id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
2002.03228
Liang Liao
Liang Liao and Stephen John Maybank
Intrinsic Dimension Estimation via Nearest Constrained Subspace Classifier
19 pages, 7 figures, 4 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problems of classification and intrinsic dimension estimation on image data. A new subspace based classifier is proposed for supervised classification or intrinsic dimension estimation. The distribution of the data in each class is modeled by a union of of a finite number ofaffine subspaces of the feature space. The affine subspaces have a common dimension, which is assumed to be much less than the dimension of the feature space. The subspaces are found using regression based on the L0-norm. The proposed method is a generalisation of classical NN (Nearest Neighbor), NFL (Nearest Feature Line) classifiers and has a close relationship to NS (Nearest Subspace) classifier. The proposed classifier with an accurately estimated dimension parameter generally outperforms its competitors in terms of classification accuracy. We also propose a fast version of the classifier using a neighborhood representation to reduce its computational complexity. Experiments on publicly available datasets corroborate these claims.
[ { "created": "Sat, 8 Feb 2020 20:54:42 GMT", "version": "v1" } ]
"2020-02-11T00:00:00"
[ [ "Liao", "Liang", "" ], [ "Maybank", "Stephen John", "" ] ]
0no_new_dataset
2104.01883
Alex Dytso
Alex Dytso, H. Vincent Poor, Shlomo Shamai (Shitz)
A General Derivative Identity for the Conditional Mean Estimator in Gaussian Noise and Some Applications
null
null
null
null
cs.IT math.IT math.ST stat.ML stat.TH
http://creativecommons.org/licenses/by/4.0/
Consider a channel ${\bf Y}={\bf X}+ {\bf N}$ where ${\bf X}$ is an $n$-dimensional random vector, and ${\bf N}$ is a Gaussian vector with a covariance matrix ${\bf \mathsf{K}}_{\bf N}$. The object under consideration in this paper is the conditional mean of ${\bf X}$ given ${\bf Y}={\bf y}$, that is ${\bf y} \to E[{\bf X}|{\bf Y}={\bf y}]$. Several identities in the literature connect $E[{\bf X}|{\bf Y}={\bf y}]$ to other quantities such as the conditional variance, score functions, and higher-order conditional moments. The objective of this paper is to provide a unifying view of these identities. In the first part of the paper, a general derivative identity for the conditional mean is derived. Specifically, for the Markov chain ${\bf U} \leftrightarrow {\bf X} \leftrightarrow {\bf Y}$, it is shown that the Jacobian of $E[{\bf U}|{\bf Y}={\bf y}]$ is given by ${\bf \mathsf{K}}_{{\bf N}}^{-1} {\bf Cov} ( {\bf X}, {\bf U} | {\bf Y}={\bf y})$. In the second part of the paper, via various choices of ${\bf U}$, the new identity is used to generalize many of the known identities and derive some new ones. First, a simple proof of the Hatsel and Nolte identity for the conditional variance is shown. Second, a simple proof of the recursive identity due to Jaffer is provided. Third, a new connection between the conditional cumulants and the conditional expectation is shown. In particular, it is shown that the $k$-th derivative of $E[X|Y=y]$ is the $(k+1)$-th conditional cumulant. The third part of the paper considers some applications. In a first application, the power series and the compositional inverse of $E[X|Y=y]$ are derived. In a second application, the distribution of the estimator error $(X-E[X|Y])$ is derived. In a third application, we construct consistent estimators (empirical Bayes estimators) of the conditional cumulants from an i.i.d. sequence $Y_1,...,Y_n$.
[ { "created": "Mon, 5 Apr 2021 12:48:28 GMT", "version": "v1" } ]
"2021-04-06T00:00:00"
[ [ "Dytso", "Alex", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
0no_new_dataset
2401.14542
Julia Barnett
Julia Barnett, Hugo Flores Garcia, Bryan Pardo
Exploring Musical Roots: Applying Audio Embeddings to Empower Influence Attribution for a Generative Music Model
14 pages + references. Under conference review
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by/4.0/
Every artist has a creative process that draws inspiration from previous artists and their works. Today, "inspiration" has been automated by generative music models. The black box nature of these models obscures the identity of the works that influence their creative output. As a result, users may inadvertently appropriate, misuse, or copy existing artists' works. We establish a replicable methodology to systematically identify similar pieces of music audio in a manner that is useful for understanding training data attribution. A key aspect of our approach is to harness an effective music audio similarity measure. We compare the effect of applying CLMR and CLAP embeddings to similarity measurement in a set of 5 million audio clips used to train VampNet, a recent open source generative music model. We validate this approach with a human listening study. We also explore the effect that modifications of an audio example (e.g., pitch shifting, time stretching, background noise) have on similarity measurements. This work is foundational to incorporating automated influence attribution into generative modeling, which promises to let model creators and users move from ignorant appropriation to informed creation. Audio samples that accompany this paper are available at https://tinyurl.com/exploring-musical-roots.
[ { "created": "Thu, 25 Jan 2024 22:20:42 GMT", "version": "v1" } ]
"2024-01-29T00:00:00"
[ [ "Barnett", "Julia", "" ], [ "Garcia", "Hugo Flores", "" ], [ "Pardo", "Bryan", "" ] ]
0no_new_dataset
2311.09182
Jierui Li
Jierui Li, Vipul Raheja, Dhruv Kumar
ContraDoc: Understanding Self-Contradictions in Documents with Large Language Models
Accepted to NAACL 2024 main conference
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
In recent times, large language models (LLMs) have shown impressive performance on various document-level tasks such as document classification, summarization, and question-answering. However, research on understanding their capabilities on the task of self-contradictions in long documents has been very limited. In this work, we introduce ContraDoc, the first human-annotated dataset to study self-contradictions in long documents across multiple domains, varying document lengths, self-contradictions types, and scope. We then analyze the current capabilities of four state-of-the-art open-source and commercially available LLMs: GPT3.5, GPT4, PaLM2, and LLaMAv2 on this dataset. While GPT4 performs the best and can outperform humans on this task, we find that it is still unreliable and struggles with self-contradictions that require more nuance and context. We release the dataset and all the code associated with the experiments (https://github.com/ddhruvkr/CONTRADOC).
[ { "created": "Wed, 15 Nov 2023 18:23:17 GMT", "version": "v1" }, { "created": "Fri, 12 Apr 2024 21:06:43 GMT", "version": "v2" } ]
"2024-04-16T00:00:00"
[ [ "Li", "Jierui", "" ], [ "Raheja", "Vipul", "" ], [ "Kumar", "Dhruv", "" ] ]
1new_dataset
2002.07173
Koosha Zarei
Koosha Zarei, Reza Farahbakhsh, Noel Crespi
How Impersonators Exploit Instagram to Generate Fake Engagement?
null
null
null
null
cs.SI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Impersonators on Online Social Networks such as Instagram are playing an important role in the propagation of the content. These entities are the type of nefarious fake accounts that intend to disguise a legitimate account by making similar profiles. In addition to having impersonated profiles, we observed a considerable engagement from these entities to the published posts of verified accounts. Toward that end, we concentrate on the engagement of impersonators in terms of active and passive engagements which is studied in three major communities including ``Politician'', ``News agency'', and ``Sports star'' on Instagram. Inside each community, four verified accounts have been selected. Based on the implemented approach in our previous studies, we have collected 4.8K comments, and 2.6K likes across 566 posts created from 3.8K impersonators during 7 months. Our study shed light into this interesting phenomena and provides a surprising observation that can help us to understand better how impersonators engaging themselves inside Instagram in terms of writing Comments and leaving Likes.
[ { "created": "Mon, 17 Feb 2020 14:53:01 GMT", "version": "v1" } ]
"2020-02-19T00:00:00"
[ [ "Zarei", "Koosha", "" ], [ "Farahbakhsh", "Reza", "" ], [ "Crespi", "Noel", "" ] ]
0no_new_dataset
1909.00107
Panayiotis Georgiou
Prashanth Gurunath Shivakumar, Shao-Yen Tseng, Panayiotis Georgiou, Shrikanth Narayanan
Behavior Gated Language Models
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most current language modeling techniques only exploit co-occurrence, semantic and syntactic information from the sequence of words. However, a range of information such as the state of the speaker and dynamics of the interaction might be useful. In this work we derive motivation from psycholinguistics and propose the addition of behavioral information into the context of language modeling. We propose the augmentation of language models with an additional module which analyzes the behavioral state of the current context. This behavioral information is used to gate the outputs of the language model before the final word prediction output. We show that the addition of behavioral context in language models achieves lower perplexities on behavior-rich datasets. We also confirm the validity of the proposed models on a variety of model architectures and improve on previous state-of-the-art models with generic domain Penn Treebank Corpus.
[ { "created": "Sat, 31 Aug 2019 02:10:32 GMT", "version": "v1" } ]
"2019-09-04T00:00:00"
[ [ "Shivakumar", "Prashanth Gurunath", "" ], [ "Tseng", "Shao-Yen", "" ], [ "Georgiou", "Panayiotis", "" ], [ "Narayanan", "Shrikanth", "" ] ]
0no_new_dataset
2002.05945
Daniel Schuster
Daniel Schuster and Sebastiaan J. van Zelst
Online Process Monitoring Using Incremental State-Space Expansion: An Exact Algorithm
null
null
10.1007/978-3-030-58666-9_9
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The execution of (business) processes generates valuable traces of event data in the information systems employed within companies. Recently, approaches for monitoring the correctness of the execution of running processes have been developed in the area of process mining, i.e., online conformance checking. The advantages of monitoring a process' conformity during its execution are clear, i.e., deviations are detected as soon as they occur and countermeasures can immediately be initiated to reduce the possible negative effects caused by process deviations. Existing work in online conformance checking only allows for obtaining approximations of non-conformity, e.g., overestimating the actual severity of the deviation. In this paper, we present an exact, parameter-free, online conformance checking algorithm that computes conformance checking results on the fly. Our algorithm exploits the fact that the conformance checking problem can be reduced to a shortest path problem, by incrementally expanding the search space and reusing previously computed intermediate results. Our experiments show that our algorithm outperforms comparable state-of-the-art approximation algorithms.
[ { "created": "Fri, 14 Feb 2020 10:10:43 GMT", "version": "v1" }, { "created": "Thu, 19 Mar 2020 14:18:16 GMT", "version": "v2" }, { "created": "Wed, 15 Jul 2020 16:27:03 GMT", "version": "v3" } ]
"2020-09-23T00:00:00"
[ [ "Schuster", "Daniel", "" ], [ "van Zelst", "Sebastiaan J.", "" ] ]
0no_new_dataset
1903.07902
Vinay Setty
Megha Khosla and Vinay Setty and Avishek Anand
A Comparative Study for Unsupervised Network Representation Learning
Accepted for publication in IEEE TKDE
null
10.1109/TKDE.2019.2951398
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been appreciable progress in unsupervised network representation learning (UNRL) approaches over graphs recently with flexible random-walk approaches, new optimization objectives and deep architectures. However, there is no common ground for systematic comparison of embeddings to understand their behavior for different graphs and tasks. In this paper we theoretically group different approaches under a unifying framework and empirically investigate the effectiveness of different network representation methods. In particular, we argue that most of the UNRL approaches either explicitly or implicit model and exploit context information of a node. Consequently, we propose a framework that casts a variety of approaches -- random walk based, matrix factorization and deep learning based -- into a unified context-based optimization function. We systematically group the methods based on their similarities and differences. We study the differences among these methods in detail which we later use to explain their performance differences (on downstream tasks). We conduct a large-scale empirical study considering 9 popular and recent UNRL techniques and 11 real-world datasets with varying structural properties and two common tasks -- node classification and link prediction. We find that there is no single method that is a clear winner and that the choice of a suitable method is dictated by certain properties of the embedding methods, task and structural properties of the underlying graph. In addition we also report the common pitfalls in evaluation of UNRL methods and come up with suggestions for experimental design and interpretation of results.
[ { "created": "Tue, 19 Mar 2019 09:36:22 GMT", "version": "v1" }, { "created": "Sat, 13 Apr 2019 18:19:22 GMT", "version": "v2" }, { "created": "Wed, 30 Oct 2019 20:24:47 GMT", "version": "v3" }, { "created": "Sat, 2 Nov 2019 17:36:28 GMT", "version": "v4" }, { "created": "Mon, 18 Nov 2019 12:07:43 GMT", "version": "v5" }, { "created": "Wed, 11 Mar 2020 14:03:04 GMT", "version": "v6" } ]
"2020-03-12T00:00:00"
[ [ "Khosla", "Megha", "" ], [ "Setty", "Vinay", "" ], [ "Anand", "Avishek", "" ] ]
0no_new_dataset
2402.04814
Roshni Kamath
Roshni Kamath, Rupert Mitchell, Subarnaduti Paul, Kristian Kersting, Martin Mundt
BOWLL: A Deceptively Simple Open World Lifelong Learner
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
The quest to improve scalar performance numbers on predetermined benchmarks seems to be deeply engraved in deep learning. However, the real world is seldom carefully curated and applications are seldom limited to excelling on test sets. A practical system is generally required to recognize novel concepts, refrain from actively including uninformative data, and retain previously acquired knowledge throughout its lifetime. Despite these key elements being rigorously researched individually, the study of their conjunction, open world lifelong learning, is only a recent trend. To accelerate this multifaceted field's exploration, we introduce its first monolithic and much-needed baseline. Leveraging the ubiquitous use of batch normalization across deep neural networks, we propose a deceptively simple yet highly effective way to repurpose standard models for open world lifelong learning. Through extensive empirical evaluation, we highlight why our approach should serve as a future standard for models that are able to effectively maintain their knowledge, selectively focus on informative data, and accelerate future learning.
[ { "created": "Wed, 7 Feb 2024 13:04:35 GMT", "version": "v1" } ]
"2024-02-08T00:00:00"
[ [ "Kamath", "Roshni", "" ], [ "Mitchell", "Rupert", "" ], [ "Paul", "Subarnaduti", "" ], [ "Kersting", "Kristian", "" ], [ "Mundt", "Martin", "" ] ]
0no_new_dataset
1311.6045
Nidhal El-Abbadi
Nidhal El-Abbadi, Ahmed Nidhal Khdhair, Adel Al-Nasrawi
Build Electronic Arabic Lexicon
4 pages
The International Arab Journal of Information Technology, Vol. 8, No. 2, April 2011
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many known Arabic lexicons organized on different ways, each of them has a different number of Arabic words according to its organization way. This paper has used mathematical relations to count a number of Arabic words, which proofs the number of Arabic words presented by Al Farahidy. The paper also presents new way to build an electronic Arabic lexicon by using a hash function that converts each word (as input) to correspond a unique integer number (as output), these integer numbers will be used as an index to a lexicon entry.
[ { "created": "Sat, 23 Nov 2013 20:10:24 GMT", "version": "v1" } ]
"2013-11-26T00:00:00"
[ [ "El-Abbadi", "Nidhal", "" ], [ "Khdhair", "Ahmed Nidhal", "" ], [ "Al-Nasrawi", "Adel", "" ] ]
0no_new_dataset
1601.01092
Joy Bose
Joy Bose, Amit Singhai, Anish Patankar, Ankit Kumar
Attention Sensitive Web Browsing
5 pages, 7 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With a number of cheap commercial dry EEG kits available today, it is possible to look at user attention driven scenarios for interaction with the web browser. Using EEG to determine the user's attention level is preferable to using methods such as gaze tracking or time spent on the webpage. In this paper we use the attention level in three different ways. First, as a control mechanism, to control user interface elements such as menus or buttons. Second, to make the web browser responsive to the current attention level. Third, as a means for the web developer to control the user experience based on the level of attention paid by the user, thus creating attention sensitive websites. We present implementation details for each of these, using the NeuroSky MindWave sensor. We also explore issues in the system, and possibility of an EEG based web standard.
[ { "created": "Wed, 6 Jan 2016 06:34:21 GMT", "version": "v1" } ]
"2016-01-07T00:00:00"
[ [ "Bose", "Joy", "" ], [ "Singhai", "Amit", "" ], [ "Patankar", "Anish", "" ], [ "Kumar", "Ankit", "" ] ]
0no_new_dataset
1605.04265
Benjamin Niedermann
Benjamin Niedermann, Martin N\"ollenburg
An Algorithmic Framework for Labeling Road Maps
extended version of a paper to appear at GIScience 2016
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an unlabeled road map, we consider, from an algorithmic perspective, the cartographic problem to place non-overlapping road labels embedded in their roads. We first decompose the road network into logically coherent road sections, e.g., parts of roads between two junctions. Based on this decomposition, we present and implement a new and versatile framework for placing labels in road maps such that the number of labeled road sections is maximized. In an experimental evaluation with road maps of 11 major cities we show that our proposed labeling algorithm is both fast in practice and that it reaches near-optimal solution quality, where optimal solutions are obtained by mixed-integer linear programming. In comparison to the standard OpenStreetMap renderer Mapnik, our algorithm labels 31% more road sections in average.
[ { "created": "Fri, 13 May 2016 17:34:02 GMT", "version": "v1" } ]
"2016-05-16T00:00:00"
[ [ "Niedermann", "Benjamin", "" ], [ "Nöllenburg", "Martin", "" ] ]
0no_new_dataset
cs/0310038
Shipra Agrawal
Shipra Agrawal, Vijay Krishnan, Jayant Haritsa
On Addressing Efficiency Concerns in Privacy Preserving Data Mining
null
null
null
null
cs.DB
null
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To encourage users to provide correct inputs, we recently proposed a data distortion scheme for association rule mining that simultaneously provides both privacy to the user and accuracy in the mining results. However, mining the distorted database can be orders of magnitude more time-consuming as compared to mining the original database. In this paper, we address this issue and demonstrate that by (a) generalizing the distortion process to perform symbol-specific distortion, (b) appropriately choosing the distortion parameters, and (c) applying a variety of optimizations in the reconstruction process, runtime efficiencies that are well within an order of magnitude of undistorted mining can be achieved.
[ { "created": "Fri, 17 Oct 2003 16:55:08 GMT", "version": "v1" } ]
"2011-11-09T00:00:00"
[ [ "Agrawal", "Shipra", "" ], [ "Krishnan", "Vijay", "" ], [ "Haritsa", "Jayant", "" ] ]
0no_new_dataset
1909.06761
Georgios Kapidis
Georgios Kapidis, Ronald Poppe, Elsbeth van Dam, Lucas Noldus, Remco Veltkamp
Multitask Learning to Improve Egocentric Action Recognition
10 pages, 3 figures, accepted at the 5th Egocentric Perception, Interaction and Computing (EPIC) workshop at ICCV 2019, code repository: https://github.com/georkap/hand_track_classification
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we employ multitask learning to capitalize on the structure that exists in related supervised tasks to train complex neural networks. It allows training a network for multiple objectives in parallel, in order to improve performance on at least one of them by capitalizing on a shared representation that is developed to accommodate more information than it otherwise would for a single task. We employ this idea to tackle action recognition in egocentric videos by introducing additional supervised tasks. We consider learning the verbs and nouns from which action labels consist of and predict coordinates that capture the hand locations and the gaze-based visual saliency for all the frames of the input video segments. This forces the network to explicitly focus on cues from secondary tasks that it might otherwise have missed resulting in improved inference. Our experiments on EPIC-Kitchens and EGTEA Gaze+ show consistent improvements when training with multiple tasks over the single-task baseline. Furthermore, in EGTEA Gaze+ we outperform the state-of-the-art in action recognition by 3.84%. Apart from actions, our method produces accurate hand and gaze estimations as side tasks, without requiring any additional input at test time other than the RGB video clips.
[ { "created": "Sun, 15 Sep 2019 08:29:46 GMT", "version": "v1" } ]
"2019-09-17T00:00:00"
[ [ "Kapidis", "Georgios", "" ], [ "Poppe", "Ronald", "" ], [ "van Dam", "Elsbeth", "" ], [ "Noldus", "Lucas", "" ], [ "Veltkamp", "Remco", "" ] ]
0no_new_dataset
2203.09975
Sheng Yu
Sheng Yu, Zheng Yuan, Jun Xia, Shengxuan Luo, Huaiyuan Ying, Sihang Zeng, Jingyi Ren, Hongyi Yuan, Zhengyun Zhao, Yucong Lin, Keming Lu, Jing Wang, Yutao Xie, Heung-Yeung Shum
BIOS: An Algorithmically Generated Biomedical Knowledge Graph
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by-nc-sa/4.0/
Biomedical knowledge graphs (BioMedKGs) are essential infrastructures for biomedical and healthcare big data and artificial intelligence (AI), facilitating natural language processing, model development, and data exchange. For decades, these knowledge graphs have been developed via expert curation; however, this method can no longer keep up with today's AI development, and a transition to algorithmically generated BioMedKGs is necessary. In this work, we introduce the Biomedical Informatics Ontology System (BIOS), the first large-scale publicly available BioMedKG generated completely by machine learning algorithms. BIOS currently contains 4.1 million concepts, 7.4 million terms in two languages, and 7.3 million relation triplets. We present the methodology for developing BIOS, including the curation of raw biomedical terms, computational identification of synonymous terms and aggregation of these terms to create concept nodes, semantic type classification of the concepts, relation identification, and biomedical machine translation. We provide statistics on the current BIOS content and perform preliminary assessments of term quality, synonym grouping, and relation extraction. The results suggest that machine learning-based BioMedKG development is a viable alternative to traditional expert curation.
[ { "created": "Fri, 18 Mar 2022 14:09:22 GMT", "version": "v1" }, { "created": "Sun, 24 Apr 2022 10:11:59 GMT", "version": "v2" } ]
"2022-04-26T00:00:00"
[ [ "Yu", "Sheng", "" ], [ "Yuan", "Zheng", "" ], [ "Xia", "Jun", "" ], [ "Luo", "Shengxuan", "" ], [ "Ying", "Huaiyuan", "" ], [ "Zeng", "Sihang", "" ], [ "Ren", "Jingyi", "" ], [ "Yuan", "Hongyi", "" ], [ "Zhao", "Zhengyun", "" ], [ "Lin", "Yucong", "" ], [ "Lu", "Keming", "" ], [ "Wang", "Jing", "" ], [ "Xie", "Yutao", "" ], [ "Shum", "Heung-Yeung", "" ] ]
1new_dataset
2206.11632
Yosi Shrem
Yosi Shrem, Felix Kreuk and Joseph Keshet
Formant Estimation and Tracking using Probabilistic Heat-Maps
interspeech 2022
null
null
null
cs.SD eess.AS
http://creativecommons.org/licenses/by/4.0/
Formants are the spectral maxima that result from acoustic resonances of the human vocal tract, and their accurate estimation is among the most fundamental speech processing problems. Recent work has been shown that those frequencies can accurately be estimated using deep learning techniques. However, when presented with a speech from a different domain than that in which they have been trained on, these methods exhibit a decline in performance, limiting their usage as generic tools. The contribution of this paper is to propose a new network architecture that performs well on a variety of different speaker and speech domains. Our proposed model is composed of a shared encoder that gets as input a spectrogram and outputs a domain-invariant representation. Then, multiple decoders further process this representation, each responsible for predicting a different formant while considering the lower formant predictions. An advantage of our model is that it is based on heatmaps that generate a probability distribution over formant predictions. Results suggest that our proposed model better represents the signal over various domains and leads to better formant frequency tracking and estimation.
[ { "created": "Thu, 23 Jun 2022 11:39:08 GMT", "version": "v1" } ]
"2022-06-24T00:00:00"
[ [ "Shrem", "Yosi", "" ], [ "Kreuk", "Felix", "" ], [ "Keshet", "Joseph", "" ] ]
1new_dataset
2401.03675
Haena Kim
Haena Kim, Yejun Kim, Seungjoo Kim
A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment
60 pages, 6 figures, 12 tables
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the usage of cloud services has been increasing annually, and with remote work becoming one of the new forms of employment within enterprises, the security of cloud-based remote work environments has become important. The existing work environment relies on a perimeter security model, where accessing one's resources is based on the assumption that everything within the internal network is secure. However, due to the limitations of the perimeter security model, which assumes the safety of everything within the internal network, the adoption of Zero Trust is now being demanded. Accordingly, NIST and DoD have published guidelines related to Zero Trust architecture. However, these guidelines describe security requirements at an abstract level, focusing on logical architecture. In this paper, we conduct a threat modeling for OpenStack cloud to propose more detailed security requirements compared to NIST and DoD guidelines. Subsequently, we perform a security analysis of commercial cloud services such as Microsoft Azure, Amazon Web Service, and Google Cloud to validate these requirements. The security analysis results identify security requirements that each cloud service fails to satisfy, indicating potential exposure to threats. This paper proposes detailed security requirements based on the Zero Trust model and conducts security analyses of various cloud services accordingly. As a result of the security analysis, we proposed potential threats and countermeasures for cloud services with Zero Trust, and this is intended to help build a secure Zero Trust-based remote work environment.
[ { "created": "Mon, 8 Jan 2024 05:50:20 GMT", "version": "v1" } ]
"2024-01-09T00:00:00"
[ [ "Kim", "Haena", "" ], [ "Kim", "Yejun", "" ], [ "Kim", "Seungjoo", "" ] ]
0no_new_dataset
2007.08273
Shaofeng Li
Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao
Deep Learning Backdoors
null
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intuitively, a backdoor attack against Deep Neural Networks (DNNs) is to inject hidden malicious behaviors into DNNs such that the backdoor model behaves legitimately for benign inputs, yet invokes a predefined malicious behavior when its input contains a malicious trigger. The trigger can take a plethora of forms, including a special object present in the image (e.g., a yellow pad), a shape filled with custom textures (e.g., logos with particular colors) or even image-wide stylizations with special filters (e.g., images altered by Nashville or Gotham filters). These filters can be applied to the original image by replacing or perturbing a set of image pixels.
[ { "created": "Thu, 16 Jul 2020 11:54:20 GMT", "version": "v1" }, { "created": "Sat, 6 Feb 2021 09:02:57 GMT", "version": "v2" } ]
"2021-02-09T00:00:00"
[ [ "Li", "Shaofeng", "" ], [ "Ma", "Shiqing", "" ], [ "Xue", "Minhui", "" ], [ "Zhao", "Benjamin Zi Hao", "" ] ]
0no_new_dataset
1506.04650
Prashanth Reddy
B. Prashanth Reddy
Coding Side-Information for Implementing Cubic Transformation
12 pages, 9 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the implementation of the cubic public-key transformation, a public-key cryptographic scheme that requires sending of additional side-information. A coding scheme for the side-information, based on the residue number system, is presented. In the conventional one-to-one encryption mapping also, such coding can be used to send additional like that of watermarking, which could be used to detect man-in-the-middle attacks or used for authentication.
[ { "created": "Mon, 15 Jun 2015 16:14:07 GMT", "version": "v1" } ]
"2015-06-16T00:00:00"
[ [ "Reddy", "B. Prashanth", "" ] ]
0no_new_dataset
1206.6453
Florian Yger
Florian Yger (LITIS), Maxime Berar (LITIS), Gilles Gasso (INSA de Rouen), Alain Rakotomamonjy (INSA de Rouen)
Adaptive Canonical Correlation Analysis Based On Matrix Manifolds
Appears in Proceedings of the 29th International Conference on Machine Learning (ICML 2012)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we formulate the Canonical Correlation Analysis (CCA) problem on matrix manifolds. This framework provides a natural way for dealing with matrix constraints and tools for building efficient algorithms even in an adaptive setting. Finally, an adaptive CCA algorithm is proposed and applied to a change detection problem in EEG signals.
[ { "created": "Wed, 27 Jun 2012 19:59:59 GMT", "version": "v1" } ]
"2012-07-03T00:00:00"
[ [ "Yger", "Florian", "", "LITIS" ], [ "Berar", "Maxime", "", "LITIS" ], [ "Gasso", "Gilles", "", "INSA de\n Rouen" ], [ "Rakotomamonjy", "Alain", "", "INSA de Rouen" ] ]
0no_new_dataset
1905.11604
Preetum Nakkiran
Preetum Nakkiran, Gal Kaplun, Dimitris Kalimeris, Tristan Yang, Benjamin L. Edelman, Fred Zhang, Boaz Barak
SGD on Neural Networks Learns Functions of Increasing Complexity
Submitted to NeurIPS 2019
null
null
null
cs.LG cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform an experimental study of the dynamics of Stochastic Gradient Descent (SGD) in learning deep neural networks for several real and synthetic classification tasks. We show that in the initial epochs, almost all of the performance improvement of the classifier obtained by SGD can be explained by a linear classifier. More generally, we give evidence for the hypothesis that, as iterations progress, SGD learns functions of increasing complexity. This hypothesis can be helpful in explaining why SGD-learned classifiers tend to generalize well even in the over-parameterized regime. We also show that the linear classifier learned in the initial stages is "retained" throughout the execution even if training is continued to the point of zero training error, and complement this with a theoretical result in a simplified model. Key to our work is a new measure of how well one classifier explains the performance of another, based on conditional mutual information.
[ { "created": "Tue, 28 May 2019 04:34:08 GMT", "version": "v1" } ]
"2019-05-29T00:00:00"
[ [ "Nakkiran", "Preetum", "" ], [ "Kaplun", "Gal", "" ], [ "Kalimeris", "Dimitris", "" ], [ "Yang", "Tristan", "" ], [ "Edelman", "Benjamin L.", "" ], [ "Zhang", "Fred", "" ], [ "Barak", "Boaz", "" ] ]
0no_new_dataset
2309.06229
He Ye
He Ye, Zimin Chen and Claire Le Goues
PreciseBugCollector: Extensible, Executable and Precise Bug-fix Collection
Accepted at the industry challenge track of ASE 2023
null
null
null
cs.SE cs.PL
http://creativecommons.org/licenses/by/4.0/
Bug datasets are vital for enabling deep learning techniques to address software maintenance tasks related to bugs. However, existing bug datasets suffer from precise and scale limitations: they are either small-scale but precise with manual validation or large-scale but imprecise with simple commit message processing. In this paper, we introduce PreciseBugCollector, a precise, multi-language bug collection approach that overcomes these two limitations. PreciseBugCollector is based on two novel components: a) A bug tracker to map the codebase repositories with external bug repositories to trace bug type information, and b) A bug injector to generate project-specific bugs by injecting noise into the correct codebases and then executing them against their test suites to obtain test failure messages. We implement PreciseBugCollector against three sources: 1) A bug tracker that links to the national vulnerability data set (NVD) to collect general-wise vulnerabilities, 2) A bug tracker that links to OSS-Fuzz to collect general-wise bugs, and 3) A bug injector based on 16 injection rules to generate project-wise bugs. To date, PreciseBugCollector comprises 1057818 bugs extracted from 2968 open-source projects. Of these, 12602 bugs are sourced from bug repositories (NVD and OSS-Fuzz), while the remaining 1045216 project-specific bugs are generated by the bug injector. Considering the challenge objectives, we argue that a bug injection approach is highly valuable for the industrial setting, since project-specific bugs align with domain knowledge, share the same codebase, and adhere to the coding style employed in industrial projects.
[ { "created": "Tue, 12 Sep 2023 13:47:44 GMT", "version": "v1" }, { "created": "Wed, 13 Sep 2023 14:20:35 GMT", "version": "v2" }, { "created": "Fri, 6 Oct 2023 16:00:26 GMT", "version": "v3" }, { "created": "Sat, 9 Mar 2024 22:43:56 GMT", "version": "v4" } ]
"2024-03-12T00:00:00"
[ [ "Ye", "He", "" ], [ "Chen", "Zimin", "" ], [ "Goues", "Claire Le", "" ] ]
1new_dataset
1904.05247
Linus W. Dietz
Rinita Roy and Linus W. Dietz
A Model for Using Physiological Conditions for Proactive Tourist Recommendations
null
ABIS '2019 Proceedings of the 23rd International Workshop on Personalization and Recommendation on the Web and Beyond
10.1145/3345002.3349289
null
cs.HC cs.IR cs.LG
http://creativecommons.org/licenses/by/4.0/
Mobile proactive tourist recommender systems can support tourists by recommending the best choice depending on different contexts related to herself and the environment. In this paper, we propose to utilize wearable sensors to gather health information about a tourist and use them for recommending tourist activities. We discuss a range of wearable devices, sensors to infer physiological conditions of the users, and exemplify the feasibility using a popular self-quantification mobile app. Our main contribution then comprises a data model to derive relations between the parameters measured by the wearable sensors, such as heart rate, body temperature, blood pressure, and use them to infer the physiological condition of a user. This model can then be used to derive classes of tourist activities that determine which items should be recommended.
[ { "created": "Wed, 10 Apr 2019 15:37:28 GMT", "version": "v1" } ]
"2019-12-17T00:00:00"
[ [ "Roy", "Rinita", "" ], [ "Dietz", "Linus W.", "" ] ]
0no_new_dataset
2210.06794
Yakun Huang
Yakun Huang, Yuanwei Zhu, Xiuquan Qiao, Xiang Su, Schahram Dustdar, Ping Zhang
Towards Holographic Video Communications: A Promising AI-driven Solution
null
null
null
null
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-time holographic video communications enable immersive experiences for next-generation video services in the future metaverse era. However, high-fidelity holographic videos require high bandwidth and significant computation resources, which exceed the transferring and computing capacity of 5G networks. This article reviews state-of-the-art holographic point cloud video (PCV) transmission techniques and highlights the critical challenges of delivering such immersive services. We further implement a preliminary prototype of an AI-driven holographic video communication system and present critical experimental results to evaluate its performance. Finally, we identify future research directions and discuss potential solutions for providing real-time and high-quality holographic experiences.
[ { "created": "Thu, 13 Oct 2022 07:13:16 GMT", "version": "v1" } ]
"2022-10-14T00:00:00"
[ [ "Huang", "Yakun", "" ], [ "Zhu", "Yuanwei", "" ], [ "Qiao", "Xiuquan", "" ], [ "Su", "Xiang", "" ], [ "Dustdar", "Schahram", "" ], [ "Zhang", "Ping", "" ] ]
0no_new_dataset
2206.14802
Colin Kohler
Colin Kohler, Robert Platt
Visual Foresight With a Local Dynamics Model
null
null
null
null
cs.RO cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Model-free policy learning has been shown to be capable of learning manipulation policies which can solve long-time horizon tasks using single-step manipulation primitives. However, training these policies is a time-consuming process requiring large amounts of data. We propose the Local Dynamics Model (LDM) which efficiently learns the state-transition function for these manipulation primitives. By combining the LDM with model-free policy learning, we can learn policies which can solve complex manipulation tasks using one-step lookahead planning. We show that the LDM is both more sample-efficient and outperforms other model architectures. When combined with planning, we can outperform other model-based and model-free policies on several challenging manipulation tasks in simulation.
[ { "created": "Wed, 29 Jun 2022 17:58:14 GMT", "version": "v1" } ]
"2022-06-30T00:00:00"
[ [ "Kohler", "Colin", "" ], [ "Platt", "Robert", "" ] ]
0no_new_dataset
2106.12884
Peshal Nayak
Peshal Nayak, Sudhanshu Verma, Preetam Kumar
A Novel Compact Tri-Band Antenna Design for WiMAX, WLAN and Bluetooth Applications
null
null
null
null
cs.NI eess.SP
http://creativecommons.org/licenses/by/4.0/
A novel and compact tri-band planar antenna for 2.4/5.2/5.8-GHz wireless local area network (WLAN), 2.3/3.5/5.5GHz Worldwide Interoperability for Microwave Access (WiMAX) and Bluetooth applications is proposed and studied in this paper. The antenna comprises of a L-shaped element which is coupled with a ground shorted parasitic resonator to generate three resonant modes for tri-band operation. The L-shaped element which is placed on top of the substrate is fed by a 50$\Omega$ microstrip feed line and is responsible for the generation of a wide band at 5.5 GHz. The parasitic resonator is placed on the other side of the substrate and is directly connected to the ground plane. The presence of the parasitic resonator gives rise to two additional resonant bands at 2.3 GHz and 3.5 GHz. Thus, together the two elements generate three resonant bands to cover WLAN, WiMAX and Bluetooth bands of operation. A thorough parametric study has been performed on the antenna and it has been found that the three bands can be tuned by varying certain dimensions of the antenna. Hence, the same design can be used for frequencies in adjacent bands as well with minor changes in its dimensions. Important antenna parameters such as return loss, radiation pattern and peak gains in the operating bands have been studied in detail to prove that the proposed design is a promising candidate for the aforementioned wireless technologies.
[ { "created": "Thu, 13 May 2021 18:19:52 GMT", "version": "v1" } ]
"2021-06-25T00:00:00"
[ [ "Nayak", "Peshal", "" ], [ "Verma", "Sudhanshu", "" ], [ "Kumar", "Preetam", "" ] ]
0no_new_dataset
2306.15354
Siqi Zheng
Siqi Zheng, Luyao Cheng, Yafeng Chen, Hui Wang, Qian Chen
3D-Speaker: A Large-Scale Multi-Device, Multi-Distance, and Multi-Dialect Corpus for Speech Representation Disentanglement
null
null
null
null
cs.CL cs.SD eess.AS
http://creativecommons.org/licenses/by-nc-sa/4.0/
Disentangling uncorrelated information in speech utterances is a crucial research topic within speech community. Different speech-related tasks focus on extracting distinct speech representations while minimizing the affects of other uncorrelated information. We present a large-scale speech corpus to facilitate the research of speech representation disentanglement. 3D-Speaker contains over 10,000 speakers, each of whom are simultaneously recorded by multiple Devices, locating at different Distances, and some speakers are speaking multiple Dialects. The controlled combinations of multi-dimensional audio data yield a matrix of a diverse blend of speech representation entanglement, thereby motivating intriguing methods to untangle them. The multi-domain nature of 3D-Speaker also makes it a suitable resource to evaluate large universal speech models and experiment methods of out-of-domain learning and self-supervised learning. https://3dspeaker.github.io/
[ { "created": "Tue, 27 Jun 2023 10:09:43 GMT", "version": "v1" }, { "created": "Wed, 28 Jun 2023 02:44:35 GMT", "version": "v2" }, { "created": "Mon, 25 Sep 2023 02:36:41 GMT", "version": "v3" } ]
"2023-09-26T00:00:00"
[ [ "Zheng", "Siqi", "" ], [ "Cheng", "Luyao", "" ], [ "Chen", "Yafeng", "" ], [ "Wang", "Hui", "" ], [ "Chen", "Qian", "" ] ]
1new_dataset
1105.2447
Gabriele D'Angelo
Gabriele D'Angelo and Stefano Ferretti
LUNES: Agent-based Simulation of P2P Systems (Extended Version)
Proceedings of the International Workshop on Modeling and Simulation of Peer-to-Peer Architectures and Systems (MOSPAS 2011). As part of the 2011 International Conference on High Performance Computing and Simulation (HPCS 2011)
null
10.1109/HPCSim.2011.5999879
null
cs.DC cs.MA cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present LUNES, an agent-based Large Unstructured NEtwork Simulator, which allows to simulate complex networks composed of a high number of nodes. LUNES is modular, since it splits the three phases of network topology creation, protocol simulation and performance evaluation. This permits to easily integrate external software tools into the main software architecture. The simulation of the interaction protocols among network nodes is performed via a simulation middleware that supports both the sequential and the parallel/distributed simulation approaches. In the latter case, a specific mechanism for the communication overhead-reduction is used; this guarantees high levels of performance and scalability. To demonstrate the efficiency of LUNES, we test the simulator with gossip protocols executed on top of networks (representing peer-to-peer overlays), generated with different topologies. Results demonstrate the effectiveness of the proposed approach.
[ { "created": "Thu, 12 May 2011 12:26:40 GMT", "version": "v1" }, { "created": "Thu, 27 Dec 2012 08:58:52 GMT", "version": "v2" }, { "created": "Mon, 28 Jul 2014 09:38:29 GMT", "version": "v3" } ]
"2015-03-19T00:00:00"
[ [ "D'Angelo", "Gabriele", "" ], [ "Ferretti", "Stefano", "" ] ]
0no_new_dataset
2211.01916
Hongrui Chen
Hongrui Chen, Holden Lee, Jianfeng Lu
Improved Analysis of Score-based Generative Modeling: User-Friendly Bounds under Minimal Smoothness Assumptions
36 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an improved theoretical analysis of score-based generative modeling. Under a score estimate with small $L^2$ error (averaged across timesteps), we provide efficient convergence guarantees for any data distribution with second-order moment, by either employing early stopping or assuming smoothness condition on the score function of the data distribution. Our result does not rely on any log-concavity or functional inequality assumption and has a logarithmic dependence on the smoothness. In particular, we show that under only a finite second moment condition, approximating the following in reverse KL divergence in $\epsilon$-accuracy can be done in $\tilde O\left(\frac{d \log (1/\delta)}{\epsilon}\right)$ steps: 1) the variance-$\delta$ Gaussian perturbation of any data distribution; 2) data distributions with $1/\delta$-smooth score functions. Our analysis also provides a quantitative comparison between different discrete approximations and may guide the choice of discretization points in practice.
[ { "created": "Thu, 3 Nov 2022 15:51:00 GMT", "version": "v1" }, { "created": "Thu, 2 Feb 2023 10:34:04 GMT", "version": "v2" } ]
"2023-02-03T00:00:00"
[ [ "Chen", "Hongrui", "" ], [ "Lee", "Holden", "" ], [ "Lu", "Jianfeng", "" ] ]
0no_new_dataset
2112.15115
Beril Sirmacek
Pablo Torres, Beril Sirmacek, Sergio Hoyas, Ricardo Vinuesa
Aim in Climate Change and City Pollution
null
null
null
null
cs.LG cs.AI cs.CY
http://creativecommons.org/licenses/by-nc-nd/4.0/
The sustainability of urban environments is an increasingly relevant problem. Air pollution plays a key role in the degradation of the environment as well as the health of the citizens exposed to it. In this chapter we provide a review of the methods available to model air pollution, focusing on the application of machine-learning methods. In fact, machine-learning methods have proved to importantly increase the accuracy of traditional air-pollution approaches while limiting the development cost of the models. Machine-learning tools have opened new approaches to study air pollution, such as flow-dynamics modelling or remote-sensing methodologies.
[ { "created": "Thu, 30 Dec 2021 16:17:46 GMT", "version": "v1" } ]
"2022-01-03T00:00:00"
[ [ "Torres", "Pablo", "" ], [ "Sirmacek", "Beril", "" ], [ "Hoyas", "Sergio", "" ], [ "Vinuesa", "Ricardo", "" ] ]
0no_new_dataset
1604.03541
Pritam Mukherjee
Pritam Mukherjee and Sennur Ulukus
Secure Degrees of Freedom of the Multiple Access Wiretap Channel with Multiple Antennas
Submitted to IEEE Transactions on Information Theory, February 2016
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a two-user multiple-input multiple-output (MIMO) multiple access wiretap channel with $N$ antennas at each transmitter, $N$ antennas at the legitimate receiver, and $K$ antennas at the eavesdropper. We determine the optimal sum secure degrees of freedom (s.d.o.f.) for this model for all values of $N$ and $K$. We subdivide our problem into several regimes based on the values of $N$ and $K$, and provide achievable schemes based on real and vector space alignment techniques for fixed and fading channel gains, respectively. To prove the optimality of the achievable schemes, we provide matching converses for each regime. Our results show how the number of eavesdropper antennas affects the optimal sum s.d.o.f. of the multiple access wiretap channel.
[ { "created": "Tue, 12 Apr 2016 19:48:00 GMT", "version": "v1" } ]
"2016-04-13T00:00:00"
[ [ "Mukherjee", "Pritam", "" ], [ "Ulukus", "Sennur", "" ] ]
0no_new_dataset
2112.02970
Shilin Zhou
Shilin Zhou, Qingrong Xia, Zhenghua Li, Yu Zhang, Yu Hong, Min Zhang
Fast and Accurate End-to-End Span-based Semantic Role Labeling as Word-based Graph Parsing
COLING 2022
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes to cast end-to-end span-based SRL as a word-based graph parsing task. The major challenge is how to represent spans at the word level. Borrowing ideas from research on Chinese word segmentation and named entity recognition, we propose and compare four different schemata of graph representation, i.e., BES, BE, BIES, and BII, among which we find that the BES schema performs the best. We further gain interesting insights through detailed analysis. Moreover, we propose a simple constrained Viterbi procedure to ensure the legality of the output graph according to the constraints of the SRL structure. We conduct experiments on two widely used benchmark datasets, i.e., CoNLL05 and CoNLL12. Results show that our word-based graph parsing approach achieves consistently better performance than previous results, under all settings of end-to-end and predicate-given, without and with pre-trained language models (PLMs). More importantly, our model can parse 669/252 sentences per second, without and with PLMs respectively.
[ { "created": "Mon, 6 Dec 2021 12:30:58 GMT", "version": "v1" }, { "created": "Fri, 16 Sep 2022 13:43:42 GMT", "version": "v2" } ]
"2022-09-19T00:00:00"
[ [ "Zhou", "Shilin", "" ], [ "Xia", "Qingrong", "" ], [ "Li", "Zhenghua", "" ], [ "Zhang", "Yu", "" ], [ "Hong", "Yu", "" ], [ "Zhang", "Min", "" ] ]
0no_new_dataset
1910.05915
Shengluan Hou
Shengluan Hou and Ruqian Lu
Knowledge-guided Unsupervised Rhetorical Parsing for Text Summarization
16 pages, 4 figures
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic text summarization (ATS) has recently achieved impressive performance thanks to recent advances in deep learning and the availability of large-scale corpora. To make the summarization results more faithful, this paper presents an unsupervised approach that combines rhetorical structure theory, deep neural model and domain knowledge concern for ATS. This architecture mainly contains three components: domain knowledge base construction based on representation learning, attentional encoder-decoder model for rhetorical parsing and subroutine-based model for text summarization. Domain knowledge can be effectively used for unsupervised rhetorical parsing thus rhetorical structure trees for each document can be derived. In the unsupervised rhetorical parsing module, the idea of translation was adopted to alleviate the problem of data scarcity. The subroutine-based summarization model purely depends on the derived rhetorical structure trees and can generate content-balanced results. To evaluate the summary results without golden standard, we proposed an unsupervised evaluation metric, whose hyper-parameters were tuned by supervised learning. Experimental results show that, on a large-scale Chinese dataset, our proposed approach can obtain comparable performances compared with existing methods.
[ { "created": "Mon, 14 Oct 2019 04:48:16 GMT", "version": "v1" } ]
"2019-10-15T00:00:00"
[ [ "Hou", "Shengluan", "" ], [ "Lu", "Ruqian", "" ] ]
0no_new_dataset
2007.12087
James Jordon
James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave and Mihaela van der Schaar
Hide-and-Seek Privacy Challenge
19 pages, 5 figures. Part of the NeurIPS 2020 competition track
null
null
null
cs.LG cs.CR cs.CY stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The clinical time-series setting poses a unique combination of challenges to data modeling and sharing. Due to the high dimensionality of clinical time series, adequate de-identification to preserve privacy while retaining data utility is difficult to achieve using common de-identification techniques. An innovative approach to this problem is synthetic data generation. From a technical perspective, a good generative model for time-series data should preserve temporal dynamics, in the sense that new sequences respect the original relationships between high-dimensional variables across time. From the privacy perspective, the model should prevent patient re-identification by limiting vulnerability to membership inference attacks. The NeurIPS 2020 Hide-and-Seek Privacy Challenge is a novel two-tracked competition to simultaneously accelerate progress in tackling both problems. In our head-to-head format, participants in the synthetic data generation track (i.e. "hiders") and the patient re-identification track (i.e. "seekers") are directly pitted against each other by way of a new, high-quality intensive care time-series dataset: the AmsterdamUMCdb dataset. Ultimately, we seek to advance generative techniques for dense and high-dimensional temporal data streams that are (1) clinically meaningful in terms of fidelity and predictivity, as well as (2) capable of minimizing membership privacy risks in terms of the concrete notion of patient re-identification.
[ { "created": "Thu, 23 Jul 2020 15:50:59 GMT", "version": "v1" }, { "created": "Fri, 24 Jul 2020 17:10:18 GMT", "version": "v2" } ]
"2020-07-27T00:00:00"
[ [ "Jordon", "James", "" ], [ "Jarrett", "Daniel", "" ], [ "Yoon", "Jinsung", "" ], [ "Barnes", "Tavian", "" ], [ "Elbers", "Paul", "" ], [ "Thoral", "Patrick", "" ], [ "Ercole", "Ari", "" ], [ "Zhang", "Cheng", "" ], [ "Belgrave", "Danielle", "" ], [ "van der Schaar", "Mihaela", "" ] ]
1new_dataset
2011.09257
Pablo Pino
Pablo Pino, Denis Parra, Pablo Messina, Cecilia Besa, Sergio Uribe
Inspecting state of the art performance and NLP metrics in image-based medical report generation
3 pages, 1 figure, 1 table. Accepted in LatinX in AI workshop at NeurIPS 2020. (v3 updated ack)
null
null
null
cs.CL cs.AI cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several deep learning architectures have been proposed over the last years to deal with the problem of generating a written report given an imaging exam as input. Most works evaluate the generated reports using standard Natural Language Processing (NLP) metrics (e.g. BLEU, ROUGE), reporting significant progress. In this article, we contrast this progress by comparing state of the art (SOTA) models against weak baselines. We show that simple and even naive approaches yield near SOTA performance on most traditional NLP metrics. We conclude that evaluation methods in this task should be further studied towards correctly measuring clinical accuracy, ideally involving physicians to contribute to this end.
[ { "created": "Wed, 18 Nov 2020 13:09:12 GMT", "version": "v1" }, { "created": "Sat, 21 Nov 2020 17:58:40 GMT", "version": "v2" }, { "created": "Sat, 15 Jan 2022 06:05:51 GMT", "version": "v3" } ]
"2022-01-19T00:00:00"
[ [ "Pino", "Pablo", "" ], [ "Parra", "Denis", "" ], [ "Messina", "Pablo", "" ], [ "Besa", "Cecilia", "" ], [ "Uribe", "Sergio", "" ] ]
0no_new_dataset
2206.01953
Fabio Arnez
Fabio Arnez, Ansgar Radermacher, Huascar Espinoza
Quantifying and Using System Uncertainty in UAV Navigation
Accepted at the ICRA 2022 Workshop on Releasing Robots into the Wild: Simulations, Benchmarks, and Deployment
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
As autonomous systems increasingly rely on Deep Neural Networks (DNN) to implement the navigation pipeline functions, uncertainty estimation methods have become paramount for estimating confidence in DNN predictions. Bayesian Deep Learning (BDL) offers a principled approach to model uncertainties in DNNs. However, DNN components from autonomous systems partially capture uncertainty, or more importantly, the uncertainty effect in downstream tasks is ignored. This paper provides a method to capture the overall system uncertainty in a UAV navigation task. In particular, we study the effect of the uncertainty from perception representations in downstream control predictions. Moreover, we leverage the uncertainty in the system's output to improve control decisions that positively impact the UAV's performance on its task.
[ { "created": "Sat, 4 Jun 2022 09:34:40 GMT", "version": "v1" } ]
"2022-06-07T00:00:00"
[ [ "Arnez", "Fabio", "" ], [ "Radermacher", "Ansgar", "" ], [ "Espinoza", "Huascar", "" ] ]
0no_new_dataset
1910.04755
Dmitry Zhukov
David Prokhorov, Dmitry Zhukov, Olga Barinova, Anna Vorontsova, Anton Konushin
Measuring robustness of Visual SLAM
null
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simultaneous localization and mapping (SLAM) is an essential component of robotic systems. In this work we perform a feasibility study of RGB-D SLAM for the task of indoor robot navigation. Recent visual SLAM methods, e.g. ORBSLAM2 \cite{mur2017orb}, demonstrate really impressive accuracy, but the experiments in the papers are usually conducted on just a few sequences, that makes it difficult to reason about the robustness of the methods. Another problem is that all available RGB-D datasets contain the trajectories with very complex camera motions. In this work we extensively evaluate ORBSLAM2 to better understand the state-of-the-art. First, we conduct experiments on the popular publicly available datasets for RGB-D SLAM across the conventional metrics. We perform statistical analysis of the results and find correlations between the metrics and the attributes of the trajectories. Then, we introduce a new large and diverse HomeRobot dataset where we model the motions of a simple home robot. Our dataset is created using physically-based rendering with realistic lighting and contains the scenes composed by human designers. It includes thousands of sequences, that is two orders of magnitude greater than in previous works. We find that while in many cases the accuracy of SLAM is very good, the robustness is still an issue.
[ { "created": "Thu, 10 Oct 2019 06:12:44 GMT", "version": "v1" } ]
"2019-10-14T00:00:00"
[ [ "Prokhorov", "David", "" ], [ "Zhukov", "Dmitry", "" ], [ "Barinova", "Olga", "" ], [ "Vorontsova", "Anna", "" ], [ "Konushin", "Anton", "" ] ]
1new_dataset
1802.03699
Jintao Ke
Jintao Ke, Shuaichao Zhang, Hai Yang, Xiqun Chen
PCA-Based Missing Information Imputation for Real-Time Crash Likelihood Prediction Under Imbalanced Data
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The real-time crash likelihood prediction has been an important research topic. Various classifiers, such as support vector machine (SVM) and tree-based boosting algorithms, have been proposed in traffic safety studies. However, few research focuses on the missing data imputation in real-time crash likelihood prediction, although missing values are commonly observed due to breakdown of sensors or external interference. Besides, classifying imbalanced data is also a difficult problem in real-time crash likelihood prediction, since it is hard to distinguish crash-prone cases from non-crash cases which compose the majority of the observed samples. In this paper, principal component analysis (PCA) based approaches, including LS-PCA, PPCA, and VBPCA, are employed for imputing missing values, while two kinds of solutions are developed to solve the problem in imbalanced data. The results show that PPCA and VBPCA not only outperform LS-PCA and other imputation methods (including mean imputation and k-means clustering imputation), in terms of the root mean square error (RMSE), but also help the classifiers achieve better predictive performance. The two solutions, i.e., cost-sensitive learning and synthetic minority oversampling technique (SMOTE), help improve the sensitivity by adjusting the classifiers to pay more attention to the minority class.
[ { "created": "Sun, 11 Feb 2018 06:21:47 GMT", "version": "v1" } ]
"2018-02-13T00:00:00"
[ [ "Ke", "Jintao", "" ], [ "Zhang", "Shuaichao", "" ], [ "Yang", "Hai", "" ], [ "Chen", "Xiqun", "" ] ]
0no_new_dataset
2407.05067
Richard Hlad\'ik
Richard Hlad\'ik, Jakub T\v{e}tek
Smooth Sensitivity Revisited: Towards Optimality
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smooth sensitivity is one of the most commonly used techniques for designing practical differentially private mechanisms. In this approach, one computes the smooth sensitivity of a given query $q$ on the given input $D$ and releases $q(D)$ with noise added proportional to this smooth sensitivity. One question remains: what distribution should we pick the noise from? In this paper, we give a new class of distributions suitable for the use with smooth sensitivity, which we name the PolyPlace distribution. This distribution improves upon the state-of-the-art Student's T distribution in terms of standard deviation by arbitrarily large factors, depending on a "smoothness parameter" $\gamma$, which one has to set in the smooth sensitivity framework. Moreover, our distribution is defined for a wider range of parameter $\gamma$, which can lead to significantly better performance. Moreover, we prove that the PolyPlace distribution converges for $\gamma \rightarrow 0$ to the Laplace distribution and so does its variance. This means that the Laplace mechanism is a limit special case of the PolyPlace mechanism. This implies that out mechanism is in a certain sense optimal for $\gamma \to 0$.
[ { "created": "Sat, 6 Jul 2024 13:09:36 GMT", "version": "v1" } ]
"2024-07-09T00:00:00"
[ [ "Hladík", "Richard", "" ], [ "Tětek", "Jakub", "" ] ]
0no_new_dataset
2210.09439
Natasha Alkhatib
Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
null
null
null
null
cs.LG cs.CR cs.NI
http://creativecommons.org/licenses/by/4.0/
Due to the rising number of sophisticated customer functionalities, electronic control units (ECUs) are increasingly integrated into modern automotive systems. However, the high connectivity between the in-vehicle and the external networks paves the way for hackers who could exploit in-vehicle network protocols' vulnerabilities. Among these protocols, the Controller Area Network (CAN), known as the most widely used in-vehicle networking technology, lacks encryption and authentication mechanisms, making the communications delivered by distributed ECUs insecure. Inspired by the outstanding performance of bidirectional encoder representations from transformers (BERT) for improving many natural language processing tasks, we propose in this paper ``CAN-BERT", a deep learning based network intrusion detection system, to detect cyber attacks on CAN bus protocol. We show that the BERT model can learn the sequence of arbitration identifiers (IDs) in the CAN bus for anomaly detection using the ``masked language model" unsupervised training objective. The experimental results on the ``Car Hacking: Attack \& Defense Challenge 2020" dataset show that ``CAN-BERT" outperforms state-of-the-art approaches. In addition to being able to identify in-vehicle intrusions in real-time within 0.8 ms to 3 ms w.r.t CAN ID sequence length, it can also detect a wide variety of cyberattacks with an F1-score of between 0.81 and 0.99.
[ { "created": "Mon, 17 Oct 2022 21:21:37 GMT", "version": "v1" } ]
"2022-10-19T00:00:00"
[ [ "Alkhatib", "Natasha", "" ], [ "Mushtaq", "Maria", "" ], [ "Ghauch", "Hadi", "" ], [ "Danger", "Jean-Luc", "" ] ]
1new_dataset
2310.13395
Ilias Marios Stogiannidis
Ilias Stogiannidis, Stavros Vassos, Prodromos Malakasiotis, Ion Androutsopoulos
Cache me if you Can: an Online Cost-aware Teacher-Student framework to Reduce the Calls to Large Language Models
Short paper (5 pages), accepted at Findings of EMNLP 2023
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Prompting Large Language Models (LLMs) performs impressively in zero- and few-shot settings. Hence, small and medium-sized enterprises (SMEs) that cannot afford the cost of creating large task-specific training datasets, but also the cost of pretraining their own LLMs, are increasingly turning to third-party services that allow them to prompt LLMs. However, such services currently require a payment per call, which becomes a significant operating expense (OpEx). Furthermore, customer inputs are often very similar over time, hence SMEs end-up prompting LLMs with very similar instances. We propose a framework that allows reducing the calls to LLMs by caching previous LLM responses and using them to train a local inexpensive model on the SME side. The framework includes criteria for deciding when to trust the local model or call the LLM, and a methodology to tune the criteria and measure the tradeoff between performance and cost. For experimental purposes, we instantiate our framework with two LLMs, GPT-3.5 or GPT-4, and two inexpensive students, a k-NN classifier or a Multi-Layer Perceptron, using two common business tasks, intent recognition and sentiment analysis. Experimental results indicate that significant OpEx savings can be obtained with only slightly lower performance.
[ { "created": "Fri, 20 Oct 2023 10:05:07 GMT", "version": "v1" } ]
"2023-10-23T00:00:00"
[ [ "Stogiannidis", "Ilias", "" ], [ "Vassos", "Stavros", "" ], [ "Malakasiotis", "Prodromos", "" ], [ "Androutsopoulos", "Ion", "" ] ]
0no_new_dataset
2308.09454
Mathias Rose Bjare MSc
Mathias Rose Bjare, Stefan Lattner and Gerhard Widmer
Exploring Sampling Techniques for Generating Melodies with a Transformer Language Model
7 pages, 5 figures, 1 table, accepted at the 24th Int. Society for Music Information Retrieval Conf., Milan, Italy, 2023
null
null
null
cs.SD cs.CL eess.AS
http://creativecommons.org/licenses/by/4.0/
Research in natural language processing has demonstrated that the quality of generations from trained autoregressive language models is significantly influenced by the used sampling strategy. In this study, we investigate the impact of different sampling techniques on musical qualities such as diversity and structure. To accomplish this, we train a high-capacity transformer model on a vast collection of highly-structured Irish folk melodies and analyze the musical qualities of the samples generated using distribution truncation sampling techniques. Specifically, we use nucleus sampling, the recently proposed "typical sampling", and conventional ancestral sampling. We evaluate the effect of these sampling strategies in two scenarios: optimal circumstances with a well-calibrated model and suboptimal circumstances where we systematically degrade the model's performance. We assess the generated samples using objective and subjective evaluations. We discover that probability truncation techniques may restrict diversity and structural patterns in optimal circumstances, but may also produce more musical samples in suboptimal circumstances.
[ { "created": "Fri, 18 Aug 2023 10:34:46 GMT", "version": "v1" } ]
"2023-08-21T00:00:00"
[ [ "Bjare", "Mathias Rose", "" ], [ "Lattner", "Stefan", "" ], [ "Widmer", "Gerhard", "" ] ]
0no_new_dataset
1707.04364
Mohammad Kachuee Mr.
Sandeep Singh Sandha, Mohammad Kachuee, Sajad Darabi
Complex Event Processing of Health Data in Real-time to Predict Heart Failure Risk and Stress
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we develop a scalable system which can do real-time analytics for different health applications. The occurrence of different health conditions can be regarded as the complex events and thus this concept can be extended to other use cases easily. Large number of users should be able to send the data in real-time, and should be able to receive the feedback and result. Keeping the requirements in mind we used Kafka and Spark to develop our system. In this setting, multiple users are running Kafka producer clients, which are sending data in real-time. Spark streaming is used to process data from Kafka of different window sizes to analyze the health conditions. We have developed and tested the heart attack risk and stress prediction as our sample complex events detection use cases. We have simulated and tested our system with multiple health datasets.
[ { "created": "Fri, 14 Jul 2017 01:22:50 GMT", "version": "v1" } ]
"2017-07-17T00:00:00"
[ [ "Sandha", "Sandeep Singh", "" ], [ "Kachuee", "Mohammad", "" ], [ "Darabi", "Sajad", "" ] ]
1new_dataset
cs/0606122
P. Oscar Boykin
Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury
Comparison of Image Similarity Queries in P2P Systems
To appear in IEEE P2P2006
null
null
null
cs.DC cs.NI
null
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary to support such applications. Toward this end, we consider an image search application which supports queries based on image similarity metrics, such as color histogram intersection, and discuss why in this setting, standard DHT approaches are not directly applicable. We then study the feasibility of implementing such an image search system on two different unstructured P2P systems: power-law topology with percolation search, and an optimized super-node topology using structured broadcasts. We examine the average and maximum values for node bandwidth, storage and processing requirements in the percolation and super-node models, and show that current high-end computers and high-speed links have sufficient resources to enable deployments of large-scale complex image search systems.
[ { "created": "Thu, 29 Jun 2006 14:28:32 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Mueller", "Wolfgang", "" ], [ "Boykin", "P. Oscar", "" ], [ "Sarshar", "Nima", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
0no_new_dataset
2112.07120
Jonathan Scarlett
Yan Hao Ling and Jonathan Scarlett
Simple Coding Techniques for Many-Hop Relaying
IEEE Transactions on Information Theory, Volume 68, Issue 11, pp. 7043-7053, Nov. 2022
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of relaying a single bit of information across a series of binary symmetric channels, and the associated trade-off between the number of hops $m$, the transmission time $n$, and the error probability. We introduce a simple, efficient, and deterministic protocol that attains positive information velocity (i.e., a non-vanishing ratio $\frac{m}{n}$ and small error probability) and is significantly simpler than existing protocols that do so. In addition, we characterize the optimal low-noise and high-noise scaling laws of the information velocity, and we adapt our 1-bit protocol to transmit $k$ bits over $m$ hops with $O(m+k)$ transmission time.
[ { "created": "Tue, 14 Dec 2021 02:45:45 GMT", "version": "v1" }, { "created": "Wed, 26 Jan 2022 06:31:02 GMT", "version": "v2" }, { "created": "Mon, 6 Jun 2022 06:29:26 GMT", "version": "v3" }, { "created": "Thu, 8 Dec 2022 03:25:01 GMT", "version": "v4" } ]
"2022-12-09T00:00:00"
[ [ "Ling", "Yan Hao", "" ], [ "Scarlett", "Jonathan", "" ] ]
0no_new_dataset
2212.10513
Connor Gibbs
Connor P. Gibbs and Bailey K. Fosdick and James D. Wilson
ECoHeN: A Hypothesis Testing Framework for Extracting Communities from Heterogeneous Networks
31 pages, 8 figures, 1 table, 1 algorithm
null
null
null
cs.SI stat.ME
http://creativecommons.org/licenses/by/4.0/
Community discovery is the general process of attaining assortative communities from a network: collections of nodes that are densely connected within yet sparsely connected to the rest of the network. While community discovery has been well studied, few such techniques exist for heterogeneous networks, which contain different types of nodes and possibly different connectivity patterns between the node types. In this paper, we introduce a framework called ECoHeN, which \textbf{e}xtracts \textbf{co}mmunities from a \textbf{he}terogeneous \textbf{n}etwork in a statistically meaningful way. Using a heterogeneous configuration model as a reference distribution, ECoHeN identifies communities that are significantly more densely connected than expected given the node types and connectivity of its membership. Specifically, the ECoHeN algorithm extracts communities one at a time through a dynamic set of iterative updating rules, is guaranteed to converge, and imposes no constraints on the type composition of extracted communities. To our knowledge this is the first discovery method that distinguishes and identifies both homogeneous and heterogeneous, possibly overlapping, community structure in a network. We demonstrate the performance of ECoHeN through simulation and in application to a political blogs network to identify collections of blogs which reference one another more than expected considering the ideology of its' members.
[ { "created": "Tue, 20 Dec 2022 18:30:55 GMT", "version": "v1" } ]
"2022-12-21T00:00:00"
[ [ "Gibbs", "Connor P.", "" ], [ "Fosdick", "Bailey K.", "" ], [ "Wilson", "James D.", "" ] ]
1new_dataset
1806.05285
Gilles Puy
Gilles Puy and Patrick P\'erez
A Flexible Convolutional Solver with Application to Photorealistic Style Transfer
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new flexible deep convolutional neural network (convnet) to perform fast visual style transfer. In contrast to existing convnets that address the same task, our architecture derives directly from the structure of the gradient descent originally used to solve the style transfer problem [Gatys et al., 2016]. Like existing convnets, ours approximately solves the original problem much faster than the gradient descent. However, our network is uniquely flexible by design: it can be manipulated at runtime to enforce new constraints on the final solution. In particular, we show how to modify it to obtain a photorealistic result with no retraining. We study the modifications made by [Luan et al., 2017] to the original cost function of [Gatys et al., 2016] to achieve photorealistic style transfer. These modifications affect directly the gradient descent and can be reported on-the-fly in our network. These modifications are possible as the proposed architecture stems from unrolling the gradient descent.
[ { "created": "Wed, 13 Jun 2018 22:05:35 GMT", "version": "v1" } ]
"2018-06-15T00:00:00"
[ [ "Puy", "Gilles", "" ], [ "Pérez", "Patrick", "" ] ]
0no_new_dataset
1909.12054
Alexis Stoven-Dubois
Alexis Stoven-Dubois, Janos Botzheim and Naoyuki Kubota
Fuzzy Gesture Expression Model for an Interactive and Safe Robot Partner
11 pages, 8 figures, accepted for publication in Journal of Network Intelligence
Journal of Network Intelligence Vol. 1 Number 4 (2016) pgs. 119-129
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interaction with a robot partner requires many elements, including not only speech but also embodiment. Thus, gestural and facial expressions are important for communication. Furthermore, understanding human movements is essential for safe and natural interchange. This paper proposes an interactive fuzzy emotional model for the robot partner's gesture expression, following its facial emotional model. First, we describe the physical interaction between the user and its robot partner. Next, we propose a kinematic model for the robot partner based on the Denavit-Hartenberg convention and solve the inverse kinematic transformation through Bacterial Memetic Algorithm. Then, the emotional model along its interactivity with the user is discussed. Finally, we show experimental results of the proposed model.
[ { "created": "Thu, 26 Sep 2019 12:39:02 GMT", "version": "v1" } ]
"2019-10-02T00:00:00"
[ [ "Stoven-Dubois", "Alexis", "" ], [ "Botzheim", "Janos", "" ], [ "Kubota", "Naoyuki", "" ] ]
0no_new_dataset
1811.02275
Veronica Morfi
Veronica Morfi, Yves Bas, Hanna Pamu{\l}a, Herv\'e Glotin, Dan Stowell
NIPS4Bplus: a richly annotated birdsong audio dataset
5 pages, 5 figures, submitted to ICASSP 2019
null
null
null
cs.SD cs.DL eess.AS
http://creativecommons.org/licenses/by/4.0/
Recent advances in birdsong detection and classification have approached a limit due to the lack of fully annotated recordings. In this paper, we present NIPS4Bplus, the first richly annotated birdsong audio dataset, that is comprised of recordings containing bird vocalisations along with their active species tags plus the temporal annotations acquired for them. Statistical information about the recordings, their species specific tags and their temporal annotations are presented along with example uses. NIPS4Bplus could be used in various ecoacoustic tasks, such as training models for bird population monitoring, species classification, birdsong vocalisation detection and classification.
[ { "created": "Tue, 6 Nov 2018 10:46:27 GMT", "version": "v1" }, { "created": "Wed, 14 Nov 2018 12:25:27 GMT", "version": "v2" } ]
"2018-11-15T00:00:00"
[ [ "Morfi", "Veronica", "" ], [ "Bas", "Yves", "" ], [ "Pamuła", "Hanna", "" ], [ "Glotin", "Hervé", "" ], [ "Stowell", "Dan", "" ] ]
1new_dataset
1907.13077
Markus Levonyak
Carlos Pachajoa, Markus Levonyak, Wilfried N. Gansterer, Jesper Larsson Tr\"aff
How to Make the Preconditioned Conjugate Gradient Method Resilient Against Multiple Node Failures
10 pages, 4 figures, 3 tables
Proceedings of the 48th International Conference on Parallel Processing (2019) 67:1-67:10
10.1145/3337821.3337849
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study algorithmic approaches for recovering from the failure of several compute nodes in the parallel preconditioned conjugate gradient (PCG) solver on large-scale parallel computers. In particular, we analyze and extend an exact state reconstruction (ESR) approach, which is based on a method proposed by Chen (2011). In the ESR approach, the solver keeps redundant information from previous search directions, so that the solver state can be fully reconstructed if a node fails unexpectedly. ESR does not require checkpointing or external storage for saving dynamic solver data and has low overhead compared to the failure-free situation. In this paper, we improve the fault tolerance of the PCG algorithm based on the ESR approach. In particular, we support recovery from simultaneous or overlapping failures of several nodes for general sparsity patterns of the system matrix, which cannot be handled by Chen's method. For this purpose, we refine the strategy for how to store redundant information across nodes. We analyze and implement our new method and perform numerical experiments with large sparse matrices from real-world applications on 128 nodes of the Vienna Scientific Cluster (VSC). For recovering from three simultaneous node failures we observe average runtime overheads between only 2.8% and 55.0%. The overhead of the improved resilience depends on the sparsity pattern of the system matrix.
[ { "created": "Tue, 30 Jul 2019 17:01:33 GMT", "version": "v1" } ]
"2019-08-21T00:00:00"
[ [ "Pachajoa", "Carlos", "" ], [ "Levonyak", "Markus", "" ], [ "Gansterer", "Wilfried N.", "" ], [ "Träff", "Jesper Larsson", "" ] ]
0no_new_dataset
2010.12033
Victor Sanches Portella
Yihan Zhou, Victor S. Portella, Mark Schmidt, Nicholas J. A. Harvey
Regret Bounds without Lipschitz Continuity: Online Learning with Relative-Lipschitz Losses
22 pages, camera-ready version, accepted in NeurIPS 2020 for poster presentation. Second version has a new reference (acknowledged in the acknowledgements section) and comments on the relationship of this work with the paper
null
null
null
cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In online convex optimization (OCO), Lipschitz continuity of the functions is commonly assumed in order to obtain sublinear regret. Moreover, many algorithms have only logarithmic regret when these functions are also strongly convex. Recently, researchers from convex optimization proposed the notions of "relative Lipschitz continuity" and "relative strong convexity". Both of the notions are generalizations of their classical counterparts. It has been shown that subgradient methods in the relative setting have performance analogous to their performance in the classical setting. In this work, we consider OCO for relative Lipschitz and relative strongly convex functions. We extend the known regret bounds for classical OCO algorithms to the relative setting. Specifically, we show regret bounds for the follow the regularized leader algorithms and a variant of online mirror descent. Due to the generality of these methods, these results yield regret bounds for a wide variety of OCO algorithms. Furthermore, we further extend the results to algorithms with extra regularization such as regularized dual averaging.
[ { "created": "Thu, 22 Oct 2020 20:22:19 GMT", "version": "v1" }, { "created": "Mon, 28 Dec 2020 22:02:54 GMT", "version": "v2" } ]
"2021-01-01T00:00:00"
[ [ "Zhou", "Yihan", "" ], [ "Portella", "Victor S.", "" ], [ "Schmidt", "Mark", "" ], [ "Harvey", "Nicholas J. A.", "" ] ]
0no_new_dataset
2311.09776
EPTCS
Astrid Rakow (German Aerospace Center (DLR) e.V.), Mehrnoush Hajnorouzi (German Aerospace Center (DLR) e.V.), Akhila Bairy (Carl von Ossietzky University of Oldenburg)
What to tell when? -- Information Provision as a Game
In Proceedings FMAS 2023, arXiv:2311.08987
EPTCS 395, 2023, pp. 1-9
10.4204/EPTCS.395.1
null
cs.GT cs.HC
http://creativecommons.org/licenses/by/4.0/
Constantly informing systems (CIS), that is technical systems that provide us with information over a long period of time, face the challenge of providing us with helpful information. The information base of a human model changes over time but also his mood and his ability to accept information. An information provision strategy should hence take such aspects into account. In this paper, we describe our vision of an approach to aid the design of CIS. We envision using psychological models of the human mind and emotions in an information provision game. Its analysis gives comparative insights into design variants.
[ { "created": "Thu, 16 Nov 2023 11:01:02 GMT", "version": "v1" } ]
"2023-11-17T00:00:00"
[ [ "Rakow", "Astrid", "", "German Aerospace Center" ], [ "Hajnorouzi", "Mehrnoush", "", "German Aerospace Center" ], [ "Bairy", "Akhila", "", "Carl von\n Ossietzky University of Oldenburg" ] ]
0no_new_dataset
2002.04335
Eren Sezener
Eren Sezener and Peter Dayan
Static and Dynamic Values of Computation in MCTS
Presented in UAI 2020
PMLR 124:31-40, 2020
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monte-Carlo Tree Search (MCTS) is one of the most-widely used methods for planning, and has powered many recent advances in artificial intelligence. In MCTS, one typically performs computations (i.e., simulations) to collect statistics about the possible future consequences of actions, and then chooses accordingly. Many popular MCTS methods such as UCT and its variants decide which computations to perform by trading-off exploration and exploitation. In this work, we take a more direct approach, and explicitly quantify the value of a computation based on its expected impact on the quality of the action eventually chosen. Our approach goes beyond the "myopic" limitations of existing computation-value-based methods in two senses: (I) we are able to account for the impact of non-immediate (ie, future) computations (II) on non-immediate actions. We show that policies that greedily optimize computation values are optimal under certain assumptions and obtain results that are competitive with the state-of-the-art.
[ { "created": "Tue, 11 Feb 2020 12:05:58 GMT", "version": "v1" }, { "created": "Thu, 19 Nov 2020 12:28:19 GMT", "version": "v2" } ]
"2020-11-20T00:00:00"
[ [ "Sezener", "Eren", "" ], [ "Dayan", "Peter", "" ] ]
0no_new_dataset
0807.4052
Andreas Noack
Andreas Noack
Modularity clustering is force-directed layout
9 pages, 7 figures, see http://code.google.com/p/linloglayout/ for downloading the graph clustering and layout software
Phys. Rev. E 79, 026102 (2009)
10.1103/PhysRevE.79.026102
null
cs.DM cs.CG physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two natural and widely used representations for the community structure of networks are clusterings, which partition the vertex set into disjoint subsets, and layouts, which assign the vertices to positions in a metric space. This paper unifies prominent characterizations of layout quality and clustering quality, by showing that energy models of pairwise attraction and repulsion subsume Newman and Girvan's modularity measure. Layouts with optimal energy are relaxations of, and are thus consistent with, clusterings with optimal modularity, which is of practical relevance because both representations are complementary and often used together.
[ { "created": "Fri, 25 Jul 2008 19:56:08 GMT", "version": "v1" }, { "created": "Tue, 9 Dec 2008 16:13:37 GMT", "version": "v2" } ]
"2009-02-06T00:00:00"
[ [ "Noack", "Andreas", "" ] ]
0no_new_dataset
2303.11564
Eduardo Ulises Moya-S\'anchez
Abraham S\'anchez, Ra\'ul Nanclares, Alexander Quevedo, Ulises Pelagio, Alejandra Aguilar, Gabriela Calvario and E. Ulises Moya-S\'anchez
Agave crop segmentation and maturity classification with deep learning data-centric strategies using very high-resolution satellite imagery
12 pages, 8 figures
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The responsible and sustainable agave-tequila production chain is fundamental for the social, environment and economic development of Mexico's agave regions. It is therefore relevant to develop new tools for large scale automatic agave region monitoring. In this work, we present an Agave tequilana Weber azul crop segmentation and maturity classification using very high resolution satellite imagery, which could be useful for this task. To achieve this, we solve real-world deep learning problems in the very specific context of agave crop segmentation such as lack of data, low quality labels, highly imbalanced data, and low model performance. The proposed strategies go beyond data augmentation and data transfer combining active learning and the creation of synthetic images with human supervision. As a result, the segmentation performance evaluated with Intersection over Union (IoU) value increased from 0.72 to 0.90 in the test set. We also propose a method for classifying agave crop maturity with 95% accuracy. With the resulting accurate models, agave production forecasting can be made available for large regions. In addition, some supply-demand problems such excessive supplies of agave or, deforestation, could be detected early.
[ { "created": "Tue, 21 Mar 2023 03:15:29 GMT", "version": "v1" }, { "created": "Wed, 5 Apr 2023 23:29:05 GMT", "version": "v2" } ]
"2023-04-07T00:00:00"
[ [ "Sánchez", "Abraham", "" ], [ "Nanclares", "Raúl", "" ], [ "Quevedo", "Alexander", "" ], [ "Pelagio", "Ulises", "" ], [ "Aguilar", "Alejandra", "" ], [ "Calvario", "Gabriela", "" ], [ "Moya-Sánchez", "E. Ulises", "" ] ]
1new_dataset
1905.03929
Yuxiu Hua
Yuxiu Hua, Rongpeng Li, Zhifeng Zhao, Xianfu Chen, Honggang Zhang
GAN-powered Deep Distributional Reinforcement Learning for Resource Management in Network Slicing
null
null
null
null
cs.LG cs.AI cs.NI stat.ML
http://creativecommons.org/licenses/by-nc-sa/4.0/
Network slicing is a key technology in 5G communications system. Its purpose is to dynamically and efficiently allocate resources for diversified services with distinct requirements over a common underlying physical infrastructure. Therein, demand-aware resource allocation is of significant importance to network slicing. In this paper, we consider a scenario that contains several slices in a radio access network with base stations that share the same physical resources (e.g., bandwidth or slots). We leverage deep reinforcement learning (DRL) to solve this problem by considering the varying service demands as the environment state and the allocated resources as the environment action. In order to reduce the effects of the annoying randomness and noise embedded in the received service level agreement (SLA) satisfaction ratio (SSR) and spectrum efficiency (SE), we primarily propose generative adversarial network-powered deep distributional Q network (GAN-DDQN) to learn the action-value distribution driven by minimizing the discrepancy between the estimated action-value distribution and the target action-value distribution. We put forward a reward-clipping mechanism to stabilize GAN-DDQN training against the effects of widely-spanning utility values. Moreover, we further develop Dueling GAN-DDQN, which uses a specially designed dueling generator, to learn the action-value distribution by estimating the state-value distribution and the action advantage function. Finally, we verify the performance of the proposed GAN-DDQN and Dueling GAN-DDQN algorithms through extensive simulations.
[ { "created": "Fri, 10 May 2019 04:10:43 GMT", "version": "v1" }, { "created": "Fri, 21 Jun 2019 01:58:34 GMT", "version": "v2" }, { "created": "Wed, 20 Nov 2019 14:51:31 GMT", "version": "v3" } ]
"2019-11-21T00:00:00"
[ [ "Hua", "Yuxiu", "" ], [ "Li", "Rongpeng", "" ], [ "Zhao", "Zhifeng", "" ], [ "Chen", "Xianfu", "" ], [ "Zhang", "Honggang", "" ] ]
0no_new_dataset
1610.02728
Marco Chiesa
Marco Chiesa and G\'abor R\'etv\'ari and Michael Schapira
Lying Your Way to Better Traffic Engineering
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To optimize the flow of traffic in IP networks, operators do traffic engineering (TE), i.e., tune routing-protocol parameters in response to traffic demands. TE in IP networks typically involves configuring static link weights and splitting traffic between the resulting shortest-paths via the Equal-Cost-MultiPath (ECMP) mechanism. Unfortunately, ECMP is a notoriously cumbersome and indirect means for optimizing traffic flow, often leading to poor network performance. Also, obtaining accurate knowledge of traffic demands as the input to TE is elusive, and traffic conditions can be highly variable, further complicating TE. We leverage recently proposed schemes for increasing ECMP's expressiveness via carefully disseminated bogus information ("lies") to design COYOTE, a readily deployable TE scheme for robust and efficient network utilization. COYOTE leverages new algorithmic ideas to configure (static) traffic splitting ratios that are optimized with respect to all (even adversarially chosen) traffic scenarios within the operator's "uncertainty bounds". Our experimental analyses show that COYOTE significantly outperforms today's prevalent TE schemes in a manner that is robust to traffic uncertainty and variation. We discuss experiments with a prototype implementation of COYOTE.
[ { "created": "Sun, 9 Oct 2016 21:57:39 GMT", "version": "v1" }, { "created": "Tue, 1 Nov 2016 13:21:43 GMT", "version": "v2" } ]
"2016-11-02T00:00:00"
[ [ "Chiesa", "Marco", "" ], [ "Rétvári", "Gábor", "" ], [ "Schapira", "Michael", "" ] ]
0no_new_dataset
1702.01340
Nicola Prezza
Alberto Policriti, Nicola Prezza
From LZ77 to the Run-Length Encoded Burrows-Wheeler Transform, and Back
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lempel-Ziv factorization (LZ77) and the Run-Length encoded Burrows-Wheeler Transform (RLBWT) are two important tools in text compression and indexing, being their sizes $z$ and $r$ closely related to the amount of text self-repetitiveness. In this paper we consider the problem of converting the two representations into each other within a working space proportional to the input and the output. Let $n$ be the text length. We show that $RLBWT$ can be converted to $LZ77$ in $\mathcal{O}(n\log r)$ time and $\mathcal{O}(r)$ words of working space. Conversely, we provide an algorithm to convert $LZ77$ to $RLBWT$ in $\mathcal{O}\big(n(\log r + \log z)\big)$ time and $\mathcal{O}(r+z)$ words of working space. Note that $r$ and $z$ can be \emph{constant} if the text is highly repetitive, and our algorithms can operate with (up to) \emph{exponentially} less space than naive solutions based on full decompression.
[ { "created": "Sat, 4 Feb 2017 20:19:26 GMT", "version": "v1" } ]
"2017-02-07T00:00:00"
[ [ "Policriti", "Alberto", "" ], [ "Prezza", "Nicola", "" ] ]
0no_new_dataset
2405.20931
Tom\'a\v{s} Masa\v{r}\'ik
Karolina Drabik, Tom\'a\v{s} Masa\v{r}\'ik
Finding Diverse Solutions Parameterized by Cliquewidth
28 pages, 1 figure
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding a few solutions for a given problem that are diverse, as opposed to finding a single best solution to solve the problem, has recently become a notable topic in theoretical computer science. Recently, Baste, Fellows, Jaffke, Masa\v{r}\'ik, Oliveira, Philip, and Rosamond showed that under a standard structural parameterization by treewidth, one can find a set of diverse solutions for many problems with only a very small additional cost [Artificial Intelligence 2022]. In this paper, we investigate a much stronger graph parameter, the cliquewidth, which can additionally describe some dense graph classes. Broadly speaking, it describes graphs that can be recursively constructed by a few operations defined on graphs whose vertices are divided into a bounded number of groups while each such group behaves uniformly with respect to any operation. We show that for any vertex problem, if we are given a dynamic program solving that problem on cliquewidth decomposition, we can modify it to produce a few solutions that are as diverse as possible with as little overhead as in the above-mentioned treewidth paper. As a consequence, we prove that a diverse version of any MSO$_1$ expressible problem can be solved in FPT time parameterized by cliquewidth, the number of sought solutions, and the number of quantifiers in the formula. That was an important missing piece in the complexity landscape of structural graph parameters and logic. We prove our results allowing for a more general natural collection of diversity functions compared to only two mostly studied diversity functions previously. That might be of independent interest as a larger pool of different diversity functions can highlight various aspects of different solutions to a problem.
[ { "created": "Fri, 31 May 2024 15:29:56 GMT", "version": "v1" } ]
"2024-06-03T00:00:00"
[ [ "Drabik", "Karolina", "" ], [ "Masařík", "Tomáš", "" ] ]
0no_new_dataset
1704.02046
Dan Elbaz
Dan Elbaz, Michael Zibulevsky
End to End Deep Neural Network Frequency Demodulation of Speech Signals
null
null
null
null
cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequency modulation (FM) is a form of radio broadcasting which is widely used nowadays and has been for almost a century. We suggest a software-defined-radio (SDR) receiver for FM demodulation that adopts an end-to-end learning based approach and utilizes the prior information of transmitted speech message in the demodulation process. The receiver detects and enhances speech from the in-phase and quadrature components of its base band version. The new system yields high performance detection for both acoustical disturbances, and communication channel noise and is foreseen to out-perform the established methods for low signal to noise ratio (SNR) conditions in both mean square error and in perceptual evaluation of speech quality score.
[ { "created": "Thu, 6 Apr 2017 23:16:33 GMT", "version": "v1" }, { "created": "Mon, 10 Apr 2017 14:47:16 GMT", "version": "v2" }, { "created": "Wed, 12 Apr 2017 00:47:36 GMT", "version": "v3" }, { "created": "Sun, 21 May 2017 11:55:14 GMT", "version": "v4" }, { "created": "Sat, 7 Oct 2017 16:34:18 GMT", "version": "v5" } ]
"2017-10-10T00:00:00"
[ [ "Elbaz", "Dan", "" ], [ "Zibulevsky", "Michael", "" ] ]
0no_new_dataset
2103.09179
Chenwei Cui
Chenwei Cui, Liangfu Lu, Zhiyuan Tan, Amir Hussain
Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection
Preprint submitted to Neurocomputing
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Segmentation-based methods are widely used for scene text detection due to their superiority in describing arbitrary-shaped text instances. However, two major problems still exist: 1) current label generation techniques are mostly empirical and lack theoretical support, discouraging elaborate label design; 2) as a result, most methods rely heavily on text kernel segmentation which is unstable and requires deliberate tuning. To address these challenges, we propose a human cognition-inspired framework, termed, Conceptual Text Region Network (CTRNet). The framework utilizes Conceptual Text Regions (CTRs), which is a class of cognition-based tools inheriting good mathematical properties, allowing for sophisticated label design. Another component of CTRNet is an inference pipeline that, with the help of CTRs, completely omits the need for text kernel segmentation. Compared with previous segmentation-based methods, our approach is not only more interpretable but also more accurate. Experimental results show that CTRNet achieves state-of-the-art performance on benchmark CTW1500, Total-Text, MSRA-TD500, and ICDAR 2015 datasets, yielding performance gains of up to 2.0%. Notably, to the best of our knowledge, CTRNet is among the first detection models to achieve F-measures higher than 85.0% on all four of the benchmarks, with remarkable consistency and stability.
[ { "created": "Tue, 16 Mar 2021 16:28:33 GMT", "version": "v1" } ]
"2021-03-17T00:00:00"
[ [ "Cui", "Chenwei", "" ], [ "Lu", "Liangfu", "" ], [ "Tan", "Zhiyuan", "" ], [ "Hussain", "Amir", "" ] ]
1new_dataset
1705.05922
Subarna Tripathi
Subarna Tripathi and Gokce Dane and Byeongkeun Kang and Vasudev Bhaskaran and Truong Nguyen
LCDet: Low-Complexity Fully-Convolutional Neural Networks for Object Detection in Embedded Systems
Embedded Vision Workshop in CVPR
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep convolutional Neural Networks (CNN) are the state-of-the-art performers for object detection task. It is well known that object detection requires more computation and memory than image classification. Thus the consolidation of a CNN-based object detection for an embedded system is more challenging. In this work, we propose LCDet, a fully-convolutional neural network for generic object detection that aims to work in embedded systems. We design and develop an end-to-end TensorFlow(TF)-based model. Additionally, we employ 8-bit quantization on the learned weights. We use face detection as a use case. Our TF-Slim based network can predict different faces of different shapes and sizes in a single forward pass. Our experimental results show that the proposed method achieves comparative accuracy comparing with state-of-the-art CNN-based face detection methods, while reducing the model size by 3x and memory-BW by ~4x comparing with one of the best real-time CNN-based object detector such as YOLO. TF 8-bit quantized model provides additional 4x memory reduction while keeping the accuracy as good as the floating point model. The proposed model thus becomes amenable for embedded implementations.
[ { "created": "Tue, 16 May 2017 21:05:49 GMT", "version": "v1" } ]
"2017-05-18T00:00:00"
[ [ "Tripathi", "Subarna", "" ], [ "Dane", "Gokce", "" ], [ "Kang", "Byeongkeun", "" ], [ "Bhaskaran", "Vasudev", "" ], [ "Nguyen", "Truong", "" ] ]
0no_new_dataset
2305.12506
Xiaoguang Li
Xiaoguang Li
CNN-based Dendrite Core Detection from Microscopic Images of Directionally Solidified Ni-base Alloys
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dendrite core is the center point of the dendrite. The information of dendrite core is very helpful for material scientists to analyze the properties of materials. Therefore, detecting the dendrite core is a very important task in the material science field. Meanwhile, because of some special properties of the dendrites, this task is also very challenging. Different from the typical detection problems in the computer vision field, detecting the dendrite core aims to detect a single point location instead of the bounding-box. As a result, the existing regressing bounding-box based detection methods can not work well on this task because the calculated center point location based on the upper-left and lower-right corners of the bounding-box is usually not precise. In this work, we formulate the dendrite core detection problem as a segmentation task and proposed a novel detection method to detect the dendrite core directly. Our whole pipeline contains three steps: Easy Sample Detection (ESD), Hard Sample Detection(HSD), and Hard Sample Refinement (HSR). Specifically, ESD and HSD focus on the easy samples and hard samples of dendrite cores respectively. Both of them employ the same Central Point Detection Network (CPDN) but do not share parameters. To make HSD only focus on the feature of hard samples of dendrite cores, we destroy the structure of the easy samples of dendrites which are detected by ESD and force HSD to learn the feature of hard samples. HSR is a binary classifier which is used to filter out the false positive prediction of HSD. We evaluate our method on the dendrite dataset. Our method outperforms the state-of-the-art baselines on three metrics, i.e., Recall, Precision, and F-score.
[ { "created": "Sun, 21 May 2023 16:51:15 GMT", "version": "v1" } ]
"2023-05-23T00:00:00"
[ [ "Li", "Xiaoguang", "" ] ]
1new_dataset
2310.04285
Marcel Kollovieh
Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan G\"unnemann
Assessing Robustness via Score-Based Adversarial Image Generation
null
null
null
null
cs.CV cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most adversarial attacks and defenses focus on perturbations within small $\ell_p$-norm constraints. However, $\ell_p$ threat models cannot capture all relevant semantic-preserving perturbations, and hence, the scope of robustness evaluations is limited. In this work, we introduce Score-Based Adversarial Generation (ScoreAG), a novel framework that leverages the advancements in score-based generative models to generate adversarial examples beyond $\ell_p$-norm constraints, so-called unrestricted adversarial examples, overcoming their limitations. Unlike traditional methods, ScoreAG maintains the core semantics of images while generating realistic adversarial examples, either by transforming existing images or synthesizing new ones entirely from scratch. We further exploit the generative capability of ScoreAG to purify images, empirically enhancing the robustness of classifiers. Our extensive empirical evaluation demonstrates that ScoreAG matches the performance of state-of-the-art attacks and defenses across multiple benchmarks. This work highlights the importance of investigating adversarial examples bounded by semantics rather than $\ell_p$-norm constraints. ScoreAG represents an important step towards more encompassing robustness assessments.
[ { "created": "Fri, 6 Oct 2023 14:37:22 GMT", "version": "v1" } ]
"2023-10-09T00:00:00"
[ [ "Kollovieh", "Marcel", "" ], [ "Gosch", "Lukas", "" ], [ "Scholten", "Yan", "" ], [ "Lienen", "Marten", "" ], [ "Günnemann", "Stephan", "" ] ]
0no_new_dataset
1803.03790
Junzhong Shen
Junzhong Shen, Yuran Qiao, You Huang, Mei Wen, Chunyuan Zhang
Towards a Multi-array Architecture for Accelerating Large-scale Matrix Multiplication on FPGAs
This paper has been accepet by IEEE International Symposium on Circuits and Systems (ISCAS 2018)
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale floating-point matrix multiplication is a fundamental kernel in many scientific and engineering applications. Most existing work only focus on accelerating matrix multiplication on FPGA by adopting a linear systolic array. This paper towards the extension of this architecture by proposing a scalable and highly configurable multi-array architecture. In addition, we propose a work-stealing scheme to ensure the equality in the workload partition among multiple linear arrays. Furthermore, an analytical model is developed to determine the optimal design parameters. Experiments on a real-life convolutional neural network (CNN) show that we can obtain the optimal extension of the linear array architecture.
[ { "created": "Sat, 10 Mar 2018 10:33:28 GMT", "version": "v1" } ]
"2018-03-13T00:00:00"
[ [ "Shen", "Junzhong", "" ], [ "Qiao", "Yuran", "" ], [ "Huang", "You", "" ], [ "Wen", "Mei", "" ], [ "Zhang", "Chunyuan", "" ] ]
0no_new_dataset
2206.05414
Tiejun Lv
Jintao Xing and Tiejun Lv and Yashuai Cao and Jie Zeng and Pingmu Huang
Downlink Power Minimization in Intelligent Reconfigurable Surface-Aided Security Classification Wireless Communications System
13 pages, 9 figures, Accepted by IEEE Systems Journal
null
10.1109/JSYST.2022.3182465
null
cs.IT eess.SP math.IT
http://creativecommons.org/publicdomain/zero/1.0/
User privacy protection is considered a critical issue in wireless networks, which drives the demand for various secure information interaction techniques. In this paper, we introduce an intelligent reflecting surface (IRS)-aided security classification wireless communication system, which reduces the transmit power of the base station (BS) by classifying users with different security requirements. Specifically, we divide the users into confidential subscribers with secure communication requirements and general communication users with simple communication requirements. During the communication period, we guarantee the secure rate of the confidential subscribers while ensuring the service quality of the general communication users, thereby reducing the transmit power of the BS. To realize such a secure and green information transmission, the BS implements a beamforming design on the transmitted signal superimposed with artificial noise (AN) and then broadcasts it to users with the assistance of the IRS's reflection. We develop an alternating optimization framework to minimize the BS downlink power with respect to the active beamformers of the BS, the AN vector at the BS, and the reflection phase shifts of the IRS. A successive convex approximation (SCA) method is proposed so that the nonconvex beamforming problems can be converted to tractable convex forms. The simulation results demonstrate that the proposed algorithm is convergent and can reduce the transmit power by 20\% compared to the best benchmark scheme.
[ { "created": "Sat, 11 Jun 2022 04:02:27 GMT", "version": "v1" } ]
"2022-06-14T00:00:00"
[ [ "Xing", "Jintao", "" ], [ "Lv", "Tiejun", "" ], [ "Cao", "Yashuai", "" ], [ "Zeng", "Jie", "" ], [ "Huang", "Pingmu", "" ] ]
0no_new_dataset
2205.08869
J\"urgen Giesl
Nils Lommen, Fabian Meyer, J\"urgen Giesl
Automatic Complexity Analysis of Integer Programs via Triangular Weakly Non-Linear Loops
Full version of a paper which appeared in the Proceedings of IJCAR 2022
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There exist several results on deciding termination and computing runtime bounds for triangular weakly non-linear loops (twn-loops). We show how to use results on such subclasses of programs where complexity bounds are computable within incomplete approaches for complexity analysis of full integer programs. To this end, we present a novel modular approach which computes local runtime bounds for subprograms which can be transformed into twn-loops. These local runtime bounds are then lifted to global runtime bounds for the whole program. The power of our approach is shown by our implementation in the tool KoAT which analyzes complexity of programs where all other state-of-the-art tools fail.
[ { "created": "Wed, 18 May 2022 11:33:18 GMT", "version": "v1" }, { "created": "Sat, 3 Jun 2023 10:03:33 GMT", "version": "v2" } ]
"2023-06-06T00:00:00"
[ [ "Lommen", "Nils", "" ], [ "Meyer", "Fabian", "" ], [ "Giesl", "Jürgen", "" ] ]
0no_new_dataset
1804.00035
Andreas Venzke
Andreas Venzke, Spyros Chatzivasileiadis
Convex Relaxations of Probabilistic AC Optimal Power Flow for Interconnected AC and HVDC Grids
null
null
10.1109/TPWRS.2019.2895122
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High Voltage Direct Current (HVDC) systems interconnect AC grids to increase reliability, connect offshore wind generation, and enable coupling of electricity markets. Considering the growing uncertainty in power infeed and the complexity introduced by additional controls, robust decision support tools are necessary. This paper proposes a chance constrained AC-OPF for AC and HVDC grids, which considers wind uncertainty, fully utilizes HVDC control capabilities, and uses the semidefinite relaxation of the AC-OPF. We consider a joint chance constraint for both AC and HVDC systems, we introduce a piecewise affine approximation to achieve tractability of the chance constraint, and we allow corrective control policies for HVDC converters and generators to be determined. An active loss penalty term in the objective function and a systematic procedure to choose the penalty weights allow us to obtain AC-feasible solutions. We introduce Benders decomposition to maintain scalability. Using realistic forecast data, we demonstrate our approach on a 53-bus and a 214-bus AC-DC system, obtaining tight near-global optimality guarantees. With a Monte Carlo analysis, we show that a chance constrained DC-OPF leads to violations, whereas our proposed approach complies with the joint chance constraint.
[ { "created": "Fri, 30 Mar 2018 19:13:40 GMT", "version": "v1" }, { "created": "Mon, 10 Sep 2018 14:23:25 GMT", "version": "v2" }, { "created": "Wed, 19 Dec 2018 10:34:51 GMT", "version": "v3" }, { "created": "Mon, 28 Jan 2019 08:43:42 GMT", "version": "v4" }, { "created": "Thu, 23 Jul 2020 08:02:06 GMT", "version": "v5" } ]
"2020-07-24T00:00:00"
[ [ "Venzke", "Andreas", "" ], [ "Chatzivasileiadis", "Spyros", "" ] ]
0no_new_dataset
2003.08817
Adrian Bowman Prof.
Stanislav Katina and Liberty Vittert and Adrian W. Bowman
Functional Data Analysis and Visualisation of Three-dimensional Surface Shape
null
null
null
null
cs.CV stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of high resolution imaging has made data on surface shape widespread. Methods for the analysis of shape based on landmarks are well established but high resolution data require a functional approach. The starting point is a systematic and consistent description of each surface shape. Three innovative forms of analysis are then introduced. The first uses surface integration to address issues of registration, principal component analysis and the measurement of asymmetry, all in functional form. Computational issues are handled through discrete approximations to integrals, based in this case on appropriate surface area weighted sums. The second innovation is to focus on sub-spaces where interesting behaviour such as group differences are exhibited, rather than on individual principal components. The third innovation concerns the comparison of individual shapes with a relevant control set, where the concept of a normal range is extended to the highly multivariate setting of surface shape. This has particularly strong applications to medical contexts where the assessment of individual patients is very important. All of these ideas are developed and illustrated in the important context of human facial shape, with a strong emphasis on the effective visual communication of effects of interest.
[ { "created": "Sat, 14 Mar 2020 13:54:24 GMT", "version": "v1" } ]
"2020-03-20T00:00:00"
[ [ "Katina", "Stanislav", "" ], [ "Vittert", "Liberty", "" ], [ "Bowman", "Adrian W.", "" ] ]
0no_new_dataset
2306.10052
Ethan Mollick
Ethan Mollick, Lilach Mollick
Assigning AI: Seven Approaches for Students, with Prompts
46 pages
null
null
null
cs.CY cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper examines the transformative role of Large Language Models (LLMs) in education and their potential as learning tools, despite their inherent risks and limitations. The authors propose seven approaches for utilizing AI in classrooms: AI-tutor, AI-coach, AI-mentor, AI-teammate, AI-tool, AI-simulator, and AI-student, each with distinct pedagogical benefits and risks. The aim is to help students learn with and about AI, with practical strategies designed to mitigate risks such as complacency about the AI's output, errors, and biases. These strategies promote active oversight, critical assessment of AI outputs, and complementarity of AI's capabilities with the students' unique insights. By challenging students to remain the "human in the loop," the authors aim to enhance learning outcomes while ensuring that AI serves as a supportive tool rather than a replacement. The proposed framework offers a guide for educators navigating the integration of AI-assisted learning in classrooms
[ { "created": "Tue, 13 Jun 2023 03:36:36 GMT", "version": "v1" } ]
"2023-06-21T00:00:00"
[ [ "Mollick", "Ethan", "" ], [ "Mollick", "Lilach", "" ] ]
0no_new_dataset
cs/0304023
Mirela Damian
Mirela Damian and Joseph O'Rourke
Partitioning Regular Polygons into Circular Pieces I: Convex Partitions
21 pages, 25 figures
null
null
null
cs.CG
null
We explore an instance of the question of partitioning a polygon into pieces, each of which is as ``circular'' as possible, in the sense of having an aspect ratio close to 1. The aspect ratio of a polygon is the ratio of the diameters of the smallest circumscribing circle to the largest inscribed disk. The problem is rich even for partitioning regular polygons into convex pieces, the focus of this paper. We show that the optimal (most circular) partition for an equilateral triangle has an infinite number of pieces, with the lower bound approachable to any accuracy desired by a particular finite partition. For pentagons and all regular k-gons, k > 5, the unpartitioned polygon is already optimal. The square presents an interesting intermediate case. Here the one-piece partition is not optimal, but nor is the trivial lower bound approachable. We narrow the optimal ratio to an aspect-ratio gap of 0.01082 with several somewhat intricate partitions.
[ { "created": "Thu, 17 Apr 2003 12:29:29 GMT", "version": "v1" } ]
"2007-05-23T00:00:00"
[ [ "Damian", "Mirela", "" ], [ "O'Rourke", "Joseph", "" ] ]
0no_new_dataset
1311.6236
Claudio Soriente
Claudio Soriente and Ghassan Karame and Hubert Ritzdorf and Srdjan Marinovic and Srdjan Capkun
Commune: Shared Ownership in an Agnostic Cloud
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although cloud storage platforms promise a convenient way for users to share files and engage in collaborations, they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to shared ownership. This can be a significant limitation in many collaborations because one owner can, for example, delete files and revoke access without consulting the other collaborators. In this paper, we first formally define a notion of shared ownership within a file access control model. We then propose a solution, called Commune, to the problem of distributively enforcing shared ownership in agnostic clouds, so that access grants require the support of a pre-arranged threshold of owners. Commune can be used in existing clouds without requiring any modifications to the platforms. We analyze the security of our solution and evaluate its scalability and performance by means of an implementation integrated with Amazon S3.
[ { "created": "Mon, 25 Nov 2013 08:50:12 GMT", "version": "v1" } ]
"2013-11-26T00:00:00"
[ [ "Soriente", "Claudio", "" ], [ "Karame", "Ghassan", "" ], [ "Ritzdorf", "Hubert", "" ], [ "Marinovic", "Srdjan", "" ], [ "Capkun", "Srdjan", "" ] ]
0no_new_dataset
1205.3964
Yusuf Perwej
Yusuf Perwej, Ashish Chaturvedi
Machine Recognition of Hand Written Characters using Neural Networks
4 pages, 1 Figure, ISSN:0975 - 8887
International Journal of Computer Applications (IJCA) ,January 2011 Volume 14, Number 2, Pages 6-9
10.5120/1819-2380
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even today in Twenty First Century Handwritten communication has its own stand and most of the times, in daily life it is globally using as means of communication and recording the information like to be shared with others. Challenges in handwritten characters recognition wholly lie in the variation and distortion of handwritten characters, since different people may use different style of handwriting, and direction to draw the same shape of the characters of their known script. This paper demonstrates the nature of handwritten characters, conversion of handwritten data into electronic data, and the neural network approach to make machine capable of recognizing hand written characters.
[ { "created": "Thu, 17 May 2012 15:50:08 GMT", "version": "v1" } ]
"2012-05-18T00:00:00"
[ [ "Perwej", "Yusuf", "" ], [ "Chaturvedi", "Ashish", "" ] ]
0no_new_dataset
2308.10585
Dingzirui Wang
Dingzirui Wang, Longxu Dou, Wenbin Zhang, Junyu Zeng, Wanxiang Che
Exploring Equation as a Better Intermediate Meaning Representation for Numerical Reasoning
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-nd/4.0/
Numerical reasoning is vital for natural language processing models to understand and process numerical information in real-world scenarios. Most current methods first generate the Intermediate Meaning Representations (IMRs) of questions and then generate answers. Current SOTA methods generate programs as IMRs with large language models (LLMs). Intuitively, equations have fewer restrictions and closer semantics to the question than programs, leading to higher generation accuracy. However, current LLMs generate equations worse than programs, where we assume that the equation data is rare in pre-training data compared to programs. So in this paper, we try to use equations as IMRs to solve the numerical reasoning task by addressing two problems: (1) Theoretically, how to prove that the equation is an IMR with higher generation accuracy than programs; (2) Empirically, how to improve the generation accuracy of equations with LLMs. For the first problem, we propose and prove a proposition to theoretically compare the generation accuracy of different IMRs. For the second problem, we present a method called Boosting Numerical Reason\textbfing by Decomposing the Generation of Equations (Bridge), which can improve the accuracy of LLMs in generating equations as IMRs by reducing the tendency of generating constant expressions and programs. Our method improves the performance by 2.2%, 0.9%, and 1.7% on GSM8K, SVAMP, and Algebra datasets compared to the previous state-of-the-art methods under the single reasoning path setting. Our codes and prompts are released in https://github.com/zirui-HIT/Bridge_for_Numerical_Reasoning.
[ { "created": "Mon, 21 Aug 2023 09:35:33 GMT", "version": "v1" } ]
"2023-08-22T00:00:00"
[ [ "Wang", "Dingzirui", "" ], [ "Dou", "Longxu", "" ], [ "Zhang", "Wenbin", "" ], [ "Zeng", "Junyu", "" ], [ "Che", "Wanxiang", "" ] ]
0no_new_dataset
2208.01588
Vivek Kumar Singh Ph.D.
Anurag Kanaujia, Prashasti Singh, Abhirup Nandy, Vivek Kumar Singh
Research Contribution of major Centrally Funded Institution Systems of India
null
null
null
null
cs.DL
http://creativecommons.org/licenses/by/4.0/
India is now among the major knowledge producers of the world, ranking among the top 5 countries in total research output, as per some recent reports. The institutional setup for Research & Development (R&D) in India comprises a diverse set of Institutions, including Universities, government departments, research laboratories, and private sector institutions etc. It may be noted that more than 45% share of India's Gross Expenditure on Research and Development (GERD) comes from the central government. In this context, this article attempts to explore the quantum of research contribution of centrally funded institutions and institution systems of India. The volume, proportionate share and growth patterns of research publications from the major centrally funded institutions, organised in 16 groups, is analysed. These institutions taken together account for 67.54% of Indian research output during 2001 to 2020. The research output of the centrally funded institutions in India has increased steadily since 2001 with a good value for CAGR. The paper presents noteworthy insights about scientific research production of India that may be useful to policymakers, researchers and science practitioners in India. It presents a case for increased activity by the state governments and private sector to further the cause of sustainable and inclusive research and development in the country.
[ { "created": "Tue, 2 Aug 2022 16:52:56 GMT", "version": "v1" } ]
"2022-08-03T00:00:00"
[ [ "Kanaujia", "Anurag", "" ], [ "Singh", "Prashasti", "" ], [ "Nandy", "Abhirup", "" ], [ "Singh", "Vivek Kumar", "" ] ]
0no_new_dataset
2310.18615
Xiangchen Song
Xiangchen Song, Weiran Yao, Yewen Fan, Xinshuai Dong, Guangyi Chen, Juan Carlos Niebles, Eric Xing, Kun Zhang
Temporally Disentangled Representation Learning under Unknown Nonstationarity
NeurIPS 2023
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
In unsupervised causal representation learning for sequential data with time-delayed latent causal influences, strong identifiability results for the disentanglement of causally-related latent variables have been established in stationary settings by leveraging temporal structure. However, in nonstationary setting, existing work only partially addressed the problem by either utilizing observed auxiliary variables (e.g., class labels and/or domain indexes) as side information or assuming simplified latent causal dynamics. Both constrain the method to a limited range of scenarios. In this study, we further explored the Markov Assumption under time-delayed causally related process in nonstationary setting and showed that under mild conditions, the independent latent components can be recovered from their nonlinear mixture up to a permutation and a component-wise transformation, without the observation of auxiliary variables. We then introduce NCTRL, a principled estimation framework, to reconstruct time-delayed latent causal variables and identify their relations from measured sequential data only. Empirical evaluations demonstrated the reliable identification of time-delayed latent causal influences, with our methodology substantially outperforming existing baselines that fail to exploit the nonstationarity adequately and then, consequently, cannot distinguish distribution shifts.
[ { "created": "Sat, 28 Oct 2023 06:46:03 GMT", "version": "v1" } ]
"2023-10-31T00:00:00"
[ [ "Song", "Xiangchen", "" ], [ "Yao", "Weiran", "" ], [ "Fan", "Yewen", "" ], [ "Dong", "Xinshuai", "" ], [ "Chen", "Guangyi", "" ], [ "Niebles", "Juan Carlos", "" ], [ "Xing", "Eric", "" ], [ "Zhang", "Kun", "" ] ]
0no_new_dataset
2301.03416
Jiaxiang Liu
Weixin Liu, Xuyi Chen, Jiaxiang Liu, Shikun Feng, Yu Sun, Hao Tian, Hua Wu
ERNIE 3.0 Tiny: Frustratingly Simple Method to Improve Task-Agnostic Distillation Generalization
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Task-agnostic knowledge distillation attempts to address the problem of deploying large pretrained language model in resource-constrained scenarios by compressing a large pretrained model called teacher into a smaller one called student such that the student can be directly finetuned on downstream tasks and retains comparable performance. However, we empirically find that there is a generalization gap between the student and the teacher in existing methods. In this work, we show that we can leverage multi-task learning in task-agnostic distillation to advance the generalization of the resulted student. In particular, we propose Multi-task Infused Task-agnostic Knowledge Distillation (MITKD). We first enhance the teacher by multi-task training it on multiple downstream tasks and then perform distillation to produce the student. Experimental results demonstrate that our method yields a student with much better generalization, significantly outperforms existing baselines, and establishes a new state-of-the-art result on in-domain, out-domain, and low-resource datasets in the setting of task-agnostic distillation. Moreover, our method even exceeds an 8x larger BERT$_{\text{Base}}$ on SQuAD and four GLUE tasks. In addition, by combining ERNIE 3.0, our method achieves state-of-the-art results on 10 Chinese datasets.
[ { "created": "Mon, 9 Jan 2023 15:12:50 GMT", "version": "v1" } ]
"2023-01-10T00:00:00"
[ [ "Liu", "Weixin", "" ], [ "Chen", "Xuyi", "" ], [ "Liu", "Jiaxiang", "" ], [ "Feng", "Shikun", "" ], [ "Sun", "Yu", "" ], [ "Tian", "Hao", "" ], [ "Wu", "Hua", "" ] ]
0no_new_dataset
2309.11935
Maxime Vaidis
Maxime Vaidis, Mohsen Hassanzadeh Shahraji, Effie Daum, William Dubois, Philippe Gigu\`ere, and Fran\c{c}ois Pomerleau
RTS-GT: Robotic Total Stations Ground Truthing dataset
7 pages; Accepted to ICRA 2024
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Numerous datasets and benchmarks exist to assess and compare Simultaneous Localization and Mapping (SLAM) algorithms. Nevertheless, their precision must follow the rate at which SLAM algorithms improved in recent years. Moreover, current datasets fall short of comprehensive data-collection protocol for reproducibility and the evaluation of the precision or accuracy of the recorded trajectories. With this objective in mind, we proposed the Robotic Total Stations Ground Truthing dataset (RTS-GT) dataset to support localization research with the generation of six-Degrees Of Freedom (DOF) ground truth trajectories. This novel dataset includes six-DOF ground truth trajectories generated using a system of three Robotic Total Stations (RTSs) tracking moving robotic platforms. Furthermore, we compare the performance of the RTS-based system to a Global Navigation Satellite System (GNSS)-based setup. The dataset comprises around sixty experiments conducted in various conditions over a period of 17 months, and encompasses over 49 kilometers of trajectories, making it the most extensive dataset of RTS-based measurements to date. Additionally, we provide the precision of all poses for each experiment, a feature not found in the current state-of-the-art datasets. Our results demonstrate that RTSs provide measurements that are 22 times more stable than GNSS in various environmental settings, making them a valuable resource for SLAM benchmark development.
[ { "created": "Thu, 21 Sep 2023 09:47:55 GMT", "version": "v1" }, { "created": "Wed, 13 Mar 2024 00:44:02 GMT", "version": "v2" } ]
"2024-03-14T00:00:00"
[ [ "Vaidis", "Maxime", "" ], [ "Shahraji", "Mohsen Hassanzadeh", "" ], [ "Daum", "Effie", "" ], [ "Dubois", "William", "" ], [ "Giguère", "Philippe", "" ], [ "Pomerleau", "François", "" ] ]
1new_dataset
1904.09302
Kyoungseok Han
Kyoungseok Han, Giseo Park, Gokul S. Sankar, Kanghyun Nam, and Seibum B. Choi
Model Predictive Control Framework for Improving Vehicle Cornering Performance Using Handling Characteristics
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new control strategy to improve vehicle cornering performance in a model predictive control framework. The most distinguishing feature of the proposed method is that the natural handling characteristics of the production vehicle is exploited to reduce the complexity of the conventional control methods. For safety s sake, most production vehicles are built to exhibit an understeer handling characteristics to some extent. By monitoring how much the vehicle is biased into the understeer state, the controller attempts to adjust this amount in a way that improves the vehicle cornering performance. With this particular strategy, an innovative controller can be designed without road friction information, which complicates the conventional control methods. In addition, unlike the conventional controllers, the reference yaw rate that is highly dependent on road friction need not be defined due to the proposed control structure. The optimal control problem is formulated in a model predictive control framework to handle the constraints efficiently, and simulations in various test scenarios illustrate the effectiveness of the proposed approach.
[ { "created": "Fri, 19 Apr 2019 18:00:50 GMT", "version": "v1" }, { "created": "Thu, 14 Nov 2019 22:30:07 GMT", "version": "v2" } ]
"2019-11-18T00:00:00"
[ [ "Han", "Kyoungseok", "" ], [ "Park", "Giseo", "" ], [ "Sankar", "Gokul S.", "" ], [ "Nam", "Kanghyun", "" ], [ "Choi", "Seibum B.", "" ] ]
0no_new_dataset
2401.03547
Hiromitsu Nishizaki
Takashi Minato, Ryuichiro Higashinaka, Kurima Sakai, Tomo Funayama, Hiromitsu Nishizaki, Takayuki Naga
Overview of Dialogue Robot Competition 2023
Proceedings of Dialogue Robot Competition 2023. arXiv admin note: text overlap with arXiv:2210.12863
null
null
null
cs.RO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have held dialogue robot competitions in 2020 and 2022 to compare the performances of interactive robots using an android that closely resembles a human. In 2023, the third competition DRC2023 was held. The task of DRC2023 was designed to be more challenging than the previous travel agent dialogue tasks. Since anyone can now develop a dialogue system using LLMs, the participating teams are required to develop a system that effectively uses information about the situation on the spot (real-time information), which is not handled by ChatGPT and other systems. DRC2023 has two rounds, a preliminary round and the final round as well as the previous competitions. The preliminary round has held on Oct.27 -- Nov.20, 2023 at real travel agency stores. The final round will be held on December 23, 2023. This paper provides an overview of the task settings and evaluation method of DRC2023 and the preliminary round results.
[ { "created": "Sun, 7 Jan 2024 17:18:26 GMT", "version": "v1" } ]
"2024-01-09T00:00:00"
[ [ "Minato", "Takashi", "" ], [ "Higashinaka", "Ryuichiro", "" ], [ "Sakai", "Kurima", "" ], [ "Funayama", "Tomo", "" ], [ "Nishizaki", "Hiromitsu", "" ], [ "Naga", "Takayuki", "" ] ]
0no_new_dataset
1710.10979
Petr Golovach
Petr A. Golovach, Pinar Heggernes, Paloma Lima, and Pedro Montealegre
Finding Connected Secluded Subgraphs
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Problems related to finding induced subgraphs satisfying given properties form one of the most studied areas within graph algorithms. Such problems have given rise to breakthrough results and led to development of new techniques both within the traditional P vs NP dichotomy and within parameterized complexity. The \Pi-Subgraph problem asks whether an input graph contains an induced subgraph on at least k vertices satisfying graph property \Pi. For many applications, it is desirable that the found subgraph has as few connections to the rest of the graph as possible, which gives rise to the Secluded \Pi-Subgraph problem. Here, input k is the size of the desired subgraph, and input t is a limit on the number of neighbors this subgraph has in the rest of the graph. This problem has been studied from a parameterized perspective, and unfortunately it turns out to be W[1]-hard for many graph properties \Pi, even when parameterized by k+t. We show that the situation changes when we are looking for a connected induced subgraph satisfying \Pi. In particular, we show that the Connected \Pi-Secluded Subgraph problem is FPT when parameterized by just t for many important graph properties \Pi.
[ { "created": "Mon, 30 Oct 2017 14:34:45 GMT", "version": "v1" } ]
"2017-10-31T00:00:00"
[ [ "Golovach", "Petr A.", "" ], [ "Heggernes", "Pinar", "" ], [ "Lima", "Paloma", "" ], [ "Montealegre", "Pedro", "" ] ]
0no_new_dataset
1601.01343
Ikuya Yamada
Ikuya Yamada, Hiroyuki Shindo, Hideaki Takeda, Yoshiyasu Takefuji
Joint Learning of the Embedding of Words and Entities for Named Entity Disambiguation
Accepted at CoNLL 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Named Entity Disambiguation (NED) refers to the task of resolving multiple named entity mentions in a document to their correct references in a knowledge base (KB) (e.g., Wikipedia). In this paper, we propose a novel embedding method specifically designed for NED. The proposed method jointly maps words and entities into the same continuous vector space. We extend the skip-gram model by using two models. The KB graph model learns the relatedness of entities using the link structure of the KB, whereas the anchor context model aims to align vectors such that similar words and entities occur close to one another in the vector space by leveraging KB anchors and their context words. By combining contexts based on the proposed embedding with standard NED features, we achieved state-of-the-art accuracy of 93.1% on the standard CoNLL dataset and 85.2% on the TAC 2010 dataset.
[ { "created": "Wed, 6 Jan 2016 22:19:20 GMT", "version": "v1" }, { "created": "Sat, 19 Mar 2016 07:31:47 GMT", "version": "v2" }, { "created": "Sun, 1 May 2016 06:39:19 GMT", "version": "v3" }, { "created": "Fri, 10 Jun 2016 01:51:26 GMT", "version": "v4" } ]
"2016-06-13T00:00:00"
[ [ "Yamada", "Ikuya", "" ], [ "Shindo", "Hiroyuki", "" ], [ "Takeda", "Hideaki", "" ], [ "Takefuji", "Yoshiyasu", "" ] ]
0no_new_dataset
2105.07949
Abhijit Suresh
Abhijit Suresh, Jennifer Jacobs, Vivian Lai, Chenhao Tan, Wayne Ward, James H. Martin, Tamara Sumner
Using Transformers to Provide Teachers with Personalized Feedback on their Classroom Discourse: The TalkMoves Application
Presented at the AAAI 2021 Spring Symposium on Artificial Intelligence for K-12 Education
null
null
null
cs.CY cs.CL
http://creativecommons.org/licenses/by/4.0/
TalkMoves is an innovative application designed to support K-12 mathematics teachers to reflect on, and continuously improve their instructional practices. This application combines state-of-the-art natural language processing capabilities with automated speech recognition to automatically analyze classroom recordings and provide teachers with personalized feedback on their use of specific types of discourse aimed at broadening and deepening classroom conversations about mathematics. These specific discourse strategies are referred to as "talk moves" within the mathematics education community and prior research has documented the ways in which systematic use of these discourse strategies can positively impact student engagement and learning. In this article, we describe the TalkMoves application's cloud-based infrastructure for managing and processing classroom recordings, and its interface for providing teachers with feedback on their use of talk moves during individual teaching episodes. We present the series of model architectures we developed, and the studies we conducted, to develop our best-performing, transformer-based model (F1 = 79.3%). We also discuss several technical challenges that need to be addressed when working with real-world speech and language data from noisy K-12 classrooms.
[ { "created": "Thu, 29 Apr 2021 20:45:02 GMT", "version": "v1" } ]
"2021-05-18T00:00:00"
[ [ "Suresh", "Abhijit", "" ], [ "Jacobs", "Jennifer", "" ], [ "Lai", "Vivian", "" ], [ "Tan", "Chenhao", "" ], [ "Ward", "Wayne", "" ], [ "Martin", "James H.", "" ], [ "Sumner", "Tamara", "" ] ]
0no_new_dataset
2008.04872
Xingyu Chen
Xingyu Chen, Xuguang Lan, Fuchun Sun, Nanning Zheng
A Boundary Based Out-of-Distribution Classifier for Generalized Zero-Shot Learning
We found that the results in the first version are incorrect, due to the data leak problem in the original dataset splits. In this version, we fix this problem in the experiments
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generalized Zero-Shot Learning (GZSL) is a challenging topic that has promising prospects in many realistic scenarios. Using a gating mechanism that discriminates the unseen samples from the seen samples can decompose the GZSL problem to a conventional Zero-Shot Learning (ZSL) problem and a supervised classification problem. However, training the gate is usually challenging due to the lack of data in the unseen domain. To resolve this problem, in this paper, we propose a boundary based Out-of-Distribution (OOD) classifier which classifies the unseen and seen domains by only using seen samples for training. First, we learn a shared latent space on a unit hyper-sphere where the latent distributions of visual features and semantic attributes are aligned class-wisely. Then we find the boundary and the center of the manifold for each class. By leveraging the class centers and boundaries, the unseen samples can be separated from the seen samples. After that, we use two experts to classify the seen and unseen samples separately. We extensively validate our approach on five popular benchmark datasets including AWA1, AWA2, CUB, FLO and SUN. The experimental results demonstrate the advantages of our approach over state-of-the-art methods.
[ { "created": "Sun, 9 Aug 2020 11:27:19 GMT", "version": "v1" }, { "created": "Mon, 3 Jan 2022 09:00:51 GMT", "version": "v2" } ]
"2022-01-04T00:00:00"
[ [ "Chen", "Xingyu", "" ], [ "Lan", "Xuguang", "" ], [ "Sun", "Fuchun", "" ], [ "Zheng", "Nanning", "" ] ]
0no_new_dataset
1711.00309
Jingyi Zhang
Jingyi Zhang, Masao Utiyama, Eiichro Sumita, Graham Neubig, Satoshi Nakamura
Improving Neural Machine Translation through Phrase-based Forced Decoding
IJCNLP2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compared to traditional statistical machine translation (SMT), neural machine translation (NMT) often sacrifices adequacy for the sake of fluency. We propose a method to combine the advantages of traditional SMT and NMT by exploiting an existing phrase-based SMT model to compute the phrase-based decoding cost for an NMT output and then using this cost to rerank the n-best NMT outputs. The main challenge in implementing this approach is that NMT outputs may not be in the search space of the standard phrase-based decoding algorithm, because the search space of phrase-based SMT is limited by the phrase-based translation rule table. We propose a soft forced decoding algorithm, which can always successfully find a decoding path for any NMT output. We show that using the forced decoding cost to rerank the NMT outputs can successfully improve translation quality on four different language pairs.
[ { "created": "Wed, 1 Nov 2017 12:25:20 GMT", "version": "v1" } ]
"2017-11-02T00:00:00"
[ [ "Zhang", "Jingyi", "" ], [ "Utiyama", "Masao", "" ], [ "Sumita", "Eiichro", "" ], [ "Neubig", "Graham", "" ], [ "Nakamura", "Satoshi", "" ] ]
0no_new_dataset
2108.06001
Supun Kamburugamuve
Vibhatha Abeykoon, Supun Kamburugamuve, Chathura Widanage, Niranda Perera, Ahmet Uyar, Thejaka Amila Kanewala, Gregor von Laszewski, and Geoffrey Fox
HPTMT Parallel Operators for High Performance Data Science & Data Engineering
null
null
null
null
cs.DC cs.AI
http://creativecommons.org/licenses/by/4.0/
Data-intensive applications are becoming commonplace in all science disciplines. They are comprised of a rich set of sub-domains such as data engineering, deep learning, and machine learning. These applications are built around efficient data abstractions and operators that suit the applications of different domains. Often lack of a clear definition of data structures and operators in the field has led to other implementations that do not work well together. The HPTMT architecture that we proposed recently, identifies a set of data structures, operators, and an execution model for creating rich data applications that links all aspects of data engineering and data science together efficiently. This paper elaborates and illustrates this architecture using an end-to-end application with deep learning and data engineering parts working together.
[ { "created": "Fri, 13 Aug 2021 00:05:43 GMT", "version": "v1" } ]
"2021-08-16T00:00:00"
[ [ "Abeykoon", "Vibhatha", "" ], [ "Kamburugamuve", "Supun", "" ], [ "Widanage", "Chathura", "" ], [ "Perera", "Niranda", "" ], [ "Uyar", "Ahmet", "" ], [ "Kanewala", "Thejaka Amila", "" ], [ "von Laszewski", "Gregor", "" ], [ "Fox", "Geoffrey", "" ] ]
1new_dataset
2406.11572
Yu Chen
Yu Chen, Yilin Cai, Jinyun Xu, Zhongqiang Ren, Guanya Shi, Howie Choset
Propagative Distance Optimization for Constrained Inverse Kinematics
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates a constrained inverse kinematic (IK) problem that seeks a feasible configuration of an articulated robot under various constraints such as joint limits and obstacle collision avoidance. Due to the high-dimensionality and complex constraints, this problem is often solved numerically via iterative local optimization. Classic local optimization methods take joint angles as the decision variable, which suffers from non-linearity caused by the trigonometric constraints. Recently, distance-based IK methods have been developed as an alternative approach that formulates IK as an optimization over the distances among points attached to the robot and the obstacles. Although distance-based methods have demonstrated unique advantages, they still suffer from low computational efficiency, since these approaches usually ignore the chain structure in the kinematics of serial robots. This paper proposes a new method called propagative distance optimization for constrained inverse kinematics (PDO-IK), which captures and leverages the chain structure in the distance-based formulation and expedites the optimization by computing forward kinematics and the Jacobian propagatively along the kinematic chain. Test results show that PDO-IK runs up to two orders of magnitude faster than the existing distance-based methods under joint limits constraints and obstacle avoidance constraints. It also achieves up to three times higher success rates than the conventional joint-angle-based optimization methods for IK problems. The high runtime efficiency of PDO-IK allows the real-time computation (10$-$1500 Hz) and enables a simulated humanoid robot with 19 degrees of freedom (DoFs) to avoid moving obstacles, which is otherwise hard to achieve with the baselines.
[ { "created": "Mon, 17 Jun 2024 14:07:43 GMT", "version": "v1" } ]
"2024-06-18T00:00:00"
[ [ "Chen", "Yu", "" ], [ "Cai", "Yilin", "" ], [ "Xu", "Jinyun", "" ], [ "Ren", "Zhongqiang", "" ], [ "Shi", "Guanya", "" ], [ "Choset", "Howie", "" ] ]
0no_new_dataset
1309.5105
Aleksandar Haber
Aleksandar Haber and Michel Verhaegen
Subspace identification of large-scale interconnected systems
revised version, conditionally accepted for publication in IEEE Transaction on Automatic Control
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a decentralized subspace algorithm for identification of large-scale, interconnected systems that are described by sparse (multi) banded state-space matrices. First, we prove that the state of a local subsystem can be approximated by a linear combination of inputs and outputs of the local subsystems that are in its neighborhood. Furthermore, we prove that for interconnected systems with well-conditioned, finite-time observability Gramians (or observability matrices), the size of this neighborhood is relatively small. On the basis of these results, we develop a subspace identification algorithm that identifies a state-space model of a local subsystem from the local input-output data. Consequently, the developed algorithm is computationally feasible for interconnected systems with a large number of local subsystems. Numerical results confirm the effectiveness of the new identification algorithm.
[ { "created": "Thu, 19 Sep 2013 21:32:10 GMT", "version": "v1" }, { "created": "Thu, 2 Jan 2014 15:19:07 GMT", "version": "v2" }, { "created": "Fri, 14 Feb 2014 17:41:59 GMT", "version": "v3" } ]
"2014-02-17T00:00:00"
[ [ "Haber", "Aleksandar", "" ], [ "Verhaegen", "Michel", "" ] ]
0no_new_dataset
1609.04373
Aiman Soliman
Aiman Soliman, Kiumars Soltani, Anand Padmanabhan, Shaowen Wang
Consistency of Social Sensing Signatures Across Major US Cities
CyberGIS16
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous studies have shown that Twitter users have biases to tweet from certain locations, locational bias, and during certain hours, temporal bias. We used three years of geolocated Twitter Data to quantify these biases and test our central hypothesis that Twitter users biases are consistent across US cities. Our results suggest that temporal and locational bias of Twitter users are inconsistent between three US metropolitan cities. We derive conclusions about the role of the complexity of the underlying data producing process on its consistency and argue for the potential research avenue for Geospatial Data Science to test and quantify these inconsistencies in the class of organically evolved Big Data.
[ { "created": "Wed, 14 Sep 2016 18:41:23 GMT", "version": "v1" } ]
"2016-09-15T00:00:00"
[ [ "Soliman", "Aiman", "" ], [ "Soltani", "Kiumars", "" ], [ "Padmanabhan", "Anand", "" ], [ "Wang", "Shaowen", "" ] ]
0no_new_dataset
2308.07931
Ge Yang
William Shen, Ge Yang, Alan Yu, Jansen Wong, Leslie Pack Kaelbling, Phillip Isola
Distilled Feature Fields Enable Few-Shot Language-Guided Manipulation
Project website at https://f3rm.csail.mit.edu, Accepted at the 7th Annual Conference on Robot Learning (CoRL), 2023 in Atlanta, US
null
null
null
cs.CV cs.AI cs.CL cs.LG cs.RO
http://creativecommons.org/licenses/by/4.0/
Self-supervised and language-supervised image models contain rich knowledge of the world that is important for generalization. Many robotic tasks, however, require a detailed understanding of 3D geometry, which is often lacking in 2D image features. This work bridges this 2D-to-3D gap for robotic manipulation by leveraging distilled feature fields to combine accurate 3D geometry with rich semantics from 2D foundation models. We present a few-shot learning method for 6-DOF grasping and placing that harnesses these strong spatial and semantic priors to achieve in-the-wild generalization to unseen objects. Using features distilled from a vision-language model, CLIP, we present a way to designate novel objects for manipulation via free-text natural language, and demonstrate its ability to generalize to unseen expressions and novel categories of objects.
[ { "created": "Thu, 27 Jul 2023 17:59:14 GMT", "version": "v1" }, { "created": "Sat, 30 Dec 2023 01:10:41 GMT", "version": "v2" } ]
"2024-01-02T00:00:00"
[ [ "Shen", "William", "" ], [ "Yang", "Ge", "" ], [ "Yu", "Alan", "" ], [ "Wong", "Jansen", "" ], [ "Kaelbling", "Leslie Pack", "" ], [ "Isola", "Phillip", "" ] ]
0no_new_dataset
2106.09350
Yuhao Wang
Yuhao Wang, Arnab Bhattacharyya
Identifiability of AMP chain graph models
16 pages, 4 figures
null
null
null
cs.DS stat.ML
http://creativecommons.org/licenses/by/4.0/
We study identifiability of Andersson-Madigan-Perlman (AMP) chain graph models, which are a common generalization of linear structural equation models and Gaussian graphical models. AMP models are described by DAGs on chain components which themselves are undirected graphs. For a known chain component decomposition, we show that the DAG on the chain components is identifiable if the determinants of the residual covariance matrices of the chain components are monotone non-decreasing in topological order. This condition extends the equal variance identifiability criterion for Bayes nets, and it can be generalized from determinants to any super-additive function on positive semidefinite matrices. When the component decomposition is unknown, we describe conditions that allow recovery of the full structure using a polynomial time algorithm based on submodular function minimization. We also conduct experiments comparing our algorithm's performance against existing baselines.
[ { "created": "Thu, 17 Jun 2021 10:09:30 GMT", "version": "v1" } ]
"2021-06-18T00:00:00"
[ [ "Wang", "Yuhao", "" ], [ "Bhattacharyya", "Arnab", "" ] ]
0no_new_dataset
2307.15339
Sumati Thareja
Le Gong, Shiying Li, Naqib Sad Pathan, Mohammad Shifat-E-Rabbi, Gustavo K. Rohde, Abu Hasnat Mohammad Rubaiyat and Sumati Thareja
The Radon Signed Cumulative Distribution Transform and its applications in classification of Signed Images
null
null
null
null
cs.IT cs.CV cs.LG math.IT
http://creativecommons.org/licenses/by/4.0/
Here we describe a new image representation technique based on the mathematics of transport and optimal transport. The method relies on the combination of the well-known Radon transform for images and a recent signal representation method called the Signed Cumulative Distribution Transform. The newly proposed method generalizes previous transport-related image representation methods to arbitrary functions (images), and thus can be used in more applications. We describe the new transform, and some of its mathematical properties and demonstrate its ability to partition image classes with real and simulated data. In comparison to existing transport transform methods, as well as deep learning-based classification methods, the new transform more accurately represents the information content of signed images, and thus can be used to obtain higher classification accuracies. The implementation of the proposed method in Python language is integrated as a part of the software package PyTransKit, available on Github.
[ { "created": "Fri, 28 Jul 2023 06:32:33 GMT", "version": "v1" } ]
"2023-07-31T00:00:00"
[ [ "Gong", "Le", "" ], [ "Li", "Shiying", "" ], [ "Pathan", "Naqib Sad", "" ], [ "Shifat-E-Rabbi", "Mohammad", "" ], [ "Rohde", "Gustavo K.", "" ], [ "Rubaiyat", "Abu Hasnat Mohammad", "" ], [ "Thareja", "Sumati", "" ] ]
1new_dataset
2405.06219
Haojie Duanmu
Haojie Duanmu, Zhihang Yuan, Xiuhong Li, Jiangfei Duan, Xingcheng Zhang, Dahua Lin
SKVQ: Sliding-window Key and Value Cache Quantization for Large Language Models
null
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large language models (LLMs) can now handle longer sequences of tokens, enabling complex tasks like book understanding and generating lengthy novels. However, the key-value (KV) cache required for LLMs consumes substantial memory as context length increasing, becoming the bottleneck for deployment. In this paper, we present a strategy called SKVQ, which stands for sliding-window KV cache quantization, to address the issue of extremely low bitwidth KV cache quantization. To achieve this, SKVQ rearranges the channels of the KV cache in order to improve the similarity of channels in quantization groups, and applies clipped dynamic quantization at the group level. Additionally, SKVQ ensures that the most recent window tokens in the KV cache are preserved with high precision. This helps maintain the accuracy of a small but important portion of the KV cache.SKVQ achieves high compression ratios while maintaining accuracy. Our evaluation on LLMs demonstrates that SKVQ surpasses previous quantization approaches, allowing for quantization of the KV cache to 2-bit keys and 1.5-bit values with minimal loss of accuracy. With SKVQ, it is possible to process context lengths of up to 1M on an 80GB memory GPU for a 7b model and up to 7 times faster decoding.
[ { "created": "Fri, 10 May 2024 03:06:24 GMT", "version": "v1" }, { "created": "Mon, 13 May 2024 14:39:11 GMT", "version": "v2" } ]
"2024-05-14T00:00:00"
[ [ "Duanmu", "Haojie", "" ], [ "Yuan", "Zhihang", "" ], [ "Li", "Xiuhong", "" ], [ "Duan", "Jiangfei", "" ], [ "Zhang", "Xingcheng", "" ], [ "Lin", "Dahua", "" ] ]
0no_new_dataset
2209.07216
Daniel Loureiro
Daniel Loureiro, Aminette D'Souza, Areej Nasser Muhajab, Isabella A. White, Gabriel Wong, Luis Espinosa Anke, Leonardo Neves, Francesco Barbieri, Jose Camacho-Collados
TempoWiC: An Evaluation Benchmark for Detecting Meaning Shift in Social Media
Accepted to COLING 2022. Used to create the TempoWiC Shared Task for EvoNLP
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language evolves over time, and word meaning changes accordingly. This is especially true in social media, since its dynamic nature leads to faster semantic shifts, making it challenging for NLP models to deal with new content and trends. However, the number of datasets and models that specifically address the dynamic nature of these social platforms is scarce. To bridge this gap, we present TempoWiC, a new benchmark especially aimed at accelerating research in social media-based meaning shift. Our results show that TempoWiC is a challenging benchmark, even for recently-released language models specialized in social media.
[ { "created": "Thu, 15 Sep 2022 11:17:56 GMT", "version": "v1" }, { "created": "Fri, 16 Sep 2022 16:54:46 GMT", "version": "v2" } ]
"2022-09-19T00:00:00"
[ [ "Loureiro", "Daniel", "" ], [ "D'Souza", "Aminette", "" ], [ "Muhajab", "Areej Nasser", "" ], [ "White", "Isabella A.", "" ], [ "Wong", "Gabriel", "" ], [ "Anke", "Luis Espinosa", "" ], [ "Neves", "Leonardo", "" ], [ "Barbieri", "Francesco", "" ], [ "Camacho-Collados", "Jose", "" ] ]
1new_dataset
2303.14679
Yongqi An
Yongqi An, Xu Zhao, Tao Yu, Haiyun Guo, Chaoyang Zhao, Ming Tang, Jinqiao Wang
ZBS: Zero-shot Background Subtraction via Instance-level Background Modeling and Foreground Selection
Accepted by CVPR 2023. Code is available at https://github.com/CASIA-IVA-Lab/ZBS
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background subtraction (BGS) aims to extract all moving objects in the video frames to obtain binary foreground segmentation masks. Deep learning has been widely used in this field. Compared with supervised-based BGS methods, unsupervised methods have better generalization. However, previous unsupervised deep learning BGS algorithms perform poorly in sophisticated scenarios such as shadows or night lights, and they cannot detect objects outside the pre-defined categories. In this work, we propose an unsupervised BGS algorithm based on zero-shot object detection called Zero-shot Background Subtraction (ZBS). The proposed method fully utilizes the advantages of zero-shot object detection to build the open-vocabulary instance-level background model. Based on it, the foreground can be effectively extracted by comparing the detection results of new frames with the background model. ZBS performs well for sophisticated scenarios, and it has rich and extensible categories. Furthermore, our method can easily generalize to other tasks, such as abandoned object detection in unseen environments. We experimentally show that ZBS surpasses state-of-the-art unsupervised BGS methods by 4.70% F-Measure on the CDnet 2014 dataset. The code is released at https://github.com/CASIA-IVA-Lab/ZBS.
[ { "created": "Sun, 26 Mar 2023 10:59:03 GMT", "version": "v1" } ]
"2023-03-28T00:00:00"
[ [ "An", "Yongqi", "" ], [ "Zhao", "Xu", "" ], [ "Yu", "Tao", "" ], [ "Guo", "Haiyun", "" ], [ "Zhao", "Chaoyang", "" ], [ "Tang", "Ming", "" ], [ "Wang", "Jinqiao", "" ] ]
1new_dataset
2007.10720
Longbing Cao
Chengzhang Zhu, Longbing Cao, and Jianping Yin
Unsupervised Heterogeneous Coupling Learning for Categorical Representation
null
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020
10.1109/TPAMI.2020.3010953
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex categorical data is often hierarchically coupled with heterogeneous relationships between attributes and attribute values and the couplings between objects. Such value-to-object couplings are heterogeneous with complementary and inconsistent interactions and distributions. Limited research exists on unlabeled categorical data representations, ignores the heterogeneous and hierarchical couplings, underestimates data characteristics and complexities, and overuses redundant information, etc. The deep representation learning of unlabeled categorical data is challenging, overseeing such value-to-object couplings, complementarity and inconsistency, and requiring large data, disentanglement, and high computational power. This work introduces a shallow but powerful UNsupervised heTerogeneous couplIng lEarning (UNTIE) approach for representing coupled categorical data by untying the interactions between couplings and revealing heterogeneous distributions embedded in each type of couplings. UNTIE is efficiently optimized w.r.t. a kernel k-means objective function for unsupervised representation learning of heterogeneous and hierarchical value-to-object couplings. Theoretical analysis shows that UNTIE can represent categorical data with maximal separability while effectively represent heterogeneous couplings and disclose their roles in categorical data. The UNTIE-learned representations make significant performance improvement against the state-of-the-art categorical representations and deep representation models on 25 categorical data sets with diversified characteristics.
[ { "created": "Tue, 21 Jul 2020 11:23:27 GMT", "version": "v1" } ]
"2020-07-28T00:00:00"
[ [ "Zhu", "Chengzhang", "" ], [ "Cao", "Longbing", "" ], [ "Yin", "Jianping", "" ] ]
0no_new_dataset
2210.17344
Mallikarjun Byrasandra Ramalinga Reddy
Mallikarjun BR, Ayush Tewari, Xingang Pan, Mohamed Elgharib, Christian Theobalt
gCoRF: Generative Compositional Radiance Fields
https://vcai.mpi-inf.mpg.de/projects/gCoRF/
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D generative models of objects enable photorealistic image synthesis with 3D control. Existing methods model the scene as a global scene representation, ignoring the compositional aspect of the scene. Compositional reasoning can enable a wide variety of editing applications, in addition to enabling generalizable 3D reasoning. In this paper, we present a compositional generative model, where each semantic part of the object is represented as an independent 3D representation learned from only in-the-wild 2D data. We start with a global generative model (GAN) and learn to decompose it into different semantic parts using supervision from 2D segmentation masks. We then learn to composite independently sampled parts in order to create coherent global scenes. Different parts can be independently sampled while keeping the rest of the object fixed. We evaluate our method on a wide variety of objects and parts and demonstrate editing applications.
[ { "created": "Mon, 31 Oct 2022 14:10:44 GMT", "version": "v1" } ]
"2022-11-01T00:00:00"
[ [ "BR", "Mallikarjun", "" ], [ "Tewari", "Ayush", "" ], [ "Pan", "Xingang", "" ], [ "Elgharib", "Mohamed", "" ], [ "Theobalt", "Christian", "" ] ]
0no_new_dataset
1806.05658
Fei Liu
Kaiqiang Song, Lin Zhao, Fei Liu
Structure-Infused Copy Mechanisms for Abstractive Summarization
13 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Seq2seq learning has produced promising results on summarization. However, in many cases, system summaries still struggle to keep the meaning of the original intact. They may miss out important words or relations that play critical roles in the syntactic structure of source sentences. In this paper, we present structure-infused copy mechanisms to facilitate copying important words and relations from the source sentence to summary sentence. The approach naturally combines source dependency structure with the copy mechanism of an abstractive sentence summarizer. Experimental results demonstrate the effectiveness of incorporating source-side syntactic information in the system, and our proposed approach compares favorably to state-of-the-art methods.
[ { "created": "Thu, 14 Jun 2018 17:31:18 GMT", "version": "v1" }, { "created": "Sun, 24 Jun 2018 01:36:22 GMT", "version": "v2" } ]
"2018-06-26T00:00:00"
[ [ "Song", "Kaiqiang", "" ], [ "Zhao", "Lin", "" ], [ "Liu", "Fei", "" ] ]
0no_new_dataset
2002.10938
Ziyuan Liu
Ziyuan Liu, Georg von Wichert
Applying Rule-Based Context Knowledge to Build Abstract Semantic Maps of Indoor Environments
arXiv admin note: text overlap with arXiv:2002.08402
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a generalizable method that systematically combines data driven MCMC samplingand inference using rule-based context knowledge for data abstraction. In particular, we demonstrate the usefulness of our method in the scenario of building abstract semantic maps for indoor environments. The product of our system is a parametric abstract model of the perceived environment that not only accurately represents the geometry of the environment but also provides valuable abstract information which benefits high-level robotic applications. Based on predefined abstract terms,such as type and relation, we define task-specific context knowledge as descriptive rules in Markov Logic Networks. The corresponding inference results are used to construct a priordistribution that aims to add reasonable constraints to the solution space of semantic maps. In addition, by applying a semantically annotated sensor model, we explicitly use context information to interpret the sensor data. Experiments on real world data show promising results and thus confirm the usefulness of our system.
[ { "created": "Fri, 21 Feb 2020 20:56:02 GMT", "version": "v1" } ]
"2020-02-26T00:00:00"
[ [ "Liu", "Ziyuan", "" ], [ "von Wichert", "Georg", "" ] ]
0no_new_dataset
2111.13539
Mohammad Mahdi Johari
Mohammad Mahdi Johari, Yann Lepoittevin, Fran\c{c}ois Fleuret
GeoNeRF: Generalizing NeRF with Geometry Priors
CVPR2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We present GeoNeRF, a generalizable photorealistic novel view synthesis method based on neural radiance fields. Our approach consists of two main stages: a geometry reasoner and a renderer. To render a novel view, the geometry reasoner first constructs cascaded cost volumes for each nearby source view. Then, using a Transformer-based attention mechanism and the cascaded cost volumes, the renderer infers geometry and appearance, and renders detailed images via classical volume rendering techniques. This architecture, in particular, allows sophisticated occlusion reasoning, gathering information from consistent source views. Moreover, our method can easily be fine-tuned on a single scene, and renders competitive results with per-scene optimized neural rendering methods with a fraction of computational cost. Experiments show that GeoNeRF outperforms state-of-the-art generalizable neural rendering models on various synthetic and real datasets. Lastly, with a slight modification to the geometry reasoner, we also propose an alternative model that adapts to RGBD images. This model directly exploits the depth information often available thanks to depth sensors. The implementation code is available at https://www.idiap.ch/paper/geonerf.
[ { "created": "Fri, 26 Nov 2021 15:15:37 GMT", "version": "v1" }, { "created": "Mon, 21 Mar 2022 10:14:15 GMT", "version": "v2" } ]
"2022-03-22T00:00:00"
[ [ "Johari", "Mohammad Mahdi", "" ], [ "Lepoittevin", "Yann", "" ], [ "Fleuret", "François", "" ] ]
0no_new_dataset