id
stringlengths
9
10
submitter
stringlengths
5
46
authors
stringlengths
5
1.31k
title
stringlengths
8
223
comments
stringlengths
2
574
journal-ref
stringclasses
587 values
doi
stringclasses
784 values
report-no
stringclasses
75 values
categories
stringlengths
5
72
license
stringclasses
9 values
abstract
stringlengths
82
3.31k
versions
listlengths
1
15
update_date
timestamp[us]
authors_parsed
sequencelengths
1
76
label
class label
2 classes
1909.05638
Lahiru D. Chamain Hewa Gamage
Lahiru D. Chamain, Zhi Ding
Faster and Accurate Classification for JPEG2000 Compressed Images in Networked Applications
9 pages
null
null
null
cs.CV cs.LG cs.MM eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
JPEG2000 (j2k) is a highly popular format for image and video compression.With the rapidly growing applications of cloud based image classification, most existing j2k-compatible schemes would stream compressed color images from the source before reconstruction at the processing center as inputs to deep CNNs. We propose to remove the computationally costly reconstruction step by training a deep CNN image classifier using the CDF 9/7 Discrete Wavelet Transformed (DWT) coefficients directly extracted from j2k-compressed images. We demonstrate additional computation savings by utilizing shallower CNN to achieve classification of good accuracy in the DWT domain. Furthermore, we show that traditional augmentation transforms such as flipping/shifting are ineffective in the DWT domain and present different augmentation transformations to achieve more accurate classification without any additional cost. This way, faster and more accurate classification is possible for j2k encoded images without image reconstruction. Through experiments on CIFAR-10 and Tiny ImageNet data sets, we show that the performance of the proposed solution is consistent for image transmission over limited channel bandwidth.
[ { "created": "Wed, 4 Sep 2019 19:03:35 GMT", "version": "v1" } ]
2019-09-13T00:00:00
[ [ "Chamain", "Lahiru D.", "" ], [ "Ding", "Zhi", "" ] ]
0no_new_dataset
1901.10165
Fabio Cunial
Fabio Cunial and Djamal Belazzougui
Fully-functional bidirectional Burrows-Wheeler indexes
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a string $T$ on an alphabet of size $\sigma$, we describe a bidirectional Burrows-Wheeler index that takes $O(|T|\log{\sigma})$ bits of space, and that supports the addition \emph{and removal} of one character, on the left or right side of any substring of $T$, in constant time. Previously known data structures that used the same space allowed constant-time addition to any substring of $T$, but they could support removal only from specific substrings of $T$. We also describe an index that supports bidirectional addition and removal in $O(\log{\log{|T|}})$ time, and that occupies a number of words proportional to the number of left and right extensions of the maximal repeats of $T$. We use such fully-functional indexes to implement bidirectional, frequency-aware, variable-order de Bruijn graphs in small space, with no upper bound on their order, and supporting natural criteria for increasing and decreasing the order during traversal.
[ { "created": "Tue, 29 Jan 2019 08:33:09 GMT", "version": "v1" }, { "created": "Sun, 9 Jun 2019 14:08:49 GMT", "version": "v2" } ]
2019-06-11T00:00:00
[ [ "Cunial", "Fabio", "" ], [ "Belazzougui", "Djamal", "" ] ]
0no_new_dataset
2210.15917
Yanqing Xu
Yanqing Xu and Bo Wang and Enbin Song and Qingjiang Shi and Tsung-Hui Chang
Low-Complexity Channel Estimation for Massive MIMO Systems with Decentralized Baseband Processing
Submitted for publication
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The traditional centralized baseband processing architecture is faced with the bottlenecks of high computation complexity and excessive fronthaul communication, especially when the number of antennas at the base station (BS) is large. To cope with these two challenges, the decentralized baseband processing (DPB) architecture has been proposed, where the BS antennas are partitioned into multiple clusters, and each is connected to a local baseband unit (BBU). In this paper, we are interested in the low-complexity distributed channel estimation (CE) method under such DBP architecture, which is rarely studied in the literature. The aim is to devise distributed CE algorithms that can perform as well as the centralized scheme but with a small inter-BBU communication cost. Specifically, based on the low-complexity diagonal minimum mean square error channel estimator, we propose two distributed CE algorithms, namely the aggregate-then-estimate algorithm and the estimate-then-aggregate algorithm. In contrast to the existing distributed CE algorithm which requires iterative information exchanges among the nodes, our algorithms only require one roundtrip communication among BBUs. Extensive experiment results are presented to demonstrate the advantages of the proposed distributed CE algorithms in terms of estimation accuracy, inter-BBU communication cost, and computation complexity.
[ { "created": "Fri, 28 Oct 2022 05:50:54 GMT", "version": "v1" } ]
2022-10-31T00:00:00
[ [ "Xu", "Yanqing", "" ], [ "Wang", "Bo", "" ], [ "Song", "Enbin", "" ], [ "Shi", "Qingjiang", "" ], [ "Chang", "Tsung-Hui", "" ] ]
0no_new_dataset
1912.01451
Richard Tomsett
Richard Tomsett, Dan Harborne, Supriyo Chakraborty, Prudhvi Gurram, Alun Preece
Sanity Checks for Saliency Metrics
Accepted for publication at the Thirty Fourth AAAI conference on Artificial Intelligence (AAAI-20)
null
null
null
cs.LG cs.CV eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency maps are a popular approach to creating post-hoc explanations of image classifier outputs. These methods produce estimates of the relevance of each pixel to the classification output score, which can be displayed as a saliency map that highlights important pixels. Despite a proliferation of such methods, little effort has been made to quantify how good these saliency maps are at capturing the true relevance of the pixels to the classifier output (i.e. their "fidelity"). We therefore investigate existing metrics for evaluating the fidelity of saliency methods (i.e. saliency metrics). We find that there is little consistency in the literature in how such metrics are calculated, and show that such inconsistencies can have a significant effect on the measured fidelity. Further, we apply measures of reliability developed in the psychometric testing literature to assess the consistency of saliency metrics when applied to individual saliency maps. Our results show that saliency metrics can be statistically unreliable and inconsistent, indicating that comparative rankings between saliency methods generated using such metrics can be untrustworthy.
[ { "created": "Fri, 29 Nov 2019 14:30:56 GMT", "version": "v1" } ]
2019-12-04T00:00:00
[ [ "Tomsett", "Richard", "" ], [ "Harborne", "Dan", "" ], [ "Chakraborty", "Supriyo", "" ], [ "Gurram", "Prudhvi", "" ], [ "Preece", "Alun", "" ] ]
0no_new_dataset
2207.14270
F. J. Lobillo
Jos\'e G\'omez-Torrecillas and F. J. Lobillo and Gabriel Navarro
Skew differential Goppa codes and their application to McEliece cryptosystem
null
null
null
null
cs.IT cs.CR math.IT math.RA
http://creativecommons.org/licenses/by-nc-sa/4.0/
A class of linear codes that extends classic Goppa codes to a non-commutative context is defined. An efficient decoding algorithm, based on the solution of a non-commutative key equation, is designed. We show how the parameters of these codes, when the alphabet is a finite field, may be adjusted to propose a McEliece-type cryptosystem.
[ { "created": "Thu, 28 Jul 2022 17:52:27 GMT", "version": "v1" } ]
2022-07-29T00:00:00
[ [ "Gómez-Torrecillas", "José", "" ], [ "Lobillo", "F. J.", "" ], [ "Navarro", "Gabriel", "" ] ]
0no_new_dataset
2403.15123
Pablo Gonz\'alez
Olaya P\'erez-Mon, Alejandro Moreo, Juan Jos\'e del Coz, Pablo Gonz\'alez
Quantification using Permutation-Invariant Networks based on Histograms
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Quantification, also known as class prevalence estimation, is the supervised learning task in which a model is trained to predict the prevalence of each class in a given bag of examples. This paper investigates the application of deep neural networks to tasks of quantification in scenarios where it is possible to apply a symmetric supervised approach that eliminates the need for classification as an intermediary step, directly addressing the quantification problem. Additionally, it discusses existing permutation-invariant layers designed for set processing and assesses their suitability for quantification. In light of our analysis, we propose HistNetQ, a novel neural architecture that relies on a permutation-invariant representation based on histograms that is specially suited for quantification problems. Our experiments carried out in the only quantification competition held to date, show that HistNetQ outperforms other deep neural architectures devised for set processing, as well as the state-of-the-art quantification methods. Furthermore, HistNetQ offers two significant advantages over traditional quantification methods: i) it does not require the labels of the training examples but only the prevalence values of a collection of training bags, making it applicable to new scenarios; and ii) it is able to optimize any custom quantification-oriented loss function.
[ { "created": "Fri, 22 Mar 2024 11:25:38 GMT", "version": "v1" } ]
2024-03-25T00:00:00
[ [ "Pérez-Mon", "Olaya", "" ], [ "Moreo", "Alejandro", "" ], [ "del Coz", "Juan José", "" ], [ "González", "Pablo", "" ] ]
0no_new_dataset
2009.14441
Shay Deutsch Dr.
Shay Deutsch, Stefano Soatto
Spectral Embedding of Graph Networks
null
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an unsupervised graph embedding that trades off local node similarity and connectivity, and global structure. The embedding is based on a generalized graph Laplacian, whose eigenvectors compactly capture both network structure and neighborhood proximity in a single representation. The key idea is to transform the given graph into one whose weights measure the centrality of an edge by the fraction of the number of shortest paths that pass through that edge, and employ its spectral proprieties in the representation. Testing the resulting graph network representation shows significant improvement over the sate of the art in data analysis tasks including social networks and material science. We also test our method on node classification from the human-SARS CoV-2 protein-protein interactome.
[ { "created": "Wed, 30 Sep 2020 04:59:10 GMT", "version": "v1" } ]
2020-10-01T00:00:00
[ [ "Deutsch", "Shay", "" ], [ "Soatto", "Stefano", "" ] ]
0no_new_dataset
2308.09862
Onkar Litake
Maithili Sabane and Onkar Litake and Aman Chadha
Breaking Language Barriers: A Question Answering Dataset for Hindi and Marathi
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent advances in deep-learning have led to the development of highly sophisticated systems with an unquenchable appetite for data. On the other hand, building good deep-learning models for low-resource languages remains a challenging task. This paper focuses on developing a Question Answering dataset for two such languages- Hindi and Marathi. Despite Hindi being the 3rd most spoken language worldwide, with 345 million speakers, and Marathi being the 11th most spoken language globally, with 83.2 million speakers, both languages face limited resources for building efficient Question Answering systems. To tackle the challenge of data scarcity, we have developed a novel approach for translating the SQuAD 2.0 dataset into Hindi and Marathi. We release the largest Question-Answering dataset available for these languages, with each dataset containing 28,000 samples. We evaluate the dataset on various architectures and release the best-performing models for both Hindi and Marathi, which will facilitate further research in these languages. Leveraging similarity tools, our method holds the potential to create datasets in diverse languages, thereby enhancing the understanding of natural language across varied linguistic contexts. Our fine-tuned models, code, and dataset will be made publicly available.
[ { "created": "Sat, 19 Aug 2023 00:39:21 GMT", "version": "v1" }, { "created": "Fri, 1 Sep 2023 00:37:43 GMT", "version": "v2" }, { "created": "Sat, 17 Feb 2024 07:02:26 GMT", "version": "v3" } ]
2024-02-20T00:00:00
[ [ "Sabane", "Maithili", "" ], [ "Litake", "Onkar", "" ], [ "Chadha", "Aman", "" ] ]
1new_dataset
2401.00722
Libin Lan
Libin Lan, Pengzhou Cai, Lu Jiang, Xiaojuan Liu, Yongmei Li, and Yudong Zhang
BRAU-Net++: U-Shaped Hybrid CNN-Transformer Network for Medical Image Segmentation
12 pages, 6 figures, 9 tables code: https://github.com/Caipengzhou/BRAU-Netplusplus
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurate medical image segmentation is essential for clinical quantification, disease diagnosis, treatment planning and many other applications. Both convolution-based and transformer-based u-shaped architectures have made significant success in various medical image segmentation tasks. The former can efficiently learn local information of images while requiring much more image-specific inductive biases inherent to convolution operation. The latter can effectively capture long-range dependency at different feature scales using self-attention, whereas it typically encounters the challenges of quadratic compute and memory requirements with sequence length increasing. To address this problem, through integrating the merits of these two paradigms in a well-designed u-shaped architecture, we propose a hybrid yet effective CNN-Transformer network, named BRAU-Net++, for an accurate medical image segmentation task. Specifically, BRAU-Net++ uses bi-level routing attention as the core building block to design our u-shaped encoder-decoder structure, in which both encoder and decoder are hierarchically constructed, so as to learn global semantic information while reducing computational complexity. Furthermore, this network restructures skip connection by incorporating channel-spatial attention which adopts convolution operations, aiming to minimize local spatial information loss and amplify global dimension-interaction of multi-scale features. Extensive experiments on three public benchmark datasets demonstrate that our proposed approach surpasses other state-of-the-art methods including its baseline: BRAU-Net under almost all evaluation metrics. We achieve the average Dice-Similarity Coefficient (DSC) of 82.47, 90.10, and 92.94 on Synapse multi-organ segmentation, ISIC-2018 Challenge, and CVC-ClinicDB, as well as the mIoU of 84.01 and 88.17 on ISIC-2018 Challenge and CVC-ClinicDB, respectively.
[ { "created": "Mon, 1 Jan 2024 10:49:09 GMT", "version": "v1" } ]
2024-01-02T00:00:00
[ [ "Lan", "Libin", "" ], [ "Cai", "Pengzhou", "" ], [ "Jiang", "Lu", "" ], [ "Liu", "Xiaojuan", "" ], [ "Li", "Yongmei", "" ], [ "Zhang", "Yudong", "" ] ]
0no_new_dataset
2110.05044
Vedrana Krivoku\'ca Hahn
Vedrana Krivoku\'ca Hahn and S\'ebastien Marcel
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques
Version 4 corresponds to the version of the manuscript accepted for publication in IEEE TIFS. Revisions: A few broken URLs have been fixed. Consists of: 29 pages, 2 figures, 10 tables
null
10.1109/TIFS.2022.3228494
null
cs.CV cs.CR
http://creativecommons.org/licenses/by/4.0/
As automated face recognition applications tend towards ubiquity, there is a growing need to secure the sensitive face data used within these systems. This paper presents a survey of biometric template protection (BTP) methods proposed for securing face templates (images/features) in neural-network-based face recognition systems. The BTP methods are categorised into two types: Non-NN and NN-learned. Non-NN methods use a neural network (NN) as a feature extractor, but the BTP part is based on a non-NN algorithm, whereas NN-learned methods employ a NN to learn a protected template from the unprotected template. We present examples of Non-NN and NN-learned face BTP methods from the literature, along with a discussion of their strengths and weaknesses. We also investigate the techniques used to evaluate these methods in terms of the three most common BTP criteria: recognition accuracy, irreversibility, and renewability/unlinkability. The recognition accuracy of protected face recognition systems is generally evaluated using the same (empirical) techniques employed for evaluating standard (unprotected) biometric systems. However, most irreversibility and renewability/unlinkability evaluations are found to be based on theoretical assumptions/estimates or verbal implications, with a lack of empirical validation in a practical face recognition context. So, we recommend a greater focus on empirical evaluations to provide more concrete insights into the irreversibility and renewability/unlinkability of face BTP methods in practice. Additionally, an exploration of the reproducibility of the studied BTP works, in terms of the public availability of their implementation code and evaluation datasets/procedures, suggests that it would be difficult to faithfully replicate most of the reported findings. So, we advocate for a push towards reproducibility, in the hope of advancing face BTP research.
[ { "created": "Mon, 11 Oct 2021 07:25:24 GMT", "version": "v1" }, { "created": "Thu, 27 Jan 2022 16:53:38 GMT", "version": "v2" }, { "created": "Fri, 7 Oct 2022 09:43:55 GMT", "version": "v3" }, { "created": "Tue, 6 Dec 2022 15:07:30 GMT", "version": "v4" } ]
2023-09-07T00:00:00
[ [ "Hahn", "Vedrana Krivokuća", "" ], [ "Marcel", "Sébastien", "" ] ]
0no_new_dataset
1906.06651
Min Qiu
Min Qiu
Lattice Coding for Downlink Multiuser Transmission
353 pages, PhD thesis
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis, we mainly investigate the lattice coding problem of the downlink communication between a base station and multiple users. The base station broadcasts a message containing each user's intended message. The capacity limit of such a system setting is already well-known while the design of practical coding and modulation schemes to approach the theoretical limit has not been fully studied and investigated in the literature. This thesis attempts to address this problem by providing a systematic design on lattice coding and modulation schemes for downlink multiuser communication systems. The main idea is to exploit the structure property of lattices to harness interference from downlink users.
[ { "created": "Sun, 16 Jun 2019 06:06:40 GMT", "version": "v1" } ]
2019-06-18T00:00:00
[ [ "Qiu", "Min", "" ] ]
0no_new_dataset
2111.12690
Juan-Pablo Ramirez-Paredes
V. Ayala-Alfaro, J. A. Vilchis-Mar, F. E. Correa-Tome and J. P. Ramirez-Paredes
Automatic Mapping with Obstacle Identification for Indoor Human Mobility Assessment
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a framework that allows a mobile robot to build a map of an indoor scenario, identifying and highlighting objects that may be considered a hindrance to people with limited mobility. The map is built by combining recent developments in monocular SLAM with information from inertial sensors of the robot platform, resulting in a metric point cloud that can be further processed to obtain a mesh. The images from the monocular camera are simultaneously analyzed with an object recognition neural network, tuned to detect a particular class of targets. This information is then processed and incorporated on the metric map, resulting in a detailed survey of the locations and bounding volumes of the objects of interest. The result can be used to inform policy makers and users with limited mobility of the hazards present in a particular indoor location. Our initial tests were performed using a micro-UAV and will be extended to other robotic platforms.
[ { "created": "Wed, 24 Nov 2021 18:36:33 GMT", "version": "v1" } ]
2021-11-25T00:00:00
[ [ "Ayala-Alfaro", "V.", "" ], [ "Vilchis-Mar", "J. A.", "" ], [ "Correa-Tome", "F. E.", "" ], [ "Ramirez-Paredes", "J. P.", "" ] ]
0no_new_dataset
1904.00328
Lin Zhang
Lin Zhang
An Efficient Approach for Cell Segmentation in Phase Contrast Microscopy Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new model to segment cells in phase contrast microscopy images. Cell images collected from the similar scenario share a similar background. Inspired by this, we separate cells from the background in images by formulating the problem as a low-rank and structured sparse matrix decomposition problem. Then, we propose the inverse diffraction pattern filtering method to further segment individual cells in the images. This is a deconvolution process that has a much lower computational complexity when compared to the other restoration methods. Experiments demonstrate the effectiveness of the proposed model when it is compared with recent works.
[ { "created": "Sun, 31 Mar 2019 03:01:10 GMT", "version": "v1" } ]
2019-04-02T00:00:00
[ [ "Zhang", "Lin", "" ] ]
0no_new_dataset
1312.4587
Jingwei Lu
Jingwei Lu, Pengwen Chen, Chin-Chih Chang, Lu Sha, Dennis Jen-Hsin Huang, Chin-Chi Teng, Chung-Kuan Cheng
FFTPL: An Analytic Placement Algorithm Using Fast Fourier Transform for Density Equalization
null
null
null
null
cs.CE cs.AR cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a flat nonlinear placement algorithm FFTPL using fast Fourier transform for density equalization. The placement instance is modeled as an electrostatic system with the analogy of density cost to the potential energy. A well-defined Poisson's equation is proposed for gradient and cost computation. Our placer outperforms state-of-the-art placers with better solution quality and efficiency.
[ { "created": "Mon, 16 Dec 2013 23:01:46 GMT", "version": "v1" } ]
2013-12-18T00:00:00
[ [ "Lu", "Jingwei", "" ], [ "Chen", "Pengwen", "" ], [ "Chang", "Chin-Chih", "" ], [ "Sha", "Lu", "" ], [ "Huang", "Dennis Jen-Hsin", "" ], [ "Teng", "Chin-Chi", "" ], [ "Cheng", "Chung-Kuan", "" ] ]
0no_new_dataset
2209.10589
Weizi Li
Weizi Li
Understanding and Developing Equitable and Fair Transportation Systems
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by/4.0/
The transportation system is an interplay between infrastructure, vehicles, and policy. During the past century, the rapid expansion of the road network, blended with increasing vehicle production and mobility demands, has been stressing the system's capacity and resulting in a shocking amount of annual costs. To alleviate these costs while providing passengers with safe and efficient travel experiences, we need to better design and plan our transportation system. To start with, not only the design of our road network is topologically flawed but also our infrastructure likely facilitates inequality: roads and bridges are found to better connect affluent sectors while excluding the poor. While technological advancements such as connected and autonomous vehicles (CAVs) and novel operation modes such as shared economy have offered new opportunities, questions remain. First, what is the relationship between the road network, community development, demographics, and mobility behaviors? Second, by leveraging the insights from studying the first question, can we better plan, coordinate, and optimize vehicles in different modalities such as human-driven and autonomous to construct safe, efficient, and resilient traffic flows? Third, how can we build an intelligent transportation system to promote equity and fairness in our community development? This proposal is the first step toward answering these questions.
[ { "created": "Wed, 21 Sep 2022 18:26:19 GMT", "version": "v1" } ]
2022-09-23T00:00:00
[ [ "Li", "Weizi", "" ] ]
0no_new_dataset
1409.0079
Mao Yang
Mao Yang, Yong Li, Depeng Jin, Lieguang Zeng, Xin Wu, Athanasios V. Vasilakos
Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey
12 pages, 3 figures, submitted to "Mobile Networks and Applications" (MONET)
null
10.1007/s11036-014-0533-8
MONE-D-14-00029R1
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the proliferation of mobile demands and increasingly multifarious services and applications, mobile Internet has been an irreversible trend. Unfortunately, the current mobile and wireless network (MWN) faces a series of pressing challenges caused by the inherent design. In this paper, we extend two latest and promising innovations of Internet, software-defined networking and network virtualization, to mobile and wireless scenarios. We first describe the challenges and expectations of MWN, and analyze the opportunities provided by the software-defined wireless network (SDWN) and wireless network virtualization (WNV). Then, this paper focuses on SDWN and WNV by presenting the main ideas, advantages, ongoing researches and key technologies, and open issues respectively. Moreover, we interpret that these two technologies highly complement each other, and further investigate efficient joint design between them. This paper confirms that SDWN and WNV may efficiently address the crucial challenges of MWN and significantly benefit the future mobile and wireless network.
[ { "created": "Sat, 30 Aug 2014 04:02:48 GMT", "version": "v1" } ]
2014-09-05T00:00:00
[ [ "Yang", "Mao", "" ], [ "Li", "Yong", "" ], [ "Jin", "Depeng", "" ], [ "Zeng", "Lieguang", "" ], [ "Wu", "Xin", "" ], [ "Vasilakos", "Athanasios V.", "" ] ]
0no_new_dataset
2406.16777
Sai Koneru
Sai Koneru, Thai-Binh Nguyen, Ngoc-Quan Pham, Danni Liu, Zhaolin Li, Alexander Waibel, Jan Niehues
Blending LLMs into Cascaded Speech Translation: KIT's Offline Speech Translation System for IWSLT 2024
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) are currently under exploration for various tasks, including Automatic Speech Recognition (ASR), Machine Translation (MT), and even End-to-End Speech Translation (ST). In this paper, we present KIT's offline submission in the constrained + LLM track by incorporating recently proposed techniques that can be added to any cascaded speech translation. Specifically, we integrate Mistral-7B\footnote{mistralai/Mistral-7B-Instruct-v0.1} into our system to enhance it in two ways. Firstly, we refine the ASR outputs by utilizing the N-best lists generated by our system and fine-tuning the LLM to predict the transcript accurately. Secondly, we refine the MT outputs at the document level by fine-tuning the LLM, leveraging both ASR and MT predictions to improve translation quality. We find that integrating the LLM into the ASR and MT systems results in an absolute improvement of $0.3\%$ in Word Error Rate and $0.65\%$ in COMET for tst2019 test set. In challenging test sets with overlapping speakers and background noise, we find that integrating LLM is not beneficial due to poor ASR performance. Here, we use ASR with chunked long-form decoding to improve context usage that may be unavailable when transcribing with Voice Activity Detection segmentation alone.
[ { "created": "Mon, 24 Jun 2024 16:38:17 GMT", "version": "v1" } ]
2024-06-25T00:00:00
[ [ "Koneru", "Sai", "" ], [ "Nguyen", "Thai-Binh", "" ], [ "Pham", "Ngoc-Quan", "" ], [ "Liu", "Danni", "" ], [ "Li", "Zhaolin", "" ], [ "Waibel", "Alexander", "" ], [ "Niehues", "Jan", "" ] ]
0no_new_dataset
2310.11589
Belinda Z. Li
Belinda Z. Li, Alex Tamkin, Noah Goodman, Jacob Andreas
Eliciting Human Preferences with Language Models
26 pages, 15 figures
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language models (LMs) can be directed to perform target tasks by using labeled examples or natural language prompts. But selecting examples or writing prompts for can be challenging--especially in tasks that involve unusual edge cases, demand precise articulation of nebulous preferences, or require an accurate mental model of LM behavior. We propose to use *LMs themselves* to guide the task specification process. In this paper, we introduce **Generative Active Task Elicitation (GATE)**: a learning framework in which models elicit and infer intended behavior through free-form, language-based interaction with users. We study GATE in three domains: email validation, content recommendation, and moral reasoning. In preregistered experiments, we show that LMs prompted to perform GATE (e.g., by generating open-ended questions or synthesizing informative edge cases) elicit responses that are often more informative than user-written prompts or labels. Users report that interactive task elicitation requires less effort than prompting or example labeling and surfaces novel considerations not initially anticipated by users. Our findings suggest that LM-driven elicitation can be a powerful tool for aligning models to complex human preferences and values.
[ { "created": "Tue, 17 Oct 2023 21:11:21 GMT", "version": "v1" } ]
2023-10-19T00:00:00
[ [ "Li", "Belinda Z.", "" ], [ "Tamkin", "Alex", "" ], [ "Goodman", "Noah", "" ], [ "Andreas", "Jacob", "" ] ]
0no_new_dataset
2109.15117
Jakob Weissteiner
Jakob Weissteiner, Jakob Heiss, Julien Siems, Sven Seuken
Monotone-Value Neural Networks: Exploiting Preference Monotonicity in Combinatorial Assignment
null
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence Main Track (2022). Pages 541-548
10.24963/ijcai.2022/77
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many important resource allocation problems involve the combinatorial assignment of items, e.g., auctions or course allocation. Because the bundle space grows exponentially in the number of items, preference elicitation is a key challenge in these domains. Recently, researchers have proposed ML-based mechanisms that outperform traditional mechanisms while reducing preference elicitation costs for agents. However, one major shortcoming of the ML algorithms that were used is their disregard of important prior knowledge about agents' preferences. To address this, we introduce monotone-value neural networks (MVNNs), which are designed to capture combinatorial valuations, while enforcing monotonicity and normality. On a technical level, we prove that our MVNNs are universal in the class of monotone and normalized value functions, and we provide a mixed-integer linear program (MILP) formulation to make solving MVNN-based winner determination problems (WDPs) practically feasible. We evaluate our MVNNs experimentally in spectrum auction domains. Our results show that MVNNs improve the prediction performance, they yield state-of-the-art allocative efficiency in the auction, and they also reduce the run-time of the WDPs. Our code is available on GitHub: https://github.com/marketdesignresearch/MVNN.
[ { "created": "Thu, 30 Sep 2021 13:31:30 GMT", "version": "v1" }, { "created": "Fri, 1 Oct 2021 11:37:06 GMT", "version": "v2" }, { "created": "Thu, 16 Jun 2022 11:26:50 GMT", "version": "v3" }, { "created": "Mon, 29 Aug 2022 13:58:11 GMT", "version": "v4" }, { "created": "Sat, 11 Mar 2023 17:36:20 GMT", "version": "v5" } ]
2023-03-14T00:00:00
[ [ "Weissteiner", "Jakob", "" ], [ "Heiss", "Jakob", "" ], [ "Siems", "Julien", "" ], [ "Seuken", "Sven", "" ] ]
0no_new_dataset
2111.10365
Dang Qua Nguyen
Dang Qua Nguyen and Taejoon Kim
Joint Delay and Phase Precoding Under True-Time Delay Constraints for THz Massive MIMO
null
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
A new approach is presented to the problem of compensating the beam squint effect arising in wideband terahertz (THz) hybrid massive multiple-input multiple-output (MIMO) systems, based on the joint optimization of the phase shifter (PS) and true-time delay (TTD) values under per-TTD device time delay constraints. Unlike the prior approaches, the new approach does not require the unbounded time delay assumption; the range of time delay values that a TTD device can produce is strictly limited in our approach. Instead of focusing on the design of TTD values, we jointly optimize both the TTD and PS values to effectively cope with the practical time delay constraints. Simulation results that illustrate the performance benefits of the new method for the beam squint compensation are presented. Through simulations and analysis, we show that our approach is a generalization of the prior TTD-based precoding approaches.
[ { "created": "Fri, 19 Nov 2021 18:58:22 GMT", "version": "v1" }, { "created": "Sat, 12 Feb 2022 15:44:47 GMT", "version": "v2" }, { "created": "Wed, 14 Dec 2022 17:51:45 GMT", "version": "v3" }, { "created": "Sat, 21 Jan 2023 20:29:24 GMT", "version": "v4" } ]
2023-01-24T00:00:00
[ [ "Nguyen", "Dang Qua", "" ], [ "Kim", "Taejoon", "" ] ]
0no_new_dataset
1401.3381
Jan Bergstra
Jan A. Bergstra and Mark Burgess
Promises, Impositions, and other Directionals
55 pages
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Promises, impositions, proposals, predictions, and suggestions are categorized as voluntary co-operational methods. The class of voluntary co-operational methods is included in the class of so-called directionals. Directionals are mechanisms supporting the mutual coordination of autonomous agents. Notations are provided capable of expressing residual fragments of directionals. An extensive example, involving promises about the suitability of programs for tasks imposed on the promisee is presented. The example illustrates the dynamics of promises and more specifically the corresponding mechanism of trust updating and credibility updating. Trust levels and credibility levels then determine the way certain promises and impositions are handled. The ubiquity of promises and impositions is further demonstrated with two extensive examples involving human behaviour: an artificial example about an agent planning a purchase, and a realistic example describing technology mediated interaction concerning the solution of pay station failure related problems arising for an agent intending to leave the parking area.
[ { "created": "Tue, 14 Jan 2014 22:55:11 GMT", "version": "v1" } ]
2014-01-16T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Burgess", "Mark", "" ] ]
0no_new_dataset
1610.01922
Mohamad Ivan Fanany
Arif Budiman, Mohamad Ivan Fanany, Chan Basaruddin
Adaptive Online Sequential ELM for Concept Drift Tackling
Hindawi Publishing. Computational Intelligence and Neuroscience Volume 2016 (2016), Article ID 8091267, 17 pages Received 29 January 2016, Accepted 17 May 2016. Special Issue on "Advances in Neural Networks and Hybrid-Metaheuristics: Theory, Algorithms, and Novel Engineering Applications". Academic Editor: Stefan Haufe
Computational Intelligence and Neuroscience Volume 2016 (2016), Article ID 8091267, 17 pages
10.1155/2016/8091267
8091267
cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A machine learning method needs to adapt to over time changes in the environment. Such changes are known as concept drift. In this paper, we propose concept drift tackling method as an enhancement of Online Sequential Extreme Learning Machine (OS-ELM) and Constructive Enhancement OS-ELM (CEOS-ELM) by adding adaptive capability for classification and regression problem. The scheme is named as adaptive OS-ELM (AOS-ELM). It is a single classifier scheme that works well to handle real drift, virtual drift, and hybrid drift. The AOS-ELM also works well for sudden drift and recurrent context change type. The scheme is a simple unified method implemented in simple lines of code. We evaluated AOS-ELM on regression and classification problem by using concept drift public data set (SEA and STAGGER) and other public data sets such as MNIST, USPS, and IDS. Experiments show that our method gives higher kappa value compared to the multiclassifier ELM ensemble. Even though AOS-ELM in practice does not need hidden nodes increase, we address some issues related to the increasing of the hidden nodes such as error condition and rank values. We propose taking the rank of the pseudoinverse matrix as an indicator parameter to detect underfitting condition.
[ { "created": "Thu, 6 Oct 2016 16:08:52 GMT", "version": "v1" } ]
2016-10-10T00:00:00
[ [ "Budiman", "Arif", "" ], [ "Fanany", "Mohamad Ivan", "" ], [ "Basaruddin", "Chan", "" ] ]
0no_new_dataset
1811.04985
Aswin Raghavan
Samyak Parajuli, Aswin Raghavan, Sek Chai
Generalized Ternary Connect: End-to-End Learning and Compression of Multiplication-Free Deep Neural Networks
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of deep neural networks in edge computing devices hinges on the balance between accuracy and complexity of computations. Ternary Connect (TC) \cite{lin2015neural} addresses this issue by restricting the parameters to three levels $-1, 0$, and $+1$, thus eliminating multiplications in the forward pass of the network during prediction. We propose Generalized Ternary Connect (GTC), which allows an arbitrary number of levels while at the same time eliminating multiplications by restricting the parameters to integer powers of two. The primary contribution is that GTC learns the number of levels and their values for each layer, jointly with the weights of the network in an end-to-end fashion. Experiments on MNIST and CIFAR-10 show that GTC naturally converges to an `almost binary' network for deep classification networks (e.g. VGG-16) and deep variational auto-encoders, with negligible loss of classification accuracy and comparable visual quality of generated samples respectively. We demonstrate superior compression and similar accuracy of GTC in comparison to several state-of-the-art methods for neural network compression. We conclude with simulations showing the potential benefits of GTC in hardware.
[ { "created": "Mon, 12 Nov 2018 20:08:00 GMT", "version": "v1" } ]
2018-11-14T00:00:00
[ [ "Parajuli", "Samyak", "" ], [ "Raghavan", "Aswin", "" ], [ "Chai", "Sek", "" ] ]
0no_new_dataset
2105.02851
Colin Shea-Blymyer
Colin Shea-Blymyer and Houssam Abbas
Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations
To be published in ACT Transactions on Cyber-Physical Systems Special Issue on Artificial Intelligence and Cyber-Physical Systems. arXiv admin note: text overlap with arXiv:2009.00738
null
10.1145/3460975
null
cs.AI
http://creativecommons.org/licenses/by-sa/4.0/
We develop a formal framework for automatic reasoning about the obligations of autonomous cyber-physical systems, including their social and ethical obligations. Obligations, permissions and prohibitions are distinct from a system's mission, and are a necessary part of specifying advanced, adaptive AI-equipped systems. They need a dedicated deontic logic of obligations to formalize them. Most existing deontic logics lack corresponding algorithms and system models that permit automatic verification. We demonstrate how a particular deontic logic, Dominance Act Utilitarianism (DAU), is a suitable starting point for formalizing the obligations of autonomous systems like self-driving cars. We demonstrate its usefulness by formalizing a subset of Responsibility-Sensitive Safety (RSS) in DAU; RSS is an industrial proposal for how self-driving cars should and should not behave in traffic. We show that certain logical consequences of RSS are undesirable, indicating a need to further refine the proposal. We also demonstrate how obligations can change over time, which is necessary for long-term autonomy. We then demonstrate a model-checking algorithm for DAU formulas on weighted transition systems, and illustrate it by model-checking obligations of a self-driving car controller from the literature.
[ { "created": "Thu, 6 May 2021 17:41:06 GMT", "version": "v1" } ]
2021-05-07T00:00:00
[ [ "Shea-Blymyer", "Colin", "" ], [ "Abbas", "Houssam", "" ] ]
0no_new_dataset
1610.09795
Omar Al-Bataineh
Omar Al-Bataineh, Mark Reynolds, and Tim French
Finding Minimum and Maximum Termination Time of Timed Automata Models with Cyclic Behaviour
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a novel algorithm for computing best and worst case execution times (BCET/WCET) of timed automata models with cyclic behaviour. The algorithms can work on any arbitrary diagonal-free TA and can handle more cases than previously existing algorithms for BCET/WCET computations, as it can handle cycles in TA and decide whether they lead to an infinite WCET. We show soundness of the proposed algorithm and study its complexity. To our knowledge, this is the first model checking algorithm that addresses comprehensively the BCET/WCET problem of systems with cyclic behaviour. Behrmann et al. provide an algorithm for computing the minimum cost/time of reaching a goal state in priced timed automata (PTA). The algorithm has been implemented in the well-known model checking tool UPPAAL to compute the minimum time for termination of an automaton. However, we show that in certain circumstances, when infinite cycles exist, the algorithm implemented in UPPAAL may not terminate, and we provide examples which UPPAAL fails to verify.
[ { "created": "Mon, 31 Oct 2016 06:09:16 GMT", "version": "v1" } ]
2016-11-01T00:00:00
[ [ "Al-Bataineh", "Omar", "" ], [ "Reynolds", "Mark", "" ], [ "French", "Tim", "" ] ]
0no_new_dataset
2308.03695
Anuj Dawar
Anuj Dawar and Lauri Hella
Quantifiers closed under partial polymorphisms
Submitted. 17 pages
null
null
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We study Lindstrom quantifiers that satisfy certain closure properties which are motivated by the study of polymorphisms in the context of constraint satisfaction problems (CSP). When the algebra of polymorphisms of a finite structure B satisfies certain equations, this gives rise to a natural closure condition on the class of structures that map homomorphically to B. The collection of quantifiers that satisfy closure conditions arising from a fixed set of equations are rather more general than those arising as CSP. For any such conditions P, we define a pebble game that delimits the distinguishing power of the infinitary logic with all quantifiers that are P-closed. We use the pebble game to show that the problem of deciding whether a system of linear equations is solvable in Z2 is not expressible in the infinitary logic with all quantifiers closed under a near-unanimity condition.
[ { "created": "Mon, 7 Aug 2023 16:12:31 GMT", "version": "v1" } ]
2023-08-08T00:00:00
[ [ "Dawar", "Anuj", "" ], [ "Hella", "Lauri", "" ] ]
0no_new_dataset
2405.02954
Wenyu Zhang
Wenyu Zhang and Li Shen and Chuan-Sheng Foo
Source-Free Domain Adaptation Guided by Vision and Vision-Language Pre-Training
Extension of ICCV paper arXiv:2212.07585, submitted to IJCV
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Source-free domain adaptation (SFDA) aims to adapt a source model trained on a fully-labeled source domain to a related but unlabeled target domain. While the source model is a key avenue for acquiring target pseudolabels, the generated pseudolabels may exhibit source bias. In the conventional SFDA pipeline, a large data (e.g. ImageNet) pre-trained feature extractor is used to initialize the source model at the start of source training, and subsequently discarded. Despite having diverse features important for generalization, the pre-trained feature extractor can overfit to the source data distribution during source training and forget relevant target domain knowledge. Rather than discarding this valuable knowledge, we introduce an integrated framework to incorporate pre-trained networks into the target adaptation process. The proposed framework is flexible and allows us to plug modern pre-trained networks into the adaptation process to leverage their stronger representation learning capabilities. For adaptation, we propose the Co-learn algorithm to improve target pseudolabel quality collaboratively through the source model and a pre-trained feature extractor. Building on the recent success of the vision-language model CLIP in zero-shot image recognition, we present an extension Co-learn++ to further incorporate CLIP's zero-shot classification decisions. We evaluate on 3 benchmark datasets and include more challenging scenarios such as open-set, partial-set and open-partial SFDA. Experimental results demonstrate that our proposed strategy improves adaptation performance and can be successfully integrated with existing SFDA methods.
[ { "created": "Sun, 5 May 2024 14:48:13 GMT", "version": "v1" } ]
2024-05-07T00:00:00
[ [ "Zhang", "Wenyu", "" ], [ "Shen", "Li", "" ], [ "Foo", "Chuan-Sheng", "" ] ]
0no_new_dataset
2107.00956
R\'emy Portelas
Grgur Kova\v{c}, R\'emy Portelas, Katja Hofmann, Pierre-Yves Oudeyer
SocialAI: Benchmarking Socio-Cognitive Abilities in Deep Reinforcement Learning Agents
under review. This paper extends and generalizes work in arXiv:2104.13207
null
null
null
cs.LG cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Building embodied autonomous agents capable of participating in social interactions with humans is one of the main challenges in AI. Within the Deep Reinforcement Learning (DRL) field, this objective motivated multiple works on embodied language use. However, current approaches focus on language as a communication tool in very simplified and non-diverse social situations: the "naturalness" of language is reduced to the concept of high vocabulary size and variability. In this paper, we argue that aiming towards human-level AI requires a broader set of key social skills: 1) language use in complex and variable social contexts; 2) beyond language, complex embodied communication in multimodal settings within constantly evolving social worlds. We explain how concepts from cognitive sciences could help AI to draw a roadmap towards human-like intelligence, with a focus on its social dimensions. As a first step, we propose to expand current research to a broader set of core social skills. To do this, we present SocialAI, a benchmark to assess the acquisition of social skills of DRL agents using multiple grid-world environments featuring other (scripted) social agents. We then study the limits of a recent SOTA DRL approach when tested on SocialAI and discuss important next steps towards proficient social agents. Videos and code are available at https://sites.google.com/view/socialai.
[ { "created": "Fri, 2 Jul 2021 10:39:18 GMT", "version": "v1" }, { "created": "Tue, 6 Jul 2021 06:42:34 GMT", "version": "v2" }, { "created": "Wed, 1 Sep 2021 15:51:52 GMT", "version": "v3" } ]
2021-09-02T00:00:00
[ [ "Kovač", "Grgur", "" ], [ "Portelas", "Rémy", "" ], [ "Hofmann", "Katja", "" ], [ "Oudeyer", "Pierre-Yves", "" ] ]
1new_dataset
2101.11212
Muhammad Asif Ali
Muhammad Asif Ali, Yifang Sun, Bing Li, Wei Wang
FGNET-RH: Fine-Grained Named Entity Typing via Refinement in Hyperbolic Space
Updated the Abstract and title to make it true representative of the paper
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Fine-Grained Named Entity Typing (FG-NET) aims at classifying the entity mentions into a wide range of entity types (usually hundreds) depending upon the context. While distant supervision is the most common way to acquire supervised training data, it brings in label noise, as it assigns type labels to the entity mentions irrespective of mentions context. In attempts to deal with the label noise, leading research on the FG-NET assumes that the fine-grained entity typing data possesses a euclidean nature, which restraints the ability of the existing models in combating the label noise. Given the fact that the fine-grained type hierarchy exhibits a hierarchical structure, it makes hyperbolic space a natural choice to model the FG-NET data. In this research, we propose FGNET-RH, a novel framework that benefits from the hyperbolic geometry in combination with the graph structures to perform entity typing in a performance-enhanced fashion. FGNET-RH initially uses LSTM networks to encode the mention in relation with its context, later it forms a graph to distill/refine the mention encodings in the hyperbolic space. Finally, the refined mention encoding is used for entity typing. Experimentation using different benchmark datasets shows that FGNET-RH improves the performance on FG-NET by up to 3.5-% in terms of strict accuracy.
[ { "created": "Wed, 27 Jan 2021 05:39:05 GMT", "version": "v1" }, { "created": "Thu, 20 Jan 2022 16:42:30 GMT", "version": "v2" }, { "created": "Sat, 18 Jun 2022 09:14:04 GMT", "version": "v3" } ]
2022-06-22T00:00:00
[ [ "Ali", "Muhammad Asif", "" ], [ "Sun", "Yifang", "" ], [ "Li", "Bing", "" ], [ "Wang", "Wei", "" ] ]
0no_new_dataset
1804.09449
Vahan Mkrtchyan
Giuseppe Mazzuoccolo, Vahan Mkrtchyan
Normal edge-colorings of cubic graphs
17 pages, 6 figures
null
10.1002/jgt.22507
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A normal $k$-edge-coloring of a cubic graph is an edge-coloring with $k$ colors having the additional property that when looking at the set of colors assigned to any edge $e$ and the four edges adjacent it, we have either exactly five distinct colors or exactly three distinct colors. We denote by $\chi'_{N}(G)$ the smallest $k$, for which $G$ admits a normal $k$-edge-coloring. Normal $k$-edge-colorings were introduced by Jaeger in order to study his well-known Petersen Coloring Conjecture. More precisely, it is known that proving $\chi'_{N}(G)\leq 5$ for every bridgeless cubic graph is equivalent to proving Petersen Coloring Conjecture and then, among others, Cycle Double Cover Conjecture and Berge-Fulkerson Conjecture. Considering the larger class of all simple cubic graphs (not necessarily bridgeless), some interesting questions naturally arise. For instance, there exist simple cubic graphs, not bridgeless, with $\chi'_{N}(G)=7$. On the other hand, the known best general upper bound for $\chi'_{N}(G)$ was $9$. Here, we improve it by proving that $\chi'_{N}(G)\leq7$ for any simple cubic graph $G$, which is best possible. We obtain this result by proving the existence of specific no-where zero $\mathbb{Z}_2^2$-flows in $4$-edge-connected graphs.
[ { "created": "Wed, 25 Apr 2018 09:30:19 GMT", "version": "v1" }, { "created": "Wed, 13 Mar 2019 16:14:39 GMT", "version": "v2" } ]
2021-10-05T00:00:00
[ [ "Mazzuoccolo", "Giuseppe", "" ], [ "Mkrtchyan", "Vahan", "" ] ]
0no_new_dataset
2211.11690
Joshua Lockhart
Joshua Lockhart, Daniele Magazzeni, Manuela Veloso
Learn to explain yourself, when you can: Equipping Concept Bottleneck Models with the ability to abstain on their concept predictions
Changed LaTeX template
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Concept Bottleneck Models (CBMs) of Koh et al. [2020] provide a means to ensure that a neural network based classifier bases its predictions solely on human understandable concepts. The concept labels, or rationales as we refer to them, are learned by the concept labeling component of the CBM. Another component learns to predict the target classification label from these predicted concept labels. Unfortunately, these models are heavily reliant on human provided concept labels for each datapoint. To enable CBMs to behave robustly when these labels are not readily available, we show how to equip them with the ability to abstain from predicting concepts when the concept labeling component is uncertain. In other words, our model learns to provide rationales for its predictions, but only whenever it is sure the rationale is correct.
[ { "created": "Mon, 21 Nov 2022 18:07:14 GMT", "version": "v1" }, { "created": "Sun, 18 Dec 2022 22:06:46 GMT", "version": "v2" } ]
2022-12-20T00:00:00
[ [ "Lockhart", "Joshua", "" ], [ "Magazzeni", "Daniele", "" ], [ "Veloso", "Manuela", "" ] ]
0no_new_dataset
2302.06832
Hyung-Chan An
Yongho Shin, Changyeol Lee, Gukryeol Lee, Hyung-Chan An
Improved Learning-Augmented Algorithms for the Multi-Option Ski Rental Problem via Best-Possible Competitive Analysis
23 pages, 1 figure
null
null
null
cs.DS cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
In this paper, we present improved learning-augmented algorithms for the multi-option ski rental problem. Learning-augmented algorithms take ML predictions as an added part of the input and incorporates these predictions in solving the given problem. Due to their unique strength that combines the power of ML predictions with rigorous performance guarantees, they have been extensively studied in the context of online optimization problems. Even though ski rental problems are one of the canonical problems in the field of online optimization, only deterministic algorithms were previously known for multi-option ski rental, with or without learning augmentation. We present the first randomized learning-augmented algorithm for this problem, surpassing previous performance guarantees given by deterministic algorithms. Our learning-augmented algorithm is based on a new, provably best-possible randomized competitive algorithm for the problem. Our results are further complemented by lower bounds for deterministic and randomized algorithms, and computational experiments evaluating our algorithms' performance improvements.
[ { "created": "Tue, 14 Feb 2023 05:05:03 GMT", "version": "v1" } ]
2023-02-15T00:00:00
[ [ "Shin", "Yongho", "" ], [ "Lee", "Changyeol", "" ], [ "Lee", "Gukryeol", "" ], [ "An", "Hyung-Chan", "" ] ]
0no_new_dataset
1706.06982
Matthew Tesfaldet
Matthew Tesfaldet, Marcus A. Brubaker, Konstantinos G. Derpanis
Two-Stream Convolutional Networks for Dynamic Texture Synthesis
In proc. CVPR 2018. Full results available at https://ryersonvisionlab.github.io/two-stream-projpage/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a two-stream model for dynamic texture synthesis. Our model is based on pre-trained convolutional networks (ConvNets) that target two independent tasks: (i) object recognition, and (ii) optical flow prediction. Given an input dynamic texture, statistics of filter responses from the object recognition ConvNet encapsulate the per-frame appearance of the input texture, while statistics of filter responses from the optical flow ConvNet model its dynamics. To generate a novel texture, a randomly initialized input sequence is optimized to match the feature statistics from each stream of an example texture. Inspired by recent work on image style transfer and enabled by the two-stream model, we also apply the synthesis approach to combine the texture appearance from one texture with the dynamics of another to generate entirely novel dynamic textures. We show that our approach generates novel, high quality samples that match both the framewise appearance and temporal evolution of input texture. Finally, we quantitatively evaluate our texture synthesis approach with a thorough user study.
[ { "created": "Wed, 21 Jun 2017 16:09:28 GMT", "version": "v1" }, { "created": "Fri, 24 Nov 2017 18:42:02 GMT", "version": "v2" }, { "created": "Tue, 10 Apr 2018 23:47:29 GMT", "version": "v3" }, { "created": "Thu, 12 Apr 2018 21:39:51 GMT", "version": "v4" } ]
2018-04-16T00:00:00
[ [ "Tesfaldet", "Matthew", "" ], [ "Brubaker", "Marcus A.", "" ], [ "Derpanis", "Konstantinos G.", "" ] ]
0no_new_dataset
2111.05684
Kateryna Chumachenko
Firas Laakom, Kateryna Chumachenko, Jenni Raitoharju, Alexandros Iosifidis, and Moncef Gabbouj
Learning to ignore: rethinking attention in CNNs
accepted to BMVC 2021
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been an increasing interest in applying attention mechanisms in Convolutional Neural Networks (CNNs) to solve computer vision tasks. Most of these methods learn to explicitly identify and highlight relevant parts of the scene and pass the attended image to further layers of the network. In this paper, we argue that such an approach might not be optimal. Arguably, explicitly learning which parts of the image are relevant is typically harder than learning which parts of the image are less relevant and, thus, should be ignored. In fact, in vision domain, there are many easy-to-identify patterns of irrelevant features. For example, image regions close to the borders are less likely to contain useful information for a classification task. Based on this idea, we propose to reformulate the attention mechanism in CNNs to learn to ignore instead of learning to attend. Specifically, we propose to explicitly learn irrelevant information in the scene and suppress it in the produced representation, keeping only important attributes. This implicit attention scheme can be incorporated into any existing attention mechanism. In this work, we validate this idea using two recent attention methods Squeeze and Excitation (SE) block and Convolutional Block Attention Module (CBAM). Experimental results on different datasets and model architectures show that learning to ignore, i.e., implicit attention, yields superior performance compared to the standard approaches.
[ { "created": "Wed, 10 Nov 2021 13:47:37 GMT", "version": "v1" } ]
2021-11-11T00:00:00
[ [ "Laakom", "Firas", "" ], [ "Chumachenko", "Kateryna", "" ], [ "Raitoharju", "Jenni", "" ], [ "Iosifidis", "Alexandros", "" ], [ "Gabbouj", "Moncef", "" ] ]
0no_new_dataset
2307.02018
Jionghao Lin
Dollaya Hirunyasiri, Danielle R. Thomas, Jionghao Lin, Kenneth R. Koedinger, Vincent Aleven
Comparative Analysis of GPT-4 and Human Graders in Evaluating Praise Given to Students in Synthetic Dialogues
12 pages Workshop paper, The 24th International Conference on Artificial Intelligence in Education, AIED 2023 Educational Dialogue Act Classification, Large Language Models, Tutor Training
null
null
null
cs.CL cs.AI cs.HC
http://creativecommons.org/licenses/by/4.0/
Research suggests that providing specific and timely feedback to human tutors enhances their performance. However, it presents challenges due to the time-consuming nature of assessing tutor performance by human evaluators. Large language models, such as the AI-chatbot ChatGPT, hold potential for offering constructive feedback to tutors in practical settings. Nevertheless, the accuracy of AI-generated feedback remains uncertain, with scant research investigating the ability of models like ChatGPT to deliver effective feedback. In this work-in-progress, we evaluate 30 dialogues generated by GPT-4 in a tutor-student setting. We use two different prompting approaches, the zero-shot chain of thought and the few-shot chain of thought, to identify specific components of effective praise based on five criteria. These approaches are then compared to the results of human graders for accuracy. Our goal is to assess the extent to which GPT-4 can accurately identify each praise criterion. We found that both zero-shot and few-shot chain of thought approaches yield comparable results. GPT-4 performs moderately well in identifying instances when the tutor offers specific and immediate praise. However, GPT-4 underperforms in identifying the tutor's ability to deliver sincere praise, particularly in the zero-shot prompting scenario where examples of sincere tutor praise statements were not provided. Future work will focus on enhancing prompt engineering, developing a more general tutoring rubric, and evaluating our method using real-life tutoring dialogues.
[ { "created": "Wed, 5 Jul 2023 04:14:01 GMT", "version": "v1" } ]
2023-07-06T00:00:00
[ [ "Hirunyasiri", "Dollaya", "" ], [ "Thomas", "Danielle R.", "" ], [ "Lin", "Jionghao", "" ], [ "Koedinger", "Kenneth R.", "" ], [ "Aleven", "Vincent", "" ] ]
0no_new_dataset
2311.01078
Samuel A. Prieto
Samuel A. Prieto, Nikolaos Giakoumidis, and Borja Garcia de Soto
Multi-agent robotic systems and exploration algorithms: Applications for data collection in construction sites
null
null
10.1002/rob.22316
null
cs.RO cs.MA
http://creativecommons.org/licenses/by-nc-nd/4.0/
The construction industry has been notoriously slow to adopt new technology and embrace automation. This has resulted in lower efficiency and productivity compared to other industries where automation has been widely adopted. However, recent advancements in robotics and artificial intelligence offer a potential solution to this problem. In this study, a methodology is proposed to integrate multi-robotic systems in construction projects with the aim of increasing efficiency and productivity. The proposed approach involves the use of multiple robot and human agents working collaboratively to complete a construction task. The methodology was tested through a case study that involved 3D digitization of a small, occluded space using two robots and one human agent. The results show that integrating multi-agent robotic systems in construction can effectively overcome challenges and complete tasks efficiently. The implications of this study suggest that multi-agent robotic systems could revolutionize the industry.
[ { "created": "Thu, 2 Nov 2023 08:42:39 GMT", "version": "v1" } ]
2024-04-03T00:00:00
[ [ "Prieto", "Samuel A.", "" ], [ "Giakoumidis", "Nikolaos", "" ], [ "de Soto", "Borja Garcia", "" ] ]
0no_new_dataset
2306.07198
Jeremy Gwinnup
Jeremy Gwinnup and Kevin Duh
A Survey of Vision-Language Pre-training from the Lens of Multimodal Machine Translation
10 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large language models such as BERT and the GPT series started a paradigm shift that calls for building general-purpose models via pre-training on large datasets, followed by fine-tuning on task-specific datasets. There is now a plethora of large pre-trained models for Natural Language Processing and Computer Vision. Recently, we have seen rapid developments in the joint Vision-Language space as well, where pre-trained models such as CLIP (Radford et al., 2021) have demonstrated improvements in downstream tasks like image captioning and visual question answering. However, surprisingly there is comparatively little work on exploring these models for the task of multimodal machine translation, where the goal is to leverage image/video modality in text-to-text translation. To fill this gap, this paper surveys the landscape of language-and-vision pre-training from the lens of multimodal machine translation. We summarize the common architectures, pre-training objectives, and datasets from literature and conjecture what further is needed to make progress on multimodal machine translation.
[ { "created": "Mon, 12 Jun 2023 15:56:10 GMT", "version": "v1" } ]
2023-06-13T00:00:00
[ [ "Gwinnup", "Jeremy", "" ], [ "Duh", "Kevin", "" ] ]
0no_new_dataset
2105.02551
Jary Pomponi
Jary Pomponi, Simone Scardapane, and Aurelio Uncini
Structured Ensembles: an Approach to Reduce the Memory Footprint of Ensemble Methods
Article accepted at Neural Networks
null
10.1016/j.neunet.2021.09.007
null
cs.LG cs.AI stat.ML
http://creativecommons.org/licenses/by/4.0/
In this paper, we propose a novel ensembling technique for deep neural networks, which is able to drastically reduce the required memory compared to alternative approaches. In particular, we propose to extract multiple sub-networks from a single, untrained neural network by solving an end-to-end optimization task combining differentiable scaling over the original architecture, with multiple regularization terms favouring the diversity of the ensemble. Since our proposal aims to detect and extract sub-structures, we call it Structured Ensemble. On a large experimental evaluation, we show that our method can achieve higher or comparable accuracy to competing methods while requiring significantly less storage. In addition, we evaluate our ensembles in terms of predictive calibration and uncertainty, showing they compare favourably with the state-of-the-art. Finally, we draw a link with the continual learning literature, and we propose a modification of our framework to handle continuous streams of tasks with a sub-linear memory cost. We compare with a number of alternative strategies to mitigate catastrophic forgetting, highlighting advantages in terms of average accuracy and memory.
[ { "created": "Thu, 6 May 2021 09:56:01 GMT", "version": "v1" }, { "created": "Fri, 17 Sep 2021 08:51:12 GMT", "version": "v2" } ]
2022-10-07T00:00:00
[ [ "Pomponi", "Jary", "" ], [ "Scardapane", "Simone", "" ], [ "Uncini", "Aurelio", "" ] ]
0no_new_dataset
2310.02206
Thomas Lee
Thomas L. Lee, Amos Storkey
Chunking: Continual Learning is not just about Distribution Shift
Published at the 3rd Conference on Lifelong Learning Agents (CoLLAs), 2024
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Work on continual learning (CL) has thus far largely focused on the problems arising from shifts in the data distribution. However, CL can be decomposed into two sub-problems: (a) shifts in the data distribution, and (b) dealing with the fact that the data is split into chunks and so only a part of the data is available to be trained on at any point in time. In this work, we look at the latter sub-problem, the chunking of data. We show that chunking is an important part of CL, accounting for around half of the performance drop from offline learning in our experiments. Furthermore, our results reveal that current CL algorithms do not address the chunking sub-problem, only performing as well as plain SGD training when there is no shift in the data distribution. Therefore, we show that chunking is both an important and currently unaddressed sub-problem and until it is addressed CL methods will be capped in performance. Additionally, we analyse why performance drops when learning occurs on identically distributed chunks of data, and find that forgetting, which is often seen to be a problem due to distribution shift, still arises and is a significant problem. We also show that performance on the chunking sub-problem can be increased and that this performance transfers to the full CL setting, where there is distribution shift. Hence, we argue that work on chunking can help advance CL in general.
[ { "created": "Tue, 3 Oct 2023 17:04:33 GMT", "version": "v1" }, { "created": "Thu, 11 Jul 2024 12:13:38 GMT", "version": "v2" } ]
2024-07-12T00:00:00
[ [ "Lee", "Thomas L.", "" ], [ "Storkey", "Amos", "" ] ]
0no_new_dataset
2303.04887
Kai Zhang
Kai Zhang, Yutong Dai, Hongyi Wang, Eric Xing, Xun Chen, Lichao Sun
Memory-adaptive Depth-wise Heterogenous Federated Learning
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Federated learning is a promising paradigm that allows multiple clients to collaboratively train a model without sharing the local data. However, the presence of heterogeneous devices in federated learning, such as mobile phones and IoT devices with varying memory capabilities, would limit the scale and hence the performance of the model could be trained. The mainstream approaches to address memory limitations focus on width-slimming techniques, where different clients train subnetworks with reduced widths locally and then the server aggregates the subnetworks. The global model produced from these methods suffers from performance degradation due to the negative impact of the actions taken to handle the varying subnetwork widths in the aggregation phase. In this paper, we introduce a memory-adaptive depth-wise learning solution in FL called FeDepth, which adaptively decomposes the full model into blocks according to the memory budgets of each client and trains blocks sequentially to obtain a full inference model. Our method outperforms state-of-the-art approaches, achieving 5% and more than 10% improvements in top-1 accuracy on CIFAR-10 and CIFAR-100, respectively. We also demonstrate the effectiveness of depth-wise fine-tuning on ViT. Our findings highlight the importance of memory-aware techniques for federated learning with heterogeneous devices and the success of depth-wise training strategy in improving the global model's performance.
[ { "created": "Wed, 8 Mar 2023 20:52:57 GMT", "version": "v1" }, { "created": "Wed, 10 Jan 2024 18:03:01 GMT", "version": "v2" } ]
2024-01-11T00:00:00
[ [ "Zhang", "Kai", "" ], [ "Dai", "Yutong", "" ], [ "Wang", "Hongyi", "" ], [ "Xing", "Eric", "" ], [ "Chen", "Xun", "" ], [ "Sun", "Lichao", "" ] ]
0no_new_dataset
2401.08686
Andr\'e Luiz Vieira e Silva
Andr\'e Luiz B. Vieira e Silva, Francisco Sim\~oes, Danny Kowerko, Tobias Schlosser, Felipe Battisti, Veronica Teichrieb
Attention Modules Improve Modern Image-Level Anomaly Detection: A DifferNet Case Study
Accepted to CVPRW 2023: VISION'23 - 1st workshop on Vision-based InduStrial InspectiON (Extended Abstract). arXiv admin note: substantial text overlap with arXiv:2311.02747
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Within (semi-)automated visual inspection, learning-based approaches for assessing visual defects, including deep neural networks, enable the processing of otherwise small defect patterns in pixel size on high-resolution imagery. The emergence of these often rarely occurring defect patterns explains the general need for labeled data corpora. To not only alleviate this issue but to furthermore advance the current state of the art in unsupervised visual inspection, this contribution proposes a DifferNet-based solution enhanced with attention modules utilizing SENet and CBAM as backbone - AttentDifferNet - to improve the detection and classification capabilities on three different visual inspection and anomaly detection datasets: MVTec AD, InsPLAD-fault, and Semiconductor Wafer. In comparison to the current state of the art, it is shown that AttentDifferNet achieves improved results, which are, in turn, highlighted throughout our quantitative as well as qualitative evaluation, indicated by a general improvement in AUC of 94.34 vs. 92.46, 96.67 vs. 94.69, and 90.20 vs. 88.74%. As our variants to AttentDifferNet show great prospects in the context of currently investigated approaches, a baseline is formulated, emphasizing the importance of attention for anomaly detection.
[ { "created": "Sat, 13 Jan 2024 03:09:47 GMT", "version": "v1" } ]
2024-01-18T00:00:00
[ [ "Silva", "André Luiz B. Vieira e", "" ], [ "Simões", "Francisco", "" ], [ "Kowerko", "Danny", "" ], [ "Schlosser", "Tobias", "" ], [ "Battisti", "Felipe", "" ], [ "Teichrieb", "Veronica", "" ] ]
1new_dataset
1604.06899
Philipp Singer
Philipp Singer, Emilio Ferrara, Farshad Kooti, Markus Strohmaier and Kristina Lerman
Evidence of Online Performance Deterioration in User Sessions on Reddit
Published in PlosOne
PLoS ONE 11(8): e0161636, 2016
10.1371/journal.pone.0161636
null
cs.SI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents evidence of performance deterioration in online user sessions quantified by studying a massive dataset containing over 55 million comments posted on Reddit in April 2015. After segmenting the sessions (i.e., periods of activity without a prolonged break) depending on their intensity (i.e., how many posts users produced during sessions), we observe a general decrease in the quality of comments produced by users over the course of sessions. We propose mixed-effects models that capture the impact of session intensity on comments, including their length, quality, and the responses they generate from the community. Our findings suggest performance deterioration: Sessions of increasing intensity are associated with the production of shorter, progressively less complex comments, which receive declining quality scores (as rated by other users), and are less and less engaging (i.e., they attract fewer responses). Our contribution evokes a connection between cognitive and attention dynamics and the usage of online social peer production platforms, specifically the effects of deterioration of user performance.
[ { "created": "Sat, 23 Apr 2016 12:22:24 GMT", "version": "v1" }, { "created": "Fri, 26 Aug 2016 10:30:25 GMT", "version": "v2" } ]
2017-03-07T00:00:00
[ [ "Singer", "Philipp", "" ], [ "Ferrara", "Emilio", "" ], [ "Kooti", "Farshad", "" ], [ "Strohmaier", "Markus", "" ], [ "Lerman", "Kristina", "" ] ]
1new_dataset
2109.07724
Aron Laszka
Shanto Roy and Salah Uddin Kadir and Yevgeniy Vorobeychik and Aron Laszka
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies
null
null
null
null
cs.CR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which enables the defender to remotely verify the integrity of devices and their software. There are a number of approaches for remote attestation, and each has its unique advantages and disadvantages in terms of detection accuracy and computational cost. Further, an attestation method may be applied in multiple ways, such as various levels of software coverage. Therefore, to minimize both security risks and computational overhead, defenders need to decide strategically which attestation methods to apply and how to apply them, depending on the characteristic of the devices and the potential losses. To answer these questions, we first develop a testbed for remote attestation of IoT devices, which enables us to measure the detection accuracy and performance overhead of various attestation methods. Our testbed integrates two example IoT applications, memory-checksum based attestation, and a variety of software vulnerabilities that allow adversaries to inject arbitrary code into running applications. Second, we model the problem of finding an optimal strategy for applying remote attestation as a Stackelberg security game between a defender and an adversary. We characterize the defender's optimal attestation strategy in a variety of special cases. Finally, building on experimental results from our testbed, we evaluate our model and show that optimal strategic attestation can lead to significantly lower losses than naive baseline strategies.
[ { "created": "Thu, 16 Sep 2021 05:05:18 GMT", "version": "v1" }, { "created": "Sun, 26 Sep 2021 23:12:10 GMT", "version": "v2" } ]
2021-09-28T00:00:00
[ [ "Roy", "Shanto", "" ], [ "Kadir", "Salah Uddin", "" ], [ "Vorobeychik", "Yevgeniy", "" ], [ "Laszka", "Aron", "" ] ]
0no_new_dataset
cs/0601061
Vedran Kordic
I. Topalova
Modular Adaptive System Based on a Multi-Stage Neural Structure for Recognition of 2D Objects of Discontinuous Production
www.ars-journal.com
International Journal of Advanced Robotics Systems, Vol.2No1. (2005)
null
null
cs.RO
null
This is a presentation of a new system for invariant recognition of 2D objects with overlapping classes, that can not be effectively recognized with the traditional methods. The translation, scale and partial rotation invariant contour object description is transformed in a DCT spectrum space. The obtained frequency spectrums are decomposed into frequency bands in order to feed different BPG neural nets (NNs). The NNs are structured in three stages - filtering and full rotation invariance; partial recognition; general classification. The designed multi-stage BPG Neural Structure shows very good accuracy and flexibility when tested with 2D objects used in the discontinuous production. The reached speed and the opportunuty for an easy restructuring and reprogramming of the system makes it suitable for application in different applied systems for real time work.
[ { "created": "Sat, 14 Jan 2006 08:25:25 GMT", "version": "v1" } ]
2007-05-23T00:00:00
[ [ "Topalova", "I.", "" ] ]
0no_new_dataset
2403.10330
Tobias Leemann
Tobias Leemann, Martin Pawelczyk, Bardh Prenkaj, Gjergji Kasneci
Towards Non-Adversarial Algorithmic Recourse
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The streams of research on adversarial examples and counterfactual explanations have largely been growing independently. This has led to several recent works trying to elucidate their similarities and differences. Most prominently, it has been argued that adversarial examples, as opposed to counterfactual explanations, have a unique characteristic in that they lead to a misclassification compared to the ground truth. However, the computational goals and methodologies employed in existing counterfactual explanation and adversarial example generation methods often lack alignment with this requirement. Using formal definitions of adversarial examples and counterfactual explanations, we introduce non-adversarial algorithmic recourse and outline why in high-stakes situations, it is imperative to obtain counterfactual explanations that do not exhibit adversarial characteristics. We subsequently investigate how different components in the objective functions, e.g., the machine learning model or cost function used to measure distance, determine whether the outcome can be considered an adversarial example or not. Our experiments on common datasets highlight that these design choices are often more critical in deciding whether recourse is non-adversarial than whether recourse or attack algorithms are used. Furthermore, we show that choosing a robust and accurate machine learning model results in less adversarial recourse desired in practice.
[ { "created": "Fri, 15 Mar 2024 14:18:21 GMT", "version": "v1" } ]
2024-03-18T00:00:00
[ [ "Leemann", "Tobias", "" ], [ "Pawelczyk", "Martin", "" ], [ "Prenkaj", "Bardh", "" ], [ "Kasneci", "Gjergji", "" ] ]
0no_new_dataset
1607.02060
Huu-Hiep Nguyen
Hiep H. Nguyen, Abdessamad Imine, and Michael Rusinowitch
Detecting Communities under Differential Privacy
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex networks usually expose community structure with groups of nodes sharing many links with the other nodes in the same group and relatively few with the nodes of the rest. This feature captures valuable information about the organization and even the evolution of the network. Over the last decade, a great number of algorithms for community detection have been proposed to deal with the increasingly complex networks. However, the problem of doing this in a private manner is rarely considered. In this paper, we solve this problem under differential privacy, a prominent privacy concept for releasing private data. We analyze the major challenges behind the problem and propose several schemes to tackle them from two perspectives: input perturbation and algorithm perturbation. We choose Louvain method as the back-end community detection for input perturbation schemes and propose the method LouvainDP which runs Louvain algorithm on a noisy super-graph. For algorithm perturbation, we design ModDivisive using exponential mechanism with the modularity as the score. We have thoroughly evaluated our techniques on real graphs of different sizes and verified their outperformance over the state-of-the-art.
[ { "created": "Thu, 7 Jul 2016 15:57:49 GMT", "version": "v1" } ]
2016-07-08T00:00:00
[ [ "Nguyen", "Hiep H.", "" ], [ "Imine", "Abdessamad", "" ], [ "Rusinowitch", "Michael", "" ] ]
0no_new_dataset
2202.11202
Kaiwen Zha
Hao He, Kaiwen Zha, Dina Katabi
Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning
ICLR 2023 Spotlight (notable top 25%). The first two authors contributed equally to this paper
null
null
null
cs.LG cs.AI cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indiscriminate data poisoning attacks are quite effective against supervised learning. However, not much is known about their impact on unsupervised contrastive learning (CL). This paper is the first to consider indiscriminate poisoning attacks of contrastive learning. We propose Contrastive Poisoning (CP), the first effective such attack on CL. We empirically show that Contrastive Poisoning, not only drastically reduces the performance of CL algorithms, but also attacks supervised learning models, making it the most generalizable indiscriminate poisoning attack. We also show that CL algorithms with a momentum encoder are more robust to indiscriminate poisoning, and propose a new countermeasure based on matrix completion. Code is available at: https://github.com/kaiwenzha/contrastive-poisoning.
[ { "created": "Tue, 22 Feb 2022 22:31:57 GMT", "version": "v1" }, { "created": "Tue, 4 Oct 2022 00:46:06 GMT", "version": "v2" }, { "created": "Thu, 9 Mar 2023 05:16:49 GMT", "version": "v3" } ]
2023-03-10T00:00:00
[ [ "He", "Hao", "" ], [ "Zha", "Kaiwen", "" ], [ "Katabi", "Dina", "" ] ]
0no_new_dataset
2102.05096
Jay Nandy
Jay Nandy and Sudipan Saha and Wynne Hsu and Mong Li Lee and Xiao Xiang Zhu
Towards Bridging the gap between Empirical and Certified Robustness against Adversarial Examples
An abridged version of this work has been presented at ICLR 2021 Workshop on Security and Safety in Machine Learning Systems: https://aisecure-workshop.github.io/aml-iclr2021/papers/2.pdf
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current state-of-the-art defense methods against adversarial examples typically focus on improving either empirical or certified robustness. Among them, adversarially trained (AT) models produce empirical state-of-the-art defense against adversarial examples without providing any robustness guarantees for large classifiers or higher-dimensional inputs. In contrast, existing randomized smoothing based models achieve state-of-the-art certified robustness while significantly degrading the empirical robustness against adversarial examples. In this paper, we propose a novel method, called \emph{Certification through Adaptation}, that transforms an AT model into a randomized smoothing classifier during inference to provide certified robustness for $\ell_2$ norm without affecting their empirical robustness against adversarial attacks. We also propose \emph{Auto-Noise} technique that efficiently approximates the appropriate noise levels to flexibly certify the test examples using randomized smoothing technique. Our proposed \emph{Certification through Adaptation} with \emph{Auto-Noise} technique achieves an \textit{average certified radius (ACR) scores} up to $1.102$ and $1.148$ respectively for CIFAR-10 and ImageNet datasets using AT models without affecting their empirical robustness or benign accuracy. Therefore, our paper is a step towards bridging the gap between the empirical and certified robustness against adversarial examples by achieving both using the same classifier.
[ { "created": "Tue, 9 Feb 2021 19:51:56 GMT", "version": "v1" }, { "created": "Sun, 23 May 2021 08:16:34 GMT", "version": "v2" }, { "created": "Sat, 30 Jul 2022 06:41:56 GMT", "version": "v3" } ]
2022-08-02T00:00:00
[ [ "Nandy", "Jay", "" ], [ "Saha", "Sudipan", "" ], [ "Hsu", "Wynne", "" ], [ "Lee", "Mong Li", "" ], [ "Zhu", "Xiao Xiang", "" ] ]
0no_new_dataset
2310.05494
Tesshu Hanaka
Tesshu Hanaka and Yasuaki Kobayashi
Finding a Minimum Spanning Tree with a Small Non-Terminal Set
null
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of finding a minimum weight spanning tree that contains each vertex in a given subset $V_{\rm NT}$ of vertices as an internal vertex. This problem, called Minimum Weight Non-Terminal Spanning Tree, includes $s$-$t$ Hamiltonian Path as a special case, and hence it is NP-hard. In this paper, we first observe that Non-Terminal Spanning Tree, the unweighted counterpart of Minimum Weight Non-Terminal Spanning Tree, is already NP-hard on some special graph classes. Moreover, it is W[1]-hard when parameterized by clique-width. In contrast, we give a $3k$-vertex kernel and $O^*(2^k)$-time algorithm, where $k$ is the size of non-terminal set $V_{\rm NT}$. The latter algorithm can be extended to Minimum Weight Non-Terminal Spanning Tree with the restriction that each edge has a polynomially bounded integral weight. We also show that Minimum Weight Non-Terminal Spanning Tree is fixed-parameter tractable parameterized by the number of edges in the subgraph induced by the non-terminal set $V_{\rm NT}$, extending the fixed-parameter tractability of Minimum Weight Non-Terminal Spanning Tree to the general case. Finally, we give several results for structural parameterization.
[ { "created": "Mon, 9 Oct 2023 07:56:47 GMT", "version": "v1" } ]
2023-10-10T00:00:00
[ [ "Hanaka", "Tesshu", "" ], [ "Kobayashi", "Yasuaki", "" ] ]
0no_new_dataset
2305.11862
Masahiro Kaneko
Masahiro Kaneko, Naoaki Okazaki
Reducing Sequence Length by Predicting Edit Operations with Large Language Models
EMNLP2023
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Large Language Models (LLMs) have demonstrated remarkable performance in various tasks and gained significant attention. LLMs are also used for local sequence transduction tasks, including grammatical error correction (GEC) and formality style transfer, where most tokens in a source text are kept unchanged. However, the models that generate all target tokens in such tasks have a tendency to simply copy the input text as is, without making needed changes, because the difference between input and output texts is minimal in the training data. This is also inefficient because the computational cost grows quadratically with the target sequence length with Transformer. This paper proposes predicting edit spans for the source text for local sequence transduction tasks. Representing an edit span with a position of the source text and corrected tokens, we can reduce the length of the target sequence and the computational cost for inference. We apply instruction tuning for LLMs on the supervision data of edit spans. Experiments show that the proposed method achieves comparable performance to the baseline in four tasks, paraphrasing, formality style transfer, GEC, and text simplification, despite reducing the length of the target text by as small as 21%. Furthermore, we report that the task-specific fine-tuning with the proposed method achieved state-of-the-art performance in the four tasks.
[ { "created": "Fri, 19 May 2023 17:51:05 GMT", "version": "v1" }, { "created": "Sat, 21 Oct 2023 00:57:02 GMT", "version": "v2" } ]
2023-10-24T00:00:00
[ [ "Kaneko", "Masahiro", "" ], [ "Okazaki", "Naoaki", "" ] ]
0no_new_dataset
2111.06827
Ashkan Ebadi
Ashkan Ebadi and Patrick Paul and Sofia Auer and St\'ephane Tremblay
NRC-GAMMA: Introducing a Novel Large Gas Meter Image Dataset
12 pages, 7 figures, 1 table
null
null
null
cs.CV cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Automatic meter reading technology is not yet widespread. Gas, electricity, or water accumulation meters reading is mostly done manually on-site either by an operator or by the homeowner. In some countries, the operator takes a picture as reading proof to confirm the reading by checking offline with another operator and/or using it as evidence in case of conflicts or complaints. The whole process is time-consuming, expensive, and prone to errors. Automation can optimize and facilitate such labor-intensive and human error-prone processes. With the recent advances in the fields of artificial intelligence and computer vision, automatic meter reading systems are becoming more viable than ever. Motivated by the recent advances in the field of artificial intelligence and inspired by open-source open-access initiatives in the research community, we introduce a novel large benchmark dataset of real-life gas meter images, named the NRC-GAMMA dataset. The data were collected from an Itron 400A diaphragm gas meter on January 20, 2020, between 00:05 am and 11:59 pm. We employed a systematic approach to label the images, validate the labellings, and assure the quality of the annotations. The dataset contains 28,883 images of the entire gas meter along with 57,766 cropped images of the left and the right dial displays. We hope the NRC-GAMMA dataset helps the research community to design and implement accurate, innovative, intelligent, and reproducible automatic gas meter reading solutions.
[ { "created": "Fri, 12 Nov 2021 17:18:38 GMT", "version": "v1" } ]
2021-11-15T00:00:00
[ [ "Ebadi", "Ashkan", "" ], [ "Paul", "Patrick", "" ], [ "Auer", "Sofia", "" ], [ "Tremblay", "Stéphane", "" ] ]
1new_dataset
2005.07341
Jianxiong Guo
Jianxiong Guo, Xingjian Ding, Weili Wu
An Architecture for Distributed Energies Trading in Byzantine-Based Blockchain
null
IEEE Transactions on Green Communications and Networking, 2022
10.1109/TGCN.2022.3142438
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the development of smart cities, not only are all corners of the city connected to each other, but also connected from city to city. They form a large distributed network together, which can facilitate the integration of distributed energy station (DES) and corresponding smart aggregators. Nevertheless, because of potential security and privacy protection arisen from trustless energies trading, how to make such energies trading goes smoothly is a tricky challenge. In this paper, we propose a blockchain-based multiple energies trading (B-MET) system for secure and efficient energies trading by executing a smart contract we design. Because energies trading requires the blockchain in B-MET system to have high throughput and low latency, we design a new byzantine-based consensus mechanism (BCM) based on node's credit to improve efficiency for the consortium blockchain under the B-MET system. Then, we take combined heat and power (CHP) system as a typical example that provides distributed energies. We quantify their utilities, and model the interactions between aggregators and DESs in a smart city by a novel multi-leader multi-follower Stackelberg game. It is analyzed and solved by reaching Nash equilibrium between aggregators, which reflects the competition between aggregators to purchase energies from DESs. In the end, we conduct plenty of numerical simulations to evaluate and verify our proposed model and algorithms, which demonstrate their correctness and efficiency completely.
[ { "created": "Fri, 15 May 2020 03:42:29 GMT", "version": "v1" } ]
2022-06-08T00:00:00
[ [ "Guo", "Jianxiong", "" ], [ "Ding", "Xingjian", "" ], [ "Wu", "Weili", "" ] ]
0no_new_dataset
1705.00850
Haiping Huang
Haiping Huang, and Alireza Goudarzi
Random active path model of deep neural networks with diluted binary synapses
10 pages, 5 figures, with Supplemental Material (upon request)
Phys. Rev. E 98, 042311 (2018)
10.1103/PhysRevE.98.042311
null
cs.LG cond-mat.stat-mech stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning has become a powerful and popular tool for a variety of machine learning tasks. However, it is challenging to understand the mechanism of deep learning from a theoretical perspective. In this work, we propose a random active path model to study collective properties of deep neural networks with binary synapses, under the removal perturbation of connections between layers. In the model, the path from input to output is randomly activated, and the corresponding input unit constrains the weights along the path into the form of a $p$-weight interaction glass model. A critical value of the perturbation is observed to separate a spin glass regime from a paramagnetic regime, with the transition being of the first order. The paramagnetic phase is conjectured to have a poor generalization performance.
[ { "created": "Tue, 2 May 2017 08:16:12 GMT", "version": "v1" }, { "created": "Fri, 18 May 2018 00:49:27 GMT", "version": "v2" }, { "created": "Wed, 26 Sep 2018 13:09:33 GMT", "version": "v3" } ]
2018-10-31T00:00:00
[ [ "Huang", "Haiping", "" ], [ "Goudarzi", "Alireza", "" ] ]
0no_new_dataset
1608.03127
EPTCS
Sanjiva Prasad (Indian Institute of Technology Delhi), Lenore D. Zuck (University of Illinois at Chicago)
Self-Similarity Breeds Resilience
In Proceedings EXPRESS/SOS 2016, arXiv:1608.02692
EPTCS 222, 2016, pp. 30-44
10.4204/EPTCS.222.3
null
cs.PL cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-similarity is the property of a system being similar to a part of itself. We posit that a special class of behaviourally self-similar systems exhibits a degree of resilience to adversarial behaviour. We formalise the notions of system, adversary and resilience in operational terms, based on transition systems and observations. While the general problem of proving systems to be behaviourally self-similar is undecidable, we show, by casting them in the framework of well-structured transition systems, that there is an interesting class of systems for which the problem is decidable. We illustrate our prescriptive framework for resilience with some small examples, e.g., systems robust to failures in a fail-stop model, and those avoiding side-channel attacks.
[ { "created": "Wed, 10 Aug 2016 11:10:49 GMT", "version": "v1" } ]
2016-08-11T00:00:00
[ [ "Prasad", "Sanjiva", "", "Indian Institute of Technology Delhi" ], [ "Zuck", "Lenore D.", "", "University of Illinois at Chicago" ] ]
0no_new_dataset
2401.14421
Chuhao Deng
Chuhao Deng and Hong-Cheol Choi and Hyunsang Park and Inseok Hwang
Multi-Agent Based Transfer Learning for Data-Driven Air Traffic Applications
12 pages, 8 figures, submitted for IEEE Transactions on Intelligent Transportation System
null
null
null
cs.LG cs.MA cs.SY eess.SY stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research in developing data-driven models for Air Traffic Management (ATM) has gained a tremendous interest in recent years. However, data-driven models are known to have long training time and require large datasets to achieve good performance. To address the two issues, this paper proposes a Multi-Agent Bidirectional Encoder Representations from Transformers (MA-BERT) model that fully considers the multi-agent characteristic of the ATM system and learns air traffic controllers' decisions, and a pre-training and fine-tuning transfer learning framework. By pre-training the MA-BERT on a large dataset from a major airport and then fine-tuning it to other airports and specific air traffic applications, a large amount of the total training time can be saved. In addition, for newly adopted procedures and constructed airports where no historical data is available, this paper shows that the pre-trained MA-BERT can achieve high performance by updating regularly with little data. The proposed transfer learning framework and MA-BERT are tested with the automatic dependent surveillance-broadcast data recorded in 3 airports in South Korea in 2019.
[ { "created": "Tue, 23 Jan 2024 22:21:07 GMT", "version": "v1" } ]
2024-01-29T00:00:00
[ [ "Deng", "Chuhao", "" ], [ "Choi", "Hong-Cheol", "" ], [ "Park", "Hyunsang", "" ], [ "Hwang", "Inseok", "" ] ]
1new_dataset
2101.12694
Martin Messmer
Martin Messmer, Benjamin Kiefer, Andreas Zell
Gaining Scale Invariance in UAV Bird's Eye View Object Detection by Adaptive Resizing
accepted for publication in ICPR 2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
This work introduces a new preprocessing step for object detection applicable to UAV bird's eye view imagery, which we call Adaptive Resizing. By design, it helps alleviate the challenges coming with the vast variances in objects' scales, naturally inherent to UAV data sets. Furthermore, it improves inference speed by two to three times on average. We test this extensively on UAVDT, VisDrone, and on a new data set we captured ourselves and achieve consistent improvements while being considerably faster. Moreover, we show how to apply this method to generic UAV object detection tasks. Additionally, we successfully test our approach on a height transfer task where we train on some interval of altitudes and test on a different one. Furthermore, we introduce a small, fast detector meant for deployment to an embedded GPU. Code will be made publicly available on our website.
[ { "created": "Fri, 29 Jan 2021 17:26:38 GMT", "version": "v1" }, { "created": "Fri, 8 Apr 2022 14:22:27 GMT", "version": "v2" } ]
2022-04-11T00:00:00
[ [ "Messmer", "Martin", "" ], [ "Kiefer", "Benjamin", "" ], [ "Zell", "Andreas", "" ] ]
1new_dataset
cs/0701190
Aaron Harwood
Thomas Jacobs and Aaron Harwood
A Peer-to-Peer Browsable File Index using a Popularity Based Global Namespace
null
null
null
null
cs.DC cs.NI
null
The distribution of files using decentralized, peer-to-peer (P2P) systems, has significant advantages over centralized approaches. It is however more difficult to settle on the best approach for file sharing. Most file sharing systems are based on query string searches, leading to a relatively simple but inefficient broadcast or to an efficient but relatively complicated index in a structured environment. In this paper we use a browsable peer-to-peer file index consisting of files which serve as directory nodes, interconnecting to form a directory network. We implemented the system based on BitTorrent and Kademlia. The directory network inherits all of the advantages of decentralization and provides browsable, efficient searching. To avoid conflict between users in the P2P system while also imposing no additional restrictions, we allow multiple versions of each directory node to simultaneously exist -- using popularity as the basis for default browsing behavior. Users can freely add files and directory nodes to the network. We show, using a simulation of user behavior and file quality, that the popularity based system consistently leads users to a high quality directory network; above the average quality of user updates. Q
[ { "created": "Tue, 30 Jan 2007 04:00:30 GMT", "version": "v1" } ]
2007-05-23T00:00:00
[ [ "Jacobs", "Thomas", "" ], [ "Harwood", "Aaron", "" ] ]
0no_new_dataset
2309.08166
Le Xu
Le Xu, Jiangyan Yi, Jianhua Tao, Tao Wang, Yong Ren, Rongxiu Zhong
Controllable Residual Speaker Representation for Voice Conversion
submitted to ICASSP 2024
null
null
null
cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there have been significant advancements in voice conversion, resulting in high-quality performance. However, there are still two critical challenges in this field. Firstly, current voice conversion methods have limited robustness when encountering unseen speakers. Secondly, they also have limited ability to control timbre representation. To address these challenges, this paper presents a novel approach leverages tokens of multi-layer residual approximations to enhance robustness when dealing with unseen speakers, called the residual speaker module. The introduction of multi-layer approximations facilitates the separation of information from the timbre, enabling effective control over timbre in voice conversion. The proposed method outperforms baselines in both subjective and objective evaluations, demonstrating superior performance and increased robustness. Our demo page is publicly available.
[ { "created": "Fri, 15 Sep 2023 05:27:21 GMT", "version": "v1" } ]
2023-09-18T00:00:00
[ [ "Xu", "Le", "" ], [ "Yi", "Jiangyan", "" ], [ "Tao", "Jianhua", "" ], [ "Wang", "Tao", "" ], [ "Ren", "Yong", "" ], [ "Zhong", "Rongxiu", "" ] ]
0no_new_dataset
2304.01393
Erik Demaine
Erik D. Demaine and Martin L. Demaine
Every Author as First Author
7 pages, 7 figures. Proceedings of SIGTBD 2023
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new standard for writing author names on papers and in bibliographies, which places every author as a first author -- superimposed. This approach enables authors to write papers as true equals, without any advantage given to whoever's name happens to come first alphabetically (for example). We develop the technology for implementing this standard in LaTeX, BibTeX, and HTML; show several examples; and discuss further advantages.
[ { "created": "Mon, 3 Apr 2023 21:58:05 GMT", "version": "v1" } ]
2023-04-05T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ] ]
0no_new_dataset
2405.18920
Anastasios Papazafeiropoulos
Anastasios Papazafeiropoulos, Pandelis Kourtessis, Symeon Chatzinotas, Dimitra I. Kaklamani, Iakovos S. Venieris
Achievable Rate Optimization for Large Stacked Intelligent Metasurfaces Based on Statistical CSI
accepted in IEEE Wireless Communications Letters
null
null
null
cs.IT eess.SP math.IT
http://creativecommons.org/licenses/by/4.0/
Stacked intelligent metasurface (SIM) is an emerging design that consists of multiple layers of metasurfaces. A SIM enables holographic multiple-input multiple-output (HMIMO) precoding in the wave domain, which results in the reduction of energy consumption and hardware cost. On the ground of multiuser beamforming, this letter focuses on the downlink achievable rate and its maximization. Contrary to previous works on multiuser SIM, we consider statistical channel state information (CSI) as opposed to instantaneous CSI to overcome challenges such as large overhead. Also, we examine the performance of large surfaces. We apply an alternating optimization (AO) algorithm regarding the phases of the SIM and the allocated transmit power. Simulations illustrate the performance of the considered large SIM-assisted design as well as the comparison between different CSI considerations.
[ { "created": "Wed, 29 May 2024 09:24:19 GMT", "version": "v1" } ]
2024-05-30T00:00:00
[ [ "Papazafeiropoulos", "Anastasios", "" ], [ "Kourtessis", "Pandelis", "" ], [ "Chatzinotas", "Symeon", "" ], [ "Kaklamani", "Dimitra I.", "" ], [ "Venieris", "Iakovos S.", "" ] ]
0no_new_dataset
2406.18254
Zhijie Nie
Zhijie Nie, Richong Zhang, Zhangchi Feng, Hailang Huang, Xudong Liu
Improving the Consistency in Cross-Lingual Cross-Modal Retrieval with 1-to-K Contrastive Learning
Accepted by KDD 2024 Research Track
null
10.1145/3637528.3671787
null
cs.IR cs.AI cs.MM
http://creativecommons.org/licenses/by-nc-sa/4.0/
Cross-lingual Cross-modal Retrieval (CCR) is an essential task in web search, which aims to break the barriers between modality and language simultaneously and achieves image-text retrieval in the multi-lingual scenario with a single model. In recent years, excellent progress has been made based on cross-lingual cross-modal pre-training; particularly, the methods based on contrastive learning on large-scale data have significantly improved retrieval tasks. However, these methods directly follow the existing pre-training methods in the cross-lingual or cross-modal domain, leading to two problems of inconsistency in CCR: The methods with cross-lingual style suffer from the intra-modal error propagation, resulting in inconsistent recall performance across languages in the whole dataset. The methods with cross-modal style suffer from the inter-modal optimization direction bias, resulting in inconsistent rank across languages within each instance, which cannot be reflected by Recall@K. To solve these problems, we propose a simple but effective 1-to-K contrastive learning method, which treats each language equally and eliminates error propagation and optimization bias. In addition, we propose a new evaluation metric, Mean Rank Variance (MRV), to reflect the rank inconsistency across languages within each instance. Extensive experiments on four CCR datasets show that our method improves both recall rates and MRV with smaller-scale pre-trained data, achieving the new state-of-art.
[ { "created": "Wed, 26 Jun 2024 11:04:25 GMT", "version": "v1" } ]
2024-06-27T00:00:00
[ [ "Nie", "Zhijie", "" ], [ "Zhang", "Richong", "" ], [ "Feng", "Zhangchi", "" ], [ "Huang", "Hailang", "" ], [ "Liu", "Xudong", "" ] ]
0no_new_dataset
2311.02219
Gleb Pogudin
Sergei Abramov and Gleb Pogudin
On the dimension of the solution space of linear difference equations over the ring of infinite sequences
In memory of Marko Petkov\v{s}ek
null
null
null
cs.SC
http://creativecommons.org/licenses/by/4.0/
For a linear difference equation with the coefficients being computable sequences, we establish algorithmic undecidability of the problem of determining the dimension of the solution space including the case when some additional prior information on the dimension is available.
[ { "created": "Fri, 3 Nov 2023 20:13:55 GMT", "version": "v1" } ]
2023-11-07T00:00:00
[ [ "Abramov", "Sergei", "" ], [ "Pogudin", "Gleb", "" ] ]
0no_new_dataset
2104.02159
Vandad Davoodnia
Vandad Davoodnia, Ali Etemad
Identity and Posture Recognition in Smart Beds with Deep Multitask Learning
\c{opyright} 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)
10.1109/SMC.2019.8914459
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Sleep posture analysis is widely used for clinical patient monitoring and sleep studies. Earlier research has revealed that sleep posture highly influences symptoms of diseases such as apnea and pressure ulcers. In this study, we propose a robust deep learning model capable of accurately detecting subjects and their sleeping postures using the publicly available data acquired from a commercial pressure mapping system. A combination of loss functions is used to discriminate subjects and their sleeping postures simultaneously. The experimental results show that our proposed method can identify the patients and their in-bed posture with almost no errors in a 10-fold cross-validation scheme. Furthermore, we show that our network achieves an average accuracy of up to 99% when faced with new subjects in a leave-one-subject-out validation procedure on the three most common sleeping posture categories. We demonstrate the effects of the combined cost function over its parameter and show that learning both tasks simultaneously improves performance significantly. Finally, we evaluate our proposed pipeline by testing it over augmented images of our dataset. The proposed algorithm can ultimately be used in clinical and smart home environments as a complementary tool with other available automated patient monitoring systems.
[ { "created": "Mon, 5 Apr 2021 21:21:54 GMT", "version": "v1" } ]
2021-04-07T00:00:00
[ [ "Davoodnia", "Vandad", "" ], [ "Etemad", "Ali", "" ] ]
1new_dataset
1701.04663
Varun Raj Kompella
Varun Raj Kompella and Laurenz Wiskott
Intrinsically Motivated Acquisition of Modular Slow Features for Humanoids in Continuous and Non-Stationary Environments
8 pages, 5 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A compact information-rich representation of the environment, also called a feature abstraction, can simplify a robot's task of mapping its raw sensory inputs to useful action sequences. However, in environments that are non-stationary and only partially observable, a single abstraction is probably not sufficient to encode most variations. Therefore, learning multiple sets of spatially or temporally local, modular abstractions of the inputs would be beneficial. How can a robot learn these local abstractions without a teacher? More specifically, how can it decide from where and when to start learning a new abstraction? A recently proposed algorithm called Curious Dr. MISFA addresses this problem. The algorithm is based on two underlying learning principles called artificial curiosity and slowness. The former is used to make the robot self-motivated to explore by rewarding itself whenever it makes progress learning an abstraction; the later is used to update the abstraction by extracting slowly varying components from raw sensory inputs. Curious Dr. MISFA's application is, however, limited to discrete domains constrained by a pre-defined state space and has design limitations that make it unstable in certain situations. This paper presents a significant improvement that is applicable to continuous environments, is computationally less expensive, simpler to use with fewer hyper parameters, and stable in certain non-stationary environments. We demonstrate the efficacy and stability of our method in a vision-based robot simulator.
[ { "created": "Tue, 17 Jan 2017 13:24:37 GMT", "version": "v1" } ]
2017-01-18T00:00:00
[ [ "Kompella", "Varun Raj", "" ], [ "Wiskott", "Laurenz", "" ] ]
0no_new_dataset
2111.09403
Rana Hammad Raza
Syeda Aneeba Najeeb, Rana Hammad Raza, Adeel Yusuf, Zamra Sultan
Fine-Grained Vehicle Classification in Urban Traffic Scenes using Deep Learning
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
The increasingly dense traffic is becoming a challenge in our local settings, urging the need for a better traffic monitoring and management system. Fine-grained vehicle classification appears to be a challenging task as compared to vehicle coarse classification. Exploring a robust approach for vehicle detection and classification into fine-grained categories is therefore essentially required. Existing Vehicle Make and Model Recognition (VMMR) systems have been developed on synchronized and controlled traffic conditions. Need for robust VMMR in complex, urban, heterogeneous, and unsynchronized traffic conditions still remain an open research area. In this paper, vehicle detection and fine-grained classification are addressed using deep learning. To perform fine-grained classification with related complexities, local dataset THS-10 having high intra-class and low interclass variation is exclusively prepared. The dataset consists of 4250 vehicle images of 10 vehicle models, i.e., Honda City, Honda Civic, Suzuki Alto, Suzuki Bolan, Suzuki Cultus, Suzuki Mehran, Suzuki Ravi, Suzuki Swift, Suzuki Wagon R and Toyota Corolla. This dataset is available online. Two approaches have been explored and analyzed for classification of vehicles i.e, fine-tuning, and feature extraction from deep neural networks. A comparative study is performed, and it is demonstrated that simpler approaches can produce good results in local environment to deal with complex issues such as dense occlusion and lane departures. Hence reducing computational load and time, e.g. fine-tuning Inception-v3 produced highest accuracy of 97.4% with lowest misclassification rate of 2.08%. Fine-tuning MobileNet-v2 and ResNet-18 produced 96.8% and 95.7% accuracies, respectively. Extracting features from fc6 layer of AlexNet produces an accuracy of 93.5% with a misclassification rate of 6.5%.
[ { "created": "Wed, 17 Nov 2021 21:19:03 GMT", "version": "v1" } ]
2021-11-19T00:00:00
[ [ "Najeeb", "Syeda Aneeba", "" ], [ "Raza", "Rana Hammad", "" ], [ "Yusuf", "Adeel", "" ], [ "Sultan", "Zamra", "" ] ]
1new_dataset
2404.00906
Rongjie Li
Rongjie Li, Songyang Zhang, Dahua Lin, Kai Chen, Xuming He
From Pixels to Graphs: Open-Vocabulary Scene Graph Generation with Vision-Language Models
Accepted by CVPR 2024
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Scene graph generation (SGG) aims to parse a visual scene into an intermediate graph representation for downstream reasoning tasks. Despite recent advancements, existing methods struggle to generate scene graphs with novel visual relation concepts. To address this challenge, we introduce a new open-vocabulary SGG framework based on sequence generation. Our framework leverages vision-language pre-trained models (VLM) by incorporating an image-to-graph generation paradigm. Specifically, we generate scene graph sequences via image-to-text generation with VLM and then construct scene graphs from these sequences. By doing so, we harness the strong capabilities of VLM for open-vocabulary SGG and seamlessly integrate explicit relational modeling for enhancing the VL tasks. Experimental results demonstrate that our design not only achieves superior performance with an open vocabulary but also enhances downstream vision-language task performance through explicit relation modeling knowledge.
[ { "created": "Mon, 1 Apr 2024 04:21:01 GMT", "version": "v1" }, { "created": "Sat, 6 Apr 2024 08:52:55 GMT", "version": "v2" }, { "created": "Wed, 24 Apr 2024 07:15:16 GMT", "version": "v3" } ]
2024-04-25T00:00:00
[ [ "Li", "Rongjie", "" ], [ "Zhang", "Songyang", "" ], [ "Lin", "Dahua", "" ], [ "Chen", "Kai", "" ], [ "He", "Xuming", "" ] ]
0no_new_dataset
2305.17749
Yongchao Huang Dr.
Yongchao Huang, Yuhang He, Hong Ge
Bayesian inference and neural estimation of acoustic wave propagation
null
null
null
null
cs.SD cs.AI eess.AS physics.data-an
http://creativecommons.org/licenses/by-nc-nd/4.0/
In this work, we introduce a novel framework which combines physics and machine learning methods to analyse acoustic signals. Three methods are developed for this task: a Bayesian inference approach for inferring the spectral acoustics characteristics, a neural-physical model which equips a neural network with forward and backward physical losses, and the non-linear least squares approach which serves as benchmark. The inferred propagation coefficient leads to the room impulse response (RIR) quantity which can be used for relocalisation with uncertainty. The simplicity and efficiency of this framework is empirically validated on simulated data.
[ { "created": "Sun, 28 May 2023 15:14:46 GMT", "version": "v1" } ]
2023-05-30T00:00:00
[ [ "Huang", "Yongchao", "" ], [ "He", "Yuhang", "" ], [ "Ge", "Hong", "" ] ]
0no_new_dataset
1004.0944
Roberto Bagnara
Roberto Bagnara, Fred Mesnard, Andrea Pescetti, Enea Zaffanella
The Automatic Synthesis of Linear Ranking Functions: The Complete Unabridged Version
47 pages, 3 tables
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical technique for proving termination of a generic sequential computer program involves the synthesis of a ranking function for each loop of the program. Linear ranking functions are particularly interesting because many terminating loops admit one and algorithms exist to automatically synthesize it. In this paper we present two such algorithms: one based on work dated 1991 by Sohn and Van Gelder; the other, due to Podelski and Rybalchenko, dated 2004. Remarkably, while the two algorithms will synthesize a linear ranking function under exactly the same set of conditions, the former is mostly unknown to the community of termination analysis and its general applicability has never been put forward before the present paper. In this paper we thoroughly justify both algorithms, we prove their correctness, we compare their worst-case complexity and experimentally evaluate their efficiency, and we present an open-source implementation of them that will make it very easy to include termination-analysis capabilities in automatic program verifiers.
[ { "created": "Tue, 6 Apr 2010 19:54:20 GMT", "version": "v1" }, { "created": "Sun, 1 Apr 2012 07:14:21 GMT", "version": "v2" } ]
2012-04-03T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Mesnard", "Fred", "" ], [ "Pescetti", "Andrea", "" ], [ "Zaffanella", "Enea", "" ] ]
0no_new_dataset
0903.2851
Kamalika Chaudhuri
Kamalika Chaudhuri, Yoav Freund, Daniel Hsu
A parameter-free hedging algorithm
Updated Version
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of decision-theoretic online learning (DTOL). Motivated by practical applications, we focus on DTOL when the number of actions is very large. Previous algorithms for learning in this framework have a tunable learning rate parameter, and a barrier to using online-learning in practical applications is that it is not understood how to set this parameter optimally, particularly when the number of actions is large. In this paper, we offer a clean solution by proposing a novel and completely parameter-free algorithm for DTOL. We introduce a new notion of regret, which is more natural for applications with a large number of actions. We show that our algorithm achieves good performance with respect to this new notion of regret; in addition, it also achieves performance close to that of the best bounds achieved by previous algorithms with optimally-tuned parameters, according to previous notions of regret.
[ { "created": "Mon, 16 Mar 2009 20:48:33 GMT", "version": "v1" }, { "created": "Mon, 18 Jan 2010 23:58:51 GMT", "version": "v2" } ]
2010-01-19T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Freund", "Yoav", "" ], [ "Hsu", "Daniel", "" ] ]
0no_new_dataset
1812.02552
Mojtaba Bemana
Mojtaba Bemana, Joachim Keinert, Karol Myszkowski, Michel B\"atz, Matthias Ziegler, Hans-Peter Seidel, Tobias Ritschel
Learning to Predict Image-based Rendering Artifacts with Respect to a Hidden Reference Image
13 pages, 11 figures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image metrics predict the perceived per-pixel difference between a reference image and its degraded (e. g., re-rendered) version. In several important applications, the reference image is not available and image metrics cannot be applied. We devise a neural network architecture and training procedure that allows predicting the MSE, SSIM or VGG16 image difference from the distorted image alone while the reference is not observed. This is enabled by two insights: The first is to inject sufficiently many un-distorted natural image patches, which can be found in arbitrary amounts and are known to have no perceivable difference to themselves. This avoids false positives. The second is to balance the learning, where it is carefully made sure that all image errors are equally likely, avoiding false negatives. Surprisingly, we observe, that the resulting no-reference metric, subjectively, can even perform better than the reference-based one, as it had to become robust against mis-alignments. We evaluate the effectiveness of our approach in an image-based rendering context, both quantitatively and qualitatively. Finally, we demonstrate two applications which reduce light field capture time and provide guidance for interactive depth adjustment.
[ { "created": "Thu, 6 Dec 2018 14:35:54 GMT", "version": "v1" }, { "created": "Wed, 21 Aug 2019 13:47:10 GMT", "version": "v2" } ]
2019-08-22T00:00:00
[ [ "Bemana", "Mojtaba", "" ], [ "Keinert", "Joachim", "" ], [ "Myszkowski", "Karol", "" ], [ "Bätz", "Michel", "" ], [ "Ziegler", "Matthias", "" ], [ "Seidel", "Hans-Peter", "" ], [ "Ritschel", "Tobias", "" ] ]
0no_new_dataset
2108.08063
Pourya Shamsolmoali
Pourya Shamsolmoali, Jocelyn Chanussot, Masoumeh Zareapoor, Huiyu Zhou, and Jie Yang
Multi-patch Feature Pyramid Network for Weakly Supervised Object Detection in Optical Remote Sensing Images
null
null
10.1109/TGRS.2021.3106442
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
Object detection is a challenging task in remote sensing because objects only occupy a few pixels in the images, and the models are required to simultaneously learn object locations and detection. Even though the established approaches well perform for the objects of regular sizes, they achieve weak performance when analyzing small ones or getting stuck in the local minima (e.g. false object parts). Two possible issues stand in their way. First, the existing methods struggle to perform stably on the detection of small objects because of the complicated background. Second, most of the standard methods used hand-crafted features, and do not work well on the detection of objects parts of which are missing. We here address the above issues and propose a new architecture with a multiple patch feature pyramid network (MPFP-Net). Different from the current models that during training only pursue the most discriminative patches, in MPFPNet the patches are divided into class-affiliated subsets, in which the patches are related and based on the primary loss function, a sequence of smooth loss functions are determined for the subsets to improve the model for collecting small object parts. To enhance the feature representation for patch selection, we introduce an effective method to regularize the residual values and make the fusion transition layers strictly norm-preserving. The network contains bottom-up and crosswise connections to fuse the features of different scales to achieve better accuracy, compared to several state-of-the-art object detection models. Also, the developed architecture is more efficient than the baselines.
[ { "created": "Wed, 18 Aug 2021 09:25:39 GMT", "version": "v1" } ]
2022-02-16T00:00:00
[ [ "Shamsolmoali", "Pourya", "" ], [ "Chanussot", "Jocelyn", "" ], [ "Zareapoor", "Masoumeh", "" ], [ "Zhou", "Huiyu", "" ], [ "Yang", "Jie", "" ] ]
0no_new_dataset
1605.09346
Jean-Baptiste Alayrac
Anton Osokin, Jean-Baptiste Alayrac, Isabella Lukasewitz, Puneet K. Dokania, Simon Lacoste-Julien
Minding the Gaps for Block Frank-Wolfe Optimization of Structured SVMs
Appears in Proceedings of the 33rd International Conference on Machine Learning (ICML 2016). 31 pages
null
null
null
cs.LG math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose several improvements on the block-coordinate Frank-Wolfe (BCFW) algorithm from Lacoste-Julien et al. (2013) recently used to optimize the structured support vector machine (SSVM) objective in the context of structured prediction, though it has wider applications. The key intuition behind our improvements is that the estimates of block gaps maintained by BCFW reveal the block suboptimality that can be used as an adaptive criterion. First, we sample objects at each iteration of BCFW in an adaptive non-uniform way via gapbased sampling. Second, we incorporate pairwise and away-step variants of Frank-Wolfe into the block-coordinate setting. Third, we cache oracle calls with a cache-hit criterion based on the block gaps. Fourth, we provide the first method to compute an approximate regularization path for SSVM. Finally, we provide an exhaustive empirical evaluation of all our methods on four structured prediction datasets.
[ { "created": "Mon, 30 May 2016 18:15:30 GMT", "version": "v1" } ]
2016-06-01T00:00:00
[ [ "Osokin", "Anton", "" ], [ "Alayrac", "Jean-Baptiste", "" ], [ "Lukasewitz", "Isabella", "" ], [ "Dokania", "Puneet K.", "" ], [ "Lacoste-Julien", "Simon", "" ] ]
1new_dataset
1306.3084
Doriane Ibarra
Jorge Hernandez (CMM), Beatriz Marcotegui (CMM)
Segmentation et Interpr\'etation de Nuages de Points pour la Mod\'elisation d'Environnements Urbains
null
Revue fran\c{c}aise de photogrammetrie et de t\'el\'edection 191 (2008) 28-35
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dans cet article, nous pr\'esentons une m\'ethode pour la d\'etection et la classification d'artefacts au niveau du sol, comme phase de filtrage pr\'ealable \`a la mod\'elisation d'environnements urbains. La m\'ethode de d\'etection est r\'ealis\'ee sur l'image profondeur, une projection de nuage de points sur un plan image o\`u la valeur du pixel correspond \`a la distance du point au plan. En faisant l'hypoth\`ese que les artefacts sont situ\'es au sol, ils sont d\'etect\'es par une transformation de chapeau haut de forme par remplissage de trous sur l'image de profondeur. Les composantes connexes ainsi obtenues, sont ensuite caract\'eris\'ees et une analyse des variables est utilis\'ee pour la s\'election des caract\'eristiques les plus discriminantes. Les composantes connexes sont donc classifi\'ees en quatre cat\'egories (lampadaires, pi\'etons, voitures et "Reste") \`a l'aide d'un algorithme d'apprentissage supervis\'e. La m\'ethode a \'et\'e test\'ee sur des nuages de points de la ville de Paris, en montrant de bons r\'esultats de d\'etection et de classification dans l'ensemble de donn\'ees.---In this article, we present a method for detection and classification of artifacts at the street level, in order to filter cloud point, facilitating the urban modeling process. Our approach exploits 3D information by using range image, a projection of 3D points onto an image plane where the pixel intensity is a function of the measured distance between 3D points and the plane. By assuming that the artifacts are on the ground, they are detected using a Top-Hat of the hole filling algorithm of range images. Then, several features are extracted from the detected connected components and a stepwise forward variable/model selection by using the Wilk's Lambda criterion is performed. Afterward, CCs are classified in four categories (lampposts, pedestrians, cars and others) by using a supervised machine learning method. The proposed method was tested on cloud points of Paris, and have shown satisfactory results on the whole dataset.
[ { "created": "Thu, 13 Jun 2013 11:27:58 GMT", "version": "v1" } ]
2013-06-14T00:00:00
[ [ "Hernandez", "Jorge", "", "CMM" ], [ "Marcotegui", "Beatriz", "", "CMM" ] ]
0no_new_dataset
2402.17414
Jiahao Li
Jiahao Li, Bin Li, Yan Lu
Neural Video Compression with Feature Modulation
CVPR 2024. Codes are at https://github.com/microsoft/DCVC
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging conditional coding-based neural video codec (NVC) shows superiority over commonly-used residual coding-based codec and the latest NVC already claims to outperform the best traditional codec. However, there still exist critical problems blocking the practicality of NVC. In this paper, we propose a powerful conditional coding-based NVC that solves two critical problems via feature modulation. The first is how to support a wide quality range in a single model. Previous NVC with this capability only supports about 3.8 dB PSNR range on average. To tackle this limitation, we modulate the latent feature of the current frame via the learnable quantization scaler. During the training, we specially design the uniform quantization parameter sampling mechanism to improve the harmonization of encoding and quantization. This results in a better learning of the quantization scaler and helps our NVC support about 11.4 dB PSNR range. The second is how to make NVC still work under a long prediction chain. We expose that the previous SOTA NVC has an obvious quality degradation problem when using a large intra-period setting. To this end, we propose modulating the temporal feature with a periodically refreshing mechanism to boost the quality. %Besides solving the above two problems, we also design a single model that can support both RGB and YUV colorspaces. Notably, under single intra-frame setting, our codec can achieve 29.7\% bitrate saving over previous SOTA NVC with 16\% MACs reduction. Our codec serves as a notable landmark in the journey of NVC evolution. The codes are at https://github.com/microsoft/DCVC.
[ { "created": "Tue, 27 Feb 2024 11:08:51 GMT", "version": "v1" }, { "created": "Thu, 29 Feb 2024 05:49:21 GMT", "version": "v2" } ]
2024-03-01T00:00:00
[ [ "Li", "Jiahao", "" ], [ "Li", "Bin", "" ], [ "Lu", "Yan", "" ] ]
0no_new_dataset
2104.07824
Shashank Sonkar
Shashank Sonkar, Arzoo Katiyar and Richard G. Baraniuk
NePTuNe: Neural Powered Tucker Network for Knowledge Graph Completion
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Knowledge graphs link entities through relations to provide a structured representation of real world facts. However, they are often incomplete, because they are based on only a small fraction of all plausible facts. The task of knowledge graph completion via link prediction aims to overcome this challenge by inferring missing facts represented as links between entities. Current approaches to link prediction leverage tensor factorization and/or deep learning. Factorization methods train and deploy rapidly thanks to their small number of parameters but have limited expressiveness due to their underlying linear methodology. Deep learning methods are more expressive but also computationally expensive and prone to overfitting due to their large number of trainable parameters. We propose Neural Powered Tucker Network (NePTuNe), a new hybrid link prediction model that couples the expressiveness of deep models with the speed and size of linear models. We demonstrate that NePTuNe provides state-of-the-art performance on the FB15K-237 dataset and near state-of-the-art performance on the WN18RR dataset.
[ { "created": "Thu, 15 Apr 2021 23:48:26 GMT", "version": "v1" } ]
2021-04-19T00:00:00
[ [ "Sonkar", "Shashank", "" ], [ "Katiyar", "Arzoo", "" ], [ "Baraniuk", "Richard G.", "" ] ]
1new_dataset
2104.02176
Yangyang Shi
Yangyang Shi, Varun Nagaraja, Chunyang Wu, Jay Mahadeokar, Duc Le, Rohit Prabhavalkar, Alex Xiao, Ching-Feng Yeh, Julian Chan, Christian Fuegen, Ozlem Kalinli, Michael L. Seltzer
Dynamic Encoder Transducer: A Flexible Solution For Trading Off Accuracy For Latency
5 pages, 2 figures, submitted Interspeech 2021
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a dynamic encoder transducer (DET) for on-device speech recognition. One DET model scales to multiple devices with different computation capacities without retraining or finetuning. To trading off accuracy and latency, DET assigns different encoders to decode different parts of an utterance. We apply and compare the layer dropout and the collaborative learning for DET training. The layer dropout method that randomly drops out encoder layers in the training phase, can do on-demand layer dropout in decoding. Collaborative learning jointly trains multiple encoders with different depths in one single model. Experiment results on Librispeech and in-house data show that DET provides a flexible accuracy and latency trade-off. Results on Librispeech show that the full-size encoder in DET relatively reduces the word error rate of the same size baseline by over 8%. The lightweight encoder in DET trained with collaborative learning reduces the model size by 25% but still gets similar WER as the full-size baseline. DET gets similar accuracy as a baseline model with better latency on a large in-house data set by assigning a lightweight encoder for the beginning part of one utterance and a full-size encoder for the rest.
[ { "created": "Mon, 5 Apr 2021 22:32:20 GMT", "version": "v1" } ]
2021-04-07T00:00:00
[ [ "Shi", "Yangyang", "" ], [ "Nagaraja", "Varun", "" ], [ "Wu", "Chunyang", "" ], [ "Mahadeokar", "Jay", "" ], [ "Le", "Duc", "" ], [ "Prabhavalkar", "Rohit", "" ], [ "Xiao", "Alex", "" ], [ "Yeh", "Ching-Feng", "" ], [ "Chan", "Julian", "" ], [ "Fuegen", "Christian", "" ], [ "Kalinli", "Ozlem", "" ], [ "Seltzer", "Michael L.", "" ] ]
0no_new_dataset
2106.01890
Yixin Liu
Yixin Liu, Pengfei Liu
SimCLS: A Simple Framework for Contrastive Learning of Abstractive Summarization
Published as a short paper at ACL 2021
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a conceptually simple while empirically powerful framework for abstractive summarization, SimCLS, which can bridge the gap between the learning objective and evaluation metrics resulting from the currently dominated sequence-to-sequence learning framework by formulating text generation as a reference-free evaluation problem (i.e., quality estimation) assisted by contrastive learning. Experimental results show that, with minor modification over existing top-scoring systems, SimCLS can improve the performance of existing top-performing models by a large margin. Particularly, 2.51 absolute improvement against BART and 2.50 over PEGASUS w.r.t ROUGE-1 on the CNN/DailyMail dataset, driving the state-of-the-art performance to a new level. We have open-sourced our codes and results: https://github.com/yixinL7/SimCLS. Results of our proposed models have been deployed into ExplainaBoard platform, which allows researchers to understand our systems in a more fine-grained way.
[ { "created": "Thu, 3 Jun 2021 14:34:17 GMT", "version": "v1" } ]
2021-06-04T00:00:00
[ [ "Liu", "Yixin", "" ], [ "Liu", "Pengfei", "" ] ]
0no_new_dataset
1707.06728
Maria-Irina Nicolae
Valentina Zantedeschi, Maria-Irina Nicolae and Ambrish Rawat
Efficient Defenses Against Adversarial Attacks
16 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following the recent adoption of deep neural networks (DNN) accross a wide range of applications, adversarial attacks against these models have proven to be an indisputable threat. Adversarial samples are crafted with a deliberate intention of undermining a system. In the case of DNNs, the lack of better understanding of their working has prevented the development of efficient defenses. In this paper, we propose a new defense method based on practical observations which is easy to integrate into models and performs better than state-of-the-art defenses. Our proposed solution is meant to reinforce the structure of a DNN, making its prediction more stable and less likely to be fooled by adversarial samples. We conduct an extensive experimental study proving the efficiency of our method against multiple attacks, comparing it to numerous defenses, both in white-box and black-box setups. Additionally, the implementation of our method brings almost no overhead to the training procedure, while maintaining the prediction performance of the original model on clean samples.
[ { "created": "Fri, 21 Jul 2017 00:50:22 GMT", "version": "v1" }, { "created": "Wed, 30 Aug 2017 15:47:50 GMT", "version": "v2" } ]
2017-08-31T00:00:00
[ [ "Zantedeschi", "Valentina", "" ], [ "Nicolae", "Maria-Irina", "" ], [ "Rawat", "Ambrish", "" ] ]
0no_new_dataset
2201.06486
Khaled Nakhleh
Daojing Guo, Khaled Nakhleh, I-Hong Hou, Sastry Kompella, Clement Kam
A Theory of Second-Order Wireless Network Optimization and Its Application on AoI
Accepted for publication in INFOCOM 2022
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new theoretical framework for optimizing second-order behaviors of wireless networks. Unlike existing techniques for network utility maximization, which only considers first-order statistics, this framework models every random process by its mean and temporal variance. The inclusion of temporal variance makes this framework well-suited for modeling stateful fading wireless channels and emerging network performance metrics such as age-of-information (AoI). Using this framework, we sharply characterize the second-order capacity region of wireless access networks. We also propose a simple scheduling policy and prove that it can achieve every interior point in the second-order capacity region. To demonstrate the utility of this framework, we apply it for an important open problem: the optimization of AoI over Gilbert-Elliott channels. We show that this framework provides a very accurate characterization of AoI. Moreover, it leads to a tractable scheduling policy that outperforms other existing work.
[ { "created": "Mon, 17 Jan 2022 15:59:10 GMT", "version": "v1" } ]
2022-01-19T00:00:00
[ [ "Guo", "Daojing", "" ], [ "Nakhleh", "Khaled", "" ], [ "Hou", "I-Hong", "" ], [ "Kompella", "Sastry", "" ], [ "Kam", "Clement", "" ] ]
1new_dataset
2210.11966
Shengwei Liu
Hongwei Liu, Shengwei Liu
A class of constacyclic codes are generalized Reed-Solomon codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum distance separable (MDS) codes are optimal in the sense that the minimum distance cannot be improved for a given length and code size. The most prominent MDS codes are generalized Reed-Solomon (GRS) codes. The square $\mathcal{C}^{2}$ of a linear code $\mathcal{C}$ is the linear code spanned by the component-wise products of every pair of codewords in $\mathcal{C}$. For an MDS code $\mathcal{C}$, it is convenient to determine whether $\mathcal{C}$ is a GRS code by determining the dimension of $\mathcal{C}^{2}$. In this paper, we investigate under what conditions that MDS constacyclic codes are GRS. For this purpose, we first study the square of constacyclic codes. Then, we give a sufficient condition that a constacyclic code is GRS. In particular, We provide a necessary and sufficient condition that a constacyclic code of a prime length is GRS.
[ { "created": "Fri, 21 Oct 2022 13:46:24 GMT", "version": "v1" } ]
2022-10-24T00:00:00
[ [ "Liu", "Hongwei", "" ], [ "Liu", "Shengwei", "" ] ]
0no_new_dataset
2207.09833
Arash Bateni PhD
Arash Bateni, Matthew C. Chan, Ray Eitel-Porter
AI Fairness: from Principles to Practice
21 pages, 5 figures
null
null
null
cs.CY cs.AI cs.LG
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper summarizes and evaluates various approaches, methods, and techniques for pursuing fairness in artificial intelligence (AI) systems. It examines the merits and shortcomings of these measures and proposes practical guidelines for defining, measuring, and preventing bias in AI. In particular, it cautions against some of the simplistic, yet common, methods for evaluating bias in AI systems, and offers more sophisticated and effective alternatives. The paper also addresses widespread controversies and confusions in the field by providing a common language among different stakeholders of high-impact AI systems. It describes various trade-offs involving AI fairness, and provides practical recommendations for balancing them. It offers techniques for evaluating the costs and benefits of fairness targets, and defines the role of human judgment in setting these targets. This paper provides discussions and guidelines for AI practitioners, organization leaders, and policymakers, as well as various links to additional materials for a more technical audience. Numerous real-world examples are provided to clarify the concepts, challenges, and recommendations from a practical perspective.
[ { "created": "Wed, 20 Jul 2022 11:37:46 GMT", "version": "v1" } ]
2022-07-21T00:00:00
[ [ "Bateni", "Arash", "" ], [ "Chan", "Matthew C.", "" ], [ "Eitel-Porter", "Ray", "" ] ]
0no_new_dataset
2108.09832
Minghui Jiang
Rain Jiang, Kai Jiang, Minghui Jiang
On universal covers for carpenter's rule folding
null
null
null
null
cs.CG cs.DM math.CO
http://creativecommons.org/licenses/by/4.0/
We present improved universal covers for carpenter's rule folding in the plane.
[ { "created": "Sun, 22 Aug 2021 20:39:57 GMT", "version": "v1" } ]
2021-08-24T00:00:00
[ [ "Jiang", "Rain", "" ], [ "Jiang", "Kai", "" ], [ "Jiang", "Minghui", "" ] ]
0no_new_dataset
2403.01296
Shanuja Sasi
Shanuja Sasi and Onur G\"unl\"u
Rate-limited Shuffling for Distributed Computing
6 pages and 2 figures
null
null
null
cs.IT cs.DC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the shuffling phase in a distributed computing model with rate-limited links between nodes. Each node is connected to all other nodes via a noiseless broadcast link with a finite capacity. For this network, the shuffling phase is described as a distributed index-coding problem to extend an outer bound for the latter to the distributed computing problem. An inner bound on the capacity region is also established by using the distributed composite-coding scheme introduced for the distributed index-coding problem. We consider some special cases of the distributed computing problem through two examples for which we prove that the inner and outer bounds agree, thereby establishing the capacity regions. We, then, generalize the special cases to any number of nodes and computation loads under certain constraints.
[ { "created": "Sat, 2 Mar 2024 19:28:13 GMT", "version": "v1" }, { "created": "Mon, 6 May 2024 07:51:58 GMT", "version": "v2" } ]
2024-05-07T00:00:00
[ [ "Sasi", "Shanuja", "" ], [ "Günlü", "Onur", "" ] ]
0no_new_dataset
1811.02178
Feifan Xu
Feifan Xu, Fei He, Enze Xie, Liang Li
Fast OBDD Reordering using Neural Message Passing on Hypergraph
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ordered binary decision diagrams (OBDDs) are an efficient data structure for representing and manipulating Boolean formulas. With respect to different variable orders, the OBDDs' sizes may vary from linear to exponential in the number of the Boolean variables. Finding the optimal variable order has been proved a NP-complete problem. Many heuristics have been proposed to find a near-optimal solution of this problem. In this paper, we propose a neural network-based method to predict near-optimal variable orders for unknown formulas. Viewing these formulas as hypergraphs, and lifting the message passing neural network into 3-hypergraph (MPNN3), we are able to learn the patterns of Boolean formula. Compared to the traditional methods, our method can find a near-the-best solution with an extremely shorter time, even for some hard examples.To the best of our knowledge, this is the first work on applying neural network to OBDD reordering.
[ { "created": "Tue, 6 Nov 2018 06:07:09 GMT", "version": "v1" } ]
2018-11-07T00:00:00
[ [ "Xu", "Feifan", "" ], [ "He", "Fei", "" ], [ "Xie", "Enze", "" ], [ "Li", "Liang", "" ] ]
0no_new_dataset
1912.03717
Vasanthan Raghavan
Vasanthan Raghavan, Sonsay Noimanivone, Sung Kil Rho, Bernie Farin, Patrick Connor, Ricardo A. Motos, Yu-Chin Ou, Kobi Ravid, M. Ali Tassoudji, Ozge H. Koymen, and Junyi Li
Hand and Body Blockage Measurements with Form-Factor User Equipment at 28 GHz
15 pages, 9 figures, 6 tables
null
null
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blockage by the human hand/body is an important impairment in realizing practical millimeter wave wireless systems. Prior works on blockage modeling are either based on theoretical studies of double knife edge diffraction or its modifications, high-frequency simulations of electromagnetic effects, or measurements with experimental millimeter wave prototypes. While such studies are useful, they do not capture the form-factor constraints of user equipments (UEs). In this work, we study the impact of hand/body blockage with a UE at $28$ GHz built on Qualcomm's millimeter wave modem, antenna modules and beamforming solutions. We report five exhaustive and controlled studies with different types of hand holdings/grips, antenna types, and with directional/narrow beams. For both hard as well as loose hand grips, we report considerably lower blockage loss estimates than prior works. Critical in estimating the loss is the definition of a "region of interest" (RoI) around the UE where the impact of the hand/body is seen. Towards this goal, we define a RoI that includes the spatial area where significant energy is seen in either the no blockage or blockage modes. Our studies show that significant spatial area coverage improvement can be seen with loose hand grip due to hand reflections.
[ { "created": "Sun, 8 Dec 2019 17:15:22 GMT", "version": "v1" } ]
2019-12-10T00:00:00
[ [ "Raghavan", "Vasanthan", "" ], [ "Noimanivone", "Sonsay", "" ], [ "Rho", "Sung Kil", "" ], [ "Farin", "Bernie", "" ], [ "Connor", "Patrick", "" ], [ "Motos", "Ricardo A.", "" ], [ "Ou", "Yu-Chin", "" ], [ "Ravid", "Kobi", "" ], [ "Tassoudji", "M. Ali", "" ], [ "Koymen", "Ozge H.", "" ], [ "Li", "Junyi", "" ] ]
0no_new_dataset
1406.5569
Ashkan Rahimian
Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi
On the Reverse Engineering of the Citadel Botnet
10 pages, 17 figures. This is an updated / edited version of a paper appeared in FPS 2013
LNCS 8352, 2014, pp 408-425
10.1007/978-3-319-05302-8_25
null
cs.CR cs.NI cs.OS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the Microsoft Digital Crimes Unit in order to take down Citadel command-and-control servers. The operation caused some disruption in the botnet but has not stopped it completely. Due to the complex structure and advanced anti-reverse engineering techniques, the Citadel malware analysis process is both challenging and time-consuming. This allows cyber criminals to carry on with their attacks while the analysis is still in progress. In this paper, we present the results of the Citadel reverse engineering and provide additional insight into the functionality, inner workings, and open source components of the malware. In order to accelerate the reverse engineering process, we propose a clone-based analysis methodology. Citadel is an offspring of a previously analyzed malware called Zeus; thus, using the former as a reference, we can measure and quantify the similarities and differences of the new variant. Two types of code analysis techniques are provided in the methodology, namely assembly to source code matching and binary clone detection. The methodology can help reduce the number of functions requiring manual analysis. The analysis results prove that the approach is promising in Citadel malware analysis. Furthermore, the same approach is applicable to similar malware analysis scenarios.
[ { "created": "Sat, 21 Jun 2014 02:04:56 GMT", "version": "v1" } ]
2014-06-24T00:00:00
[ [ "Rahimian", "Ashkan", "" ], [ "Ziarati", "Raha", "" ], [ "Preda", "Stere", "" ], [ "Debbabi", "Mourad", "" ] ]
0no_new_dataset
0910.2317
Andreas Spillner
A. Dress, K. T. Huber, J. Koolen, V. Moulton, A. Spillner
An algorithm for computing cutpoints in finite metric spaces
17 pages, 1 eps-figure
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of the tight span, a cell complex that can be associated to every metric $D$, offers a unifying view on existing approaches for analyzing distance data, in particular for decomposing a metric $D$ into a sum of simpler metrics as well as for representing it by certain specific edge-weighted graphs, often referred to as realizations of $D$. Many of these approaches involve the explicit or implicit computation of the so-called cutpoints of (the tight span of) $D$, such as the algorithm for computing the "building blocks" of optimal realizations of $D$ recently presented by A. Hertz and S. Varone. The main result of this paper is an algorithm for computing the set of these cutpoints for a metric $D$ on a finite set with $n$ elements in $O(n^3)$ time. As a direct consequence, this improves the run time of the aforementioned $O(n^6)$-algorithm by Hertz and Varone by ``three orders of magnitude''.
[ { "created": "Tue, 13 Oct 2009 07:09:03 GMT", "version": "v1" } ]
2009-10-14T00:00:00
[ [ "Dress", "A.", "" ], [ "Huber", "K. T.", "" ], [ "Koolen", "J.", "" ], [ "Moulton", "V.", "" ], [ "Spillner", "A.", "" ] ]
0no_new_dataset
1912.04352
Mengchen Wang
Mengchen Wang, Nicolas Ferey, Patrick Bourdot, Frederic Magoules
Using asynchronous simulation approach for interactive simulation
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses about the advantage of using asynchronous simulation in the case of interactive simulation in which user can steer and control parameters during a simulation in progress. synchronous models allow to compute each iteration faster to address the issues of performance needed in an highly interactive context, and our hypothesis is that get partial results faster is better than getting synchronized and final results to take a decision, in a interactive simulation context.
[ { "created": "Mon, 9 Dec 2019 20:07:36 GMT", "version": "v1" } ]
2019-12-11T00:00:00
[ [ "Wang", "Mengchen", "" ], [ "Ferey", "Nicolas", "" ], [ "Bourdot", "Patrick", "" ], [ "Magoules", "Frederic", "" ] ]
0no_new_dataset
2307.02842
Yu Chen
Yu Chen, Yihan Du, Pihe Hu, Siwei Wang, Desheng Wu, Longbo Huang
Provably Efficient Iterated CVaR Reinforcement Learning with Function Approximation and Human Feedback
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Risk-sensitive reinforcement learning (RL) aims to optimize policies that balance the expected reward and risk. In this paper, we present a novel risk-sensitive RL framework that employs an Iterated Conditional Value-at-Risk (CVaR) objective under both linear and general function approximations, enriched by human feedback. These new formulations provide a principled way to guarantee safety in each decision making step throughout the control process. Moreover, integrating human feedback into risk-sensitive RL framework bridges the gap between algorithmic decision-making and human participation, allowing us to also guarantee safety for human-in-the-loop systems. We propose provably sample-efficient algorithms for this Iterated CVaR RL and provide rigorous theoretical analysis. Furthermore, we establish a matching lower bound to corroborate the optimality of our algorithms in a linear context.
[ { "created": "Thu, 6 Jul 2023 08:14:54 GMT", "version": "v1" }, { "created": "Sat, 18 Nov 2023 01:59:35 GMT", "version": "v2" }, { "created": "Mon, 4 Dec 2023 10:37:00 GMT", "version": "v3" } ]
2023-12-05T00:00:00
[ [ "Chen", "Yu", "" ], [ "Du", "Yihan", "" ], [ "Hu", "Pihe", "" ], [ "Wang", "Siwei", "" ], [ "Wu", "Desheng", "" ], [ "Huang", "Longbo", "" ] ]
0no_new_dataset
2105.00735
Valentina Castiglioni
Luca Aceto and Elli Anastasiadi and Valentina Castiglioni and Anna Ingolfsdottir and Bas Luttik
In search of lost time: Axiomatising parallel composition in process algebras
arXiv admin note: text overlap with arXiv:2010.01943, arXiv:2102.11166
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This survey reviews some of the most recent achievements in the saga of the axiomatisation of parallel composition, along with some classic results. We focus on the recursion, relabelling and restriction free fragment of CCS and we discuss the solutions to three problems that were open for many years. The first problem concerns the status of Bergstra and Klop's auxiliary operators left merge and communication merge in the finite axiomatisation of parallel composition modulo bisimiliarity: We argue that, under some natural assumptions, the addition of a single auxiliary binary operator to CCS does not yield a finite axiomatisation of bisimilarity. Then we delineate the boundary between finite and non-finite axiomatisability of the congruences in van Glabbeek's linear time-branching time spectrum over CCS. Finally, we present a novel result to the effect that rooted weak bisimilarity has no finite complete axiomatisation over CCS.
[ { "created": "Mon, 3 May 2021 10:25:51 GMT", "version": "v1" } ]
2021-05-04T00:00:00
[ [ "Aceto", "Luca", "" ], [ "Anastasiadi", "Elli", "" ], [ "Castiglioni", "Valentina", "" ], [ "Ingolfsdottir", "Anna", "" ], [ "Luttik", "Bas", "" ] ]
0no_new_dataset
2307.04498
Evgenii Vinogradov A
Javad Ebrahimizadeh and Evgenii Vinogradov and Guy A.E. Vandenbosch
RCS-based Quasi-Deterministic Ray Tracing for Statistical Channel Modeling
null
null
null
null
cs.NI cs.SY eess.SY
http://creativecommons.org/licenses/by-sa/4.0/
This paper presents a quasi-deterministic ray tracing (QD-RT) method for analyzing the propagation of electromagnetic waves in street canyons. The method uses a statistical bistatic distribution to model the Radar Cross Section (RCS) of various irregular objects such as cars and pedestrians, instead of relying on exact values as in a deterministic propagation model. The performance of the QD-RT method is evaluated by comparing its generated path loss distributions to those of the deterministic ray tracing (D-RT) model using the Two-sample Cramer-von Mises test. The results indicate that the QD-RT method generates the same path loss distributions as the D-RT model while offering lower complexity. This study suggests that the QD-RT method has the potential to be used for analyzing complicated scenarios such as street canyon scenarios in mmWave wireless communication systems.
[ { "created": "Mon, 10 Jul 2023 11:39:18 GMT", "version": "v1" } ]
2023-07-11T00:00:00
[ [ "Ebrahimizadeh", "Javad", "" ], [ "Vinogradov", "Evgenii", "" ], [ "Vandenbosch", "Guy A. E.", "" ] ]
0no_new_dataset
1605.04013
EPTCS
Stefano Gogioso (University of Oxford)
A Corpus-based Toy Model for DisCoCat
In Proceedings SLPCS 2016, arXiv:1608.01018
EPTCS 221, 2016, pp. 20-28
10.4204/EPTCS.221.3
null
cs.CL cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The categorical compositional distributional (DisCoCat) model of meaning rigorously connects distributional semantics and pregroup grammars, and has found a variety of applications in computational linguistics. From a more abstract standpoint, the DisCoCat paradigm predicates the construction of a mapping from syntax to categorical semantics. In this work we present a concrete construction of one such mapping, from a toy model of syntax for corpora annotated with constituent structure trees, to categorical semantics taking place in a category of free R-semimodules over an involutive commutative semiring R.
[ { "created": "Fri, 13 May 2016 00:32:01 GMT", "version": "v1" }, { "created": "Thu, 4 Aug 2016 00:40:51 GMT", "version": "v2" } ]
2016-08-05T00:00:00
[ [ "Gogioso", "Stefano", "", "University of Oxford" ] ]
0no_new_dataset
1506.02812
Xuechong Guan
Xuechong Guan
A study on central soft sets: Definitions and basic operations
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new kind of soft sets related with some common decision making problems in real life called central soft sets is introduced. Properties of some basic operations on central soft sets are shown. It is investigated that some classic operations between soft sets can be obtained by central soft sets with selecting different central sets. We initiate the concepts of an evaluation system for a parameters set and its optional solutions. An algorithm is presented to solve such decision making problems.
[ { "created": "Tue, 9 Jun 2015 07:54:03 GMT", "version": "v1" } ]
2015-06-10T00:00:00
[ [ "Guan", "Xuechong", "" ] ]
1new_dataset
2009.09781
Ziming Li
Ziming Li and Julia Kiseleva and Maarten de Rijke
Rethinking Supervised Learning and Reinforcement Learning in Task-Oriented Dialogue Systems
10 pages
Findings of EMNLP 2020
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dialogue policy learning for task-oriented dialogue systems has enjoyed great progress recently mostly through employing reinforcement learning methods. However, these approaches have become very sophisticated. It is time to re-evaluate it. Are we really making progress developing dialogue agents only based on reinforcement learning? We demonstrate how (1)~traditional supervised learning together with (2)~a simulator-free adversarial learning method can be used to achieve performance comparable to state-of-the-art RL-based methods. First, we introduce a simple dialogue action decoder to predict the appropriate actions. Then, the traditional multi-label classification solution for dialogue policy learning is extended by adding dense layers to improve the dialogue agent performance. Finally, we employ the Gumbel-Softmax estimator to alternatively train the dialogue agent and the dialogue reward model without using reinforcement learning. Based on our extensive experimentation, we can conclude the proposed methods can achieve more stable and higher performance with fewer efforts, such as the domain knowledge required to design a user simulator and the intractable parameter tuning in reinforcement learning. Our main goal is not to beat reinforcement learning with supervised learning, but to demonstrate the value of rethinking the role of reinforcement learning and supervised learning in optimizing task-oriented dialogue systems.
[ { "created": "Mon, 21 Sep 2020 12:04:18 GMT", "version": "v1" } ]
2020-09-22T00:00:00
[ [ "Li", "Ziming", "" ], [ "Kiseleva", "Julia", "" ], [ "de Rijke", "Maarten", "" ] ]
0no_new_dataset
2205.00819
Jesse Hoey
Jesse Hoey and Gabrielle Chan
A Novel Approach to Fairness in Automated Decision-Making using Affective Normalization
null
null
null
null
cs.CY cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Any decision, such as one about who to hire, involves two components. First, a rational component, i.e., they have a good education, they speak clearly. Second, an affective component, based on observables such as visual features of race and gender, and possibly biased by stereotypes. Here we propose a method for measuring the affective, socially biased, component, thus enabling its removal. That is, given a decision-making process, these affective measurements remove the affective bias in the decision, rendering it fair across a set of categories defined by the method itself. We thus propose that this may solve three key problems in intersectional fairness: (1) the definition of categories over which fairness is a consideration; (2) an infinite regress into smaller and smaller groups; and (3) ensuring a fair distribution based on basic human rights or other prior information. The primary idea in this paper is that fairness biases can be measured using affective coherence, and that this can be used to normalize outcome mappings. We aim for this conceptual work to expose a novel method for handling fairness problems that uses emotional coherence as an independent measure of bias that goes beyond statistical parity.
[ { "created": "Mon, 2 May 2022 11:48:53 GMT", "version": "v1" } ]
2022-05-03T00:00:00
[ [ "Hoey", "Jesse", "" ], [ "Chan", "Gabrielle", "" ] ]
1new_dataset
2205.14550
Swapnil Sayan Saha
Swapnil Sayan Saha, Sandeep Singh Sandha, Mani Srivastava
Machine Learning for Microcontroller-Class Hardware: A Review
Published in IEEE Sensors Journal. Cite this as: S. S. Saha, S. S. Sandha and M. Srivastava, "Machine Learning for Microcontroller-Class Hardware: A Review," in IEEE Sensors Journal, vol. 22, no. 22, pp. 21362-21390, 15 Nov., 2022
IEEE Sensors Journal, vol. 22, no. 22, pp. 21362-21390, 15 Nov., 2022
10.1109/JSEN.2022.3210773
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
The advancements in machine learning opened a new opportunity to bring intelligence to the low-end Internet-of-Things nodes such as microcontrollers. Conventional machine learning deployment has high memory and compute footprint hindering their direct deployment on ultra resource-constrained microcontrollers. This paper highlights the unique requirements of enabling onboard machine learning for microcontroller class devices. Researchers use a specialized model development workflow for resource-limited applications to ensure the compute and latency budget is within the device limits while still maintaining the desired performance. We characterize a closed-loop widely applicable workflow of machine learning model development for microcontroller class devices and show that several classes of applications adopt a specific instance of it. We present both qualitative and numerical insights into different stages of model development by showcasing several use cases. Finally, we identify the open research challenges and unsolved questions demanding careful considerations moving forward.
[ { "created": "Sun, 29 May 2022 00:59:38 GMT", "version": "v1" }, { "created": "Mon, 6 Jun 2022 15:50:30 GMT", "version": "v2" }, { "created": "Mon, 18 Jul 2022 04:52:56 GMT", "version": "v3" }, { "created": "Wed, 16 Nov 2022 19:03:29 GMT", "version": "v4" }, { "created": "Tue, 20 Dec 2022 20:52:55 GMT", "version": "v5" } ]
2022-12-22T00:00:00
[ [ "Saha", "Swapnil Sayan", "" ], [ "Sandha", "Sandeep Singh", "" ], [ "Srivastava", "Mani", "" ] ]
0no_new_dataset
1501.01825
Tamir Bendory
Tamir Bendory and Shai Dekel and Arie Feuer
Unified Convex Optimization Approach to Super-Resolution Based on Localized Kernels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of resolving the fine details of a signal from its coarse scale measurements or, as it is commonly referred to in the literature, the super-resolution problem arises naturally in engineering and physics in a variety of settings. We suggest a unified convex optimization approach for super-resolution. The key is the construction of an interpolating polynomial based on localized kernels. We also show that the localized kernels act as the connecting thread to another wide-spread problem of stream of pulses.
[ { "created": "Thu, 8 Jan 2015 13:09:49 GMT", "version": "v1" }, { "created": "Sat, 28 Mar 2015 19:24:42 GMT", "version": "v2" }, { "created": "Sun, 12 Apr 2015 06:33:08 GMT", "version": "v3" } ]
2015-04-14T00:00:00
[ [ "Bendory", "Tamir", "" ], [ "Dekel", "Shai", "" ], [ "Feuer", "Arie", "" ] ]
0no_new_dataset
1604.02364
Piotr Faliszewski
Piotr Faliszewski and Jean-Francois Laslier and Robert Schaefer and Piotr Skowron and Arkadii Slinko and Nimrod Talmon
Modeling Representation of Minorities Under Multiwinner Voting Rules
14 pages, 6 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is twofold. First and foremost, we aim to experimentally and quantitatively show that the choice of a multiwinner voting rule can play a crucial role on the way minorities are represented. We also test the possibility for some of these rules to achieve proportional representation.
[ { "created": "Fri, 8 Apr 2016 14:51:12 GMT", "version": "v1" } ]
2016-04-11T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Laslier", "Jean-Francois", "" ], [ "Schaefer", "Robert", "" ], [ "Skowron", "Piotr", "" ], [ "Slinko", "Arkadii", "" ], [ "Talmon", "Nimrod", "" ] ]
0no_new_dataset
1002.1407
Yao Li
Yao Li, Emina Soljanin, and Predrag Spasojevic
Collecting Coded Coupons over Overlapping Generations
Accepted by NetCod 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coding over subsets (known as generations) rather than over all content blocks in P2P distribution networks and other applications is necessary for a number of practical reasons such as computational complexity. A penalty for coding only within generations is an overall throughput reduction. It has been previously shown that allowing contiguous generations to overlap in a head-to-toe manner improves the throughput. We here propose and study a scheme, referred to as the {\it random annex code}, that creates shared packets between any two generations at random rather than only the neighboring ones. By optimizing very few design parameters, we obtain a simple scheme that outperforms both the non-overlapping and the head-to-toe overlapping schemes of comparable computational complexity, both in the expected throughput and in the rate of convergence of the probability of decoding failure to zero. We provide a practical algorithm for accurate analysis of the expected throughput of the random annex code for finite-length information. This algorithm enables us to quantify the throughput vs.computational complexity tradeoff, which is necessary for optimal selection of the scheme parameters.
[ { "created": "Sat, 6 Feb 2010 18:47:39 GMT", "version": "v1" }, { "created": "Sat, 1 May 2010 04:15:49 GMT", "version": "v2" } ]
2010-05-04T00:00:00
[ [ "Li", "Yao", "" ], [ "Soljanin", "Emina", "" ], [ "Spasojevic", "Predrag", "" ] ]
0no_new_dataset
1704.04302
Nhien-An Le-Khac
Nhien-An Le-Khac, M-Tahar Kechadi
On a Distributed Approach for Density-based Clustering
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient extraction of useful knowledge from these data is still a challenge, mainly when the data is distributed, heterogeneous and of different quality depending on its corresponding local infrastructure. To reduce the overhead cost, most of the existing distributed clustering approaches generate global models by aggregating local results obtained on each individual node. The complexity and quality of solutions depend highly on the quality of the aggregation. In this respect, we proposed for distributed density-based clustering that both reduces the communication overheads due to the data exchange and improves the quality of the global models by considering the shapes of local clusters. From preliminary results we show that this algorithm is very promising.
[ { "created": "Thu, 13 Apr 2017 23:34:43 GMT", "version": "v1" } ]
2017-04-17T00:00:00
[ [ "Le-Khac", "Nhien-An", "" ], [ "Kechadi", "M-Tahar", "" ] ]
0no_new_dataset