose, implement, and evaluate a novel approach, where
RPC marshalling and policy enforcement are done as a system service rather than
as a library linked into each application. Applications specify type
information to the RPC system as before, while the RPC service executes policy
engines and arbitrates resource use, and then marshals data customized to the
underlying network hardware capabilities. Our system, mRPC, also supports live
upgrades so that both policy and marshalling code can be updated transparently
to application code. Compared with using a sidecar, mRPC speeds up a standard
microservice benchmark, DeathStarBench, by up to 2.5$\times$ while having a
higher level of policy flexibility and availability.
| no_new_dataset | 0.708036 |
2304.07354 | Zahid Hasan | Zahid Hasan, Masud Ahmed, Abu Zaher Md Faridee, Sanjay Purushotham,
Heesung Kwon, Hyungtae Lee, Nirmalya Roy | NEV-NCD: Negative Learning, Entropy, and Variance regularization based
novel action categories discovery | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Novel Categories Discovery (NCD) facilitates learning from a partially
annotated label space and enables deep learning (DL) models to operate in an
open-world setting by identifying and differentiating instances of novel
classes based on the labeled data notions. One of the primary assumptions of
NCD is that the novel label space is perfectly disjoint and can be
equipartitioned, but it is rarely realized by most NCD approaches in practice.
To better align with this assumption, we propose a novel single-stage joint
optimization-based NCD method, Negative learning, Entropy, and Variance
regularization NCD (NEV-NCD). We demonstrate the efficacy of NEV-NCD in
previously unexplored NCD applications of video action recognition (VAR) with
the public UCF101 dataset and a curated in-house partial action-space annotated
multi-view video dataset. We perform a thorough ablation study by varying the
composition of final joint loss and associated hyper-parameters. During our
experiments with UCF101 and multi-view action dataset, NEV-NCD achieves ~ 83%
classification accuracy in test instances of labeled data. NEV-NCD achieves ~
70% clustering accuracy over unlabeled data outperforming both naive baselines
(by ~ 40%) and state-of-the-art pseudo-labeling-based approaches (by ~ 3.5%)
over both datasets. Further, we propose to incorporate optional view-invariant
feature learning with the multiview dataset to identify novel categories from
novel viewpoints. Our additional view-invariance constraint improves the
discriminative accuracy for both known and unknown categories by ~ 10% for
novel viewpoints.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 19:20:26 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Hasan",
"Zahid",
""
],
[
"Ahmed",
"Masud",
""
],
[
"Faridee",
"Abu Zaher Md",
""
],
[
"Purushotham",
"Sanjay",
""
],
[
"Kwon",
"Heesung",
""
],
[
"Lee",
"Hyungtae",
""
],
[
"Roy",
"Nirmalya",
""
]
] | TITLE: NEV-NCD: Negative Learning, Entropy, and Variance regularization based
novel action categories discovery
ABSTRACT: Novel Categories Discovery (NCD) facilitates learning from a partially
annotated label space and enables deep learning (DL) models to operate in an
open-world setting by identifying and differentiating instances of novel
classes based on the labeled data notions. One of the primary assumptions of
NCD is that the novel label space is perfectly disjoint and can be
equipartitioned, but it is rarely realized by most NCD approaches in practice.
To better align with this assumption, we propose a novel single-stage joint
optimization-based NCD method, Negative learning, Entropy, and Variance
regularization NCD (NEV-NCD). We demonstrate the efficacy of NEV-NCD in
previously unexplored NCD applications of video action recognition (VAR) with
the public UCF101 dataset and a curated in-house partial action-space annotated
multi-view video dataset. We perform a thorough ablation study by varying the
composition of final joint loss and associated hyper-parameters. During our
experiments with UCF101 and multi-view action dataset, NEV-NCD achieves ~ 83%
classification accuracy in test instances of labeled data. NEV-NCD achieves ~
70% clustering accuracy over unlabeled data outperforming both naive baselines
(by ~ 40%) and state-of-the-art pseudo-labeling-based approaches (by ~ 3.5%)
over both datasets. Further, we propose to incorporate optional view-invariant
feature learning with the multiview dataset to identify novel categories from
novel viewpoints. Our additional view-invariance constraint improves the
discriminative accuracy for both known and unknown categories by ~ 10% for
novel viewpoints.
| no_new_dataset | 0.706235 |
2304.07372 | Thanh-Dat Truong | Thanh-Dat Truong, Chi Nhan Duong, Pierce Helton, Ashley Dowling, Xin
Li, Khoa Luu | CoMaL: Conditional Maximum Likelihood Approach to Self-supervised Domain
Adaptation in Long-tail Semantic Segmentation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The research in self-supervised domain adaptation in semantic segmentation
has recently received considerable attention. Although GAN-based methods have
become one of the most popular approaches to domain adaptation, they have
suffered from some limitations. They are insufficient to model both global and
local structures of a given image, especially in small regions of tail classes.
Moreover, they perform bad on the tail classes containing limited number of
pixels or less training samples. In order to address these issues, we present a
new self-supervised domain adaptation approach to tackle long-tail semantic
segmentation in this paper. Firstly, a new metric is introduced to formulate
long-tail domain adaptation in the segmentation problem. Secondly, a new
Conditional Maximum Likelihood (CoMaL) approach in an autoregressive framework
is presented to solve the problem of long-tail domain adaptation. Although
other segmentation methods work under the pixel independence assumption, the
long-tailed pixel distributions in CoMaL are generally solved in the context of
structural dependency, as that is more realistic. Finally, the proposed method
is evaluated on popular large-scale semantic segmentation benchmarks, i.e.,
"SYNTHIA to Cityscapes" and "GTA to Cityscapes", and outperforms the prior
methods by a large margin in both the standard and the proposed evaluation
protocols.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 20:06:44 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Truong",
"Thanh-Dat",
""
],
[
"Duong",
"Chi Nhan",
""
],
[
"Helton",
"Pierce",
""
],
[
"Dowling",
"Ashley",
""
],
[
"Li",
"Xin",
""
],
[
"Luu",
"Khoa",
""
]
] | TITLE: CoMaL: Conditional Maximum Likelihood Approach to Self-supervised Domain
Adaptation in Long-tail Semantic Segmentation
ABSTRACT: The research in self-supervised domain adaptation in semantic segmentation
has recently received considerable attention. Although GAN-based methods have
become one of the most popular approaches to domain adaptation, they have
suffered from some limitations. They are insufficient to model both global and
local structures of a given image, especially in small regions of tail classes.
Moreover, they perform bad on the tail classes containing limited number of
pixels or less training samples. In order to address these issues, we present a
new self-supervised domain adaptation approach to tackle long-tail semantic
segmentation in this paper. Firstly, a new metric is introduced to formulate
long-tail domain adaptation in the segmentation problem. Secondly, a new
Conditional Maximum Likelihood (CoMaL) approach in an autoregressive framework
is presented to solve the problem of long-tail domain adaptation. Although
other segmentation methods work under the pixel independence assumption, the
long-tailed pixel distributions in CoMaL are generally solved in the context of
structural dependency, as that is more realistic. Finally, the proposed method
is evaluated on popular large-scale semantic segmentation benchmarks, i.e.,
"SYNTHIA to Cityscapes" and "GTA to Cityscapes", and outperforms the prior
methods by a large margin in both the standard and the proposed evaluation
protocols.
| no_new_dataset | 0.710239 |
2304.07374 | Waqar Ahmed | Waqar Ahmed, Pietro Morerio and Vittorio Murino | Continual Source-Free Unsupervised Domain Adaptation | Accepted at International Conference on Image Analysis and
Processing, 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing Source-free Unsupervised Domain Adaptation (SUDA) approaches
inherently exhibit catastrophic forgetting. Typically, models trained on a
labeled source domain and adapted to unlabeled target data improve performance
on the target while dropping performance on the source, which is not available
during adaptation. In this study, our goal is to cope with the challenging
problem of SUDA in a continual learning setting, i.e., adapting to the
target(s) with varying distributional shifts while maintaining performance on
the source. The proposed framework consists of two main stages: i) a SUDA model
yielding cleaner target labels -- favoring good performance on target, and ii)
a novel method for synthesizing class-conditioned source-style images by
leveraging only the source model and pseudo-labeled target data as a prior. An
extensive pool of experiments on major benchmarks, e.g., PACS, Visda-C, and
DomainNet demonstrates that the proposed Continual SUDA (C-SUDA) framework
enables preserving satisfactory performance on the source domain without
exploiting the source data at all.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 20:11:05 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Ahmed",
"Waqar",
""
],
[
"Morerio",
"Pietro",
""
],
[
"Murino",
"Vittorio",
""
]
] | TITLE: Continual Source-Free Unsupervised Domain Adaptation
ABSTRACT: Existing Source-free Unsupervised Domain Adaptation (SUDA) approaches
inherently exhibit catastrophic forgetting. Typically, models trained on a
labeled source domain and adapted to unlabeled target data improve performance
on the target while dropping performance on the source, which is not available
during adaptation. In this study, our goal is to cope with the challenging
problem of SUDA in a continual learning setting, i.e., adapting to the
target(s) with varying distributional shifts while maintaining performance on
the source. The proposed framework consists of two main stages: i) a SUDA model
yielding cleaner target labels -- favoring good performance on target, and ii)
a novel method for synthesizing class-conditioned source-style images by
leveraging only the source model and pseudo-labeled target data as a prior. An
extensive pool of experiments on major benchmarks, e.g., PACS, Visda-C, and
DomainNet demonstrates that the proposed Continual SUDA (C-SUDA) framework
enables preserving satisfactory performance on the source domain without
exploiting the source data at all.
| no_new_dataset | 0.710465 |
2304.07382 | Souvika Sarkar | Souvika Sarkar and Dongji Feng and Shubhra Kanti Karmaker Santu | Zero-Shot Multi-Label Topic Inference with Sentence Encoders | null | null | null | null | cs.CL cs.IR | http://creativecommons.org/licenses/by/4.0/ | Sentence encoders have indeed been shown to achieve superior performances for
many downstream text-mining tasks and, thus, claimed to be fairly general.
Inspired by this, we performed a detailed study on how to leverage these
sentence encoders for the "zero-shot topic inference" task, where the topics
are defined/provided by the users in real-time. Extensive experiments on seven
different datasets demonstrate that Sentence-BERT demonstrates superior
generality compared to other encoders, while Universal Sentence Encoder can be
preferred when efficiency is a top priority.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 20:27:09 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Sarkar",
"Souvika",
""
],
[
"Feng",
"Dongji",
""
],
[
"Santu",
"Shubhra Kanti Karmaker",
""
]
] | TITLE: Zero-Shot Multi-Label Topic Inference with Sentence Encoders
ABSTRACT: Sentence encoders have indeed been shown to achieve superior performances for
many downstream text-mining tasks and, thus, claimed to be fairly general.
Inspired by this, we performed a detailed study on how to leverage these
sentence encoders for the "zero-shot topic inference" task, where the topics
are defined/provided by the users in real-time. Extensive experiments on seven
different datasets demonstrate that Sentence-BERT demonstrates superior
generality compared to other encoders, while Universal Sentence Encoder can be
preferred when efficiency is a top priority.
| no_new_dataset | 0.711224 |
2304.07389 | Rohan Sarkar | Rohan Sarkar, Achal Dave, Gerard Medioni, Benjamin Biggs | Shape of You: Precise 3D shape estimations for diverse body types | null | null | null | null | cs.CV cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | This paper presents Shape of You (SoY), an approach to improve the accuracy
of 3D body shape estimation for vision-based clothing recommendation systems.
While existing methods have successfully estimated 3D poses, there remains a
lack of work in precise shape estimation, particularly for diverse human
bodies. To address this gap, we propose two loss functions that can be readily
integrated into parametric 3D human reconstruction pipelines. Additionally, we
propose a test-time optimization routine that further improves quality. Our
method improves over the recent SHAPY method by 17.7% on the challenging SSP-3D
dataset. We consider our work to be a step towards a more accurate 3D shape
estimation system that works reliably on diverse body types and holds promise
for practical applications in the fashion industry.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 20:53:16 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Sarkar",
"Rohan",
""
],
[
"Dave",
"Achal",
""
],
[
"Medioni",
"Gerard",
""
],
[
"Biggs",
"Benjamin",
""
]
] | TITLE: Shape of You: Precise 3D shape estimations for diverse body types
ABSTRACT: This paper presents Shape of You (SoY), an approach to improve the accuracy
of 3D body shape estimation for vision-based clothing recommendation systems.
While existing methods have successfully estimated 3D poses, there remains a
lack of work in precise shape estimation, particularly for diverse human
bodies. To address this gap, we propose two loss functions that can be readily
integrated into parametric 3D human reconstruction pipelines. Additionally, we
propose a test-time optimization routine that further improves quality. Our
method improves over the recent SHAPY method by 17.7% on the challenging SSP-3D
dataset. We consider our work to be a step towards a more accurate 3D shape
estimation system that works reliably on diverse body types and holds promise
for practical applications in the fashion industry.
| no_new_dataset | 0.710603 |
2304.07410 | Samaneh Azadi | Samaneh Azadi, Thomas Hayes, Akbar Shah, Guan Pang, Devi Parikh, Sonal
Gupta | Text-Conditional Contextualized Avatars For Zero-Shot Personalization | null | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent large-scale text-to-image generation models have made significant
improvements in the quality, realism, and diversity of the synthesized images
and enable users to control the created content through language. However, the
personalization aspect of these generative models is still challenging and
under-explored. In this work, we propose a pipeline that enables
personalization of image generation with avatars capturing a user's identity in
a delightful way. Our pipeline is zero-shot, avatar texture and style agnostic,
and does not require training on the avatar at all - it is scalable to millions
of users who can generate a scene with their avatar. To render the avatar in a
pose faithful to the given text prompt, we propose a novel text-to-3D pose
diffusion model trained on a curated large-scale dataset of in-the-wild human
poses improving the performance of the SOTA text-to-motion models
significantly. We show, for the first time, how to leverage large-scale image
datasets to learn human 3D pose parameters and overcome the limitations of
motion capture datasets.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 22:00:44 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Azadi",
"Samaneh",
""
],
[
"Hayes",
"Thomas",
""
],
[
"Shah",
"Akbar",
""
],
[
"Pang",
"Guan",
""
],
[
"Parikh",
"Devi",
""
],
[
"Gupta",
"Sonal",
""
]
] | TITLE: Text-Conditional Contextualized Avatars For Zero-Shot Personalization
ABSTRACT: Recent large-scale text-to-image generation models have made significant
improvements in the quality, realism, and diversity of the synthesized images
and enable users to control the created content through language. However, the
personalization aspect of these generative models is still challenging and
under-explored. In this work, we propose a pipeline that enables
personalization of image generation with avatars capturing a user's identity in
a delightful way. Our pipeline is zero-shot, avatar texture and style agnostic,
and does not require training on the avatar at all - it is scalable to millions
of users who can generate a scene with their avatar. To render the avatar in a
pose faithful to the given text prompt, we propose a novel text-to-3D pose
diffusion model trained on a curated large-scale dataset of in-the-wild human
poses improving the performance of the SOTA text-to-motion models
significantly. We show, for the first time, how to leverage large-scale image
datasets to learn human 3D pose parameters and overcome the limitations of
motion capture datasets.
| new_dataset | 0.591959 |
2304.07413 | Samson Zhou | Yeshwanth Cherapanamjeri and Sandeep Silwal and David P. Woodruff and
Fred Zhang and Qiuyi Zhang and Samson Zhou | Robust Algorithms on Adaptive Inputs from Bounded Adversaries | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | We study dynamic algorithms robust to adaptive input generated from sources
with bounded capabilities, such as sparsity or limited interaction. For
example, we consider robust linear algebraic algorithms when the updates to the
input are sparse but given by an adversary with access to a query oracle. We
also study robust algorithms in the standard centralized setting, where an
adversary queries an algorithm in an adaptive manner, but the number of
interactions between the adversary and the algorithm is bounded. We first
recall a unified framework of [HKM+20, BKM+22, ACSS23] for answering $Q$
adaptive queries that incurs $\widetilde{\mathcal{O}}(\sqrt{Q})$ overhead in
space, which is roughly a quadratic improvement over the na\"{i}ve
implementation, and only incurs a logarithmic overhead in query time. Although
the general framework has diverse applications in machine learning and data
science, such as adaptive distance estimation, kernel density estimation,
linear regression, range queries, and point queries and serves as a preliminary
benchmark, we demonstrate even better algorithmic improvements for (1) reducing
the pre-processing time for adaptive distance estimation and (2) permitting an
unlimited number of adaptive queries for kernel density estimation. Finally, we
complement our theoretical results with additional empirical evaluations.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 22:13:54 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Cherapanamjeri",
"Yeshwanth",
""
],
[
"Silwal",
"Sandeep",
""
],
[
"Woodruff",
"David P.",
""
],
[
"Zhang",
"Fred",
""
],
[
"Zhang",
"Qiuyi",
""
],
[
"Zhou",
"Samson",
""
]
] | TITLE: Robust Algorithms on Adaptive Inputs from Bounded Adversaries
ABSTRACT: We study dynamic algorithms robust to adaptive input generated from sources
with bounded capabilities, such as sparsity or limited interaction. For
example, we consider robust linear algebraic algorithms when the updates to the
input are sparse but given by an adversary with access to a query oracle. We
also study robust algorithms in the standard centralized setting, where an
adversary queries an algorithm in an adaptive manner, but the number of
interactions between the adversary and the algorithm is bounded. We first
recall a unified framework of [HKM+20, BKM+22, ACSS23] for answering $Q$
adaptive queries that incurs $\widetilde{\mathcal{O}}(\sqrt{Q})$ overhead in
space, which is roughly a quadratic improvement over the na\"{i}ve
implementation, and only incurs a logarithmic overhead in query time. Although
the general framework has diverse applications in machine learning and data
science, such as adaptive distance estimation, kernel density estimation,
linear regression, range queries, and point queries and serves as a preliminary
benchmark, we demonstrate even better algorithmic improvements for (1) reducing
the pre-processing time for adaptive distance estimation and (2) permitting an
unlimited number of adaptive queries for kernel density estimation. Finally, we
complement our theoretical results with additional empirical evaluations.
| no_new_dataset | 0.70614 |
2304.07421 | Liangqi Yuan | Liangqi Yuan and Yunsheng Ma and Lu Su and Ziran Wang | Peer-to-Peer Federated Continual Learning for Naturalistic Driving
Action Recognition | CVPRW 2023 | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | Naturalistic driving action recognition (NDAR) has proven to be an effective
method for detecting driver distraction and reducing the risk of traffic
accidents. However, the intrusive design of in-cabin cameras raises concerns
about driver privacy. To address this issue, we propose a novel peer-to-peer
(P2P) federated learning (FL) framework with continual learning, namely FedPC,
which ensures privacy and enhances learning efficiency while reducing
communication, computational, and storage overheads. Our framework focuses on
addressing the clients' objectives within a serverless FL framework, with the
goal of delivering personalized and accurate NDAR models. We demonstrate and
evaluate the performance of FedPC on two real-world NDAR datasets, including
the State Farm Distracted Driver Detection and Track 3 NDAR dataset in the 2023
AICity Challenge. The results of our experiments highlight the strong
competitiveness of FedPC compared to the conventional client-to-server (C2S)
FLs in terms of performance, knowledge dissemination rate, and compatibility
with new clients.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 22:54:43 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Yuan",
"Liangqi",
""
],
[
"Ma",
"Yunsheng",
""
],
[
"Su",
"Lu",
""
],
[
"Wang",
"Ziran",
""
]
] | TITLE: Peer-to-Peer Federated Continual Learning for Naturalistic Driving
Action Recognition
ABSTRACT: Naturalistic driving action recognition (NDAR) has proven to be an effective
method for detecting driver distraction and reducing the risk of traffic
accidents. However, the intrusive design of in-cabin cameras raises concerns
about driver privacy. To address this issue, we propose a novel peer-to-peer
(P2P) federated learning (FL) framework with continual learning, namely FedPC,
which ensures privacy and enhances learning efficiency while reducing
communication, computational, and storage overheads. Our framework focuses on
addressing the clients' objectives within a serverless FL framework, with the
goal of delivering personalized and accurate NDAR models. We demonstrate and
evaluate the performance of FedPC on two real-world NDAR datasets, including
the State Farm Distracted Driver Detection and Track 3 NDAR dataset in the 2023
AICity Challenge. The results of our experiments highlight the strong
competitiveness of FedPC compared to the conventional client-to-server (C2S)
FLs in terms of performance, knowledge dissemination rate, and compatibility
with new clients.
| no_new_dataset | 0.708843 |
2304.07422 | Yiqin Deng | Yiqin Deng, Haixia Zhang, Xianhao Chen, and Yuguang Fang | Spectrum-aware Multi-hop Task Routing in Vehicle-assisted Collaborative
Edge Computing | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-access edge computing (MEC) is a promising technology to enhance the
quality of service, particularly for low-latency services, by enabling
computing offloading to edge servers (ESs) in close proximity. To avoid network
congestion, collaborative edge computing has become an emerging paradigm to
enable different ESs to collaboratively share their data and computation
resources. However, most papers in collaborative edge computing only allow
one-hop offloading, which may limit computing resource sharing due to either
poor channel conditions or computing workload at ESs one-hop away. By allowing
ESs multi-hop away to also share the computing workload, a multi-hop MEC
enables more ESs to share their computing resources. Inspired by this
observation, in this paper, we propose to leverage omnipresent vehicles in a
city to form a data transportation network for task delivery in a multi-hop
fashion. Here, we propose a general multi-hop task offloading framework for
vehicle-assisted MEC where tasks from users can be offloaded to powerful ESs
via potentially multi-hop transmissions. Under the proposed framework, we
develop a reinforcement learning based task offloading approach to address the
curse of dimensionality problem due to vehicular mobility and channel
variability, with the goal to maximize the aggregated service throughput under
constraints on end-to-end latency, spectrum, and computing resources. Numerical
results demonstrate that the proposed algorithm achieves excellent performance
with low complexity and outperforms existing benchmark schemes.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 23:07:34 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Deng",
"Yiqin",
""
],
[
"Zhang",
"Haixia",
""
],
[
"Chen",
"Xianhao",
""
],
[
"Fang",
"Yuguang",
""
]
] | TITLE: Spectrum-aware Multi-hop Task Routing in Vehicle-assisted Collaborative
Edge Computing
ABSTRACT: Multi-access edge computing (MEC) is a promising technology to enhance the
quality of service, particularly for low-latency services, by enabling
computing offloading to edge servers (ESs) in close proximity. To avoid network
congestion, collaborative edge computing has become an emerging paradigm to
enable different ESs to collaboratively share their data and computation
resources. However, most papers in collaborative edge computing only allow
one-hop offloading, which may limit computing resource sharing due to either
poor channel conditions or computing workload at ESs one-hop away. By allowing
ESs multi-hop away to also share the computing workload, a multi-hop MEC
enables more ESs to share their computing resources. Inspired by this
observation, in this paper, we propose to leverage omnipresent vehicles in a
city to form a data transportation network for task delivery in a multi-hop
fashion. Here, we propose a general multi-hop task offloading framework for
vehicle-assisted MEC where tasks from users can be offloaded to powerful ESs
via potentially multi-hop transmissions. Under the proposed framework, we
develop a reinforcement learning based task offloading approach to address the
curse of dimensionality problem due to vehicular mobility and channel
variability, with the goal to maximize the aggregated service throughput under
constraints on end-to-end latency, spectrum, and computing resources. Numerical
results demonstrate that the proposed algorithm achieves excellent performance
with low complexity and outperforms existing benchmark schemes.
| no_new_dataset | 0.710007 |
2304.07426 | Mubariz Zaffar | Mubariz Zaffar, Liangliang Nan, Julian Francisco Pieter Kooij | CoPR: Towards Accurate Visual Localization With Continuous
Place-descriptor Regression | Published in the IEEE Transactions on Robotics, April 2023 | null | 10.1109/TRO.2023.3262106 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Visual Place Recognition (VPR) is an image-based localization method that
estimates the camera location of a query image by retrieving the most similar
reference image from a map of geo-tagged reference images. In this work, we
look into two fundamental bottlenecks for its localization accuracy: reference
map sparseness and viewpoint invariance. Firstly, the reference images for VPR
are only available at sparse poses in a map, which enforces an upper bound on
the maximum achievable localization accuracy through VPR. We therefore propose
Continuous Place-descriptor Regression (CoPR) to densify the map and improve
localization accuracy. We study various interpolation and extrapolation models
to regress additional VPR feature descriptors from only the existing
references. Secondly, we compare different feature encoders and show that CoPR
presents value for all of them. We evaluate our models on three existing public
datasets and report on average around 30% improvement in VPR-based localization
accuracy using CoPR, on top of the 15% increase by using a viewpoint-variant
loss for the feature encoder. The complementary relation between CoPR and
Relative Pose Estimation is also discussed.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2023 23:17:44 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zaffar",
"Mubariz",
""
],
[
"Nan",
"Liangliang",
""
],
[
"Kooij",
"Julian Francisco Pieter",
""
]
] | TITLE: CoPR: Towards Accurate Visual Localization With Continuous
Place-descriptor Regression
ABSTRACT: Visual Place Recognition (VPR) is an image-based localization method that
estimates the camera location of a query image by retrieving the most similar
reference image from a map of geo-tagged reference images. In this work, we
look into two fundamental bottlenecks for its localization accuracy: reference
map sparseness and viewpoint invariance. Firstly, the reference images for VPR
are only available at sparse poses in a map, which enforces an upper bound on
the maximum achievable localization accuracy through VPR. We therefore propose
Continuous Place-descriptor Regression (CoPR) to densify the map and improve
localization accuracy. We study various interpolation and extrapolation models
to regress additional VPR feature descriptors from only the existing
references. Secondly, we compare different feature encoders and show that CoPR
presents value for all of them. We evaluate our models on three existing public
datasets and report on average around 30% improvement in VPR-based localization
accuracy using CoPR, on top of the 15% increase by using a viewpoint-variant
loss for the feature encoder. The complementary relation between CoPR and
Relative Pose Estimation is also discussed.
| no_new_dataset | 0.709856 |
2304.07437 | Sibo Wei | Sibo Wei, Wenpeng Lu, Xueping Peng, Shoujin Wang, Yi-Fei Wang and
Weiyu Zhang | Medical Question Summarization with Entity-driven Contrastive Learning | 16 pages, 4 figures | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By summarizing longer consumer health questions into shorter and essential
ones, medical question answering (MQA) systems can more accurately understand
consumer intentions and retrieve suitable answers. However, medical question
summarization is very challenging due to obvious distinctions in health trouble
descriptions from patients and doctors. Although existing works have attempted
to utilize Seq2Seq, reinforcement learning, or contrastive learning to solve
the problem, two challenges remain: how to correctly capture question focus to
model its semantic intention, and how to obtain reliable datasets to fairly
evaluate performance. To address these challenges, this paper proposes a novel
medical question summarization framework using entity-driven contrastive
learning (ECL). ECL employs medical entities in frequently asked questions
(FAQs) as focuses and devises an effective mechanism to generate hard negative
samples. This approach forces models to pay attention to the crucial focus
information and generate more ideal question summarization. Additionally, we
find that some MQA datasets suffer from serious data leakage problems, such as
the iCliniq dataset's 33% duplicate rate. To evaluate the related methods
fairly, this paper carefully checks leaked samples to reorganize more
reasonable datasets. Extensive experiments demonstrate that our ECL method
outperforms state-of-the-art methods by accurately capturing question focus and
generating medical question summaries. The code and datasets are available at
https://github.com/yrbobo/MQS-ECL.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 00:19:03 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wei",
"Sibo",
""
],
[
"Lu",
"Wenpeng",
""
],
[
"Peng",
"Xueping",
""
],
[
"Wang",
"Shoujin",
""
],
[
"Wang",
"Yi-Fei",
""
],
[
"Zhang",
"Weiyu",
""
]
] | TITLE: Medical Question Summarization with Entity-driven Contrastive Learning
ABSTRACT: By summarizing longer consumer health questions into shorter and essential
ones, medical question answering (MQA) systems can more accurately understand
consumer intentions and retrieve suitable answers. However, medical question
summarization is very challenging due to obvious distinctions in health trouble
descriptions from patients and doctors. Although existing works have attempted
to utilize Seq2Seq, reinforcement learning, or contrastive learning to solve
the problem, two challenges remain: how to correctly capture question focus to
model its semantic intention, and how to obtain reliable datasets to fairly
evaluate performance. To address these challenges, this paper proposes a novel
medical question summarization framework using entity-driven contrastive
learning (ECL). ECL employs medical entities in frequently asked questions
(FAQs) as focuses and devises an effective mechanism to generate hard negative
samples. This approach forces models to pay attention to the crucial focus
information and generate more ideal question summarization. Additionally, we
find that some MQA datasets suffer from serious data leakage problems, such as
the iCliniq dataset's 33% duplicate rate. To evaluate the related methods
fairly, this paper carefully checks leaked samples to reorganize more
reasonable datasets. Extensive experiments demonstrate that our ECL method
outperforms state-of-the-art methods by accurately capturing question focus and
generating medical question summaries. The code and datasets are available at
https://github.com/yrbobo/MQS-ECL.
| no_new_dataset | 0.708395 |
2304.07442 | Ankit Kulshrestha | Ankit Kulshrestha, Xiaoyuan Liu, Hayato Ushijima-Mwesigwa, Ilya Safro | Learning To Optimize Quantum Neural Network Without Gradients | null | null | null | null | quant-ph cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum Machine Learning is an emerging sub-field in machine learning where
one of the goals is to perform pattern recognition tasks by encoding data into
quantum states. This extension from classical to quantum domain has been made
possible due to the development of hybrid quantum-classical algorithms that
allow a parameterized quantum circuit to be optimized using gradient based
algorithms that run on a classical computer. The similarities in training of
these hybrid algorithms and classical neural networks has further led to the
development of Quantum Neural Networks (QNNs). However, in the current training
regime for QNNs, the gradients w.r.t objective function have to be computed on
the quantum device. This computation is highly non-scalable and is affected by
hardware and sampling noise present in the current generation of quantum
hardware. In this paper, we propose a training algorithm that does not rely on
gradient information. Specifically, we introduce a novel meta-optimization
algorithm that trains a \emph{meta-optimizer} network to output parameters for
the quantum circuit such that the objective function is minimized. We
empirically and theoretically show that we achieve a better quality minima in
fewer circuit evaluations than existing gradient based algorithms on different
datasets.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 01:09:12 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kulshrestha",
"Ankit",
""
],
[
"Liu",
"Xiaoyuan",
""
],
[
"Ushijima-Mwesigwa",
"Hayato",
""
],
[
"Safro",
"Ilya",
""
]
] | TITLE: Learning To Optimize Quantum Neural Network Without Gradients
ABSTRACT: Quantum Machine Learning is an emerging sub-field in machine learning where
one of the goals is to perform pattern recognition tasks by encoding data into
quantum states. This extension from classical to quantum domain has been made
possible due to the development of hybrid quantum-classical algorithms that
allow a parameterized quantum circuit to be optimized using gradient based
algorithms that run on a classical computer. The similarities in training of
these hybrid algorithms and classical neural networks has further led to the
development of Quantum Neural Networks (QNNs). However, in the current training
regime for QNNs, the gradients w.r.t objective function have to be computed on
the quantum device. This computation is highly non-scalable and is affected by
hardware and sampling noise present in the current generation of quantum
hardware. In this paper, we propose a training algorithm that does not rely on
gradient information. Specifically, we introduce a novel meta-optimization
algorithm that trains a \emph{meta-optimizer} network to output parameters for
the quantum circuit such that the objective function is minimized. We
empirically and theoretically show that we achieve a better quality minima in
fewer circuit evaluations than existing gradient based algorithms on different
datasets.
| no_new_dataset | 0.71 |
2304.07450 | Jiayu Li | Jiayu Li, Peijie Sun, Zhefan Wang, Weizhi Ma, Yangkun Li, Min Zhang,
Zhoutian Feng, Daiyue Xue | Intent-aware Ranking Ensemble for Personalized Recommendation | Accepted at the 46th International ACM SIGIR Conference on Research
and Development in Information Retrieval (SIGIR 2023) | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ranking ensemble is a critical component in real recommender systems. When a
user visits a platform, the system will prepare several item lists, each of
which is generally from a single behavior objective recommendation model. As
multiple behavior intents, e.g., both clicking and buying some specific item
category, are commonly concurrent in a user visit, it is necessary to integrate
multiple single-objective ranking lists into one. However, previous work on
rank aggregation mainly focused on fusing homogeneous item lists with the same
objective while ignoring ensemble of heterogeneous lists ranked with different
objectives with various user intents.
In this paper, we treat a user's possible behaviors and the potential
interacting item categories as the user's intent. And we aim to study how to
fuse candidate item lists generated from different objectives aware of user
intents. To address such a task, we propose an Intent-aware ranking Ensemble
Learning~(IntEL) model to fuse multiple single-objective item lists with
various user intents, in which item-level personalized weights are learned.
Furthermore, we theoretically prove the effectiveness of IntEL with point-wise,
pair-wise, and list-wise loss functions via error-ambiguity decomposition.
Experiments on two large-scale real-world datasets also show significant
improvements of IntEL on multiple behavior objectives simultaneously compared
to previous ranking ensemble models.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 02:25:01 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Li",
"Jiayu",
""
],
[
"Sun",
"Peijie",
""
],
[
"Wang",
"Zhefan",
""
],
[
"Ma",
"Weizhi",
""
],
[
"Li",
"Yangkun",
""
],
[
"Zhang",
"Min",
""
],
[
"Feng",
"Zhoutian",
""
],
[
"Xue",
"Daiyue",
""
]
] | TITLE: Intent-aware Ranking Ensemble for Personalized Recommendation
ABSTRACT: Ranking ensemble is a critical component in real recommender systems. When a
user visits a platform, the system will prepare several item lists, each of
which is generally from a single behavior objective recommendation model. As
multiple behavior intents, e.g., both clicking and buying some specific item
category, are commonly concurrent in a user visit, it is necessary to integrate
multiple single-objective ranking lists into one. However, previous work on
rank aggregation mainly focused on fusing homogeneous item lists with the same
objective while ignoring ensemble of heterogeneous lists ranked with different
objectives with various user intents.
In this paper, we treat a user's possible behaviors and the potential
interacting item categories as the user's intent. And we aim to study how to
fuse candidate item lists generated from different objectives aware of user
intents. To address such a task, we propose an Intent-aware ranking Ensemble
Learning~(IntEL) model to fuse multiple single-objective item lists with
various user intents, in which item-level personalized weights are learned.
Furthermore, we theoretically prove the effectiveness of IntEL with point-wise,
pair-wise, and list-wise loss functions via error-ambiguity decomposition.
Experiments on two large-scale real-world datasets also show significant
improvements of IntEL on multiple behavior objectives simultaneously compared
to previous ranking ensemble models.
| no_new_dataset | 0.711844 |
2304.07453 | Kwei-Herng Lai | Kwei-Herng Lai, Lan Wang, Huiyuan Chen, Kaixiong Zhou, Fei Wang, Hao
Yang, Xia Hu | Context-aware Domain Adaptation for Time Series Anomaly Detection | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time series anomaly detection is a challenging task with a wide range of
real-world applications. Due to label sparsity, training a deep anomaly
detector often relies on unsupervised approaches. Recent efforts have been
devoted to time series domain adaptation to leverage knowledge from similar
domains. However, existing solutions may suffer from negative knowledge
transfer on anomalies due to their diversity and sparsity. Motivated by the
empirical study of context alignment between two domains, we aim to transfer
knowledge between two domains via adaptively sampling context information for
two domains. This is challenging because it requires simultaneously modeling
the complex in-domain temporal dependencies and cross-domain correlations while
exploiting label information from the source domain. To this end, we propose a
framework that combines context sampling and anomaly detection into a joint
learning procedure. We formulate context sampling into the Markov decision
process and exploit deep reinforcement learning to optimize the time series
domain adaptation process via context sampling and design a tailored reward
function to generate domain-invariant features that better align two domains
for anomaly detection. Experiments on three public datasets show promise for
knowledge transfer between two similar domains and two entirely different
domains.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 02:28:58 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Lai",
"Kwei-Herng",
""
],
[
"Wang",
"Lan",
""
],
[
"Chen",
"Huiyuan",
""
],
[
"Zhou",
"Kaixiong",
""
],
[
"Wang",
"Fei",
""
],
[
"Yang",
"Hao",
""
],
[
"Hu",
"Xia",
""
]
] | TITLE: Context-aware Domain Adaptation for Time Series Anomaly Detection
ABSTRACT: Time series anomaly detection is a challenging task with a wide range of
real-world applications. Due to label sparsity, training a deep anomaly
detector often relies on unsupervised approaches. Recent efforts have been
devoted to time series domain adaptation to leverage knowledge from similar
domains. However, existing solutions may suffer from negative knowledge
transfer on anomalies due to their diversity and sparsity. Motivated by the
empirical study of context alignment between two domains, we aim to transfer
knowledge between two domains via adaptively sampling context information for
two domains. This is challenging because it requires simultaneously modeling
the complex in-domain temporal dependencies and cross-domain correlations while
exploiting label information from the source domain. To this end, we propose a
framework that combines context sampling and anomaly detection into a joint
learning procedure. We formulate context sampling into the Markov decision
process and exploit deep reinforcement learning to optimize the time series
domain adaptation process via context sampling and design a tailored reward
function to generate domain-invariant features that better align two domains
for anomaly detection. Experiments on three public datasets show promise for
knowledge transfer between two similar domains and two entirely different
domains.
| no_new_dataset | 0.709189 |
2304.07465 | Xiangtao Wang | Ruizhi Wang, Xiangtao Wang, Zhenghua Xu, Wenting Xu, Junyang Chen,
Thomas Lukasiewicz | MvCo-DoT:Multi-View Contrastive Domain Transfer Network for Medical
Report Generation | Received by the ICASSP2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In clinical scenarios, multiple medical images with different views are
usually generated at the same time, and they have high semantic consistency.
However, the existing medical report generation methods cannot exploit the rich
multi-view mutual information of medical images. Therefore, in this work, we
propose the first multi-view medical report generation model, called MvCo-DoT.
Specifically, MvCo-DoT first propose a multi-view contrastive learning (MvCo)
strategy to help the deep reinforcement learning based model utilize the
consistency of multi-view inputs for better model learning. Then, to close the
performance gaps of using multi-view and single-view inputs, a domain transfer
network is further proposed to ensure MvCo-DoT achieve almost the same
performance as multi-view inputs using only single-view inputs.Extensive
experiments on the IU X-Ray public dataset show that MvCo-DoT outperforms the
SOTA medical report generation baselines in all metrics.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 03:42:26 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wang",
"Ruizhi",
""
],
[
"Wang",
"Xiangtao",
""
],
[
"Xu",
"Zhenghua",
""
],
[
"Xu",
"Wenting",
""
],
[
"Chen",
"Junyang",
""
],
[
"Lukasiewicz",
"Thomas",
""
]
] | TITLE: MvCo-DoT:Multi-View Contrastive Domain Transfer Network for Medical
Report Generation
ABSTRACT: In clinical scenarios, multiple medical images with different views are
usually generated at the same time, and they have high semantic consistency.
However, the existing medical report generation methods cannot exploit the rich
multi-view mutual information of medical images. Therefore, in this work, we
propose the first multi-view medical report generation model, called MvCo-DoT.
Specifically, MvCo-DoT first propose a multi-view contrastive learning (MvCo)
strategy to help the deep reinforcement learning based model utilize the
consistency of multi-view inputs for better model learning. Then, to close the
performance gaps of using multi-view and single-view inputs, a domain transfer
network is further proposed to ensure MvCo-DoT achieve almost the same
performance as multi-view inputs using only single-view inputs.Extensive
experiments on the IU X-Ray public dataset show that MvCo-DoT outperforms the
SOTA medical report generation baselines in all metrics.
| no_new_dataset | 0.709239 |
2304.07470 | Vrizlynn L. L. Thing | Rahul Kale, Vrizlynn L. L. Thing | Few-shot Weakly-supervised Cybersecurity Anomaly Detection | Computer and Security (Elsevier) | null | 10.1016/j.cose.2023.103194 | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | With increased reliance on Internet based technologies, cyberattacks
compromising users' sensitive data are becoming more prevalent. The scale and
frequency of these attacks are escalating rapidly, affecting systems and
devices connected to the Internet. The traditional defense mechanisms may not
be sufficiently equipped to handle the complex and ever-changing new threats.
The significant breakthroughs in the machine learning methods including deep
learning, had attracted interests from the cybersecurity research community for
further enhancements in the existing anomaly detection methods. Unfortunately,
collecting labelled anomaly data for all new evolving and sophisticated attacks
is not practical. Training and tuning the machine learning model for anomaly
detection using only a handful of labelled data samples is a pragmatic
approach. Therefore, few-shot weakly supervised anomaly detection is an
encouraging research direction. In this paper, we propose an enhancement to an
existing few-shot weakly-supervised deep learning anomaly detection framework.
This framework incorporates data augmentation, representation learning and
ordinal regression. We then evaluated and showed the performance of our
implemented framework on three benchmark datasets: NSL-KDD, CIC-IDS2018, and
TON_IoT.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 04:37:54 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kale",
"Rahul",
""
],
[
"Thing",
"Vrizlynn L. L.",
""
]
] | TITLE: Few-shot Weakly-supervised Cybersecurity Anomaly Detection
ABSTRACT: With increased reliance on Internet based technologies, cyberattacks
compromising users' sensitive data are becoming more prevalent. The scale and
frequency of these attacks are escalating rapidly, affecting systems and
devices connected to the Internet. The traditional defense mechanisms may not
be sufficiently equipped to handle the complex and ever-changing new threats.
The significant breakthroughs in the machine learning methods including deep
learning, had attracted interests from the cybersecurity research community for
further enhancements in the existing anomaly detection methods. Unfortunately,
collecting labelled anomaly data for all new evolving and sophisticated attacks
is not practical. Training and tuning the machine learning model for anomaly
detection using only a handful of labelled data samples is a pragmatic
approach. Therefore, few-shot weakly supervised anomaly detection is an
encouraging research direction. In this paper, we propose an enhancement to an
existing few-shot weakly-supervised deep learning anomaly detection framework.
This framework incorporates data augmentation, representation learning and
ordinal regression. We then evaluated and showed the performance of our
implemented framework on three benchmark datasets: NSL-KDD, CIC-IDS2018, and
TON_IoT.
| no_new_dataset | 0.710226 |
2304.07492 | Yong Niu | Shaoyou Ao, Yong Niu, Zhu Han, Bo Ai, Zhangdui Zhong, Ning Wang,
Yuanyuan Qiao | Resource Allocation for RIS-Assisted Device-to-Device Communications in
Heterogeneous Cellular Networks | 14 pages, 7 Figures, to appear in IEEE Transactions on Vehicular
Technology | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, with the explosive growth of data traffic, communication
base stations (BSs) need to serve more and more users. Offloading traffic from
BSs has become an efficient way to reduce the burden on BSs. Device-to-Device
(D2D) communications have emerged to improve spectrum utilization by reusing
the frequency spectrum of the cellular frequency band. In the general
environment, Heterogeneous Cellular Networks (HCNs) including millimeter wave
(mm-wave) have appeared. Since the D2D link allows to share of spectrum
resources with the cellular user, it will bring potential interference to the
cellular user. Fortunately, an emerging technology called Reconfigurable
Intelligent Surface (RIS) can mitigate the severe interference caused by D2D
links by shaping the incident beam and improving the multipath phase shift. In
this paper, we study the resource allocation scheme to maximize the system sum
rate, in the RISassisted single-cell heterogeneous D2D communication scenario.
To solve the Block Coordinate Descent (BCD) problem, the problem of maximizing
the sum rate is decomposed into three sub-problems. The resource allocation
sub-problem is solved by a coalitional game method based on the game theory.
The power allocation problem of the coalition converts the concave function
into a convex optimization by mathematical transformation. The problem is
solved by the gradient descent method. The local search method is adopted to
find the optimum for the phase conversion problem. Then iterate until the
difference of sum rate is less than the threshold. The simulation results show
that the designed algorithm is superior to other benchmark schemes in the
literature.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 07:08:16 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Ao",
"Shaoyou",
""
],
[
"Niu",
"Yong",
""
],
[
"Han",
"Zhu",
""
],
[
"Ai",
"Bo",
""
],
[
"Zhong",
"Zhangdui",
""
],
[
"Wang",
"Ning",
""
],
[
"Qiao",
"Yuanyuan",
""
]
] | TITLE: Resource Allocation for RIS-Assisted Device-to-Device Communications in
Heterogeneous Cellular Networks
ABSTRACT: In recent years, with the explosive growth of data traffic, communication
base stations (BSs) need to serve more and more users. Offloading traffic from
BSs has become an efficient way to reduce the burden on BSs. Device-to-Device
(D2D) communications have emerged to improve spectrum utilization by reusing
the frequency spectrum of the cellular frequency band. In the general
environment, Heterogeneous Cellular Networks (HCNs) including millimeter wave
(mm-wave) have appeared. Since the D2D link allows to share of spectrum
resources with the cellular user, it will bring potential interference to the
cellular user. Fortunately, an emerging technology called Reconfigurable
Intelligent Surface (RIS) can mitigate the severe interference caused by D2D
links by shaping the incident beam and improving the multipath phase shift. In
this paper, we study the resource allocation scheme to maximize the system sum
rate, in the RISassisted single-cell heterogeneous D2D communication scenario.
To solve the Block Coordinate Descent (BCD) problem, the problem of maximizing
the sum rate is decomposed into three sub-problems. The resource allocation
sub-problem is solved by a coalitional game method based on the game theory.
The power allocation problem of the coalition converts the concave function
into a convex optimization by mathematical transformation. The problem is
solved by the gradient descent method. The local search method is adopted to
find the optimum for the phase conversion problem. Then iterate until the
difference of sum rate is less than the threshold. The simulation results show
that the designed algorithm is superior to other benchmark schemes in the
literature.
| no_new_dataset | 0.711049 |
2304.07494 | Yibo Zhou | Yibo Zhou, Dongfei Cui, Xiangming Dong, Zongkai Wu, Zhenyu Wei,
Donglin Wang | BVIP Guiding System with Adaptability to Individual Differences | Submitted to IEEE International Conference on Robot and Human
Interactive Communication (RO-MAN) 2023 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Guiding robots can not only detect close-range obstacles like other guiding
tools, but also extend its range to perceive the environment when making
decisions. However, most existing works over-simplified the interaction between
human agents and robots, ignoring the differences between individuals,
resulting in poor experiences for different users. To solve the problem, we
propose a data-driven guiding system to cope with the effect brighten by
individual differences. In our guiding system, we design a Human Motion
Predictor (HMP) and a Robot Dynamics Model (RDM) based on deep neural network,
the time convolutional network (TCN) is verified to have the best performance,
to predict differences in interaction between different human agents and
robots. To train our models, we collected datasets that records the
interactions from different human agents. Moreover, given the predictive
information of the specific user, we propose a waypoints selector that allows
the robot to naturally adapt to the user's state changes, which are mainly
reflected in the walking speed. We compare the performance of our models with
previous works and achieve significant performance improvements. On this basis,
our guiding system demonstrated good adaptability to different human agents.
Our guiding system is deployed on a real quadruped robot to verify the
practicability.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 07:14:56 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zhou",
"Yibo",
""
],
[
"Cui",
"Dongfei",
""
],
[
"Dong",
"Xiangming",
""
],
[
"Wu",
"Zongkai",
""
],
[
"Wei",
"Zhenyu",
""
],
[
"Wang",
"Donglin",
""
]
] | TITLE: BVIP Guiding System with Adaptability to Individual Differences
ABSTRACT: Guiding robots can not only detect close-range obstacles like other guiding
tools, but also extend its range to perceive the environment when making
decisions. However, most existing works over-simplified the interaction between
human agents and robots, ignoring the differences between individuals,
resulting in poor experiences for different users. To solve the problem, we
propose a data-driven guiding system to cope with the effect brighten by
individual differences. In our guiding system, we design a Human Motion
Predictor (HMP) and a Robot Dynamics Model (RDM) based on deep neural network,
the time convolutional network (TCN) is verified to have the best performance,
to predict differences in interaction between different human agents and
robots. To train our models, we collected datasets that records the
interactions from different human agents. Moreover, given the predictive
information of the specific user, we propose a waypoints selector that allows
the robot to naturally adapt to the user's state changes, which are mainly
reflected in the walking speed. We compare the performance of our models with
previous works and achieve significant performance improvements. On this basis,
our guiding system demonstrated good adaptability to different human agents.
Our guiding system is deployed on a real quadruped robot to verify the
practicability.
| no_new_dataset | 0.702492 |
2304.07506 | Bingchao Wu | Bingchao Wu, Yangyuxuan Kang, Daoguang Zan, Bei Guan, Yongji Wang | Hierarchical and Contrastive Representation Learning for Knowledge-aware
Recommendation | Accepted by ICME 2023 | null | null | null | cs.IR cs.AI | http://creativecommons.org/licenses/by/4.0/ | Incorporating knowledge graph into recommendation is an effective way to
alleviate data sparsity. Most existing knowledge-aware methods usually perform
recursive embedding propagation by enumerating graph neighbors. However, the
number of nodes' neighbors grows exponentially as the hop number increases,
forcing the nodes to be aware of vast neighbors under this recursive
propagation for distilling the high-order semantic relatedness. This may induce
more harmful noise than useful information into recommendation, leading the
learned node representations to be indistinguishable from each other, that is,
the well-known over-smoothing issue. To relieve this issue, we propose a
Hierarchical and CONtrastive representation learning framework for
knowledge-aware recommendation named HiCON. Specifically, for avoiding the
exponential expansion of neighbors, we propose a hierarchical message
aggregation mechanism to interact separately with low-order neighbors and
meta-path-constrained high-order neighbors. Moreover, we also perform
cross-order contrastive learning to enforce the representations to be more
discriminative. Extensive experiments on three datasets show the remarkable
superiority of HiCON over state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 08:22:22 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Wu",
"Bingchao",
""
],
[
"Kang",
"Yangyuxuan",
""
],
[
"Zan",
"Daoguang",
""
],
[
"Guan",
"Bei",
""
],
[
"Wang",
"Yongji",
""
]
] | TITLE: Hierarchical and Contrastive Representation Learning for Knowledge-aware
Recommendation
ABSTRACT: Incorporating knowledge graph into recommendation is an effective way to
alleviate data sparsity. Most existing knowledge-aware methods usually perform
recursive embedding propagation by enumerating graph neighbors. However, the
number of nodes' neighbors grows exponentially as the hop number increases,
forcing the nodes to be aware of vast neighbors under this recursive
propagation for distilling the high-order semantic relatedness. This may induce
more harmful noise than useful information into recommendation, leading the
learned node representations to be indistinguishable from each other, that is,
the well-known over-smoothing issue. To relieve this issue, we propose a
Hierarchical and CONtrastive representation learning framework for
knowledge-aware recommendation named HiCON. Specifically, for avoiding the
exponential expansion of neighbors, we propose a hierarchical message
aggregation mechanism to interact separately with low-order neighbors and
meta-path-constrained high-order neighbors. Moreover, we also perform
cross-order contrastive learning to enforce the representations to be more
discriminative. Extensive experiments on three datasets show the remarkable
superiority of HiCON over state-of-the-art approaches.
| no_new_dataset | 0.708629 |
2304.07509 | Ning Gui Prof. dr. | Bei Lin, You Li, Ning Gui, Zhuopeng Xu, Zhiwu Yu | Multi-View Graph Representation Learning Beyond Homophily | 20 pages, 10 figures, accepted by ACM Transaction on Knowledge
Discovery in Data | null | null | null | cs.LG cs.SI | http://creativecommons.org/licenses/by/4.0/ | Unsupervised graph representation learning(GRL) aims to distill diverse graph
information into task-agnostic embeddings without label supervision. Due to a
lack of support from labels, recent representation learning methods usually
adopt self-supervised learning, and embeddings are learned by solving a
handcrafted auxiliary task(so-called pretext task). However, partially due to
the irregular non-Euclidean data in graphs, the pretext tasks are generally
designed under homophily assumptions and cornered in the low-frequency signals,
which results in significant loss of other signals, especially high-frequency
signals widespread in graphs with heterophily. Motivated by this limitation, we
propose a multi-view perspective and the usage of diverse pretext tasks to
capture different signals in graphs into embeddings. A novel framework, denoted
as Multi-view Graph Encoder(MVGE), is proposed, and a set of key designs are
identified. More specifically, a set of new pretext tasks are designed to
encode different types of signals, and a straightforward operation is
propxwosed to maintain both the commodity and personalization in both the
attribute and the structural levels. Extensive experiments on synthetic and
real-world network datasets show that the node representations learned with
MVGE achieve significant performance improvements in three different downstream
tasks, especially on graphs with heterophily. Source code is available at
\url{https://github.com/G-AILab/MVGE}.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 08:35:49 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Lin",
"Bei",
""
],
[
"Li",
"You",
""
],
[
"Gui",
"Ning",
""
],
[
"Xu",
"Zhuopeng",
""
],
[
"Yu",
"Zhiwu",
""
]
] | TITLE: Multi-View Graph Representation Learning Beyond Homophily
ABSTRACT: Unsupervised graph representation learning(GRL) aims to distill diverse graph
information into task-agnostic embeddings without label supervision. Due to a
lack of support from labels, recent representation learning methods usually
adopt self-supervised learning, and embeddings are learned by solving a
handcrafted auxiliary task(so-called pretext task). However, partially due to
the irregular non-Euclidean data in graphs, the pretext tasks are generally
designed under homophily assumptions and cornered in the low-frequency signals,
which results in significant loss of other signals, especially high-frequency
signals widespread in graphs with heterophily. Motivated by this limitation, we
propose a multi-view perspective and the usage of diverse pretext tasks to
capture different signals in graphs into embeddings. A novel framework, denoted
as Multi-view Graph Encoder(MVGE), is proposed, and a set of key designs are
identified. More specifically, a set of new pretext tasks are designed to
encode different types of signals, and a straightforward operation is
propxwosed to maintain both the commodity and personalization in both the
attribute and the structural levels. Extensive experiments on synthetic and
real-world network datasets show that the node representations learned with
MVGE achieve significant performance improvements in three different downstream
tasks, especially on graphs with heterophily. Source code is available at
\url{https://github.com/G-AILab/MVGE}.
| no_new_dataset | 0.709655 |
2304.07533 | Amrollah Seifoddini | Amrollah Seifoddini, Koen Vernooij, Timon K\"unzle, Alessandro
Canopoli, Malte Alf, Anna Volokitin, Reza Shirvany | ALiSNet: Accurate and Lightweight Human Segmentation Network for Fashion
E-Commerce | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Accurately estimating human body shape from photos can enable innovative
applications in fashion, from mass customization, to size and fit
recommendations and virtual try-on. Body silhouettes calculated from user
pictures are effective representations of the body shape for downstream tasks.
Smartphones provide a convenient way for users to capture images of their body,
and on-device image processing allows predicting body segmentation while
protecting users privacy. Existing off-the-shelf methods for human segmentation
are closed source and cannot be specialized for our application of body shape
and measurement estimation. Therefore, we create a new segmentation model by
simplifying Semantic FPN with PointRend, an existing accurate model. We
finetune this model on a high-quality dataset of humans in a restricted set of
poses relevant for our application. We obtain our final model, ALiSNet, with a
size of 4MB and 97.6$\pm$1.0$\%$ mIoU, compared to Apple Person Segmentation,
which has an accuracy of 94.4$\pm$5.7$\%$ mIoU on our dataset.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 11:06:32 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Seifoddini",
"Amrollah",
""
],
[
"Vernooij",
"Koen",
""
],
[
"Künzle",
"Timon",
""
],
[
"Canopoli",
"Alessandro",
""
],
[
"Alf",
"Malte",
""
],
[
"Volokitin",
"Anna",
""
],
[
"Shirvany",
"Reza",
""
]
] | TITLE: ALiSNet: Accurate and Lightweight Human Segmentation Network for Fashion
E-Commerce
ABSTRACT: Accurately estimating human body shape from photos can enable innovative
applications in fashion, from mass customization, to size and fit
recommendations and virtual try-on. Body silhouettes calculated from user
pictures are effective representations of the body shape for downstream tasks.
Smartphones provide a convenient way for users to capture images of their body,
and on-device image processing allows predicting body segmentation while
protecting users privacy. Existing off-the-shelf methods for human segmentation
are closed source and cannot be specialized for our application of body shape
and measurement estimation. Therefore, we create a new segmentation model by
simplifying Semantic FPN with PointRend, an existing accurate model. We
finetune this model on a high-quality dataset of humans in a restricted set of
poses relevant for our application. We obtain our final model, ALiSNet, with a
size of 4MB and 97.6$\pm$1.0$\%$ mIoU, compared to Apple Person Segmentation,
which has an accuracy of 94.4$\pm$5.7$\%$ mIoU on our dataset.
| no_new_dataset | 0.704516 |
2304.07535 | Edoardo Di Paolo | Edoardo Di Paolo, Marinella Petrocchi, Angelo Spognardi | From Online Behaviours to Images: A Novel Approach to Social Bot
Detection | Accepted @ICCS2023, 23th International Conference on Computational
Science, 3-5 July, 2023. The present version is a preprint | null | null | null | cs.SI cs.AI cs.CY cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Online Social Networks have revolutionized how we consume and share
information, but they have also led to a proliferation of content not always
reliable and accurate. One particular type of social accounts is known to
promote unreputable content, hyperpartisan, and propagandistic information.
They are automated accounts, commonly called bots. Focusing on Twitter
accounts, we propose a novel approach to bot detection: we first propose a new
algorithm that transforms the sequence of actions that an account performs into
an image; then, we leverage the strength of Convolutional Neural Networks to
proceed with image classification. We compare our performances with
state-of-the-art results for bot detection on genuine accounts / bot accounts
datasets well known in the literature. The results confirm the effectiveness of
the proposal, because the detection capability is on par with the state of the
art, if not better in some cases.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 11:36:50 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Di Paolo",
"Edoardo",
""
],
[
"Petrocchi",
"Marinella",
""
],
[
"Spognardi",
"Angelo",
""
]
] | TITLE: From Online Behaviours to Images: A Novel Approach to Social Bot
Detection
ABSTRACT: Online Social Networks have revolutionized how we consume and share
information, but they have also led to a proliferation of content not always
reliable and accurate. One particular type of social accounts is known to
promote unreputable content, hyperpartisan, and propagandistic information.
They are automated accounts, commonly called bots. Focusing on Twitter
accounts, we propose a novel approach to bot detection: we first propose a new
algorithm that transforms the sequence of actions that an account performs into
an image; then, we leverage the strength of Convolutional Neural Networks to
proceed with image classification. We compare our performances with
state-of-the-art results for bot detection on genuine accounts / bot accounts
datasets well known in the literature. The results confirm the effectiveness of
the proposal, because the detection capability is on par with the state of the
art, if not better in some cases.
| no_new_dataset | 0.709044 |
2304.07554 | Ella Gale | Ella Gale | Shape is (almost) all!: Persistent homology features (PHFs) are an
information rich input for efficient molecular machine learning | 18 pages, 15 figures | null | null | null | cs.LG cond-mat.dis-nn math.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 3-D shape is important to chemistry, but how important? Machine learning
works best when the inputs are simple and match the problem well. Chemistry
datasets tend to be very small compared to those generally used in machine
learning so we need to get the most from each datapoint. Persistent homology
measures the topological shape properties of point clouds at different scales
and is used in topological data analysis. Here we investigate what persistent
homology captures about molecular structure and create persistent homology
features (PHFs) that encode a molecule's shape whilst losing most of the
symbolic detail like atom labels, valence, charge, bonds etc. We demonstrate
the usefulness of PHFs on a series of chemical datasets: QM7, lipophilicity,
Delaney and Tox21. PHFs work as well as the best benchmarks. PHFs are very
information dense and much smaller than other encoding methods yet found,
meaning ML algorithms are much more energy efficient. PHFs success despite
losing a large amount of chemical detail highlights how much of chemistry can
be simplified to topological shape.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 13:24:35 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Gale",
"Ella",
""
]
] | TITLE: Shape is (almost) all!: Persistent homology features (PHFs) are an
information rich input for efficient molecular machine learning
ABSTRACT: 3-D shape is important to chemistry, but how important? Machine learning
works best when the inputs are simple and match the problem well. Chemistry
datasets tend to be very small compared to those generally used in machine
learning so we need to get the most from each datapoint. Persistent homology
measures the topological shape properties of point clouds at different scales
and is used in topological data analysis. Here we investigate what persistent
homology captures about molecular structure and create persistent homology
features (PHFs) that encode a molecule's shape whilst losing most of the
symbolic detail like atom labels, valence, charge, bonds etc. We demonstrate
the usefulness of PHFs on a series of chemical datasets: QM7, lipophilicity,
Delaney and Tox21. PHFs work as well as the best benchmarks. PHFs are very
information dense and much smaller than other encoding methods yet found,
meaning ML algorithms are much more energy efficient. PHFs success despite
losing a large amount of chemical detail highlights how much of chemistry can
be simplified to topological shape.
| no_new_dataset | 0.713419 |
2304.07558 | Ella Gale | Ella Gale | Icospherical Chemical Objects (ICOs) allow for chemical data
augmentation and maintain rotational, translation and permutation invariance | 16 pages, 13 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dataset augmentation is a common way to deal with small datasets; Chemistry
datasets are often small. Spherical convolutional neural networks (SphNNs) and
Icosahedral neural networks (IcoNNs) are a type of geometric machine learning
algorithm that maintains rotational symmetry. Molecular structure has
rotational invariance and is inherently 3-D, and thus we need 3-D encoding
methods to input molecular structure into machine learning. In this paper I
present Icospherical Chemical Objects (ICOs) that enable the encoding of 3-D
data in a rotationally invariant way which works with spherical or icosahedral
neural networks and allows for dataset augmentation. I demonstrate the ICO
featurisation method on the following tasks: predicting general molecular
properties, predicting solubility of drug like molecules and the protein
binding problem and find that ICO and SphNNs perform well on all problems.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 13:37:55 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Gale",
"Ella",
""
]
] | TITLE: Icospherical Chemical Objects (ICOs) allow for chemical data
augmentation and maintain rotational, translation and permutation invariance
ABSTRACT: Dataset augmentation is a common way to deal with small datasets; Chemistry
datasets are often small. Spherical convolutional neural networks (SphNNs) and
Icosahedral neural networks (IcoNNs) are a type of geometric machine learning
algorithm that maintains rotational symmetry. Molecular structure has
rotational invariance and is inherently 3-D, and thus we need 3-D encoding
methods to input molecular structure into machine learning. In this paper I
present Icospherical Chemical Objects (ICOs) that enable the encoding of 3-D
data in a rotationally invariant way which works with spherical or icosahedral
neural networks and allows for dataset augmentation. I demonstrate the ICO
featurisation method on the following tasks: predicting general molecular
properties, predicting solubility of drug like molecules and the protein
binding problem and find that ICO and SphNNs perform well on all problems.
| no_new_dataset | 0.711638 |
2304.07580 | Fang Hao | Hao Fang, Ajian Liu, Jun Wan, Sergio Escalera, Hugo Jair Escalante,
Zhen Lei | Surveillance Face Presentation Attack Detection Challenge | 8 pages, 7 figures | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Face Anti-spoofing (FAS) is essential to secure face recognition systems from
various physical attacks. However, most of the studies lacked consideration of
long-distance scenarios. Specifically, compared with FAS in traditional scenes
such as phone unlocking, face payment, and self-service security inspection,
FAS in long-distance such as station squares, parks, and self-service
supermarkets are equally important, but it has not been sufficiently explored
yet. In order to fill this gap in the FAS community, we collect a large-scale
Surveillance High-Fidelity Mask (SuHiFiMask). SuHiFiMask contains $10,195$
videos from $101$ subjects of different age groups, which are collected by $7$
mainstream surveillance cameras. Based on this dataset and protocol-$3$ for
evaluating the robustness of the algorithm under quality changes, we organized
a face presentation attack detection challenge in surveillance scenarios. It
attracted 180 teams for the development phase with a total of 37 teams
qualifying for the final round. The organization team re-verified and re-ran
the submitted code and used the results as the final ranking. In this paper, we
present an overview of the challenge, including an introduction to the dataset
used, the definition of the protocol, the evaluation metrics, and the
announcement of the competition results. Finally, we present the top-ranked
algorithms and the research ideas provided by the competition for attack
detection in long-range surveillance scenarios.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 15:23:19 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Fang",
"Hao",
""
],
[
"Liu",
"Ajian",
""
],
[
"Wan",
"Jun",
""
],
[
"Escalera",
"Sergio",
""
],
[
"Escalante",
"Hugo Jair",
""
],
[
"Lei",
"Zhen",
""
]
] | TITLE: Surveillance Face Presentation Attack Detection Challenge
ABSTRACT: Face Anti-spoofing (FAS) is essential to secure face recognition systems from
various physical attacks. However, most of the studies lacked consideration of
long-distance scenarios. Specifically, compared with FAS in traditional scenes
such as phone unlocking, face payment, and self-service security inspection,
FAS in long-distance such as station squares, parks, and self-service
supermarkets are equally important, but it has not been sufficiently explored
yet. In order to fill this gap in the FAS community, we collect a large-scale
Surveillance High-Fidelity Mask (SuHiFiMask). SuHiFiMask contains $10,195$
videos from $101$ subjects of different age groups, which are collected by $7$
mainstream surveillance cameras. Based on this dataset and protocol-$3$ for
evaluating the robustness of the algorithm under quality changes, we organized
a face presentation attack detection challenge in surveillance scenarios. It
attracted 180 teams for the development phase with a total of 37 teams
qualifying for the final round. The organization team re-verified and re-ran
the submitted code and used the results as the final ranking. In this paper, we
present an overview of the challenge, including an introduction to the dataset
used, the definition of the protocol, the evaluation metrics, and the
announcement of the competition results. Finally, we present the top-ranked
algorithms and the research ideas provided by the competition for attack
detection in long-range surveillance scenarios.
| new_dataset | 0.576959 |
2304.07584 | Wenxian Wu Ncu | Li Zhu, Jiahui Xiong, Wenxian Wu, Hongyu Yu | FSDNet-An efficient fire detection network for complex scenarios based
on YOLOv3 and DenseNet | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Fire is one of the common disasters in daily life. To achieve fast and
accurate detection of fires, this paper proposes a detection network called
FSDNet (Fire Smoke Detection Network), which consists of a feature extraction
module, a fire classification module, and a fire detection module. Firstly, a
dense connection structure is introduced in the basic feature extraction module
to enhance the feature extraction ability of the backbone network and alleviate
the gradient disappearance problem. Secondly, a spatial pyramid pooling
structure is introduced in the fire detection module, and the Mosaic data
augmentation method and CIoU loss function are used in the training process to
comprehensively improve the flame feature extraction ability. Finally, in view
of the shortcomings of public fire datasets, a fire dataset called MS-FS
(Multi-scene Fire And Smoke) containing 11938 fire images was created through
data collection, screening, and object annotation. To prove the effectiveness
of the proposed method, the accuracy of the method was evaluated on two
benchmark fire datasets and MS-FS. The experimental results show that the
accuracy of FSDNet on the two benchmark datasets is 99.82% and 91.15%,
respectively, and the average precision on MS-FS is 86.80%, which is better
than the mainstream fire detection methods.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 15:46:08 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zhu",
"Li",
""
],
[
"Xiong",
"Jiahui",
""
],
[
"Wu",
"Wenxian",
""
],
[
"Yu",
"Hongyu",
""
]
] | TITLE: FSDNet-An efficient fire detection network for complex scenarios based
on YOLOv3 and DenseNet
ABSTRACT: Fire is one of the common disasters in daily life. To achieve fast and
accurate detection of fires, this paper proposes a detection network called
FSDNet (Fire Smoke Detection Network), which consists of a feature extraction
module, a fire classification module, and a fire detection module. Firstly, a
dense connection structure is introduced in the basic feature extraction module
to enhance the feature extraction ability of the backbone network and alleviate
the gradient disappearance problem. Secondly, a spatial pyramid pooling
structure is introduced in the fire detection module, and the Mosaic data
augmentation method and CIoU loss function are used in the training process to
comprehensively improve the flame feature extraction ability. Finally, in view
of the shortcomings of public fire datasets, a fire dataset called MS-FS
(Multi-scene Fire And Smoke) containing 11938 fire images was created through
data collection, screening, and object annotation. To prove the effectiveness
of the proposed method, the accuracy of the method was evaluated on two
benchmark fire datasets and MS-FS. The experimental results show that the
accuracy of FSDNet on the two benchmark datasets is 99.82% and 91.15%,
respectively, and the average precision on MS-FS is 86.80%, which is better
than the mainstream fire detection methods.
| new_dataset | 0.712988 |
2304.07599 | Katiana Kontolati | Katiana Kontolati, Somdatta Goswami, George Em Karniadakis, Michael D.
Shields | Learning in latent spaces improves the predictive accuracy of deep
neural operators | 22 pages, 12 figures | null | null | null | cs.LG cs.NA math.DS math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Operator regression provides a powerful means of constructing
discretization-invariant emulators for partial-differential equations (PDEs)
describing physical systems. Neural operators specifically employ deep neural
networks to approximate mappings between infinite-dimensional Banach spaces. As
data-driven models, neural operators require the generation of labeled
observations, which in cases of complex high-fidelity models result in
high-dimensional datasets containing redundant and noisy features, which can
hinder gradient-based optimization. Mapping these high-dimensional datasets to
a low-dimensional latent space of salient features can make it easier to work
with the data and also enhance learning. In this work, we investigate the
latent deep operator network (L-DeepONet), an extension of standard DeepONet,
which leverages latent representations of high-dimensional PDE input and output
functions identified with suitable autoencoders. We illustrate that L-DeepONet
outperforms the standard approach in terms of both accuracy and computational
efficiency across diverse time-dependent PDEs, e.g., modeling the growth of
fracture in brittle materials, convective fluid flows, and large-scale
atmospheric flows exhibiting multiscale dynamical features.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 17:13:09 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kontolati",
"Katiana",
""
],
[
"Goswami",
"Somdatta",
""
],
[
"Karniadakis",
"George Em",
""
],
[
"Shields",
"Michael D.",
""
]
] | TITLE: Learning in latent spaces improves the predictive accuracy of deep
neural operators
ABSTRACT: Operator regression provides a powerful means of constructing
discretization-invariant emulators for partial-differential equations (PDEs)
describing physical systems. Neural operators specifically employ deep neural
networks to approximate mappings between infinite-dimensional Banach spaces. As
data-driven models, neural operators require the generation of labeled
observations, which in cases of complex high-fidelity models result in
high-dimensional datasets containing redundant and noisy features, which can
hinder gradient-based optimization. Mapping these high-dimensional datasets to
a low-dimensional latent space of salient features can make it easier to work
with the data and also enhance learning. In this work, we investigate the
latent deep operator network (L-DeepONet), an extension of standard DeepONet,
which leverages latent representations of high-dimensional PDE input and output
functions identified with suitable autoencoders. We illustrate that L-DeepONet
outperforms the standard approach in terms of both accuracy and computational
efficiency across diverse time-dependent PDEs, e.g., modeling the growth of
fracture in brittle materials, convective fluid flows, and large-scale
atmospheric flows exhibiting multiscale dynamical features.
| no_new_dataset | 0.709422 |
2304.07611 | Ruchao Fan | Ruchao Fan, Wei Chu, Peng Chang, and Abeer Alwan | A CTC Alignment-based Non-autoregressive Transformer for End-to-end
Automatic Speech Recognition | Published in IEEE Transactions on Audio, Speech, and Language
Processing | null | 10.1109/TASLP.2023.3263789 | null | cs.CL eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, end-to-end models have been widely used in automatic speech
recognition (ASR) systems. Two of the most representative approaches are
connectionist temporal classification (CTC) and attention-based encoder-decoder
(AED) models. Autoregressive transformers, variants of AED, adopt an
autoregressive mechanism for token generation and thus are relatively slow
during inference. In this paper, we present a comprehensive study of a CTC
Alignment-based Single-Step Non-Autoregressive Transformer (CASS-NAT) for
end-to-end ASR. In CASS-NAT, word embeddings in the autoregressive transformer
(AT) are substituted with token-level acoustic embeddings (TAE) that are
extracted from encoder outputs with the acoustical boundary information offered
by the CTC alignment. TAE can be obtained in parallel, resulting in a parallel
generation of output tokens. During training, Viterbi-alignment is used for TAE
generation, and multiple training strategies are further explored to improve
the word error rate (WER) performance. During inference, an error-based
alignment sampling method is investigated in depth to reduce the alignment
mismatch in the training and testing processes. Experimental results show that
the CASS-NAT has a WER that is close to AT on various ASR tasks, while
providing a ~24x inference speedup. With and without self-supervised learning,
we achieve new state-of-the-art results for non-autoregressive models on
several datasets. We also analyze the behavior of the CASS-NAT decoder to
explain why it can perform similarly to AT. We find that TAEs have similar
functionality to word embeddings for grammatical structures, which might
indicate the possibility of learning some semantic information from TAEs
without a language model.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 18:34:29 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Fan",
"Ruchao",
""
],
[
"Chu",
"Wei",
""
],
[
"Chang",
"Peng",
""
],
[
"Alwan",
"Abeer",
""
]
] | TITLE: A CTC Alignment-based Non-autoregressive Transformer for End-to-end
Automatic Speech Recognition
ABSTRACT: Recently, end-to-end models have been widely used in automatic speech
recognition (ASR) systems. Two of the most representative approaches are
connectionist temporal classification (CTC) and attention-based encoder-decoder
(AED) models. Autoregressive transformers, variants of AED, adopt an
autoregressive mechanism for token generation and thus are relatively slow
during inference. In this paper, we present a comprehensive study of a CTC
Alignment-based Single-Step Non-Autoregressive Transformer (CASS-NAT) for
end-to-end ASR. In CASS-NAT, word embeddings in the autoregressive transformer
(AT) are substituted with token-level acoustic embeddings (TAE) that are
extracted from encoder outputs with the acoustical boundary information offered
by the CTC alignment. TAE can be obtained in parallel, resulting in a parallel
generation of output tokens. During training, Viterbi-alignment is used for TAE
generation, and multiple training strategies are further explored to improve
the word error rate (WER) performance. During inference, an error-based
alignment sampling method is investigated in depth to reduce the alignment
mismatch in the training and testing processes. Experimental results show that
the CASS-NAT has a WER that is close to AT on various ASR tasks, while
providing a ~24x inference speedup. With and without self-supervised learning,
we achieve new state-of-the-art results for non-autoregressive models on
several datasets. We also analyze the behavior of the CASS-NAT decoder to
explain why it can perform similarly to AT. We find that TAEs have similar
functionality to word embeddings for grammatical structures, which might
indicate the possibility of learning some semantic information from TAEs
without a language model.
| no_new_dataset | 0.712226 |
2304.07637 | Abhishek Bamotra | Abhishek Bamotra, Phani Krishna Uppala | TransDocs: Optical Character Recognition with word to word translation | null | null | null | null | cs.CV cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | While OCR has been used in various applications, its output is not always
accurate, leading to misfit words. This research work focuses on improving the
optical character recognition (OCR) with ML techniques with integration of OCR
with long short-term memory (LSTM) based sequence to sequence deep learning
models to perform document translation. This work is based on ANKI dataset for
English to Spanish translation. In this work, I have shown comparative study
for pre-trained OCR while using deep learning model using LSTM-based seq2seq
architecture with attention for machine translation. End-to-end performance of
the model has been expressed in BLEU-4 score. This research paper is aimed at
researchers and practitioners interested in OCR and its applications in
document translation.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 21:40:14 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Bamotra",
"Abhishek",
""
],
[
"Uppala",
"Phani Krishna",
""
]
] | TITLE: TransDocs: Optical Character Recognition with word to word translation
ABSTRACT: While OCR has been used in various applications, its output is not always
accurate, leading to misfit words. This research work focuses on improving the
optical character recognition (OCR) with ML techniques with integration of OCR
with long short-term memory (LSTM) based sequence to sequence deep learning
models to perform document translation. This work is based on ANKI dataset for
English to Spanish translation. In this work, I have shown comparative study
for pre-trained OCR while using deep learning model using LSTM-based seq2seq
architecture with attention for machine translation. End-to-end performance of
the model has been expressed in BLEU-4 score. This research paper is aimed at
researchers and practitioners interested in OCR and its applications in
document translation.
| no_new_dataset | 0.709453 |
2304.07646 | Jonas Skackauskas Mr | Jonas Skackauskas, Tatiana Kalganova | Herder Ants: Ant Colony Optimization with Aphids for Discrete
Event-Triggered Dynamic Optimization Problems | null | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Currently available dynamic optimization strategies for Ant Colony
Optimization (ACO) algorithm offer a trade-off of slower algorithm convergence
or significant penalty to solution quality after each dynamic change occurs.
This paper proposes a discrete dynamic optimization strategy called Ant Colony
Optimization (ACO) with Aphids, modelled after a real-world symbiotic
relationship between ants and aphids. ACO with Aphids strategy is designed to
improve solution quality of discrete domain Dynamic Optimization Problems
(DOPs) with event-triggered discrete dynamism. The proposed strategy aims to
improve the inter-state convergence rate throughout the entire dynamic
optimization. It does so by minimizing the fitness penalty and maximizing the
convergence speed that occurs after the dynamic change. This strategy is tested
against Full-Restart and Pheromone-Sharing strategies implemented on the same
ACO core algorithm solving Dynamic Multidimensional Knapsack Problem (DMKP)
benchmarks. ACO with Aphids has demonstrated superior performance over the
Pheromone-Sharing strategy in every test on average gap reduced by 29.2%. Also,
ACO with Aphids has outperformed the Full-Restart strategy for large datasets
groups, and the overall average gap is reduced by 52.5%.
| [
{
"version": "v1",
"created": "Sat, 15 Apr 2023 22:21:41 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Skackauskas",
"Jonas",
""
],
[
"Kalganova",
"Tatiana",
""
]
] | TITLE: Herder Ants: Ant Colony Optimization with Aphids for Discrete
Event-Triggered Dynamic Optimization Problems
ABSTRACT: Currently available dynamic optimization strategies for Ant Colony
Optimization (ACO) algorithm offer a trade-off of slower algorithm convergence
or significant penalty to solution quality after each dynamic change occurs.
This paper proposes a discrete dynamic optimization strategy called Ant Colony
Optimization (ACO) with Aphids, modelled after a real-world symbiotic
relationship between ants and aphids. ACO with Aphids strategy is designed to
improve solution quality of discrete domain Dynamic Optimization Problems
(DOPs) with event-triggered discrete dynamism. The proposed strategy aims to
improve the inter-state convergence rate throughout the entire dynamic
optimization. It does so by minimizing the fitness penalty and maximizing the
convergence speed that occurs after the dynamic change. This strategy is tested
against Full-Restart and Pheromone-Sharing strategies implemented on the same
ACO core algorithm solving Dynamic Multidimensional Knapsack Problem (DMKP)
benchmarks. ACO with Aphids has demonstrated superior performance over the
Pheromone-Sharing strategy in every test on average gap reduced by 29.2%. Also,
ACO with Aphids has outperformed the Full-Restart strategy for large datasets
groups, and the overall average gap is reduced by 52.5%.
| no_new_dataset | 0.71145 |
2304.07668 | Nazar Waheed | Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis
Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda | FedBlockHealth: A Synergistic Approach to Privacy and Security in
IoT-Enabled Healthcare through Federated Learning and Blockchain | Submitted to: Globecom 2023 | null | null | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | The rapid adoption of Internet of Things (IoT) devices in healthcare has
introduced new challenges in preserving data privacy, security and patient
safety. Traditional approaches need to ensure security and privacy while
maintaining computational efficiency, particularly for resource-constrained IoT
devices. This paper proposes a novel hybrid approach combining federated
learning and blockchain technology to provide a secure and privacy-preserved
solution for IoT-enabled healthcare applications. Our approach leverages a
public-key cryptosystem that provides semantic security for local model
updates, while blockchain technology ensures the integrity of these updates and
enforces access control and accountability. The federated learning process
enables a secure model aggregation without sharing sensitive patient data. We
implement and evaluate our proposed framework using EMNIST datasets,
demonstrating its effectiveness in preserving data privacy and security while
maintaining computational efficiency. The results suggest that our hybrid
approach can significantly enhance the development of secure and
privacy-preserved IoT-enabled healthcare applications, offering a promising
direction for future research in this field.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2023 01:55:31 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Waheed",
"Nazar",
""
],
[
"Rehman",
"Ateeq Ur",
""
],
[
"Nehra",
"Anushka",
""
],
[
"Farooq",
"Mahnoor",
""
],
[
"Tariq",
"Nargis",
""
],
[
"Jan",
"Mian Ahmad",
""
],
[
"Khan",
"Fazlullah",
""
],
[
"Alalmaie",
"Abeer Z.",
""
],
[
"Nanda",
"Priyadarsi",
""
]
] | TITLE: FedBlockHealth: A Synergistic Approach to Privacy and Security in
IoT-Enabled Healthcare through Federated Learning and Blockchain
ABSTRACT: The rapid adoption of Internet of Things (IoT) devices in healthcare has
introduced new challenges in preserving data privacy, security and patient
safety. Traditional approaches need to ensure security and privacy while
maintaining computational efficiency, particularly for resource-constrained IoT
devices. This paper proposes a novel hybrid approach combining federated
learning and blockchain technology to provide a secure and privacy-preserved
solution for IoT-enabled healthcare applications. Our approach leverages a
public-key cryptosystem that provides semantic security for local model
updates, while blockchain technology ensures the integrity of these updates and
enforces access control and accountability. The federated learning process
enables a secure model aggregation without sharing sensitive patient data. We
implement and evaluate our proposed framework using EMNIST datasets,
demonstrating its effectiveness in preserving data privacy and security while
maintaining computational efficiency. The results suggest that our hybrid
approach can significantly enhance the development of secure and
privacy-preserved IoT-enabled healthcare applications, offering a promising
direction for future research in this field.
| no_new_dataset | 0.711049 |
2304.07675 | Jielin Qiu | Jielin Qiu, Peide Huang, Makiya Nakashima, Jaehyun Lee, Jiacheng Zhu,
Wilson Tang, Pohao Chen, Christopher Nguyen, Byung-Hak Kim, Debbie Kwon,
Douglas Weber, Ding Zhao, David Chen | Multimodal Representation Learning of Cardiovascular Magnetic Resonance
Imaging | 24 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-supervised learning is crucial for clinical imaging applications, given
the lack of explicit labels in healthcare. However, conventional approaches
that rely on precise vision-language alignment are not always feasible in
complex clinical imaging modalities, such as cardiac magnetic resonance (CMR).
CMR provides a comprehensive visualization of cardiac anatomy, physiology, and
microstructure, making it challenging to interpret. Additionally, CMR reports
require synthesizing information from sequences of images and different views,
resulting in potentially weak alignment between the study and diagnosis report
pair. To overcome these challenges, we propose \textbf{CMRformer}, a multimodal
learning framework to jointly learn sequences of CMR images and associated
cardiologist's reports. Moreover, one of the major obstacles to improving CMR
study is the lack of large, publicly available datasets. To bridge this gap, we
collected a large \textbf{CMR dataset}, which consists of 13,787 studies from
clinical cases. By utilizing our proposed CMRformer and our collected dataset,
we achieved remarkable performance in real-world clinical tasks, such as CMR
image retrieval and diagnosis report retrieval. Furthermore, the learned
representations are evaluated to be practically helpful for downstream
applications, such as disease classification. Our work could potentially
expedite progress in the CMR study and lead to more accurate and effective
diagnosis and treatment.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2023 02:35:27 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Qiu",
"Jielin",
""
],
[
"Huang",
"Peide",
""
],
[
"Nakashima",
"Makiya",
""
],
[
"Lee",
"Jaehyun",
""
],
[
"Zhu",
"Jiacheng",
""
],
[
"Tang",
"Wilson",
""
],
[
"Chen",
"Pohao",
""
],
[
"Nguyen",
"Christopher",
""
],
[
"Kim",
"Byung-Hak",
""
],
[
"Kwon",
"Debbie",
""
],
[
"Weber",
"Douglas",
""
],
[
"Zhao",
"Ding",
""
],
[
"Chen",
"David",
""
]
] | TITLE: Multimodal Representation Learning of Cardiovascular Magnetic Resonance
Imaging
ABSTRACT: Self-supervised learning is crucial for clinical imaging applications, given
the lack of explicit labels in healthcare. However, conventional approaches
that rely on precise vision-language alignment are not always feasible in
complex clinical imaging modalities, such as cardiac magnetic resonance (CMR).
CMR provides a comprehensive visualization of cardiac anatomy, physiology, and
microstructure, making it challenging to interpret. Additionally, CMR reports
require synthesizing information from sequences of images and different views,
resulting in potentially weak alignment between the study and diagnosis report
pair. To overcome these challenges, we propose \textbf{CMRformer}, a multimodal
learning framework to jointly learn sequences of CMR images and associated
cardiologist's reports. Moreover, one of the major obstacles to improving CMR
study is the lack of large, publicly available datasets. To bridge this gap, we
collected a large \textbf{CMR dataset}, which consists of 13,787 studies from
clinical cases. By utilizing our proposed CMRformer and our collected dataset,
we achieved remarkable performance in real-world clinical tasks, such as CMR
image retrieval and diagnosis report retrieval. Furthermore, the learned
representations are evaluated to be practically helpful for downstream
applications, such as disease classification. Our work could potentially
expedite progress in the CMR study and lead to more accurate and effective
diagnosis and treatment.
| new_dataset | 0.715032 |
2304.07686 | Jianzhang Zheng | Jianzhang Zheng, Hao Shen, Jian Yang, Xuan Tang, Mingsong Chen, Hui
Yu, Jielong Guo, Xian Wei | Autoencoders with Intrinsic Dimension Constraints for Learning Low
Dimensional Image Representations | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Autoencoders have achieved great success in various computer vision
applications. The autoencoder learns appropriate low dimensional image
representations through the self-supervised paradigm, i.e., reconstruction.
Existing studies mainly focus on the minimizing the reconstruction error on
pixel level of image, while ignoring the preservation of Intrinsic Dimension
(ID), which is a fundamental geometric property of data representations in Deep
Neural Networks (DNNs). Motivated by the important role of ID, in this paper,
we propose a novel deep representation learning approach with autoencoder,
which incorporates regularization of the global and local ID constraints into
the reconstruction of data representations. This approach not only preserves
the global manifold structure of the whole dataset, but also maintains the
local manifold structure of the feature maps of each point, which makes the
learned low-dimensional features more discriminant and improves the performance
of the downstream algorithms. To our best knowledge, existing works are rare
and limited on exploiting both global and local ID invariant properties on the
regularization of autoencoders. Numerical experimental results on benchmark
datasets (Extended Yale B, Caltech101 and ImageNet) show that the resulting
regularized learning models achieve better discriminative representations for
downstream tasks including image classification and clustering.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2023 03:43:08 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Zheng",
"Jianzhang",
""
],
[
"Shen",
"Hao",
""
],
[
"Yang",
"Jian",
""
],
[
"Tang",
"Xuan",
""
],
[
"Chen",
"Mingsong",
""
],
[
"Yu",
"Hui",
""
],
[
"Guo",
"Jielong",
""
],
[
"Wei",
"Xian",
""
]
] | TITLE: Autoencoders with Intrinsic Dimension Constraints for Learning Low
Dimensional Image Representations
ABSTRACT: Autoencoders have achieved great success in various computer vision
applications. The autoencoder learns appropriate low dimensional image
representations through the self-supervised paradigm, i.e., reconstruction.
Existing studies mainly focus on the minimizing the reconstruction error on
pixel level of image, while ignoring the preservation of Intrinsic Dimension
(ID), which is a fundamental geometric property of data representations in Deep
Neural Networks (DNNs). Motivated by the important role of ID, in this paper,
we propose a novel deep representation learning approach with autoencoder,
which incorporates regularization of the global and local ID constraints into
the reconstruction of data representations. This approach not only preserves
the global manifold structure of the whole dataset, but also maintains the
local manifold structure of the feature maps of each point, which makes the
learned low-dimensional features more discriminant and improves the performance
of the downstream algorithms. To our best knowledge, existing works are rare
and limited on exploiting both global and local ID invariant properties on the
regularization of autoencoders. Numerical experimental results on benchmark
datasets (Extended Yale B, Caltech101 and ImageNet) show that the resulting
regularized learning models achieve better discriminative representations for
downstream tasks including image classification and clustering.
| no_new_dataset | 0.710245 |
2304.07691 | Shen Yan | Shen Yan, Yu Liu, Long Wang, Zehong Shen, Zhen Peng, Haomin Liu,
Maojun Zhang, Guofeng Zhang, Xiaowei Zhou | Long-term Visual Localization with Mobile Sensors | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the remarkable advances in image matching and pose estimation,
image-based localization of a camera in a temporally-varying outdoor
environment is still a challenging problem due to huge appearance disparity
between query and reference images caused by illumination, seasonal and
structural changes. In this work, we propose to leverage additional sensors on
a mobile phone, mainly GPS, compass, and gravity sensor, to solve this
challenging problem. We show that these mobile sensors provide decent initial
poses and effective constraints to reduce the searching space in image matching
and final pose estimation. With the initial pose, we are also able to devise a
direct 2D-3D matching network to efficiently establish 2D-3D correspondences
instead of tedious 2D-2D matching in existing systems. As no public dataset
exists for the studied problem, we collect a new dataset that provides a
variety of mobile sensor data and significant scene appearance variations, and
develop a system to acquire ground-truth poses for query images. We benchmark
our method as well as several state-of-the-art baselines and demonstrate the
effectiveness of the proposed approach. The code and dataset will be released
publicly.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2023 04:35:10 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Yan",
"Shen",
""
],
[
"Liu",
"Yu",
""
],
[
"Wang",
"Long",
""
],
[
"Shen",
"Zehong",
""
],
[
"Peng",
"Zhen",
""
],
[
"Liu",
"Haomin",
""
],
[
"Zhang",
"Maojun",
""
],
[
"Zhang",
"Guofeng",
""
],
[
"Zhou",
"Xiaowei",
""
]
] | TITLE: Long-term Visual Localization with Mobile Sensors
ABSTRACT: Despite the remarkable advances in image matching and pose estimation,
image-based localization of a camera in a temporally-varying outdoor
environment is still a challenging problem due to huge appearance disparity
between query and reference images caused by illumination, seasonal and
structural changes. In this work, we propose to leverage additional sensors on
a mobile phone, mainly GPS, compass, and gravity sensor, to solve this
challenging problem. We show that these mobile sensors provide decent initial
poses and effective constraints to reduce the searching space in image matching
and final pose estimation. With the initial pose, we are also able to devise a
direct 2D-3D matching network to efficiently establish 2D-3D correspondences
instead of tedious 2D-2D matching in existing systems. As no public dataset
exists for the studied problem, we collect a new dataset that provides a
variety of mobile sensor data and significant scene appearance variations, and
develop a system to acquire ground-truth poses for query images. We benchmark
our method as well as several state-of-the-art baselines and demonstrate the
effectiveness of the proposed approach. The code and dataset will be released
publicly.
| new_dataset | 0.715206 |
2304.07693 | Anh Nguyen | Jingxuan Kang, Tudor Jianu, Baoru Huang, Binod Bhattarai, Ngan Le,
Frans Coenen, and Anh Nguyen | Translating Simulation Images to X-ray Images via Multi-Scale Semantic
Matching | 11 pages | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by/4.0/ | Endovascular intervention training is increasingly being conducted in virtual
simulators. However, transferring the experience from endovascular simulators
to the real world remains an open problem. The key challenge is the virtual
environments are usually not realistically simulated, especially the simulation
images. In this paper, we propose a new method to translate simulation images
from an endovascular simulator to X-ray images. Previous image-to-image
translation methods often focus on visual effects and neglect structure
information, which is critical for medical images. To address this gap, we
propose a new method that utilizes multi-scale semantic matching. We apply
self-domain semantic matching to ensure that the input image and the generated
image have the same positional semantic relationships. We further apply
cross-domain matching to eliminate the effects of different styles. The
intensive experiment shows that our method generates realistic X-ray images and
outperforms other state-of-the-art approaches by a large margin. We also
collect a new large-scale dataset to serve as the new benchmark for this task.
Our source code and dataset will be made publicly available.
| [
{
"version": "v1",
"created": "Sun, 16 Apr 2023 04:49:46 GMT"
}
] | 2023-04-18T00:00:00 | [
[
"Kang",
"Jingxuan",
""
],
[
"Jianu",
"Tudor",
""
],
[
"Huang",
"Baoru",
""
],
[
"Bhattarai",
"Binod",
""
],
[
"Le",
"Ngan",
""
],
[
"Coenen",
"Frans",
""
],
[
"Nguyen",
"Anh",
""
]
] | TITLE: Translating Simulation Images to X-ray Images via Multi-Scale Semantic
Matching
ABSTRACT: Endovascular intervention training is increasingly being conducted in virtual
simulators. However, transferring the experience from endovascular simulators
to the real world remains an open problem. The key challenge is the virtual
environments are usually not realistically simulated, especially the simulation
images. In this paper, we propose a new method to translate simulation images
from an endovascular simulator to X-ray images. Previous image-to-image
translation methods often focus on visual effects and neglect structure
information, which is critical for medical images. To address this gap, we
propose a new method that utilizes multi-scale semantic matching. We apply
self-domain semantic matching to ensure that the input image and the generated
image have the same positional semantic relationships. We further apply
cross-domain matching to eliminate the effects of different styles. The
intensive experiment shows that our method generates realistic X-ray images and
outperforms other state-of-the-art approaches by a large margin. We also
collect a new large-scale dataset to serve as the new benchmark for this task.
Our source code and dataset will be made publicly available.
| new_dataset | 0.715797 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.