id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2305.11098 | Hiroyuki Kido | Hiroyuki Kido | A Simple Generative Model of Logical Reasoning and Statistical Learning | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Statistical learning and logical reasoning are two major fields of AI
expected to be unified for human-like machine intelligence. Most existing work
considers how to combine existing logical and statistical systems. However,
there is no theory of inference so far explaining how basic approaches to
statistical learning and logical reasoning stem from a common principle.
Inspired by the fact that much empirical work in neuroscience suggests Bayesian
(or probabilistic generative) approaches to brain function including learning
and reasoning, we here propose a simple Bayesian model of logical reasoning and
statistical learning. The theory is statistically correct as it satisfies
Kolmogorov's axioms, is consistent with both Fenstad's representation theorem
and maximum likelihood estimation and performs exact Bayesian inference with a
linear-time complexity. The theory is logically correct as it is a data-driven
generalisation of uncertain reasoning from consistency, possibility,
inconsistency and impossibility. The theory is correct in terms of machine
learning as its solution to generation and prediction tasks on the MNIST
dataset is not only empirically reasonable but also theoretically correct
against the K nearest neighbour method. We simply model how data causes
symbolic knowledge in terms of its satisfiability in formal logic. Symbolic
reasoning emerges as a result of the process of going the causality forwards
and backwards. The forward and backward processes correspond to an
interpretation and inverse interpretation in formal logic, respectively. The
inverse interpretation differentiates our work from the mainstream often
referred to as inverse entailment, inverse deduction or inverse resolution. The
perspective gives new insights into learning and reasoning towards human-like
machine intelligence.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 16:34:51 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Kido",
"Hiroyuki",
""
]
] | TITLE: A Simple Generative Model of Logical Reasoning and Statistical Learning
ABSTRACT: Statistical learning and logical reasoning are two major fields of AI
expected to be unified for human-like machine intelligence. Most existing work
considers how to combine existing logical and statistical systems. However,
there is no theory of inference so far explaining how basic approaches to
statistical learning and logical reasoning stem from a common principle.
Inspired by the fact that much empirical work in neuroscience suggests Bayesian
(or probabilistic generative) approaches to brain function including learning
and reasoning, we here propose a simple Bayesian model of logical reasoning and
statistical learning. The theory is statistically correct as it satisfies
Kolmogorov's axioms, is consistent with both Fenstad's representation theorem
and maximum likelihood estimation and performs exact Bayesian inference with a
linear-time complexity. The theory is logically correct as it is a data-driven
generalisation of uncertain reasoning from consistency, possibility,
inconsistency and impossibility. The theory is correct in terms of machine
learning as its solution to generation and prediction tasks on the MNIST
dataset is not only empirically reasonable but also theoretically correct
against the K nearest neighbour method. We simply model how data causes
symbolic knowledge in terms of its satisfiability in formal logic. Symbolic
reasoning emerges as a result of the process of going the causality forwards
and backwards. The forward and backward processes correspond to an
interpretation and inverse interpretation in formal logic, respectively. The
inverse interpretation differentiates our work from the mainstream often
referred to as inverse entailment, inverse deduction or inverse resolution. The
perspective gives new insights into learning and reasoning towards human-like
machine intelligence.
| no_new_dataset | 0.710986 |
2305.11101 | Lihui Qian | Lihui Qian, Xintong Han, Faqiang Wang, Hongyu Liu, Haoye Dong, Zhiwen
Li, Huawei Wei, Zhe Lin and Cheng-Bin Jin | XFormer: Fast and Accurate Monocular 3D Body Capture | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present XFormer, a novel human mesh and motion capture method that
achieves real-time performance on consumer CPUs given only monocular images as
input. The proposed network architecture contains two branches: a keypoint
branch that estimates 3D human mesh vertices given 2D keypoints, and an image
branch that makes predictions directly from the RGB image features. At the core
of our method is a cross-modal transformer block that allows information to
flow across these two branches by modeling the attention between 2D keypoint
coordinates and image spatial features. Our architecture is smartly designed,
which enables us to train on various types of datasets including images with
2D/3D annotations, images with 3D pseudo labels, and motion capture datasets
that do not have associated images. This effectively improves the accuracy and
generalization ability of our system. Built on a lightweight backbone
(MobileNetV3), our method runs blazing fast (over 30fps on a single CPU core)
and still yields competitive accuracy. Furthermore, with an HRNet backbone,
XFormer delivers state-of-the-art performance on Huamn3.6 and 3DPW datasets.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 16:45:26 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Qian",
"Lihui",
""
],
[
"Han",
"Xintong",
""
],
[
"Wang",
"Faqiang",
""
],
[
"Liu",
"Hongyu",
""
],
[
"Dong",
"Haoye",
""
],
[
"Li",
"Zhiwen",
""
],
[
"Wei",
"Huawei",
""
],
[
"Lin",
"Zhe",
""
],
[
"Jin",
"Cheng-Bin",
""
]
] | TITLE: XFormer: Fast and Accurate Monocular 3D Body Capture
ABSTRACT: We present XFormer, a novel human mesh and motion capture method that
achieves real-time performance on consumer CPUs given only monocular images as
input. The proposed network architecture contains two branches: a keypoint
branch that estimates 3D human mesh vertices given 2D keypoints, and an image
branch that makes predictions directly from the RGB image features. At the core
of our method is a cross-modal transformer block that allows information to
flow across these two branches by modeling the attention between 2D keypoint
coordinates and image spatial features. Our architecture is smartly designed,
which enables us to train on various types of datasets including images with
2D/3D annotations, images with 3D pseudo labels, and motion capture datasets
that do not have associated images. This effectively improves the accuracy and
generalization ability of our system. Built on a lightweight backbone
(MobileNetV3), our method runs blazing fast (over 30fps on a single CPU core)
and still yields competitive accuracy. Furthermore, with an HRNet backbone,
XFormer delivers state-of-the-art performance on Huamn3.6 and 3DPW datasets.
| no_new_dataset | 0.710038 |
2305.11102 | Aysegul Dundar | Aysegul Dundar, Jun Gao, Andrew Tao, Bryan Catanzaro | Progressive Learning of 3D Reconstruction Network from 2D GAN Data | Web-page:
https://research.nvidia.com/labs/adlr/progressive-3d-learning. arXiv admin
note: text overlap with arXiv:2203.09362 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | This paper presents a method to reconstruct high-quality textured 3D models
from single images. Current methods rely on datasets with expensive
annotations; multi-view images and their camera parameters. Our method relies
on GAN generated multi-view image datasets which have a negligible annotation
cost. However, they are not strictly multi-view consistent and sometimes GANs
output distorted images. This results in degraded reconstruction qualities. In
this work, to overcome these limitations of generated datasets, we have two
main contributions which lead us to achieve state-of-the-art results on
challenging objects: 1) A robust multi-stage learning scheme that gradually
relies more on the models own predictions when calculating losses, 2) A novel
adversarial learning pipeline with online pseudo-ground truth generations to
achieve fine details. Our work provides a bridge from 2D supervisions of GAN
models to 3D reconstruction models and removes the expensive annotation
efforts. We show significant improvements over previous methods whether they
were trained on GAN generated multi-view images or on real images with
expensive annotations. Please visit our web-page for 3D visuals:
https://research.nvidia.com/labs/adlr/progressive-3d-learning
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 16:45:51 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Dundar",
"Aysegul",
""
],
[
"Gao",
"Jun",
""
],
[
"Tao",
"Andrew",
""
],
[
"Catanzaro",
"Bryan",
""
]
] | TITLE: Progressive Learning of 3D Reconstruction Network from 2D GAN Data
ABSTRACT: This paper presents a method to reconstruct high-quality textured 3D models
from single images. Current methods rely on datasets with expensive
annotations; multi-view images and their camera parameters. Our method relies
on GAN generated multi-view image datasets which have a negligible annotation
cost. However, they are not strictly multi-view consistent and sometimes GANs
output distorted images. This results in degraded reconstruction qualities. In
this work, to overcome these limitations of generated datasets, we have two
main contributions which lead us to achieve state-of-the-art results on
challenging objects: 1) A robust multi-stage learning scheme that gradually
relies more on the models own predictions when calculating losses, 2) A novel
adversarial learning pipeline with online pseudo-ground truth generations to
achieve fine details. Our work provides a bridge from 2D supervisions of GAN
models to 3D reconstruction models and removes the expensive annotation
efforts. We show significant improvements over previous methods whether they
were trained on GAN generated multi-view images or on real images with
expensive annotations. Please visit our web-page for 3D visuals:
https://research.nvidia.com/labs/adlr/progressive-3d-learning
| no_new_dataset | 0.709831 |
2305.11108 | Fiona Porter | Fiona A. M. Porter and Anna M. M. Scaife | MiraBest: A Dataset of Morphologically Classified Radio Galaxies for
Machine Learning | 14 pages, 2 figures, accepted by RASTI | null | null | null | astro-ph.IM cs.LG | http://creativecommons.org/licenses/by/4.0/ | The volume of data from current and future observatories has motivated the
increased development and application of automated machine learning
methodologies for astronomy. However, less attention has been given to the
production of standardised datasets for assessing the performance of different
machine learning algorithms within astronomy and astrophysics. Here we describe
in detail the MiraBest dataset, a publicly available batched dataset of 1256
radio-loud AGN from NVSS and FIRST, filtered to $0.03 < z < 0.1$, manually
labelled by Miraghaei and Best (2017) according to the Fanaroff-Riley
morphological classification, created for machine learning applications and
compatible for use with standard deep learning libraries. We outline the
principles underlying the construction of the dataset, the sample selection and
pre-processing methodology, dataset structure and composition, as well as a
comparison of MiraBest to other datasets used in the literature. Existing
applications that utilise the MiraBest dataset are reviewed, and an extended
dataset of 2100 sources is created by cross-matching MiraBest with other
catalogues of radio-loud AGN that have been used more widely in the literature
for machine learning applications.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 16:52:43 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Porter",
"Fiona A. M.",
""
],
[
"Scaife",
"Anna M. M.",
""
]
] | TITLE: MiraBest: A Dataset of Morphologically Classified Radio Galaxies for
Machine Learning
ABSTRACT: The volume of data from current and future observatories has motivated the
increased development and application of automated machine learning
methodologies for astronomy. However, less attention has been given to the
production of standardised datasets for assessing the performance of different
machine learning algorithms within astronomy and astrophysics. Here we describe
in detail the MiraBest dataset, a publicly available batched dataset of 1256
radio-loud AGN from NVSS and FIRST, filtered to $0.03 < z < 0.1$, manually
labelled by Miraghaei and Best (2017) according to the Fanaroff-Riley
morphological classification, created for machine learning applications and
compatible for use with standard deep learning libraries. We outline the
principles underlying the construction of the dataset, the sample selection and
pre-processing methodology, dataset structure and composition, as well as a
comparison of MiraBest to other datasets used in the literature. Existing
applications that utilise the MiraBest dataset are reviewed, and an extended
dataset of 2100 sources is created by cross-matching MiraBest with other
catalogues of radio-loud AGN that have been used more widely in the literature
for machine learning applications.
| new_dataset | 0.714784 |
2305.11116 | Yujie Lu | Yujie Lu, Xianjun Yang, Xiujun Li, Xin Eric Wang, William Yang Wang | LLMScore: Unveiling the Power of Large Language Models in Text-to-Image
Synthesis Evaluation | null | null | null | null | cs.CV cs.CL | http://creativecommons.org/licenses/by/4.0/ | Existing automatic evaluation on text-to-image synthesis can only provide an
image-text matching score, without considering the object-level
compositionality, which results in poor correlation with human judgments. In
this work, we propose LLMScore, a new framework that offers evaluation scores
with multi-granularity compositionality. LLMScore leverages the large language
models (LLMs) to evaluate text-to-image models. Initially, it transforms the
image into image-level and object-level visual descriptions. Then an evaluation
instruction is fed into the LLMs to measure the alignment between the
synthesized image and the text, ultimately generating a score accompanied by a
rationale. Our substantial analysis reveals the highest correlation of LLMScore
with human judgments on a wide range of datasets (Attribute Binding Contrast,
Concept Conjunction, MSCOCO, DrawBench, PaintSkills). Notably, our LLMScore
achieves Kendall's tau correlation with human evaluations that is 58.8% and
31.2% higher than the commonly-used text-image matching metrics CLIP and BLIP,
respectively.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 16:57:57 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Lu",
"Yujie",
""
],
[
"Yang",
"Xianjun",
""
],
[
"Li",
"Xiujun",
""
],
[
"Wang",
"Xin Eric",
""
],
[
"Wang",
"William Yang",
""
]
] | TITLE: LLMScore: Unveiling the Power of Large Language Models in Text-to-Image
Synthesis Evaluation
ABSTRACT: Existing automatic evaluation on text-to-image synthesis can only provide an
image-text matching score, without considering the object-level
compositionality, which results in poor correlation with human judgments. In
this work, we propose LLMScore, a new framework that offers evaluation scores
with multi-granularity compositionality. LLMScore leverages the large language
models (LLMs) to evaluate text-to-image models. Initially, it transforms the
image into image-level and object-level visual descriptions. Then an evaluation
instruction is fed into the LLMs to measure the alignment between the
synthesized image and the text, ultimately generating a score accompanied by a
rationale. Our substantial analysis reveals the highest correlation of LLMScore
with human judgments on a wide range of datasets (Attribute Binding Contrast,
Concept Conjunction, MSCOCO, DrawBench, PaintSkills). Notably, our LLMScore
achieves Kendall's tau correlation with human evaluations that is 58.8% and
31.2% higher than the commonly-used text-image matching metrics CLIP and BLIP,
respectively.
| no_new_dataset | 0.710848 |
2305.11125 | Yongmin Li | Daniel Alonso Villanueva Nunez and Yongmin Li | Skin Lesion Diagnosis Using Convolutional Neural Networks | null | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Cancerous skin lesions are one of the most common malignancies detected in
humans, and if not detected at an early stage, they can lead to death.
Therefore, it is crucial to have access to accurate results early on to
optimize the chances of survival. Unfortunately, accurate results are typically
obtained by highly trained dermatologists, who may not be accessible to many
people, particularly in low-income and middle-income countries. Artificial
Intelligence (AI) appears to be a potential solution to this problem, as it has
proven to provide equal or even better diagnoses than healthcare professionals.
This project aims to address the issue by collecting state-of-the-art
techniques for image classification from various fields and implementing them.
Some of these techniques include mixup, presizing, and test-time augmentation,
among others. Three architectures were used for the implementation:
DenseNet121, VGG16 with batch normalization, and ResNet50. The models were
designed with two main purposes. First, to classify images into seven
categories, including melanocytic nevus, melanoma, benign keratosis-like
lesions, basal cell carcinoma, actinic keratoses and intraepithelial carcinoma,
vascular lesions, and dermatofibroma. Second, to classify images into benign or
malignant. The models were trained using a dataset of 8012 images, and their
performance was evaluated using 2003 images. It's worth noting that this model
is trained end-to-end, directly from the image to the labels, without the need
for handcrafted feature extraction.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:15:08 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Nunez",
"Daniel Alonso Villanueva",
""
],
[
"Li",
"Yongmin",
""
]
] | TITLE: Skin Lesion Diagnosis Using Convolutional Neural Networks
ABSTRACT: Cancerous skin lesions are one of the most common malignancies detected in
humans, and if not detected at an early stage, they can lead to death.
Therefore, it is crucial to have access to accurate results early on to
optimize the chances of survival. Unfortunately, accurate results are typically
obtained by highly trained dermatologists, who may not be accessible to many
people, particularly in low-income and middle-income countries. Artificial
Intelligence (AI) appears to be a potential solution to this problem, as it has
proven to provide equal or even better diagnoses than healthcare professionals.
This project aims to address the issue by collecting state-of-the-art
techniques for image classification from various fields and implementing them.
Some of these techniques include mixup, presizing, and test-time augmentation,
among others. Three architectures were used for the implementation:
DenseNet121, VGG16 with batch normalization, and ResNet50. The models were
designed with two main purposes. First, to classify images into seven
categories, including melanocytic nevus, melanoma, benign keratosis-like
lesions, basal cell carcinoma, actinic keratoses and intraepithelial carcinoma,
vascular lesions, and dermatofibroma. Second, to classify images into benign or
malignant. The models were trained using a dataset of 8012 images, and their
performance was evaluated using 2003 images. It's worth noting that this model
is trained end-to-end, directly from the image to the labels, without the need
for handcrafted feature extraction.
| no_new_dataset | 0.706197 |
2305.11142 | Yuchen Eleanor Jiang | Yuchen Eleanor Jiang, Tianyu Liu, Shuming Ma, Dongdong Zhang, Mrinmaya
Sachan, Ryan Cotterell | Discourse Centric Evaluation of Machine Translation with a Densely
Annotated Parallel Corpus | 9 pages. arXiv admin note: substantial text overlap with
arXiv:2210.14667 | ACL 2023 | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Several recent papers claim human parity at sentence-level Machine
Translation (MT), especially in high-resource languages. Thus, in response, the
MT community has, in part, shifted its focus to document-level translation.
Translating documents requires a deeper understanding of the structure and
meaning of text, which is often captured by various kinds of discourse
phenomena such as consistency, coherence, and cohesion. However, this renders
conventional sentence-level MT evaluation benchmarks inadequate for evaluating
the performance of context-aware MT systems. This paper presents a new dataset
with rich discourse annotations, built upon the large-scale parallel corpus BWB
introduced in Jiang et al. (2022). The new BWB annotation introduces four extra
evaluation aspects, i.e., entity, terminology, coreference, and quotation,
covering 15,095 entity mentions in both languages. Using these annotations, we
systematically investigate the similarities and differences between the
discourse structures of source and target languages, and the challenges they
pose to MT. We discover that MT outputs differ fundamentally from human
translations in terms of their latent discourse structures. This gives us a new
perspective on the challenges and opportunities in document-level MT. We make
our resource publicly available to spur future research in document-level MT
and the generalization to other language translation tasks.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:36:41 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Jiang",
"Yuchen Eleanor",
""
],
[
"Liu",
"Tianyu",
""
],
[
"Ma",
"Shuming",
""
],
[
"Zhang",
"Dongdong",
""
],
[
"Sachan",
"Mrinmaya",
""
],
[
"Cotterell",
"Ryan",
""
]
] | TITLE: Discourse Centric Evaluation of Machine Translation with a Densely
Annotated Parallel Corpus
ABSTRACT: Several recent papers claim human parity at sentence-level Machine
Translation (MT), especially in high-resource languages. Thus, in response, the
MT community has, in part, shifted its focus to document-level translation.
Translating documents requires a deeper understanding of the structure and
meaning of text, which is often captured by various kinds of discourse
phenomena such as consistency, coherence, and cohesion. However, this renders
conventional sentence-level MT evaluation benchmarks inadequate for evaluating
the performance of context-aware MT systems. This paper presents a new dataset
with rich discourse annotations, built upon the large-scale parallel corpus BWB
introduced in Jiang et al. (2022). The new BWB annotation introduces four extra
evaluation aspects, i.e., entity, terminology, coreference, and quotation,
covering 15,095 entity mentions in both languages. Using these annotations, we
systematically investigate the similarities and differences between the
discourse structures of source and target languages, and the challenges they
pose to MT. We discover that MT outputs differ fundamentally from human
translations in terms of their latent discourse structures. This gives us a new
perspective on the challenges and opportunities in document-level MT. We make
our resource publicly available to spur future research in document-level MT
and the generalization to other language translation tasks.
| new_dataset | 0.714273 |
2305.11144 | Rojin Rezvan | Paul D\"utting, Evangelia Gergatsouli, Rojin Rezvan, Yifeng Teng,
Alexandros Tsigonias-Dimitriadis | Prophet Secretary Against the Online Optimal | null | null | null | null | cs.GT | http://creativecommons.org/licenses/by/4.0/ | We study the prophet secretary problem, a well-studied variant of the classic
prophet inequality, where values are drawn from independent known distributions
but arrive in uniformly random order. Upon seeing a value at each step, the
decision-maker has to either select it and stop or irrevocably discard it.
Traditionally, the chosen benchmark is the expected reward of the prophet, who
knows all the values in advance and can always select the maximum one. %% In
this work, we study the prophet secretary problem against a less pessimistic
but equally well-motivated benchmark; the \emph{online} optimal. Here, the main
goal is to find polynomial-time algorithms that guarantee near-optimal expected
reward. As a warm-up, we present a quasi-polynomial time approximation scheme
(QPTAS) achieving a $(1-\e)$-approximation in $O(n^{\text{poly} \log n\cdot
f(\e)})$ time through careful discretization and non-trivial bundling
processes. Using the toolbox developed for the QPTAS, coupled with a novel
\emph{frontloading} technique that enables us to reduce the number of decisions
we need to make, we are able to remove the dependence on $n$ in the exponent
and obtain a polynomial time approximation scheme (PTAS) for this problem.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:38:12 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Dütting",
"Paul",
""
],
[
"Gergatsouli",
"Evangelia",
""
],
[
"Rezvan",
"Rojin",
""
],
[
"Teng",
"Yifeng",
""
],
[
"Tsigonias-Dimitriadis",
"Alexandros",
""
]
] | TITLE: Prophet Secretary Against the Online Optimal
ABSTRACT: We study the prophet secretary problem, a well-studied variant of the classic
prophet inequality, where values are drawn from independent known distributions
but arrive in uniformly random order. Upon seeing a value at each step, the
decision-maker has to either select it and stop or irrevocably discard it.
Traditionally, the chosen benchmark is the expected reward of the prophet, who
knows all the values in advance and can always select the maximum one. %% In
this work, we study the prophet secretary problem against a less pessimistic
but equally well-motivated benchmark; the \emph{online} optimal. Here, the main
goal is to find polynomial-time algorithms that guarantee near-optimal expected
reward. As a warm-up, we present a quasi-polynomial time approximation scheme
(QPTAS) achieving a $(1-\e)$-approximation in $O(n^{\text{poly} \log n\cdot
f(\e)})$ time through careful discretization and non-trivial bundling
processes. Using the toolbox developed for the QPTAS, coupled with a novel
\emph{frontloading} technique that enables us to reduce the number of decisions
we need to make, we are able to remove the dependence on $n$ in the exponent
and obtain a polynomial time approximation scheme (PTAS) for this problem.
| no_new_dataset | 0.708408 |
2305.11159 | Kai Zhang | Kai Zhang, Bernal Jim\'enez Guti\'errez, Yu Su | Aligning Instruction Tasks Unlocks Large Language Models as Zero-Shot
Relation Extractors | ACL 2023 Findings; The code is available at
https://github.com/OSU-NLP-Group/QA4RE | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work has shown that fine-tuning large language models (LLMs) on
large-scale instruction-following datasets substantially improves their
performance on a wide range of NLP tasks, especially in the zero-shot setting.
However, even advanced instruction-tuned LLMs still fail to outperform small
LMs on relation extraction (RE), a fundamental information extraction task. We
hypothesize that instruction-tuning has been unable to elicit strong RE
capabilities in LLMs due to RE's low incidence in instruction-tuning datasets,
making up less than 1% of all tasks (Wang et al., 2022). To address this
limitation, we propose QA4RE, a framework that aligns RE with question
answering (QA), a predominant task in instruction-tuning datasets.
Comprehensive zero-shot RE experiments over four datasets with two series of
instruction-tuned LLMs (six LLMs in total) demonstrate that our QA4RE framework
consistently improves LLM performance, strongly verifying our hypothesis and
enabling LLMs to outperform strong zero-shot baselines by a large margin.
Additionally, we provide thorough experiments and discussions to show the
robustness, few-shot effectiveness, and strong transferability of our QA4RE
framework. This work illustrates a promising way of adapting LLMs to
challenging and underrepresented tasks by aligning these tasks with more common
instruction-tuning tasks like QA.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:48:03 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Zhang",
"Kai",
""
],
[
"Gutiérrez",
"Bernal Jiménez",
""
],
[
"Su",
"Yu",
""
]
] | TITLE: Aligning Instruction Tasks Unlocks Large Language Models as Zero-Shot
Relation Extractors
ABSTRACT: Recent work has shown that fine-tuning large language models (LLMs) on
large-scale instruction-following datasets substantially improves their
performance on a wide range of NLP tasks, especially in the zero-shot setting.
However, even advanced instruction-tuned LLMs still fail to outperform small
LMs on relation extraction (RE), a fundamental information extraction task. We
hypothesize that instruction-tuning has been unable to elicit strong RE
capabilities in LLMs due to RE's low incidence in instruction-tuning datasets,
making up less than 1% of all tasks (Wang et al., 2022). To address this
limitation, we propose QA4RE, a framework that aligns RE with question
answering (QA), a predominant task in instruction-tuning datasets.
Comprehensive zero-shot RE experiments over four datasets with two series of
instruction-tuned LLMs (six LLMs in total) demonstrate that our QA4RE framework
consistently improves LLM performance, strongly verifying our hypothesis and
enabling LLMs to outperform strong zero-shot baselines by a large margin.
Additionally, we provide thorough experiments and discussions to show the
robustness, few-shot effectiveness, and strong transferability of our QA4RE
framework. This work illustrates a promising way of adapting LLMs to
challenging and underrepresented tasks by aligning these tasks with more common
instruction-tuning tasks like QA.
| no_new_dataset | 0.711606 |
2305.11167 | Dongxu Zhao | Dongxu Zhao, Daniel Lichy, Pierre-Nicolas Perrin, Jan-Michael Frahm,
Soumyadip Sengupta | MVPSNet: Fast Generalizable Multi-view Photometric Stereo | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a fast and generalizable solution to Multi-view Photometric Stereo
(MVPS), called MVPSNet. The key to our approach is a feature extraction network
that effectively combines images from the same view captured under multiple
lighting conditions to extract geometric features from shading cues for stereo
matching. We demonstrate these features, termed `Light Aggregated Feature Maps'
(LAFM), are effective for feature matching even in textureless regions, where
traditional multi-view stereo methods fail. Our method produces similar
reconstruction results to PS-NeRF, a state-of-the-art MVPS method that
optimizes a neural network per-scene, while being 411$\times$ faster (105
seconds vs. 12 hours) in inference. Additionally, we introduce a new synthetic
dataset for MVPS, sMVPS, which is shown to be effective to train a
generalizable MVPS method.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:57:29 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Zhao",
"Dongxu",
""
],
[
"Lichy",
"Daniel",
""
],
[
"Perrin",
"Pierre-Nicolas",
""
],
[
"Frahm",
"Jan-Michael",
""
],
[
"Sengupta",
"Soumyadip",
""
]
] | TITLE: MVPSNet: Fast Generalizable Multi-view Photometric Stereo
ABSTRACT: We propose a fast and generalizable solution to Multi-view Photometric Stereo
(MVPS), called MVPSNet. The key to our approach is a feature extraction network
that effectively combines images from the same view captured under multiple
lighting conditions to extract geometric features from shading cues for stereo
matching. We demonstrate these features, termed `Light Aggregated Feature Maps'
(LAFM), are effective for feature matching even in textureless regions, where
traditional multi-view stereo methods fail. Our method produces similar
reconstruction results to PS-NeRF, a state-of-the-art MVPS method that
optimizes a neural network per-scene, while being 411$\times$ faster (105
seconds vs. 12 hours) in inference. Additionally, we introduce a new synthetic
dataset for MVPS, sMVPS, which is shown to be effective to train a
generalizable MVPS method.
| new_dataset | 0.7114 |
2305.11173 | Peize Sun | Peize Sun, Shoufa Chen, Chenchen Zhu, Fanyi Xiao, Ping Luo, Saining
Xie, Zhicheng Yan | Going Denser with Open-Vocabulary Part Segmentation | Code is available at \url{https://github.com/facebookresearch/VLPart} | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Object detection has been expanded from a limited number of categories to
open vocabulary. Moving forward, a complete intelligent vision system requires
understanding more fine-grained object descriptions, object parts. In this
paper, we propose a detector with the ability to predict both open-vocabulary
objects and their part segmentation. This ability comes from two designs.
First, we train the detector on the joint of part-level, object-level and
image-level data to build the multi-granularity alignment between language and
image. Second, we parse the novel object into its parts by its dense semantic
correspondence with the base object. These two designs enable the detector to
largely benefit from various data sources and foundation models. In
open-vocabulary part segmentation experiments, our method outperforms the
baseline by 3.3$\sim$7.3 mAP in cross-dataset generalization on PartImageNet,
and improves the baseline by 7.3 novel AP$_{50}$ in cross-category
generalization on Pascal Part. Finally, we train a detector that generalizes to
a wide range of part segmentation datasets while achieving better performance
than dataset-specific training.
| [
{
"version": "v1",
"created": "Thu, 18 May 2023 17:59:10 GMT"
}
] | 2023-05-19T00:00:00 | [
[
"Sun",
"Peize",
""
],
[
"Chen",
"Shoufa",
""
],
[
"Zhu",
"Chenchen",
""
],
[
"Xiao",
"Fanyi",
""
],
[
"Luo",
"Ping",
""
],
[
"Xie",
"Saining",
""
],
[
"Yan",
"Zhicheng",
""
]
] | TITLE: Going Denser with Open-Vocabulary Part Segmentation
ABSTRACT: Object detection has been expanded from a limited number of categories to
open vocabulary. Moving forward, a complete intelligent vision system requires
understanding more fine-grained object descriptions, object parts. In this
paper, we propose a detector with the ability to predict both open-vocabulary
objects and their part segmentation. This ability comes from two designs.
First, we train the detector on the joint of part-level, object-level and
image-level data to build the multi-granularity alignment between language and
image. Second, we parse the novel object into its parts by its dense semantic
correspondence with the base object. These two designs enable the detector to
largely benefit from various data sources and foundation models. In
open-vocabulary part segmentation experiments, our method outperforms the
baseline by 3.3$\sim$7.3 mAP in cross-dataset generalization on PartImageNet,
and improves the baseline by 7.3 novel AP$_{50}$ in cross-category
generalization on Pascal Part. Finally, we train a detector that generalizes to
a wide range of part segmentation datasets while achieving better performance
than dataset-specific training.
| no_new_dataset | 0.710038 |
2001.01168 | Zhiwen Shao | Zhiwen Shao, Yong Zhou, Jianfei Cai, Hancheng Zhu, Rui Yao | Facial Action Unit Detection via Adaptive Attention and Relation | This paper has been accepted by IEEE Transactions on Image Processing
(TIP) | null | 10.1109/TIP.2023.3277794 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Facial action unit (AU) detection is challenging due to the difficulty in
capturing correlated information from subtle and dynamic AUs. Existing methods
often resort to the localization of correlated regions of AUs, in which
predefining local AU attentions by correlated facial landmarks often discards
essential parts, or learning global attention maps often contains irrelevant
areas. Furthermore, existing relational reasoning methods often employ common
patterns for all AUs while ignoring the specific way of each AU. To tackle
these limitations, we propose a novel adaptive attention and relation (AAR)
framework for facial AU detection. Specifically, we propose an adaptive
attention regression network to regress the global attention map of each AU
under the constraint of attention predefinition and the guidance of AU
detection, which is beneficial for capturing both specified dependencies by
landmarks in strongly correlated regions and facial globally distributed
dependencies in weakly correlated regions. Moreover, considering the diversity
and dynamics of AUs, we propose an adaptive spatio-temporal graph convolutional
network to simultaneously reason the independent pattern of each AU, the
inter-dependencies among AUs, as well as the temporal dependencies. Extensive
experiments show that our approach (i) achieves competitive performance on
challenging benchmarks including BP4D, DISFA, and GFT in constrained scenarios
and Aff-Wild2 in unconstrained scenarios, and (ii) can precisely learn the
regional correlation distribution of each AU.
| [
{
"version": "v1",
"created": "Sun, 5 Jan 2020 05:14:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 03:18:31 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Shao",
"Zhiwen",
""
],
[
"Zhou",
"Yong",
""
],
[
"Cai",
"Jianfei",
""
],
[
"Zhu",
"Hancheng",
""
],
[
"Yao",
"Rui",
""
]
] | TITLE: Facial Action Unit Detection via Adaptive Attention and Relation
ABSTRACT: Facial action unit (AU) detection is challenging due to the difficulty in
capturing correlated information from subtle and dynamic AUs. Existing methods
often resort to the localization of correlated regions of AUs, in which
predefining local AU attentions by correlated facial landmarks often discards
essential parts, or learning global attention maps often contains irrelevant
areas. Furthermore, existing relational reasoning methods often employ common
patterns for all AUs while ignoring the specific way of each AU. To tackle
these limitations, we propose a novel adaptive attention and relation (AAR)
framework for facial AU detection. Specifically, we propose an adaptive
attention regression network to regress the global attention map of each AU
under the constraint of attention predefinition and the guidance of AU
detection, which is beneficial for capturing both specified dependencies by
landmarks in strongly correlated regions and facial globally distributed
dependencies in weakly correlated regions. Moreover, considering the diversity
and dynamics of AUs, we propose an adaptive spatio-temporal graph convolutional
network to simultaneously reason the independent pattern of each AU, the
inter-dependencies among AUs, as well as the temporal dependencies. Extensive
experiments show that our approach (i) achieves competitive performance on
challenging benchmarks including BP4D, DISFA, and GFT in constrained scenarios
and Aff-Wild2 in unconstrained scenarios, and (ii) can precisely learn the
regional correlation distribution of each AU.
| no_new_dataset | 0.710842 |
2007.00394 | Yizhak Ben-Shabat | Yizhak Ben-Shabat, Xin Yu, Fatemeh Sadat Saleh, Dylan Campbell,
Cristian Rodriguez-Opazo, Hongdong Li, Stephen Gould | The IKEA ASM Dataset: Understanding People Assembling Furniture through
Actions, Objects and Pose | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The availability of a large labeled dataset is a key requirement for applying
deep learning methods to solve various computer vision tasks. In the context of
understanding human activities, existing public datasets, while large in size,
are often limited to a single RGB camera and provide only per-frame or per-clip
action annotations. To enable richer analysis and understanding of human
activities, we introduce IKEA ASM -- a three million frame, multi-view,
furniture assembly video dataset that includes depth, atomic actions, object
segmentation, and human pose. Additionally, we benchmark prominent methods for
video action recognition, object segmentation and human pose estimation tasks
on this challenging dataset. The dataset enables the development of holistic
methods, which integrate multi-modal and multi-view data to better perform on
these tasks.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2020 11:34:46 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 07:56:52 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Ben-Shabat",
"Yizhak",
""
],
[
"Yu",
"Xin",
""
],
[
"Saleh",
"Fatemeh Sadat",
""
],
[
"Campbell",
"Dylan",
""
],
[
"Rodriguez-Opazo",
"Cristian",
""
],
[
"Li",
"Hongdong",
""
],
[
"Gould",
"Stephen",
""
]
] | TITLE: The IKEA ASM Dataset: Understanding People Assembling Furniture through
Actions, Objects and Pose
ABSTRACT: The availability of a large labeled dataset is a key requirement for applying
deep learning methods to solve various computer vision tasks. In the context of
understanding human activities, existing public datasets, while large in size,
are often limited to a single RGB camera and provide only per-frame or per-clip
action annotations. To enable richer analysis and understanding of human
activities, we introduce IKEA ASM -- a three million frame, multi-view,
furniture assembly video dataset that includes depth, atomic actions, object
segmentation, and human pose. Additionally, we benchmark prominent methods for
video action recognition, object segmentation and human pose estimation tasks
on this challenging dataset. The dataset enables the development of holistic
methods, which integrate multi-modal and multi-view data to better perform on
these tasks.
| new_dataset | 0.717377 |
2107.07776 | Giuseppe Orlando | Giuseppe Orlando, Alessandro Della Rocca, Paolo Francesco Barbante,
Luca Bonaventura, Nicola Parolini | An efficient and accurate implicit DG solver for the incompressible
Navier-Stokes equations | null | International Journal for Numerical Methods in Fluids 94.9 (2022):
1484-1516 | 10.1002/fld.5098 | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | We propose an efficient, accurate and robust implicit solver for the
incompressible Navier-Stokes equations, based on a DG spatial discretization
and on the TR-BDF2 method for time discretization. The effectiveness of the
method is demonstrated in a number of classical benchmarks, which highlight its
superior efficiency with respect to other widely used implicit approaches. The
parallel implementation of the proposed method in the framework of the deal.II
software package allows for accurate and efficient adaptive simulations in
complex geometries, which makes the proposed solver attractive for large scale
industrial applications.
| [
{
"version": "v1",
"created": "Fri, 16 Jul 2021 09:03:32 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 08:29:47 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Orlando",
"Giuseppe",
""
],
[
"Della Rocca",
"Alessandro",
""
],
[
"Barbante",
"Paolo Francesco",
""
],
[
"Bonaventura",
"Luca",
""
],
[
"Parolini",
"Nicola",
""
]
] | TITLE: An efficient and accurate implicit DG solver for the incompressible
Navier-Stokes equations
ABSTRACT: We propose an efficient, accurate and robust implicit solver for the
incompressible Navier-Stokes equations, based on a DG spatial discretization
and on the TR-BDF2 method for time discretization. The effectiveness of the
method is demonstrated in a number of classical benchmarks, which highlight its
superior efficiency with respect to other widely used implicit approaches. The
parallel implementation of the proposed method in the framework of the deal.II
software package allows for accurate and efficient adaptive simulations in
complex geometries, which makes the proposed solver attractive for large scale
industrial applications.
| no_new_dataset | 0.709189 |
2110.04440 | Yashish M. Siriwardena | Yashish M. Siriwardena, Chris Kitchen, Deanna L. Kelly, Carol
Espy-Wilson | Multimodal Approach for Assessing Neuromotor Coordination in
Schizophrenia Using Convolutional Neural Networks | 5 pages. arXiv admin note: text overlap with arXiv:2102.07054 | Proceedings of the 2021 International Conference on Multimodal
Interaction | 10.1145/3462244.3479967 | null | eess.AS cs.MM cs.SD | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This study investigates the speech articulatory coordination in schizophrenia
subjects exhibiting strong positive symptoms (e.g. hallucinations and
delusions), using two distinct channel-delay correlation methods. We show that
the schizophrenic subjects with strong positive symptoms and who are markedly
ill pose complex articulatory coordination pattern in facial and speech
gestures than what is observed in healthy subjects. This distinction in speech
coordination pattern is used to train a multimodal convolutional neural network
(CNN) which uses video and audio data during speech to distinguish
schizophrenic patients with strong positive symptoms from healthy subjects. We
also show that the vocal tract variables (TVs) which correspond to place of
articulation and glottal source outperform the Mel-frequency Cepstral
Coefficients (MFCCs) when fused with Facial Action Units (FAUs) in the proposed
multimodal network. For the clinical dataset we collected, our best performing
multimodal network improves the mean F1 score for detecting schizophrenia by
around 18% with respect to the full vocal tract coordination (FVTC) baseline
method implemented with fusing FAUs and MFCCs.
| [
{
"version": "v1",
"created": "Sat, 9 Oct 2021 03:11:46 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Siriwardena",
"Yashish M.",
""
],
[
"Kitchen",
"Chris",
""
],
[
"Kelly",
"Deanna L.",
""
],
[
"Espy-Wilson",
"Carol",
""
]
] | TITLE: Multimodal Approach for Assessing Neuromotor Coordination in
Schizophrenia Using Convolutional Neural Networks
ABSTRACT: This study investigates the speech articulatory coordination in schizophrenia
subjects exhibiting strong positive symptoms (e.g. hallucinations and
delusions), using two distinct channel-delay correlation methods. We show that
the schizophrenic subjects with strong positive symptoms and who are markedly
ill pose complex articulatory coordination pattern in facial and speech
gestures than what is observed in healthy subjects. This distinction in speech
coordination pattern is used to train a multimodal convolutional neural network
(CNN) which uses video and audio data during speech to distinguish
schizophrenic patients with strong positive symptoms from healthy subjects. We
also show that the vocal tract variables (TVs) which correspond to place of
articulation and glottal source outperform the Mel-frequency Cepstral
Coefficients (MFCCs) when fused with Facial Action Units (FAUs) in the proposed
multimodal network. For the clinical dataset we collected, our best performing
multimodal network improves the mean F1 score for detecting schizophrenia by
around 18% with respect to the full vocal tract coordination (FVTC) baseline
method implemented with fusing FAUs and MFCCs.
| new_dataset | 0.712057 |
2111.07284 | Jayasimha Atulasimha | Walid A. Misba, Mark Lozano, Damien Querlioz, Jayasimha Atulasimha | Energy Efficient Learning with Low Resolution Stochastic Domain Wall
Synapse Based Deep Neural Networks | null | null | 10.1109/ACCESS.2022.3196688 | null | cond-mat.mes-hall cond-mat.dis-nn cs.LG | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We demonstrate that extremely low resolution quantized (nominally 5-state)
synapses with large stochastic variations in Domain Wall (DW) position can be
both energy efficient and achieve reasonably high testing accuracies compared
to Deep Neural Networks (DNNs) of similar sizes using floating precision
synaptic weights. Specifically, voltage controlled DW devices demonstrate
stochastic behavior as modeled rigorously with micromagnetic simulations and
can only encode limited states; however, they can be extremely energy efficient
during both training and inference. We show that by implementing suitable
modifications to the learning algorithms, we can address the stochastic
behavior as well as mitigate the effect of their low-resolution to achieve high
testing accuracies. In this study, we propose both in-situ and ex-situ training
algorithms, based on modification of the algorithm proposed by Hubara et al.
[1] which works well with quantization of synaptic weights. We train several
5-layer DNNs on MNIST dataset using 2-, 3- and 5-state DW device as synapse.
For in-situ training, a separate high precision memory unit is adopted to
preserve and accumulate the weight gradients, which are then quantized to
program the low precision DW devices. Moreover, a sizeable noise tolerance
margin is used during the training to address the intrinsic programming noise.
For ex-situ training, a precursor DNN is first trained based on the
characterized DW device model and a noise tolerance margin, which is similar to
the in-situ training. Remarkably, for in-situ inference the energy dissipation
to program the devices is only 13 pJ per inference given that the training is
performed over the entire MNIST dataset for 10 epochs.
| [
{
"version": "v1",
"created": "Sun, 14 Nov 2021 09:12:29 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Misba",
"Walid A.",
""
],
[
"Lozano",
"Mark",
""
],
[
"Querlioz",
"Damien",
""
],
[
"Atulasimha",
"Jayasimha",
""
]
] | TITLE: Energy Efficient Learning with Low Resolution Stochastic Domain Wall
Synapse Based Deep Neural Networks
ABSTRACT: We demonstrate that extremely low resolution quantized (nominally 5-state)
synapses with large stochastic variations in Domain Wall (DW) position can be
both energy efficient and achieve reasonably high testing accuracies compared
to Deep Neural Networks (DNNs) of similar sizes using floating precision
synaptic weights. Specifically, voltage controlled DW devices demonstrate
stochastic behavior as modeled rigorously with micromagnetic simulations and
can only encode limited states; however, they can be extremely energy efficient
during both training and inference. We show that by implementing suitable
modifications to the learning algorithms, we can address the stochastic
behavior as well as mitigate the effect of their low-resolution to achieve high
testing accuracies. In this study, we propose both in-situ and ex-situ training
algorithms, based on modification of the algorithm proposed by Hubara et al.
[1] which works well with quantization of synaptic weights. We train several
5-layer DNNs on MNIST dataset using 2-, 3- and 5-state DW device as synapse.
For in-situ training, a separate high precision memory unit is adopted to
preserve and accumulate the weight gradients, which are then quantized to
program the low precision DW devices. Moreover, a sizeable noise tolerance
margin is used during the training to address the intrinsic programming noise.
For ex-situ training, a precursor DNN is first trained based on the
characterized DW device model and a noise tolerance margin, which is similar to
the in-situ training. Remarkably, for in-situ inference the energy dissipation
to program the devices is only 13 pJ per inference given that the training is
performed over the entire MNIST dataset for 10 epochs.
| no_new_dataset | 0.712207 |
2201.05194 | Danqing Shi | Danqing Shi, Weiwei Cui, Danqing Huang, Haidong Zhang, Nan Cao | Reverse-Engineering Information Presentations: Recovering Hierarchical
Grouping from Layouts of Visual Elements | null | null | null | null | cs.HC | http://creativecommons.org/licenses/by/4.0/ | Visual elements in an information presentation are often spatially and
semantically grouped hierarchically for effective message delivery. Studying
the hierarchical grouping information can help researchers and designers better
explore layout structures and understand design demographics. However,
recovering hierarchical grouping is challenging due to a large number of
possibilities for compositing visual elements into a single-page design. This
paper introduces an automatic approach that takes the layout of visual elements
as input and returns the hierarchical grouping as output. To understand
information presentations, we first contribute a dataset of 23,072 information
presentations with diverse layouts to the community. Next, we propose our
technique with a Transformer-based model to predict relatedness between visual
elements and a bottom-up algorithm to produce the hierarchical grouping.
Finally, we evaluate our technique through a technical experiment and a user
study with 30 designers. The results show that the proposed technique is
promising.
| [
{
"version": "v1",
"created": "Thu, 13 Jan 2022 20:14:10 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 05:22:12 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Shi",
"Danqing",
""
],
[
"Cui",
"Weiwei",
""
],
[
"Huang",
"Danqing",
""
],
[
"Zhang",
"Haidong",
""
],
[
"Cao",
"Nan",
""
]
] | TITLE: Reverse-Engineering Information Presentations: Recovering Hierarchical
Grouping from Layouts of Visual Elements
ABSTRACT: Visual elements in an information presentation are often spatially and
semantically grouped hierarchically for effective message delivery. Studying
the hierarchical grouping information can help researchers and designers better
explore layout structures and understand design demographics. However,
recovering hierarchical grouping is challenging due to a large number of
possibilities for compositing visual elements into a single-page design. This
paper introduces an automatic approach that takes the layout of visual elements
as input and returns the hierarchical grouping as output. To understand
information presentations, we first contribute a dataset of 23,072 information
presentations with diverse layouts to the community. Next, we propose our
technique with a Transformer-based model to predict relatedness between visual
elements and a bottom-up algorithm to produce the hierarchical grouping.
Finally, we evaluate our technique through a technical experiment and a user
study with 30 designers. The results show that the proposed technique is
promising.
| new_dataset | 0.711469 |
2201.10782 | Huizi Wu | Huizi Wu, Cong Geng, and Hui Fang | Causality and Correlation Graph Modeling for Effective and Explainable
Session-based Recommendation | Accepted by ACM Transactions on the Web | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Session-based recommendation which has been witnessed a booming interest
recently, focuses on predicting a user's next interested item(s) based on an
anonymous session. Most existing studies adopt complex deep learning techniques
(e.g., graph neural networks) for effective session-based recommendation.
However, they merely address co-occurrence between items, but fail to well
distinguish causality and correlation relationship. Considering the varied
interpretations and characteristics of causality and correlation relationship
between items, in this study, we propose a novel method denoted as CGSR by
jointly modeling causality and correlation relationship between items. In
particular, we construct cause, effect and correlation graphs from sessions by
simultaneously considering the false causality problem. We further design a
graph neural network-based method for session-based recommendation. To
conclude, we strive to explore the relationship between items from specific
``causality" (directed) and ``correlation" (undirected) perspectives. Extensive
experiments on three datasets show that our model outperforms other
state-of-the-art methods in terms of recommendation accuracy. Moreover, we
further propose an explainable framework on CGSR, and demonstrate the
explainability of our model via case studies on Amazon dataset.
| [
{
"version": "v1",
"created": "Wed, 26 Jan 2022 07:12:01 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Jan 2022 10:24:58 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 07:36:30 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Wu",
"Huizi",
""
],
[
"Geng",
"Cong",
""
],
[
"Fang",
"Hui",
""
]
] | TITLE: Causality and Correlation Graph Modeling for Effective and Explainable
Session-based Recommendation
ABSTRACT: Session-based recommendation which has been witnessed a booming interest
recently, focuses on predicting a user's next interested item(s) based on an
anonymous session. Most existing studies adopt complex deep learning techniques
(e.g., graph neural networks) for effective session-based recommendation.
However, they merely address co-occurrence between items, but fail to well
distinguish causality and correlation relationship. Considering the varied
interpretations and characteristics of causality and correlation relationship
between items, in this study, we propose a novel method denoted as CGSR by
jointly modeling causality and correlation relationship between items. In
particular, we construct cause, effect and correlation graphs from sessions by
simultaneously considering the false causality problem. We further design a
graph neural network-based method for session-based recommendation. To
conclude, we strive to explore the relationship between items from specific
``causality" (directed) and ``correlation" (undirected) perspectives. Extensive
experiments on three datasets show that our model outperforms other
state-of-the-art methods in terms of recommendation accuracy. Moreover, we
further propose an explainable framework on CGSR, and demonstrate the
explainability of our model via case studies on Amazon dataset.
| no_new_dataset | 0.710025 |
2202.09554 | Yichuan Deng | Rui Duan, Hui Deng, Mao Tian, Yichuan Deng, Jiarui Lin | SODA: Site Object Detection dAtaset for Deep Learning in Construction | null | Automation in Construction, 2022 | 10.1016/j.autcon.2022.104499 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Computer vision-based deep learning object detection algorithms have been
developed sufficiently powerful to support the ability to recognize various
objects. Although there are currently general datasets for object detection,
there is still a lack of large-scale, open-source dataset for the construction
industry, which limits the developments of object detection algorithms as they
tend to be data-hungry. Therefore, this paper develops a new large-scale image
dataset specifically collected and annotated for the construction site, called
Site Object Detection dAtaset (SODA), which contains 15 kinds of object classes
categorized by workers, materials, machines, and layout. Firstly, more than
20,000 images were collected from multiple construction sites in different site
conditions, weather conditions, and construction phases, which covered
different angles and perspectives. After careful screening and processing,
19,846 images including 286,201 objects were then obtained and annotated with
labels in accordance with predefined categories. Statistical analysis shows
that the developed dataset is advantageous in terms of diversity and volume.
Further evaluation with two widely-adopted object detection algorithms based on
deep learning (YOLO v3/ YOLO v4) also illustrates the feasibility of the
dataset for typical construction scenarios, achieving a maximum mAP of 81.47%.
In this manner, this research contributes a large-scale image dataset for the
development of deep learning-based object detection methods in the construction
industry and sets up a performance benchmark for further evaluation of
corresponding algorithms in this area.
| [
{
"version": "v1",
"created": "Sat, 19 Feb 2022 09:09:23 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Duan",
"Rui",
""
],
[
"Deng",
"Hui",
""
],
[
"Tian",
"Mao",
""
],
[
"Deng",
"Yichuan",
""
],
[
"Lin",
"Jiarui",
""
]
] | TITLE: SODA: Site Object Detection dAtaset for Deep Learning in Construction
ABSTRACT: Computer vision-based deep learning object detection algorithms have been
developed sufficiently powerful to support the ability to recognize various
objects. Although there are currently general datasets for object detection,
there is still a lack of large-scale, open-source dataset for the construction
industry, which limits the developments of object detection algorithms as they
tend to be data-hungry. Therefore, this paper develops a new large-scale image
dataset specifically collected and annotated for the construction site, called
Site Object Detection dAtaset (SODA), which contains 15 kinds of object classes
categorized by workers, materials, machines, and layout. Firstly, more than
20,000 images were collected from multiple construction sites in different site
conditions, weather conditions, and construction phases, which covered
different angles and perspectives. After careful screening and processing,
19,846 images including 286,201 objects were then obtained and annotated with
labels in accordance with predefined categories. Statistical analysis shows
that the developed dataset is advantageous in terms of diversity and volume.
Further evaluation with two widely-adopted object detection algorithms based on
deep learning (YOLO v3/ YOLO v4) also illustrates the feasibility of the
dataset for typical construction scenarios, achieving a maximum mAP of 81.47%.
In this manner, this research contributes a large-scale image dataset for the
development of deep learning-based object detection methods in the construction
industry and sets up a performance benchmark for further evaluation of
corresponding algorithms in this area.
| new_dataset | 0.719023 |
2203.03512 | Fabio Caraffini PhD | Anna V. Kononova, Diederick Vermetten, Fabio Caraffini, Madalina-A.
Mitran and Daniela Zaharie | The importance of being constrained: dealing with infeasible solutions
in Differential Evolution and beyond | null | null | 10.1162/evco_a_00333 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We argue that results produced by a heuristic optimisation algorithm cannot
be considered reproducible unless the algorithm fully specifies what should be
done with solutions generated outside the domain, even in the case of simple
box constraints. Currently, in the field of heuristic optimisation, such
specification is rarely mentioned or investigated due to the assumed triviality
or insignificance of this question. Here, we demonstrate that, at least in
algorithms based on Differential Evolution, this choice induces notably
different behaviours - in terms of performance, disruptiveness and population
diversity. This is shown theoretically (where possible) for standard
Differential Evolution in the absence of selection pressure and experimentally
for the standard and state-of-the-art Differential Evolution variants on
special test function $f_0$ and BBOB benchmarking suite, respectively.
Moreover, we demonstrate that the importance of this choice quickly grows with
problem's dimensionality. Different Evolution is not at all special in this
regard - there is no reason to presume that other heuristic optimisers are not
equally affected by the aforementioned algorithmic choice. Thus, we urge the
field of heuristic optimisation to formalise and adopt the idea of a new
algorithmic component in heuristic optimisers, which we call here a strategy of
dealing with infeasible solutions. This component needs to be consistently (a)
specified in algorithmic descriptions to guarantee reproducibility of results,
(b) studied to better understand its impact on algorithm's performance in a
wider sense and (c) included in the (automatic) algorithmic design. All of
these should be done even for problems with box constraints.
| [
{
"version": "v1",
"created": "Mon, 7 Mar 2022 16:49:18 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Kononova",
"Anna V.",
""
],
[
"Vermetten",
"Diederick",
""
],
[
"Caraffini",
"Fabio",
""
],
[
"Mitran",
"Madalina-A.",
""
],
[
"Zaharie",
"Daniela",
""
]
] | TITLE: The importance of being constrained: dealing with infeasible solutions
in Differential Evolution and beyond
ABSTRACT: We argue that results produced by a heuristic optimisation algorithm cannot
be considered reproducible unless the algorithm fully specifies what should be
done with solutions generated outside the domain, even in the case of simple
box constraints. Currently, in the field of heuristic optimisation, such
specification is rarely mentioned or investigated due to the assumed triviality
or insignificance of this question. Here, we demonstrate that, at least in
algorithms based on Differential Evolution, this choice induces notably
different behaviours - in terms of performance, disruptiveness and population
diversity. This is shown theoretically (where possible) for standard
Differential Evolution in the absence of selection pressure and experimentally
for the standard and state-of-the-art Differential Evolution variants on
special test function $f_0$ and BBOB benchmarking suite, respectively.
Moreover, we demonstrate that the importance of this choice quickly grows with
problem's dimensionality. Different Evolution is not at all special in this
regard - there is no reason to presume that other heuristic optimisers are not
equally affected by the aforementioned algorithmic choice. Thus, we urge the
field of heuristic optimisation to formalise and adopt the idea of a new
algorithmic component in heuristic optimisers, which we call here a strategy of
dealing with infeasible solutions. This component needs to be consistently (a)
specified in algorithmic descriptions to guarantee reproducibility of results,
(b) studied to better understand its impact on algorithm's performance in a
wider sense and (c) included in the (automatic) algorithmic design. All of
these should be done even for problems with box constraints.
| no_new_dataset | 0.708799 |
2204.05727 | Hui Kong | Banghe Wu, Chengzhong Xu, Hui Kong | LiDAR Road-Atlas: An Efficient Map Representation for General 3D Urban
Environment | null | Field Robotics, 2023 | 10.55417/fr.2023014 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we propose the LiDAR Road-Atlas, a compactable and efficient 3D
map representation, for autonomous robot or vehicle navigation in general urban
environment. The LiDAR Road-Atlas can be generated by an online mapping
framework based on incrementally merging local 2D occupancy grid maps (2D-OGM).
Specifically, the contributions of our LiDAR Road-Atlas representation are
threefold. First, we solve the challenging problem of creating local 2D-OGM in
non-structured urban scenes based on a real-time delimitation of traversable
and curb regions in LiDAR point cloud. Second, we achieve accurate 3D mapping
in multiple-layer urban road scenarios by a probabilistic fusion scheme. Third,
we achieve very efficient 3D map representation of general environment thanks
to the automatic local-OGM induced traversable-region labeling and a sparse
probabilistic local point-cloud encoding. Given the LiDAR Road-Atlas, one can
achieve accurate vehicle localization, path planning and some other tasks. Our
map representation is insensitive to dynamic objects which can be filtered out
in the resulting map based on a probabilistic fusion. Empirically, we compare
our map representation with a couple of popular map representation methods in
robotics and autonomous driving societies, and our map representation is more
favorable in terms of efficiency, scalability and compactness. In addition, we
also evaluate localization accuracy extensively given the created LiDAR
Road-Atlas representations on several public benchmark datasets. With a
16-channel LiDAR sensor, our method achieves an average global localization
errors of 0.26m (translation) and 1.07 degrees (rotation) on the Apollo
dataset, and 0.89m (translation) and 1.29 degrees (rotation) on the MulRan
dataset, respectively, at 10Hz, which validates the promising performance of
our map representation for autonomous driving.
| [
{
"version": "v1",
"created": "Tue, 12 Apr 2022 11:46:09 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Mar 2023 07:16:04 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Wu",
"Banghe",
""
],
[
"Xu",
"Chengzhong",
""
],
[
"Kong",
"Hui",
""
]
] | TITLE: LiDAR Road-Atlas: An Efficient Map Representation for General 3D Urban
Environment
ABSTRACT: In this work, we propose the LiDAR Road-Atlas, a compactable and efficient 3D
map representation, for autonomous robot or vehicle navigation in general urban
environment. The LiDAR Road-Atlas can be generated by an online mapping
framework based on incrementally merging local 2D occupancy grid maps (2D-OGM).
Specifically, the contributions of our LiDAR Road-Atlas representation are
threefold. First, we solve the challenging problem of creating local 2D-OGM in
non-structured urban scenes based on a real-time delimitation of traversable
and curb regions in LiDAR point cloud. Second, we achieve accurate 3D mapping
in multiple-layer urban road scenarios by a probabilistic fusion scheme. Third,
we achieve very efficient 3D map representation of general environment thanks
to the automatic local-OGM induced traversable-region labeling and a sparse
probabilistic local point-cloud encoding. Given the LiDAR Road-Atlas, one can
achieve accurate vehicle localization, path planning and some other tasks. Our
map representation is insensitive to dynamic objects which can be filtered out
in the resulting map based on a probabilistic fusion. Empirically, we compare
our map representation with a couple of popular map representation methods in
robotics and autonomous driving societies, and our map representation is more
favorable in terms of efficiency, scalability and compactness. In addition, we
also evaluate localization accuracy extensively given the created LiDAR
Road-Atlas representations on several public benchmark datasets. With a
16-channel LiDAR sensor, our method achieves an average global localization
errors of 0.26m (translation) and 1.07 degrees (rotation) on the Apollo
dataset, and 0.89m (translation) and 1.29 degrees (rotation) on the MulRan
dataset, respectively, at 10Hz, which validates the promising performance of
our map representation for autonomous driving.
| no_new_dataset | 0.70866 |
2204.10068 | Guanchun Wang | Guanchun Wang, Xiangrong Zhang, Zelin Peng, Xu Tang, Huiyu Zhou,
Licheng Jiao | Absolute Wrong Makes Better: Boosting Weakly Supervised Object Detection
via Negative Deterministic Information | 7 pages, 5 figures, accepted by IJCAI 2022 | null | 10.24963/ijcai.2022/192 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Weakly supervised object detection (WSOD) is a challenging task, in which
image-level labels (e.g., categories of the instances in the whole image) are
used to train an object detector. Many existing methods follow the standard
multiple instance learning (MIL) paradigm and have achieved promising
performance. However, the lack of deterministic information leads to part
domination and missing instances. To address these issues, this paper focuses
on identifying and fully exploiting the deterministic information in WSOD. We
discover that negative instances (i.e. absolutely wrong instances), ignored in
most of the previous studies, normally contain valuable deterministic
information. Based on this observation, we here propose a negative
deterministic information (NDI) based method for improving WSOD, namely
NDI-WSOD. Specifically, our method consists of two stages: NDI collecting and
exploiting. In the collecting stage, we design several processes to identify
and distill the NDI from negative instances online. In the exploiting stage, we
utilize the extracted NDI to construct a novel negative contrastive learning
mechanism and a negative guided instance selection strategy for dealing with
the issues of part domination and missing instances, respectively. Experimental
results on several public benchmarks including VOC 2007, VOC 2012 and MS COCO
show that our method achieves satisfactory performance.
| [
{
"version": "v1",
"created": "Thu, 21 Apr 2022 12:55:27 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 06:17:01 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Wang",
"Guanchun",
""
],
[
"Zhang",
"Xiangrong",
""
],
[
"Peng",
"Zelin",
""
],
[
"Tang",
"Xu",
""
],
[
"Zhou",
"Huiyu",
""
],
[
"Jiao",
"Licheng",
""
]
] | TITLE: Absolute Wrong Makes Better: Boosting Weakly Supervised Object Detection
via Negative Deterministic Information
ABSTRACT: Weakly supervised object detection (WSOD) is a challenging task, in which
image-level labels (e.g., categories of the instances in the whole image) are
used to train an object detector. Many existing methods follow the standard
multiple instance learning (MIL) paradigm and have achieved promising
performance. However, the lack of deterministic information leads to part
domination and missing instances. To address these issues, this paper focuses
on identifying and fully exploiting the deterministic information in WSOD. We
discover that negative instances (i.e. absolutely wrong instances), ignored in
most of the previous studies, normally contain valuable deterministic
information. Based on this observation, we here propose a negative
deterministic information (NDI) based method for improving WSOD, namely
NDI-WSOD. Specifically, our method consists of two stages: NDI collecting and
exploiting. In the collecting stage, we design several processes to identify
and distill the NDI from negative instances online. In the exploiting stage, we
utilize the extracted NDI to construct a novel negative contrastive learning
mechanism and a negative guided instance selection strategy for dealing with
the issues of part domination and missing instances, respectively. Experimental
results on several public benchmarks including VOC 2007, VOC 2012 and MS COCO
show that our method achieves satisfactory performance.
| no_new_dataset | 0.711243 |
2204.11184 | Xiangyu Zhu | Xiangyu Zhu, Tingting Liao, Jiangjing Lyu, Xiang Yan, Yunfeng Wang,
Kan Guo, Qiong Cao, Stan Z. Li, and Zhen Lei | MVP-Human Dataset for 3D Human Avatar Reconstruction from Unconstrained
Frames | Accepted by IEEE Transactions on Biometrics, Behavior, and Identity
Science (TBIOM) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a novel problem of reconstructing a 3D human
avatar from multiple unconstrained frames, independent of assumptions on camera
calibration, capture space, and constrained actions. The problem should be
addressed by a framework that takes multiple unconstrained images as inputs,
and generates a shape-with-skinning avatar in the canonical space, finished in
one feed-forward pass. To this end, we present 3D Avatar Reconstruction in the
wild (ARwild), which first reconstructs the implicit skinning fields in a
multi-level manner, by which the image features from multiple images are
aligned and integrated to estimate a pixel-aligned implicit function that
represents the clothed shape. To enable the training and testing of the new
framework, we contribute a large-scale dataset, MVP-Human (Multi-View and
multi-Pose 3D Human), which contains 400 subjects, each of which has 15 scans
in different poses and 8-view images for each pose, providing 6,000 3D scans
and 48,000 images in total. Overall, benefits from the specific network
architecture and the diverse data, the trained model enables 3D avatar
reconstruction from unconstrained frames and achieves state-of-the-art
performance.
| [
{
"version": "v1",
"created": "Sun, 24 Apr 2022 03:57:59 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 10:58:37 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Zhu",
"Xiangyu",
""
],
[
"Liao",
"Tingting",
""
],
[
"Lyu",
"Jiangjing",
""
],
[
"Yan",
"Xiang",
""
],
[
"Wang",
"Yunfeng",
""
],
[
"Guo",
"Kan",
""
],
[
"Cao",
"Qiong",
""
],
[
"Li",
"Stan Z.",
""
],
[
"Lei",
"Zhen",
""
]
] | TITLE: MVP-Human Dataset for 3D Human Avatar Reconstruction from Unconstrained
Frames
ABSTRACT: In this paper, we consider a novel problem of reconstructing a 3D human
avatar from multiple unconstrained frames, independent of assumptions on camera
calibration, capture space, and constrained actions. The problem should be
addressed by a framework that takes multiple unconstrained images as inputs,
and generates a shape-with-skinning avatar in the canonical space, finished in
one feed-forward pass. To this end, we present 3D Avatar Reconstruction in the
wild (ARwild), which first reconstructs the implicit skinning fields in a
multi-level manner, by which the image features from multiple images are
aligned and integrated to estimate a pixel-aligned implicit function that
represents the clothed shape. To enable the training and testing of the new
framework, we contribute a large-scale dataset, MVP-Human (Multi-View and
multi-Pose 3D Human), which contains 400 subjects, each of which has 15 scans
in different poses and 8-view images for each pose, providing 6,000 3D scans
and 48,000 images in total. Overall, benefits from the specific network
architecture and the diverse data, the trained model enables 3D avatar
reconstruction from unconstrained frames and achieves state-of-the-art
performance.
| new_dataset | 0.713063 |
2205.03716 | Mehdi Maboudi | Mehdi Maboudi, MohammadReza Homaei, Soohwan Song, Shirin Malihi,
Mohammad Saadatseresht, and Markus Gerke | A Review on Viewpoints and Path-planning for UAV-based 3D Reconstruction | 33 page- 177 references | IEEE Journal of Selected Topics in Applied Earth Observations and
Remote Sensing-2023 | 10.1109/JSTARS.2023.3276427 | null | cs.CV cs.GR cs.RO | http://creativecommons.org/licenses/by/4.0/ | Unmanned aerial vehicles (UAVs) are widely used platforms to carry data
capturing sensors for various applications. The reason for this success can be
found in many aspects: the high maneuverability of the UAVs, the capability of
performing autonomous data acquisition, flying at different heights, and the
possibility to reach almost any vantage point. The selection of appropriate
viewpoints and planning the optimum trajectories of UAVs is an emerging topic
that aims at increasing the automation, efficiency and reliability of the data
capturing process to achieve a dataset with desired quality. On the other hand,
3D reconstruction using the data captured by UAVs is also attracting attention
in research and industry. This review paper investigates a wide range of
model-free and model-based algorithms for viewpoint and path planning for 3D
reconstruction of large-scale objects. The analyzed approaches are limited to
those that employ a single-UAV as a data capturing platform for outdoor 3D
reconstruction purposes. In addition to discussing the evaluation strategies,
this paper also highlights the innovations and limitations of the investigated
approaches. It concludes with a critical analysis of the existing challenges
and future research perspectives.
| [
{
"version": "v1",
"created": "Sat, 7 May 2022 20:29:39 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Maboudi",
"Mehdi",
""
],
[
"Homaei",
"MohammadReza",
""
],
[
"Song",
"Soohwan",
""
],
[
"Malihi",
"Shirin",
""
],
[
"Saadatseresht",
"Mohammad",
""
],
[
"Gerke",
"Markus",
""
]
] | TITLE: A Review on Viewpoints and Path-planning for UAV-based 3D Reconstruction
ABSTRACT: Unmanned aerial vehicles (UAVs) are widely used platforms to carry data
capturing sensors for various applications. The reason for this success can be
found in many aspects: the high maneuverability of the UAVs, the capability of
performing autonomous data acquisition, flying at different heights, and the
possibility to reach almost any vantage point. The selection of appropriate
viewpoints and planning the optimum trajectories of UAVs is an emerging topic
that aims at increasing the automation, efficiency and reliability of the data
capturing process to achieve a dataset with desired quality. On the other hand,
3D reconstruction using the data captured by UAVs is also attracting attention
in research and industry. This review paper investigates a wide range of
model-free and model-based algorithms for viewpoint and path planning for 3D
reconstruction of large-scale objects. The analyzed approaches are limited to
those that employ a single-UAV as a data capturing platform for outdoor 3D
reconstruction purposes. In addition to discussing the evaluation strategies,
this paper also highlights the innovations and limitations of the investigated
approaches. It concludes with a critical analysis of the existing challenges
and future research perspectives.
| no_new_dataset | 0.71027 |
2206.08722 | J\"ames M\'en\'etrey | J\"ames M\'en\'etrey, Marcelo Pasin, Pascal Felber, Valerio Schiavoni | WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation
for TrustZone | This publication incorporates results from the VEDLIoT project, which
received funding from the European Union's Horizon 2020 research and
innovation programme under grant agreement No 957197 | ICDCS'22: Proceedings of the 42nd IEEE International Conference on
Distributed Computing Systems, July 2022 | 10.1109/ICDCS54860.2022.00116 | null | cs.CR cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained
popularity for its efficiency, versatility and security, with near-native
performance. Besides, trusted execution environments (TEEs) shield critical
software assets against compromised infrastructures. However, TEEs do not
guarantee the code to be trustworthy or that it was not tampered with. Instead,
one relies on remote attestation to assess the code before execution. This
paper describes WaTZ, which is (i) an efficient and secure runtime for trusted
execution of Wasm code for Arm's TrustZone TEE, and (ii) a lightweight remote
attestation system optimised for Wasm applications running in TrustZone, as it
lacks built-in mechanisms for attestation. The remote attestation protocol is
formally verified using a state-of-the-art analyser and model checker. Our
extensive evaluation of Arm-based hardware uses synthetic and real-world
benchmarks, illustrating typical tasks IoT devices achieve. WaTZ's execution
speed is on par with Wasm runtimes in the normal world and reaches roughly half
the speed of native execution, which is compensated by the additional security
guarantees and the interoperability offered by Wasm. WaTZ is open-source and
available on GitHub along with instructions to reproduce our experiments.
| [
{
"version": "v1",
"created": "Fri, 17 Jun 2022 12:19:48 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 15:04:34 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Ménétrey",
"Jämes",
""
],
[
"Pasin",
"Marcelo",
""
],
[
"Felber",
"Pascal",
""
],
[
"Schiavoni",
"Valerio",
""
]
] | TITLE: WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation
for TrustZone
ABSTRACT: WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained
popularity for its efficiency, versatility and security, with near-native
performance. Besides, trusted execution environments (TEEs) shield critical
software assets against compromised infrastructures. However, TEEs do not
guarantee the code to be trustworthy or that it was not tampered with. Instead,
one relies on remote attestation to assess the code before execution. This
paper describes WaTZ, which is (i) an efficient and secure runtime for trusted
execution of Wasm code for Arm's TrustZone TEE, and (ii) a lightweight remote
attestation system optimised for Wasm applications running in TrustZone, as it
lacks built-in mechanisms for attestation. The remote attestation protocol is
formally verified using a state-of-the-art analyser and model checker. Our
extensive evaluation of Arm-based hardware uses synthetic and real-world
benchmarks, illustrating typical tasks IoT devices achieve. WaTZ's execution
speed is on par with Wasm runtimes in the normal world and reaches roughly half
the speed of native execution, which is compensated by the additional security
guarantees and the interoperability offered by Wasm. WaTZ is open-source and
available on GitHub along with instructions to reproduce our experiments.
| no_new_dataset | 0.707196 |
2207.09081 | Wenhao Ding | Wenhao Ding, Haohong Lin, Bo Li, Ding Zhao | Generalizing Goal-Conditioned Reinforcement Learning with Variational
Causal Reasoning | Accepted to NeurIPS 2022 | null | null | null | cs.LG cs.AI cs.RO stat.ME | http://creativecommons.org/licenses/by/4.0/ | As a pivotal component to attaining generalizable solutions in human
intelligence, reasoning provides great potential for reinforcement learning
(RL) agents' generalization towards varied goals by summarizing part-to-whole
arguments and discovering cause-and-effect relations. However, how to discover
and represent causalities remains a huge gap that hinders the development of
causal RL. In this paper, we augment Goal-Conditioned RL (GCRL) with Causal
Graph (CG), a structure built upon the relation between objects and events. We
novelly formulate the GCRL problem into variational likelihood maximization
with CG as latent variables. To optimize the derived objective, we propose a
framework with theoretical performance guarantees that alternates between two
steps: using interventional data to estimate the posterior of CG; using CG to
learn generalizable models and interpretable policies. Due to the lack of
public benchmarks that verify generalization capability under reasoning, we
design nine tasks and then empirically show the effectiveness of the proposed
method against five baselines on these tasks. Further theoretical analysis
shows that our performance improvement is attributed to the virtuous cycle of
causal discovery, transition modeling, and policy training, which aligns with
the experimental evidence in extensive ablation studies.
| [
{
"version": "v1",
"created": "Tue, 19 Jul 2022 05:31:16 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Oct 2022 17:17:51 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Oct 2022 19:45:42 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Oct 2022 23:48:59 GMT"
},
{
"version": "v5",
"created": "Wed, 28 Dec 2022 18:21:44 GMT"
},
{
"version": "v6",
"created": "Wed, 17 May 2023 16:29:43 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Ding",
"Wenhao",
""
],
[
"Lin",
"Haohong",
""
],
[
"Li",
"Bo",
""
],
[
"Zhao",
"Ding",
""
]
] | TITLE: Generalizing Goal-Conditioned Reinforcement Learning with Variational
Causal Reasoning
ABSTRACT: As a pivotal component to attaining generalizable solutions in human
intelligence, reasoning provides great potential for reinforcement learning
(RL) agents' generalization towards varied goals by summarizing part-to-whole
arguments and discovering cause-and-effect relations. However, how to discover
and represent causalities remains a huge gap that hinders the development of
causal RL. In this paper, we augment Goal-Conditioned RL (GCRL) with Causal
Graph (CG), a structure built upon the relation between objects and events. We
novelly formulate the GCRL problem into variational likelihood maximization
with CG as latent variables. To optimize the derived objective, we propose a
framework with theoretical performance guarantees that alternates between two
steps: using interventional data to estimate the posterior of CG; using CG to
learn generalizable models and interpretable policies. Due to the lack of
public benchmarks that verify generalization capability under reasoning, we
design nine tasks and then empirically show the effectiveness of the proposed
method against five baselines on these tasks. Further theoretical analysis
shows that our performance improvement is attributed to the virtuous cycle of
causal discovery, transition modeling, and policy training, which aligns with
the experimental evidence in extensive ablation studies.
| no_new_dataset | 0.707777 |
2208.11991 | Weishu Liu | Weishu Liu, Xuping Huangfu, Haifeng Wang | Citation advantage of COVID-19 related publications | Journal of Information Science (2023) | Journal of Information Science, 2023, 1-7 | 10.1177/01655515231174385 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the global spread of the COVID-19 pandemic, scientists from various
disciplines responded quickly to this historical public health emergency. The
sudden boom of COVID-19 related papers in a short period of time may bring
unexpected influence to some commonly used bibliometric indicators. By a
large-scale investigation using Science Citation Index Expanded and Social
Sciences Citation Index, this brief communication confirms the citation
advantage of COVID-19 related papers empirically through the lens of Essential
Science Indicators' highly cited paper. More than 8% of COVID-19 related papers
published during 2020 and 2021 were selected as Essential Science Indicators
highly cited papers, which was much higher than the set global benchmark value
of 1%. The citation advantage of COVID-19 related papers for different Web of
Science categories/countries/journal impact factor quartiles were also
demonstrated. The distortions of COVID-19 related papers' citation advantage to
some bibliometric indicators such as journal impact factor were discussed at
the end of this brief communication.
| [
{
"version": "v1",
"created": "Thu, 25 Aug 2022 10:44:03 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2023 04:47:59 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Liu",
"Weishu",
""
],
[
"Huangfu",
"Xuping",
""
],
[
"Wang",
"Haifeng",
""
]
] | TITLE: Citation advantage of COVID-19 related publications
ABSTRACT: With the global spread of the COVID-19 pandemic, scientists from various
disciplines responded quickly to this historical public health emergency. The
sudden boom of COVID-19 related papers in a short period of time may bring
unexpected influence to some commonly used bibliometric indicators. By a
large-scale investigation using Science Citation Index Expanded and Social
Sciences Citation Index, this brief communication confirms the citation
advantage of COVID-19 related papers empirically through the lens of Essential
Science Indicators' highly cited paper. More than 8% of COVID-19 related papers
published during 2020 and 2021 were selected as Essential Science Indicators
highly cited papers, which was much higher than the set global benchmark value
of 1%. The citation advantage of COVID-19 related papers for different Web of
Science categories/countries/journal impact factor quartiles were also
demonstrated. The distortions of COVID-19 related papers' citation advantage to
some bibliometric indicators such as journal impact factor were discussed at
the end of this brief communication.
| no_new_dataset | 0.711481 |
2209.12427 | Shumon Koga | Pengzhi Yang and Yuhan Liu and Shumon Koga and Arash Asgharivaskasi
and Nikolay Atanasov | Learning Continuous Control Policies for Information-Theoretic Active
Perception | 7 pages, 6 figures, submitted to International Conference on Robotics
and Automation (ICRA) 2023 | null | null | null | cs.RO cs.LG | http://creativecommons.org/licenses/by/4.0/ | This paper proposes a method for learning continuous control policies for
active landmark localization and exploration using an information-theoretic
cost. We consider a mobile robot detecting landmarks within a limited sensing
range, and tackle the problem of learning a control policy that maximizes the
mutual information between the landmark states and the sensor observations. We
employ a Kalman filter to convert the partially observable problem in the
landmark state to Markov decision process (MDP), a differentiable field of view
to shape the reward, and an attention-based neural network to represent the
control policy. The approach is further unified with active volumetric mapping
to promote exploration in addition to landmark localization. The performance is
demonstrated in several simulated landmark localization tasks in comparison
with benchmark methods.
| [
{
"version": "v1",
"created": "Mon, 26 Sep 2022 05:28:32 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 19:11:13 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Yang",
"Pengzhi",
""
],
[
"Liu",
"Yuhan",
""
],
[
"Koga",
"Shumon",
""
],
[
"Asgharivaskasi",
"Arash",
""
],
[
"Atanasov",
"Nikolay",
""
]
] | TITLE: Learning Continuous Control Policies for Information-Theoretic Active
Perception
ABSTRACT: This paper proposes a method for learning continuous control policies for
active landmark localization and exploration using an information-theoretic
cost. We consider a mobile robot detecting landmarks within a limited sensing
range, and tackle the problem of learning a control policy that maximizes the
mutual information between the landmark states and the sensor observations. We
employ a Kalman filter to convert the partially observable problem in the
landmark state to Markov decision process (MDP), a differentiable field of view
to shape the reward, and an attention-based neural network to represent the
control policy. The approach is further unified with active volumetric mapping
to promote exploration in addition to landmark localization. The performance is
demonstrated in several simulated landmark localization tasks in comparison
with benchmark methods.
| no_new_dataset | 0.710057 |
2209.13264 | Marion Savanier | Marion Savanier, Emilie Chouzenoux, Jean-Christophe Pesquet, and Cyril
Riddell | Deep Unfolding of the DBFB Algorithm with Application to ROI CT Imaging
with Limited Angular Density | null | null | null | null | eess.IV cs.CV cs.LG math.OC | http://creativecommons.org/licenses/by/4.0/ | This paper presents a new method for reconstructing regions of interest (ROI)
from a limited number of computed tomography (CT) measurements. Classical
model-based iterative reconstruction methods lead to images with predictable
features. Still, they often suffer from tedious parameterization and slow
convergence. On the contrary, deep learning methods are fast, and they can
reach high reconstruction quality by leveraging information from large
datasets, but they lack interpretability. At the crossroads of both methods,
deep unfolding networks have been recently proposed. Their design includes the
physics of the imaging system and the steps of an iterative optimization
algorithm. Motivated by the success of these networks for various applications,
we introduce an unfolding neural network called U-RDBFB designed for ROI CT
reconstruction from limited data. Few-view truncated data are effectively
handled thanks to a robust non-convex data fidelity term combined with a
sparsity-inducing regularization function. We unfold the Dual Block coordinate
Forward-Backward (DBFB) algorithm, embedded in an iterative reweighted scheme,
allowing the learning of key parameters in a supervised manner. Our experiments
show an improvement over several state-of-the-art methods, including a
model-based iterative scheme, a multi-scale deep learning architecture, and
other deep unfolding methods.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2022 09:10:57 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Feb 2023 15:57:08 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 15:27:50 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Savanier",
"Marion",
""
],
[
"Chouzenoux",
"Emilie",
""
],
[
"Pesquet",
"Jean-Christophe",
""
],
[
"Riddell",
"Cyril",
""
]
] | TITLE: Deep Unfolding of the DBFB Algorithm with Application to ROI CT Imaging
with Limited Angular Density
ABSTRACT: This paper presents a new method for reconstructing regions of interest (ROI)
from a limited number of computed tomography (CT) measurements. Classical
model-based iterative reconstruction methods lead to images with predictable
features. Still, they often suffer from tedious parameterization and slow
convergence. On the contrary, deep learning methods are fast, and they can
reach high reconstruction quality by leveraging information from large
datasets, but they lack interpretability. At the crossroads of both methods,
deep unfolding networks have been recently proposed. Their design includes the
physics of the imaging system and the steps of an iterative optimization
algorithm. Motivated by the success of these networks for various applications,
we introduce an unfolding neural network called U-RDBFB designed for ROI CT
reconstruction from limited data. Few-view truncated data are effectively
handled thanks to a robust non-convex data fidelity term combined with a
sparsity-inducing regularization function. We unfold the Dual Block coordinate
Forward-Backward (DBFB) algorithm, embedded in an iterative reweighted scheme,
allowing the learning of key parameters in a supervised manner. Our experiments
show an improvement over several state-of-the-art methods, including a
model-based iterative scheme, a multi-scale deep learning architecture, and
other deep unfolding methods.
| no_new_dataset | 0.709252 |
2209.13858 | Sichao Li | Sichao Li, Amanda Barnard | Variance Tolerance Factors For Interpreting ALL Neural Networks | null | null | null | null | cs.LG cs.IR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Black box models only provide results for deep learning tasks, and lack
informative details about how these results were obtained. Knowing how input
variables are related to outputs, in addition to why they are related, can be
critical to translating predictions into laboratory experiments, or defending a
model prediction under scrutiny. In this paper, we propose a general theory
that defines a variance tolerance factor (VTF) inspired by influence function,
to interpret features in the context of black box neural networks by ranking
the importance of features, and construct a novel architecture consisting of a
base model and feature model to explore the feature importance in a Rashomon
set that contains all well-performing neural networks. Two feature importance
ranking methods in the Rashomon set and a feature selection method based on the
VTF are created and explored. A thorough evaluation on synthetic and benchmark
datasets is provided, and the method is applied to two real world examples
predicting the formation of noncrystalline gold nanoparticles and the chemical
toxicity 1793 aromatic compounds exposed to a protozoan ciliate for 40 hours.
| [
{
"version": "v1",
"created": "Wed, 28 Sep 2022 06:30:37 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 11:40:12 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Li",
"Sichao",
""
],
[
"Barnard",
"Amanda",
""
]
] | TITLE: Variance Tolerance Factors For Interpreting ALL Neural Networks
ABSTRACT: Black box models only provide results for deep learning tasks, and lack
informative details about how these results were obtained. Knowing how input
variables are related to outputs, in addition to why they are related, can be
critical to translating predictions into laboratory experiments, or defending a
model prediction under scrutiny. In this paper, we propose a general theory
that defines a variance tolerance factor (VTF) inspired by influence function,
to interpret features in the context of black box neural networks by ranking
the importance of features, and construct a novel architecture consisting of a
base model and feature model to explore the feature importance in a Rashomon
set that contains all well-performing neural networks. Two feature importance
ranking methods in the Rashomon set and a feature selection method based on the
VTF are created and explored. A thorough evaluation on synthetic and benchmark
datasets is provided, and the method is applied to two real world examples
predicting the formation of noncrystalline gold nanoparticles and the chemical
toxicity 1793 aromatic compounds exposed to a protozoan ciliate for 40 hours.
| no_new_dataset | 0.709208 |
2210.07898 | Giuseppe Orlando | Giuseppe Orlando, Tommaso Benacchio, Luca Bonaventura | An IMEX-DG solver for atmospheric dynamics simulations with adaptive
mesh refinement | null | Journal of Computational and Applied Mathematics 427 (2023):
115124 | 10.1016/j.cam.2023.115124 | null | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We present an accurate and efficient solver for atmospheric dynamics
simulations that allows for non-conforming mesh refinement. The model equations
are the conservative Euler equations for compressible flows. The numerical
method is based on an $h-$adaptive Discontinuous Galerkin spatial
discretization and on a second order Additive Runge Kutta IMEX method for time
discretization, especially designed for low Mach regimes. The solver is
implemented in the framework of the $deal.II$ library, whose mesh refinement
capabilities are employed to enhance efficiency. A number of numerical
experiments based on classical benchmarks for atmosphere dynamics demonstrate
the properties and advantages of the proposed method.
| [
{
"version": "v1",
"created": "Fri, 14 Oct 2022 15:32:04 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 06:57:08 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Orlando",
"Giuseppe",
""
],
[
"Benacchio",
"Tommaso",
""
],
[
"Bonaventura",
"Luca",
""
]
] | TITLE: An IMEX-DG solver for atmospheric dynamics simulations with adaptive
mesh refinement
ABSTRACT: We present an accurate and efficient solver for atmospheric dynamics
simulations that allows for non-conforming mesh refinement. The model equations
are the conservative Euler equations for compressible flows. The numerical
method is based on an $h-$adaptive Discontinuous Galerkin spatial
discretization and on a second order Additive Runge Kutta IMEX method for time
discretization, especially designed for low Mach regimes. The solver is
implemented in the framework of the $deal.II$ library, whose mesh refinement
capabilities are employed to enhance efficiency. A number of numerical
experiments based on classical benchmarks for atmosphere dynamics demonstrate
the properties and advantages of the proposed method.
| no_new_dataset | 0.707645 |
2211.02744 | Jason Youn | Jason Youn and Ilias Tagkopoulos | KGLM: Integrating Knowledge Graph Structure in Language Models for Link
Prediction | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | The ability of knowledge graphs to represent complex relationships at scale
has led to their adoption for various needs including knowledge representation,
question-answering, and recommendation systems. Knowledge graphs are often
incomplete in the information they represent, necessitating the need for
knowledge graph completion tasks. Pre-trained and fine-tuned language models
have shown promise in these tasks although these models ignore the intrinsic
information encoded in the knowledge graph, namely the entity and relation
types. In this work, we propose the Knowledge Graph Language Model (KGLM)
architecture, where we introduce a new entity/relation embedding layer that
learns to differentiate distinctive entity and relation types, therefore
allowing the model to learn the structure of the knowledge graph. In this work,
we show that further pre-training the language models with this additional
embedding layer using the triples extracted from the knowledge graph, followed
by the standard fine-tuning phase sets a new state-of-the-art performance for
the link prediction task on the benchmark datasets.
| [
{
"version": "v1",
"created": "Fri, 4 Nov 2022 20:38:12 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 16:34:49 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Youn",
"Jason",
""
],
[
"Tagkopoulos",
"Ilias",
""
]
] | TITLE: KGLM: Integrating Knowledge Graph Structure in Language Models for Link
Prediction
ABSTRACT: The ability of knowledge graphs to represent complex relationships at scale
has led to their adoption for various needs including knowledge representation,
question-answering, and recommendation systems. Knowledge graphs are often
incomplete in the information they represent, necessitating the need for
knowledge graph completion tasks. Pre-trained and fine-tuned language models
have shown promise in these tasks although these models ignore the intrinsic
information encoded in the knowledge graph, namely the entity and relation
types. In this work, we propose the Knowledge Graph Language Model (KGLM)
architecture, where we introduce a new entity/relation embedding layer that
learns to differentiate distinctive entity and relation types, therefore
allowing the model to learn the structure of the knowledge graph. In this work,
we show that further pre-training the language models with this additional
embedding layer using the triples extracted from the knowledge graph, followed
by the standard fine-tuning phase sets a new state-of-the-art performance for
the link prediction task on the benchmark datasets.
| no_new_dataset | 0.710616 |
2211.10219 | Bohan Li | Shaowei Cai, Bohan Li, Xindi Zhang | Local Search For Satisfiability Modulo Integer Arithmetic Theories | null | null | null | null | cs.LO | http://creativecommons.org/licenses/by/4.0/ | Satisfiability Modulo Theories (SMT) refers to the problem of deciding the
satisfiability of a formula with respect to certain background first order
theories. In this paper, we focus on Satisfiablity Modulo Integer Arithmetic,
which is referred to as SMT(IA), including both linear and non-linear integer
arithmetic theories. Dominant approaches to SMT rely on calling a CDCL-based
SAT solver, either in a lazy or eager favor. Local search, a competitive
approach to solving combinatorial problems including SAT, however, has not been
well studied for SMT. We develop the first local search algorithm for SMT(IA)
by directly operating on variables, breaking through the traditional framework.
We propose a local search framework by considering the distinctions between
Boolean and integer variables. Moreover, we design a novel operator and scoring
functions tailored for integer arithmetic, as well as a two-level operation
selection heuristic. Putting these together, we develop a local search SMT(IA)
solver called LS-IA. Experiments are carried out to evaluate LS-IA on
benchmarks from SMTLIB. The results show that LS-IA is competitive and
complementary with state-of-the-art SMT solvers, and performs particularly well
on those formulae with only integer variables. A simple sequential portfolio
with Z3 improves the state-of-the-art on satisfiable benchmark sets from
SMT-LIB.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2022 13:15:24 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Apr 2023 03:47:54 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 06:27:24 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Cai",
"Shaowei",
""
],
[
"Li",
"Bohan",
""
],
[
"Zhang",
"Xindi",
""
]
] | TITLE: Local Search For Satisfiability Modulo Integer Arithmetic Theories
ABSTRACT: Satisfiability Modulo Theories (SMT) refers to the problem of deciding the
satisfiability of a formula with respect to certain background first order
theories. In this paper, we focus on Satisfiablity Modulo Integer Arithmetic,
which is referred to as SMT(IA), including both linear and non-linear integer
arithmetic theories. Dominant approaches to SMT rely on calling a CDCL-based
SAT solver, either in a lazy or eager favor. Local search, a competitive
approach to solving combinatorial problems including SAT, however, has not been
well studied for SMT. We develop the first local search algorithm for SMT(IA)
by directly operating on variables, breaking through the traditional framework.
We propose a local search framework by considering the distinctions between
Boolean and integer variables. Moreover, we design a novel operator and scoring
functions tailored for integer arithmetic, as well as a two-level operation
selection heuristic. Putting these together, we develop a local search SMT(IA)
solver called LS-IA. Experiments are carried out to evaluate LS-IA on
benchmarks from SMTLIB. The results show that LS-IA is competitive and
complementary with state-of-the-art SMT solvers, and performs particularly well
on those formulae with only integer variables. A simple sequential portfolio
with Z3 improves the state-of-the-art on satisfiable benchmark sets from
SMT-LIB.
| no_new_dataset | 0.708408 |
2211.10527 | Ju-Hyung Lee | Ju-Hyung Lee and Omer Gokalp Serbetci and Dheeraj Panneer Selvam and
Andreas F. Molisch | PMNet: Robust Pathloss Map Prediction via Supervised Learning | null | null | null | null | cs.NI eess.SP | http://creativecommons.org/licenses/by/4.0/ | Pathloss prediction is an essential component of wireless network planning.
While ray tracing based methods have been successfully used for many years,
they require significant computational effort that may become prohibitive with
the increased network densification and/or use of higher frequencies in 5G/B5G
(beyond 5G) systems. In this paper, we propose and evaluate a data-driven and
model-free pathloss prediction method, dubbed PMNet. This method uses a
supervised learning approach: training a neural network (NN) with a limited
amount of ray tracing (or channel measurement) data and map data and then
predicting the pathloss over location with no ray tracing data with a high
level of accuracy. Our proposed pathloss map prediction-oriented NN
architecture, which is empowered by state-of-the-art computer vision
techniques, outperforms other architectures that have been previously proposed
(e.g., UNet, RadioUNet) in terms of accuracy while showing generalization
capability. Moreover, PMNet trained on a 4-fold smaller dataset surpasses the
other baselines (trained on a 4-fold larger dataset), corroborating the
potential of PMNet.
| [
{
"version": "v1",
"created": "Fri, 18 Nov 2022 22:50:01 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 22:40:56 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Lee",
"Ju-Hyung",
""
],
[
"Serbetci",
"Omer Gokalp",
""
],
[
"Selvam",
"Dheeraj Panneer",
""
],
[
"Molisch",
"Andreas F.",
""
]
] | TITLE: PMNet: Robust Pathloss Map Prediction via Supervised Learning
ABSTRACT: Pathloss prediction is an essential component of wireless network planning.
While ray tracing based methods have been successfully used for many years,
they require significant computational effort that may become prohibitive with
the increased network densification and/or use of higher frequencies in 5G/B5G
(beyond 5G) systems. In this paper, we propose and evaluate a data-driven and
model-free pathloss prediction method, dubbed PMNet. This method uses a
supervised learning approach: training a neural network (NN) with a limited
amount of ray tracing (or channel measurement) data and map data and then
predicting the pathloss over location with no ray tracing data with a high
level of accuracy. Our proposed pathloss map prediction-oriented NN
architecture, which is empowered by state-of-the-art computer vision
techniques, outperforms other architectures that have been previously proposed
(e.g., UNet, RadioUNet) in terms of accuracy while showing generalization
capability. Moreover, PMNet trained on a 4-fold smaller dataset surpasses the
other baselines (trained on a 4-fold larger dataset), corroborating the
potential of PMNet.
| no_new_dataset | 0.711619 |
2211.10790 | Ju-Hyung Lee | Omer Gokalp Serbetci and Ju-Hyung Lee and Daoud Burghal and Andreas F.
Molisch | Simple and Effective Augmentation Methods for CSI Based Indoor
Localization | null | null | null | null | eess.SP cs.LG | http://creativecommons.org/licenses/by/4.0/ | Indoor localization is a challenging task. Compared to outdoor environments
where GPS is dominant, there is no robust and almost-universal approach.
Recently, machine learning (ML) has emerged as the most promising approach for
achieving accurate indoor localization. Nevertheless, its main challenge is
requiring large datasets to train the neural networks. The data collection
procedure is costly and laborious, requiring extensive measurements and
labeling processes for different indoor environments. The situation can be
improved by Data Augmentation (DA), a general framework to enlarge the datasets
for ML, making ML systems more robust and increasing their generalization
capabilities. This paper proposes two simple yet surprisingly effective DA
algorithms for channel state information (CSI) based indoor localization
motivated by physical considerations. We show that the number of measurements
for a given accuracy requirement may be decreased by an order of magnitude.
Specifically, we demonstrate the algorithm's effectiveness by experiments
conducted with a measured indoor WiFi measurement dataset. As little as 10% of
the original dataset size is enough to get the same performance as the original
dataset. We also showed that if we further augment the dataset with the
proposed techniques, test accuracy is improved more than three-fold.
| [
{
"version": "v1",
"created": "Sat, 19 Nov 2022 20:27:46 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 22:48:02 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Serbetci",
"Omer Gokalp",
""
],
[
"Lee",
"Ju-Hyung",
""
],
[
"Burghal",
"Daoud",
""
],
[
"Molisch",
"Andreas F.",
""
]
] | TITLE: Simple and Effective Augmentation Methods for CSI Based Indoor
Localization
ABSTRACT: Indoor localization is a challenging task. Compared to outdoor environments
where GPS is dominant, there is no robust and almost-universal approach.
Recently, machine learning (ML) has emerged as the most promising approach for
achieving accurate indoor localization. Nevertheless, its main challenge is
requiring large datasets to train the neural networks. The data collection
procedure is costly and laborious, requiring extensive measurements and
labeling processes for different indoor environments. The situation can be
improved by Data Augmentation (DA), a general framework to enlarge the datasets
for ML, making ML systems more robust and increasing their generalization
capabilities. This paper proposes two simple yet surprisingly effective DA
algorithms for channel state information (CSI) based indoor localization
motivated by physical considerations. We show that the number of measurements
for a given accuracy requirement may be decreased by an order of magnitude.
Specifically, we demonstrate the algorithm's effectiveness by experiments
conducted with a measured indoor WiFi measurement dataset. As little as 10% of
the original dataset size is enough to get the same performance as the original
dataset. We also showed that if we further augment the dataset with the
proposed techniques, test accuracy is improved more than three-fold.
| no_new_dataset | 0.709007 |
2211.11747 | Marc'Aurelio Ranzato | Jorg Bornschein, Alexandre Galashov, Ross Hemsley, Amal Rannen-Triki,
Yutian Chen, Arslan Chaudhry, Xu Owen He, Arthur Douillard, Massimo Caccia,
Qixuang Feng, Jiajun Shen, Sylvestre-Alvise Rebuffi, Kitty Stacpoole, Diego
de las Casas, Will Hawkins, Angeliki Lazaridou, Yee Whye Teh, Andrei A. Rusu,
Razvan Pascanu and Marc'Aurelio Ranzato | NEVIS'22: A Stream of 100 Tasks Sampled from 30 Years of Computer Vision
Research | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | A shared goal of several machine learning communities like continual
learning, meta-learning and transfer learning, is to design algorithms and
models that efficiently and robustly adapt to unseen tasks. An even more
ambitious goal is to build models that never stop adapting, and that become
increasingly more efficient through time by suitably transferring the accrued
knowledge. Beyond the study of the actual learning algorithm and model
architecture, there are several hurdles towards our quest to build such models,
such as the choice of learning protocol, metric of success and data needed to
validate research hypotheses. In this work, we introduce the Never-Ending
VIsual-classification Stream (NEVIS'22), a benchmark consisting of a stream of
over 100 visual classification tasks, sorted chronologically and extracted from
papers sampled uniformly from computer vision proceedings spanning the last
three decades. The resulting stream reflects what the research community
thought was meaningful at any point in time, and it serves as an ideal test bed
to assess how well models can adapt to new tasks, and do so better and more
efficiently as time goes by. Despite being limited to classification, the
resulting stream has a rich diversity of tasks from OCR, to texture analysis,
scene recognition, and so forth. The diversity is also reflected in the wide
range of dataset sizes, spanning over four orders of magnitude. Overall,
NEVIS'22 poses an unprecedented challenge for current sequential learning
approaches due to the scale and diversity of tasks, yet with a low entry
barrier as it is limited to a single modality and well understood supervised
learning problems. Moreover, we provide a reference implementation including
strong baselines and an evaluation protocol to compare methods in terms of
their trade-off between accuracy and compute.
| [
{
"version": "v1",
"created": "Tue, 15 Nov 2022 18:57:46 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 22:15:39 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Bornschein",
"Jorg",
""
],
[
"Galashov",
"Alexandre",
""
],
[
"Hemsley",
"Ross",
""
],
[
"Rannen-Triki",
"Amal",
""
],
[
"Chen",
"Yutian",
""
],
[
"Chaudhry",
"Arslan",
""
],
[
"He",
"Xu Owen",
""
],
[
"Douillard",
"Arthur",
""
],
[
"Caccia",
"Massimo",
""
],
[
"Feng",
"Qixuang",
""
],
[
"Shen",
"Jiajun",
""
],
[
"Rebuffi",
"Sylvestre-Alvise",
""
],
[
"Stacpoole",
"Kitty",
""
],
[
"Casas",
"Diego de las",
""
],
[
"Hawkins",
"Will",
""
],
[
"Lazaridou",
"Angeliki",
""
],
[
"Teh",
"Yee Whye",
""
],
[
"Rusu",
"Andrei A.",
""
],
[
"Pascanu",
"Razvan",
""
],
[
"Ranzato",
"Marc'Aurelio",
""
]
] | TITLE: NEVIS'22: A Stream of 100 Tasks Sampled from 30 Years of Computer Vision
Research
ABSTRACT: A shared goal of several machine learning communities like continual
learning, meta-learning and transfer learning, is to design algorithms and
models that efficiently and robustly adapt to unseen tasks. An even more
ambitious goal is to build models that never stop adapting, and that become
increasingly more efficient through time by suitably transferring the accrued
knowledge. Beyond the study of the actual learning algorithm and model
architecture, there are several hurdles towards our quest to build such models,
such as the choice of learning protocol, metric of success and data needed to
validate research hypotheses. In this work, we introduce the Never-Ending
VIsual-classification Stream (NEVIS'22), a benchmark consisting of a stream of
over 100 visual classification tasks, sorted chronologically and extracted from
papers sampled uniformly from computer vision proceedings spanning the last
three decades. The resulting stream reflects what the research community
thought was meaningful at any point in time, and it serves as an ideal test bed
to assess how well models can adapt to new tasks, and do so better and more
efficiently as time goes by. Despite being limited to classification, the
resulting stream has a rich diversity of tasks from OCR, to texture analysis,
scene recognition, and so forth. The diversity is also reflected in the wide
range of dataset sizes, spanning over four orders of magnitude. Overall,
NEVIS'22 poses an unprecedented challenge for current sequential learning
approaches due to the scale and diversity of tasks, yet with a low entry
barrier as it is limited to a single modality and well understood supervised
learning problems. Moreover, we provide a reference implementation including
strong baselines and an evaluation protocol to compare methods in terms of
their trade-off between accuracy and compute.
| no_new_dataset | 0.700908 |
2211.12145 | Florian Fervers | Florian Fervers, Sebastian Bullinger, Christoph Bodensteiner, Michael
Arens, Rainer Stiefelhagen | Uncertainty-aware Vision-based Metric Cross-view Geolocalization | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel method for vision-based metric cross-view
geolocalization (CVGL) that matches the camera images captured from a
ground-based vehicle with an aerial image to determine the vehicle's geo-pose.
Since aerial images are globally available at low cost, they represent a
potential compromise between two established paradigms of autonomous driving,
i.e. using expensive high-definition prior maps or relying entirely on the
sensor data captured at runtime.
We present an end-to-end differentiable model that uses the ground and aerial
images to predict a probability distribution over possible vehicle poses. We
combine multiple vehicle datasets with aerial images from orthophoto providers
on which we demonstrate the feasibility of our method. Since the ground truth
poses are often inaccurate w.r.t. the aerial images, we implement a
pseudo-label approach to produce more accurate ground truth poses and make them
publicly available.
While previous works require training data from the target region to achieve
reasonable localization accuracy (i.e. same-area evaluation), our approach
overcomes this limitation and outperforms previous results even in the strictly
more challenging cross-area case. We improve the previous state-of-the-art by a
large margin even without ground or aerial data from the test region, which
highlights the model's potential for global-scale application. We further
integrate the uncertainty-aware predictions in a tracking framework to
determine the vehicle's trajectory over time resulting in a mean position error
on KITTI-360 of 0.78m.
| [
{
"version": "v1",
"created": "Tue, 22 Nov 2022 10:23:20 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 08:51:48 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Fervers",
"Florian",
""
],
[
"Bullinger",
"Sebastian",
""
],
[
"Bodensteiner",
"Christoph",
""
],
[
"Arens",
"Michael",
""
],
[
"Stiefelhagen",
"Rainer",
""
]
] | TITLE: Uncertainty-aware Vision-based Metric Cross-view Geolocalization
ABSTRACT: This paper proposes a novel method for vision-based metric cross-view
geolocalization (CVGL) that matches the camera images captured from a
ground-based vehicle with an aerial image to determine the vehicle's geo-pose.
Since aerial images are globally available at low cost, they represent a
potential compromise between two established paradigms of autonomous driving,
i.e. using expensive high-definition prior maps or relying entirely on the
sensor data captured at runtime.
We present an end-to-end differentiable model that uses the ground and aerial
images to predict a probability distribution over possible vehicle poses. We
combine multiple vehicle datasets with aerial images from orthophoto providers
on which we demonstrate the feasibility of our method. Since the ground truth
poses are often inaccurate w.r.t. the aerial images, we implement a
pseudo-label approach to produce more accurate ground truth poses and make them
publicly available.
While previous works require training data from the target region to achieve
reasonable localization accuracy (i.e. same-area evaluation), our approach
overcomes this limitation and outperforms previous results even in the strictly
more challenging cross-area case. We improve the previous state-of-the-art by a
large margin even without ground or aerial data from the test region, which
highlights the model's potential for global-scale application. We further
integrate the uncertainty-aware predictions in a tracking framework to
determine the vehicle's trajectory over time resulting in a mean position error
on KITTI-360 of 0.78m.
| no_new_dataset | 0.712013 |
2212.02493 | Shaurya Dewan | Rohith Agaram, Shaurya Dewan, Rahul Sajnani, Adrien Poulenard, Madhava
Krishna, Srinath Sridhar | Canonical Fields: Self-Supervised Learning of Pose-Canonicalized Neural
Fields | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Coordinate-based implicit neural networks, or neural fields, have emerged as
useful representations of shape and appearance in 3D computer vision. Despite
advances, however, it remains challenging to build neural fields for categories
of objects without datasets like ShapeNet that provide "canonicalized" object
instances that are consistently aligned for their 3D position and orientation
(pose). We present Canonical Field Network (CaFi-Net), a self-supervised method
to canonicalize the 3D pose of instances from an object category represented as
neural fields, specifically neural radiance fields (NeRFs). CaFi-Net directly
learns from continuous and noisy radiance fields using a Siamese network
architecture that is designed to extract equivariant field features for
category-level canonicalization. During inference, our method takes pre-trained
neural radiance fields of novel object instances at arbitrary 3D pose and
estimates a canonical field with consistent 3D pose across the entire category.
Extensive experiments on a new dataset of 1300 NeRF models across 13 object
categories show that our method matches or exceeds the performance of 3D point
cloud-based methods.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2022 18:56:36 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2023 20:03:58 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 11:02:22 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Agaram",
"Rohith",
""
],
[
"Dewan",
"Shaurya",
""
],
[
"Sajnani",
"Rahul",
""
],
[
"Poulenard",
"Adrien",
""
],
[
"Krishna",
"Madhava",
""
],
[
"Sridhar",
"Srinath",
""
]
] | TITLE: Canonical Fields: Self-Supervised Learning of Pose-Canonicalized Neural
Fields
ABSTRACT: Coordinate-based implicit neural networks, or neural fields, have emerged as
useful representations of shape and appearance in 3D computer vision. Despite
advances, however, it remains challenging to build neural fields for categories
of objects without datasets like ShapeNet that provide "canonicalized" object
instances that are consistently aligned for their 3D position and orientation
(pose). We present Canonical Field Network (CaFi-Net), a self-supervised method
to canonicalize the 3D pose of instances from an object category represented as
neural fields, specifically neural radiance fields (NeRFs). CaFi-Net directly
learns from continuous and noisy radiance fields using a Siamese network
architecture that is designed to extract equivariant field features for
category-level canonicalization. During inference, our method takes pre-trained
neural radiance fields of novel object instances at arbitrary 3D pose and
estimates a canonical field with consistent 3D pose across the entire category.
Extensive experiments on a new dataset of 1300 NeRF models across 13 object
categories show that our method matches or exceeds the performance of 3D point
cloud-based methods.
| new_dataset | 0.715598 |
2301.07361 | Qi Sun | Qi Sun, Xuejun Xu, and Haotian Yi | Dirichlet-Neumann learning algorithm for solving elliptic interface
problems | null | null | null | null | math.NA cs.LG cs.NA | http://creativecommons.org/licenses/by/4.0/ | Non-overlapping domain decomposition methods are natural for solving
interface problems arising from various disciplines, however, the numerical
simulation requires technical analysis and is often available only with the use
of high-quality grids, thereby impeding their use in more complicated
situations. To remove the burden of mesh generation and to effectively tackle
with the interface jump conditions, a novel mesh-free scheme, i.e.,
Dirichlet-Neumann learning algorithm, is proposed in this work to solve the
benchmark elliptic interface problem with high-contrast coefficients as well as
irregular interfaces. By resorting to the variational principle, we carry out a
rigorous error analysis to evaluate the discrepancy caused by the boundary
penalty treatment for each decomposed subproblem, which paves the way for
realizing the Dirichlet-Neumann algorithm using neural network extension
operators. The effectiveness and robustness of our proposed methods are
demonstrated experimentally through a series of elliptic interface problems,
achieving better performance over other alternatives especially in the presence
of erroneous flux prediction at interface.
| [
{
"version": "v1",
"created": "Wed, 18 Jan 2023 08:10:49 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 10:33:49 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Sun",
"Qi",
""
],
[
"Xu",
"Xuejun",
""
],
[
"Yi",
"Haotian",
""
]
] | TITLE: Dirichlet-Neumann learning algorithm for solving elliptic interface
problems
ABSTRACT: Non-overlapping domain decomposition methods are natural for solving
interface problems arising from various disciplines, however, the numerical
simulation requires technical analysis and is often available only with the use
of high-quality grids, thereby impeding their use in more complicated
situations. To remove the burden of mesh generation and to effectively tackle
with the interface jump conditions, a novel mesh-free scheme, i.e.,
Dirichlet-Neumann learning algorithm, is proposed in this work to solve the
benchmark elliptic interface problem with high-contrast coefficients as well as
irregular interfaces. By resorting to the variational principle, we carry out a
rigorous error analysis to evaluate the discrepancy caused by the boundary
penalty treatment for each decomposed subproblem, which paves the way for
realizing the Dirichlet-Neumann algorithm using neural network extension
operators. The effectiveness and robustness of our proposed methods are
demonstrated experimentally through a series of elliptic interface problems,
achieving better performance over other alternatives especially in the presence
of erroneous flux prediction at interface.
| no_new_dataset | 0.710998 |
2301.13616 | Alexander Nikulin | Alexander Nikulin, Vladislav Kurenkov, Denis Tarasov, Sergey
Kolesnikov | Anti-Exploration by Random Network Distillation | ICML 2023, Poster, Source code: https://github.com/tinkoff-ai/sac-rnd | null | null | null | cs.LG cs.AI cs.NE | http://creativecommons.org/licenses/by/4.0/ | Despite the success of Random Network Distillation (RND) in various domains,
it was shown as not discriminative enough to be used as an uncertainty
estimator for penalizing out-of-distribution actions in offline reinforcement
learning. In this paper, we revisit these results and show that, with a naive
choice of conditioning for the RND prior, it becomes infeasible for the actor
to effectively minimize the anti-exploration bonus and discriminativity is not
an issue. We show that this limitation can be avoided with conditioning based
on Feature-wise Linear Modulation (FiLM), resulting in a simple and efficient
ensemble-free algorithm based on Soft Actor-Critic. We evaluate it on the D4RL
benchmark, showing that it is capable of achieving performance comparable to
ensemble-based methods and outperforming ensemble-free approaches by a wide
margin.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2023 13:18:33 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 12:23:26 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Nikulin",
"Alexander",
""
],
[
"Kurenkov",
"Vladislav",
""
],
[
"Tarasov",
"Denis",
""
],
[
"Kolesnikov",
"Sergey",
""
]
] | TITLE: Anti-Exploration by Random Network Distillation
ABSTRACT: Despite the success of Random Network Distillation (RND) in various domains,
it was shown as not discriminative enough to be used as an uncertainty
estimator for penalizing out-of-distribution actions in offline reinforcement
learning. In this paper, we revisit these results and show that, with a naive
choice of conditioning for the RND prior, it becomes infeasible for the actor
to effectively minimize the anti-exploration bonus and discriminativity is not
an issue. We show that this limitation can be avoided with conditioning based
on Feature-wise Linear Modulation (FiLM), resulting in a simple and efficient
ensemble-free algorithm based on Soft Actor-Critic. We evaluate it on the D4RL
benchmark, showing that it is capable of achieving performance comparable to
ensemble-based methods and outperforming ensemble-free approaches by a wide
margin.
| no_new_dataset | 0.710189 |
2302.02245 | Yujin Han | Yujin Han, Leying Guan | GAN-based Vertical Federated Learning for Label Protection in Binary
Classification | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Split learning (splitNN) has emerged as a popular strategy for addressing the
high computational costs and low modeling efficiency in Vertical Federated
Learning (VFL). However, despite its popularity, vanilla splitNN lacks
encryption protection, leaving it vulnerable to privacy leakage issues,
especially Label Leakage from Gradients (LLG). Motivated by the LLG issue
resulting from the use of labels during training, we propose the Generative
Adversarial Federated Model (GAFM), a novel method designed specifically to
enhance label privacy protection by integrating splitNN with Generative
Adversarial Networks (GANs). GAFM leverages GANs to indirectly utilize label
information by learning the label distribution rather than relying on explicit
labels, thereby mitigating LLG. GAFM also employs an additional cross-entropy
loss based on the noisy labels to further improve the prediction accuracy. Our
ablation experiment demonstrates that the combination of GAN and the
cross-entropy loss component is necessary to enable GAFM to mitigate LLG
without significantly compromising the model utility. Empirical results on
various datasets show that GAFM achieves a better and more robust trade-off
between model utility and privacy compared to all baselines across multiple
random runs. In addition, we provide experimental justification to substantiate
GAFM's superiority over splitNN, demonstrating that it offers enhanced label
protection through gradient perturbation relative to splitNN.
| [
{
"version": "v1",
"created": "Sat, 4 Feb 2023 21:18:01 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 02:40:48 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Han",
"Yujin",
""
],
[
"Guan",
"Leying",
""
]
] | TITLE: GAN-based Vertical Federated Learning for Label Protection in Binary
Classification
ABSTRACT: Split learning (splitNN) has emerged as a popular strategy for addressing the
high computational costs and low modeling efficiency in Vertical Federated
Learning (VFL). However, despite its popularity, vanilla splitNN lacks
encryption protection, leaving it vulnerable to privacy leakage issues,
especially Label Leakage from Gradients (LLG). Motivated by the LLG issue
resulting from the use of labels during training, we propose the Generative
Adversarial Federated Model (GAFM), a novel method designed specifically to
enhance label privacy protection by integrating splitNN with Generative
Adversarial Networks (GANs). GAFM leverages GANs to indirectly utilize label
information by learning the label distribution rather than relying on explicit
labels, thereby mitigating LLG. GAFM also employs an additional cross-entropy
loss based on the noisy labels to further improve the prediction accuracy. Our
ablation experiment demonstrates that the combination of GAN and the
cross-entropy loss component is necessary to enable GAFM to mitigate LLG
without significantly compromising the model utility. Empirical results on
various datasets show that GAFM achieves a better and more robust trade-off
between model utility and privacy compared to all baselines across multiple
random runs. In addition, we provide experimental justification to substantiate
GAFM's superiority over splitNN, demonstrating that it offers enhanced label
protection through gradient perturbation relative to splitNN.
| no_new_dataset | 0.709655 |
2302.06492 | Javier Cuadrado | Javier Cuadrado, Ulysse Ran\c{c}on, Beno\^it Cottereau, Francisco
Barranco and Timoth\'ee Masquelier | Optical flow estimation from event-based cameras and spiking neural
networks | 9 pages, 3 figures and 3 tables, plus Supplementary Materials | null | 10.3389/fnins.2023.1160034 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Event-based cameras are raising interest within the computer vision
community. These sensors operate with asynchronous pixels, emitting events, or
"spikes", when the luminance change at a given pixel since the last event
surpasses a certain threshold. Thanks to their inherent qualities, such as
their low power consumption, low latency and high dynamic range, they seem
particularly tailored to applications with challenging temporal constraints and
safety requirements. Event-based sensors are an excellent fit for Spiking
Neural Networks (SNNs), since the coupling of an asynchronous sensor with
neuromorphic hardware can yield real-time systems with minimal power
requirements. In this work, we seek to develop one such system, using both
event sensor data from the DSEC dataset and spiking neural networks to estimate
optical flow for driving scenarios. We propose a U-Net-like SNN which, after
supervised training, is able to make dense optical flow estimations. To do so,
we encourage both minimal norm for the error vector and minimal angle between
ground-truth and predicted flow, training our model with back-propagation using
a surrogate gradient. In addition, the use of 3d convolutions allows us to
capture the dynamic nature of the data by increasing the temporal receptive
fields. Upsampling after each decoding stage ensures that each decoder's output
contributes to the final estimation. Thanks to separable convolutions, we have
been able to develop a light model (when compared to competitors) that can
nonetheless yield reasonably accurate optical flow estimates.
| [
{
"version": "v1",
"created": "Mon, 13 Feb 2023 16:17:54 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 13:38:54 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Cuadrado",
"Javier",
""
],
[
"Rançon",
"Ulysse",
""
],
[
"Cottereau",
"Benoît",
""
],
[
"Barranco",
"Francisco",
""
],
[
"Masquelier",
"Timothée",
""
]
] | TITLE: Optical flow estimation from event-based cameras and spiking neural
networks
ABSTRACT: Event-based cameras are raising interest within the computer vision
community. These sensors operate with asynchronous pixels, emitting events, or
"spikes", when the luminance change at a given pixel since the last event
surpasses a certain threshold. Thanks to their inherent qualities, such as
their low power consumption, low latency and high dynamic range, they seem
particularly tailored to applications with challenging temporal constraints and
safety requirements. Event-based sensors are an excellent fit for Spiking
Neural Networks (SNNs), since the coupling of an asynchronous sensor with
neuromorphic hardware can yield real-time systems with minimal power
requirements. In this work, we seek to develop one such system, using both
event sensor data from the DSEC dataset and spiking neural networks to estimate
optical flow for driving scenarios. We propose a U-Net-like SNN which, after
supervised training, is able to make dense optical flow estimations. To do so,
we encourage both minimal norm for the error vector and minimal angle between
ground-truth and predicted flow, training our model with back-propagation using
a surrogate gradient. In addition, the use of 3d convolutions allows us to
capture the dynamic nature of the data by increasing the temporal receptive
fields. Upsampling after each decoding stage ensures that each decoder's output
contributes to the final estimation. Thanks to separable convolutions, we have
been able to develop a light model (when compared to competitors) that can
nonetheless yield reasonably accurate optical flow estimates.
| no_new_dataset | 0.710427 |
2303.18120 | Haritz Puerto | Haritz Puerto, Tim Baumg\"artner, Rachneet Sachdeva, Haishuo Fang, Hao
Zhang, Sewin Tariverdian, Kexin Wang, Iryna Gurevych | UKP-SQuARE v3: A Platform for Multi-Agent QA Research | ACL 2023 Demo Paper | null | null | null | cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The continuous development of Question Answering (QA) datasets has drawn the
research community's attention toward multi-domain models. A popular approach
is to use multi-dataset models, which are models trained on multiple datasets
to learn their regularities and prevent overfitting to a single dataset.
However, with the proliferation of QA models in online repositories such as
GitHub or Hugging Face, an alternative is becoming viable. Recent works have
demonstrated that combining expert agents can yield large performance gains
over multi-dataset models. To ease research in multi-agent models, we extend
UKP-SQuARE, an online platform for QA research, to support three families of
multi-agent systems: i) agent selection, ii) early-fusion of agents, and iii)
late-fusion of agents. We conduct experiments to evaluate their inference speed
and discuss the performance vs. speed trade-off compared to multi-dataset
models. UKP-SQuARE is open-source and publicly available at
http://square.ukp-lab.de.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2023 15:07:36 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 13:08:47 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Puerto",
"Haritz",
""
],
[
"Baumgärtner",
"Tim",
""
],
[
"Sachdeva",
"Rachneet",
""
],
[
"Fang",
"Haishuo",
""
],
[
"Zhang",
"Hao",
""
],
[
"Tariverdian",
"Sewin",
""
],
[
"Wang",
"Kexin",
""
],
[
"Gurevych",
"Iryna",
""
]
] | TITLE: UKP-SQuARE v3: A Platform for Multi-Agent QA Research
ABSTRACT: The continuous development of Question Answering (QA) datasets has drawn the
research community's attention toward multi-domain models. A popular approach
is to use multi-dataset models, which are models trained on multiple datasets
to learn their regularities and prevent overfitting to a single dataset.
However, with the proliferation of QA models in online repositories such as
GitHub or Hugging Face, an alternative is becoming viable. Recent works have
demonstrated that combining expert agents can yield large performance gains
over multi-dataset models. To ease research in multi-agent models, we extend
UKP-SQuARE, an online platform for QA research, to support three families of
multi-agent systems: i) agent selection, ii) early-fusion of agents, and iii)
late-fusion of agents. We conduct experiments to evaluate their inference speed
and discuss the performance vs. speed trade-off compared to multi-dataset
models. UKP-SQuARE is open-source and publicly available at
http://square.ukp-lab.de.
| no_new_dataset | 0.709988 |
2304.00788 | Yuheng Lu | Yuheng Lu, Chenfeng Xu, Xiaobao Wei, Xiaodong Xie, Masayoshi Tomizuka,
Kurt Keutzer, Shanghang Zhang | Open-Vocabulary Point-Cloud Object Detection without 3D Annotation | I want to update this manuscript | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of open-vocabulary detection is to identify novel objects based on
arbitrary textual descriptions. In this paper, we address open-vocabulary 3D
point-cloud detection by a dividing-and-conquering strategy, which involves: 1)
developing a point-cloud detector that can learn a general representation for
localizing various objects, and 2) connecting textual and point-cloud
representations to enable the detector to classify novel object categories
based on text prompting. Specifically, we resort to rich image pre-trained
models, by which the point-cloud detector learns localizing objects under the
supervision of predicted 2D bounding boxes from 2D pre-trained detectors.
Moreover, we propose a novel de-biased triplet cross-modal contrastive learning
to connect the modalities of image, point-cloud and text, thereby enabling the
point-cloud detector to benefit from vision-language pre-trained
models,i.e.,CLIP. The novel use of image and vision-language pre-trained models
for point-cloud detectors allows for open-vocabulary 3D object detection
without the need for 3D annotations. Experiments demonstrate that the proposed
method improves at least 3.03 points and 7.47 points over a wide range of
baselines on the ScanNet and SUN RGB-D datasets, respectively. Furthermore, we
provide a comprehensive analysis to explain why our approach works.
| [
{
"version": "v1",
"created": "Mon, 3 Apr 2023 08:22:02 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 02:09:03 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Lu",
"Yuheng",
""
],
[
"Xu",
"Chenfeng",
""
],
[
"Wei",
"Xiaobao",
""
],
[
"Xie",
"Xiaodong",
""
],
[
"Tomizuka",
"Masayoshi",
""
],
[
"Keutzer",
"Kurt",
""
],
[
"Zhang",
"Shanghang",
""
]
] | TITLE: Open-Vocabulary Point-Cloud Object Detection without 3D Annotation
ABSTRACT: The goal of open-vocabulary detection is to identify novel objects based on
arbitrary textual descriptions. In this paper, we address open-vocabulary 3D
point-cloud detection by a dividing-and-conquering strategy, which involves: 1)
developing a point-cloud detector that can learn a general representation for
localizing various objects, and 2) connecting textual and point-cloud
representations to enable the detector to classify novel object categories
based on text prompting. Specifically, we resort to rich image pre-trained
models, by which the point-cloud detector learns localizing objects under the
supervision of predicted 2D bounding boxes from 2D pre-trained detectors.
Moreover, we propose a novel de-biased triplet cross-modal contrastive learning
to connect the modalities of image, point-cloud and text, thereby enabling the
point-cloud detector to benefit from vision-language pre-trained
models,i.e.,CLIP. The novel use of image and vision-language pre-trained models
for point-cloud detectors allows for open-vocabulary 3D object detection
without the need for 3D annotations. Experiments demonstrate that the proposed
method improves at least 3.03 points and 7.47 points over a wide range of
baselines on the ScanNet and SUN RGB-D datasets, respectively. Furthermore, we
provide a comprehensive analysis to explain why our approach works.
| no_new_dataset | 0.711017 |
2304.08168 | Zhongfeng Jia | Zhongfeng Jia, Wei Su, Jiamin Liu, Wenli Yue | Attentive Q-Matrix Learning for Knowledge Tracing | 11 pages, 4 figures, 5 tables | null | null | null | cs.CY cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the rapid development of Intelligent Tutoring Systems (ITS) in the past
decade, tracing the students' knowledge state has become more and more
important in order to provide individualized learning guidance. This is the
main idea of Knowledge Tracing (KT), which models students' mastery of
knowledge concepts (KCs, skills needed to solve a question) based on their past
interactions on platforms. Plenty of KT models have been proposed and have
shown remarkable performance recently. However, the majority of these models
use concepts to index questions, which means the predefined skill tags for each
question are required in advance to indicate the KCs needed to answer that
question correctly. This makes it pretty hard to apply on large-scale online
education platforms where questions are often not well-organized by skill tags.
In this paper, we propose Q-matrix-based Attentive Knowledge Tracing (QAKT), an
end-to-end style model that is able to apply the attentive method to scenes
where no predefined skill tags are available without sacrificing its
performance. With a novel hybrid embedding method based on the q-matrix and
Rasch model, QAKT is capable of modeling problems hierarchically and learning
the q-matrix efficiently based on students' sequences. Meanwhile, the
architecture of QAKT ensures that it is friendly to questions associated with
multiple skills and has outstanding interpretability. After conducting
experiments on a variety of open datasets, we empirically validated that our
model shows similar or even better performance than state-of-the-art KT
methods. Results of further experiments suggest that the q-matrix learned by
QAKT is highly model-agnostic and more information-sufficient than the one
labeled by human experts, which could help with the data mining tasks in
existing ITSs.
| [
{
"version": "v1",
"created": "Thu, 6 Apr 2023 12:31:34 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 07:38:56 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Jia",
"Zhongfeng",
""
],
[
"Su",
"Wei",
""
],
[
"Liu",
"Jiamin",
""
],
[
"Yue",
"Wenli",
""
]
] | TITLE: Attentive Q-Matrix Learning for Knowledge Tracing
ABSTRACT: As the rapid development of Intelligent Tutoring Systems (ITS) in the past
decade, tracing the students' knowledge state has become more and more
important in order to provide individualized learning guidance. This is the
main idea of Knowledge Tracing (KT), which models students' mastery of
knowledge concepts (KCs, skills needed to solve a question) based on their past
interactions on platforms. Plenty of KT models have been proposed and have
shown remarkable performance recently. However, the majority of these models
use concepts to index questions, which means the predefined skill tags for each
question are required in advance to indicate the KCs needed to answer that
question correctly. This makes it pretty hard to apply on large-scale online
education platforms where questions are often not well-organized by skill tags.
In this paper, we propose Q-matrix-based Attentive Knowledge Tracing (QAKT), an
end-to-end style model that is able to apply the attentive method to scenes
where no predefined skill tags are available without sacrificing its
performance. With a novel hybrid embedding method based on the q-matrix and
Rasch model, QAKT is capable of modeling problems hierarchically and learning
the q-matrix efficiently based on students' sequences. Meanwhile, the
architecture of QAKT ensures that it is friendly to questions associated with
multiple skills and has outstanding interpretability. After conducting
experiments on a variety of open datasets, we empirically validated that our
model shows similar or even better performance than state-of-the-art KT
methods. Results of further experiments suggest that the q-matrix learned by
QAKT is highly model-agnostic and more information-sufficient than the one
labeled by human experts, which could help with the data mining tasks in
existing ITSs.
| no_new_dataset | 0.71227 |
2304.08401 | Yuxing Yang Yang | Yuxing Yang, Junhao Zhao, Siyi Wang, Xiangyu Min, Pengchao Wang and
Haizhou Wang | Multimodal Short Video Rumor Detection System Based on Contrastive
Learning | null | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rise of short video platforms as prominent channels for news
dissemination, major platforms in China have gradually evolved into fertile
grounds for the proliferation of fake news. However, distinguishing short video
rumors poses a significant challenge due to the substantial amount of
information and shared features among videos, resulting in homogeneity. To
address the dissemination of short video rumors effectively, our research group
proposes a methodology encompassing multimodal feature fusion and the
integration of external knowledge, considering the merits and drawbacks of each
algorithm. The proposed detection approach entails the following steps: (1)
creation of a comprehensive dataset comprising multiple features extracted from
short videos; (2) development of a multimodal rumor detection model: first, we
employ the Temporal Segment Networks (TSN) video coding model to extract video
features, followed by the utilization of Optical Character Recognition (OCR)
and Automatic Speech Recognition (ASR) to extract textual features.
Subsequently, the BERT model is employed to fuse textual and video features;
(3) distinction is achieved through contrast learning: we acquire external
knowledge by crawling relevant sources and leverage a vector database to
incorporate this knowledge into the classification output. Our research process
is driven by practical considerations, and the knowledge derived from this
study will hold significant value in practical scenarios, such as short video
rumor identification and the management of social opinions.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2023 16:07:00 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2023 07:29:13 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 13:12:27 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Yang",
"Yuxing",
""
],
[
"Zhao",
"Junhao",
""
],
[
"Wang",
"Siyi",
""
],
[
"Min",
"Xiangyu",
""
],
[
"Wang",
"Pengchao",
""
],
[
"Wang",
"Haizhou",
""
]
] | TITLE: Multimodal Short Video Rumor Detection System Based on Contrastive
Learning
ABSTRACT: With the rise of short video platforms as prominent channels for news
dissemination, major platforms in China have gradually evolved into fertile
grounds for the proliferation of fake news. However, distinguishing short video
rumors poses a significant challenge due to the substantial amount of
information and shared features among videos, resulting in homogeneity. To
address the dissemination of short video rumors effectively, our research group
proposes a methodology encompassing multimodal feature fusion and the
integration of external knowledge, considering the merits and drawbacks of each
algorithm. The proposed detection approach entails the following steps: (1)
creation of a comprehensive dataset comprising multiple features extracted from
short videos; (2) development of a multimodal rumor detection model: first, we
employ the Temporal Segment Networks (TSN) video coding model to extract video
features, followed by the utilization of Optical Character Recognition (OCR)
and Automatic Speech Recognition (ASR) to extract textual features.
Subsequently, the BERT model is employed to fuse textual and video features;
(3) distinction is achieved through contrast learning: we acquire external
knowledge by crawling relevant sources and leverage a vector database to
incorporate this knowledge into the classification output. Our research process
is driven by practical considerations, and the knowledge derived from this
study will hold significant value in practical scenarios, such as short video
rumor identification and the management of social opinions.
| new_dataset | 0.719227 |
2304.09184 | Xinyu Du | Xinyu Du, Huanhuan Yuan, Pengpeng Zhao, Jianfeng Qu, Fuzhen Zhuang,
Guanfeng Liu, Victor S. Sheng | Frequency Enhanced Hybrid Attention Network for Sequential
Recommendation | 11 pages, 7 figures, The 46th International ACM SIGIR Conference on
Research and Development in Information Retrieval | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The self-attention mechanism, which equips with a strong capability of
modeling long-range dependencies, is one of the extensively used techniques in
the sequential recommendation field. However, many recent studies represent
that current self-attention based models are low-pass filters and are
inadequate to capture high-frequency information. Furthermore, since the items
in the user behaviors are intertwined with each other, these models are
incomplete to distinguish the inherent periodicity obscured in the time domain.
In this work, we shift the perspective to the frequency domain, and propose a
novel Frequency Enhanced Hybrid Attention Network for Sequential
Recommendation, namely FEARec. In this model, we firstly improve the original
time domain self-attention in the frequency domain with a ramp structure to
make both low-frequency and high-frequency information could be explicitly
learned in our approach. Moreover, we additionally design a similar attention
mechanism via auto-correlation in the frequency domain to capture the periodic
characteristics and fuse the time and frequency level attention in a union
model. Finally, both contrastive learning and frequency regularization are
utilized to ensure that multiple views are aligned in both the time domain and
frequency domain. Extensive experiments conducted on four widely used benchmark
datasets demonstrate that the proposed model performs significantly better than
the state-of-the-art approaches.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2023 15:28:53 GMT"
},
{
"version": "v2",
"created": "Sun, 7 May 2023 16:07:23 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 04:09:29 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Du",
"Xinyu",
""
],
[
"Yuan",
"Huanhuan",
""
],
[
"Zhao",
"Pengpeng",
""
],
[
"Qu",
"Jianfeng",
""
],
[
"Zhuang",
"Fuzhen",
""
],
[
"Liu",
"Guanfeng",
""
],
[
"Sheng",
"Victor S.",
""
]
] | TITLE: Frequency Enhanced Hybrid Attention Network for Sequential
Recommendation
ABSTRACT: The self-attention mechanism, which equips with a strong capability of
modeling long-range dependencies, is one of the extensively used techniques in
the sequential recommendation field. However, many recent studies represent
that current self-attention based models are low-pass filters and are
inadequate to capture high-frequency information. Furthermore, since the items
in the user behaviors are intertwined with each other, these models are
incomplete to distinguish the inherent periodicity obscured in the time domain.
In this work, we shift the perspective to the frequency domain, and propose a
novel Frequency Enhanced Hybrid Attention Network for Sequential
Recommendation, namely FEARec. In this model, we firstly improve the original
time domain self-attention in the frequency domain with a ramp structure to
make both low-frequency and high-frequency information could be explicitly
learned in our approach. Moreover, we additionally design a similar attention
mechanism via auto-correlation in the frequency domain to capture the periodic
characteristics and fuse the time and frequency level attention in a union
model. Finally, both contrastive learning and frequency regularization are
utilized to ensure that multiple views are aligned in both the time domain and
frequency domain. Extensive experiments conducted on four widely used benchmark
datasets demonstrate that the proposed model performs significantly better than
the state-of-the-art approaches.
| no_new_dataset | 0.711074 |
2304.09513 | Xuying Meng | Xuying Meng, Chungang Lin, Yequan Wang, Yujun Zhang | NetGPT: Generative Pretrained Transformer for Network Traffic | null | null | null | null | cs.NI cs.AI cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | All data on the Internet are transferred by network traffic, thus accurately
modeling network traffic can help improve network services quality and protect
data privacy. Pretrained models for network traffic can utilize large-scale raw
data to learn the essential characteristics of network traffic, and generate
distinguishable results for input traffic without considering specific
downstream tasks. Effective pretrained models can significantly optimize the
training efficiency and effectiveness of downstream tasks, such as application
classification, attack detection and traffic generation. Despite the great
success of pretraining in natural language processing, there is no work in the
network field. Considering the diverse demands and characteristics of network
traffic and network tasks, it is non-trivial to build a pretrained model for
network traffic and we face various challenges, especially the heterogeneous
headers and payloads in the multi-pattern network traffic and the different
dependencies for contexts of diverse downstream network tasks.
To tackle these challenges, in this paper, we make the first attempt to
provide a generative pretrained model NetGPT for both traffic understanding and
generation tasks. We propose the multi-pattern network traffic modeling to
construct unified text inputs and support both traffic understanding and
generation tasks. We further optimize the adaptation effect of the pretrained
model to diversified tasks by shuffling header fields, segmenting packets in
flows, and incorporating diverse task labels with prompts. With diverse traffic
datasets from encrypted software, DNS, private industrial protocols and
cryptocurrency mining, expensive experiments demonstrate the effectiveness of
our NetGPT in a range of traffic understanding and generation tasks on traffic
datasets, and outperform state-of-the-art baselines by a wide margin.
| [
{
"version": "v1",
"created": "Wed, 19 Apr 2023 09:04:30 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 11:23:35 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Meng",
"Xuying",
""
],
[
"Lin",
"Chungang",
""
],
[
"Wang",
"Yequan",
""
],
[
"Zhang",
"Yujun",
""
]
] | TITLE: NetGPT: Generative Pretrained Transformer for Network Traffic
ABSTRACT: All data on the Internet are transferred by network traffic, thus accurately
modeling network traffic can help improve network services quality and protect
data privacy. Pretrained models for network traffic can utilize large-scale raw
data to learn the essential characteristics of network traffic, and generate
distinguishable results for input traffic without considering specific
downstream tasks. Effective pretrained models can significantly optimize the
training efficiency and effectiveness of downstream tasks, such as application
classification, attack detection and traffic generation. Despite the great
success of pretraining in natural language processing, there is no work in the
network field. Considering the diverse demands and characteristics of network
traffic and network tasks, it is non-trivial to build a pretrained model for
network traffic and we face various challenges, especially the heterogeneous
headers and payloads in the multi-pattern network traffic and the different
dependencies for contexts of diverse downstream network tasks.
To tackle these challenges, in this paper, we make the first attempt to
provide a generative pretrained model NetGPT for both traffic understanding and
generation tasks. We propose the multi-pattern network traffic modeling to
construct unified text inputs and support both traffic understanding and
generation tasks. We further optimize the adaptation effect of the pretrained
model to diversified tasks by shuffling header fields, segmenting packets in
flows, and incorporating diverse task labels with prompts. With diverse traffic
datasets from encrypted software, DNS, private industrial protocols and
cryptocurrency mining, expensive experiments demonstrate the effectiveness of
our NetGPT in a range of traffic understanding and generation tasks on traffic
datasets, and outperform state-of-the-art baselines by a wide margin.
| no_new_dataset | 0.709837 |
2304.11438 | Malgorzata Gutowska | Ma{\l}gorzata Gutowska, Suzanne Little, Andrew McCarren | Constructing a meta-learner for unsupervised anomaly detection | 16 pages, 4 figures | IEEE Access, vol. 11, pp. 45815-45825, 2023 | 10.1109/ACCESS.2023.3274113 | null | cs.LG | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Unsupervised anomaly detection (AD) is critical for a wide range of practical
applications, from network security to health and medical tools. Due to the
diversity of problems, no single algorithm has been found to be superior for
all AD tasks. Choosing an algorithm, otherwise known as the Algorithm Selection
Problem (ASP), has been extensively examined in supervised classification
problems, through the use of meta-learning and AutoML, however, it has received
little attention in unsupervised AD tasks. This research proposes a new
meta-learning approach that identifies an appropriate unsupervised AD algorithm
given a set of meta-features generated from the unlabelled input dataset. The
performance of the proposed meta-learner is superior to the current state of
the art solution. In addition, a mixed model statistical analysis has been
conducted to examine the impact of the meta-learner components: the meta-model,
meta-features, and the base set of AD algorithms, on the overall performance of
the meta-learner. The analysis was conducted using more than 10,000 datasets,
which is significantly larger than previous studies. Results indicate that a
relatively small number of meta-features can be used to identify an appropriate
AD algorithm, but the choice of a meta-model in the meta-learner has a
considerable impact.
| [
{
"version": "v1",
"created": "Sat, 22 Apr 2023 16:13:11 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Gutowska",
"Małgorzata",
""
],
[
"Little",
"Suzanne",
""
],
[
"McCarren",
"Andrew",
""
]
] | TITLE: Constructing a meta-learner for unsupervised anomaly detection
ABSTRACT: Unsupervised anomaly detection (AD) is critical for a wide range of practical
applications, from network security to health and medical tools. Due to the
diversity of problems, no single algorithm has been found to be superior for
all AD tasks. Choosing an algorithm, otherwise known as the Algorithm Selection
Problem (ASP), has been extensively examined in supervised classification
problems, through the use of meta-learning and AutoML, however, it has received
little attention in unsupervised AD tasks. This research proposes a new
meta-learning approach that identifies an appropriate unsupervised AD algorithm
given a set of meta-features generated from the unlabelled input dataset. The
performance of the proposed meta-learner is superior to the current state of
the art solution. In addition, a mixed model statistical analysis has been
conducted to examine the impact of the meta-learner components: the meta-model,
meta-features, and the base set of AD algorithms, on the overall performance of
the meta-learner. The analysis was conducted using more than 10,000 datasets,
which is significantly larger than previous studies. Results indicate that a
relatively small number of meta-features can be used to identify an appropriate
AD algorithm, but the choice of a meta-model in the meta-learner has a
considerable impact.
| no_new_dataset | 0.708792 |
2304.14381 | Chengyue Wu | Chengyue Wu, Teng Wang, Yixiao Ge, Zeyu Lu, Ruisong Zhou, Ying Shan,
Ping Luo | $\pi$-Tuning: Transferring Multimodal Foundation Models with Optimal
Multi-task Interpolation | To appear in ICML 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Foundation models have achieved great advances in multi-task learning with a
unified interface of unimodal and multimodal tasks. However, the potential of
such multi-task learners has not been exploited during transfer learning. In
this work, we present a universal parameter-efficient transfer learning method,
termed Predict-Interpolate Tuning ($\pi$-Tuning), for vision, language, and
vision-language tasks. It aggregates the parameters of lightweight
task-specific experts learned from similar tasks to aid the target downstream
task. The task similarities are predicted in a unified modality-independent
space, yielding a scalable graph to demonstrate task relationships.
$\pi$-Tuning has several appealing benefits. First, it flexibly explores both
intra- and inter-modal transferability between similar tasks to improve the
accuracy and robustness of transfer learning, especially in data-scarce
scenarios. Second, it offers a systematical solution for transfer learning with
multi-task prediction-and-then-interpolation, compatible with diverse types of
parameter-efficient experts, such as prompt and adapter. Third, an extensive
study of task-level mutual benefits on 14 unimodal and 6 multimodal datasets
shows that $\pi$-Tuning surpasses fine-tuning and other parameter-efficient
transfer learning methods both in full-shot and low-shot regimes. The task
graph also enables an in-depth interpretable analysis of task transferability
across modalities. The code will be available at
https://github.com/TencentARC/pi-Tuning.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 17:49:54 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2023 02:10:31 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 14:53:17 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Wu",
"Chengyue",
""
],
[
"Wang",
"Teng",
""
],
[
"Ge",
"Yixiao",
""
],
[
"Lu",
"Zeyu",
""
],
[
"Zhou",
"Ruisong",
""
],
[
"Shan",
"Ying",
""
],
[
"Luo",
"Ping",
""
]
] | TITLE: $\pi$-Tuning: Transferring Multimodal Foundation Models with Optimal
Multi-task Interpolation
ABSTRACT: Foundation models have achieved great advances in multi-task learning with a
unified interface of unimodal and multimodal tasks. However, the potential of
such multi-task learners has not been exploited during transfer learning. In
this work, we present a universal parameter-efficient transfer learning method,
termed Predict-Interpolate Tuning ($\pi$-Tuning), for vision, language, and
vision-language tasks. It aggregates the parameters of lightweight
task-specific experts learned from similar tasks to aid the target downstream
task. The task similarities are predicted in a unified modality-independent
space, yielding a scalable graph to demonstrate task relationships.
$\pi$-Tuning has several appealing benefits. First, it flexibly explores both
intra- and inter-modal transferability between similar tasks to improve the
accuracy and robustness of transfer learning, especially in data-scarce
scenarios. Second, it offers a systematical solution for transfer learning with
multi-task prediction-and-then-interpolation, compatible with diverse types of
parameter-efficient experts, such as prompt and adapter. Third, an extensive
study of task-level mutual benefits on 14 unimodal and 6 multimodal datasets
shows that $\pi$-Tuning surpasses fine-tuning and other parameter-efficient
transfer learning methods both in full-shot and low-shot regimes. The task
graph also enables an in-depth interpretable analysis of task transferability
across modalities. The code will be available at
https://github.com/TencentARC/pi-Tuning.
| no_new_dataset | 0.708023 |
2305.00456 | Qian Chang | Qian Chang, Xia Lia, Patrick S.W. Fong | Graph Global Attention Network with Memory for Fake News Detection | There are some errors in the readability of the paper, which cannot
be corrected through the updated version | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the proliferation of social media, the detection of fake news has become
a critical issue that poses a significant threat to society. The dissemination
of fake information can lead to social harm and damage the credibility of
information. To address this issue, deep learning has emerged as a promising
approach, especially with the development of natural language processing (NLP).
This study addresses the problem of detecting fake news on social media, which
poses a significant challenge to society. This study proposes a new approach
named GANM for fake news detection that employs NLP techniques to encode nodes
for news context and user content and uses three graph convolutional networks
to extract features and aggregate users' endogenous and exogenous information.
The GANM employs a unique global attention mechanism with memory to learn the
structural homogeneity of news dissemination networks. The approach achieves
good results on a real dataset.
| [
{
"version": "v1",
"created": "Sun, 30 Apr 2023 11:42:08 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 14:17:16 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Chang",
"Qian",
""
],
[
"Lia",
"Xia",
""
],
[
"Fong",
"Patrick S. W.",
""
]
] | TITLE: Graph Global Attention Network with Memory for Fake News Detection
ABSTRACT: With the proliferation of social media, the detection of fake news has become
a critical issue that poses a significant threat to society. The dissemination
of fake information can lead to social harm and damage the credibility of
information. To address this issue, deep learning has emerged as a promising
approach, especially with the development of natural language processing (NLP).
This study addresses the problem of detecting fake news on social media, which
poses a significant challenge to society. This study proposes a new approach
named GANM for fake news detection that employs NLP techniques to encode nodes
for news context and user content and uses three graph convolutional networks
to extract features and aggregate users' endogenous and exogenous information.
The GANM employs a unique global attention mechanism with memory to learn the
structural homogeneity of news dissemination networks. The approach achieves
good results on a real dataset.
| no_new_dataset | 0.711249 |
2305.03688 | Zeqi Tan | Zeqi Tan, Shen Huang, Zixia Jia, Jiong Cai, Yinghui Li, Weiming Lu,
Yueting Zhuang, Kewei Tu, Pengjun Xie, Fei Huang and Yong Jiang | DAMO-NLP at SemEval-2023 Task 2: A Unified Retrieval-augmented System
for Multilingual Named Entity Recognition | Accepted to SemEval 2023, winners for 9 out of 13 tracks, performance
beyond ChatGPT | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The MultiCoNER \RNum{2} shared task aims to tackle multilingual named entity
recognition (NER) in fine-grained and noisy scenarios, and it inherits the
semantic ambiguity and low-context setting of the MultiCoNER \RNum{1} task. To
cope with these problems, the previous top systems in the MultiCoNER \RNum{1}
either incorporate the knowledge bases or gazetteers. However, they still
suffer from insufficient knowledge, limited context length, single retrieval
strategy. In this paper, our team \textbf{DAMO-NLP} proposes a unified
retrieval-augmented system (U-RaNER) for fine-grained multilingual NER. We
perform error analysis on the previous top systems and reveal that their
performance bottleneck lies in insufficient knowledge. Also, we discover that
the limited context length causes the retrieval knowledge to be invisible to
the model. To enhance the retrieval context, we incorporate the entity-centric
Wikidata knowledge base, while utilizing the infusion approach to broaden the
contextual scope of the model. Also, we explore various search strategies and
refine the quality of retrieval knowledge. Our system\footnote{We will release
the dataset, code, and scripts of our system at {\small
\url{https://github.com/modelscope/AdaSeq/tree/master/examples/U-RaNER}}.} wins
9 out of 13 tracks in the MultiCoNER \RNum{2} shared task. Additionally, we
compared our system with ChatGPT, one of the large language models which have
unlocked strong capabilities on many tasks. The results show that there is
still much room for improvement for ChatGPT on the extraction task.
| [
{
"version": "v1",
"created": "Fri, 5 May 2023 16:59:26 GMT"
},
{
"version": "v2",
"created": "Tue, 9 May 2023 03:43:10 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 03:14:00 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Tan",
"Zeqi",
""
],
[
"Huang",
"Shen",
""
],
[
"Jia",
"Zixia",
""
],
[
"Cai",
"Jiong",
""
],
[
"Li",
"Yinghui",
""
],
[
"Lu",
"Weiming",
""
],
[
"Zhuang",
"Yueting",
""
],
[
"Tu",
"Kewei",
""
],
[
"Xie",
"Pengjun",
""
],
[
"Huang",
"Fei",
""
],
[
"Jiang",
"Yong",
""
]
] | TITLE: DAMO-NLP at SemEval-2023 Task 2: A Unified Retrieval-augmented System
for Multilingual Named Entity Recognition
ABSTRACT: The MultiCoNER \RNum{2} shared task aims to tackle multilingual named entity
recognition (NER) in fine-grained and noisy scenarios, and it inherits the
semantic ambiguity and low-context setting of the MultiCoNER \RNum{1} task. To
cope with these problems, the previous top systems in the MultiCoNER \RNum{1}
either incorporate the knowledge bases or gazetteers. However, they still
suffer from insufficient knowledge, limited context length, single retrieval
strategy. In this paper, our team \textbf{DAMO-NLP} proposes a unified
retrieval-augmented system (U-RaNER) for fine-grained multilingual NER. We
perform error analysis on the previous top systems and reveal that their
performance bottleneck lies in insufficient knowledge. Also, we discover that
the limited context length causes the retrieval knowledge to be invisible to
the model. To enhance the retrieval context, we incorporate the entity-centric
Wikidata knowledge base, while utilizing the infusion approach to broaden the
contextual scope of the model. Also, we explore various search strategies and
refine the quality of retrieval knowledge. Our system\footnote{We will release
the dataset, code, and scripts of our system at {\small
\url{https://github.com/modelscope/AdaSeq/tree/master/examples/U-RaNER}}.} wins
9 out of 13 tracks in the MultiCoNER \RNum{2} shared task. Additionally, we
compared our system with ChatGPT, one of the large language models which have
unlocked strong capabilities on many tasks. The results show that there is
still much room for improvement for ChatGPT on the extraction task.
| no_new_dataset | 0.703575 |
2305.06335 | Jungyeul Park | Eunkyul Leah Jo and Kyuwon Kim and Xihan Wu and KyungTae Lim and
Jungyeul Park and Chulwoo Park | K-UniMorph: Korean Universal Morphology and its Feature Schema | Findings of the Association for Computational Linguistics: ACL 2023
(Camera-ready) | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We present in this work a new Universal Morphology dataset for Korean.
Previously, the Korean language has been underrepresented in the field of
morphological paradigms amongst hundreds of diverse world languages. Hence, we
propose this Universal Morphological paradigms for the Korean language that
preserve its distinct characteristics. For our K-UniMorph dataset, we outline
each grammatical criterion in detail for the verbal endings, clarify how to
extract inflected forms, and demonstrate how we generate the morphological
schemata. This dataset adopts morphological feature schema from Sylak-Glassman
et al. (2015) and Sylak-Glassman (2016) for the Korean language as we extract
inflected verb forms from the Sejong morphologically analyzed corpus that is
one of the largest annotated corpora for Korean. During the data creation, our
methodology also includes investigating the correctness of the conversion from
the Sejong corpus. Furthermore, we carry out the inflection task using three
different Korean word forms: letters, syllables and morphemes. Finally, we
discuss and describe future perspectives on Korean morphological paradigms and
the dataset.
| [
{
"version": "v1",
"created": "Wed, 10 May 2023 17:44:01 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 14:35:29 GMT"
},
{
"version": "v3",
"created": "Wed, 17 May 2023 08:29:58 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Jo",
"Eunkyul Leah",
""
],
[
"Kim",
"Kyuwon",
""
],
[
"Wu",
"Xihan",
""
],
[
"Lim",
"KyungTae",
""
],
[
"Park",
"Jungyeul",
""
],
[
"Park",
"Chulwoo",
""
]
] | TITLE: K-UniMorph: Korean Universal Morphology and its Feature Schema
ABSTRACT: We present in this work a new Universal Morphology dataset for Korean.
Previously, the Korean language has been underrepresented in the field of
morphological paradigms amongst hundreds of diverse world languages. Hence, we
propose this Universal Morphological paradigms for the Korean language that
preserve its distinct characteristics. For our K-UniMorph dataset, we outline
each grammatical criterion in detail for the verbal endings, clarify how to
extract inflected forms, and demonstrate how we generate the morphological
schemata. This dataset adopts morphological feature schema from Sylak-Glassman
et al. (2015) and Sylak-Glassman (2016) for the Korean language as we extract
inflected verb forms from the Sejong morphologically analyzed corpus that is
one of the largest annotated corpora for Korean. During the data creation, our
methodology also includes investigating the correctness of the conversion from
the Sejong corpus. Furthermore, we carry out the inflection task using three
different Korean word forms: letters, syllables and morphemes. Finally, we
discuss and describe future perspectives on Korean morphological paradigms and
the dataset.
| new_dataset | 0.715772 |
2305.06827 | Thanh Bui | Minh-Thanh Bui, Duc-Thinh Ngo, Demin Lu, and Zonghua Zhang | A Generic Approach to Integrating Time into Spatial-Temporal Forecasting
via Conditional Neural Fields | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Self-awareness is the key capability of autonomous systems, e.g., autonomous
driving network, which relies on highly efficient time series forecasting
algorithm to enable the system to reason about the future state of the
environment, as well as its effect on the system behavior as time progresses.
Recently, a large number of forecasting algorithms using either convolutional
neural networks or graph neural networks have been developed to exploit the
complex temporal and spatial dependencies present in the time series. While
these solutions have shown significant advantages over statistical approaches,
one open question is to effectively incorporate the global information which
represents the seasonality patterns via the time component of time series into
the forecasting models to improve their accuracy. This paper presents a general
approach to integrating the time component into forecasting models. The main
idea is to employ conditional neural fields to represent the auxiliary features
extracted from the time component to obtain the global information, which will
be effectively combined with the local information extracted from
autoregressive neural networks through a layer-wise gated fusion module.
Extensive experiments on road traffic and cellular network traffic datasets
prove the effectiveness of the proposed approach.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 14:20:23 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 15:29:34 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Bui",
"Minh-Thanh",
""
],
[
"Ngo",
"Duc-Thinh",
""
],
[
"Lu",
"Demin",
""
],
[
"Zhang",
"Zonghua",
""
]
] | TITLE: A Generic Approach to Integrating Time into Spatial-Temporal Forecasting
via Conditional Neural Fields
ABSTRACT: Self-awareness is the key capability of autonomous systems, e.g., autonomous
driving network, which relies on highly efficient time series forecasting
algorithm to enable the system to reason about the future state of the
environment, as well as its effect on the system behavior as time progresses.
Recently, a large number of forecasting algorithms using either convolutional
neural networks or graph neural networks have been developed to exploit the
complex temporal and spatial dependencies present in the time series. While
these solutions have shown significant advantages over statistical approaches,
one open question is to effectively incorporate the global information which
represents the seasonality patterns via the time component of time series into
the forecasting models to improve their accuracy. This paper presents a general
approach to integrating the time component into forecasting models. The main
idea is to employ conditional neural fields to represent the auxiliary features
extracted from the time component to obtain the global information, which will
be effectively combined with the local information extracted from
autoregressive neural networks through a layer-wise gated fusion module.
Extensive experiments on road traffic and cellular network traffic datasets
prove the effectiveness of the proposed approach.
| no_new_dataset | 0.707834 |
2305.07374 | Pragya Katyayan | Pragya Katyayan, Nisheeth Joshi | Implications of Deep Circuits in Improving Quality of Quantum Question
Answering | 26 pages, 7 Figures, 11 Tables, Book Chapter of Book: Quantum
Computing: A Shift from Bits to Qubits, Springer, 2023 | null | 10.1007/978-981-19-9530-9_23 | null | cs.CL cs.AI quant-ph | http://creativecommons.org/licenses/by/4.0/ | Question Answering (QA) has proved to be an arduous challenge in the area of
natural language processing (NLP) and artificial intelligence (AI). Many
attempts have been made to develop complete solutions for QA as well as
improving significant sub-modules of the QA systems to improve the overall
performance through the course of time. Questions are the most important piece
of QA, because knowing the question is equivalent to knowing what counts as an
answer (Harrah in Philos Sci, 1961 [1]). In this work, we have attempted to
understand questions in a better way by using Quantum Machine Learning (QML).
The properties of Quantum Computing (QC) have enabled classically intractable
data processing. So, in this paper, we have performed question classification
on questions from two classes of SelQA (Selection-based Question Answering)
dataset using quantum-based classifier algorithms-quantum support vector
machine (QSVM) and variational quantum classifier (VQC) from Qiskit (Quantum
Information Science toolKIT) for Python. We perform classification with both
classifiers in almost similar environments and study the effects of circuit
depths while comparing the results of both classifiers. We also use these
classification results with our own rule-based QA system and observe
significant performance improvement. Hence, this experiment has helped in
improving the quality of QA in general.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 10:52:13 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Katyayan",
"Pragya",
""
],
[
"Joshi",
"Nisheeth",
""
]
] | TITLE: Implications of Deep Circuits in Improving Quality of Quantum Question
Answering
ABSTRACT: Question Answering (QA) has proved to be an arduous challenge in the area of
natural language processing (NLP) and artificial intelligence (AI). Many
attempts have been made to develop complete solutions for QA as well as
improving significant sub-modules of the QA systems to improve the overall
performance through the course of time. Questions are the most important piece
of QA, because knowing the question is equivalent to knowing what counts as an
answer (Harrah in Philos Sci, 1961 [1]). In this work, we have attempted to
understand questions in a better way by using Quantum Machine Learning (QML).
The properties of Quantum Computing (QC) have enabled classically intractable
data processing. So, in this paper, we have performed question classification
on questions from two classes of SelQA (Selection-based Question Answering)
dataset using quantum-based classifier algorithms-quantum support vector
machine (QSVM) and variational quantum classifier (VQC) from Qiskit (Quantum
Information Science toolKIT) for Python. We perform classification with both
classifiers in almost similar environments and study the effects of circuit
depths while comparing the results of both classifiers. We also use these
classification results with our own rule-based QA system and observe
significant performance improvement. Hence, this experiment has helped in
improving the quality of QA in general.
| no_new_dataset | 0.709221 |
2305.07772 | Wei Hao | Wei Hao, Zixi Wang, Lauren Hong, Lingxiao Li, Nader Karayanni,
Chengzhi Mao, Junfeng Yang, and Asaf Cidon | Monitoring and Adapting ML Models on Mobile Devices | null | null | null | null | cs.LG cs.CV | http://creativecommons.org/licenses/by/4.0/ | ML models are increasingly being pushed to mobile devices, for low-latency
inference and offline operation. However, once the models are deployed, it is
hard for ML operators to track their accuracy, which can degrade unpredictably
(e.g., due to data drift). We design the first end-to-end system for
continuously monitoring and adapting models on mobile devices without requiring
feedback from users. Our key observation is that often model degradation is due
to a specific root cause, which may affect a large group of devices. Therefore,
once the system detects a consistent degradation across a large number of
devices, it employs a root cause analysis to determine the origin of the
problem and applies a cause-specific adaptation. We evaluate the system on two
computer vision datasets, and show it consistently boosts accuracy compared to
existing approaches. On a dataset containing photos collected from driving
cars, our system improves the accuracy on average by 15%.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 21:33:26 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 14:34:00 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Hao",
"Wei",
""
],
[
"Wang",
"Zixi",
""
],
[
"Hong",
"Lauren",
""
],
[
"Li",
"Lingxiao",
""
],
[
"Karayanni",
"Nader",
""
],
[
"Mao",
"Chengzhi",
""
],
[
"Yang",
"Junfeng",
""
],
[
"Cidon",
"Asaf",
""
]
] | TITLE: Monitoring and Adapting ML Models on Mobile Devices
ABSTRACT: ML models are increasingly being pushed to mobile devices, for low-latency
inference and offline operation. However, once the models are deployed, it is
hard for ML operators to track their accuracy, which can degrade unpredictably
(e.g., due to data drift). We design the first end-to-end system for
continuously monitoring and adapting models on mobile devices without requiring
feedback from users. Our key observation is that often model degradation is due
to a specific root cause, which may affect a large group of devices. Therefore,
once the system detects a consistent degradation across a large number of
devices, it employs a root cause analysis to determine the origin of the
problem and applies a cause-specific adaptation. We evaluate the system on two
computer vision datasets, and show it consistently boosts accuracy compared to
existing approaches. On a dataset containing photos collected from driving
cars, our system improves the accuracy on average by 15%.
| no_new_dataset | 0.709265 |
2305.08279 | Noah Bagazinski | Noah J. Bagazinski and Faez Ahmed | Ship-D: Ship Hull Dataset for Design Optimization using Machine Learning | null | null | null | null | cs.LG cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Machine learning has recently made significant strides in reducing design
cycle time for complex products. Ship design, which currently involves years
long cycles and small batch production, could greatly benefit from these
advancements. By developing a machine learning tool for ship design that learns
from the design of many different types of ships, tradeoffs in ship design
could be identified and optimized. However, the lack of publicly available ship
design datasets currently limits the potential for leveraging machine learning
in generalized ship design. To address this gap, this paper presents a large
dataset of thirty thousand ship hulls, each with design and functional
performance information, including parameterization, mesh, point cloud, and
image representations, as well as thirty two hydrodynamic drag measures under
different operating conditions. The dataset is structured to allow human input
and is also designed for computational methods. Additionally, the paper
introduces a set of twelve ship hulls from publicly available CAD repositories
to showcase the proposed parameterizations ability to accurately reconstruct
existing hulls. A surrogate model was developed to predict the thirty two wave
drag coefficients, which was then implemented in a genetic algorithm case study
to reduce the total drag of a hull by sixty percent while maintaining the shape
of the hulls cross section and the length of the parallel midbody. Our work
provides a comprehensive dataset and application examples for other researchers
to use in advancing data driven ship design.
| [
{
"version": "v1",
"created": "Sun, 14 May 2023 23:47:20 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2023 18:57:55 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Bagazinski",
"Noah J.",
""
],
[
"Ahmed",
"Faez",
""
]
] | TITLE: Ship-D: Ship Hull Dataset for Design Optimization using Machine Learning
ABSTRACT: Machine learning has recently made significant strides in reducing design
cycle time for complex products. Ship design, which currently involves years
long cycles and small batch production, could greatly benefit from these
advancements. By developing a machine learning tool for ship design that learns
from the design of many different types of ships, tradeoffs in ship design
could be identified and optimized. However, the lack of publicly available ship
design datasets currently limits the potential for leveraging machine learning
in generalized ship design. To address this gap, this paper presents a large
dataset of thirty thousand ship hulls, each with design and functional
performance information, including parameterization, mesh, point cloud, and
image representations, as well as thirty two hydrodynamic drag measures under
different operating conditions. The dataset is structured to allow human input
and is also designed for computational methods. Additionally, the paper
introduces a set of twelve ship hulls from publicly available CAD repositories
to showcase the proposed parameterizations ability to accurately reconstruct
existing hulls. A surrogate model was developed to predict the thirty two wave
drag coefficients, which was then implemented in a genetic algorithm case study
to reduce the total drag of a hull by sixty percent while maintaining the shape
of the hulls cross section and the length of the parallel midbody. Our work
provides a comprehensive dataset and application examples for other researchers
to use in advancing data driven ship design.
| new_dataset | 0.715381 |
2305.08876 | Wandemberg Gibaut | Wandemberg Gibaut, Leonardo Pereira, Fabio Grassiotto, Alexandre
Osorio, Eder Gadioli, Amparo Munoz, Sildolfo Gomes, Claudio dos Santos | Neurosymbolic AI and its Taxonomy: a survey | submitted to ACM Computing Surveys | null | 10.48550/arXiv.2305.08876 | null | cs.NE cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neurosymbolic AI deals with models that combine symbolic processing, like
classic AI, and neural networks, as it's a very established area. These models
are emerging as an effort toward Artificial General Intelligence (AGI) by both
exploring an alternative to just increasing datasets' and models' sizes and
combining Learning over the data distribution, Reasoning on prior and learned
knowledge, and by symbiotically using them. This survey investigates research
papers in this area during recent years and brings classification and
comparison between the presented models as well as applications.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 19:51:13 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 13:43:58 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Gibaut",
"Wandemberg",
""
],
[
"Pereira",
"Leonardo",
""
],
[
"Grassiotto",
"Fabio",
""
],
[
"Osorio",
"Alexandre",
""
],
[
"Gadioli",
"Eder",
""
],
[
"Munoz",
"Amparo",
""
],
[
"Gomes",
"Sildolfo",
""
],
[
"Santos",
"Claudio dos",
""
]
] | TITLE: Neurosymbolic AI and its Taxonomy: a survey
ABSTRACT: Neurosymbolic AI deals with models that combine symbolic processing, like
classic AI, and neural networks, as it's a very established area. These models
are emerging as an effort toward Artificial General Intelligence (AGI) by both
exploring an alternative to just increasing datasets' and models' sizes and
combining Learning over the data distribution, Reasoning on prior and learned
knowledge, and by symbiotically using them. This survey investigates research
papers in this area during recent years and brings classification and
comparison between the presented models as well as applications.
| no_new_dataset | 0.708023 |
2305.08953 | Mark Endo | Mark Endo, Joy Hsu, Jiaman Li, Jiajun Wu | Motion Question Answering via Modular Motion Programs | In ICML 2023; first two authors contributed equally to this work | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to build artificial intelligence systems that can perceive and
reason with human behavior in the real world, we must first design models that
conduct complex spatio-temporal reasoning over motion sequences. Moving towards
this goal, we propose the HumanMotionQA task to evaluate complex, multi-step
reasoning abilities of models on long-form human motion sequences. We generate
a dataset of question-answer pairs that require detecting motor cues in small
portions of motion sequences, reasoning temporally about when events occur, and
querying specific motion attributes. In addition, we propose NSPose, a
neuro-symbolic method for this task that uses symbolic reasoning and a modular
design to ground motion through learning motion concepts, attribute neural
operators, and temporal relations. We demonstrate the suitability of NSPose for
the HumanMotionQA task, outperforming all baseline methods.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 18:45:55 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 17:18:35 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Endo",
"Mark",
""
],
[
"Hsu",
"Joy",
""
],
[
"Li",
"Jiaman",
""
],
[
"Wu",
"Jiajun",
""
]
] | TITLE: Motion Question Answering via Modular Motion Programs
ABSTRACT: In order to build artificial intelligence systems that can perceive and
reason with human behavior in the real world, we must first design models that
conduct complex spatio-temporal reasoning over motion sequences. Moving towards
this goal, we propose the HumanMotionQA task to evaluate complex, multi-step
reasoning abilities of models on long-form human motion sequences. We generate
a dataset of question-answer pairs that require detecting motor cues in small
portions of motion sequences, reasoning temporally about when events occur, and
querying specific motion attributes. In addition, we propose NSPose, a
neuro-symbolic method for this task that uses symbolic reasoning and a modular
design to ground motion through learning motion concepts, attribute neural
operators, and temporal relations. We demonstrate the suitability of NSPose for
the HumanMotionQA task, outperforming all baseline methods.
| new_dataset | 0.712826 |
2305.09447 | Fenghe Tang | Fenghe Tang, Jianrui Ding, Lingtao Wang, Min Xian, Chunping Ning | Multi-Level Global Context Cross Consistency Model for Semi-Supervised
Ultrasound Image Segmentation with Diffusion Model | 10 pages, 8 figures, Released code for
https://github.com/FengheTan9/Multi-Level-Global-Context-Cross-Consistency | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Medical image segmentation is a critical step in computer-aided diagnosis,
and convolutional neural networks are popular segmentation networks nowadays.
However, the inherent local operation characteristics make it difficult to
focus on the global contextual information of lesions with different positions,
shapes, and sizes. Semi-supervised learning can be used to learn from both
labeled and unlabeled samples, alleviating the burden of manual labeling.
However, obtaining a large number of unlabeled images in medical scenarios
remains challenging. To address these issues, we propose a Multi-level Global
Context Cross-consistency (MGCC) framework that uses images generated by a
Latent Diffusion Model (LDM) as unlabeled images for semi-supervised learning.
The framework involves of two stages. In the first stage, a LDM is used to
generate synthetic medical images, which reduces the workload of data
annotation and addresses privacy concerns associated with collecting medical
data. In the second stage, varying levels of global context noise perturbation
are added to the input of the auxiliary decoder, and output consistency is
maintained between decoders to improve the representation ability. Experiments
conducted on open-source breast ultrasound and private thyroid ultrasound
datasets demonstrate the effectiveness of our framework in bridging the
probability distribution and the semantic representation of the medical image.
Our approach enables the effective transfer of probability distribution
knowledge to the segmentation network, resulting in improved segmentation
accuracy. The code is available at
https://github.com/FengheTan9/Multi-Level-Global-Context-Cross-Consistency.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 14:08:24 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 13:35:27 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Tang",
"Fenghe",
""
],
[
"Ding",
"Jianrui",
""
],
[
"Wang",
"Lingtao",
""
],
[
"Xian",
"Min",
""
],
[
"Ning",
"Chunping",
""
]
] | TITLE: Multi-Level Global Context Cross Consistency Model for Semi-Supervised
Ultrasound Image Segmentation with Diffusion Model
ABSTRACT: Medical image segmentation is a critical step in computer-aided diagnosis,
and convolutional neural networks are popular segmentation networks nowadays.
However, the inherent local operation characteristics make it difficult to
focus on the global contextual information of lesions with different positions,
shapes, and sizes. Semi-supervised learning can be used to learn from both
labeled and unlabeled samples, alleviating the burden of manual labeling.
However, obtaining a large number of unlabeled images in medical scenarios
remains challenging. To address these issues, we propose a Multi-level Global
Context Cross-consistency (MGCC) framework that uses images generated by a
Latent Diffusion Model (LDM) as unlabeled images for semi-supervised learning.
The framework involves of two stages. In the first stage, a LDM is used to
generate synthetic medical images, which reduces the workload of data
annotation and addresses privacy concerns associated with collecting medical
data. In the second stage, varying levels of global context noise perturbation
are added to the input of the auxiliary decoder, and output consistency is
maintained between decoders to improve the representation ability. Experiments
conducted on open-source breast ultrasound and private thyroid ultrasound
datasets demonstrate the effectiveness of our framework in bridging the
probability distribution and the semantic representation of the medical image.
Our approach enables the effective transfer of probability distribution
knowledge to the segmentation network, resulting in improved segmentation
accuracy. The code is available at
https://github.com/FengheTan9/Multi-Level-Global-Context-Cross-Consistency.
| no_new_dataset | 0.712063 |
2305.09559 | Anoubhav Agarwaal | Anoubhav Agarwaal, Prabhat Kanaujia, Sartaki Sinha Roy, Susmita Ghose | Robust and lightweight audio fingerprint for Automatic Content
Recognition | null | null | null | null | cs.SD cs.IR eess.AS | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This research paper presents a novel audio fingerprinting system for
Automatic Content Recognition (ACR). By using signal processing techniques and
statistical transformations, our proposed method generates compact fingerprints
of audio segments that are robust to noise degradations present in real-world
audio. The system is designed to be highly scalable, with the ability to
identify thousands of hours of content using fingerprints generated from
millions of TVs. The fingerprint's high temporal correlation and utilization of
existing GPU-compatible Approximate Nearest Neighbour (ANN) search algorithms
make this possible. Furthermore, the fingerprint generation can run on
low-power devices with limited compute, making it accessible to a wide range of
applications. Experimental results show improvements in our proposed system
compared to a min-hash based audio fingerprint on all evaluated metrics,
including accuracy on proprietary ACR datasets, retrieval speed, memory usage,
and robustness to various noises. For similar retrieval accuracy, our system is
30x faster and uses 6x fewer fingerprints than the min-hash method.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 15:55:03 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2023 06:28:30 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Agarwaal",
"Anoubhav",
""
],
[
"Kanaujia",
"Prabhat",
""
],
[
"Roy",
"Sartaki Sinha",
""
],
[
"Ghose",
"Susmita",
""
]
] | TITLE: Robust and lightweight audio fingerprint for Automatic Content
Recognition
ABSTRACT: This research paper presents a novel audio fingerprinting system for
Automatic Content Recognition (ACR). By using signal processing techniques and
statistical transformations, our proposed method generates compact fingerprints
of audio segments that are robust to noise degradations present in real-world
audio. The system is designed to be highly scalable, with the ability to
identify thousands of hours of content using fingerprints generated from
millions of TVs. The fingerprint's high temporal correlation and utilization of
existing GPU-compatible Approximate Nearest Neighbour (ANN) search algorithms
make this possible. Furthermore, the fingerprint generation can run on
low-power devices with limited compute, making it accessible to a wide range of
applications. Experimental results show improvements in our proposed system
compared to a min-hash based audio fingerprint on all evaluated metrics,
including accuracy on proprietary ACR datasets, retrieval speed, memory usage,
and robustness to various noises. For similar retrieval accuracy, our system is
30x faster and uses 6x fewer fingerprints than the min-hash method.
| no_new_dataset | 0.711005 |
2305.09669 | Nur Imtiazul Haque | Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk
Uluagac, and Laurent Njilla | SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven
Smart Home Systems | 13 Pages, 2023 IEE/IFIP DSN Conference | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Modern smart home control systems utilize real-time occupancy and activity
monitoring to ensure control efficiency, occupants' comfort, and optimal energy
consumption. Moreover, adopting machine learning-based anomaly detection models
(ADMs) enhances security and reliability. However, sufficient system knowledge
allows adversaries/attackers to alter sensor measurements through stealthy
false data injection (FDI) attacks. Although ADMs limit attack scopes, the
availability of information like occupants' location, conducted activities, and
alteration capability of smart appliances increase the attack surface.
Therefore, performing an attack space analysis of modern home control systems
is crucial to design robust defense solutions. However, state-of-the-art
analyzers do not consider contemporary control and defense solutions and
generate trivial attack vectors. To address this, we propose a control and
defense-aware novel attack analysis framework for a modern smart home control
system, efficiently extracting ADM rules. We verify and validate our framework
using a state-of-the-art dataset and a prototype testbed.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 20:29:21 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Haque",
"Nur Imtiazul",
""
],
[
"Ngouen",
"Maurice",
""
],
[
"Rahman",
"Mohammad Ashiqur",
""
],
[
"Uluagac",
"Selcuk",
""
],
[
"Njilla",
"Laurent",
""
]
] | TITLE: SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven
Smart Home Systems
ABSTRACT: Modern smart home control systems utilize real-time occupancy and activity
monitoring to ensure control efficiency, occupants' comfort, and optimal energy
consumption. Moreover, adopting machine learning-based anomaly detection models
(ADMs) enhances security and reliability. However, sufficient system knowledge
allows adversaries/attackers to alter sensor measurements through stealthy
false data injection (FDI) attacks. Although ADMs limit attack scopes, the
availability of information like occupants' location, conducted activities, and
alteration capability of smart appliances increase the attack surface.
Therefore, performing an attack space analysis of modern home control systems
is crucial to design robust defense solutions. However, state-of-the-art
analyzers do not consider contemporary control and defense solutions and
generate trivial attack vectors. To address this, we propose a control and
defense-aware novel attack analysis framework for a modern smart home control
system, efficiently extracting ADM rules. We verify and validate our framework
using a state-of-the-art dataset and a prototype testbed.
| no_new_dataset | 0.689057 |
2305.09673 | Khloud Al Jallad | Mohamed Mjd Alhafi and Mohammad Hammade and Khloud Al Jallad | Vulnerability Detection Using Two-Stage Deep Learning Models | null | 2023, Journal of Current Trends in Computer Science
Research(JCTCSR) | 10.33140/JCTCSR | null | cs.CR cs.AI cs.LG | http://creativecommons.org/licenses/by/4.0/ | Application security is an essential part of developing modern software, as
lots of attacks depend on vulnerabilities in software. The number of attacks is
increasing globally due to technological advancements. Companies must include
security in every stage of developing, testing, and deploying their software in
order to prevent data breaches. There are several methods to detect software
vulnerability Non-AI-based such as Static Application Security Testing (SAST)
and Dynamic Application Security Testing (DAST). However, these approaches have
substantial false-positive and false-negative rates. On the other side,
researchers have been interested in developing an AI-based vulnerability
detection system employing deep learning models like BERT, BLSTM, etc. In this
paper, we proposed a two-stage solution, two deep learning models were proposed
for vulnerability detection in C/C++ source codes, the first stage is CNN which
detects if the source code contains any vulnerability (binary classification
model) and the second stage is CNN-LTSM that classifies this vulnerability into
a class of 50 different types of vulnerabilities (multiclass classification
model). Experiments were done on SySeVR dataset. Results show an accuracy of
99% for the first and 98% for the second stage.
| [
{
"version": "v1",
"created": "Mon, 8 May 2023 22:12:34 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Alhafi",
"Mohamed Mjd",
""
],
[
"Hammade",
"Mohammad",
""
],
[
"Jallad",
"Khloud Al",
""
]
] | TITLE: Vulnerability Detection Using Two-Stage Deep Learning Models
ABSTRACT: Application security is an essential part of developing modern software, as
lots of attacks depend on vulnerabilities in software. The number of attacks is
increasing globally due to technological advancements. Companies must include
security in every stage of developing, testing, and deploying their software in
order to prevent data breaches. There are several methods to detect software
vulnerability Non-AI-based such as Static Application Security Testing (SAST)
and Dynamic Application Security Testing (DAST). However, these approaches have
substantial false-positive and false-negative rates. On the other side,
researchers have been interested in developing an AI-based vulnerability
detection system employing deep learning models like BERT, BLSTM, etc. In this
paper, we proposed a two-stage solution, two deep learning models were proposed
for vulnerability detection in C/C++ source codes, the first stage is CNN which
detects if the source code contains any vulnerability (binary classification
model) and the second stage is CNN-LTSM that classifies this vulnerability into
a class of 50 different types of vulnerabilities (multiclass classification
model). Experiments were done on SySeVR dataset. Results show an accuracy of
99% for the first and 98% for the second stage.
| no_new_dataset | 0.710434 |
2305.09677 | Xinrui Liu | Xinrui Liu, Yu-an Tan, Yajie Wang, Kefan Qiu, Yuanzhang Li | Stealthy Low-frequency Backdoor Attack against Deep Neural Networks | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Deep neural networks (DNNs) have gain its popularity in various scenarios in
recent years. However, its excellent ability of fitting complex functions also
makes it vulnerable to backdoor attacks. Specifically, a backdoor can remain
hidden indefinitely until activated by a sample with a specific trigger, which
is hugely concealed. Nevertheless, existing backdoor attacks operate backdoors
in spatial domain, i.e., the poisoned images are generated by adding additional
perturbations to the original images, which are easy to detect. To bring the
potential of backdoor attacks into full play, we propose low-pass attack, a
novel attack scheme that utilizes low-pass filter to inject backdoor in
frequency domain. Unlike traditional poisoned image generation methods, our
approach reduces high-frequency components and preserve original images'
semantic information instead of adding additional perturbations, improving the
capability of evading current defenses. Besides, we introduce "precision mode"
to make our backdoor triggered at a specified level of filtering, which further
improves stealthiness. We evaluate our low-pass attack on four datasets and
demonstrate that even under pollution rate of 0.01, we can perform stealthy
attack without trading off attack performance. Besides, our backdoor attack can
successfully bypass state-of-the-art defending mechanisms. We also compare our
attack with existing backdoor attacks and show that our poisoned images are
nearly invisible and retain higher image quality.
| [
{
"version": "v1",
"created": "Wed, 10 May 2023 09:05:19 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Liu",
"Xinrui",
""
],
[
"Tan",
"Yu-an",
""
],
[
"Wang",
"Yajie",
""
],
[
"Qiu",
"Kefan",
""
],
[
"Li",
"Yuanzhang",
""
]
] | TITLE: Stealthy Low-frequency Backdoor Attack against Deep Neural Networks
ABSTRACT: Deep neural networks (DNNs) have gain its popularity in various scenarios in
recent years. However, its excellent ability of fitting complex functions also
makes it vulnerable to backdoor attacks. Specifically, a backdoor can remain
hidden indefinitely until activated by a sample with a specific trigger, which
is hugely concealed. Nevertheless, existing backdoor attacks operate backdoors
in spatial domain, i.e., the poisoned images are generated by adding additional
perturbations to the original images, which are easy to detect. To bring the
potential of backdoor attacks into full play, we propose low-pass attack, a
novel attack scheme that utilizes low-pass filter to inject backdoor in
frequency domain. Unlike traditional poisoned image generation methods, our
approach reduces high-frequency components and preserve original images'
semantic information instead of adding additional perturbations, improving the
capability of evading current defenses. Besides, we introduce "precision mode"
to make our backdoor triggered at a specified level of filtering, which further
improves stealthiness. We evaluate our low-pass attack on four datasets and
demonstrate that even under pollution rate of 0.01, we can perform stealthy
attack without trading off attack performance. Besides, our backdoor attack can
successfully bypass state-of-the-art defending mechanisms. We also compare our
attack with existing backdoor attacks and show that our poisoned images are
nearly invisible and retain higher image quality.
| no_new_dataset | 0.708187 |
2305.09678 | Alireza Dehlaghi Ghadim | Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, Hans
Hansson | Anomaly Detection Dataset for Industrial Control Systems | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Over the past few decades, Industrial Control Systems (ICSs) have been
targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs
are connected to the internet. Using Machine Learning (ML) for Intrusion
Detection Systems (IDS) is a promising approach for ICS cyber protection, but
the lack of suitable datasets for evaluating ML algorithms is a challenge.
Although there are a few commonly used datasets, they may not reflect realistic
ICS network data, lack necessary features for effective anomaly detection, or
be outdated. This paper presents the 'ICS-Flow' dataset, which offers network
data and process state variables logs for supervised and unsupervised ML-based
IDS assessment. The network data includes normal and anomalous network packets
and flows captured from simulated ICS components and emulated networks. The
anomalies were injected into the system through various attack techniques
commonly used by hackers to modify network traffic and compromise ICSs. We also
proposed open-source tools, `ICSFlowGenerator' for generating network flow
parameters from Raw network packets. The final dataset comprises over
25,000,000 raw network packets, network flow records, and process variable
logs. The paper describes the methodology used to collect and label the dataset
and provides a detailed data analysis. Finally, we implement several ML models,
including the decision tree, random forest, and artificial neural network to
detect anomalies and attacks, demonstrating that our dataset can be used
effectively for training intrusion detection ML models.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 14:52:19 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Dehlaghi-Ghadim",
"Alireza",
""
],
[
"Moghadam",
"Mahshid Helali",
""
],
[
"Balador",
"Ali",
""
],
[
"Hansson",
"Hans",
""
]
] | TITLE: Anomaly Detection Dataset for Industrial Control Systems
ABSTRACT: Over the past few decades, Industrial Control Systems (ICSs) have been
targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs
are connected to the internet. Using Machine Learning (ML) for Intrusion
Detection Systems (IDS) is a promising approach for ICS cyber protection, but
the lack of suitable datasets for evaluating ML algorithms is a challenge.
Although there are a few commonly used datasets, they may not reflect realistic
ICS network data, lack necessary features for effective anomaly detection, or
be outdated. This paper presents the 'ICS-Flow' dataset, which offers network
data and process state variables logs for supervised and unsupervised ML-based
IDS assessment. The network data includes normal and anomalous network packets
and flows captured from simulated ICS components and emulated networks. The
anomalies were injected into the system through various attack techniques
commonly used by hackers to modify network traffic and compromise ICSs. We also
proposed open-source tools, `ICSFlowGenerator' for generating network flow
parameters from Raw network packets. The final dataset comprises over
25,000,000 raw network packets, network flow records, and process variable
logs. The paper describes the methodology used to collect and label the dataset
and provides a detailed data analysis. Finally, we implement several ML models,
including the decision tree, random forest, and artificial neural network to
detect anomalies and attacks, demonstrating that our dataset can be used
effectively for training intrusion detection ML models.
| new_dataset | 0.71579 |
2305.09679 | Ghanta Sai Krishna | Ghanta Sai Krishna, Kundrapu Supriya, Sanskar Singh, Sabur Baidya | Adversarial Security and Differential Privacy in mmWave Beam Prediction
in 6G networks | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In the forthcoming era of 6G, the mmWave communication is envisioned to be
used in dense user scenarios with high bandwidth requirements, that necessitate
efficient and accurate beam prediction. Machine learning (ML) based approaches
are ushering as a critical solution for achieving such efficient beam
prediction for 6G mmWave communications. However, most contemporary ML
classifiers are quite susceptible to adversarial inputs. Attackers can easily
perturb the methodology through noise addition in the model itself. To mitigate
this, the current work presents a defensive mechanism for attenuating the
adversarial attacks against projected ML-based models for mmWave beam
anticipation by incorporating adversarial training. Furthermore, as training 6G
mmWave beam prediction model necessitates the use of large and comprehensive
datasets that could include sensitive information regarding the user's
location, differential privacy (DP) has been introduced as a technique to
preserve the confidentiality of the information by purposefully adding a low
sensitivity controlled noise in the datasets. It ensures that even if the
information about a user location could be retrieved, the attacker would have
no means to determine whether the information is significant or meaningless.
With ray-tracing simulations for various outdoor and indoor scenarios, we
illustrate the advantage of our proposed novel framework in terms of beam
prediction accuracy and effective achievable rate while ensuring the security
and privacy in communications.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 04:58:40 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Krishna",
"Ghanta Sai",
""
],
[
"Supriya",
"Kundrapu",
""
],
[
"Singh",
"Sanskar",
""
],
[
"Baidya",
"Sabur",
""
]
] | TITLE: Adversarial Security and Differential Privacy in mmWave Beam Prediction
in 6G networks
ABSTRACT: In the forthcoming era of 6G, the mmWave communication is envisioned to be
used in dense user scenarios with high bandwidth requirements, that necessitate
efficient and accurate beam prediction. Machine learning (ML) based approaches
are ushering as a critical solution for achieving such efficient beam
prediction for 6G mmWave communications. However, most contemporary ML
classifiers are quite susceptible to adversarial inputs. Attackers can easily
perturb the methodology through noise addition in the model itself. To mitigate
this, the current work presents a defensive mechanism for attenuating the
adversarial attacks against projected ML-based models for mmWave beam
anticipation by incorporating adversarial training. Furthermore, as training 6G
mmWave beam prediction model necessitates the use of large and comprehensive
datasets that could include sensitive information regarding the user's
location, differential privacy (DP) has been introduced as a technique to
preserve the confidentiality of the information by purposefully adding a low
sensitivity controlled noise in the datasets. It ensures that even if the
information about a user location could be retrieved, the attacker would have
no means to determine whether the information is significant or meaningless.
With ray-tracing simulations for various outdoor and indoor scenarios, we
illustrate the advantage of our proposed novel framework in terms of beam
prediction accuracy and effective achievable rate while ensuring the security
and privacy in communications.
| no_new_dataset | 0.70844 |
2305.09681 | Peter Plantinga | Peter Plantinga, Jaekwon Yoo, Chandra Dhir | Continual Learning for End-to-End ASR by Averaging Domain Experts | Submitted to INTERSPEECH 2023 | null | null | null | eess.AS cs.SD | http://creativecommons.org/licenses/by/4.0/ | Continual learning for end-to-end automatic speech recognition has to contend
with a number of difficulties. Fine-tuning strategies tend to lose performance
on data already seen, a process known as catastrophic forgetting. On the other
hand, strategies that freeze parameters and append tunable parameters must
maintain multiple models. We suggest a strategy that maintains only a single
model for inference and avoids catastrophic forgetting.
Our experiments show that a simple linear interpolation of several models'
parameters, each fine-tuned from the same generalist model, results in a single
model that performs well on all tested data. For our experiments we selected
two open-source end-to-end speech recognition models pre-trained on large
datasets and fine-tuned them on 3 separate datasets: SGPISpeech, CORAAL, and
DiPCo. The proposed average of domain experts model performs well on all tested
data, and has almost no loss in performance on data from the domain of original
training.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 16:19:30 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Plantinga",
"Peter",
""
],
[
"Yoo",
"Jaekwon",
""
],
[
"Dhir",
"Chandra",
""
]
] | TITLE: Continual Learning for End-to-End ASR by Averaging Domain Experts
ABSTRACT: Continual learning for end-to-end automatic speech recognition has to contend
with a number of difficulties. Fine-tuning strategies tend to lose performance
on data already seen, a process known as catastrophic forgetting. On the other
hand, strategies that freeze parameters and append tunable parameters must
maintain multiple models. We suggest a strategy that maintains only a single
model for inference and avoids catastrophic forgetting.
Our experiments show that a simple linear interpolation of several models'
parameters, each fine-tuned from the same generalist model, results in a single
model that performs well on all tested data. For our experiments we selected
two open-source end-to-end speech recognition models pre-trained on large
datasets and fine-tuned them on 3 separate datasets: SGPISpeech, CORAAL, and
DiPCo. The proposed average of domain experts model performs well on all tested
data, and has almost no loss in performance on data from the domain of original
training.
| no_new_dataset | 0.71202 |
2305.09684 | Heng Yin | Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao | Decision-based iterative fragile watermarking for model integrity
verification | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Typically, foundation models are hosted on cloud servers to meet the high
demand for their services. However, this exposes them to security risks, as
attackers can modify them after uploading to the cloud or transferring from a
local system. To address this issue, we propose an iterative decision-based
fragile watermarking algorithm that transforms normal training samples into
fragile samples that are sensitive to model changes. We then compare the output
of sensitive samples from the original model to that of the compromised model
during validation to assess the model's completeness.The proposed fragile
watermarking algorithm is an optimization problem that aims to minimize the
variance of the predicted probability distribution outputed by the target model
when fed with the converted sample.We convert normal samples to fragile samples
through multiple iterations. Our method has some advantages: (1) the iterative
update of samples is done in a decision-based black-box manner, relying solely
on the predicted probability distribution of the target model, which reduces
the risk of exposure to adversarial attacks, (2) the small-amplitude multiple
iterations approach allows the fragile samples to perform well visually, with a
PSNR of 55 dB in TinyImageNet compared to the original samples, (3) even with
changes in the overall parameters of the model of magnitude 1e-4, the fragile
samples can detect such changes, and (4) the method is independent of the
specific model structure and dataset. We demonstrate the effectiveness of our
method on multiple models and datasets, and show that it outperforms the
current state-of-the-art.
| [
{
"version": "v1",
"created": "Sat, 13 May 2023 10:36:11 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Yin",
"Zhaoxia",
""
],
[
"Yin",
"Heng",
""
],
[
"Su",
"Hang",
""
],
[
"Zhang",
"Xinpeng",
""
],
[
"Gao",
"Zhenzhe",
""
]
] | TITLE: Decision-based iterative fragile watermarking for model integrity
verification
ABSTRACT: Typically, foundation models are hosted on cloud servers to meet the high
demand for their services. However, this exposes them to security risks, as
attackers can modify them after uploading to the cloud or transferring from a
local system. To address this issue, we propose an iterative decision-based
fragile watermarking algorithm that transforms normal training samples into
fragile samples that are sensitive to model changes. We then compare the output
of sensitive samples from the original model to that of the compromised model
during validation to assess the model's completeness.The proposed fragile
watermarking algorithm is an optimization problem that aims to minimize the
variance of the predicted probability distribution outputed by the target model
when fed with the converted sample.We convert normal samples to fragile samples
through multiple iterations. Our method has some advantages: (1) the iterative
update of samples is done in a decision-based black-box manner, relying solely
on the predicted probability distribution of the target model, which reduces
the risk of exposure to adversarial attacks, (2) the small-amplitude multiple
iterations approach allows the fragile samples to perform well visually, with a
PSNR of 55 dB in TinyImageNet compared to the original samples, (3) even with
changes in the overall parameters of the model of magnitude 1e-4, the fragile
samples can detect such changes, and (4) the method is independent of the
specific model structure and dataset. We demonstrate the effectiveness of our
method on multiple models and datasets, and show that it outperforms the
current state-of-the-art.
| no_new_dataset | 0.709466 |
2305.09688 | Md. Istiak Hossain Shihab | Fazle Rabbi Rakib, Souhardya Saha Dip, Samiul Alam, Nazia Tasnim, Md.
Istiak Hossain Shihab, Md. Nazmuddoha Ansary, Syed Mobassir Hossen, Marsia
Haque Meghla, Mamunur Mamun, Farig Sadeque, Sayma Sultana Chowdhury, Tahsin
Reasat, Asif Sushmit, Ahmed Imtiaz Humayun | OOD-Speech: A Large Bengali Speech Recognition Dataset for
Out-of-Distribution Benchmarking | null | null | null | null | eess.AS cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present OOD-Speech, the first out-of-distribution (OOD) benchmarking
dataset for Bengali automatic speech recognition (ASR). Being one of the most
spoken languages globally, Bengali portrays large diversity in dialects and
prosodic features, which demands ASR frameworks to be robust towards
distribution shifts. For example, islamic religious sermons in Bengali are
delivered with a tonality that is significantly different from regular speech.
Our training dataset is collected via massively online crowdsourcing campaigns
which resulted in 1177.94 hours collected and curated from $22,645$ native
Bengali speakers from South Asia. Our test dataset comprises 23.03 hours of
speech collected and manually annotated from 17 different sources, e.g.,
Bengali TV drama, Audiobook, Talk show, Online class, and Islamic sermons to
name a few. OOD-Speech is jointly the largest publicly available speech
dataset, as well as the first out-of-distribution ASR benchmarking dataset for
Bengali.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 18:00:39 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Rakib",
"Fazle Rabbi",
""
],
[
"Dip",
"Souhardya Saha",
""
],
[
"Alam",
"Samiul",
""
],
[
"Tasnim",
"Nazia",
""
],
[
"Shihab",
"Md. Istiak Hossain",
""
],
[
"Ansary",
"Md. Nazmuddoha",
""
],
[
"Hossen",
"Syed Mobassir",
""
],
[
"Meghla",
"Marsia Haque",
""
],
[
"Mamun",
"Mamunur",
""
],
[
"Sadeque",
"Farig",
""
],
[
"Chowdhury",
"Sayma Sultana",
""
],
[
"Reasat",
"Tahsin",
""
],
[
"Sushmit",
"Asif",
""
],
[
"Humayun",
"Ahmed Imtiaz",
""
]
] | TITLE: OOD-Speech: A Large Bengali Speech Recognition Dataset for
Out-of-Distribution Benchmarking
ABSTRACT: We present OOD-Speech, the first out-of-distribution (OOD) benchmarking
dataset for Bengali automatic speech recognition (ASR). Being one of the most
spoken languages globally, Bengali portrays large diversity in dialects and
prosodic features, which demands ASR frameworks to be robust towards
distribution shifts. For example, islamic religious sermons in Bengali are
delivered with a tonality that is significantly different from regular speech.
Our training dataset is collected via massively online crowdsourcing campaigns
which resulted in 1177.94 hours collected and curated from $22,645$ native
Bengali speakers from South Asia. Our test dataset comprises 23.03 hours of
speech collected and manually annotated from 17 different sources, e.g.,
Bengali TV drama, Audiobook, Talk show, Online class, and Islamic sermons to
name a few. OOD-Speech is jointly the largest publicly available speech
dataset, as well as the first out-of-distribution ASR benchmarking dataset for
Bengali.
| new_dataset | 0.71464 |
2305.09690 | Marek Kadl\v{c}\'ik | Marek Kadl\v{c}\'ik, Adam H\'ajek, J\"urgen Kieslich, Rados{\l}aw
Winiecki | A Whisper transformer for audio captioning trained with synthetic
captions and transfer learning | null | null | null | null | cs.SD cs.LG eess.AS | http://creativecommons.org/licenses/by/4.0/ | The field of audio captioning has seen significant advancements in recent
years, driven by the availability of large-scale audio datasets and
advancements in deep learning techniques. In this technical report, we present
our approach to audio captioning, focusing on the use of a pretrained
speech-to-text Whisper model and pretraining on synthetic captions. We discuss
our training procedures and present our experiments' results, which include
model size variations, dataset mixtures, and other hyperparameters. Our
findings demonstrate the impact of different training strategies on the
performance of the audio captioning model. Our code and trained models are
publicly available on GitHub and Hugging Face Hub.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 22:20:07 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Kadlčík",
"Marek",
""
],
[
"Hájek",
"Adam",
""
],
[
"Kieslich",
"Jürgen",
""
],
[
"Winiecki",
"Radosław",
""
]
] | TITLE: A Whisper transformer for audio captioning trained with synthetic
captions and transfer learning
ABSTRACT: The field of audio captioning has seen significant advancements in recent
years, driven by the availability of large-scale audio datasets and
advancements in deep learning techniques. In this technical report, we present
our approach to audio captioning, focusing on the use of a pretrained
speech-to-text Whisper model and pretraining on synthetic captions. We discuss
our training procedures and present our experiments' results, which include
model size variations, dataset mixtures, and other hyperparameters. Our
findings demonstrate the impact of different training strategies on the
performance of the audio captioning model. Our code and trained models are
publicly available on GitHub and Hugging Face Hub.
| no_new_dataset | 0.709585 |
2305.09691 | Yongwan Gim | Yongwan Gim, Kyushik Min | Evaluation Strategy of Time-series Anomaly Detection with Decay Function | 20 pages with references and appendix | null | null | null | cs.LG cs.AI stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent algorithms of time-series anomaly detection have been evaluated by
applying a Point Adjustment (PA) protocol. However, the PA protocol has a
problem of overestimating the performance of the detection algorithms because
it only depends on the number of detected abnormal segments and their size. We
propose a novel evaluation protocol called the Point-Adjusted protocol with
decay function (PAdf) to evaluate the time-series anomaly detection algorithm
by reflecting the following ideal requirements: detect anomalies quickly and
accurately without false alarms. This paper theoretically and experimentally
shows that the PAdf protocol solves the over- and under-estimation problems of
existing protocols such as PA and PA\%K. By conducting re-evaluations of SOTA
models in benchmark datasets, we show that the PA protocol only focuses on
finding many anomalous segments, whereas the score of the PAdf protocol
considers not only finding many segments but also detecting anomalies quickly
without delay.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 23:55:49 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Gim",
"Yongwan",
""
],
[
"Min",
"Kyushik",
""
]
] | TITLE: Evaluation Strategy of Time-series Anomaly Detection with Decay Function
ABSTRACT: Recent algorithms of time-series anomaly detection have been evaluated by
applying a Point Adjustment (PA) protocol. However, the PA protocol has a
problem of overestimating the performance of the detection algorithms because
it only depends on the number of detected abnormal segments and their size. We
propose a novel evaluation protocol called the Point-Adjusted protocol with
decay function (PAdf) to evaluate the time-series anomaly detection algorithm
by reflecting the following ideal requirements: detect anomalies quickly and
accurately without false alarms. This paper theoretically and experimentally
shows that the PAdf protocol solves the over- and under-estimation problems of
existing protocols such as PA and PA\%K. By conducting re-evaluations of SOTA
models in benchmark datasets, we show that the PA protocol only focuses on
finding many anomalous segments, whereas the score of the PAdf protocol
considers not only finding many segments but also detecting anomalies quickly
without delay.
| no_new_dataset | 0.711193 |
2305.09696 | Tianping Zhang | Tianping Zhang, Shaowen Wang, Shuicheng Yan, Jian Li, Qian Liu | Generative Table Pre-training Empowers Models for Tabular Prediction | null | null | null | null | cs.LG cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the topic of table pre-training has attracted considerable research
interest. However, how to employ table pre-training to boost the performance of
tabular prediction remains an open challenge. In this paper, we propose TapTap,
the first attempt that leverages table pre-training to empower models for
tabular prediction. After pre-training on a large corpus of real-world tabular
data, TapTap can generate high-quality synthetic tables to support various
applications on tabular data, including privacy protection, low resource
regime, missing value imputation, and imbalanced classification. Extensive
experiments on 12 datasets demonstrate that TapTap outperforms a total of 16
baselines in different scenarios. Meanwhile, it can be easily combined with
various backbone models, including LightGBM, Multilayer Perceptron (MLP) and
Transformer. Moreover, with the aid of table pre-training, models trained using
synthetic data generated by TapTap can even compete with models using the
original dataset on half of the experimental datasets, marking a milestone in
the development of synthetic tabular data generation. The codes are available
at https://github.com/ZhangTP1996/TapTap.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 06:37:38 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Zhang",
"Tianping",
""
],
[
"Wang",
"Shaowen",
""
],
[
"Yan",
"Shuicheng",
""
],
[
"Li",
"Jian",
""
],
[
"Liu",
"Qian",
""
]
] | TITLE: Generative Table Pre-training Empowers Models for Tabular Prediction
ABSTRACT: Recently, the topic of table pre-training has attracted considerable research
interest. However, how to employ table pre-training to boost the performance of
tabular prediction remains an open challenge. In this paper, we propose TapTap,
the first attempt that leverages table pre-training to empower models for
tabular prediction. After pre-training on a large corpus of real-world tabular
data, TapTap can generate high-quality synthetic tables to support various
applications on tabular data, including privacy protection, low resource
regime, missing value imputation, and imbalanced classification. Extensive
experiments on 12 datasets demonstrate that TapTap outperforms a total of 16
baselines in different scenarios. Meanwhile, it can be easily combined with
various backbone models, including LightGBM, Multilayer Perceptron (MLP) and
Transformer. Moreover, with the aid of table pre-training, models trained using
synthetic data generated by TapTap can even compete with models using the
original dataset on half of the experimental datasets, marking a milestone in
the development of synthetic tabular data generation. The codes are available
at https://github.com/ZhangTP1996/TapTap.
| no_new_dataset | 0.708427 |
2305.09699 | Zhangxuan Gu | Zhangxuan Gu, Zhuoer Xu, Haoxing Chen, Jun Lan, Changhua Meng,
Weiqiang Wang | Mobile User Interface Element Detection Via Adaptively Prompt Tuning | Accepted by CVPR23 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recent object detection approaches rely on pretrained vision-language models
for image-text alignment. However, they fail to detect the Mobile User
Interface (MUI) element since it contains additional OCR information, which
describes its content and function but is often ignored. In this paper, we
develop a new MUI element detection dataset named MUI-zh and propose an
Adaptively Prompt Tuning (APT) module to take advantage of discriminating OCR
information. APT is a lightweight and effective module to jointly optimize
category prompts across different modalities. For every element, APT uniformly
encodes its visual features and OCR descriptions to dynamically adjust the
representation of frozen category prompts. We evaluate the effectiveness of our
plug-and-play APT upon several existing CLIP-based detectors for both standard
and open-vocabulary MUI element detection. Extensive experiments show that our
method achieves considerable improvements on two datasets. The datasets is
available at \url{github.com/antmachineintelligence/MUI-zh}.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 07:16:36 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Gu",
"Zhangxuan",
""
],
[
"Xu",
"Zhuoer",
""
],
[
"Chen",
"Haoxing",
""
],
[
"Lan",
"Jun",
""
],
[
"Meng",
"Changhua",
""
],
[
"Wang",
"Weiqiang",
""
]
] | TITLE: Mobile User Interface Element Detection Via Adaptively Prompt Tuning
ABSTRACT: Recent object detection approaches rely on pretrained vision-language models
for image-text alignment. However, they fail to detect the Mobile User
Interface (MUI) element since it contains additional OCR information, which
describes its content and function but is often ignored. In this paper, we
develop a new MUI element detection dataset named MUI-zh and propose an
Adaptively Prompt Tuning (APT) module to take advantage of discriminating OCR
information. APT is a lightweight and effective module to jointly optimize
category prompts across different modalities. For every element, APT uniformly
encodes its visual features and OCR descriptions to dynamically adjust the
representation of frozen category prompts. We evaluate the effectiveness of our
plug-and-play APT upon several existing CLIP-based detectors for both standard
and open-vocabulary MUI element detection. Extensive experiments show that our
method achieves considerable improvements on two datasets. The datasets is
available at \url{github.com/antmachineintelligence/MUI-zh}.
| new_dataset | 0.71446 |
2305.09703 | Prayag Tiwari Dr. | Guojun Liang, Prayag Tiwari, S{\l}awomir Nowaczyk, Stefan Byttner,
Fernando Alonso-Fernandez | Dynamic Causal Explanation Based Diffusion-Variational Graph Neural
Network for Spatio-temporal Forecasting | null | null | null | null | cs.LG cs.AI cs.SI | http://creativecommons.org/licenses/by/4.0/ | Graph neural networks (GNNs), especially dynamic GNNs, have become a research
hotspot in spatio-temporal forecasting problems. While many dynamic graph
construction methods have been developed, relatively few of them explore the
causal relationship between neighbour nodes. Thus, the resulting models lack
strong explainability for the causal relationship between the neighbour nodes
of the dynamically generated graphs, which can easily lead to a risk in
subsequent decisions. Moreover, few of them consider the uncertainty and noise
of dynamic graphs based on the time series datasets, which are ubiquitous in
real-world graph structure networks. In this paper, we propose a novel Dynamic
Diffusion-Variational Graph Neural Network (DVGNN) for spatio-temporal
forecasting. For dynamic graph construction, an unsupervised generative model
is devised. Two layers of graph convolutional network (GCN) are applied to
calculate the posterior distribution of the latent node embeddings in the
encoder stage. Then, a diffusion model is used to infer the dynamic link
probability and reconstruct causal graphs in the decoder stage adaptively. The
new loss function is derived theoretically, and the reparameterization trick is
adopted in estimating the probability distribution of the dynamic graphs by
Evidence Lower Bound during the backpropagation period. After obtaining the
generated graphs, dynamic GCN and temporal attention are applied to predict
future states. Experiments are conducted on four real-world datasets of
different graph structures in different domains. The results demonstrate that
the proposed DVGNN model outperforms state-of-the-art approaches and achieves
outstanding Root Mean Squared Error result while exhibiting higher robustness.
Also, by F1-score and probability distribution analysis, we demonstrate that
DVGNN better reflects the causal relationship and uncertainty of dynamic
graphs.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 11:38:19 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Liang",
"Guojun",
""
],
[
"Tiwari",
"Prayag",
""
],
[
"Nowaczyk",
"Sławomir",
""
],
[
"Byttner",
"Stefan",
""
],
[
"Alonso-Fernandez",
"Fernando",
""
]
] | TITLE: Dynamic Causal Explanation Based Diffusion-Variational Graph Neural
Network for Spatio-temporal Forecasting
ABSTRACT: Graph neural networks (GNNs), especially dynamic GNNs, have become a research
hotspot in spatio-temporal forecasting problems. While many dynamic graph
construction methods have been developed, relatively few of them explore the
causal relationship between neighbour nodes. Thus, the resulting models lack
strong explainability for the causal relationship between the neighbour nodes
of the dynamically generated graphs, which can easily lead to a risk in
subsequent decisions. Moreover, few of them consider the uncertainty and noise
of dynamic graphs based on the time series datasets, which are ubiquitous in
real-world graph structure networks. In this paper, we propose a novel Dynamic
Diffusion-Variational Graph Neural Network (DVGNN) for spatio-temporal
forecasting. For dynamic graph construction, an unsupervised generative model
is devised. Two layers of graph convolutional network (GCN) are applied to
calculate the posterior distribution of the latent node embeddings in the
encoder stage. Then, a diffusion model is used to infer the dynamic link
probability and reconstruct causal graphs in the decoder stage adaptively. The
new loss function is derived theoretically, and the reparameterization trick is
adopted in estimating the probability distribution of the dynamic graphs by
Evidence Lower Bound during the backpropagation period. After obtaining the
generated graphs, dynamic GCN and temporal attention are applied to predict
future states. Experiments are conducted on four real-world datasets of
different graph structures in different domains. The results demonstrate that
the proposed DVGNN model outperforms state-of-the-art approaches and achieves
outstanding Root Mean Squared Error result while exhibiting higher robustness.
Also, by F1-score and probability distribution analysis, we demonstrate that
DVGNN better reflects the causal relationship and uncertainty of dynamic
graphs.
| no_new_dataset | 0.711067 |
2305.09705 | Daniel Severo | Daniel Severo, James Townsend, Ashish Khisti, Alireza Makhzani | Random Edge Coding: One-Shot Bits-Back Coding of Large Labeled Graphs | Published at ICML 2023 | null | null | null | cs.LG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a one-shot method for compressing large labeled graphs called
Random Edge Coding. When paired with a parameter-free model based on P\'olya's
Urn, the worst-case computational and memory complexities scale quasi-linearly
and linearly with the number of observed edges, making it efficient on sparse
graphs, and requires only integer arithmetic. Key to our method is bits-back
coding, which is used to sample edges and vertices without replacement from the
edge-list in a way that preserves the structure of the graph. Optimality is
proven under a class of random graph models that are invariant to permutations
of the edges and of vertices within an edge. Experiments indicate Random Edge
Coding can achieve competitive compression performance on real-world network
datasets and scales to graphs with millions of nodes and edges.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 12:23:18 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Severo",
"Daniel",
""
],
[
"Townsend",
"James",
""
],
[
"Khisti",
"Ashish",
""
],
[
"Makhzani",
"Alireza",
""
]
] | TITLE: Random Edge Coding: One-Shot Bits-Back Coding of Large Labeled Graphs
ABSTRACT: We present a one-shot method for compressing large labeled graphs called
Random Edge Coding. When paired with a parameter-free model based on P\'olya's
Urn, the worst-case computational and memory complexities scale quasi-linearly
and linearly with the number of observed edges, making it efficient on sparse
graphs, and requires only integer arithmetic. Key to our method is bits-back
coding, which is used to sample edges and vertices without replacement from the
edge-list in a way that preserves the structure of the graph. Optimality is
proven under a class of random graph models that are invariant to permutations
of the edges and of vertices within an edge. Experiments indicate Random Edge
Coding can achieve competitive compression performance on real-world network
datasets and scales to graphs with millions of nodes and edges.
| no_new_dataset | 0.710245 |
2305.09726 | George Eskandar | George Eskandar, Diandian Guo, Karim Guirguis, Bin Yang | Towards Pragmatic Semantic Image Synthesis for Urban Scenes | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The need for large amounts of training and validation data is a huge concern
in scaling AI algorithms for autonomous driving. Semantic Image Synthesis
(SIS), or label-to-image translation, promises to address this issue by
translating semantic layouts to images, providing a controllable generation of
photorealistic data. However, they require a large amount of paired data,
incurring extra costs. In this work, we present a new task: given a dataset
with synthetic images and labels and a dataset with unlabeled real images, our
goal is to learn a model that can generate images with the content of the input
mask and the appearance of real images. This new task reframes the well-known
unsupervised SIS task in a more practical setting, where we leverage cheaply
available synthetic data from a driving simulator to learn how to generate
photorealistic images of urban scenes. This stands in contrast to previous
works, which assume that labels and images come from the same domain but are
unpaired during training. We find that previous unsupervised works underperform
on this task, as they do not handle distribution shifts between two different
domains. To bypass these problems, we propose a novel framework with two main
contributions. First, we leverage the synthetic image as a guide to the content
of the generated image by penalizing the difference between their high-level
features on a patch level. Second, in contrast to previous works which employ
one discriminator that overfits the target domain semantic distribution, we
employ a discriminator for the whole image and multiscale discriminators on the
image patches. Extensive comparisons on the benchmarks GTA-V $\rightarrow$
Cityscapes and GTA-V $\rightarrow$ Mapillary show the superior performance of
the proposed model against state-of-the-art on this task.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:01:12 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Eskandar",
"George",
""
],
[
"Guo",
"Diandian",
""
],
[
"Guirguis",
"Karim",
""
],
[
"Yang",
"Bin",
""
]
] | TITLE: Towards Pragmatic Semantic Image Synthesis for Urban Scenes
ABSTRACT: The need for large amounts of training and validation data is a huge concern
in scaling AI algorithms for autonomous driving. Semantic Image Synthesis
(SIS), or label-to-image translation, promises to address this issue by
translating semantic layouts to images, providing a controllable generation of
photorealistic data. However, they require a large amount of paired data,
incurring extra costs. In this work, we present a new task: given a dataset
with synthetic images and labels and a dataset with unlabeled real images, our
goal is to learn a model that can generate images with the content of the input
mask and the appearance of real images. This new task reframes the well-known
unsupervised SIS task in a more practical setting, where we leverage cheaply
available synthetic data from a driving simulator to learn how to generate
photorealistic images of urban scenes. This stands in contrast to previous
works, which assume that labels and images come from the same domain but are
unpaired during training. We find that previous unsupervised works underperform
on this task, as they do not handle distribution shifts between two different
domains. To bypass these problems, we propose a novel framework with two main
contributions. First, we leverage the synthetic image as a guide to the content
of the generated image by penalizing the difference between their high-level
features on a patch level. Second, in contrast to previous works which employ
one discriminator that overfits the target domain semantic distribution, we
employ a discriminator for the whole image and multiscale discriminators on the
image patches. Extensive comparisons on the benchmarks GTA-V $\rightarrow$
Cityscapes and GTA-V $\rightarrow$ Mapillary show the superior performance of
the proposed model against state-of-the-art on this task.
| no_new_dataset | 0.708213 |
2305.09729 | Xinyu Fu | Xinyu Fu, Irwin King | FedHGN: A Federated Framework for Heterogeneous Graph Neural Networks | Accepted by IJCAI 2023; 11 pages, 4 figures, 9 tables; code available
at https://github.com/cynricfu/FedHGN | null | null | null | cs.LG cs.AI cs.DC cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneous graph neural networks (HGNNs) can learn from typed and
relational graph data more effectively than conventional GNNs. With larger
parameter spaces, HGNNs may require more training data, which is often scarce
in real-world applications due to privacy regulations (e.g., GDPR). Federated
graph learning (FGL) enables multiple clients to train a GNN collaboratively
without sharing their local data. However, existing FGL methods mainly focus on
homogeneous GNNs or knowledge graph embeddings; few have considered
heterogeneous graphs and HGNNs. In federated heterogeneous graph learning,
clients may have private graph schemas. Conventional FL/FGL methods attempting
to define a global HGNN model would violate schema privacy. To address these
challenges, we propose FedHGN, a novel and general FGL framework for HGNNs.
FedHGN adopts schema-weight decoupling to enable schema-agnostic knowledge
sharing and employs coefficients alignment to stabilize the training process
and improve HGNN performance. With better privacy preservation, FedHGN
consistently outperforms local training and conventional FL methods on three
widely adopted heterogeneous graph datasets with varying client numbers. The
code is available at https://github.com/cynricfu/FedHGN .
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:01:49 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Fu",
"Xinyu",
""
],
[
"King",
"Irwin",
""
]
] | TITLE: FedHGN: A Federated Framework for Heterogeneous Graph Neural Networks
ABSTRACT: Heterogeneous graph neural networks (HGNNs) can learn from typed and
relational graph data more effectively than conventional GNNs. With larger
parameter spaces, HGNNs may require more training data, which is often scarce
in real-world applications due to privacy regulations (e.g., GDPR). Federated
graph learning (FGL) enables multiple clients to train a GNN collaboratively
without sharing their local data. However, existing FGL methods mainly focus on
homogeneous GNNs or knowledge graph embeddings; few have considered
heterogeneous graphs and HGNNs. In federated heterogeneous graph learning,
clients may have private graph schemas. Conventional FL/FGL methods attempting
to define a global HGNN model would violate schema privacy. To address these
challenges, we propose FedHGN, a novel and general FGL framework for HGNNs.
FedHGN adopts schema-weight decoupling to enable schema-agnostic knowledge
sharing and employs coefficients alignment to stabilize the training process
and improve HGNN performance. With better privacy preservation, FedHGN
consistently outperforms local training and conventional FL methods on three
widely adopted heterogeneous graph datasets with varying client numbers. The
code is available at https://github.com/cynricfu/FedHGN .
| no_new_dataset | 0.710848 |
2305.09731 | Jane Pan | Jane Pan, Tianyu Gao, Howard Chen, Danqi Chen | What In-Context Learning "Learns" In-Context: Disentangling Task
Recognition and Task Learning | Accepted to Findings of ACL 2023; The code is available at
https://github.com/princeton-nlp/WhatICLLearns | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large language models (LLMs) exploit in-context learning (ICL) to solve tasks
with only a few demonstrations, but its mechanisms are not yet well-understood.
Some works suggest that LLMs only recall already learned concepts from
pre-training, while others hint that ICL performs implicit learning over
demonstrations. We characterize two ways through which ICL leverages
demonstrations. Task recognition (TR) captures the extent to which LLMs can
recognize a task through demonstrations -- even without ground-truth labels --
and apply their pre-trained priors, whereas task learning (TL) is the ability
to capture new input-label mappings unseen in pre-training. Using a wide range
of classification datasets and three LLM families (GPT-3, LLaMA and OPT), we
design controlled experiments to disentangle the roles of TR and TL in ICL. We
show that (1) models can achieve non-trivial performance with only TR, and TR
does not further improve with larger models or more demonstrations; (2) LLMs
acquire TL as the model scales, and TL's performance consistently improves with
more demonstrations in context. Our findings unravel two different forces
behind ICL and we advocate for discriminating them in future ICL research due
to their distinct nature.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:05:19 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Pan",
"Jane",
""
],
[
"Gao",
"Tianyu",
""
],
[
"Chen",
"Howard",
""
],
[
"Chen",
"Danqi",
""
]
] | TITLE: What In-Context Learning "Learns" In-Context: Disentangling Task
Recognition and Task Learning
ABSTRACT: Large language models (LLMs) exploit in-context learning (ICL) to solve tasks
with only a few demonstrations, but its mechanisms are not yet well-understood.
Some works suggest that LLMs only recall already learned concepts from
pre-training, while others hint that ICL performs implicit learning over
demonstrations. We characterize two ways through which ICL leverages
demonstrations. Task recognition (TR) captures the extent to which LLMs can
recognize a task through demonstrations -- even without ground-truth labels --
and apply their pre-trained priors, whereas task learning (TL) is the ability
to capture new input-label mappings unseen in pre-training. Using a wide range
of classification datasets and three LLM families (GPT-3, LLaMA and OPT), we
design controlled experiments to disentangle the roles of TR and TL in ICL. We
show that (1) models can achieve non-trivial performance with only TR, and TR
does not further improve with larger models or more demonstrations; (2) LLMs
acquire TL as the model scales, and TL's performance consistently improves with
more demonstrations in context. Our findings unravel two different forces
behind ICL and we advocate for discriminating them in future ICL research due
to their distinct nature.
| no_new_dataset | 0.708408 |
2305.09736 | Sanyam Jain | Sanyam Jain | ADDSL: Hand Gesture Detection and Sign Language Recognition on Annotated
Danish Sign Language | null | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a long time, detecting hand gestures and recognizing them as letters or
numbers has been a challenging task. This creates communication barriers for
individuals with disabilities. This paper introduces a new dataset, the
Annotated Dataset for Danish Sign Language (ADDSL). Annota-tions for the
dataset were made using the open-source tool LabelImg in the YOLO format. Using
this dataset, a one-stage ob-ject detector model (YOLOv5) was trained with the
CSP-DarkNet53 backbone and YOLOv3 head to recognize letters (A-Z) and numbers
(0-9) using only seven unique images per class (without augmen-tation). Five
models were trained with 350 epochs, resulting in an average inference time of
9.02ms per image and a best accu-racy of 92% when compared to previous
research. Our results show that modified model is efficient and more accurate
than existing work in the same field. The code repository for our model is
available at the GitHub repository https://github.com/s4nyam/pvt-addsl.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:08:24 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Jain",
"Sanyam",
""
]
] | TITLE: ADDSL: Hand Gesture Detection and Sign Language Recognition on Annotated
Danish Sign Language
ABSTRACT: For a long time, detecting hand gestures and recognizing them as letters or
numbers has been a challenging task. This creates communication barriers for
individuals with disabilities. This paper introduces a new dataset, the
Annotated Dataset for Danish Sign Language (ADDSL). Annota-tions for the
dataset were made using the open-source tool LabelImg in the YOLO format. Using
this dataset, a one-stage ob-ject detector model (YOLOv5) was trained with the
CSP-DarkNet53 backbone and YOLOv3 head to recognize letters (A-Z) and numbers
(0-9) using only seven unique images per class (without augmen-tation). Five
models were trained with 350 epochs, resulting in an average inference time of
9.02ms per image and a best accu-racy of 92% when compared to previous
research. Our results show that modified model is efficient and more accurate
than existing work in the same field. The code repository for our model is
available at the GitHub repository https://github.com/s4nyam/pvt-addsl.
| new_dataset | 0.715026 |
2305.09738 | Sanyam Jain | Sanyam Jain | CQural: A Novel CNN based Hybrid Architecture for Quantum Continual
Machine Learning | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Training machine learning models in an incremental fashion is not only
important but also an efficient way to achieve artificial general intelligence.
The ability that humans possess of continuous or lifelong learning helps them
to not forget previously learned tasks. However, current neural network models
are prone to catastrophic forgetting when it comes to continual learning. Many
researchers have come up with several techniques in order to reduce the effect
of forgetting from neural networks, however, all techniques are studied
classically with a very less focus on changing the machine learning model
architecture. In this research paper, we show that it is not only possible to
circumvent catastrophic forgetting in continual learning with novel hybrid
classical-quantum neural networks, but also explains what features are most
important to learn for classification. In addition, we also claim that if the
model is trained with these explanations, it tends to give better performance
and learn specific features that are far from the decision boundary. Finally,
we present the experimental results to show comparisons between classical and
classical-quantum hybrid architectures on benchmark MNIST and CIFAR-10
datasets. After successful runs of learning procedure, we found hybrid neural
network outperforms classical one in terms of remembering the right evidences
of the class-specific features.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:19:12 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Jain",
"Sanyam",
""
]
] | TITLE: CQural: A Novel CNN based Hybrid Architecture for Quantum Continual
Machine Learning
ABSTRACT: Training machine learning models in an incremental fashion is not only
important but also an efficient way to achieve artificial general intelligence.
The ability that humans possess of continuous or lifelong learning helps them
to not forget previously learned tasks. However, current neural network models
are prone to catastrophic forgetting when it comes to continual learning. Many
researchers have come up with several techniques in order to reduce the effect
of forgetting from neural networks, however, all techniques are studied
classically with a very less focus on changing the machine learning model
architecture. In this research paper, we show that it is not only possible to
circumvent catastrophic forgetting in continual learning with novel hybrid
classical-quantum neural networks, but also explains what features are most
important to learn for classification. In addition, we also claim that if the
model is trained with these explanations, it tends to give better performance
and learn specific features that are far from the decision boundary. Finally,
we present the experimental results to show comparisons between classical and
classical-quantum hybrid architectures on benchmark MNIST and CIFAR-10
datasets. After successful runs of learning procedure, we found hybrid neural
network outperforms classical one in terms of remembering the right evidences
of the class-specific features.
| no_new_dataset | 0.709453 |
2305.09750 | Shangbang Long | Shangbang Long, Siyang Qin, Dmitry Panteleev, Alessandro Bissacco,
Yasuhisa Fujii, Michalis Raptis | ICDAR 2023 Competition on Hierarchical Text Detection and Recognition | ICDAR 2023 competition report by organizers (accepted and to be
published officially later) | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | We organize a competition on hierarchical text detection and recognition. The
competition is aimed to promote research into deep learning models and systems
that can jointly perform text detection and recognition and geometric layout
analysis. We present details of the proposed competition organization,
including tasks, datasets, evaluations, and schedule. During the competition
period (from January 2nd 2023 to April 1st 2023), at least 50 submissions from
more than 20 teams were made in the 2 proposed tasks. Considering the number of
teams and submissions, we conclude that the HierText competition has been
successfully held. In this report, we will also present the competition results
and insights from them.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 18:56:12 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Long",
"Shangbang",
""
],
[
"Qin",
"Siyang",
""
],
[
"Panteleev",
"Dmitry",
""
],
[
"Bissacco",
"Alessandro",
""
],
[
"Fujii",
"Yasuhisa",
""
],
[
"Raptis",
"Michalis",
""
]
] | TITLE: ICDAR 2023 Competition on Hierarchical Text Detection and Recognition
ABSTRACT: We organize a competition on hierarchical text detection and recognition. The
competition is aimed to promote research into deep learning models and systems
that can jointly perform text detection and recognition and geometric layout
analysis. We present details of the proposed competition organization,
including tasks, datasets, evaluations, and schedule. During the competition
period (from January 2nd 2023 to April 1st 2023), at least 50 submissions from
more than 20 teams were made in the 2 proposed tasks. Considering the number of
teams and submissions, we conclude that the HierText competition has been
successfully held. In this report, we will also present the competition results
and insights from them.
| no_new_dataset | 0.710823 |
2305.09756 | Nayeon Kim | Nayeon Kim, Yinhua Piao, Sun Kim | Clinical Note Owns its Hierarchy: Multi-Level Hypergraph Neural Networks
for Patient-Level Representation Learning | ACL 2023 Main Conference | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Leveraging knowledge from electronic health records (EHRs) to predict a
patient's condition is essential to the effective delivery of appropriate care.
Clinical notes of patient EHRs contain valuable information from healthcare
professionals, but have been underused due to their difficult contents and
complex hierarchies. Recently, hypergraph-based methods have been proposed for
document classifications. Directly adopting existing hypergraph methods on
clinical notes cannot sufficiently utilize the hierarchy information of the
patient, which can degrade clinical semantic information by (1) frequent
neutral words and (2) hierarchies with imbalanced distribution. Thus, we
propose a taxonomy-aware multi-level hypergraph neural network (TM-HGNN), where
multi-level hypergraphs assemble useful neutral words with rare keywords via
note and taxonomy level hyperedges to retain the clinical semantic information.
The constructed patient hypergraphs are fed into hierarchical message passing
layers for learning more balanced multi-level knowledge at the note and
taxonomy levels. We validate the effectiveness of TM-HGNN by conducting
extensive experiments with MIMIC-III dataset on benchmark in-hospital-mortality
prediction.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 19:08:18 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Kim",
"Nayeon",
""
],
[
"Piao",
"Yinhua",
""
],
[
"Kim",
"Sun",
""
]
] | TITLE: Clinical Note Owns its Hierarchy: Multi-Level Hypergraph Neural Networks
for Patient-Level Representation Learning
ABSTRACT: Leveraging knowledge from electronic health records (EHRs) to predict a
patient's condition is essential to the effective delivery of appropriate care.
Clinical notes of patient EHRs contain valuable information from healthcare
professionals, but have been underused due to their difficult contents and
complex hierarchies. Recently, hypergraph-based methods have been proposed for
document classifications. Directly adopting existing hypergraph methods on
clinical notes cannot sufficiently utilize the hierarchy information of the
patient, which can degrade clinical semantic information by (1) frequent
neutral words and (2) hierarchies with imbalanced distribution. Thus, we
propose a taxonomy-aware multi-level hypergraph neural network (TM-HGNN), where
multi-level hypergraphs assemble useful neutral words with rare keywords via
note and taxonomy level hyperedges to retain the clinical semantic information.
The constructed patient hypergraphs are fed into hierarchical message passing
layers for learning more balanced multi-level knowledge at the note and
taxonomy levels. We validate the effectiveness of TM-HGNN by conducting
extensive experiments with MIMIC-III dataset on benchmark in-hospital-mortality
prediction.
| no_new_dataset | 0.711675 |
2305.09760 | Insoon Yang | Astghik Hakobyan, Insoon Yang | Distributionally Robust Differential Dynamic Programming with
Wasserstein Distance | null | null | null | null | eess.SY cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Differential dynamic programming (DDP) is a popular technique for solving
nonlinear optimal control problems with locally quadratic approximations.
However, existing DDP methods are not designed for stochastic systems with
unknown disturbance distributions. To address this limitation, we propose a
novel DDP method that approximately solves the Wasserstein distributionally
robust control (WDRC) problem, where the true disturbance distribution is
unknown but a disturbance sample dataset is given. Our approach aims to develop
a practical and computationally efficient DDP solution. To achieve this, we use
the Kantrovich duality principle to decompose the value function in a novel way
and derive closed-form expressions of the distributionally robust control and
worst-case distribution policies to be used in each iteration of our DDP
algorithm. This characterization makes our method tractable and scalable
without the need for numerically solving any minimax optimization problems. The
superior out-of-sample performance and scalability of our algorithm are
demonstrated through kinematic car navigation and coupled oscillator problems.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 19:20:59 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Hakobyan",
"Astghik",
""
],
[
"Yang",
"Insoon",
""
]
] | TITLE: Distributionally Robust Differential Dynamic Programming with
Wasserstein Distance
ABSTRACT: Differential dynamic programming (DDP) is a popular technique for solving
nonlinear optimal control problems with locally quadratic approximations.
However, existing DDP methods are not designed for stochastic systems with
unknown disturbance distributions. To address this limitation, we propose a
novel DDP method that approximately solves the Wasserstein distributionally
robust control (WDRC) problem, where the true disturbance distribution is
unknown but a disturbance sample dataset is given. Our approach aims to develop
a practical and computationally efficient DDP solution. To achieve this, we use
the Kantrovich duality principle to decompose the value function in a novel way
and derive closed-form expressions of the distributionally robust control and
worst-case distribution policies to be used in each iteration of our DDP
algorithm. This characterization makes our method tractable and scalable
without the need for numerically solving any minimax optimization problems. The
superior out-of-sample performance and scalability of our algorithm are
demonstrated through kinematic car navigation and coupled oscillator problems.
| no_new_dataset | 0.708055 |
2305.09777 | Md Manjurul Ahsan | Md Manjurul Ahsan, Shivakumar Raman, Zahed Siddique | BSGAN: A Novel Oversampling Technique for Imbalanced Pattern
Recognitions | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Class imbalanced problems (CIP) are one of the potential challenges in
developing unbiased Machine Learning (ML) models for predictions. CIP occurs
when data samples are not equally distributed between the two or multiple
classes. Borderline-Synthetic Minority Oversampling Techniques (SMOTE) is one
of the approaches that has been used to balance the imbalance data by
oversampling the minor (limited) samples. One of the potential drawbacks of
existing Borderline-SMOTE is that it focuses on the data samples that lay at
the border point and gives more attention to the extreme observations,
ultimately limiting the creation of more diverse data after oversampling, and
that is the almost scenario for the most of the borderline-SMOTE based
oversampling strategies. As an effect, marginalization occurs after
oversampling. To address these issues, in this work, we propose a hybrid
oversampling technique by combining the power of borderline SMOTE and
Generative Adversarial Network to generate more diverse data that follow
Gaussian distributions. We named it BSGAN and tested it on four highly
imbalanced datasets: Ecoli, Wine quality, Yeast, and Abalone. Our preliminary
computational results reveal that BSGAN outperformed existing borderline SMOTE
and GAN-based oversampling techniques and created a more diverse dataset that
follows normal distribution after oversampling effect.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 20:02:39 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Ahsan",
"Md Manjurul",
""
],
[
"Raman",
"Shivakumar",
""
],
[
"Siddique",
"Zahed",
""
]
] | TITLE: BSGAN: A Novel Oversampling Technique for Imbalanced Pattern
Recognitions
ABSTRACT: Class imbalanced problems (CIP) are one of the potential challenges in
developing unbiased Machine Learning (ML) models for predictions. CIP occurs
when data samples are not equally distributed between the two or multiple
classes. Borderline-Synthetic Minority Oversampling Techniques (SMOTE) is one
of the approaches that has been used to balance the imbalance data by
oversampling the minor (limited) samples. One of the potential drawbacks of
existing Borderline-SMOTE is that it focuses on the data samples that lay at
the border point and gives more attention to the extreme observations,
ultimately limiting the creation of more diverse data after oversampling, and
that is the almost scenario for the most of the borderline-SMOTE based
oversampling strategies. As an effect, marginalization occurs after
oversampling. To address these issues, in this work, we propose a hybrid
oversampling technique by combining the power of borderline SMOTE and
Generative Adversarial Network to generate more diverse data that follow
Gaussian distributions. We named it BSGAN and tested it on four highly
imbalanced datasets: Ecoli, Wine quality, Yeast, and Abalone. Our preliminary
computational results reveal that BSGAN outperformed existing borderline SMOTE
and GAN-based oversampling techniques and created a more diverse dataset that
follows normal distribution after oversampling effect.
| no_new_dataset | 0.71039 |
2305.09786 | Okan D\"uzyel | Okan D\"uzyel | A Comparative Study of GAN-Generated Handwriting Images and MNIST Images
using t-SNE Visualization | 7 pages, 7 figures | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The quality of GAN-generated images on the MNIST dataset was explored in this
paper by comparing them to the original images using t-distributed stochastic
neighbor embedding (t- SNE) visualization. A GAN was trained with the dataset
to generate images and the result of generating all synthetic images, the
corresponding labels were saved. The dimensionality of the generated images and
the original MNIST dataset was reduced using t-SNE and the resulting embeddings
were plotted. The rate of the GAN-generated images was examined by comparing
the t-SNE plots of the generated images and the original MNIST images. It was
found that the GAN- generated images were similar to the original images but
had some differences in the distribution of the features. It is believed that
this study provides a useful evaluation method for assessing the quality of
GAN-generated images and can help to improve their generation in the future.
| [
{
"version": "v1",
"created": "Thu, 4 May 2023 07:59:28 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Düzyel",
"Okan",
""
]
] | TITLE: A Comparative Study of GAN-Generated Handwriting Images and MNIST Images
using t-SNE Visualization
ABSTRACT: The quality of GAN-generated images on the MNIST dataset was explored in this
paper by comparing them to the original images using t-distributed stochastic
neighbor embedding (t- SNE) visualization. A GAN was trained with the dataset
to generate images and the result of generating all synthetic images, the
corresponding labels were saved. The dimensionality of the generated images and
the original MNIST dataset was reduced using t-SNE and the resulting embeddings
were plotted. The rate of the GAN-generated images was examined by comparing
the t-SNE plots of the generated images and the original MNIST images. It was
found that the GAN- generated images were similar to the original images but
had some differences in the distribution of the features. It is believed that
this study provides a useful evaluation method for assessing the quality of
GAN-generated images and can help to improve their generation in the future.
| no_new_dataset | 0.714634 |
2305.09828 | Asher Trockman | Asher Trockman, J. Zico Kolter | Mimetic Initialization of Self-Attention Layers | null | null | null | null | cs.CV cs.AI cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is notoriously difficult to train Transformers on small datasets;
typically, large pre-trained models are instead used as the starting point. We
explore the weights of such pre-trained Transformers (particularly for vision)
to attempt to find reasons for this discrepancy. Surprisingly, we find that
simply initializing the weights of self-attention layers so that they "look"
more like their pre-trained counterparts allows us to train vanilla
Transformers faster and to higher final accuracies, particularly on vision
tasks such as CIFAR-10 and ImageNet classification, where we see gains in
accuracy of over 5% and 4%, respectively. Our initialization scheme is closed
form, learning-free, and very simple: we set the product of the query and key
weights to be approximately the identity, and the product of the value and
projection weights to approximately the negative identity. As this mimics the
patterns we saw in pre-trained Transformers, we call the technique "mimetic
initialization".
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 22:12:25 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Trockman",
"Asher",
""
],
[
"Kolter",
"J. Zico",
""
]
] | TITLE: Mimetic Initialization of Self-Attention Layers
ABSTRACT: It is notoriously difficult to train Transformers on small datasets;
typically, large pre-trained models are instead used as the starting point. We
explore the weights of such pre-trained Transformers (particularly for vision)
to attempt to find reasons for this discrepancy. Surprisingly, we find that
simply initializing the weights of self-attention layers so that they "look"
more like their pre-trained counterparts allows us to train vanilla
Transformers faster and to higher final accuracies, particularly on vision
tasks such as CIFAR-10 and ImageNet classification, where we see gains in
accuracy of over 5% and 4%, respectively. Our initialization scheme is closed
form, learning-free, and very simple: we set the product of the query and key
weights to be approximately the identity, and the product of the value and
projection weights to approximately the negative identity. As this mimics the
patterns we saw in pre-trained Transformers, we call the technique "mimetic
initialization".
| no_new_dataset | 0.709447 |
2305.09833 | Shaofeng Yuan | Shaofeng Yuan, Feng Yang | Segmentation of Aortic Vessel Tree in CT Scans with Deep Fully
Convolutional Networks | 7 pages, 1 figure, 1 table | null | null | null | eess.IV cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Automatic and accurate segmentation of aortic vessel tree (AVT) in computed
tomography (CT) scans is crucial for early detection, diagnosis and prognosis
of aortic diseases, such as aneurysms, dissections and stenosis. However, this
task remains challenges, due to the complexity of aortic vessel tree and amount
of CT angiography data. In this technical report, we use two-stage fully
convolutional networks (FCNs) to automatically segment AVT in CTA scans from
multiple centers. Specifically, we firstly adopt a 3D FCN with U-shape network
architecture to segment AVT in order to produce topology attention and
accelerate medical image analysis pipeline. And then another one 3D FCN is
trained to segment branches of AVT along the pseudo-centerline of AVT. In the
2023 MICCAI Segmentation of the Aorta (SEG.A.) Challenge , the reported method
was evaluated on the public dataset of 56 cases. The resulting Dice Similarity
Coefficient (DSC) is 0.920, Jaccard Similarity Coefficient (JSC) is 0.861,
Recall is 0.922, and Precision is 0.926 on a 5-fold random split of training
and validation set.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 22:24:01 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Yuan",
"Shaofeng",
""
],
[
"Yang",
"Feng",
""
]
] | TITLE: Segmentation of Aortic Vessel Tree in CT Scans with Deep Fully
Convolutional Networks
ABSTRACT: Automatic and accurate segmentation of aortic vessel tree (AVT) in computed
tomography (CT) scans is crucial for early detection, diagnosis and prognosis
of aortic diseases, such as aneurysms, dissections and stenosis. However, this
task remains challenges, due to the complexity of aortic vessel tree and amount
of CT angiography data. In this technical report, we use two-stage fully
convolutional networks (FCNs) to automatically segment AVT in CTA scans from
multiple centers. Specifically, we firstly adopt a 3D FCN with U-shape network
architecture to segment AVT in order to produce topology attention and
accelerate medical image analysis pipeline. And then another one 3D FCN is
trained to segment branches of AVT along the pseudo-centerline of AVT. In the
2023 MICCAI Segmentation of the Aorta (SEG.A.) Challenge , the reported method
was evaluated on the public dataset of 56 cases. The resulting Dice Similarity
Coefficient (DSC) is 0.920, Jaccard Similarity Coefficient (JSC) is 0.861,
Recall is 0.922, and Precision is 0.926 on a 5-fold random split of training
and validation set.
| no_new_dataset | 0.71081 |
2305.09848 | Andrea Daniele | Andrea F. Daniele | Accessible Interfaces for the Development and Deployment of Robotic
Platforms | Ph.D. Thesis | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Accessibility is one of the most important features in the design of robots
and their interfaces. This thesis proposes methods that improve the
accessibility of robots for three different target audiences: consumers,
researchers, and learners. In order for humans and robots to work together
effectively, they both must be able to communicate with each other. We tackle
the problem of generating route instructions that are readily understandable by
novice humans for the navigation of a priori unknown indoor environments. We
then move on to the related problem of enabling robots to understand natural
language utterances in the context of learning to operate articulated objects
(e.g., fridges, drawers) by leveraging kinematic models. Next, we turn our
focus to the development of accessible and reproducible robotic platforms for
scientific research. We propose a new concept for reproducible robotics
research that integrates development and benchmarking, so that reproducibility
is obtained "by design" from the beginning of the research and development
process. We then propose a framework called SHARC (SHared Autonomy for Remote
Collaboration), to improve accessibility for underwater robotic intervention
operations. SHARC allows multiple remote scientists to efficiently plan and
execute high-level sampling procedures using an underwater manipulator while
deferring low-level control to the robot. Lastly, we developed the first
hardware-based MOOC in AI and robotics. This course allows learners to study
autonomy hands-on by making real robots make their own decisions and accomplish
broadly defined tasks. We design a new robotic platform from the ground up to
support this new learning experience. A fully browser-based interface, based on
leading tools and technologies for code development, testing, validation, and
deployment serves to maximize the accessibility of these educational resources.
| [
{
"version": "v1",
"created": "Tue, 16 May 2023 23:36:18 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Daniele",
"Andrea F.",
""
]
] | TITLE: Accessible Interfaces for the Development and Deployment of Robotic
Platforms
ABSTRACT: Accessibility is one of the most important features in the design of robots
and their interfaces. This thesis proposes methods that improve the
accessibility of robots for three different target audiences: consumers,
researchers, and learners. In order for humans and robots to work together
effectively, they both must be able to communicate with each other. We tackle
the problem of generating route instructions that are readily understandable by
novice humans for the navigation of a priori unknown indoor environments. We
then move on to the related problem of enabling robots to understand natural
language utterances in the context of learning to operate articulated objects
(e.g., fridges, drawers) by leveraging kinematic models. Next, we turn our
focus to the development of accessible and reproducible robotic platforms for
scientific research. We propose a new concept for reproducible robotics
research that integrates development and benchmarking, so that reproducibility
is obtained "by design" from the beginning of the research and development
process. We then propose a framework called SHARC (SHared Autonomy for Remote
Collaboration), to improve accessibility for underwater robotic intervention
operations. SHARC allows multiple remote scientists to efficiently plan and
execute high-level sampling procedures using an underwater manipulator while
deferring low-level control to the robot. Lastly, we developed the first
hardware-based MOOC in AI and robotics. This course allows learners to study
autonomy hands-on by making real robots make their own decisions and accomplish
broadly defined tasks. We design a new robotic platform from the ground up to
support this new learning experience. A fully browser-based interface, based on
leading tools and technologies for code development, testing, validation, and
deployment serves to maximize the accessibility of these educational resources.
| no_new_dataset | 0.711443 |
2305.09858 | Xiaohan Li | Jiao Chen, Luyi Ma, Xiaohan Li, Nikhil Thakurdesai, Jianpeng Xu, Jason
H.D. Cho, Kaushiki Nag, Evren Korpeoglu, Sushant Kumar, Kannan Achan | Knowledge Graph Completion Models are Few-shot Learners: An Empirical
Study of Relation Labeling in E-commerce with LLMs | null | null | null | null | cs.IR cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Knowledge Graphs (KGs) play a crucial role in enhancing e-commerce system
performance by providing structured information about entities and their
relationships, such as complementary or substitutable relations between
products or product types, which can be utilized in recommender systems.
However, relation labeling in KGs remains a challenging task due to the dynamic
nature of e-commerce domains and the associated cost of human labor. Recently,
breakthroughs in Large Language Models (LLMs) have shown surprising results in
numerous natural language processing tasks. In this paper, we conduct an
empirical study of LLMs for relation labeling in e-commerce KGs, investigating
their powerful learning capabilities in natural language and effectiveness in
predicting relations between product types with limited labeled data. We
evaluate various LLMs, including PaLM and GPT-3.5, on benchmark datasets,
demonstrating their ability to achieve competitive performance compared to
humans on relation labeling tasks using just 1 to 5 labeled examples per
relation. Additionally, we experiment with different prompt engineering
techniques to examine their impact on model performance. Our results show that
LLMs significantly outperform existing KG completion models in relation
labeling for e-commerce KGs and exhibit performance strong enough to replace
human labeling.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 00:08:36 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Chen",
"Jiao",
""
],
[
"Ma",
"Luyi",
""
],
[
"Li",
"Xiaohan",
""
],
[
"Thakurdesai",
"Nikhil",
""
],
[
"Xu",
"Jianpeng",
""
],
[
"Cho",
"Jason H. D.",
""
],
[
"Nag",
"Kaushiki",
""
],
[
"Korpeoglu",
"Evren",
""
],
[
"Kumar",
"Sushant",
""
],
[
"Achan",
"Kannan",
""
]
] | TITLE: Knowledge Graph Completion Models are Few-shot Learners: An Empirical
Study of Relation Labeling in E-commerce with LLMs
ABSTRACT: Knowledge Graphs (KGs) play a crucial role in enhancing e-commerce system
performance by providing structured information about entities and their
relationships, such as complementary or substitutable relations between
products or product types, which can be utilized in recommender systems.
However, relation labeling in KGs remains a challenging task due to the dynamic
nature of e-commerce domains and the associated cost of human labor. Recently,
breakthroughs in Large Language Models (LLMs) have shown surprising results in
numerous natural language processing tasks. In this paper, we conduct an
empirical study of LLMs for relation labeling in e-commerce KGs, investigating
their powerful learning capabilities in natural language and effectiveness in
predicting relations between product types with limited labeled data. We
evaluate various LLMs, including PaLM and GPT-3.5, on benchmark datasets,
demonstrating their ability to achieve competitive performance compared to
humans on relation labeling tasks using just 1 to 5 labeled examples per
relation. Additionally, we experiment with different prompt engineering
techniques to examine their impact on model performance. Our results show that
LLMs significantly outperform existing KG completion models in relation
labeling for e-commerce KGs and exhibit performance strong enough to replace
human labeling.
| no_new_dataset | 0.709265 |
2305.09889 | Ana Aleksandric | Ana Aleksandric, Henry Isaac Anderson, Anisha Dangal, Gabriela Mustata
Wilson, Shirin Nilizadeh | Analyzing the Stance of Facebook Posts on Abortion Considering
State-level Health and Social Compositions | null | null | null | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | Abortion remains one of the most controversial topics, especially after
overturning Roe v. Wade ruling in the United States. Previous literature showed
that the illegality of abortion could have serious consequences, as women might
seek unsafe pregnancy terminations leading to increased maternal mortality
rates and negative effects on their reproductive health. Therefore, the stances
of the abortion-related Facebook posts were analyzed at the state level in the
United States from May 4 until June 30, 2022, right after the Supreme Court's
decision was disclosed. In more detail, the pre-trained Transformer
architecture-based model was fine-tuned on a manually labeled training set to
obtain a stance detection model suitable for the collected dataset. Afterward,
we employed appropriate statistical tests to examine the relationships between
public opinion regarding abortion, abortion legality, political leaning, and
factors measuring the overall population's health, health knowledge, and
vulnerability per state. We found that states with a higher number of views
against abortion also have higher infant and maternal mortality rates.
Furthermore, the stance of social media posts per state is mostly matching with
the current abortion laws in these states. While aligned with existing
literature, these findings indicate how public opinion, laws, and women's and
infants' health are related, and interventions are required to educate and
protect women, especially in vulnerable populations.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 01:55:08 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Aleksandric",
"Ana",
""
],
[
"Anderson",
"Henry Isaac",
""
],
[
"Dangal",
"Anisha",
""
],
[
"Wilson",
"Gabriela Mustata",
""
],
[
"Nilizadeh",
"Shirin",
""
]
] | TITLE: Analyzing the Stance of Facebook Posts on Abortion Considering
State-level Health and Social Compositions
ABSTRACT: Abortion remains one of the most controversial topics, especially after
overturning Roe v. Wade ruling in the United States. Previous literature showed
that the illegality of abortion could have serious consequences, as women might
seek unsafe pregnancy terminations leading to increased maternal mortality
rates and negative effects on their reproductive health. Therefore, the stances
of the abortion-related Facebook posts were analyzed at the state level in the
United States from May 4 until June 30, 2022, right after the Supreme Court's
decision was disclosed. In more detail, the pre-trained Transformer
architecture-based model was fine-tuned on a manually labeled training set to
obtain a stance detection model suitable for the collected dataset. Afterward,
we employed appropriate statistical tests to examine the relationships between
public opinion regarding abortion, abortion legality, political leaning, and
factors measuring the overall population's health, health knowledge, and
vulnerability per state. We found that states with a higher number of views
against abortion also have higher infant and maternal mortality rates.
Furthermore, the stance of social media posts per state is mostly matching with
the current abortion laws in these states. While aligned with existing
literature, these findings indicate how public opinion, laws, and women's and
infants' health are related, and interventions are required to educate and
protect women, especially in vulnerable populations.
| no_new_dataset | 0.689554 |
2305.09890 | Young-Joo Han | Young-Joo Han and Ha-Jin Yu | SS-BSN: Attentive Blind-Spot Network for Self-Supervised Denoising with
Nonlocal Self-Similarity | Accepted to IJCAI 2023 | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, numerous studies have been conducted on supervised learning-based
image denoising methods. However, these methods rely on large-scale noisy-clean
image pairs, which are difficult to obtain in practice. Denoising methods with
self-supervised training that can be trained with only noisy images have been
proposed to address the limitation. These methods are based on the
convolutional neural network (CNN) and have shown promising performance.
However, CNN-based methods do not consider using nonlocal self-similarities
essential in the traditional method, which can cause performance limitations.
This paper presents self-similarity attention (SS-Attention), a novel
self-attention module that can capture nonlocal self-similarities to solve the
problem. We focus on designing a lightweight self-attention module in a
pixel-wise manner, which is nearly impossible to implement using the classic
self-attention module due to the quadratically increasing complexity with
spatial resolution. Furthermore, we integrate SS-Attention into the blind-spot
network called self-similarity-based blind-spot network (SS-BSN). We conduct
the experiments on real-world image denoising tasks. The proposed method
quantitatively and qualitatively outperforms state-of-the-art methods in
self-supervised denoising on the Smartphone Image Denoising Dataset (SIDD) and
Darmstadt Noise Dataset (DND) benchmark datasets.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 01:55:45 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Han",
"Young-Joo",
""
],
[
"Yu",
"Ha-Jin",
""
]
] | TITLE: SS-BSN: Attentive Blind-Spot Network for Self-Supervised Denoising with
Nonlocal Self-Similarity
ABSTRACT: Recently, numerous studies have been conducted on supervised learning-based
image denoising methods. However, these methods rely on large-scale noisy-clean
image pairs, which are difficult to obtain in practice. Denoising methods with
self-supervised training that can be trained with only noisy images have been
proposed to address the limitation. These methods are based on the
convolutional neural network (CNN) and have shown promising performance.
However, CNN-based methods do not consider using nonlocal self-similarities
essential in the traditional method, which can cause performance limitations.
This paper presents self-similarity attention (SS-Attention), a novel
self-attention module that can capture nonlocal self-similarities to solve the
problem. We focus on designing a lightweight self-attention module in a
pixel-wise manner, which is nearly impossible to implement using the classic
self-attention module due to the quadratically increasing complexity with
spatial resolution. Furthermore, we integrate SS-Attention into the blind-spot
network called self-similarity-based blind-spot network (SS-BSN). We conduct
the experiments on real-world image denoising tasks. The proposed method
quantitatively and qualitatively outperforms state-of-the-art methods in
self-supervised denoising on the Smartphone Image Denoising Dataset (SIDD) and
Darmstadt Noise Dataset (DND) benchmark datasets.
| no_new_dataset | 0.709189 |
2305.09891 | Kaiqian Qu | Shuaishuai Guo and Kaiqian Qu | Beamspace Modulation for Near Field Capacity Improvement in XL-MIMO
Communications | 5 pages, 4 figures, accepted by IEEE Wireless Communications Letters | null | 10.1109/LWC.2023.3277666 | null | cs.IT cs.SY eess.SY math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The spatial degrees of freedom (DoFs) greatly increase in the near-field
region of millimeter wave or terahertz multiple-input multiple-output
communications with extremely large antenna arrays (XL-MIMO). To employ the
increased spatial DoFs, a beamspace modulation (BM) strategy is introduced to
the near field of XL-MIMO. BM can work with a fixed small number of RF chains.
It exploits the increased spatial DoFs as modulation resources for capacity
improvements. The achievable spectral efficiency and its asymptotic capacity
are analyzed. Both theoretical and simulation results show that the proposed BM
strategy considerably outperforms the existing benchmark that only selects the
best beamspace for data transmission in terms of spectral efficiency.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 02:01:43 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Guo",
"Shuaishuai",
""
],
[
"Qu",
"Kaiqian",
""
]
] | TITLE: Beamspace Modulation for Near Field Capacity Improvement in XL-MIMO
Communications
ABSTRACT: The spatial degrees of freedom (DoFs) greatly increase in the near-field
region of millimeter wave or terahertz multiple-input multiple-output
communications with extremely large antenna arrays (XL-MIMO). To employ the
increased spatial DoFs, a beamspace modulation (BM) strategy is introduced to
the near field of XL-MIMO. BM can work with a fixed small number of RF chains.
It exploits the increased spatial DoFs as modulation resources for capacity
improvements. The achievable spectral efficiency and its asymptotic capacity
are analyzed. Both theoretical and simulation results show that the proposed BM
strategy considerably outperforms the existing benchmark that only selects the
best beamspace for data transmission in terms of spectral efficiency.
| no_new_dataset | 0.710653 |
2305.09898 | Jeewoo Sul | Jeewoo Sul and Yong Suk Choi | Balancing Lexical and Semantic Quality in Abstractive Summarization | Accepted to the main conference of ACL 2023 short | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important problem of the sequence-to-sequence neural models widely used in
abstractive summarization is exposure bias. To alleviate this problem,
re-ranking systems have been applied in recent years. Despite some performance
improvements, this approach remains underexplored. Previous works have mostly
specified the rank through the ROUGE score and aligned candidate summaries, but
there can be quite a large gap between the lexical overlap metric and semantic
similarity. In this paper, we propose a novel training method in which a
re-ranker balances the lexical and semantic quality. We further newly define
false positives in ranking and present a strategy to reduce their influence.
Experiments on the CNN/DailyMail and XSum datasets show that our method can
estimate the meaning of summaries without seriously degrading the lexical
aspect. More specifically, it achieves an 89.67 BERTScore on the CNN/DailyMail
dataset, reaching new state-of-the-art performance. Our code is publicly
available at https://github.com/jeewoo1025/BalSum.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 02:18:31 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Sul",
"Jeewoo",
""
],
[
"Choi",
"Yong Suk",
""
]
] | TITLE: Balancing Lexical and Semantic Quality in Abstractive Summarization
ABSTRACT: An important problem of the sequence-to-sequence neural models widely used in
abstractive summarization is exposure bias. To alleviate this problem,
re-ranking systems have been applied in recent years. Despite some performance
improvements, this approach remains underexplored. Previous works have mostly
specified the rank through the ROUGE score and aligned candidate summaries, but
there can be quite a large gap between the lexical overlap metric and semantic
similarity. In this paper, we propose a novel training method in which a
re-ranker balances the lexical and semantic quality. We further newly define
false positives in ranking and present a strategy to reduce their influence.
Experiments on the CNN/DailyMail and XSum datasets show that our method can
estimate the meaning of summaries without seriously degrading the lexical
aspect. More specifically, it achieves an 89.67 BERTScore on the CNN/DailyMail
dataset, reaching new state-of-the-art performance. Our code is publicly
available at https://github.com/jeewoo1025/BalSum.
| no_new_dataset | 0.708395 |
2305.09910 | Jayesh Badwaik | Markus Holzer, Jayesh Badwaik, Radim Vavrik, Gabriel Staffelbach,
Andreas Herten, Ondrej Vysocky, Ilan Rocchi, Lubomir Riha, Romain Cuidard,
Ulrich Ruede | Scalable Flow Simulations with the Lattice Boltzmann Method | null | null | 10.1145/3587135.3592176 | null | physics.comp-ph cs.NA math.NA | http://creativecommons.org/licenses/by/4.0/ | The primary goal of the EuroHPC JU project SCALABLE is to develop an
industrial Lattice Boltzmann Method (LBM)-based computational fluid dynamics
(CFD) solver capable of exploiting current and future extreme scale
architectures, expanding current capabilities of existing industrial LBM
solvers by at least two orders of magnitude in terms of processor cores and
lattice cells, while preserving its accessibility from both the end-user and
software developer's point of view. This is accomplished by transferring
technology and knowledge between an academic code (waLBerla) and an industrial
code (LaBS). This paper briefly introduces the characteristics and main
features of both software packages involved in the process. We also highlight
some of the performance achievements in scales of up to tens of thousand of
cores presented on one academic and one industrial benchmark case.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 02:40:14 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Holzer",
"Markus",
""
],
[
"Badwaik",
"Jayesh",
""
],
[
"Vavrik",
"Radim",
""
],
[
"Staffelbach",
"Gabriel",
""
],
[
"Herten",
"Andreas",
""
],
[
"Vysocky",
"Ondrej",
""
],
[
"Rocchi",
"Ilan",
""
],
[
"Riha",
"Lubomir",
""
],
[
"Cuidard",
"Romain",
""
],
[
"Ruede",
"Ulrich",
""
]
] | TITLE: Scalable Flow Simulations with the Lattice Boltzmann Method
ABSTRACT: The primary goal of the EuroHPC JU project SCALABLE is to develop an
industrial Lattice Boltzmann Method (LBM)-based computational fluid dynamics
(CFD) solver capable of exploiting current and future extreme scale
architectures, expanding current capabilities of existing industrial LBM
solvers by at least two orders of magnitude in terms of processor cores and
lattice cells, while preserving its accessibility from both the end-user and
software developer's point of view. This is accomplished by transferring
technology and knowledge between an academic code (waLBerla) and an industrial
code (LaBS). This paper briefly introduces the characteristics and main
features of both software packages involved in the process. We also highlight
some of the performance achievements in scales of up to tens of thousand of
cores presented on one academic and one industrial benchmark case.
| no_new_dataset | 0.709818 |
2305.09925 | Abu Reyan Ahmed | Kathryn Gray, Mingwei Li, Reyan Ahmed, Md. Khaledur Rahman, Ariful
Azad, Stephen Kobourov, Katy B\"orner | A Scalable Method for Readable Tree Layouts | null | null | null | null | cs.CG cs.DB | http://creativecommons.org/licenses/by/4.0/ | Large tree structures are ubiquitous and real-world relational datasets often
have information associated with nodes (e.g., labels or other attributes) and
edges (e.g., weights or distances) that need to be communicated to the viewers.
Yet, scalable, easy to read tree layouts are difficult to achieve. We consider
tree layouts to be readable if they meet some basic requirements: node labels
should not overlap, edges should not cross, edge lengths should be preserved,
and the output should be compact. There are many algorithms for drawing trees,
although very few take node labels or edge lengths into account, and none
optimizes all requirements above. With this in mind, we propose a new scalable
method for readable tree layouts. The algorithm guarantees that the layout has
no edge crossings and no label overlaps, and optimizes one of the remaining
aspects: desired edge lengths and compactness. We evaluate the performance of
the new algorithm by comparison with related earlier approaches using several
real-world datasets, ranging from a few thousand nodes to hundreds of thousands
of nodes. Tree layout algorithms can be used to visualize large general graphs,
by extracting a hierarchy of progressively larger trees. We illustrate this
functionality by presenting several map-like visualizations generated by the
new tree layout algorithm.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 03:19:31 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Gray",
"Kathryn",
""
],
[
"Li",
"Mingwei",
""
],
[
"Ahmed",
"Reyan",
""
],
[
"Rahman",
"Md. Khaledur",
""
],
[
"Azad",
"Ariful",
""
],
[
"Kobourov",
"Stephen",
""
],
[
"Börner",
"Katy",
""
]
] | TITLE: A Scalable Method for Readable Tree Layouts
ABSTRACT: Large tree structures are ubiquitous and real-world relational datasets often
have information associated with nodes (e.g., labels or other attributes) and
edges (e.g., weights or distances) that need to be communicated to the viewers.
Yet, scalable, easy to read tree layouts are difficult to achieve. We consider
tree layouts to be readable if they meet some basic requirements: node labels
should not overlap, edges should not cross, edge lengths should be preserved,
and the output should be compact. There are many algorithms for drawing trees,
although very few take node labels or edge lengths into account, and none
optimizes all requirements above. With this in mind, we propose a new scalable
method for readable tree layouts. The algorithm guarantees that the layout has
no edge crossings and no label overlaps, and optimizes one of the remaining
aspects: desired edge lengths and compactness. We evaluate the performance of
the new algorithm by comparison with related earlier approaches using several
real-world datasets, ranging from a few thousand nodes to hundreds of thousands
of nodes. Tree layout algorithms can be used to visualize large general graphs,
by extracting a hierarchy of progressively larger trees. We illustrate this
functionality by presenting several map-like visualizations generated by the
new tree layout algorithm.
| no_new_dataset | 0.710603 |
2305.09933 | Steven Macenski | Steve Macenski, Alberto Soragna, Michael Carroll, Zhenpeng Ge | Impact of ROS 2 Node Composition in Robotic Systems | IEEE Robotics and Automation Letters, 2023 | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | The Robot Operating System 2 (ROS 2) is the second generation of ROS
representing a step forward in the robotic framework. Several new types of
nodes and executor models are integral to control where, how, and when
information is processed in the computational graph. This paper explores and
benchmarks one of these new node types -- the Component node -- which allows
nodes to be composed manually or dynamically into processes while retaining
separation of concerns in a codebase for distributed development. Composition
is shown to achieve a high degree of performance optimization, particularly
valuable for resource-constrained systems and sensor processing pipelines,
enabling distributed tasks that would not be otherwise possible in ROS 2. In
this work, we briefly introduce the significance and design of node
composition, then our contribution of benchmarking is provided to analyze its
impact on robotic systems. Its compelling influence on performance is shown
through several experiments on the latest Long Term Support (LTS) ROS 2
distribution, Humble Hawksbill.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 03:39:32 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Macenski",
"Steve",
""
],
[
"Soragna",
"Alberto",
""
],
[
"Carroll",
"Michael",
""
],
[
"Ge",
"Zhenpeng",
""
]
] | TITLE: Impact of ROS 2 Node Composition in Robotic Systems
ABSTRACT: The Robot Operating System 2 (ROS 2) is the second generation of ROS
representing a step forward in the robotic framework. Several new types of
nodes and executor models are integral to control where, how, and when
information is processed in the computational graph. This paper explores and
benchmarks one of these new node types -- the Component node -- which allows
nodes to be composed manually or dynamically into processes while retaining
separation of concerns in a codebase for distributed development. Composition
is shown to achieve a high degree of performance optimization, particularly
valuable for resource-constrained systems and sensor processing pipelines,
enabling distributed tasks that would not be otherwise possible in ROS 2. In
this work, we briefly introduce the significance and design of node
composition, then our contribution of benchmarking is provided to analyze its
impact on robotic systems. Its compelling influence on performance is shown
through several experiments on the latest Long Term Support (LTS) ROS 2
distribution, Humble Hawksbill.
| no_new_dataset | 0.70825 |
2305.09967 | Johnathan Chiu | Johnathan Chiu, Andi Gu, Matt Zhou | Variable Length Embeddings | null | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | In this work, we introduce a novel deep learning architecture, Variable
Length Embeddings (VLEs), an autoregressive model that can produce a latent
representation composed of an arbitrary number of tokens. As a proof of
concept, we demonstrate the capabilities of VLEs on tasks that involve
reconstruction and image decomposition. We evaluate our experiments on a mix of
the iNaturalist and ImageNet datasets and find that VLEs achieve comparable
reconstruction results to a state of the art VAE, using less than a tenth of
the parameters.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 05:59:53 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Chiu",
"Johnathan",
""
],
[
"Gu",
"Andi",
""
],
[
"Zhou",
"Matt",
""
]
] | TITLE: Variable Length Embeddings
ABSTRACT: In this work, we introduce a novel deep learning architecture, Variable
Length Embeddings (VLEs), an autoregressive model that can produce a latent
representation composed of an arbitrary number of tokens. As a proof of
concept, we demonstrate the capabilities of VLEs on tasks that involve
reconstruction and image decomposition. We evaluate our experiments on a mix of
the iNaturalist and ImageNet datasets and find that VLEs achieve comparable
reconstruction results to a state of the art VAE, using less than a tenth of
the parameters.
| no_new_dataset | 0.711249 |
2305.09975 | Shaoguang Mao | Chenshuo Wang, Shaoguang Mao, Tao Ge, Wenshan Wu, Xun Wang, Yan Xia,
Jonathan Tien, Dongyan Zhao | Smart Word Suggestions for Writing Assistance | Accepted by Findings of ACL23 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Enhancing word usage is a desired feature for writing assistance. To further
advance research in this area, this paper introduces "Smart Word Suggestions"
(SWS) task and benchmark. Unlike other works, SWS emphasizes end-to-end
evaluation and presents a more realistic writing assistance scenario. This task
involves identifying words or phrases that require improvement and providing
substitution suggestions. The benchmark includes human-labeled data for
testing, a large distantly supervised dataset for training, and the framework
for evaluation. The test data includes 1,000 sentences written by English
learners, accompanied by over 16,000 substitution suggestions annotated by 10
native speakers. The training dataset comprises over 3.7 million sentences and
12.7 million suggestions generated through rules. Our experiments with seven
baselines demonstrate that SWS is a challenging task. Based on experimental
analysis, we suggest potential directions for future research on SWS. The
dataset and related codes is available at
https://github.com/microsoft/SmartWordSuggestions.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 06:15:41 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Wang",
"Chenshuo",
""
],
[
"Mao",
"Shaoguang",
""
],
[
"Ge",
"Tao",
""
],
[
"Wu",
"Wenshan",
""
],
[
"Wang",
"Xun",
""
],
[
"Xia",
"Yan",
""
],
[
"Tien",
"Jonathan",
""
],
[
"Zhao",
"Dongyan",
""
]
] | TITLE: Smart Word Suggestions for Writing Assistance
ABSTRACT: Enhancing word usage is a desired feature for writing assistance. To further
advance research in this area, this paper introduces "Smart Word Suggestions"
(SWS) task and benchmark. Unlike other works, SWS emphasizes end-to-end
evaluation and presents a more realistic writing assistance scenario. This task
involves identifying words or phrases that require improvement and providing
substitution suggestions. The benchmark includes human-labeled data for
testing, a large distantly supervised dataset for training, and the framework
for evaluation. The test data includes 1,000 sentences written by English
learners, accompanied by over 16,000 substitution suggestions annotated by 10
native speakers. The training dataset comprises over 3.7 million sentences and
12.7 million suggestions generated through rules. Our experiments with seven
baselines demonstrate that SWS is a challenging task. Based on experimental
analysis, we suggest potential directions for future research on SWS. The
dataset and related codes is available at
https://github.com/microsoft/SmartWordSuggestions.
| new_dataset | 0.711205 |
2305.09981 | Fatemeh Azimi | Fatemeh Azimi and Fahim Mannan and Felix Heide | S$^3$Track: Self-supervised Tracking with Soft Assignment Flow | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | In this work, we study self-supervised multiple object tracking without using
any video-level association labels. We propose to cast the problem of multiple
object tracking as learning the frame-wise associations between detections in
consecutive frames. To this end, we propose differentiable soft object
assignment for object association, making it possible to learn features
tailored to object association with differentiable end-to-end training. With
this training approach in hand, we develop an appearance-based model for
learning instance-aware object features used to construct a cost matrix based
on the pairwise distances between the object features. We train our model using
temporal and multi-view data, where we obtain association pseudo-labels using
optical flow and disparity information. Unlike most self-supervised tracking
methods that rely on pretext tasks for learning the feature correspondences,
our method is directly optimized for cross-object association in complex
scenarios. As such, the proposed method offers a reidentification-based MOT
approach that is robust to training hyperparameters and does not suffer from
local minima, which are a challenge in self-supervised methods. We evaluate our
proposed model on the KITTI, Waymo, nuScenes, and Argoverse datasets,
consistently improving over other unsupervised methods ($7.8\%$ improvement in
association accuracy on nuScenes).
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 06:25:40 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Azimi",
"Fatemeh",
""
],
[
"Mannan",
"Fahim",
""
],
[
"Heide",
"Felix",
""
]
] | TITLE: S$^3$Track: Self-supervised Tracking with Soft Assignment Flow
ABSTRACT: In this work, we study self-supervised multiple object tracking without using
any video-level association labels. We propose to cast the problem of multiple
object tracking as learning the frame-wise associations between detections in
consecutive frames. To this end, we propose differentiable soft object
assignment for object association, making it possible to learn features
tailored to object association with differentiable end-to-end training. With
this training approach in hand, we develop an appearance-based model for
learning instance-aware object features used to construct a cost matrix based
on the pairwise distances between the object features. We train our model using
temporal and multi-view data, where we obtain association pseudo-labels using
optical flow and disparity information. Unlike most self-supervised tracking
methods that rely on pretext tasks for learning the feature correspondences,
our method is directly optimized for cross-object association in complex
scenarios. As such, the proposed method offers a reidentification-based MOT
approach that is robust to training hyperparameters and does not suffer from
local minima, which are a challenge in self-supervised methods. We evaluate our
proposed model on the KITTI, Waymo, nuScenes, and Argoverse datasets,
consistently improving over other unsupervised methods ($7.8\%$ improvement in
association accuracy on nuScenes).
| no_new_dataset | 0.709019 |
2305.09986 | Kiwan Jeon Dr. | Hyoung Suk Park and Young Jin Jeong and Kiwan Jeon | A robust multi-domain network for short-scanning amyloid PET
reconstruction | 21 pages, 7 figures, 3 tables | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | This paper presents a robust multi-domain network designed to restore
low-quality amyloid PET images acquired in a short period of time. The proposed
method is trained on pairs of PET images from short (2 minutes) and standard
(20 minutes) scanning times, sourced from multiple domains. Learning relevant
image features between these domains with a single network is challenging. Our
key contribution is the introduction of a mapping label, which enables
effective learning of specific representations between different domains. The
network, trained with various mapping labels, can efficiently correct amyloid
PET datasets in multiple training domains and unseen domains, such as those
obtained with new radiotracers, acquisition protocols, or PET scanners.
Internal, temporal, and external validations demonstrate the effectiveness of
the proposed method. Notably, for external validation datasets from unseen
domains, the proposed method achieved comparable or superior results relative
to methods trained with these datasets, in terms of quantitative metrics such
as normalized root mean-square error and structure similarity index measure.
Two nuclear medicine physicians evaluated the amyloid status as positive or
negative for the external validation datasets, with accuracies of 0.970 and
0.930 for readers 1 and 2, respectively.
| [
{
"version": "v1",
"created": "Wed, 17 May 2023 06:31:10 GMT"
}
] | 2023-05-18T00:00:00 | [
[
"Park",
"Hyoung Suk",
""
],
[
"Jeong",
"Young Jin",
""
],
[
"Jeon",
"Kiwan",
""
]
] | TITLE: A robust multi-domain network for short-scanning amyloid PET
reconstruction
ABSTRACT: This paper presents a robust multi-domain network designed to restore
low-quality amyloid PET images acquired in a short period of time. The proposed
method is trained on pairs of PET images from short (2 minutes) and standard
(20 minutes) scanning times, sourced from multiple domains. Learning relevant
image features between these domains with a single network is challenging. Our
key contribution is the introduction of a mapping label, which enables
effective learning of specific representations between different domains. The
network, trained with various mapping labels, can efficiently correct amyloid
PET datasets in multiple training domains and unseen domains, such as those
obtained with new radiotracers, acquisition protocols, or PET scanners.
Internal, temporal, and external validations demonstrate the effectiveness of
the proposed method. Notably, for external validation datasets from unseen
domains, the proposed method achieved comparable or superior results relative
to methods trained with these datasets, in terms of quantitative metrics such
as normalized root mean-square error and structure similarity index measure.
Two nuclear medicine physicians evaluated the amyloid status as positive or
negative for the external validation datasets, with accuracies of 0.970 and
0.930 for readers 1 and 2, respectively.
| no_new_dataset | 0.710446 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.