id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
unknown
authors_parsed
sequencelengths
1
76
label
class label
2 classes
1711.05216
Francesco Scarcello
Georg Gottlob, Gianlugi Greco, Francesco Scarcello
Tree Projections and Constraint Optimization Problems: Fixed-Parameter Tractability and Parallel Algorithms
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tree projections provide a unifying framework to deal with most structural decomposition methods of constraint satisfaction problems (CSPs). Within this framework, a CSP instance is decomposed into a number of sub-problems, called views, whose solutions are either already available or can be computed efficiently. The goal is to arrange portions of these views in a tree-like structure, called tree projection, which determines an efficiently solvable CSP instance equivalent to the original one. Deciding whether a tree projection exists is NP-hard. Solution methods have therefore been proposed in the literature that do not require a tree projection to be given, and that either correctly decide whether the given CSP instance is satisfiable, or return that a tree projection actually does not exist. These approaches had not been generalized so far on CSP extensions for optimization problems, where the goal is to compute a solution of maximum value/minimum cost. The paper fills the gap, by exhibiting a fixed-parameter polynomial-time algorithm that either disproves the existence of tree projections or computes an optimal solution, with the parameter being the size of the expression of the objective function to be optimized over all possible solutions (and not the size of the whole constraint formula, used in related works). Tractability results are also established for the problem of returning the best K solutions. Finally, parallel algorithms for such optimization problems are proposed and analyzed. Given that the classes of acyclic hypergraphs, hypergraphs of bounded treewidth, and hypergraphs of bounded generalized hypertree width are all covered as special cases of the tree projection framework, the results in this paper directly apply to these classes. These classes are extensively considered in the CSP setting, as well as in conjunctive database query evaluation and optimization.
[ { "created": "Tue, 14 Nov 2017 17:30:08 GMT", "version": "v1" } ]
"2017-11-15T00:00:00"
[ [ "Gottlob", "Georg", "" ], [ "Greco", "Gianlugi", "" ], [ "Scarcello", "Francesco", "" ] ]
0no_new_dataset
2309.08045
T. Anderson Keller
T. Anderson Keller, Lyle Muller, Terrence Sejnowski, Max Welling
Traveling Waves Encode the Recent Past and Enhance Sequence Learning
null
null
null
null
cs.NE cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Traveling waves of neural activity have been observed throughout the brain at a diversity of regions and scales; however, their precise computational role is still debated. One physically inspired hypothesis suggests that the cortical sheet may act like a wave-propagating system capable of invertibly storing a short-term memory of sequential stimuli through induced waves traveling across the cortical surface, and indeed many experimental results from neuroscience correlate wave activity with memory tasks. To date, however, the computational implications of this idea have remained hypothetical due to the lack of a simple recurrent neural network architecture capable of exhibiting such waves. In this work, we introduce a model to fill this gap, which we denote the Wave-RNN (wRNN), and demonstrate how such an architecture indeed efficiently encodes the recent past through a suite of synthetic memory tasks where wRNNs learn faster and reach significantly lower error than wave-free counterparts. We further explore the implications of this memory storage system on more complex sequence modeling tasks such as sequential image classification and find that wave-based models not only again outperform comparable wave-free RNNs while using significantly fewer parameters, but additionally perform comparably to more complex gated architectures such as LSTMs and GRUs.
[ { "created": "Sun, 3 Sep 2023 22:48:10 GMT", "version": "v1" }, { "created": "Fri, 15 Mar 2024 02:29:44 GMT", "version": "v2" } ]
"2024-03-18T00:00:00"
[ [ "Keller", "T. Anderson", "" ], [ "Muller", "Lyle", "" ], [ "Sejnowski", "Terrence", "" ], [ "Welling", "Max", "" ] ]
0no_new_dataset
2003.04549
Kihyun Tae
Ki Hyun Tae, Steven Euijong Whang
Slice Tuner: A Selective Data Acquisition Framework for Accurate and Fair Machine Learning Models
15 pages, 11 figures, 11 tables
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As machine learning becomes democratized in the era of Software 2.0, a serious bottleneck is acquiring enough data to ensure accurate and fair models. Recent techniques including crowdsourcing provide cost-effective ways to gather such data. However, simply acquiring data as much as possible is not necessarily an effective strategy for optimizing accuracy and fairness. For example, if an online app store has enough training data for certain slices of data (say American customers), but not for others, obtaining more American customer data will only bias the model training. Instead, we contend that one needs to selectively acquire data and propose Slice Tuner, which acquires possibly-different amounts of data per slice such that the model accuracy and fairness on all slices are optimized. This problem is different than labeling existing data (as in active learning or weak supervision) because the goal is obtaining the right amounts of new data. At its core, Slice Tuner maintains learning curves of slices that estimate the model accuracies given more data and uses convex optimization to find the best data acquisition strategy. The key challenges of estimating learning curves are that they may be inaccurate if there is not enough data, and there may be dependencies among slices where acquiring data for one slice influences the learning curves of others. We solve these issues by iteratively and efficiently updating the learning curves as more data is acquired. We evaluate Slice Tuner on real datasets using crowdsourcing for data acquisition and show that Slice Tuner significantly outperforms baselines in terms of model accuracy and fairness, even when the learning curves cannot be reliably estimated.
[ { "created": "Tue, 10 Mar 2020 06:34:21 GMT", "version": "v1" }, { "created": "Sat, 6 Feb 2021 01:26:22 GMT", "version": "v2" }, { "created": "Sat, 21 Aug 2021 12:19:45 GMT", "version": "v3" } ]
"2021-08-24T00:00:00"
[ [ "Tae", "Ki Hyun", "" ], [ "Whang", "Steven Euijong", "" ] ]
1new_dataset
2008.03729
Jongpil Lee
Jongpil Lee, Nicholas J. Bryan, Justin Salamon, Zeyu Jin, Juhan Nam
Metric Learning vs Classification for Disentangled Music Representation Learning
Accepted for publication at the 21st International Society for Music Information Retrieval Conference (ISMIR 2020)
null
null
null
cs.SD cs.IR cs.LG eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep representation learning offers a powerful paradigm for mapping input data onto an organized embedding space and is useful for many music information retrieval tasks. Two central methods for representation learning include deep metric learning and classification, both having the same goal of learning a representation that can generalize well across tasks. Along with generalization, the emerging concept of disentangled representations is also of great interest, where multiple semantic concepts (e.g., genre, mood, instrumentation) are learned jointly but remain separable in the learned representation space. In this paper we present a single representation learning framework that elucidates the relationship between metric learning, classification, and disentanglement in a holistic manner. For this, we (1) outline past work on the relationship between metric learning and classification, (2) extend this relationship to multi-label data by exploring three different learning approaches and their disentangled versions, and (3) evaluate all models on four tasks (training time, similarity retrieval, auto-tagging, and triplet prediction). We find that classification-based models are generally advantageous for training time, similarity retrieval, and auto-tagging, while deep metric learning exhibits better performance for triplet-prediction. Finally, we show that our proposed approach yields state-of-the-art results for music auto-tagging.
[ { "created": "Sun, 9 Aug 2020 13:53:12 GMT", "version": "v1" }, { "created": "Wed, 12 Aug 2020 21:46:52 GMT", "version": "v2" } ]
"2020-08-14T00:00:00"
[ [ "Lee", "Jongpil", "" ], [ "Bryan", "Nicholas J.", "" ], [ "Salamon", "Justin", "" ], [ "Jin", "Zeyu", "" ], [ "Nam", "Juhan", "" ] ]
0no_new_dataset
2004.08783
Mahmoud Abo Khamis
Mahmoud Abo Khamis, Phokion G. Kolaitis, Hung Q. Ngo, Dan Suciu
Decision Problems in Information Theory
null
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constraints on entropies are considered to be the laws of information theory. Even though the pursuit of their discovery has been a central theme of research in information theory, the algorithmic aspects of constraints on entropies remain largely unexplored. Here, we initiate an investigation of decision problems about constraints on entropies by placing several different such problems into levels of the arithmetical hierarchy. We establish the following results on checking the validity over all almost-entropic functions: first, validity of a Boolean information constraint arising from a monotone Boolean formula is co-recursively enumerable; second, validity of "tight" conditional information constraints is in $\Pi^0_3$. Furthermore, under some restrictions, validity of conditional information constraints "with slack" is in $\Sigma^0_2$, and validity of information inequality constraints involving max is Turing equivalent to validity of information inequality constraints (with no max involved). We also prove that the classical implication problem for conditional independence statements is co-recursively enumerable.
[ { "created": "Sun, 19 Apr 2020 07:07:20 GMT", "version": "v1" }, { "created": "Mon, 27 Apr 2020 11:05:55 GMT", "version": "v2" } ]
"2020-04-28T00:00:00"
[ [ "Khamis", "Mahmoud Abo", "" ], [ "Kolaitis", "Phokion G.", "" ], [ "Ngo", "Hung Q.", "" ], [ "Suciu", "Dan", "" ] ]
0no_new_dataset
1901.03536
David Glowacki
Lisa May Thomas, Helen M. Deeks, Alex J. Jones, Oussama Metatla, David R. Glowacki
Somatic Practices for Understanding Real, Imagined, and Virtual Realities
null
null
null
null
cs.HC cs.CY cs.MM
http://creativecommons.org/licenses/by-sa/4.0/
In most VR experiences, the visual sense dominates other modes of sensory input, encouraging non-visual senses to respond as if the visual were real. The simulated visual world thus becomes a sort of felt actuality, where the 'actual' physical body and environment can 'drop away', opening up possibilities for designing entirely new kinds of experience. Most VR experiences place visual sensory input (of the simulated environment) in the perceptual foreground, and the physical body in the background. In what follows, we discuss methods for resolving the apparent tension which arises from VR's prioritization of visual perception. We specifically aim to understand how somatic techniques encouraging participants to 'attend to their attention' enable them to access more subtle aspects of sensory phenomena in a VR experience, bound neither by rigid definitions of vision-based virtuality nor body-based corporeality. During a series of workshops, we implemented experimental somatic-dance practices to better understand perceptual and imaginative subtleties that arise for participants whilst they are embedded in a multi-person VR framework. Our preliminary observations suggest that somatic methods can be used to design VR experiences which enable (i) a tactile quality or felt sense of phenomena in the virtual environment (VE), (ii) lingering impacts on participant imagination even after the VR headset is taken off, and (iii) an expansion of imaginative potential.
[ { "created": "Fri, 11 Jan 2019 10:06:46 GMT", "version": "v1" } ]
"2019-01-14T00:00:00"
[ [ "Thomas", "Lisa May", "" ], [ "Deeks", "Helen M.", "" ], [ "Jones", "Alex J.", "" ], [ "Metatla", "Oussama", "" ], [ "Glowacki", "David R.", "" ] ]
0no_new_dataset
1801.04961
Rajit Karmakar
Rajit Karmakar, Santanu Chatopadhyay and Rohit Kapur
Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential Circuits
14 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic Encryption is one of the most popular hardware security techniques which can prevent IP piracy and illegal IC overproduction. It introduces obfuscation by inserting some extra hardware into a design to hide its functionality from unauthorized users. Correct functionality of an encrypted design depends upon the application of correct keys, shared only with the authorized users. In the recent past, extensive efforts have been devoted in extracting the secret key of an encrypted design. At the same time, several countermeasures have also been proposed by the research community to thwart different state-of-the-art attacks on logic encryption. However, most of the proposed countermeasures fail to prevent the powerful SAT attack. Although a few researchers have proposed different solutions to withstand SAT attack, those solutions suffer from several drawbacks such as high design overheads, low output corruptibility, and vulnerability against removal attack. Almost all the known logic encryption strategies are vulnerable to scan based attack. In this paper, we propose a novel encryption technique called Encrypt Flip-Flop, which encrypts the outputs of selected flip-flops by inserting multiplexers (MUX). The proposed strategy can thwart all the known attacks including SAT and scan based attacks. The scheme has low design overhead and implementation complexity. Experimental results on several ISCAS'89 and ITC'99 benchmarks show that our proposed method can produce reasonable output corruption for wrong keys.
[ { "created": "Mon, 15 Jan 2018 19:36:01 GMT", "version": "v1" } ]
"2018-01-17T00:00:00"
[ [ "Karmakar", "Rajit", "" ], [ "Chatopadhyay", "Santanu", "" ], [ "Kapur", "Rohit", "" ] ]
0no_new_dataset
2309.02817
Alexandra Wesolek
Matt DeVos, Danielle Rogers and Alexandra Wesolek
On Minimizing the Energy of a Spherical Graph Representation
Appears in the Proceedings of the 31st International Symposium on Graph Drawing and Network Visualization (GD 2023)
null
null
null
cs.CG math.CO
http://creativecommons.org/licenses/by-nc-nd/4.0/
Graph representations are the generalization of geometric graph drawings from the plane to higher dimensions. A method introduced by Tutte to optimize properties of graph drawings is to minimize their energy. We explore this minimization for spherical graph representations, where the vertices lie on a unit sphere such that the origin is their barycentre. We present a primal and dual semidefinite program which can be used to find such a spherical graph representation minimizing the energy. We denote the optimal value of this program by $\rho(G)$ for a given graph $G$. The value turns out to be related to the second largest eigenvalue of the adjacency matrix of $G$, which we denote by $\lambda_2$. We show that for $G$ regular, $\rho(G) \leq \frac{\lambda_{2}}{2} \cdot v(G)$, and that equality holds if and only if the $\lambda_{2}$ eigenspace contains a spherical 1-design. Moreover, if $G$ is a random $d$-regular graph, $\rho(G)=\left(\sqrt{(d-1)} +o(1)\right)\cdot v(G)$, asymptotically almost surely.
[ { "created": "Wed, 6 Sep 2023 08:03:19 GMT", "version": "v1" } ]
"2023-09-07T00:00:00"
[ [ "DeVos", "Matt", "" ], [ "Rogers", "Danielle", "" ], [ "Wesolek", "Alexandra", "" ] ]
0no_new_dataset
2003.01228
Ricardo Garcia Rosas
Ricardo Garcia-Rosas, Tianshi Yu, Denny Oetomo, Chris Manzie, Ying Tan, and Peter Choong
The Use of Implicit Human Motor Behaviour in the Online Personalisation of Prosthetic Interfaces
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work, the authors proposed a data-driven optimisation algorithm for the personalisation of human-prosthetic interfaces, demonstrating the possibility of adapting prosthesis behaviour to its user while the user performs tasks with it. This method requires that the human and the prosthesis personalisation algorithm have same pre-defined objective function. This was previously ensured by providing the human with explicit feedback on what the objective function is. However, constantly displaying this information to the prosthesis user is impractical. Moreover, the method utilised task information in the objective function which may not be available from the wearable sensors typically used in prosthetic applications. In this work, the previous approach is extended to use a prosthesis objective function based on implicit human motor behaviour, which represents able-bodied human motor control and is measureable using wearable sensors. The approach is tested in a hardware implementation of the personalisation algorithm on a prosthetic elbow, where the prosthetic objective function is a function of upper-body compensation, and is measured using wearable IMUs. Experimental results on able-bodied subjects using a supernumerary prosthetic elbow mounted on an elbow orthosis suggest that it is possible to use a prosthesis objective function which is implicit in human behaviour to achieve collaboration without providing explicit feedback to the human, motivating further studies.
[ { "created": "Mon, 2 Mar 2020 22:29:50 GMT", "version": "v1" } ]
"2020-03-04T00:00:00"
[ [ "Garcia-Rosas", "Ricardo", "" ], [ "Yu", "Tianshi", "" ], [ "Oetomo", "Denny", "" ], [ "Manzie", "Chris", "" ], [ "Tan", "Ying", "" ], [ "Choong", "Peter", "" ] ]
0no_new_dataset
1607.02919
Emre Can Kara
Emre C. Kara, Ciaran M. Roberts, Michaelangelo Tabone, Lilliana Alvarez, Duncan S. Callaway, Emma M. Stewart
Towards Real-Time Estimation of Solar Generation From Micro-Synchrophasor Measurements
For submission to Sustainable Energy, Grids and Networks
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a set of methods for estimating the renewable energy generation downstream of a measurement device using real-world measurements. First, we present a generation disaggregation scheme where the only information available for estimation is the micro-synchrophasor measurements obtained at the substation or feeder head. We then propose two strategies in which we use measurements from the substation as well as a proxy solar irradiance measurement. Using these two measurement points, we first propose a multiple linear regression strategy, in which we estimate a relationship between the measured reactive power and the load active power consumption, which are then used in disaggregation. Finally, we expand this strategy to strategically manage the reconstruction errors in the estimators. We simultaneously disaggregate the solar generation and load. We show that it is possible to disaggragate the generation of a 7.5 megawatt photovoltaic site with a root-mean-squared error of approximately 450 kilowatts.
[ { "created": "Mon, 11 Jul 2016 12:26:18 GMT", "version": "v1" }, { "created": "Wed, 13 Jul 2016 06:32:51 GMT", "version": "v2" } ]
"2016-07-14T00:00:00"
[ [ "Kara", "Emre C.", "" ], [ "Roberts", "Ciaran M.", "" ], [ "Tabone", "Michaelangelo", "" ], [ "Alvarez", "Lilliana", "" ], [ "Callaway", "Duncan S.", "" ], [ "Stewart", "Emma M.", "" ] ]
1new_dataset
1708.08162
Zhuotao Liu
Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems
Conference Version is Published in IEEE ICNP 2017
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tor is the most widely used anonymity network, currently serving millions of users each day. However, there is no access control in place for all these users, leaving the network vulnerable to botnet abuse and attacks. For example, criminals frequently use exit relays as stepping stones for attacks, causing service providers to serve CAPTCHAs to exit relay IP addresses or blacklisting them altogether, which leads to severe usability issues for legitimate Tor users. To address this problem, we propose TorPolice, the first privacy-preserving access control framework for Tor. TorPolice enables abuse-plagued service providers such as Yelp to enforce access rules to police and throttle malicious requests coming from Tor while still providing service to legitimate Tor users. Further, TorPolice equips Tor with global access control for relays, enhancing Tor's resilience to botnet abuse. We show that TorPolice preserves the privacy of Tor users, implement a prototype of TorPolice, and perform extensive evaluations to validate our design goals.
[ { "created": "Mon, 28 Aug 2017 01:45:14 GMT", "version": "v1" }, { "created": "Fri, 1 Sep 2017 16:16:33 GMT", "version": "v2" }, { "created": "Mon, 18 Dec 2017 07:41:17 GMT", "version": "v3" } ]
"2017-12-19T00:00:00"
[ [ "Liu", "Zhuotao", "" ], [ "Liu", "Yushan", "" ], [ "Winter", "Philipp", "" ], [ "Mittal", "Prateek", "" ], [ "Hu", "Yih-Chun", "" ] ]
0no_new_dataset
1902.07938
Rezka Leonandya
Rezka Leonandya, Fariz Ikhwantri
Pretrained language model transfer on neural named entity recognition in Indonesian conversational texts
Accepted in CICLing 2019
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Named entity recognition (NER) is an important task in NLP, which is all the more challenging in conversational domain with their noisy facets. Moreover, conversational texts are often available in limited amount, making supervised tasks infeasible. To learn from small data, strong inductive biases are required. Previous work relied on hand-crafted features to encode these biases until transfer learning emerges. Here, we explore a transfer learning method, namely language model pretraining, on NER task in Indonesian conversational texts. We utilize large unlabeled data (generic domain) to be transferred to conversational texts, enabling supervised training on limited in-domain data. We report two transfer learning variants, namely supervised model fine-tuning and unsupervised pretrained LM fine-tuning. Our experiments show that both variants outperform baseline neural models when trained on small data (100 sentences), yielding an absolute improvement of 32 points of test F1 score. Furthermore, we find that the pretrained LM encodes part-of-speech information which is a strong predictor for NER.
[ { "created": "Thu, 21 Feb 2019 09:53:04 GMT", "version": "v1" } ]
"2019-02-22T00:00:00"
[ [ "Leonandya", "Rezka", "" ], [ "Ikhwantri", "Fariz", "" ] ]
0no_new_dataset
1402.3301
Shafi'i Muhammad Abdulhamid Mr
Shafii M. Abdulhamid, Sulaiman Ahmad, Victor O. Waziri and Fatima N. Jibril
Privacy and National Security Issues in Social Networks: The Challenges
7 pages, 1 table
International Journal of the Computer, the Internet and Management Vol. 19. No.3 (September-December, 2011) pp 14 -20
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows stronger. In this paper, we looked at the structure and components of the member profile and the challenges of privacy issues faced by individuals and governments that participate in social networking. We also looked at how it can be used to distort national security, how it became the new weapons of mass mobilization and also how social networks have became the rallying forces for revolutions and social justice.
[ { "created": "Thu, 13 Feb 2014 21:03:05 GMT", "version": "v1" } ]
"2014-02-17T00:00:00"
[ [ "Abdulhamid", "Shafii M.", "" ], [ "Ahmad", "Sulaiman", "" ], [ "Waziri", "Victor O.", "" ], [ "Jibril", "Fatima N.", "" ] ]
0no_new_dataset
1301.6574
Thomas Couronne
Thomas Couronne, Jean-Samuel Beuscart, Cedric Chamayou
Self-Organizing Map and social networks: Unfolding online social popularity
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present study uses the Kohonen self organizing map (SOM) to represent the popularity patterns of Myspace music artists from their attributes on the platform and their position in the social network. The method is applied to cluster the profiles (the nodes of the social network) and the best friendship links (the edges). It shows that the SOM is an efficient tool to interpret the complex links between the audience and the influence of the musicians. It finally provides a robust classifier of the online social network behaviors.
[ { "created": "Mon, 28 Jan 2013 15:28:36 GMT", "version": "v1" } ]
"2013-01-29T00:00:00"
[ [ "Couronne", "Thomas", "" ], [ "Beuscart", "Jean-Samuel", "" ], [ "Chamayou", "Cedric", "" ] ]
0no_new_dataset
2403.04205
Lokesh Krishna
Lokesh Krishna, Nikhil Sobanbabu, Quan Nguyen
OGMP: Oracle Guided Multimodal Policies for Agile and Versatile Robot Control
12 pages, 12 figures
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
The efficacy of model-free learning for robot control relies on the tailored integration of task-specific priors and heuristics, hence calling for a unified approach. In this paper, we define a general class for priors called oracles and propose bounding the permissible state around the oracle's ansatz, resulting in task-agnostic oracle-guided policy optimization. Additionally, to enhance modularity, we introduce the notion of task-vital modes. A policy mastering a compact set of modes and intermediate transitions can then solve perpetual tasks. The proposed approach is validated in challenging biped control tasks: parkour and diving on a 16-DoF dynamic bipedal robot, Hector. OGMP results in a single policy per task, solving indefinite parkour over diverse tracks and omnidirectional diving from varied heights, exhibiting versatile agility. Finally, we introduce a novel latent mode space reachability analysis to study our policy's mode generalization by computing a feasible mode set function through which we certify a set of failure-free modes for our policy to perform at any given state.
[ { "created": "Thu, 7 Mar 2024 04:21:12 GMT", "version": "v1" }, { "created": "Fri, 14 Jun 2024 06:18:59 GMT", "version": "v2" } ]
"2024-06-17T00:00:00"
[ [ "Krishna", "Lokesh", "" ], [ "Sobanbabu", "Nikhil", "" ], [ "Nguyen", "Quan", "" ] ]
0no_new_dataset
2406.12003
Hedyeh Nazari
Hedyeh Nazari, Abbas Yazdinejad, Ali Dehghantanha, Fattane Zarrinkalam, Gautam Srivastava
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Software Defined Networking (SDN) has brought significant advancements in network management and programmability. However, this evolution has also heightened vulnerability to Advanced Persistent Threats (APTs), sophisticated and stealthy cyberattacks that traditional detection methods often fail to counter, especially in the face of zero-day exploits. A prevalent issue is the inadequacy of existing strategies to detect novel threats while addressing data privacy concerns in collaborative learning scenarios. This paper presents P3GNN (privacy-preserving provenance graph-based graph neural network model), a novel model that synergizes Federated Learning (FL) with Graph Convolutional Networks (GCN) for effective APT detection in SDN environments. P3GNN utilizes unsupervised learning to analyze operational patterns within provenance graphs, identifying deviations indicative of security breaches. Its core feature is the integration of FL with homomorphic encryption, which fortifies data confidentiality and gradient integrity during collaborative learning. This approach addresses the critical challenge of data privacy in shared learning contexts. Key innovations of P3GNN include its ability to detect anomalies at the node level within provenance graphs, offering a detailed view of attack trajectories and enhancing security analysis. Furthermore, the models unsupervised learning capability enables it to identify zero-day attacks by learning standard operational patterns. Empirical evaluation using the DARPA TCE3 dataset demonstrates P3GNNs exceptional performance, achieving an accuracy of 0.93 and a low false positive rate of 0.06.
[ { "created": "Mon, 17 Jun 2024 18:14:03 GMT", "version": "v1" }, { "created": "Mon, 8 Jul 2024 19:50:26 GMT", "version": "v2" } ]
"2024-07-10T00:00:00"
[ [ "Nazari", "Hedyeh", "" ], [ "Yazdinejad", "Abbas", "" ], [ "Dehghantanha", "Ali", "" ], [ "Zarrinkalam", "Fattane", "" ], [ "Srivastava", "Gautam", "" ] ]
1new_dataset
1506.05607
Peter Schrammel
Dario Cattaruzza, Alessandro Abate, Peter Schrammel and Daniel Kroening
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (extended version)
extended version of paper published in SAS'15
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear Time Invariant (LTI) systems are ubiquitous in control applications. Unbounded-time reachability analysis that can cope with industrial-scale models with thousands of variables is needed. To tackle this problem, we use abstract acceleration, a method for unbounded-time polyhedral reachability analysis for linear systems. Existing variants of the method are restricted to closed systems, i.e., dynamical models without inputs or non-determinism. In this paper, we present an extension of abstract acceleration to linear loops with inputs, which correspond to discrete-time LTI control systems under guard conditions. The new method relies on a relaxation of the solution of the linear dynamical equation that leads to a precise over-approximation of the set of reachable states, which are evaluated using support functions. In order to increase scalability, we use floating-point computations and ensure soundness by interval arithmetic. Our experiments show that performance increases by several orders of magnitude over alternative approaches in the literature. In turn, this tremendous gain allows us to improve on precision by computing more expensive abstractions. We outperform state-of-the-art tools for unbounded-time analysis of LTI system with inputs in speed as well as in precision.
[ { "created": "Thu, 18 Jun 2015 09:54:28 GMT", "version": "v1" }, { "created": "Thu, 30 Jul 2015 13:28:49 GMT", "version": "v2" }, { "created": "Thu, 27 Aug 2015 18:59:22 GMT", "version": "v3" }, { "created": "Tue, 4 Jul 2017 15:12:59 GMT", "version": "v4" }, { "created": "Tue, 22 Aug 2017 20:01:31 GMT", "version": "v5" } ]
"2017-08-24T00:00:00"
[ [ "Cattaruzza", "Dario", "" ], [ "Abate", "Alessandro", "" ], [ "Schrammel", "Peter", "" ], [ "Kroening", "Daniel", "" ] ]
0no_new_dataset
2402.18824
Xi Wang
Xi Wang, Laurence Aitchison
Batch size invariant Adam
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We propose a batch size invariant version of Adam, for use in large-scale, distributed settings, in which the mini-batch is divided into micro-batches which are distributed among worker nodes. For the v term, standard Adam first computes the average over micro-batch gradients, then squares, while in the batch size invariant Adam proposed here, we first square the micro-batch gradients, then average. Previous work (e.g. Malladi et al. 2022) used an alternative approach that involved a square-root scaling of the learning rate, but this approach requires strong assumptions to work; in particular that the gradient variance dominates the square of the expected gradient. In contrast, the approach proposed here gives batch size invariance without this assumption. We confirm that in practice our scheme gives batch size invariance in a much larger range of scenarios than the previous approach.
[ { "created": "Thu, 29 Feb 2024 03:16:47 GMT", "version": "v1" } ]
"2024-03-01T00:00:00"
[ [ "Wang", "Xi", "" ], [ "Aitchison", "Laurence", "" ] ]
0no_new_dataset
1705.02669
Subhabrata Mukherjee
Subhabrata Mukherjee, Stephan Guennemann, Gerhard Weikum
Item Recommendation with Continuous Experience Evolution of Users using Brownian Motion
null
null
10.1145/2939672.2939780
null
cs.AI cs.CL cs.IR cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online review communities are dynamic as users join and leave, adopt new vocabulary, and adapt to evolving trends. Recent work has shown that recommender systems benefit from explicit consideration of user experience. However, prior work assumes a fixed number of discrete experience levels, whereas in reality users gain experience and mature continuously over time. This paper presents a new model that captures the continuous evolution of user experience, and the resulting language model in reviews and other posts. Our model is unsupervised and combines principles of Geometric Brownian Motion, Brownian Motion, and Latent Dirichlet Allocation to trace a smooth temporal progression of user experience and language model respectively. We develop practical algorithms for estimating the model parameters from data and for inference with our model (e.g., to recommend items). Extensive experiments with five real-world datasets show that our model not only fits data better than discrete-model baselines, but also outperforms state-of-the-art methods for predicting item ratings.
[ { "created": "Sun, 7 May 2017 17:46:43 GMT", "version": "v1" }, { "created": "Tue, 9 May 2017 06:47:51 GMT", "version": "v2" }, { "created": "Wed, 9 Aug 2017 17:56:00 GMT", "version": "v3" } ]
"2017-08-10T00:00:00"
[ [ "Mukherjee", "Subhabrata", "" ], [ "Guennemann", "Stephan", "" ], [ "Weikum", "Gerhard", "" ] ]
1new_dataset
1710.04101
Oren Salzman
Nika Haghtalab, Simon Mackenzie, Ariel D. Procaccia, Oren Salzman and Siddhartha S. Srinivasa
The Provable Virtue of Laziness in Motion Planning
null
null
null
null
cs.RO cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lazy Shortest Path (LazySP) class consists of motion-planning algorithms that only evaluate edges along shortest paths between the source and target. These algorithms were designed to minimize the number of edge evaluations in settings where edge evaluation dominates the running time of the algorithm; but how close to optimal are LazySP algorithms in terms of this objective? Our main result is an analytical upper bound, in a probabilistic model, on the number of edge evaluations required by LazySP algorithms; a matching lower bound shows that these algorithms are asymptotically optimal in the worst case.
[ { "created": "Wed, 11 Oct 2017 15:00:47 GMT", "version": "v1" } ]
"2017-10-12T00:00:00"
[ [ "Haghtalab", "Nika", "" ], [ "Mackenzie", "Simon", "" ], [ "Procaccia", "Ariel D.", "" ], [ "Salzman", "Oren", "" ], [ "Srinivasa", "Siddhartha S.", "" ] ]
0no_new_dataset
1402.5734
Cunsheng Ding
Cunsheng Ding, Longjiang Qu, Qiang Wang, Jin Yuan and Pingzhi Yuan
Permutation trinomials over finite fields with even characteristic
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Permutation polynomials have been a subject of study for a long time and have applications in many areas of science and engineering. However, only a small number of specific classes of permutation polynomials are described in the literature so far. In this paper we present a number of permutation trinomials over finite fields, which are of different forms.
[ { "created": "Mon, 24 Feb 2014 06:58:44 GMT", "version": "v1" } ]
"2014-02-25T00:00:00"
[ [ "Ding", "Cunsheng", "" ], [ "Qu", "Longjiang", "" ], [ "Wang", "Qiang", "" ], [ "Yuan", "Jin", "" ], [ "Yuan", "Pingzhi", "" ] ]
0no_new_dataset
2104.01104
Yanyuan Qin
Yanyuan Qin
Adaptive Bitrate Streaming Over Cellular Networks: Rate Adaptation and Data Savings Strategies
null
null
null
null
cs.NI cs.MM
http://creativecommons.org/licenses/by-nc-nd/4.0/
Adaptive bitrate streaming (ABR) has become thede factotechnique for videostreaming over the Internet. Despite a flurry of techniques, achieving high quality ABRstreaming over cellular networks remains a tremendous challenge. First, the design ofan ABR scheme needs to balance conflicting Quality of Experience (QoE) metrics suchas video quality, quality changes, stalls and startup performance, which is even harderunder highly dynamic bandwidth in cellular network. Second, streaming providers havebeen moving towards using Variable Bitrate (VBR) encodings for the video content,which introduces new challenges for ABR streaming, whose nature and implicationsare little understood. Third, mobile video streaming consumes a lot of data. Althoughmany video and network providers currently offer data saving options, the existingpractices are suboptimal in QoE and resource usage. Last, when the audio and videotracks are stored separately, video and audio rate adaptation needs to be dynamicallycoordinated to achieve good overall streaming experience, which presents interestingchallenges while, somewhat surprisingly, has received little attention by the researchcommunity. In this dissertation, we tackle each of the above four challenges.
[ { "created": "Fri, 2 Apr 2021 15:56:00 GMT", "version": "v1" }, { "created": "Fri, 14 May 2021 20:48:51 GMT", "version": "v2" } ]
"2021-05-18T00:00:00"
[ [ "Qin", "Yanyuan", "" ] ]
0no_new_dataset
1805.06695
Pawani Porambage
Pawani Porambage and Jude Okwuibe and Madhusanka Liyanage and Mika Ylianttila and Tarik Taleb
Survey on Multi-Access Edge Computing for Internet of Things Realization
Submitted to IEEE Communications Surveys & Tutorials
Published in: IEEE Communications Surveys & Tutorials ( Volume: 20 , Issue: 4 , Fourthquarter 2018) Page(s): 2961 - 2991
10.1109/COMST.2018.2849509
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet of Things (IoT) has recently advanced from an experimental technology to what will become the backbone of future customer value for both product and service sector businesses. This underscores the cardinal role of IoT on the journey towards the fifth generation (5G) of wireless communication systems. IoT technologies augmented with intelligent and big data analytics are expected to rapidly change the landscape of myriads of application domains ranging from health care to smart cities and industrial automations. The emergence of Multi-Access Edge Computing (MEC) technology aims at extending cloud computing capabilities to the edge of the radio access network, hence providing real-time, high-bandwidth, low-latency access to radio network resources. IoT is identified as a key use case of MEC, given MEC's ability to provide cloud platform and gateway services at the network edge. MEC will inspire the development of myriads of applications and services with demand for ultra low latency and high Quality of Service (QoS) due to its dense geographical distribution and wide support for mobility. MEC is therefore an important enabler of IoT applications and services which require real-time operations. In this survey, we provide a holistic overview on the exploitation of MEC technology for the realization of IoT applications and their synergies. We further discuss the technical aspects of enabling MEC in IoT and provide some insight into various other integration technologies therein.
[ { "created": "Thu, 17 May 2018 10:51:06 GMT", "version": "v1" } ]
"2019-01-29T00:00:00"
[ [ "Porambage", "Pawani", "" ], [ "Okwuibe", "Jude", "" ], [ "Liyanage", "Madhusanka", "" ], [ "Ylianttila", "Mika", "" ], [ "Taleb", "Tarik", "" ] ]
0no_new_dataset
1011.6049
Thomas Houit
Thomas Houit and Frank Nielsen
Video Stippling
12 pages, 15 figures
null
null
null
cs.GR cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider rendering color videos using a non-photo-realistic art form technique commonly called stippling. Stippling is the art of rendering images using point sets, possibly with various attributes like sizes, elementary shapes, and colors. Producing nice stippling is attractive not only for the sake of image depiction but also because it yields a compact vectorial format for storing the semantic information of media. Moreover, stippling is by construction easily tunable to various device resolutions without suffering from bitmap sampling artifacts when resizing. The underlying core technique for stippling images is to compute a centroidal Voronoi tessellation on a well-designed underlying density. This density relates to the image content, and is used to compute a weighted Voronoi diagram. By considering videos as image sequences and initializing properly the stippling of one image by the result of its predecessor, one avoids undesirable point flickering artifacts and can produce stippled videos that nevertheless still exhibit noticeable artifacts. To overcome this, our method improves over the naive scheme by considering dynamic point creation and deletion according to the current scene semantic complexity, and show how to effectively vectorize video while adjusting for both color and contrast characteristics. Furthermore, we explain how to produce high quality stippled ``videos'' (eg., fully dynamic spatio-temporal point sets) for media containing various fading effects, like quick motions of objects or progressive shot changes. We report on practical performances of our implementation, and present several stippled video results rendered on-the-fly using our viewer that allows both spatio-temporal dynamic rescaling (eg., upscale vectorially frame rate).
[ { "created": "Sun, 28 Nov 2010 15:04:34 GMT", "version": "v1" } ]
"2010-11-30T00:00:00"
[ [ "Houit", "Thomas", "" ], [ "Nielsen", "Frank", "" ] ]
0no_new_dataset
cs/0510077
Oskari Ajanki
Oskari Ajanki, Antti Knowles
Connection state overhead in a dynamic linear network
8 pages, 3 figures, uses IEEEtran.cls
null
null
null
cs.IT cs.NI math.IT
null
We consider a dynamical linear network where nearest neighbours communicate via links whose states form binary (open/closed) valued independent and identically distributed Markov processes. Our main result is the tight information-theoretic lower bound on the network traffic required by the connection state overhead, or the information required for all nodes to know their connected neighbourhood. These results, and especially their possible generalisations to more realistic network models, could give us valuable understanding of the unavoidable protocol overheads in rapidly changing Ad hoc and sensor networks.
[ { "created": "Tue, 25 Oct 2005 12:00:06 GMT", "version": "v1" } ]
"2007-07-16T00:00:00"
[ [ "Ajanki", "Oskari", "" ], [ "Knowles", "Antti", "" ] ]
0no_new_dataset
1411.6081
Cho-Jui Hsieh Cho-Jui Hsieh
Cho-Jui Hsieh and Nagarajan Natarajan and Inderjit S. Dhillon
PU Learning for Matrix Completion
null
null
null
null
cs.LG cs.NA stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the matrix completion problem when the observations are one-bit measurements of some underlying matrix M, and in particular the observed samples consist only of ones and no zeros. This problem is motivated by modern applications such as recommender systems and social networks where only "likes" or "friendships" are observed. The problem of learning from only positive and unlabeled examples, called PU (positive-unlabeled) learning, has been studied in the context of binary classification. We consider the PU matrix completion problem, where an underlying real-valued matrix M is first quantized to generate one-bit observations and then a subset of positive entries is revealed. Under the assumption that M has bounded nuclear norm, we provide recovery guarantees for two different observation models: 1) M parameterizes a distribution that generates a binary matrix, 2) M is thresholded to obtain a binary matrix. For the first case, we propose a "shifted matrix completion" method that recovers M using only a subset of indices corresponding to ones, while for the second case, we propose a "biased matrix completion" method that recovers the (thresholded) binary matrix. Both methods yield strong error bounds --- if M is n by n, the Frobenius error is bounded as O(1/((1-rho)n), where 1-rho denotes the fraction of ones observed. This implies a sample complexity of O(n\log n) ones to achieve a small error, when M is dense and n is large. We extend our methods and guarantees to the inductive matrix completion problem, where rows and columns of M have associated features. We provide efficient and scalable optimization procedures for both the methods and demonstrate the effectiveness of the proposed methods for link prediction (on real-world networks consisting of over 2 million nodes and 90 million links) and semi-supervised clustering tasks.
[ { "created": "Sat, 22 Nov 2014 04:37:15 GMT", "version": "v1" } ]
"2014-11-25T00:00:00"
[ [ "Hsieh", "Cho-Jui", "" ], [ "Natarajan", "Nagarajan", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
0no_new_dataset
1907.01988
Ahmet Kara
Ahmet Kara, Milos Nikolic, Dan Olteanu, Haozhe Zhang
Trade-offs in Static and Dynamic Evaluation of Hierarchical Queries
null
Logical Methods in Computer Science, Volume 19, Issue 3 (August 9, 2023) lmcs:10035
10.46298/lmcs-19(3:11)2023
null
cs.DB cs.LO
http://creativecommons.org/licenses/by/4.0/
We investigate trade-offs in static and dynamic evaluation of hierarchical queries with arbitrary free variables. In the static setting, the trade-off is between the time to partially compute the query result and the delay needed to enumerate its tuples. In the dynamic setting, we additionally consider the time needed to update the query result under single-tuple inserts or deletes to the database. Our approach observes the degree of values in the database and uses different computation and maintenance strategies for high-degree (heavy) and low-degree (light) values. For the latter it partially computes the result, while for the former it computes enough information to allow for on-the-fly enumeration. We define the preprocessing time, the update time, and the enumeration delay as functions of the light/heavy threshold. By appropriately choosing this threshold, our approach recovers a number of prior results when restricted to hierarchical queries. We show that for a restricted class of hierarchical queries, our approach achieves worst-case optimal update time and enumeration delay conditioned on the Online Matrix-Vector Multiplication Conjecture.
[ { "created": "Wed, 3 Jul 2019 15:21:47 GMT", "version": "v1" }, { "created": "Sat, 6 Jun 2020 12:26:07 GMT", "version": "v2" }, { "created": "Thu, 8 Sep 2022 20:52:46 GMT", "version": "v3" }, { "created": "Sun, 12 Mar 2023 21:49:09 GMT", "version": "v4" }, { "created": "Thu, 18 May 2023 17:07:41 GMT", "version": "v5" }, { "created": "Mon, 17 Jul 2023 11:35:25 GMT", "version": "v6" }, { "created": "Tue, 8 Aug 2023 11:10:17 GMT", "version": "v7" } ]
"2024-02-14T00:00:00"
[ [ "Kara", "Ahmet", "" ], [ "Nikolic", "Milos", "" ], [ "Olteanu", "Dan", "" ], [ "Zhang", "Haozhe", "" ] ]
0no_new_dataset
1207.6683
Jochen Koenemann
Jochen Koenemann, Kate Larson, David Steiner
Network Bargaining: Using Approximate Blocking Sets to Stabilize Unstable Instances
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a network extension to the Nash bargaining game, as introduced by Kleinberg and Tardos (STOC'08), where the set of players corresponds to vertices in a graph $G=(V,E)$ and each edge $ij\in E$ represents a possible deal between players $i$ and $j$. We reformulate the problem as a cooperative game and study the following question: Given a game with an empty core (i.e. an unstable game) is it possible, through minimal changes in the underlying network, to stabilize the game? We show that by removing edges in the network that belong to a blocking set we can find a stable solution in polynomial time. This motivates the problem of finding small blocking sets. While it has been previously shown that finding the smallest blocking set is NP-hard (Biro,Kern,Paulusma, TAMC'10), we show that it is possible to efficiently find approximate blocking sets in sparse graphs.
[ { "created": "Sat, 28 Jul 2012 04:56:32 GMT", "version": "v1" } ]
"2012-07-31T00:00:00"
[ [ "Koenemann", "Jochen", "" ], [ "Larson", "Kate", "" ], [ "Steiner", "David", "" ] ]
0no_new_dataset
2206.07458
Yong Man Ro
Joanna Hong, Minsu Kim, Yong Man Ro
VisageSynTalk: Unseen Speaker Video-to-Speech Synthesis via Speech-Visage Feature Selection
Accepted by ECCV 2022
null
null
null
cs.CV cs.LG cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this work is to reconstruct speech from a silent talking face video. Recent studies have shown impressive performance on synthesizing speech from silent talking face videos. However, they have not explicitly considered on varying identity characteristics of different speakers, which place a challenge in the video-to-speech synthesis, and this becomes more critical in unseen-speaker settings. Our approach is to separate the speech content and the visage-style from a given silent talking face video. By guiding the model to independently focus on modeling the two representations, we can obtain the speech of high intelligibility from the model even when the input video of an unseen subject is given. To this end, we introduce speech-visage selection that separates the speech content and the speaker identity from the visual features of the input video. The disentangled representations are jointly incorporated to synthesize speech through visage-style based synthesizer which generates speech by coating the visage-styles while maintaining the speech content. Thus, the proposed framework brings the advantage of synthesizing the speech containing the right content even with the silent talking face video of an unseen subject. We validate the effectiveness of the proposed framework on the GRID, TCD-TIMIT volunteer, and LRW datasets.
[ { "created": "Wed, 15 Jun 2022 11:29:58 GMT", "version": "v1" }, { "created": "Wed, 20 Jul 2022 13:03:18 GMT", "version": "v2" } ]
"2022-07-21T00:00:00"
[ [ "Hong", "Joanna", "" ], [ "Kim", "Minsu", "" ], [ "Ro", "Yong Man", "" ] ]
1new_dataset
2209.10977
Florian Euchner
Florian Euchner, Niklas S\"uppel, Marc Gauger, Sebastian D\"orner, Stephan ten Brink
Deep Learning for Uplink CSI-based Downlink Precoding in FDD massive MIMO Evaluated on Indoor Measurements
null
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When operating massive multiple-input multiple-output (MIMO) systems with uplink (UL) and downlink (DL) channels at different frequencies (frequency division duplex (FDD) operation), acquisition of channel state information (CSI) for downlink precoding is a major challenge. Since, barring transceiver impairments, both UL and DL CSI are determined by the physical environment surrounding transmitter and receiver, it stands to reason that, for a static environment, a mapping from UL CSI to DL CSI may exist. First, we propose to use various neural network (NN)-based approaches that learn this mapping and provide baselines using classical signal processing. Second, we introduce a scheme to evaluate the performance and quality of generalization of all approaches, distinguishing between known and previously unseen physical locations. Third, we evaluate all approaches on a real-world indoor dataset collected with a 32-antenna channel sounder.
[ { "created": "Thu, 22 Sep 2022 13:03:58 GMT", "version": "v1" } ]
"2022-09-23T00:00:00"
[ [ "Euchner", "Florian", "" ], [ "Süppel", "Niklas", "" ], [ "Gauger", "Marc", "" ], [ "Dörner", "Sebastian", "" ], [ "Brink", "Stephan ten", "" ] ]
1new_dataset
2205.04908
Yimin Xu
Yimin Xu, Mingbao Lin, Hong Yang, Fei Chao, Rongrong Ji
Shadow-Aware Dynamic Convolution for Shadow Removal
null
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With a wide range of shadows in many collected images, shadow removal has aroused increasing attention since uncontaminated images are of vital importance for many downstream multimedia tasks. Current methods consider the same convolution operations for both shadow and non-shadow regions while ignoring the large gap between the color mappings for the shadow region and the non-shadow region, leading to poor quality of reconstructed images and a heavy computation burden. To solve this problem, this paper introduces a novel plug-and-play Shadow-Aware Dynamic Convolution (SADC) module to decouple the interdependence between the shadow region and the non-shadow region. Inspired by the fact that the color mapping of the non-shadow region is easier to learn, our SADC processes the non-shadow region with a lightweight convolution module in a computationally cheap manner and recovers the shadow region with a more complicated convolution module to ensure the quality of image reconstruction. Given that the non-shadow region often contains more background color information, we further develop a novel intra-convolution distillation loss to strengthen the information flow from the non-shadow region to the shadow region. Extensive experiments on the ISTD and SRD datasets show our method achieves better performance in shadow removal over many state-of-the-arts. Our code is available at https://github.com/xuyimin0926/SADC.
[ { "created": "Tue, 10 May 2022 14:00:48 GMT", "version": "v1" }, { "created": "Mon, 1 Aug 2022 08:35:04 GMT", "version": "v2" }, { "created": "Tue, 30 Aug 2022 03:36:29 GMT", "version": "v3" } ]
"2022-08-31T00:00:00"
[ [ "Xu", "Yimin", "" ], [ "Lin", "Mingbao", "" ], [ "Yang", "Hong", "" ], [ "Chao", "Fei", "" ], [ "Ji", "Rongrong", "" ] ]
0no_new_dataset
2101.01104
Zhen Fang
Li Zhong, Zhen Fang, Feng Liu, Jie Lu, Bo Yuan, Guangquan Zhang
How does the Combined Risk Affect the Performance of Unsupervised Domain Adaptation Approaches?
9 pages, 3 figures, Accepted by Association for the Advancement of Artificial Intelligence 2021 (AAAI 2021)
null
null
null
cs.LG cs.AI cs.CV
http://creativecommons.org/licenses/by/4.0/
Unsupervised domain adaptation (UDA) aims to train a target classifier with labeled samples from the source domain and unlabeled samples from the target domain. Classical UDA learning bounds show that target risk is upper bounded by three terms: source risk, distribution discrepancy, and combined risk. Based on the assumption that the combined risk is a small fixed value, methods based on this bound train a target classifier by only minimizing estimators of the source risk and the distribution discrepancy. However, the combined risk may increase when minimizing both estimators, which makes the target risk uncontrollable. Hence the target classifier cannot achieve ideal performance if we fail to control the combined risk. To control the combined risk, the key challenge takes root in the unavailability of the labeled samples in the target domain. To address this key challenge, we propose a method named E-MixNet. E-MixNet employs enhanced mixup, a generic vicinal distribution, on the labeled source samples and pseudo-labeled target samples to calculate a proxy of the combined risk. Experiments show that the proxy can effectively curb the increase of the combined risk when minimizing the source risk and distribution discrepancy. Furthermore, we show that if the proxy of the combined risk is added into loss functions of four representative UDA methods, their performance is also improved.
[ { "created": "Wed, 30 Dec 2020 00:46:57 GMT", "version": "v1" } ]
"2021-01-05T00:00:00"
[ [ "Zhong", "Li", "" ], [ "Fang", "Zhen", "" ], [ "Liu", "Feng", "" ], [ "Lu", "Jie", "" ], [ "Yuan", "Bo", "" ], [ "Zhang", "Guangquan", "" ] ]
0no_new_dataset
2109.08305
EPTCS
Etienne Tignon
Formalisation of Action with Durations in Answer Set Programming
In Proceedings ICLP 2021, arXiv:2109.07914
EPTCS 345, 2021, pp. 305-309
10.4204/EPTCS.345.47
null
cs.LO cs.AI
http://creativecommons.org/licenses/by/4.0/
In this paper, I will discuss the work I am currently doing as a Ph.D. student at the University of Potsdam, under the tutoring of T. Schaub. I'm currently looking into action description in ASP. More precisely, my goal is to explore how to represent actions with durations in ASP, in different contexts. Right now, I'm focused on Multi-Agent Path Finding (MAPF), looking at how to represent speeds for different agents and contexts. Before tackling duration, I wanted to explore and compare different representations of action taking in ASP. For this, I started comparing different simple encodings tackling the MAPF problem. Even in simple code, choices and assumptions have been made in their creations. The objective of my work is to present the consequences of those design decisions in terms of performance and knowledge representation. As far as I know, there is no current research on this topic. Besides that, I'm also exploring different ways to represent duration and to solve related problems. I planed to compare them the same way I described before. I also want this to help me find innovative and effective ways to solve problems with duration.
[ { "created": "Fri, 17 Sep 2021 01:51:27 GMT", "version": "v1" } ]
"2021-09-20T00:00:00"
[ [ "Tignon", "Etienne", "" ] ]
0no_new_dataset
2308.10078
Rungroj Maipradit
Rungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh
Repeated Builds During Code Review: An Empirical Study of the OpenStack Community
conference
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Code review is a popular practice where developers critique each others' changes. Since automated builds can identify low-level issues (e.g., syntactic errors, regression bugs), it is not uncommon for software organizations to incorporate automated builds in the code review process. In such code review deployment scenarios, submitted change sets must be approved for integration by both peer code reviewers and automated build bots. Since automated builds may produce an unreliable signal of the status of a change set (e.g., due to ``flaky'' or non-deterministic execution behaviour), code review tools, such as Gerrit, allow developers to request a ``recheck'', which repeats the build process without updating the change set. We conjecture that an unconstrained recheck command will waste time and resources if it is not applied judiciously. To explore how the recheck command is applied in a practical setting, in this paper, we conduct an empirical study of 66,932 code reviews from the OpenStack community. We quantitatively analyze (i) how often build failures are rechecked; (ii) the extent to which invoking recheck changes build failure outcomes; and (iii) how much waste is generated by invoking recheck. We observe that (i) 55% of code reviews invoke the recheck command after a failing build is reported; (ii) invoking the recheck command only changes the outcome of a failing build in 42% of the cases; and (iii) invoking the recheck command increases review waiting time by an average of 2,200% and equates to 187.4 compute years of waste -- enough compute resources to compete with the oldest land living animal on earth.
[ { "created": "Sat, 19 Aug 2023 17:45:03 GMT", "version": "v1" } ]
"2023-08-22T00:00:00"
[ [ "Maipradit", "Rungroj", "" ], [ "Wang", "Dong", "" ], [ "Thongtanunam", "Patanamon", "" ], [ "Kula", "Raula Gaikovina", "" ], [ "Kamei", "Yasutaka", "" ], [ "McIntosh", "Shane", "" ] ]
1new_dataset
2402.12797
Guoqing Zhang
Guoqing Zhang and Yang Li
A Geometric Algorithm for Tubular Shape Reconstruction from Skeletal Representation
9 pages (without reference), 6 figures
null
null
null
cs.CV cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel approach for the reconstruction of tubular shapes from skeletal representations. Our method processes all skeletal points as a whole, eliminating the need for splitting input structure into multiple segments. We represent the tubular shape as a truncated signed distance function (TSDF) in a voxel hashing manner, in which the signed distance between a voxel center and the object is computed through a simple geometric algorithm. Our method does not involve any surface sampling scheme or solving large matrix equations, and therefore is a faster and more elegant solution for tubular shape reconstruction compared to other approaches. Experiments demonstrate the efficiency and effectiveness of the proposed method. Code is avaliable at https://github.com/wlsdzyzl/Dragon.
[ { "created": "Tue, 20 Feb 2024 08:14:53 GMT", "version": "v1" }, { "created": "Sat, 11 May 2024 07:17:52 GMT", "version": "v2" }, { "created": "Mon, 1 Jul 2024 15:46:25 GMT", "version": "v3" } ]
"2024-07-02T00:00:00"
[ [ "Zhang", "Guoqing", "" ], [ "Li", "Yang", "" ] ]
0no_new_dataset
1910.04919
Yongsheng Gao
Bin Wang, Yongsheng Gao, Xiaohan Yu, Xiaohui Yuan, Shengwu Xiong, Xianzhong Feng
From Species to Cultivar: Soybean Cultivar Recognition using Multiscale Sliding Chord Matching of Leaf Images
33 pages, 8 figures
null
null
null
cs.CV cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Leaf image recognition techniques have been actively researched for plant species identification. However it remains unclear whether leaf patterns can provide sufficient information for cultivar recognition. This paper reports the first attempt on soybean cultivar recognition from plant leaves which is not only a challenging research problem but also important for soybean cultivar evaluation, selection and production in agriculture. In this paper, we propose a novel multiscale sliding chord matching (MSCM) approach to extract leaf patterns that are distinctive for soybean cultivar identification. A chord is defined to slide along the contour for measuring the synchronised patterns of exterior shape and interior appearance of soybean leaf images. A multiscale sliding chord strategy is developed to extract features in a coarse-to-fine hierarchical order. A joint description that integrates the leaf descriptors from different parts of a soybean plant is proposed for further enhancing the discriminative power of cultivar description. We built a cultivar leaf image database, SoyCultivar, consisting of 1200 sample leaf images from 200 soybean cultivars for performance evaluation. Encouraging experimental results of the proposed method in comparison to the state-of-the-art leaf species recognition methods demonstrate the availability of cultivar information in soybean leaves and effectiveness of the proposed MSCM for soybean cultivar identification, which may advance the research in leaf recognition from species to cultivar.
[ { "created": "Fri, 11 Oct 2019 00:21:43 GMT", "version": "v1" } ]
"2019-10-14T00:00:00"
[ [ "Wang", "Bin", "" ], [ "Gao", "Yongsheng", "" ], [ "Yu", "Xiaohan", "" ], [ "Yuan", "Xiaohui", "" ], [ "Xiong", "Shengwu", "" ], [ "Feng", "Xianzhong", "" ] ]
1new_dataset
1606.00001
Tom Portegys
Thomas E. Portegys
Graph isomorphism testing boosted by path coloring
arXiv admin note: text overlap with arXiv:1512.07263
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method for improving the efficiency of graph isomorphism testing is presented. The method uses the structure of the graph colored by vertex hash codes as a means of partitioning vertices into equivalence classes, which in turn reduces the combinatorial burden of isomorphism testing. Unrolling the graph into a tree at each vertex allows structurally different regular graphs to be discriminated, a capability that the color refinement algorithm cannot do.
[ { "created": "Mon, 30 May 2016 21:04:19 GMT", "version": "v1" } ]
"2016-06-02T00:00:00"
[ [ "Portegys", "Thomas E.", "" ] ]
0no_new_dataset
2404.16860
Matthew Sigit
Matthew Sigit
To what extent are multiple pendulum systems viable in pseudo-random number generation?
21 Pages
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
This paper explores the development and viability of an alternative pseudorandom number generator (PRNG) that leverages the chaotic dynamics of multiple pendulum systems. Some traditional PRNGs, notably the one implemented in the Java.Random class, suffer from predictability which gives rise to exploitability. This study identifies these vulnerabilities and proposes a novel PRNG designed using ordinary differential equations, physics modeling, and chaos theory. The performance of the new PRNG is then tested against Java's standard PRNGs using the NIST Statistical Test Suite, which evaluates randomness through comprehensive statistical testing. Results indicate that the multiple pendulum-based PRNG not only offers enhanced security by generating less predictable number sequences but also demonstrates potential for efficiency improvements in applications requiring high levels of entropy. The findings suggest that integrating chaotic physics-based systems into PRNGs, such as the double-pendulum system tested in this study, could strengthen cryptographic practices and security protocols for applications that do not require the level of security created by true random number generators, which is useful in fields such as gaming.
[ { "created": "Mon, 15 Apr 2024 00:28:51 GMT", "version": "v1" } ]
"2024-04-29T00:00:00"
[ [ "Sigit", "Matthew", "" ] ]
1new_dataset
1810.01238
Bhaskar Ray Chaudhury Mr.
Karl Bringmann, Bhaskar Ray Chaudhury
Sketching, Streaming, and Fine-Grained Complexity of (Weighted) LCS
To appear in FSTTCS 2018
null
null
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
We study sketching and streaming algorithms for the Longest Common Subsequence problem (LCS) on strings of small alphabet size $|\Sigma|$. For the problem of deciding whether the LCS of strings $x,y$ has length at least $L$, we obtain a sketch size and streaming space usage of $\mathcal{O}(L^{|\Sigma| - 1} \log L)$. We also prove matching unconditional lower bounds. As an application, we study a variant of LCS where each alphabet symbol is equipped with a weight that is given as input, and the task is to compute a common subsequence of maximum total weight. Using our sketching algorithm, we obtain an $\mathcal{O}(\textrm{min}\{nm, n + m^{{\lvert \Sigma \rvert}}\})$-time algorithm for this problem, on strings $x,y$ of length $n,m$, with $n \ge m$. We prove optimality of this running time up to lower order factors, assuming the Strong Exponential Time Hypothesis.
[ { "created": "Tue, 2 Oct 2018 13:42:21 GMT", "version": "v1" } ]
"2018-10-03T00:00:00"
[ [ "Bringmann", "Karl", "" ], [ "Chaudhury", "Bhaskar Ray", "" ] ]
0no_new_dataset
2302.09167
Weizi Li
Michael Villarreal, Bibek Poudel, Jia Pan, Weizi Li
Mixed Traffic Control and Coordination from Pixels
Accepted to IEEE International Conference on Robotics and Automation (ICRA), 2024
null
null
null
cs.MA cs.LG cs.RO
http://creativecommons.org/licenses/by/4.0/
Traffic congestion is a persistent problem in our society. Previous methods for traffic control have proven futile in alleviating current congestion levels leading researchers to explore ideas with robot vehicles given the increased emergence of vehicles with different levels of autonomy on our roads. This gives rise to mixed traffic control, where robot vehicles regulate human-driven vehicles through reinforcement learning (RL). However, most existing studies use precise observations that require domain expertise and hand engineering for each road network's observation space. Additionally, precise observations use global information, such as environment outflow, and local information, i.e., vehicle positions and velocities. Obtaining this information requires updating existing road infrastructure with vast sensor environments and communication to potentially unwilling human drivers. We consider image observations, a modality that has not been extensively explored for mixed traffic control via RL, as the alternative: 1) images do not require a complete re-imagination of the observation space from environment to environment; 2) images are ubiquitous through satellite imagery, in-car camera systems, and traffic monitoring systems; and 3) images only require communication to equipment. In this work, we show robot vehicles using image observations can achieve competitive performance to using precise information on environments, including ring, figure eight, intersection, merge, and bottleneck. In certain scenarios, our approach even outperforms using precision observations, e.g., up to 8% increase in average vehicle velocity in the merge environment, despite only using local traffic information as opposed to global traffic information.
[ { "created": "Fri, 17 Feb 2023 22:40:07 GMT", "version": "v1" }, { "created": "Tue, 13 Jun 2023 20:01:50 GMT", "version": "v2" }, { "created": "Mon, 25 Sep 2023 21:56:51 GMT", "version": "v3" }, { "created": "Mon, 5 Feb 2024 18:35:36 GMT", "version": "v4" } ]
"2024-02-06T00:00:00"
[ [ "Villarreal", "Michael", "" ], [ "Poudel", "Bibek", "" ], [ "Pan", "Jia", "" ], [ "Li", "Weizi", "" ] ]
0no_new_dataset
2403.06551
Yuanhang Zheng
Yuanhang Zheng, Peng Li, Wei Liu, Yang Liu, Jian Luan and Bin Wang
ToolRerank: Adaptive and Hierarchy-Aware Reranking for Tool Retrieval
This paper is accepted for LREC-COLING 2024
In Proceedings of LREC-COLING 2024, pages 16263-16273
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tool learning aims to extend the capabilities of large language models (LLMs) with external tools. A major challenge in tool learning is how to support a large number of tools, including unseen tools. To address this challenge, previous studies have proposed retrieving suitable tools for the LLM based on the user query. However, previously proposed methods do not consider the differences between seen and unseen tools, nor do they take the hierarchy of the tool library into account, which may lead to suboptimal performance for tool retrieval. Therefore, to address the aforementioned issues, we propose ToolRerank, an adaptive and hierarchy-aware reranking method for tool retrieval to further refine the retrieval results. Specifically, our proposed ToolRerank includes Adaptive Truncation, which truncates the retrieval results related to seen and unseen tools at different positions, and Hierarchy-Aware Reranking, which makes retrieval results more concentrated for single-tool queries and more diverse for multi-tool queries. Experimental results show that ToolRerank can improve the quality of the retrieval results, leading to better execution results generated by the LLM.
[ { "created": "Mon, 11 Mar 2024 09:52:32 GMT", "version": "v1" } ]
"2024-06-12T00:00:00"
[ [ "Zheng", "Yuanhang", "" ], [ "Li", "Peng", "" ], [ "Liu", "Wei", "" ], [ "Liu", "Yang", "" ], [ "Luan", "Jian", "" ], [ "Wang", "Bin", "" ] ]
0no_new_dataset
1503.09062
Emilio Coppa
Emilio Coppa, Irene Finocchi
On data skewness, stragglers, and MapReduce progress indicators
null
null
null
null
cs.DC cs.PF cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We tackle the problem of predicting the performance of MapReduce applications, designing accurate progress indicators that keep programmers informed on the percentage of completed computation time during the execution of a job. Through extensive experiments, we show that state-of-the-art progress indicators (including the one provided by Hadoop) can be seriously harmed by data skewness, load unbalancing, and straggling tasks. This is mainly due to their implicit assumption that the running time depends linearly on the input size. We thus design a novel profile-guided progress indicator, called NearestFit, that operates without the linear hypothesis assumption and exploits a careful combination of nearest neighbor regression and statistical curve fitting techniques. Our theoretical progress model requires fine-grained profile data, that can be very difficult to manage in practice. To overcome this issue, we resort to computing accurate approximations for some of the quantities used in our model through space- and time-efficient data streaming algorithms. We implemented NearestFit on top of Hadoop 2.6.0. An extensive empirical assessment over the Amazon EC2 platform on a variety of real-world benchmarks shows that NearestFit is practical w.r.t. space and time overheads and that its accuracy is generally very good, even in scenarios where competitors incur non-negligible errors and wide prediction fluctuations. Overall, NearestFit significantly improves the current state-of-art on progress analysis for MapReduce.
[ { "created": "Tue, 31 Mar 2015 14:29:13 GMT", "version": "v1" }, { "created": "Thu, 2 Apr 2015 15:55:15 GMT", "version": "v2" } ]
"2015-04-03T00:00:00"
[ [ "Coppa", "Emilio", "" ], [ "Finocchi", "Irene", "" ] ]
0no_new_dataset
1301.2820
Eugenio Culurciello Eugenio Culurciello
Eugenio Culurciello, Jordan Bates, Aysegul Dundar, Jose Carrasco, Clement Farabet
Clustering Learning for Robotic Vision
Code for this paper is available here: https://github.com/culurciello/CL_paper1_code
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the clustering learning technique applied to multi-layer feedforward deep neural networks. We show that this unsupervised learning technique can compute network filters with only a few minutes and a much reduced set of parameters. The goal of this paper is to promote the technique for general-purpose robotic vision systems. We report its use in static image datasets and object tracking datasets. We show that networks trained with clustering learning can outperform large networks trained for many hours on complex datasets.
[ { "created": "Sun, 13 Jan 2013 20:49:30 GMT", "version": "v1" }, { "created": "Wed, 23 Jan 2013 14:53:21 GMT", "version": "v2" }, { "created": "Wed, 13 Mar 2013 22:48:38 GMT", "version": "v3" } ]
"2013-03-15T00:00:00"
[ [ "Culurciello", "Eugenio", "" ], [ "Bates", "Jordan", "" ], [ "Dundar", "Aysegul", "" ], [ "Carrasco", "Jose", "" ], [ "Farabet", "Clement", "" ] ]
1new_dataset
1401.4339
Abhishek Bichhawat
Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
Information Flow Control in WebKit's JavaScript Bytecode
null
null
null
null
cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Websites today routinely combine JavaScript from multiple sources, both trusted and untrusted. Hence, JavaScript security is of paramount importance. A specific interesting problem is information flow control (IFC) for JavaScript. In this paper, we develop, formalize and implement a dynamic IFC mechanism for the JavaScript engine of a production Web browser (specifically, Safari's WebKit engine). Our IFC mechanism works at the level of JavaScript bytecode and hence leverages years of industrial effort on optimizing both the source to bytecode compiler and the bytecode interpreter. We track both explicit and implicit flows and observe only moderate overhead. Working with bytecode results in new challenges including the extensive use of unstructured control flow in bytecode (which complicates lowering of program context taints), unstructured exceptions (which complicate the matter further) and the need to make IFC analysis permissive. We explain how we address these challenges, formally model the JavaScript bytecode semantics and our instrumentation, prove the standard property of termination-insensitive non-interference, and present experimental results on an optimized prototype.
[ { "created": "Fri, 17 Jan 2014 13:38:08 GMT", "version": "v1" }, { "created": "Tue, 21 Jan 2014 09:01:09 GMT", "version": "v2" } ]
"2014-01-22T00:00:00"
[ [ "Bichhawat", "Abhishek", "" ], [ "Rajani", "Vineet", "" ], [ "Garg", "Deepak", "" ], [ "Hammer", "Christian", "" ] ]
0no_new_dataset
2302.03169
Sang Michael Xie
Sang Michael Xie, Shibani Santurkar, Tengyu Ma, Percy Liang
Data Selection for Language Models via Importance Resampling
NeurIPS 2023
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Selecting a suitable pretraining dataset is crucial for both general-domain (e.g., GPT-3) and domain-specific (e.g., Codex) language models (LMs). We formalize this problem as selecting a subset of a large raw unlabeled dataset to match a desired target distribution given unlabeled target samples. Due to the scale and dimensionality of the raw text data, existing methods use simple heuristics or require human experts to manually curate data. Instead, we extend the classic importance resampling approach used in low-dimensions for LM data selection. We propose Data Selection with Importance Resampling (DSIR), an efficient and scalable framework that estimates importance weights in a reduced feature space for tractability and selects data with importance resampling according to these weights. We instantiate the DSIR framework with hashed n-gram features for efficiency, enabling the selection of 100M documents from the full Pile dataset in 4.5 hours. To measure whether hashed n-gram features preserve the aspects of the data that are relevant to the target, we define KL reduction, a data metric that measures the proximity between the selected pretraining data and the target on some feature space. Across 8 data selection methods (including expert selection), KL reduction on hashed n-gram features highly correlates with average downstream accuracy (r=0.82). When selecting data for continued pretraining on a specific domain, DSIR performs comparably to expert curation across 8 target distributions. When pretraining general-domain models (target is Wikipedia and books), DSIR improves over random selection and heuristic filtering baselines by 2-2.5% on the GLUE benchmark. Code is available at https://github.com/p-lambda/dsir.
[ { "created": "Mon, 6 Feb 2023 23:57:56 GMT", "version": "v1" }, { "created": "Tue, 24 Oct 2023 17:39:05 GMT", "version": "v2" }, { "created": "Sat, 18 Nov 2023 21:33:01 GMT", "version": "v3" } ]
"2023-11-21T00:00:00"
[ [ "Xie", "Sang Michael", "" ], [ "Santurkar", "Shibani", "" ], [ "Ma", "Tengyu", "" ], [ "Liang", "Percy", "" ] ]
1new_dataset
2402.18540
Haoyu Zhao
Kaifeng Lyu, Haoyu Zhao, Xinran Gu, Dingli Yu, Anirudh Goyal, Sanjeev Arora
Keeping LLMs Aligned After Fine-tuning: The Crucial Role of Prompt Templates
20 pages
null
null
null
cs.LG cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Public LLMs such as the Llama 2-Chat have driven huge activity in LLM research. These models underwent alignment training and were considered safe. Recently Qi et al. (2023) reported that even benign fine-tuning (e.g., on seemingly safe datasets) can give rise to unsafe behaviors in the models. The current paper is about methods and best practices to mitigate such loss of alignment. Through extensive experiments on several chat models (Meta's Llama 2-Chat, Mistral AI's Mistral 7B Instruct v0.2, and OpenAI's GPT-3.5 Turbo), this paper uncovers that the prompt templates used during fine-tuning and inference play a crucial role in preserving safety alignment, and proposes the "Pure Tuning, Safe Testing" (PTST) principle -- fine-tune models without a safety prompt, but include it at test time. Fine-tuning experiments on GSM8K, ChatDoctor, and OpenOrca show that PTST significantly reduces the rise of unsafe behaviors, and even almost eliminates them in some cases.
[ { "created": "Wed, 28 Feb 2024 18:23:49 GMT", "version": "v1" } ]
"2024-02-29T00:00:00"
[ [ "Lyu", "Kaifeng", "" ], [ "Zhao", "Haoyu", "" ], [ "Gu", "Xinran", "" ], [ "Yu", "Dingli", "" ], [ "Goyal", "Anirudh", "" ], [ "Arora", "Sanjeev", "" ] ]
1new_dataset
2202.03524
Lam Nguyen
Lam M. Nguyen, Trang H. Tran, Marten van Dijk
Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution
null
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) have shown great success in many machine learning tasks. Their training is challenging since the loss surface of the network architecture is generally non-convex, or even non-smooth. How and under what assumptions is guaranteed convergence to a \textit{global} minimum possible? We propose a reformulation of the minimization problem allowing for a new recursive algorithmic framework. By using bounded style assumptions, we prove convergence to an $\varepsilon$-(global) minimum using $\mathcal{\tilde{O}}(1/\varepsilon^3)$ gradient computations. Our theoretical foundation motivates further study, implementation, and optimization of the new algorithmic framework and further investigation of its non-standard bounded style assumptions. This new direction broadens our understanding of why and under what circumstances training of a DNN converges to a global minimum.
[ { "created": "Mon, 7 Feb 2022 21:23:16 GMT", "version": "v1" } ]
"2022-02-09T00:00:00"
[ [ "Nguyen", "Lam M.", "" ], [ "Tran", "Trang H.", "" ], [ "van Dijk", "Marten", "" ] ]
0no_new_dataset
2310.06414
Chen Zhuang
Chen Zhuang and Hongbo Zhao
Plane Constraints Aided Multi-Vehicle Cooperative Positioning Using Factor Graph Optimization
14 pages, 16 figures, IEEE trans on ITS
null
null
null
cs.RO cs.SY eess.SP eess.SY
http://creativecommons.org/licenses/by/4.0/
The development of vehicle-to-vehicle (V2V) communication facil-itates the study of cooperative positioning (CP) techniques for vehicular applications. The CP methods can improve the posi-tioning availability and accuracy by inter-vehicle ranging and data exchange between vehicles. However, the inter-vehicle rang-ing can be easily interrupted due to many factors such as obsta-cles in-between two cars. Without inter-vehicle ranging, the other cooperative data such as vehicle positions will be wasted, leading to performance degradation of range-based CP methods. To fully utilize the cooperative data and mitigate the impact of inter-vehicle ranging loss, a novel cooperative positioning method aided by plane constraints is proposed in this paper. The positioning results received from cooperative vehicles are used to construct the road plane for each vehicle. The plane parameters are then introduced into CP scheme to impose constraints on positioning solutions. The state-of-art factor graph optimization (FGO) algo-rithm is employed to integrate the plane constraints with raw data of Global Navigation Satellite Systems (GNSS) as well as inter-vehicle ranging measurements. The proposed CP method has the ability to resist the interruptions of inter-vehicle ranging since the plane constraints are computed by just using position-related data. A vehicle can still benefit from the position data of cooperative vehicles even if the inter-vehicle ranging is unavaila-ble. The experimental results indicate the superiority of the pro-posed CP method in positioning performance over the existing methods, especially when the inter-ranging interruptions occur.
[ { "created": "Tue, 10 Oct 2023 08:31:33 GMT", "version": "v1" } ]
"2023-10-11T00:00:00"
[ [ "Zhuang", "Chen", "" ], [ "Zhao", "Hongbo", "" ] ]
0no_new_dataset
2204.11942
Jonah Casebeer
Jonah Casebeer, Nicholas J. Bryan, Paris Smaragdis
Meta-AF: Meta-Learning for Adaptive Filters
Accepted to ACM/IEEE TASLP. Source code and audio examples: https://jmcasebeer.github.io/projects/metaaf
null
null
null
cs.SD eess.AS eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adaptive filtering algorithms are pervasive throughout signal processing and have had a material impact on a wide variety of domains including audio processing, telecommunications, biomedical sensing, astrophysics and cosmology, seismology, and many more. Adaptive filters typically operate via specialized online, iterative optimization methods such as least-mean squares or recursive least squares and aim to process signals in unknown or nonstationary environments. Such algorithms, however, can be slow and laborious to develop, require domain expertise to create, and necessitate mathematical insight for improvement. In this work, we seek to improve upon hand-derived adaptive filter algorithms and present a comprehensive framework for learning online, adaptive signal processing algorithms or update rules directly from data. To do so, we frame the development of adaptive filters as a meta-learning problem in the context of deep learning and use a form of self-supervision to learn online iterative update rules for adaptive filters. To demonstrate our approach, we focus on audio applications and systematically develop meta-learned adaptive filters for five canonical audio problems including system identification, acoustic echo cancellation, blind equalization, multi-channel dereverberation, and beamforming. We compare our approach against common baselines and/or recent state-of-the-art methods. We show we can learn high-performing adaptive filters that operate in real-time and, in most cases, significantly outperform each method we compare against -- all using a single general-purpose configuration of our approach.
[ { "created": "Mon, 25 Apr 2022 19:44:24 GMT", "version": "v1" }, { "created": "Mon, 21 Nov 2022 19:12:36 GMT", "version": "v2" } ]
"2022-11-23T00:00:00"
[ [ "Casebeer", "Jonah", "" ], [ "Bryan", "Nicholas J.", "" ], [ "Smaragdis", "Paris", "" ] ]
0no_new_dataset
1009.5949
Gam Nguyen
Gam D. Nguyen
Fast CRCs (Extended Version)
64 pages, 43 figures, an extended version of a published journal paper
G.D. Nguyen, "Fast CRCs," IEEE Transactions on Computers, vol. 58, no. 10, pp. 1321-1331, Oct. 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CRCs have desirable properties for effective error detection. But their software implementation, which relies on many steps of the polynomial division, is typically slower than other codes such as weaker checksums. A relevant question is whether there are some particular CRCs that have fast implementation. In this paper, we introduce such fast CRCs as well as an effective technique to implement them. For these fast CRCs, even without using table lookup, it is possible either to eliminate or to greatly reduce many steps of the polynomial division during their computation.
[ { "created": "Wed, 29 Sep 2010 17:26:42 GMT", "version": "v1" } ]
"2010-09-30T00:00:00"
[ [ "Nguyen", "Gam D.", "" ] ]
0no_new_dataset
2209.03714
Wafaa Mohammed
Wafaa Mohammed, Hassan Shahmohammadi, Hendrik P. A. Lensch, R. Harald Baayen
Visual Grounding of Inter-lingual Word-Embeddings
- added more results - paper accepted to appear at UM-IoS workshop, EMNLP 2022
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual grounding of Language aims at enriching textual representations of language with multiple sources of visual knowledge such as images and videos. Although visual grounding is an area of intense research, inter-lingual aspects of visual grounding have not received much attention. The present study investigates the inter-lingual visual grounding of word embeddings. We propose an implicit alignment technique between the two spaces of vision and language in which inter-lingual textual information interacts in order to enrich pre-trained textual word embeddings. We focus on three languages in our experiments, namely, English, Arabic, and German. We obtained visually grounded vector representations for these languages and studied whether visual grounding on one or multiple languages improved the performance of embeddings on word similarity and categorization benchmarks. Our experiments suggest that inter-lingual knowledge improves the performance of grounded embeddings in similar languages such as German and English. However, inter-lingual grounding of German or English with Arabic led to a slight degradation in performance on word similarity benchmarks. On the other hand, we observed an opposite trend on categorization benchmarks where Arabic had the most improvement on English. In the discussion section, several reasons for those findings are laid out. We hope that our experiments provide a baseline for further research on inter-lingual visual grounding.
[ { "created": "Thu, 8 Sep 2022 11:18:39 GMT", "version": "v1" }, { "created": "Mon, 21 Nov 2022 14:16:03 GMT", "version": "v2" } ]
"2022-11-22T00:00:00"
[ [ "Mohammed", "Wafaa", "" ], [ "Shahmohammadi", "Hassan", "" ], [ "Lensch", "Hendrik P. A.", "" ], [ "Baayen", "R. Harald", "" ] ]
0no_new_dataset
1403.0982
Shahrzad Shirazipourazad
Shahrzad Shirazipourazad, Pavel Ghosh and Arunabha Sen
On Connectivity of Airborne Networks
The section on Computation of Critical Transmission Range In Faculty Scenario has been published in proceedings of Milcom 2011: S. Shirazipourazad, P. Ghosh and A. Sen, On Connectivity of Airborne Networks in Presence of Region-based Faults, IEEE Milcom, Military Communications Conference, Baltimore, MD, 2011
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobility pattern of nodes in a mobile network has significant impact on the connectivity properties of the network. One such mobile network that has drawn attention of researchers in the past few years is the Airborne Networks (AN) due to its importance in civil and military purpose and due to the several complex issues in these domains. Since the nodes in an airborne network (AN) are heterogeneous and mobile, the design of a reliable and robust AN is highly complex and challenging. In this paper a persistent backbone based architecture for an AN has been considered where a set of airborne networking platforms (ANPs - aircrafts, UAVs and satellites) form the backbone of the AN. End to end connectivity of the backbone nodes is crucial in providing the communication among the hosts. Since ANPs are prone to failure because of attacks like EMP attack or jamming, another important issue is to improve the robustness of the backbone network against these attacks. Such attacks will impact specific geographic regions at specific times and if an ANP is within the fault region during the time of attack, it will fail. This paper focuses on connectivity and fault-tolerance issues in ANs and studies algorithms to compute the minimum transmission range of ANPs in fault free and faulty scenarios to ensure network connectivity all the times. It also considers the scenario where the network may have to operate in a disconnected mode for some part of time and data transmissions may be tolerant to some amount of delay. Hence, ANPs may not need to have end-to-end paths all the time but they should be able to transmit data to each other within bounded time.
[ { "created": "Wed, 5 Mar 2014 01:28:19 GMT", "version": "v1" } ]
"2014-03-06T00:00:00"
[ [ "Shirazipourazad", "Shahrzad", "" ], [ "Ghosh", "Pavel", "" ], [ "Sen", "Arunabha", "" ] ]
0no_new_dataset
1808.10209
Nicola Gatti
Matteo Castiglioni, Alberto Marchesi, Nicola Gatti, Stefano Coniglio
Leadership in Singleton Congestion Games: What is Hard and What is Easy
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of computing Stackelberg equilibria Stackelberg games whose underlying structure is in congestion games, focusing on the case where each player can choose a single resource (a.k.a. singleton congestion games) and one of them acts as leader. In particular, we address the cases where the players either have the same action spaces (i.e., the set of resources they can choose is the same for all of them) or different ones, and where their costs are either monotonic functions of the resource congestion or not. We show that, in the case where the players have different action spaces, the cost the leader incurs in a Stackelberg equilibrium cannot be approximated in polynomial time up to within any polynomial factor in the size of the game unless P = NP, independently of the cost functions being monotonic or not. We show that a similar result also holds when the players have nonmonotonic cost functions, even if their action spaces are the same. Differently, we prove that the case with identical action spaces and monotonic cost functions is easy, and propose polynomial-time algorithm for it. We also improve an algorithm for the computation of a socially optimal equilibrium in singleton congestion games with the same action spaces without leadership, and extend it to the computation of a Stackelberg equilibrium for the case where the leader is restricted to pure strategies. For the cases in which the problem of finding an equilibrium is hard, we show how, in the optimistic setting where the followers break ties in favor of the leader, the problem can be formulated via mixed-integer linear programming techniques, which computational experiments show to scale quite well.
[ { "created": "Thu, 30 Aug 2018 10:17:47 GMT", "version": "v1" } ]
"2018-08-31T00:00:00"
[ [ "Castiglioni", "Matteo", "" ], [ "Marchesi", "Alberto", "" ], [ "Gatti", "Nicola", "" ], [ "Coniglio", "Stefano", "" ] ]
0no_new_dataset
1910.06019
Nathan Lhote
Paulin Fournier and Nathan Lhote
Equivalence kernels of sequential functions and sequential observation synthesis
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that one can decide if a rational equivalence relation can be given as the equivalence kernel of a sequential letter-to-letter transduction. This problem comes from the setting of games with imperfect information. In [1, p. 6] the authors propose to model imperfect information by a rational equivalence relation and leave open the problem of deciding if one can synthesize a sequential letter-to-letter transducer (Mealy machine) which maps equivalent histories to the same sequence of observations. We also show that knowing if an equivalence relation can be given as the equivalence kernel of a sequential transducer is undecidable, even if the relation is given as a letter-to-letter transducer.
[ { "created": "Mon, 14 Oct 2019 09:58:24 GMT", "version": "v1" } ]
"2019-10-15T00:00:00"
[ [ "Fournier", "Paulin", "" ], [ "Lhote", "Nathan", "" ] ]
0no_new_dataset
1807.07875
Valentin W\"ustholz
Valentin W\"ustholz, Maria Christakis
Learning Inputs in Greybox Fuzzing
null
null
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Greybox fuzzing is a lightweight testing approach that effectively detects bugs and security vulnerabilities. However, greybox fuzzers randomly mutate program inputs to exercise new paths; this makes it challenging to cover code that is guarded by complex checks. In this paper, we present a technique that extends greybox fuzzing with a method for learning new inputs based on already explored program executions. These inputs can be learned such that they guide exploration toward specific executions, for instance, ones that increase path coverage or reveal vulnerabilities. We have evaluated our technique and compared it to traditional greybox fuzzing on 26 real-world benchmarks. In comparison, our technique significantly increases path coverage (by up to 3X) and detects more bugs (up to 38% more), often orders-of-magnitude faster.
[ { "created": "Fri, 20 Jul 2018 14:43:32 GMT", "version": "v1" } ]
"2018-07-23T00:00:00"
[ [ "Wüstholz", "Valentin", "" ], [ "Christakis", "Maria", "" ] ]
0no_new_dataset
2001.04686
Amir Hadifar
Amir Hadifar, Johannes Deleu, Chris Develder, and Thomas Demeester
Block-wise Dynamic Sparseness
null
null
10.1016/j.patrec.2021.08.013
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural networks have achieved state of the art performance across a wide variety of machine learning tasks, often with large and computation-heavy models. Inducing sparseness as a way to reduce the memory and computation footprint of these models has seen significant research attention in recent years. In this paper, we present a new method for \emph{dynamic sparseness}, whereby part of the computations are omitted dynamically, based on the input. For efficiency, we combined the idea of dynamic sparseness with block-wise matrix-vector multiplications. In contrast to static sparseness, which permanently zeroes out selected positions in weight matrices, our method preserves the full network capabilities by potentially accessing any trained weights. Yet, matrix vector multiplications are accelerated by omitting a pre-defined fraction of weight blocks from the matrix, based on the input. Experimental results on the task of language modeling, using recurrent and quasi-recurrent models, show that the proposed method can outperform a magnitude-based static sparseness baseline. In addition, our method achieves similar language modeling perplexities as the dense baseline, at half the computational cost at inference time.
[ { "created": "Tue, 14 Jan 2020 10:03:21 GMT", "version": "v1" } ]
"2022-10-21T00:00:00"
[ [ "Hadifar", "Amir", "" ], [ "Deleu", "Johannes", "" ], [ "Develder", "Chris", "" ], [ "Demeester", "Thomas", "" ] ]
0no_new_dataset
2305.10082
Hao Yang
Hao Yang, Junyu Gao, Yuan Yuan and Xuelong Li
Imbalanced Aircraft Data Anomaly Detection
10 pages, 7 figures
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Anomaly detection in temporal data from sensors under aviation scenarios is a practical but challenging task: 1) long temporal data is difficult to extract contextual information with temporal correlation; 2) the anomalous data are rare in time series, causing normal/abnormal imbalance in anomaly detection, making the detector classification degenerate or even fail. To remedy the aforementioned problems, we propose a Graphical Temporal Data Analysis (GTDA) framework. It consists three modules, named Series-to-Image (S2I), Cluster-based Resampling Approach using Euclidean Distance (CRD) and Variance-Based Loss (VBL). Specifically, for better extracts global information in temporal data from sensors, S2I converts the data to curve images to demonstrate abnormalities in data changes. CRD and VBL balance the classification to mitigate the unequal distribution of classes. CRD extracts minority samples with similar features to majority samples by clustering and over-samples them. And VBL fine-tunes the decision boundary by balancing the fitting degree of the network to each class. Ablation experiments on the Flights dataset indicate the effectiveness of CRD and VBL on precision and recall, respectively. Extensive experiments demonstrate the synergistic advantages of CRD and VBL on F1-score on Flights and three other temporal datasets.
[ { "created": "Wed, 17 May 2023 09:37:07 GMT", "version": "v1" } ]
"2023-05-18T00:00:00"
[ [ "Yang", "Hao", "" ], [ "Gao", "Junyu", "" ], [ "Yuan", "Yuan", "" ], [ "Li", "Xuelong", "" ] ]
1new_dataset
2207.13064
Trisha Mittal
Trisha Mittal, Ritwik Sinha, Viswanathan Swaminathan, John Collomosse, Dinesh Manocha
Video Manipulations Beyond Faces: A Dataset with Human-Machine Analysis
Accepted to WACV2023 - Workshop on Manipulation, Adversarial, and Presentation Attacks in Biometrics
null
null
null
cs.CV cs.AI cs.MM
http://creativecommons.org/licenses/by/4.0/
As tools for content editing mature, and artificial intelligence (AI) based algorithms for synthesizing media grow, the presence of manipulated content across online media is increasing. This phenomenon causes the spread of misinformation, creating a greater need to distinguish between ``real'' and ``manipulated'' content. To this end, we present VideoSham, a dataset consisting of 826 videos (413 real and 413 manipulated). Many of the existing deepfake datasets focus exclusively on two types of facial manipulations -- swapping with a different subject's face or altering the existing face. VideoSham, on the other hand, contains more diverse, context-rich, and human-centric, high-resolution videos manipulated using a combination of 6 different spatial and temporal attacks. Our analysis shows that state-of-the-art manipulation detection algorithms only work for a few specific attacks and do not scale well on VideoSham. We performed a user study on Amazon Mechanical Turk with 1200 participants to understand if they can differentiate between the real and manipulated videos in VideoSham. Finally, we dig deeper into the strengths and weaknesses of performances by humans and SOTA-algorithms to identify gaps that need to be filled with better AI algorithms. We present the dataset at https://github.com/adobe-research/VideoSham-dataset.
[ { "created": "Tue, 26 Jul 2022 17:39:04 GMT", "version": "v1" }, { "created": "Wed, 27 Jul 2022 02:50:45 GMT", "version": "v2" }, { "created": "Thu, 8 Dec 2022 01:47:06 GMT", "version": "v3" } ]
"2022-12-09T00:00:00"
[ [ "Mittal", "Trisha", "" ], [ "Sinha", "Ritwik", "" ], [ "Swaminathan", "Viswanathan", "" ], [ "Collomosse", "John", "" ], [ "Manocha", "Dinesh", "" ] ]
1new_dataset
1806.00834
Jonathan Marbaniang
Jonathan Marbaniang, Shekhar Bhandakkar, Sathya Peri
Garbage Collection in Concurrent Sets
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Garbage Collection in concurrent data structures, especially lock-free ones, pose multiple design and consistency challenges. In this instance, we consider the case of concurrent sets. A set is a collection of elements, where the elements are ordered and distinct. These two invariants are always maintained at every point in time. Currently, multiple implementations of concurrent sets already exist. LazyList, Hand-over-hand List and Harris List are some of the well-known implementations. However none of these implementations employ, or are concerned with garbage collection of deleted nodes. Instead each implementation ignores deleted nodes or depends on the garbage collector of the language to handle them. Additionally, Garbage collection in concurrent lists, that use optimistic traversals or that are lock-free, is not trivial. For example, in LazyList and Harris List, they allow a thread to traverse a node or a sequence of nodes after these nodes have already been removed from the list, and hence possibly deleted. If deleted nodes are to be reused, this will potentially lead to the ABA problem. Moreover, some languages like C++ do not have an inbuilt garbage collector. Some constructs like Shared Pointers provide a limited garbage collection facility, but it degrades performance by a large scale. Integrating Shared Pointers into a concurrent code is also not a trivial task. In this paper, we propose a new representation of a concurrent set, GCList, which employs inbuilt garbage collection. We propose a novel garbage collection scheme that implements in-built memory reclamation whereby it reuses deleted nodes from the list. We propose both lock-based and lock-free implementations of GCList. The garbage collection scheme works in parallel with the Set operations.
[ { "created": "Sun, 3 Jun 2018 17:00:12 GMT", "version": "v1" }, { "created": "Sat, 21 Jul 2018 09:19:31 GMT", "version": "v2" } ]
"2018-07-24T00:00:00"
[ [ "Marbaniang", "Jonathan", "" ], [ "Bhandakkar", "Shekhar", "" ], [ "Peri", "Sathya", "" ] ]
1new_dataset
0909.4013
David Monniaux
David Monniaux (VERIMAG - IMAG)
Automatic modular abstractions for template numerical constraints
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for automatically generating abstract transformers for static analysis by abstract interpretation. The method focuses on linear constraints on programs operating on rational, real or floating-point variables and containing linear assignments and tests. In addition to loop-free code, the same method also applies for obtaining least fixed points as functions of the precondition, which permits the analysis of loops and recursive functions. Our algorithms are based on new quantifier elimination and symbolic manipulation techniques. Given the specification of an abstract domain, and a program block, our method automatically outputs an implementation of the corresponding abstract transformer. It is thus a form of program transformation. The motivation of our work is data-flow synchronous programming languages, used for building control-command embedded systems, but it also applies to imperative and functional programming.
[ { "created": "Tue, 22 Sep 2009 14:49:17 GMT", "version": "v1" }, { "created": "Mon, 31 May 2010 06:43:29 GMT", "version": "v2" } ]
"2010-07-28T00:00:00"
[ [ "Monniaux", "David", "", "VERIMAG - IMAG" ] ]
0no_new_dataset
2012.07226
Fatima Tuz Zahra
Alya Hannah Ahmad Kamal, Caryn Chuah Yi Yen, Gan Jia Hui, Pang Sze Ling, Fatima-tuz-Zahra
Risk Assessment, Threat Modeling and Security Testing in SDLC
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
The software development process is considered as one of the key guidelines in the creation of said software and this approach is necessary for providing a more efficient yet satisfactory output. Without separation of work into distinct stages, it may lead to many delays and inefficiency of the project process where this disorganization can directly affect the product quality and reliability. Moreover, with this methodology established as the standard for any project, there are bound to be missteps specifically in regard to the involvement of security due to the lack of awareness. Therefore, the aim of this research is to identify and elaborate the findings and understanding of the security integrated into the process of software development as well as the related individual roles in ensuring that this security is maintained. Through thorough analysis and review of literature, an effort has been made through this paper to showcase the correct processes and ways for securing the software development process. At the same time, certain issues that pertain to this subject have been discussed together with proposing appropriate solutions. Furthermore, in depth discussion is carried out regarding methods such as security testing, risk assessment, threat modeling and other techniques that are able to create a more secure environment and systematic approach in a software development process.
[ { "created": "Mon, 14 Dec 2020 02:56:26 GMT", "version": "v1" } ]
"2020-12-15T00:00:00"
[ [ "Kamal", "Alya Hannah Ahmad", "" ], [ "Yen", "Caryn Chuah Yi", "" ], [ "Hui", "Gan Jia", "" ], [ "Ling", "Pang Sze", "" ], [ "Fatima-tuz-Zahra", "", "" ] ]
0no_new_dataset
2207.03677
Haoran You
Haoran You, Baopu Li, Zhanyi Sun, Xu Ouyang, Yingyan Lin
SuperTickets: Drawing Task-Agnostic Lottery Tickets from Supernets via Jointly Architecture Searching and Parameter Pruning
Accepted by ECCV 2022
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
Neural architecture search (NAS) has demonstrated amazing success in searching for efficient deep neural networks (DNNs) from a given supernet. In parallel, the lottery ticket hypothesis has shown that DNNs contain small subnetworks that can be trained from scratch to achieve a comparable or higher accuracy than original DNNs. As such, it is currently a common practice to develop efficient DNNs via a pipeline of first search and then prune. Nevertheless, doing so often requires a search-train-prune-retrain process and thus prohibitive computational cost. In this paper, we discover for the first time that both efficient DNNs and their lottery subnetworks (i.e., lottery tickets) can be directly identified from a supernet, which we term as SuperTickets, via a two-in-one training scheme with jointly architecture searching and parameter pruning. Moreover, we develop a progressive and unified SuperTickets identification strategy that allows the connectivity of subnetworks to change during supernet training, achieving better accuracy and efficiency trade-offs than conventional sparse training. Finally, we evaluate whether such identified SuperTickets drawn from one task can transfer well to other tasks, validating their potential of handling multiple tasks simultaneously. Extensive experiments and ablation studies on three tasks and four benchmark datasets validate that our proposed SuperTickets achieve boosted accuracy and efficiency trade-offs than both typical NAS and pruning pipelines, regardless of having retraining or not. Codes and pretrained models are available at https://github.com/RICE-EIC/SuperTickets.
[ { "created": "Fri, 8 Jul 2022 03:44:34 GMT", "version": "v1" }, { "created": "Wed, 27 Jul 2022 07:07:34 GMT", "version": "v2" }, { "created": "Thu, 15 Sep 2022 04:34:42 GMT", "version": "v3" }, { "created": "Mon, 19 Dec 2022 03:06:16 GMT", "version": "v4" } ]
"2022-12-20T00:00:00"
[ [ "You", "Haoran", "" ], [ "Li", "Baopu", "" ], [ "Sun", "Zhanyi", "" ], [ "Ouyang", "Xu", "" ], [ "Lin", "Yingyan", "" ] ]
0no_new_dataset
2303.11789
Tao Li
Tao Li and Xiwei Zhang
Random Inverse Problems Over Graphs: Decentralized Online Learning
null
null
null
null
cs.LG cs.DC cs.SY eess.SY math.PR
http://creativecommons.org/licenses/by/4.0/
We establish a framework of distributed random inverse problems over network graphs with online measurements, and propose a decentralized online learning algorithm. This unifies the distributed parameter estimation in Hilbert spaces and the least mean square problem in reproducing kernel Hilbert spaces (RKHS-LMS). We transform the convergence of the algorithm into the asymptotic stability of a class of inhomogeneous random difference equations in Hilbert spaces with L2-bounded martingale difference terms and develop the L2 -asymptotic stability theory in Hilbert spaces. It is shown that if the network graph is connected and the sequence of forward operators satisfies the infinite-dimensional spatio-temporal persistence of excitation condition, then the estimates of all nodes are mean square and almost surely strongly consistent. Moreover, we propose a decentralized online learning algorithm in RKHS based on non-stationary and non-independent online data streams, and prove that the algorithm is mean square and almost surely strongly consistent if the operators induced by the random input data satisfy the infinite-dimensional spatio-temporal persistence of excitation condition.
[ { "created": "Mon, 20 Mar 2023 08:37:08 GMT", "version": "v1" }, { "created": "Thu, 23 Mar 2023 09:05:07 GMT", "version": "v2" }, { "created": "Wed, 5 Jul 2023 00:49:01 GMT", "version": "v3" }, { "created": "Fri, 25 Aug 2023 09:35:30 GMT", "version": "v4" }, { "created": "Wed, 29 May 2024 12:08:02 GMT", "version": "v5" } ]
"2024-05-30T00:00:00"
[ [ "Li", "Tao", "" ], [ "Zhang", "Xiwei", "" ] ]
0no_new_dataset
2306.00559
Rishubh Parihar
Rishubh Parihar, Raghav Magazine, Piyush Tiwari, R. Venkatesh Babu
We never go out of Style: Motion Disentanglement by Subspace Decomposition of Latent Space
AI for content creation, CVPRW-2023
null
null
null
cs.CV cs.AI cs.LG
http://creativecommons.org/licenses/by-sa/4.0/
Real-world objects perform complex motions that involve multiple independent motion components. For example, while talking, a person continuously changes their expressions, head, and body pose. In this work, we propose a novel method to decompose motion in videos by using a pretrained image GAN model. We discover disentangled motion subspaces in the latent space of widely used style-based GAN models that are semantically meaningful and control a single explainable motion component. The proposed method uses only a few $(\approx10)$ ground truth video sequences to obtain such subspaces. We extensively evaluate the disentanglement properties of motion subspaces on face and car datasets, quantitatively and qualitatively. Further, we present results for multiple downstream tasks such as motion editing, and selective motion transfer, e.g. transferring only facial expressions without training for it.
[ { "created": "Thu, 1 Jun 2023 11:18:57 GMT", "version": "v1" } ]
"2023-06-02T00:00:00"
[ [ "Parihar", "Rishubh", "" ], [ "Magazine", "Raghav", "" ], [ "Tiwari", "Piyush", "" ], [ "Babu", "R. Venkatesh", "" ] ]
0no_new_dataset
2002.07306
Ke Tran
Ke Tran
From English To Foreign Languages: Transferring Pre-trained Language Models
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pre-trained models have demonstrated their effectiveness in many downstream natural language processing (NLP) tasks. The availability of multilingual pre-trained models enables zero-shot transfer of NLP tasks from high resource languages to low resource ones. However, recent research in improving pre-trained models focuses heavily on English. While it is possible to train the latest neural architectures for other languages from scratch, it is undesirable due to the required amount of compute. In this work, we tackle the problem of transferring an existing pre-trained model from English to other languages under a limited computational budget. With a single GPU, our approach can obtain a foreign BERT base model within a day and a foreign BERT large within two days. Furthermore, evaluating our models on six languages, we demonstrate that our models are better than multilingual BERT on two zero-shot tasks: natural language inference and dependency parsing.
[ { "created": "Tue, 18 Feb 2020 00:22:54 GMT", "version": "v1" }, { "created": "Wed, 29 Apr 2020 01:16:24 GMT", "version": "v2" } ]
"2020-04-30T00:00:00"
[ [ "Tran", "Ke", "" ] ]
0no_new_dataset
2204.11216
Lee Zhuohao
Zhuohao Li, Fandi Gou, Qixin De, Leqi Ding, Yuanhang Zhang, Yunze Cai
RealNet: Combining Optimized Object Detection with Information Fusion Depth Estimation Co-Design Method on IoT
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Depth Estimation and Object Detection Recognition play an important role in autonomous driving technology under the guidance of deep learning artificial intelligence. We propose a hybrid structure called RealNet: a co-design method combining the model-streamlined recognition algorithm, the depth estimation algorithm with information fusion, and deploying them on the Jetson-Nano for unmanned vehicles with monocular vision sensors. We use ROS for experiment. The method proposed in this paper is suitable for mobile platforms with high real-time request. Innovation of our method is using information fusion to compensate the problem of insufficient frame rate of output image, and improve the robustness of target detection and depth estimation under monocular vision.Object Detection is based on YOLO-v5. We have simplified the network structure of its DarkNet53 and realized a prediction speed up to 0.01s. Depth Estimation is based on the VNL Depth Estimation, which considers multiple geometric constraints in 3D global space. It calculates the loss function by calculating the deviation of the virtual normal vector VN and the label, which can obtain deeper depth information. We use PnP fusion algorithm to solve the problem of insufficient frame rate of depth map output. It solves the motion estimation depth from three-dimensional target to two-dimensional point based on corner feature matching, which is faster than VNL calculation. We interpolate VNL output and PnP output to achieve information fusion. Experiments show that this can effectively eliminate the jitter of depth information and improve robustness. At the control end, this method combines the results of target detection and depth estimation to calculate the target position, and uses a pure tracking control algorithm to track it.
[ { "created": "Sun, 24 Apr 2022 08:35:55 GMT", "version": "v1" } ]
"2022-04-26T00:00:00"
[ [ "Li", "Zhuohao", "" ], [ "Gou", "Fandi", "" ], [ "De", "Qixin", "" ], [ "Ding", "Leqi", "" ], [ "Zhang", "Yuanhang", "" ], [ "Cai", "Yunze", "" ] ]
0no_new_dataset
2310.00847
Atsuyuki Miyai
Atsuyuki Miyai, Qing Yu, Go Irie, Kiyoharu Aizawa
Can Pre-trained Networks Detect Familiar Out-of-Distribution Data?
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Out-of-distribution (OOD) detection is critical for safety-sensitive machine learning applications and has been extensively studied, yielding a plethora of methods developed in the literature. However, most studies for OOD detection did not use pre-trained models and trained a backbone from scratch. In recent years, transferring knowledge from large pre-trained models to downstream tasks by lightweight tuning has become mainstream for training in-distribution (ID) classifiers. To bridge the gap between the practice of OOD detection and current classifiers, the unique and crucial problem is that the samples whose information networks know often come as OOD input. We consider that such data may significantly affect the performance of large pre-trained networks because the discriminability of these OOD data depends on the pre-training algorithm. Here, we define such OOD data as PT-OOD (Pre-Trained OOD) data. In this paper, we aim to reveal the effect of PT-OOD on the OOD detection performance of pre-trained networks from the perspective of pre-training algorithms. To achieve this, we explore the PT-OOD detection performance of supervised and self-supervised pre-training algorithms with linear-probing tuning, the most common efficient tuning method. Through our experiments and analysis, we find that the low linear separability of PT-OOD in the feature space heavily degrades the PT-OOD detection performance, and self-supervised models are more vulnerable to PT-OOD than supervised pre-trained models, even with state-of-the-art detection methods. To solve this vulnerability, we further propose a unique solution to large-scale pre-trained models: Leveraging powerful instance-by-instance discriminative representations of pre-trained models and detecting OOD in the feature space independent of the ID decision boundaries. The code will be available via https://github.com/AtsuMiyai/PT-OOD.
[ { "created": "Mon, 2 Oct 2023 02:01:00 GMT", "version": "v1" }, { "created": "Thu, 12 Oct 2023 08:04:14 GMT", "version": "v2" } ]
"2023-10-13T00:00:00"
[ [ "Miyai", "Atsuyuki", "" ], [ "Yu", "Qing", "" ], [ "Irie", "Go", "" ], [ "Aizawa", "Kiyoharu", "" ] ]
0no_new_dataset
2405.16174
Davide Dardari
Davide Dardari
Dynamic Scattering Arrays for Simultaneous Electromagnetic Processing and Radiation in Holographic MIMO Systems
Submittted to IEEE Trans. on Wireless Communications
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
To meet the stringent requirements of next-generation wireless networks, multiple-input multiple-output (MIMO) technology is expected to become massive and pervasive. Unfortunately, this could pose scalability issues in terms of complexity, power consumption, cost, and processing latency. Therefore, novel technologies and design approaches, such as the recently introduced holographic MIMO paradigm, must be investigated to make future networks sustainable. In this context, we propose the concept of a dynamic scattering array (DSA) as a versatile 3D structure capable of performing joint wave-based computing and radiation by moving the processing from the digital domain to the electromagnetic (EM) domain. We provide a general analytical framework for modeling DSAs, introduce specific design algorithms, and apply them to various use cases. The examples presented in the numerical results demonstrate the potential of DSAs to further reduce complexity and the number of radiofrequency (RF) chains in holographic MIMO systems while achieving enhanced EM wave processing and radiation flexibility for tasks such as beamforming and single- and multi-user MIMO.
[ { "created": "Sat, 25 May 2024 10:52:30 GMT", "version": "v1" } ]
"2024-05-28T00:00:00"
[ [ "Dardari", "Davide", "" ] ]
0no_new_dataset
2102.06317
Stephen MacDonell
Sherlock A. Licorish and Stephen G. MacDonell
Understanding the attitudes, knowledge sharing behaviors and task performance of core developers: A longitudinal study
Journal Paper, 25 pages, 6 figures, 8 tables
Information and Software Technology 56(12), pp.1578-1596. (2014)
10.1016/j.infsof.2014.02.004
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context: Prior research has established that a few individuals generally dominate project communication and source code changes during software development, regardless of task assignments at project initiation. Objective: While this phenomenon has been noted, prior research has not sought to understand these dominant individuals. Previous work has found that core communicators are the gatekeepers of their teams' knowledge, and the performance of these members was correlated with their teams' success. Building on this work, we have employed a longitudinal approach to study the way core developers' attitudes, knowledge sharing behaviors and task performance change over the course of their project. Method: We first used Social Network Analysis (SNA) and standard statistical analysis techniques to identify and select artifacts and central practitioners from ten different software development teams. We then applied psycholinguistic analysis and directed content analysis (CA) techniques to interpret the content of these practitioners' messages. Finally, we inspected core developers' activities at various points in time during systems' development. Results: Among our findings, we observe that core developers' attitudes and knowledge sharing behaviors were linked to their involvement in actual software development and the demands of their wider project teams. However, core developers appeared to naturally possess high levels of insightful characteristics. Conclusion: Project performance would likely benefit from strategies aimed at surrounding core developers with other competent communicators. Core developers should also be supported by a wider team who are willing to ask questions and challenge their ideas. Finally, the availability of adequate communication channels would help with maintaining positive team climate especially in distributed developments.(Abridged)
[ { "created": "Fri, 12 Feb 2021 00:01:57 GMT", "version": "v1" } ]
"2021-02-15T00:00:00"
[ [ "Licorish", "Sherlock A.", "" ], [ "MacDonell", "Stephen G.", "" ] ]
0no_new_dataset
2305.07892
Jun Shu
Jun Shu, Xiang Yuan, Deyu Meng, Zongben Xu
DAC-MR: Data Augmentation Consistency Based Meta-Regularization for Meta-Learning
27 pages
null
null
null
cs.LG cs.AI cs.CV
http://creativecommons.org/licenses/by/4.0/
Meta learning recently has been heavily researched and helped advance the contemporary machine learning. However, achieving well-performing meta-learning model requires a large amount of training tasks with high-quality meta-data representing the underlying task generalization goal, which is sometimes difficult and expensive to obtain for real applications. Current meta-data-driven meta-learning approaches, however, are fairly hard to train satisfactory meta-models with imperfect training tasks. To address this issue, we suggest a meta-knowledge informed meta-learning (MKIML) framework to improve meta-learning by additionally integrating compensated meta-knowledge into meta-learning process. We preliminarily integrate meta-knowledge into meta-objective via using an appropriate meta-regularization (MR) objective to regularize capacity complexity of the meta-model function class to facilitate better generalization on unseen tasks. As a practical implementation, we introduce data augmentation consistency to encode invariance as meta-knowledge for instantiating MR objective, denoted by DAC-MR. The proposed DAC-MR is hopeful to learn well-performing meta-models from training tasks with noisy, sparse or unavailable meta-data. We theoretically demonstrate that DAC-MR can be treated as a proxy meta-objective used to evaluate meta-model without high-quality meta-data. Besides, meta-data-driven meta-loss objective combined with DAC-MR is capable of achieving better meta-level generalization. 10 meta-learning tasks with different network architectures and benchmarks substantiate the capability of our DAC-MR on aiding meta-model learning. Fine performance of DAC-MR are obtained across all settings, and are well-aligned with our theoretical insights. This implies that our DAC-MR is problem-agnostic, and hopeful to be readily applied to extensive meta-learning problems and tasks.
[ { "created": "Sat, 13 May 2023 11:01:47 GMT", "version": "v1" } ]
"2023-05-16T00:00:00"
[ [ "Shu", "Jun", "" ], [ "Yuan", "Xiang", "" ], [ "Meng", "Deyu", "" ], [ "Xu", "Zongben", "" ] ]
0no_new_dataset
2402.10487
Chin-Chia Michael Yeh
Chin-Chia Michael Yeh, Yujie Fan, Xin Dai, Uday Singh Saini, Vivian Lai, Prince Osei Aboagye, Junpeng Wang, Huiyuan Chen, Yan Zheng, Zhongfang Zhuang, Liang Wang, Wei Zhang
RPMixer: Shaking Up Time Series Forecasting with Random Projections for Large Spatial-Temporal Data
null
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/4.0/
Spatial-temporal forecasting systems play a crucial role in addressing numerous real-world challenges. In this paper, we investigate the potential of addressing spatial-temporal forecasting problems using general time series forecasting models, i.e., models that do not leverage the spatial relationships among the nodes. We propose a all-Multi-Layer Perceptron (all-MLP) time series forecasting architecture called RPMixer. The all-MLP architecture was chosen due to its recent success in time series forecasting benchmarks. Furthermore, our method capitalizes on the ensemble-like behavior of deep neural networks, where each individual block within the network behaves like a base learner in an ensemble model, particularly when identity mapping residual connections are incorporated. By integrating random projection layers into our model, we increase the diversity among the blocks' outputs, thereby improving the overall performance of the network. Extensive experiments conducted on the largest spatial-temporal forecasting benchmark datasets demonstrate that the proposed method outperforms alternative methods, including both spatial-temporal graph models and general forecasting models.
[ { "created": "Fri, 16 Feb 2024 07:28:59 GMT", "version": "v1" }, { "created": "Thu, 29 Feb 2024 01:04:15 GMT", "version": "v2" }, { "created": "Sun, 9 Jun 2024 04:54:29 GMT", "version": "v3" }, { "created": "Wed, 12 Jun 2024 08:49:48 GMT", "version": "v4" } ]
"2024-06-13T00:00:00"
[ [ "Yeh", "Chin-Chia Michael", "" ], [ "Fan", "Yujie", "" ], [ "Dai", "Xin", "" ], [ "Saini", "Uday Singh", "" ], [ "Lai", "Vivian", "" ], [ "Aboagye", "Prince Osei", "" ], [ "Wang", "Junpeng", "" ], [ "Chen", "Huiyuan", "" ], [ "Zheng", "Yan", "" ], [ "Zhuang", "Zhongfang", "" ], [ "Wang", "Liang", "" ], [ "Zhang", "Wei", "" ] ]
1new_dataset
2003.12843
Lorenzo Brigato
L. Brigato and L. Iocchi
A Close Look at Deep Learning with Small Data
Published at ICPR 2020
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we perform a wide variety of experiments with different deep learning architectures on datasets of limited size. According to our study, we show that model complexity is a critical factor when only a few samples per class are available. Differently from the literature, we show that in some configurations, the state of the art can be improved using low complexity models. For instance, in problems with scarce training samples and without data augmentation, low-complexity convolutional neural networks perform comparably well or better than state-of-the-art architectures. Moreover, we show that even standard data augmentation can boost recognition performance by large margins. This result suggests the development of more complex data generation/augmentation pipelines for cases when data is limited. Finally, we show that dropout, a widely used regularization technique, maintains its role as a good regularizer even when data is scarce. Our findings are empirically validated on the sub-sampled versions of popular CIFAR-10, Fashion-MNIST and, SVHN benchmarks.
[ { "created": "Sat, 28 Mar 2020 17:11:29 GMT", "version": "v1" }, { "created": "Tue, 31 Mar 2020 10:04:25 GMT", "version": "v2" }, { "created": "Sun, 25 Oct 2020 12:10:52 GMT", "version": "v3" } ]
"2020-10-27T00:00:00"
[ [ "Brigato", "L.", "" ], [ "Iocchi", "L.", "" ] ]
0no_new_dataset
2305.04539
Masato Uchida
Kota Kawamoto and Masato Uchida
Q&A Label Learning
46 pages, 5 figures
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assigning labels to instances is crucial for supervised machine learning. In this paper, we proposed a novel annotation method called Q&A labeling, which involves a question generator that asks questions about the labels of the instances to be assigned, and an annotator who answers the questions and assigns the corresponding labels to the instances. We derived a generative model of labels assigned according to two different Q&A labeling procedures that differ in the way questions are asked and answered. We showed that, in both procedures, the derived model is partially consistent with that assumed in previous studies. The main distinction of this study from previous studies lies in the fact that the label generative model was not assumed, but rather derived based on the definition of a specific annotation method, Q&A labeling. We also derived a loss function to evaluate the classification risk of ordinary supervised machine learning using instances assigned Q&A labels and evaluated the upper bound of the classification error. The results indicate statistical consistency in learning with Q&A labels.
[ { "created": "Mon, 8 May 2023 08:22:18 GMT", "version": "v1" } ]
"2023-05-09T00:00:00"
[ [ "Kawamoto", "Kota", "" ], [ "Uchida", "Masato", "" ] ]
0no_new_dataset
1702.05511
Ilya Sergey
Ilya Sergey, Aquinas Hobor
A Concurrent Perspective on Smart Contracts
15 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore remarkable similarities between multi-transactional behaviors of smart contracts in cryptocurrencies such as Ethereum and classical problems of shared-memory concurrency. We examine two real-world examples from the Ethereum blockchain and analyzing how they are vulnerable to bugs that are closely reminiscent to those that often occur in traditional concurrent programs. We then elaborate on the relation between observable contract behaviors and well-studied concurrency topics, such as atomicity, interference, synchronization, and resource ownership. The described contracts-as-concurrent-objects analogy provides deeper understanding of potential threats for smart contracts, indicate better engineering practices, and enable applications of existing state-of-the-art formal verification techniques.
[ { "created": "Fri, 17 Feb 2017 20:21:14 GMT", "version": "v1" } ]
"2017-02-21T00:00:00"
[ [ "Sergey", "Ilya", "" ], [ "Hobor", "Aquinas", "" ] ]
0no_new_dataset
2312.12676
Morteza Haghir Chehreghani
Jack Sandberg, Niklas {\AA}kerblom, Morteza Haghir Chehreghani
Combinatorial Gaussian Process Bandits in Bayesian Settings: Theory and Application for Energy-Efficient Navigation
39 pages, 10 figures
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a combinatorial Gaussian process semi-bandit problem with time-varying arm availability. Each round, an agent is provided a set of available base arms and must select a subset of them to maximize the long-term cumulative reward. Assuming the expected rewards are sampled from a Gaussian process (GP) over the arm space, the agent can efficiently learn. We study the Bayesian setting and provide novel Bayesian regret bounds for three GP-based algorithms: GP-UCB, Bayes-GP-UCB and GP-TS. Our bounds extend previous results for GP-UCB and GP-TS to a combinatorial setting with varying arm availability and to the best of our knowledge, we provide the first Bayesian regret bound for Bayes-GP-UCB. Time-varying arm availability encompasses other widely considered bandit problems such as contextual bandits. We formulate the online energy-efficient navigation problem as a combinatorial and contextual bandit and provide a comprehensive experimental study on synthetic and real-world road networks with detailed simulations. The contextual GP model obtains lower regret and is less dependent on the informativeness of the prior compared to the non-contextual Bayesian inference model. In addition, Thompson sampling obtains lower regret than Bayes-UCB for both the contextual and non-contextual model.
[ { "created": "Wed, 20 Dec 2023 00:31:43 GMT", "version": "v1" } ]
"2023-12-21T00:00:00"
[ [ "Sandberg", "Jack", "" ], [ "Åkerblom", "Niklas", "" ], [ "Chehreghani", "Morteza Haghir", "" ] ]
0no_new_dataset
2104.05379
Nick Rossenbach
Nick Rossenbach, Mohammad Zeineldeen, Benedikt Hilmes, Ralf Schl\"uter, Hermann Ney
Comparing the Benefit of Synthetic Training Data for Various Automatic Speech Recognition Architectures
Submitted to ASRU 2021
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent publications on automatic-speech-recognition (ASR) have a strong focus on attention encoder-decoder (AED) architectures which tend to suffer from over-fitting in low resource scenarios. One solution to tackle this issue is to generate synthetic data with a trained text-to-speech system (TTS) if additional text is available. This was successfully applied in many publications with AED systems, but only very limited in the context of other ASR architectures. We investigate the effect of varying pre-processing, the speaker embedding and input encoding of the TTS system w.r.t. the effectiveness of the synthesized data for AED-ASR training. Additionally, we also consider internal language model subtraction for the first time, resulting in up to 38% relative improvement. We compare the AED results to a state-of-the-art hybrid ASR system, a monophone based system using connectionist-temporal-classification (CTC) and a monotonic transducer based system. We show that for the later systems the addition of synthetic data has no relevant effect, but they still outperform the AED systems on LibriSpeech-100h. We achieve a final word-error-rate of 3.3%/10.0% with a hybrid system on the clean/noisy test-sets, surpassing any previous state-of-the-art systems on Librispeech-100h that do not include unlabeled audio data.
[ { "created": "Mon, 12 Apr 2021 11:59:23 GMT", "version": "v1" }, { "created": "Wed, 9 Jun 2021 21:37:06 GMT", "version": "v2" }, { "created": "Tue, 13 Jul 2021 15:02:15 GMT", "version": "v3" } ]
"2021-07-14T00:00:00"
[ [ "Rossenbach", "Nick", "" ], [ "Zeineldeen", "Mohammad", "" ], [ "Hilmes", "Benedikt", "" ], [ "Schlüter", "Ralf", "" ], [ "Ney", "Hermann", "" ] ]
0no_new_dataset
2205.07204
Liuyue Jiang
Liuyue Jiang, Nguyen Khoi Tran, M. Ali Babar
Mod2Dash: A Framework for Model-Driven Dashboards Generation
null
null
10.1145/3534526
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The construction of an interactive dashboard involves deciding on what information to present and how to display it and implementing those design decisions to create an operational dashboard. Traditionally, a dashboard's design is implied in the deployed dashboard rather than captured explicitly as a digital artifact, preventing it from being backed up, version-controlled, and shared. Moreover, practitioners have to implement this implicit design manually by coding or configuring it on a dashboard platform. This paper proposes Mod2Dash, a software framework that enables practitioners to capture their dashboard designs as models and generate operational dashboards automatically from these models. The framework also provides a GUI-driven customization approach for practitioners to fine-tune the auto-generated dashboards and update their models. With these abilities, Mod2Dash enables practitioners to rapidly prototype and deploy dashboards for both operational and research purposes. We evaluated the framework's effectiveness in a case study on cyber security visualization for decision support. A proof-of-concept of Mod2Dash was employed to model and reconstruct 31 diverse real-world cyber security dashboards. A human-assisted comparison between the Mod2Dash-generated dashboards and the baseline dashboards shows a close matching, indicating the framework's effectiveness for real-world scenarios.
[ { "created": "Sun, 15 May 2022 07:20:08 GMT", "version": "v1" } ]
"2022-05-17T00:00:00"
[ [ "Jiang", "Liuyue", "" ], [ "Tran", "Nguyen Khoi", "" ], [ "Babar", "M. Ali", "" ] ]
0no_new_dataset
1711.08102
Wangli Hao
Wangli Hao, Zhaoxiang Zhang, He Guan
CMCGAN: A Uniform Framework for Cross-Modal Visual-Audio Mutual Generation
Have some problems need to be handled
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual and audio modalities are two symbiotic modalities underlying videos, which contain both common and complementary information. If they can be mined and fused sufficiently, performances of related video tasks can be significantly enhanced. However, due to the environmental interference or sensor fault, sometimes, only one modality exists while the other is abandoned or missing. By recovering the missing modality from the existing one based on the common information shared between them and the prior information of the specific modality, great bonus will be gained for various vision tasks. In this paper, we propose a Cross-Modal Cycle Generative Adversarial Network (CMCGAN) to handle cross-modal visual-audio mutual generation. Specifically, CMCGAN is composed of four kinds of subnetworks: audio-to-visual, visual-to-audio, audio-to-audio and visual-to-visual subnetworks respectively, which are organized in a cycle architecture. CMCGAN has several remarkable advantages. Firstly, CMCGAN unifies visual-audio mutual generation into a common framework by a joint corresponding adversarial loss. Secondly, through introducing a latent vector with Gaussian distribution, CMCGAN can handle dimension and structure asymmetry over visual and audio modalities effectively. Thirdly, CMCGAN can be trained end-to-end to achieve better convenience. Benefiting from CMCGAN, we develop a dynamic multimodal classification network to handle the modality missing problem. Abundant experiments have been conducted and validate that CMCGAN obtains the state-of-the-art cross-modal visual-audio generation results. Furthermore, it is shown that the generated modality achieves comparable effects with those of original modality, which demonstrates the effectiveness and advantages of our proposed method.
[ { "created": "Wed, 22 Nov 2017 01:36:20 GMT", "version": "v1" }, { "created": "Sat, 9 Dec 2017 04:01:40 GMT", "version": "v2" } ]
"2017-12-12T00:00:00"
[ [ "Hao", "Wangli", "" ], [ "Zhang", "Zhaoxiang", "" ], [ "Guan", "He", "" ] ]
0no_new_dataset
2201.06289
Zhiqiu Lin
Zhiqiu Lin, Jia Shi, Deepak Pathak, Deva Ramanan
The CLEAR Benchmark: Continual LEArning on Real-World Imagery
Project site: https://clear-benchmark.github.io
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continual learning (CL) is widely regarded as crucial challenge for lifelong AI. However, existing CL benchmarks, e.g. Permuted-MNIST and Split-CIFAR, make use of artificial temporal variation and do not align with or generalize to the real-world. In this paper, we introduce CLEAR, the first continual image classification benchmark dataset with a natural temporal evolution of visual concepts in the real world that spans a decade (2004-2014). We build CLEAR from existing large-scale image collections (YFCC100M) through a novel and scalable low-cost approach to visio-linguistic dataset curation. Our pipeline makes use of pretrained vision-language models (e.g. CLIP) to interactively build labeled datasets, which are further validated with crowd-sourcing to remove errors and even inappropriate images (hidden in original YFCC100M). The major strength of CLEAR over prior CL benchmarks is the smooth temporal evolution of visual concepts with real-world imagery, including both high-quality labeled data along with abundant unlabeled samples per time period for continual semi-supervised learning. We find that a simple unsupervised pre-training step can already boost state-of-the-art CL algorithms that only utilize fully-supervised data. Our analysis also reveals that mainstream CL evaluation protocols that train and test on iid data artificially inflate performance of CL system. To address this, we propose novel "streaming" protocols for CL that always test on the (near) future. Interestingly, streaming protocols (a) can simplify dataset curation since today's testset can be repurposed for tomorrow's trainset and (b) can produce more generalizable models with more accurate estimates of performance since all labeled data from each time-period is used for both training and testing (unlike classic iid train-test splits).
[ { "created": "Mon, 17 Jan 2022 09:09:09 GMT", "version": "v1" }, { "created": "Tue, 5 Apr 2022 04:55:51 GMT", "version": "v2" }, { "created": "Thu, 9 Jun 2022 04:41:54 GMT", "version": "v3" } ]
"2022-06-10T00:00:00"
[ [ "Lin", "Zhiqiu", "" ], [ "Shi", "Jia", "" ], [ "Pathak", "Deepak", "" ], [ "Ramanan", "Deva", "" ] ]
1new_dataset
2210.08444
Yuntian Deng
Yuntian Deng, Volodymyr Kuleshov, Alexander M. Rush
Model Criticism for Long-Form Text Generation
EMNLP 2022
null
null
null
cs.CL cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language models have demonstrated the ability to generate highly fluent text; however, it remains unclear whether their output retains coherent high-level structure (e.g., story progression). Here, we propose to apply a statistical tool, model criticism in latent space, to evaluate the high-level structure of the generated text. Model criticism compares the distributions between real and generated data in a latent space obtained according to an assumptive generative process. Different generative processes identify specific failure modes of the underlying model. We perform experiments on three representative aspects of high-level discourse -- coherence, coreference, and topicality -- and find that transformer-based language models are able to capture topical structures but have a harder time maintaining structural coherence or modeling coreference.
[ { "created": "Sun, 16 Oct 2022 04:35:58 GMT", "version": "v1" } ]
"2022-10-18T00:00:00"
[ [ "Deng", "Yuntian", "" ], [ "Kuleshov", "Volodymyr", "" ], [ "Rush", "Alexander M.", "" ] ]
0no_new_dataset
2007.10503
Jordi Cabot
Hamza Ed-douibi, Javier Luis C\'anovas Izquierdo, Gwendal Daniel, Jordi Cabot
A Model-based Chatbot Generation Approach to Converse with Open Data Sources
null
null
10.1007/978-3-030-74296-6_33
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Open Data movement promotes the free distribution of data. More and more companies and governmental organizations are making their data available online following the Open Data philosophy, resulting in a growing market of technologies and services to help publish and consume data. One of the emergent ways to publish such data is via Web APIs, which offer a powerful means to reuse this data and integrate it with other services. Socrata, CKAN or OData are examples of popular specifications for publishing data via Web APIs. Nevertheless, querying and integrating these Web APIs is time-consuming and requires technical skills that limit the benefits of Open Data movement for the regular citizen. In other contexts, chatbot applications are being increasingly adopted as a direct communication channel between companies and end-users. We believe the same could be true for Open Data as a way to bridge the gap between citizens and Open Data sources. This paper describes an approach to automatically derive full-fledged chatbots from API-based Open Data sources. Our process relies on a model-based intermediate representation (via UML class diagrams and profiles) to facilitate the customization of the chatbot to be generated.
[ { "created": "Mon, 20 Jul 2020 21:57:14 GMT", "version": "v1" } ]
"2024-04-02T00:00:00"
[ [ "Ed-douibi", "Hamza", "" ], [ "Izquierdo", "Javier Luis Cánovas", "" ], [ "Daniel", "Gwendal", "" ], [ "Cabot", "Jordi", "" ] ]
0no_new_dataset
2010.02005
Maaike de Boer
Maaike Burghoorn and Maaike H.T. de Boer and Stephan Raaijmakers
Gender prediction using limited Twitter Data
6 pages, 2 figures
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transformer models have shown impressive performance on a variety of NLP tasks. Off-the-shelf, pre-trained models can be fine-tuned for specific NLP classification tasks, reducing the need for large amounts of additional training data. However, little research has addressed how much data is required to accurately fine-tune such pre-trained transformer models, and how much data is needed for accurate prediction. This paper explores the usability of BERT (a Transformer model for word embedding) for gender prediction on social media. Forensic applications include detecting gender obfuscation, e.g. males posing as females in chat rooms. A Dutch BERT model is fine-tuned on different samples of a Dutch Twitter dataset labeled for gender, varying in the number of tweets used per person. The results show that finetuning BERT contributes to good gender classification performance (80% F1) when finetuned on only 200 tweets per person. But when using just 20 tweets per person, the performance of our classifier deteriorates non-steeply (to 70% F1). These results show that even with relatively small amounts of data, BERT can be fine-tuned to accurately help predict the gender of Twitter users, and, consequently, that it is possible to determine gender on the basis of just a low volume of tweets. This opens up an operational perspective on the swift detection of gender.
[ { "created": "Tue, 29 Sep 2020 11:46:07 GMT", "version": "v1" } ]
"2020-10-06T00:00:00"
[ [ "Burghoorn", "Maaike", "" ], [ "de Boer", "Maaike H. T.", "" ], [ "Raaijmakers", "Stephan", "" ] ]
1new_dataset
2304.12125
Iacopo Catalano
Iacopo Catalano, Ha Sier, Xianjia Yu, Tomi Westerlund, Jorge Pena Queralta
UAV Tracking with Solid-State Lidars:Dynamic Multi-Frequency Scan Integration
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing use of drones across various industries, the navigation and tracking of these unmanned aerial vehicles (UAVs) in challenging environments (such as GNSS-denied environments) have become critical issues. In this paper, we propose a novel method for a ground-based UAV tracking system using a solid-state LiDAR, which dynamically adjusts the LiDAR frame integration time based on the distance to the UAV and its speed. Our method fuses two simultaneous scan integration frequencies for high accuracy and persistent tracking, enabling reliable estimates of the UAV state even in challenging scenarios. The use of the Inverse Covariance Intersection method and Kalman filters allow for better tracking accuracy and can handle challenging tracking scenarios. We have performed a number of experiments for evaluating the performance of the proposed tracking system and identifying its limitations. Our experimental results demonstrate that the proposed method achieves comparable tracking performance to the established baseline method, while also providing more reliable and accurate tracking when only one of the frequencies is available or unreliable.
[ { "created": "Mon, 24 Apr 2023 14:30:20 GMT", "version": "v1" }, { "created": "Tue, 18 Jul 2023 12:05:55 GMT", "version": "v2" } ]
"2023-07-19T00:00:00"
[ [ "Catalano", "Iacopo", "" ], [ "Sier", "Ha", "" ], [ "Yu", "Xianjia", "" ], [ "Westerlund", "Tomi", "" ], [ "Queralta", "Jorge Pena", "" ] ]
0no_new_dataset
1705.00678
Zhao Kang
Zhao Kang, Chong Peng, Qiang Cheng
Twin Learning for Similarity and Clustering: A Unified Kernel Approach
Published in AAAI 2017
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many similarity-based clustering methods work in two separate steps including similarity matrix computation and subsequent spectral clustering. However, similarity measurement is challenging because it is usually impacted by many factors, e.g., the choice of similarity metric, neighborhood size, scale of data, noise and outliers. Thus the learned similarity matrix is often not suitable, let alone optimal, for the subsequent clustering. In addition, nonlinear similarity often exists in many real world data which, however, has not been effectively considered by most existing methods. To tackle these two challenges, we propose a model to simultaneously learn cluster indicator matrix and similarity information in kernel spaces in a principled way. We show theoretical relationships to kernel k-means, k-means, and spectral clustering methods. Then, to address the practical issue of how to select the most suitable kernel for a particular clustering task, we further extend our model with a multiple kernel learning ability. With this joint model, we can automatically accomplish three subtasks of finding the best cluster indicator matrix, the most accurate similarity relations and the optimal combination of multiple kernels. By leveraging the interactions between these three subtasks in a joint framework, each subtask can be iteratively boosted by using the results of the others towards an overall optimal solution. Extensive experiments are performed to demonstrate the effectiveness of our method.
[ { "created": "Mon, 1 May 2017 19:33:27 GMT", "version": "v1" }, { "created": "Wed, 3 May 2017 00:29:13 GMT", "version": "v2" } ]
"2017-05-04T00:00:00"
[ [ "Kang", "Zhao", "" ], [ "Peng", "Chong", "" ], [ "Cheng", "Qiang", "" ] ]
0no_new_dataset
2302.04926
Linhan Li
Linhan Li, ThanhVu Nguyen
COOLIO: A Language Support Extension for the Classroom Object Oriented Language
4 pages, 4 figures. This extension is available from https://marketplace.visualstudio.com/items?itemName=Linhan.cool-language-support
null
null
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
COOL is an Object-Oriented programming language used to teach compiler design in many undergraduate and graduate courses. Because most students are unfamiliar with the language and code editors and IDEs often lack the support for COOL, writing code and test programs in COOL are a burden to students, causing them to not fully understand many important and advanced features of the language and compiler. In this tool paper, we describe COOLIO,an extension to support COOL in the popular VSCode IDE. COOLIOprovides (i) syntax highlighting supports for the COOL language through lexing and parsing, (ii) semantics-aware autocompletion features that help students write less code and reduce the burden of having to remember unfamiliar COOL grammar and syntax, and (iii) relevant feedback from the underlying COOL interpreter/compiler (e.g., error messages, typing information) to the students through VSCode editor to aid debugging. We believe that COOLIO will help students enjoy writing COOL programs and consequently learn and appreciate more advanced compiler concepts.
[ { "created": "Thu, 9 Feb 2023 20:43:41 GMT", "version": "v1" } ]
"2023-02-13T00:00:00"
[ [ "Li", "Linhan", "" ], [ "Nguyen", "ThanhVu", "" ] ]
0no_new_dataset
1706.03459
Zhe Feng
Paul D\"utting and Zhe Feng and Harikrishna Narasimhan and David C. Parkes and Sai Srivatsa Ravindranath
Optimal Auctions through Deep Learning: Advances in Differentiable Economics
An extended abstract appeared in ICML'19, along with a short Research Highlight in the Communications of the ACM
null
null
null
cs.GT cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing an incentive compatible auction that maximizes expected revenue is an intricate task. The single-item case was resolved in a seminal piece of work by Myerson in 1981, but more than 40 years later a full analytical understanding of the optimal design still remains elusive for settings with two or more items. In this work, we initiate the exploration of the use of tools from deep learning for the automated design of optimal auctions. We model an auction as a multi-layer neural network, frame optimal auction design as a constrained learning problem, and show how it can be solved using standard machine learning pipelines. In addition to providing generalization bounds, we present extensive experimental results, recovering essentially all known solutions that come from the theoretical analysis of optimal auction design problems and obtaining novel mechanisms for settings in which the optimal mechanism is unknown.
[ { "created": "Mon, 12 Jun 2017 04:03:15 GMT", "version": "v1" }, { "created": "Mon, 19 Mar 2018 17:56:32 GMT", "version": "v2" }, { "created": "Mon, 1 Apr 2019 00:33:16 GMT", "version": "v3" }, { "created": "Sat, 29 Feb 2020 23:54:43 GMT", "version": "v4" }, { "created": "Fri, 21 Aug 2020 15:04:03 GMT", "version": "v5" }, { "created": "Fri, 14 Oct 2022 05:49:10 GMT", "version": "v6" } ]
"2022-10-17T00:00:00"
[ [ "Dütting", "Paul", "" ], [ "Feng", "Zhe", "" ], [ "Narasimhan", "Harikrishna", "" ], [ "Parkes", "David C.", "" ], [ "Ravindranath", "Sai Srivatsa", "" ] ]
0no_new_dataset
1805.05476
Pravallika Devineni
Pravallika Devineni, Evangelos E. Papalexakis, Kalina Michalska, Michalis Faloutsos
MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors
8 pages, IEEE conference format
null
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
How intrusive does a life-saving user-monitoring application really need to be? While most previous research was focused on analyzing mental state of users from social media and smartphones, there is little effort towards protecting user privacy in these analyses. A challenge in analyzing user behaviors is that not only is the data multi-dimensional with a myriad of user activities but these activities occur at varying temporal rates. The overarching question of our work is: Given a set of sensitive user features, what is the minimum amount of information required to group users with similar behavior? Furthermore, does this user behavior correlate with their mental state? Towards answering those questions, our contributions are two fold: we introduce the concept of privacy surfaces that combine sensitive user data at different levels of intrusiveness. As our second contribution, we introduce MIMiS, an unsupervised privacy-aware framework that clusters users in a given privacy surface configuration to homogeneous groups with respect to their temporal signature. In addition, we explore the trade-off between intrusiveness and prediction accuracy. MIMiS employs multi-set decomposition in order to deal with incompatible temporal granularities in user activities. We extensively evaluate MIMiS on real data. Across a variety of privacy surfaces, MIMiS identified groups that are highly homogeneous with respect to self-reported mental health scores. Finally, we conduct an in-depth exploration of the discovered clusters, identifying groups whose behavior is consistent with academic deadlines.
[ { "created": "Mon, 14 May 2018 21:53:41 GMT", "version": "v1" } ]
"2018-05-16T00:00:00"
[ [ "Devineni", "Pravallika", "" ], [ "Papalexakis", "Evangelos E.", "" ], [ "Michalska", "Kalina", "" ], [ "Faloutsos", "Michalis", "" ] ]
0no_new_dataset
1802.08233
Saurabh Hukerikar
Rizwan A. Ashraf, Saurabh Hukerikar, Christian Engelmann
Pattern-based Modeling of Multiresilience Solutions for High-Performance Computing
2018 ACM/SPEC International Conference on Performance Engineering (ICPE '18) Berlin, Germany
null
10.1145/3184407.3184421
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resiliency is the ability of large-scale high-performance computing (HPC) applications to gracefully handle errors, and recover from failures. In this paper, we propose a pattern-based approach to constructing resilience solutions that handle multiple error modes. Using resilience patterns, we evaluate the performance and reliability characteristics of detection, containment and mitigation techniques for transient errors that cause silent data corruptions and techniques for fail-stop errors that result in process failures. We demonstrate the design and implementation of the multiresilience solution based on patterns instantiated across multiple layers of the system stack. The patterns are integrated to work together to achieve resiliency to different error types in a performance-efficient manner.
[ { "created": "Thu, 22 Feb 2018 18:45:00 GMT", "version": "v1" } ]
"2018-02-23T00:00:00"
[ [ "Ashraf", "Rizwan A.", "" ], [ "Hukerikar", "Saurabh", "" ], [ "Engelmann", "Christian", "" ] ]
0no_new_dataset
2011.06840
Sidney Golstein
Sidney Jonathan Golstein, Fran\c{c}ois Rottenberg, Fran\c{c}ois Horlin, Philippe De Doncker, Julien Sarrazin
Physical Layer Security in a SISO Communication using Frequency-Domain Time-Reversal OFDM Precoding and Artificial Noise Injection
null
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
A frequency domain (FD) time-reversal (TR) precoder is proposed to perform physical layer security (PLS) in single-input single-output (SISO) systems using orthogonal frequency-division multiplexing (OFDM) and artificial noise (AN) signal injection. The AN signal does not corrupt the data transmission to the legitimate receiver but degrades the decoding performance of the eavesdropper. This scheme guarantees the secrecy of a communication towards a legitimate user when the transmitter knows the instantaneous channel state information (CSI) of the legitimate link thanks to the channel reciprocity in time division duplex (TDD) systems, but does not know the instantaneous CSI of a potential eavesdropper. Three optimal decoding structures at the eavesdropper are considered in a fast fading (FF) environment depending on the handshake procedure between Alice and Bob. Closed-form approximations of the AN energy to inject in order to maximize the SR of the communication are derived. In addition, the required conditions at the legitimate receiver's end to guarantee a given SR are determined when Eve's signal-to-noise ratio (SNR) is infinite. Furthermore, a waterfilling power allocation strategy is presented to further enhance the secrecy of the scheme. Simulation results are presented to demonstrate the security performance of the proposed secure system.
[ { "created": "Fri, 13 Nov 2020 09:57:52 GMT", "version": "v1" } ]
"2020-11-16T00:00:00"
[ [ "Golstein", "Sidney Jonathan", "" ], [ "Rottenberg", "François", "" ], [ "Horlin", "François", "" ], [ "De Doncker", "Philippe", "" ], [ "Sarrazin", "Julien", "" ] ]
0no_new_dataset
1610.00765
Edoardo Maria Ponti
Edoardo Maria Ponti, Elisabetta Jezek, Bernardo Magnini
Distributed Representations of Lexical Sets and Prototypes in Causal Alternation Verbs
5 pages, 4 figures, accepted at: Third Italian Conference on Computational Linguistics (CLIC-it). 5-6 December 2016, Napoli (Italy)
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lexical sets contain the words filling an argument slot of a verb, and are in part determined by selectional preferences. The purpose of this paper is to unravel the properties of lexical sets through distributional semantics. We investigate 1) whether lexical set behave as prototypical categories with a centre and a periphery; 2) whether they are polymorphic, i.e. composed by subcategories; 3) whether the distance between lexical sets of different arguments is explanatory of verb properties. In particular, our case study are lexical sets of causative-inchoative verbs in Italian. Having studied several vector models, we find that 1) based on spatial distance from the centroid, object fillers are scattered uniformly across the category, whereas intransitive subject fillers lie on its edge; 2) a correlation exists between the amount of verb senses and that of clusters discovered automatically, especially for intransitive subjects; 3) the distance between the centroids of object and intransitive subject is correlated with other properties of verbs, such as their cross-lingual tendency to appear in the intransitive pattern rather than transitive one. This paper is noncommittal with respect to the hypothesis that this connection is underpinned by a semantic reason, namely the spontaneity of the event denoted by the verb.
[ { "created": "Mon, 3 Oct 2016 21:50:27 GMT", "version": "v1" }, { "created": "Mon, 26 Oct 2020 23:48:14 GMT", "version": "v2" } ]
"2020-10-28T00:00:00"
[ [ "Ponti", "Edoardo Maria", "" ], [ "Jezek", "Elisabetta", "" ], [ "Magnini", "Bernardo", "" ] ]
0no_new_dataset
2103.15206
Sultan Mahmud
Sultan Mahmud, Md. Mohsin, Ijaz Ahmed Khan, Ashraf Uddin Mian, Miah Akib Zaman
Knowledge, beliefs, attitudes and perceived risk about COVID-19 vaccine and determinants of COVID-19 vaccine acceptance in Bangladesh
Accepted by PLOS ONE: https://doi.org/10.1371/journal.pone.0257096
Plos One 16(9):e0257096 (2021)
10.1371/journal.pone.0257096
null
cs.CY cs.AI
http://creativecommons.org/licenses/by/4.0/
A total of 605 eligible respondents took part in this survey (population size 1630046161 and required sample size 591) with an age range of 18 to 100. A large proportion of the respondents are aged less than 50 (82%) and male (62.15%). The majority of the respondents live in urban areas (60.83%). A total of 61.16% (370/605) of the respondents were willing to accept/take the COVID-19 vaccine. Among the accepted group, only 35.14% showed the willingness to take the COVID-19 vaccine immediately, while 64.86% would delay the vaccination until they are confirmed about the vaccine s efficacy and safety or COVID-19 becomes deadlier in Bangladesh. The regression results showed age, gender, location (urban/rural), level of education, income, perceived risk of being infected with COVID-19 in the future, perceived severity of infection, having previous vaccination experience after age 18, having higher knowledge about COVID-19 and vaccination were significantly associated with the acceptance of COVID-19 vaccines. The research reported a high prevalence of COVID-19 vaccine refusal and hesitancy in Bangladesh.
[ { "created": "Sun, 28 Mar 2021 19:37:47 GMT", "version": "v1" }, { "created": "Wed, 9 Nov 2022 19:11:20 GMT", "version": "v2" } ]
"2022-11-11T00:00:00"
[ [ "Mahmud", "Sultan", "" ], [ "Mohsin", "Md.", "" ], [ "Khan", "Ijaz Ahmed", "" ], [ "Mian", "Ashraf Uddin", "" ], [ "Zaman", "Miah Akib", "" ] ]
0no_new_dataset
1912.12221
Sarwan Ali
Sarwan Ali, Maria Khalid Alvi, Safi Faizullah, Muhammad Asad Khan, Abdullah Alshanqiti, Imdadullah Khan
Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow
Accepted to International Conference on Advances in the Emerging Computing Technologies (AECT) 2020
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software Defined Networking (SDN) is a network paradigm shift that facilitates comprehensive network programmability to cope with emerging new technologies such as cloud computing and big data. SDN facilitates simplified and centralized network management enabling it to operate in dynamic scenarios. Further, SDN uses the OpenFlow protocol for communication between the controller and its switches. The OpenFlow creates vulnerabilities for network attacks especially Distributed Denial of Service (DDoS). DDoS attacks are launched from the compromised hosts connected to the SDN switches. In this paper, we introduce a time- and space-efficient solution for the identification of these compromised hosts. Our solution consumes less computational resources and space and does not require any special equipment.
[ { "created": "Fri, 27 Dec 2019 16:26:39 GMT", "version": "v1" }, { "created": "Mon, 6 Jan 2020 12:42:07 GMT", "version": "v2" }, { "created": "Wed, 8 Jan 2020 20:45:55 GMT", "version": "v3" }, { "created": "Sun, 2 Feb 2020 19:06:33 GMT", "version": "v4" } ]
"2020-02-04T00:00:00"
[ [ "Ali", "Sarwan", "" ], [ "Alvi", "Maria Khalid", "" ], [ "Faizullah", "Safi", "" ], [ "Khan", "Muhammad Asad", "" ], [ "Alshanqiti", "Abdullah", "" ], [ "Khan", "Imdadullah", "" ] ]
0no_new_dataset
2201.12622
Sajjad Ahmed
Muhammad Asim Khan, Lan Hong, Sajjad Ahmed
Hand Gesture Recognition of Dumb Person Using one Against All Neural Network
null
null
null
null
cs.CV cs.AI cs.CL
http://creativecommons.org/licenses/by/4.0/
We propose a new technique for recognition of dumb person hand gesture in real world environment. In this technique, the hand image containing the gesture is preprocessed and then hand region is segmented by convergent the RGB color image to L.a.b color space. Only few statistical features are used to classify the segmented image to different classes. Artificial Neural Network is trained in sequential manner using one against all. When the system gets trained, it becomes capable of recognition of each class in parallel manner. The result of proposed technique is much better than existing techniques.
[ { "created": "Sat, 29 Jan 2022 17:09:38 GMT", "version": "v1" } ]
"2022-02-01T00:00:00"
[ [ "Khan", "Muhammad Asim", "" ], [ "Hong", "Lan", "" ], [ "Ahmed", "Sajjad", "" ] ]
1new_dataset
2304.06106
Hazem Zein
Hazem Zein, Lou Laurent, R\'egis Fournier, Amine Nait-Ali
Generation of artificial facial drug abuse images using Deep De-identified anonymous Dataset augmentation through Genetics Algorithm (3DG-GA)
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In biomedical research and artificial intelligence, access to large, well-balanced, and representative datasets is crucial for developing trustworthy applications that can be used in real-world scenarios. However, obtaining such datasets can be challenging, as they are often restricted to hospitals and specialized facilities. To address this issue, the study proposes to generate highly realistic synthetic faces exhibiting drug abuse traits through augmentation. The proposed method, called "3DG-GA", Deep De-identified anonymous Dataset Generation, uses Genetics Algorithm as a strategy for synthetic faces generation. The algorithm includes GAN artificial face generation, forgery detection, and face recognition. Initially, a dataset of 120 images of actual facial drug abuse is used. By preserving, the drug traits, the 3DG-GA provides a dataset containing 3000 synthetic facial drug abuse images. The dataset will be open to the scientific community, which can reproduce our results and benefit from the generated datasets while avoiding legal or ethical restrictions.
[ { "created": "Wed, 12 Apr 2023 18:45:26 GMT", "version": "v1" } ]
"2023-04-14T00:00:00"
[ [ "Zein", "Hazem", "" ], [ "Laurent", "Lou", "" ], [ "Fournier", "Régis", "" ], [ "Nait-Ali", "Amine", "" ] ]
1new_dataset
2303.06907
Mohamed Hedi Elfkir
Nafiseh Jabbari Tofighi, Mohamed Hedi Elfkir, Nevrez Imamoglu, Cagri Ozcinar, Erkut Erdem, Aykut Erdem
ST360IQ: No-Reference Omnidirectional Image Quality Assessment with Spherical Vision Transformers
ICASSP 2023
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Omnidirectional images, aka 360 images, can deliver immersive and interactive visual experiences. As their popularity has increased dramatically in recent years, evaluating the quality of 360 images has become a problem of interest since it provides insights for capturing, transmitting, and consuming this new media. However, directly adapting quality assessment methods proposed for standard natural images for omnidirectional data poses certain challenges. These models need to deal with very high-resolution data and implicit distortions due to the spherical form of the images. In this study, we present a method for no-reference 360 image quality assessment. Our proposed ST360IQ model extracts tangent viewports from the salient parts of the input omnidirectional image and employs a vision-transformers based module processing saliency selective patches/tokens that estimates a quality score from each viewport. Then, it aggregates these scores to give a final quality score. Our experiments on two benchmark datasets, namely OIQA and CVIQ datasets, demonstrate that as compared to the state-of-the-art, our approach predicts the quality of an omnidirectional image correlated with the human-perceived image quality. The code has been available on https://github.com/Nafiseh-Tofighi/ST360IQ
[ { "created": "Mon, 13 Mar 2023 07:48:46 GMT", "version": "v1" } ]
"2023-03-14T00:00:00"
[ [ "Tofighi", "Nafiseh Jabbari", "" ], [ "Elfkir", "Mohamed Hedi", "" ], [ "Imamoglu", "Nevrez", "" ], [ "Ozcinar", "Cagri", "" ], [ "Erdem", "Erkut", "" ], [ "Erdem", "Aykut", "" ] ]
1new_dataset
1504.01883
Narmada Naik
Narmada Naik and G.N Rathna
Robust real time face recognition and tracking on gpu using fusion of rgb and depth image
null
null
10.5121/csit.2015.50601
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a real-time face recognition system using kinect sensor. The algorithm is implemented on GPU using opencl and significant speed improvements are observed. We use kinect depth image to increase the robustness and reduce computational cost of conventional LBP based face recognition. The main objective of this paper was to perform robust, high speed fusion based face recognition and tracking. The algorithm is mainly composed of three steps. First step is to detect all faces in the video using viola jones algorithm. The second step is online database generation using a tracking window on the face. A modified LBP feature vector is calculated using fusion information from depth and greyscale image on GPU. This feature vector is used to train a svm classifier. Third step involves recognition of multiple faces based on our modified feature vector.
[ { "created": "Wed, 8 Apr 2015 09:34:30 GMT", "version": "v1" } ]
"2015-04-09T00:00:00"
[ [ "Naik", "Narmada", "" ], [ "Rathna", "G. N", "" ] ]
0no_new_dataset
1702.04218
John Prpic
J. Prpic and P. Shukla
Crowd Capital in Governance Contexts
Oxford Internet Institute, University of Oxford - IPP 2014 - Crowdsourcing for Politics and Policy
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To begin to understand the implications of the implementation of IT-mediated Crowds for Politics and Policy purposes, this research builds the first-known dataset of IT-mediated Crowd applications currently in use in the governance context. Using Crowd Capital theory and governance theory as frameworks to organize our data collection, we undertake an exploratory data analysis of some fundamental factors defining this emerging field. Specific factors outlined and discussed include the type of actors implementing IT-mediated Crowds in the governance context, the global geographic distribution of the applications, and the nature of the Crowd-derived resources being generated for governance purposes. The findings from our dataset of 209 on-going endeavours indicates that a wide-diversity of actors are engaging IT-mediated Crowds in the governance context, both jointly and severally, that these endeavours can be found to exist on all continents, and that said actors are generating Crowd-derived resources in at least ten distinct governance sectors. We discuss the ramifications of these and our other findings in comparison to the research literature on the private-sector use of IT-mediated Crowds, while highlighting some unique future research opportunities stemming from our work.
[ { "created": "Fri, 10 Feb 2017 09:45:57 GMT", "version": "v1" } ]
"2017-02-15T00:00:00"
[ [ "Prpic", "J.", "" ], [ "Shukla", "P.", "" ] ]
1new_dataset
2107.07486
Matilde Marcolli
Noemie Combe, Yuri I. Manin, Matilde Marcolli
Moufang Patterns and Geometry of Information
amstex, 42 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Technology of data collection and information transmission is based on various mathematical models of encoding. The words "Geometry of information" refer to such models, whereas the words "Moufang patterns" refer to various sophisticated symmetries appearing naturally in such models. In this paper we show that the symmetries of spaces of probability distributions, endowed with their canonical Riemannian metric of information geometry, have the structure of a commutative Moufang loop. We also show that the F-manifold structure on the space of probability distribution can be described in terms of differential 3-webs and Malcev algebras. We then present a new construction of (noncommutative) Moufang loops associated to almost-symplectic structures over finite fields, and use then to construct a new class of code loops with associated quantum error-correcting codes and networks of perfect tensors.
[ { "created": "Thu, 15 Jul 2021 17:39:38 GMT", "version": "v1" }, { "created": "Wed, 2 Mar 2022 17:39:05 GMT", "version": "v2" } ]
"2022-03-03T00:00:00"
[ [ "Combe", "Noemie", "" ], [ "Manin", "Yuri I.", "" ], [ "Marcolli", "Matilde", "" ] ]
0no_new_dataset
2007.12342
Yuanhan Zhang
Yuanhan Zhang, Zhenfei Yin, Yidong Li, Guojun Yin, Junjie Yan, Jing Shao, and Ziwei Liu
CelebA-Spoof: Large-Scale Face Anti-Spoofing Dataset with Rich Annotations
To appear in ECCV 2020. Dataset is available at: https://github.com/Davidzhangyuanhan/CelebA-Spoof
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As facial interaction systems are prevalently deployed, security and reliability of these systems become a critical issue, with substantial research efforts devoted. Among them, face anti-spoofing emerges as an important area, whose objective is to identify whether a presented face is live or spoof. Though promising progress has been achieved, existing works still have difficulty in handling complex spoof attacks and generalizing to real-world scenarios. The main reason is that current face anti-spoofing datasets are limited in both quantity and diversity. To overcome these obstacles, we contribute a large-scale face anti-spoofing dataset, CelebA-Spoof, with the following appealing properties: 1) Quantity: CelebA-Spoof comprises of 625,537 pictures of 10,177 subjects, significantly larger than the existing datasets. 2) Diversity: The spoof images are captured from 8 scenes (2 environments * 4 illumination conditions) with more than 10 sensors. 3) Annotation Richness: CelebA-Spoof contains 10 spoof type annotations, as well as the 40 attribute annotations inherited from the original CelebA dataset. Equipped with CelebA-Spoof, we carefully benchmark existing methods in a unified multi-task framework, Auxiliary Information Embedding Network (AENet), and reveal several valuable observations.
[ { "created": "Fri, 24 Jul 2020 04:28:29 GMT", "version": "v1" }, { "created": "Wed, 29 Jul 2020 08:52:18 GMT", "version": "v2" }, { "created": "Sat, 1 Aug 2020 07:16:18 GMT", "version": "v3" } ]
"2020-08-04T00:00:00"
[ [ "Zhang", "Yuanhan", "" ], [ "Yin", "Zhenfei", "" ], [ "Li", "Yidong", "" ], [ "Yin", "Guojun", "" ], [ "Yan", "Junjie", "" ], [ "Shao", "Jing", "" ], [ "Liu", "Ziwei", "" ] ]
1new_dataset
2003.02428
Steffen Holter
Oscar Gomez, Steffen Holter, Jun Yuan, Enrico Bertini
ViCE: Visual Counterfactual Explanations for Machine Learning Models
4 pages, 2 figures, ACM IUI 2020
null
null
null
cs.HC cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The continued improvements in the predictive accuracy of machine learning models have allowed for their widespread practical application. Yet, many decisions made with seemingly accurate models still require verification by domain experts. In addition, end-users of a model also want to understand the reasons behind specific decisions. Thus, the need for interpretability is increasingly paramount. In this paper we present an interactive visual analytics tool, ViCE, that generates counterfactual explanations to contextualize and evaluate model decisions. Each sample is assessed to identify the minimal set of changes needed to flip the model's output. These explanations aim to provide end-users with personalized actionable insights with which to understand, and possibly contest or improve, automated decisions. The results are effectively displayed in a visual interface where counterfactual explanations are highlighted and interactive methods are provided for users to explore the data and model. The functionality of the tool is demonstrated by its application to a home equity line of credit dataset.
[ { "created": "Thu, 5 Mar 2020 04:43:02 GMT", "version": "v1" } ]
"2020-03-06T00:00:00"
[ [ "Gomez", "Oscar", "" ], [ "Holter", "Steffen", "" ], [ "Yuan", "Jun", "" ], [ "Bertini", "Enrico", "" ] ]
0no_new_dataset