id
large_stringlengths 9
16
| submitter
large_stringlengths 3
64
⌀ | authors
large_stringlengths 5
20.2k
| title
large_stringlengths 5
245
| comments
large_stringlengths 1
482
⌀ | journal-ref
large_stringlengths 4
382
⌀ | doi
large_stringlengths 9
151
⌀ | report-no
large_stringlengths 2
509
⌀ | categories
large_stringlengths 5
78
| license
large_stringclasses 9
values | abstract
large_stringlengths 83
3.55k
| versions
large listlengths 1
21
| update_date
timestamp[ms]date 2007-05-23 00:00:00
2025-05-30 00:00:00
| authors_parsed
large listlengths 1
1.35k
| prompt
large_stringlengths 166
3.64k
| label
stringclasses 2
values | prob
float64 0.5
0.73
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2305.08590 | Jiefeng Li | Jiefeng Li, Siyuan Bian, Qi Liu, Jiasheng Tang, Fan Wang, Cewu Lu | NIKI: Neural Inverse Kinematics with Invertible Neural Networks for 3D
Human Pose and Shape Estimation | CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the progress of 3D human pose and shape estimation, state-of-the-art
methods can either be robust to occlusions or obtain pixel-aligned accuracy in
non-occlusion cases. However, they cannot obtain robustness and mesh-image
alignment at the same time. In this work, we present NIKI (Neural Inverse
Kinematics with Invertible Neural Network), which models bi-directional errors
to improve the robustness to occlusions and obtain pixel-aligned accuracy. NIKI
can learn from both the forward and inverse processes with invertible networks.
In the inverse process, the model separates the error from the plausible 3D
pose manifold for a robust 3D human pose estimation. In the forward process, we
enforce the zero-error boundary conditions to improve the sensitivity to
reliable joint positions for better mesh-image alignment. Furthermore, NIKI
emulates the analytical inverse kinematics algorithms with the twist-and-swing
decomposition for better interpretability. Experiments on standard and
occlusion-specific benchmarks demonstrate the effectiveness of NIKI, where we
exhibit robust and well-aligned results simultaneously. Code is available at
https://github.com/Jeff-sjtu/NIKI
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 12:13:24 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Li",
"Jiefeng",
""
],
[
"Bian",
"Siyuan",
""
],
[
"Liu",
"Qi",
""
],
[
"Tang",
"Jiasheng",
""
],
[
"Wang",
"Fan",
""
],
[
"Lu",
"Cewu",
""
]
] | TITLE: NIKI: Neural Inverse Kinematics with Invertible Neural Networks for 3D
Human Pose and Shape Estimation
ABSTRACT: With the progress of 3D human pose and shape estimation, state-of-the-art
methods can either be robust to occlusions or obtain pixel-aligned accuracy in
non-occlusion cases. However, they cannot obtain robustness and mesh-image
alignment at the same time. In this work, we present NIKI (Neural Inverse
Kinematics with Invertible Neural Network), which models bi-directional errors
to improve the robustness to occlusions and obtain pixel-aligned accuracy. NIKI
can learn from both the forward and inverse processes with invertible networks.
In the inverse process, the model separates the error from the plausible 3D
pose manifold for a robust 3D human pose estimation. In the forward process, we
enforce the zero-error boundary conditions to improve the sensitivity to
reliable joint positions for better mesh-image alignment. Furthermore, NIKI
emulates the analytical inverse kinematics algorithms with the twist-and-swing
decomposition for better interpretability. Experiments on standard and
occlusion-specific benchmarks demonstrate the effectiveness of NIKI, where we
exhibit robust and well-aligned results simultaneously. Code is available at
https://github.com/Jeff-sjtu/NIKI
| no_new_dataset | 0.71 |
2305.08621 | Laura Jahn | Laura Jahn and Rasmus K. Rendsvig | Danish National Election 2022 Twitter Data on Likes, Retweets, and
Botscores for the Purpose of Exploring Coordinated Inauthenthic Behavior | null | null | null | null | cs.SI cs.CY | http://creativecommons.org/licenses/by-sa/4.0/ | This note describes code and experiments related to a Twitter dataset on the
Danish National Election 2022, available at Harvard Dataverse
(doi.org/10.7910/DVN/RWPZUN). We cluster Twitter users into bins of users that
showed exactly the same liking/retweeting behavior over a month-long period
during which the Danish National Election took place. To investigate whether
any of these bins exhibited coordinated inauthentic behavior, we were
interested in whether bin size correlated with user account
deletions/suspensions and/or high bot scores from Botometer / Botometer Lite.
We did not find significant correlations (also neither between Botometer and
Botometer Lite scores). This note primarily contains the README.md from the
GitHub repository
LJ-9/Danish-Election-2022-Twitter-Likes-Retweets-Botscores-Inauthentic-Coordinated-Behavior
of the same name, with a few additional comments and references. We upload the
note for visibility, hoping that other researchers may find the data of use.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:17:05 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Jahn",
"Laura",
""
],
[
"Rendsvig",
"Rasmus K.",
""
]
] | TITLE: Danish National Election 2022 Twitter Data on Likes, Retweets, and
Botscores for the Purpose of Exploring Coordinated Inauthenthic Behavior
ABSTRACT: This note describes code and experiments related to a Twitter dataset on the
Danish National Election 2022, available at Harvard Dataverse
(doi.org/10.7910/DVN/RWPZUN). We cluster Twitter users into bins of users that
showed exactly the same liking/retweeting behavior over a month-long period
during which the Danish National Election took place. To investigate whether
any of these bins exhibited coordinated inauthentic behavior, we were
interested in whether bin size correlated with user account
deletions/suspensions and/or high bot scores from Botometer / Botometer Lite.
We did not find significant correlations (also neither between Botometer and
Botometer Lite scores). This note primarily contains the README.md from the
GitHub repository
LJ-9/Danish-Election-2022-Twitter-Likes-Retweets-Botscores-Inauthentic-Coordinated-Behavior
of the same name, with a few additional comments and references. We upload the
note for visibility, hoping that other researchers may find the data of use.
| no_new_dataset | 0.700664 |
2305.08625 | Daryna Dementieva | Daniel Schroter, Daryna Dementieva, and Georg Groh | Adam-Smith at SemEval-2023 Task 4: Discovering Human Values in Arguments
with Ensembles of Transformer-based Models | The winner of SemEval-2023 Task 4: "Identification of Human Values
behind Arguments" | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | This paper presents the best-performing approach alias "Adam Smith" for the
SemEval-2023 Task 4: "Identification of Human Values behind Arguments". The
goal of the task was to create systems that automatically identify the values
within textual arguments. We train transformer-based models until they reach
their loss minimum or f1-score maximum. Ensembling the models by selecting one
global decision threshold that maximizes the f1-score leads to the
best-performing system in the competition. Ensembling based on stacking with
logistic regressions shows the best performance on an additional dataset
provided to evaluate the robustness ("Nahj al-Balagha"). Apart from outlining
the submitted system, we demonstrate that the use of the large ensemble model
is not necessary and that the system size can be significantly reduced.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:20:14 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Schroter",
"Daniel",
""
],
[
"Dementieva",
"Daryna",
""
],
[
"Groh",
"Georg",
""
]
] | TITLE: Adam-Smith at SemEval-2023 Task 4: Discovering Human Values in Arguments
with Ensembles of Transformer-based Models
ABSTRACT: This paper presents the best-performing approach alias "Adam Smith" for the
SemEval-2023 Task 4: "Identification of Human Values behind Arguments". The
goal of the task was to create systems that automatically identify the values
within textual arguments. We train transformer-based models until they reach
their loss minimum or f1-score maximum. Ensembling the models by selecting one
global decision threshold that maximizes the f1-score leads to the
best-performing system in the competition. Ensembling based on stacking with
logistic regressions shows the best performance on an additional dataset
provided to evaluate the robustness ("Nahj al-Balagha"). Apart from outlining
the submitted system, we demonstrate that the use of the large ensemble model
is not necessary and that the system size can be significantly reduced.
| no_new_dataset | 0.709372 |
2305.08628 | Viktoria Ehm | Viktoria Ehm, Daniel Cremers, Florian Bernard | Non-Separable Multi-Dimensional Network Flows for Visual Computing | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Flows in networks (or graphs) play a significant role in numerous computer
vision tasks. The scalar-valued edges in these graphs often lead to a loss of
information and thereby to limitations in terms of expressiveness. For example,
oftentimes high-dimensional data (e.g. feature descriptors) are mapped to a
single scalar value (e.g. the similarity between two feature descriptors). To
overcome this limitation, we propose a novel formalism for non-separable
multi-dimensional network flows. By doing so, we enable an automatic and
adaptive feature selection strategy - since the flow is defined on a
per-dimension basis, the maximizing flow automatically chooses the best
matching feature dimensions. As a proof of concept, we apply our formalism to
the multi-object tracking problem and demonstrate that our approach outperforms
scalar formulations on the MOT16 benchmark in terms of robustness to noise.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:21:44 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Ehm",
"Viktoria",
""
],
[
"Cremers",
"Daniel",
""
],
[
"Bernard",
"Florian",
""
]
] | TITLE: Non-Separable Multi-Dimensional Network Flows for Visual Computing
ABSTRACT: Flows in networks (or graphs) play a significant role in numerous computer
vision tasks. The scalar-valued edges in these graphs often lead to a loss of
information and thereby to limitations in terms of expressiveness. For example,
oftentimes high-dimensional data (e.g. feature descriptors) are mapped to a
single scalar value (e.g. the similarity between two feature descriptors). To
overcome this limitation, we propose a novel formalism for non-separable
multi-dimensional network flows. By doing so, we enable an automatic and
adaptive feature selection strategy - since the flow is defined on a
per-dimension basis, the maximizing flow automatically chooses the best
matching feature dimensions. As a proof of concept, we apply our formalism to
the multi-object tracking problem and demonstrate that our approach outperforms
scalar formulations on the MOT16 benchmark in terms of robustness to noise.
| no_new_dataset | 0.711813 |
2305.08633 | Vishesh Thakur | Vishesh Thakur and Aneesh Tickoo | Text2Gender: A Deep Learning Architecture for Analysis of Blogger's Age
and Gender | null | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Deep learning techniques have gained a lot of traction in the field of NLP
research. The aim of this paper is to predict the age and gender of an
individual by inspecting their written text. We propose a supervised BERT-based
classification technique in order to predict the age and gender of bloggers.
The dataset used contains 681284 rows of data, with the information of the
blogger's age, gender, and text of the blog written by them. We compare our
algorithm to previous works in the same domain and achieve a better accuracy
and F1 score. The accuracy reported for the prediction of age group was 84.2%,
while the accuracy for the prediction of gender was 86.32%. This study relies
on the raw capabilities of BERT to predict the classes of textual data
efficiently. This paper shows promising capability in predicting the
demographics of the author with high accuracy and can have wide applicability
across multiple domains.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:26:50 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Thakur",
"Vishesh",
""
],
[
"Tickoo",
"Aneesh",
""
]
] | TITLE: Text2Gender: A Deep Learning Architecture for Analysis of Blogger's Age
and Gender
ABSTRACT: Deep learning techniques have gained a lot of traction in the field of NLP
research. The aim of this paper is to predict the age and gender of an
individual by inspecting their written text. We propose a supervised BERT-based
classification technique in order to predict the age and gender of bloggers.
The dataset used contains 681284 rows of data, with the information of the
blogger's age, gender, and text of the blog written by them. We compare our
algorithm to previous works in the same domain and achieve a better accuracy
and F1 score. The accuracy reported for the prediction of age group was 84.2%,
while the accuracy for the prediction of gender was 86.32%. This study relies
on the raw capabilities of BERT to predict the classes of textual data
efficiently. This paper shows promising capability in predicting the
demographics of the author with high accuracy and can have wide applicability
across multiple domains.
| new_dataset | 0.667148 |
2305.08636 | Daryna Dementieva | Adam Rydelek, Daryna Dementieva, and Georg Groh | AdamR at SemEval-2023 Task 10: Solving the Class Imbalance Problem in
Sexism Detection with Ensemble Learning | One of the top solutions at the SemEval-2023 task "The Explainable
Detection of Online Sexism" | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by-sa/4.0/ | The Explainable Detection of Online Sexism task presents the problem of
explainable sexism detection through fine-grained categorisation of sexist
cases with three subtasks. Our team experimented with different ways to combat
class imbalance throughout the tasks using data augmentation and loss
alteration techniques. We tackled the challenge by utilising ensembles of
Transformer models trained on different datasets, which are tested to find the
balance between performance and interpretability. This solution ranked us in
the top 40\% of teams for each of the tracks.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:28:59 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Rydelek",
"Adam",
""
],
[
"Dementieva",
"Daryna",
""
],
[
"Groh",
"Georg",
""
]
] | TITLE: AdamR at SemEval-2023 Task 10: Solving the Class Imbalance Problem in
Sexism Detection with Ensemble Learning
ABSTRACT: The Explainable Detection of Online Sexism task presents the problem of
explainable sexism detection through fine-grained categorisation of sexist
cases with three subtasks. Our team experimented with different ways to combat
class imbalance throughout the tasks using data augmentation and loss
alteration techniques. We tackled the challenge by utilising ensembles of
Transformer models trained on different datasets, which are tested to find the
balance between performance and interpretability. This solution ranked us in
the top 40\% of teams for each of the tracks.
| no_new_dataset | 0.70695 |
2305.08653 | Lorenzo Valentini | Lorenzo Valentini, Marco Chiani, Enrico Paolini | Interference Cancellation Algorithms for Grant-Free Multiple Access with
Massive MIMO | This work has been submitted to the IEEE for possible publication.
arXiv admin note: text overlap with arXiv:2202.13156 | null | null | null | eess.SP cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In next generation Internet-of-Things, the overhead introduced by grant-based
multiple access protocols may engulf the access network as a consequence of the
unprecedented number of connected devices. Grant-free access protocols are
therefore gaining an increasing interest to support massive access from
machine-type devices with intermittent activity. In this paper, coded random
access (CRA) with massive multiple input multiple output (MIMO) is investigated
as a solution to design highly-scalable massive multiple access protocols,
taking into account stringent requirements on latency and reliability. With a
focus on signal processing aspects at the physical layer and their impact on
the overall system performance, critical issues of successive interference
cancellation (SIC) over fading channels are first analyzed. Then, SIC
algorithms and a scheduler are proposed that can overcome some of the
limitations of the current access protocols. The effectiveness of the proposed
processing algorithms is validated by Monte Carlo simulation, for different CRA
protocols and by comparisons with developed benchmarks.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:54:31 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Valentini",
"Lorenzo",
""
],
[
"Chiani",
"Marco",
""
],
[
"Paolini",
"Enrico",
""
]
] | TITLE: Interference Cancellation Algorithms for Grant-Free Multiple Access with
Massive MIMO
ABSTRACT: In next generation Internet-of-Things, the overhead introduced by grant-based
multiple access protocols may engulf the access network as a consequence of the
unprecedented number of connected devices. Grant-free access protocols are
therefore gaining an increasing interest to support massive access from
machine-type devices with intermittent activity. In this paper, coded random
access (CRA) with massive multiple input multiple output (MIMO) is investigated
as a solution to design highly-scalable massive multiple access protocols,
taking into account stringent requirements on latency and reliability. With a
focus on signal processing aspects at the physical layer and their impact on
the overall system performance, critical issues of successive interference
cancellation (SIC) over fading channels are first analyzed. Then, SIC
algorithms and a scheduler are proposed that can overcome some of the
limitations of the current access protocols. The effectiveness of the proposed
processing algorithms is validated by Monte Carlo simulation, for different CRA
protocols and by comparisons with developed benchmarks.
| no_new_dataset | 0.710622 |
2305.08654 | Taichi Aida | Taichi Aida, Danushka Bollegala | Unsupervised Semantic Variation Prediction using the Distribution of
Sibling Embeddings | Findings of ACL2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Languages are dynamic entities, where the meanings associated with words
constantly change with time. Detecting the semantic variation of words is an
important task for various NLP applications that must make time-sensitive
predictions. Existing work on semantic variation prediction have predominantly
focused on comparing some form of an averaged contextualised representation of
a target word computed from a given corpus. However, some of the previously
associated meanings of a target word can become obsolete over time (e.g.
meaning of gay as happy), while novel usages of existing words are observed
(e.g. meaning of cell as a mobile phone). We argue that mean representations
alone cannot accurately capture such semantic variations and propose a method
that uses the entire cohort of the contextualised embeddings of the target
word, which we refer to as the sibling distribution. Experimental results on
SemEval-2020 Task 1 benchmark dataset for semantic variation prediction show
that our method outperforms prior work that consider only the mean embeddings,
and is comparable to the current state-of-the-art. Moreover, a qualitative
analysis shows that our method detects important semantic changes in words that
are not captured by the existing methods. Source code is available at
https://github.com/a1da4/svp-gauss .
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:58:21 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Aida",
"Taichi",
""
],
[
"Bollegala",
"Danushka",
""
]
] | TITLE: Unsupervised Semantic Variation Prediction using the Distribution of
Sibling Embeddings
ABSTRACT: Languages are dynamic entities, where the meanings associated with words
constantly change with time. Detecting the semantic variation of words is an
important task for various NLP applications that must make time-sensitive
predictions. Existing work on semantic variation prediction have predominantly
focused on comparing some form of an averaged contextualised representation of
a target word computed from a given corpus. However, some of the previously
associated meanings of a target word can become obsolete over time (e.g.
meaning of gay as happy), while novel usages of existing words are observed
(e.g. meaning of cell as a mobile phone). We argue that mean representations
alone cannot accurately capture such semantic variations and propose a method
that uses the entire cohort of the contextualised embeddings of the target
word, which we refer to as the sibling distribution. Experimental results on
SemEval-2020 Task 1 benchmark dataset for semantic variation prediction show
that our method outperforms prior work that consider only the mean embeddings,
and is comparable to the current state-of-the-art. Moreover, a qualitative
analysis shows that our method detects important semantic changes in words that
are not captured by the existing methods. Source code is available at
https://github.com/a1da4/svp-gauss .
| no_new_dataset | 0.709239 |
2305.08655 | Bing Wang | Bing Wang, Ximing Li, Zhiyao Yang, Yuanyuan Guan, Jiayin Li,
Shengsheng Wang | Unsupervised Sentence Representation Learning with Frequency-induced
Adversarial Tuning and Incomplete Sentence Filtering | 24 pages, 7 figures | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pre-trained Language Model (PLM) is nowadays the mainstay of Unsupervised
Sentence Representation Learning (USRL). However, PLMs are sensitive to the
frequency information of words from their pre-training corpora, resulting in
anisotropic embedding space, where the embeddings of high-frequency words are
clustered but those of low-frequency words disperse sparsely. This anisotropic
phenomenon results in two problems of similarity bias and information bias,
lowering the quality of sentence embeddings. To solve the problems, we
fine-tune PLMs by leveraging the frequency information of words and propose a
novel USRL framework, namely Sentence Representation Learning with
Frequency-induced Adversarial tuning and Incomplete sentence filtering
(SLT-FAI). We calculate the word frequencies over the pre-training corpora of
PLMs and assign words thresholding frequency labels. With them, (1) we
incorporate a similarity discriminator used to distinguish the embeddings of
high-frequency and low-frequency words, and adversarially tune the PLM with it,
enabling to achieve uniformly frequency-invariant embedding space; and (2) we
propose a novel incomplete sentence detection task, where we incorporate an
information discriminator to distinguish the embeddings of original sentences
and incomplete sentences by randomly masking several low-frequency words,
enabling to emphasize the more informative low-frequency words. Our SLT-FAI is
a flexible and plug-and-play framework, and it can be integrated with existing
USRL techniques. We evaluate SLT-FAI with various backbones on benchmark
datasets. Empirical results indicate that SLT-FAI can be superior to the
existing USRL baselines. Our code is released in
\url{https://github.com/wangbing1416/SLT-FAI}.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 13:59:23 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Wang",
"Bing",
""
],
[
"Li",
"Ximing",
""
],
[
"Yang",
"Zhiyao",
""
],
[
"Guan",
"Yuanyuan",
""
],
[
"Li",
"Jiayin",
""
],
[
"Wang",
"Shengsheng",
""
]
] | TITLE: Unsupervised Sentence Representation Learning with Frequency-induced
Adversarial Tuning and Incomplete Sentence Filtering
ABSTRACT: Pre-trained Language Model (PLM) is nowadays the mainstay of Unsupervised
Sentence Representation Learning (USRL). However, PLMs are sensitive to the
frequency information of words from their pre-training corpora, resulting in
anisotropic embedding space, where the embeddings of high-frequency words are
clustered but those of low-frequency words disperse sparsely. This anisotropic
phenomenon results in two problems of similarity bias and information bias,
lowering the quality of sentence embeddings. To solve the problems, we
fine-tune PLMs by leveraging the frequency information of words and propose a
novel USRL framework, namely Sentence Representation Learning with
Frequency-induced Adversarial tuning and Incomplete sentence filtering
(SLT-FAI). We calculate the word frequencies over the pre-training corpora of
PLMs and assign words thresholding frequency labels. With them, (1) we
incorporate a similarity discriminator used to distinguish the embeddings of
high-frequency and low-frequency words, and adversarially tune the PLM with it,
enabling to achieve uniformly frequency-invariant embedding space; and (2) we
propose a novel incomplete sentence detection task, where we incorporate an
information discriminator to distinguish the embeddings of original sentences
and incomplete sentences by randomly masking several low-frequency words,
enabling to emphasize the more informative low-frequency words. Our SLT-FAI is
a flexible and plug-and-play framework, and it can be integrated with existing
USRL techniques. We evaluate SLT-FAI with various backbones on benchmark
datasets. Empirical results indicate that SLT-FAI can be superior to the
existing USRL baselines. Our code is released in
\url{https://github.com/wangbing1416/SLT-FAI}.
| no_new_dataset | 0.710057 |
2305.08661 | Du Fei | Fei Du, Peng Yang and Qi Jia and Fengtao Nan and Xiaoting Chen and Yun
Yang | Global and Local Mixture Consistency Cumulative Learning for Long-tailed
Visual Recognitions | 10 pages, 4 figures, 47 references, This article has been accepted by
CVPR2023 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, our goal is to design a simple learning paradigm for long-tail
visual recognition, which not only improves the robustness of the feature
extractor but also alleviates the bias of the classifier towards head classes
while reducing the training skills and overhead. We propose an efficient
one-stage training strategy for long-tailed visual recognition called Global
and Local Mixture Consistency cumulative learning (GLMC). Our core ideas are
twofold: (1) a global and local mixture consistency loss improves the
robustness of the feature extractor. Specifically, we generate two augmented
batches by the global MixUp and local CutMix from the same batch data,
respectively, and then use cosine similarity to minimize the difference. (2) A
cumulative head tail soft label reweighted loss mitigates the head class bias
problem. We use empirical class frequencies to reweight the mixed label of the
head-tail class for long-tailed data and then balance the conventional loss and
the rebalanced loss with a coefficient accumulated by epochs. Our approach
achieves state-of-the-art accuracy on CIFAR10-LT, CIFAR100-LT, and ImageNet-LT
datasets. Additional experiments on balanced ImageNet and CIFAR demonstrate
that GLMC can significantly improve the generalization of backbones. Code is
made publicly available at https://github.com/ynu-yangpeng/GLMC.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 14:09:09 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Du",
"Fei",
""
],
[
"Yang",
"Peng",
""
],
[
"Jia",
"Qi",
""
],
[
"Nan",
"Fengtao",
""
],
[
"Chen",
"Xiaoting",
""
],
[
"Yang",
"Yun",
""
]
] | TITLE: Global and Local Mixture Consistency Cumulative Learning for Long-tailed
Visual Recognitions
ABSTRACT: In this paper, our goal is to design a simple learning paradigm for long-tail
visual recognition, which not only improves the robustness of the feature
extractor but also alleviates the bias of the classifier towards head classes
while reducing the training skills and overhead. We propose an efficient
one-stage training strategy for long-tailed visual recognition called Global
and Local Mixture Consistency cumulative learning (GLMC). Our core ideas are
twofold: (1) a global and local mixture consistency loss improves the
robustness of the feature extractor. Specifically, we generate two augmented
batches by the global MixUp and local CutMix from the same batch data,
respectively, and then use cosine similarity to minimize the difference. (2) A
cumulative head tail soft label reweighted loss mitigates the head class bias
problem. We use empirical class frequencies to reweight the mixed label of the
head-tail class for long-tailed data and then balance the conventional loss and
the rebalanced loss with a coefficient accumulated by epochs. Our approach
achieves state-of-the-art accuracy on CIFAR10-LT, CIFAR100-LT, and ImageNet-LT
datasets. Additional experiments on balanced ImageNet and CIFAR demonstrate
that GLMC can significantly improve the generalization of backbones. Code is
made publicly available at https://github.com/ynu-yangpeng/GLMC.
| no_new_dataset | 0.711193 |
2305.08663 | Yunming Hui | Yunming Hui, Luuk Buijsman, Mel Chekol, Shihan Wang | Leveraging Graph Embeddings for Opinion Leader Detection | null | null | null | null | cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays, social media plays an important role in many fields, such as the
promotion of measures against major infectious diseases, merchandising, etc. In
social media, some people are known as opinion leaders due to their strong
ability to influence the opinions of others. The detection of opinion leaders
has become an important task in social network analysis. Social networks are
often represented in the form of graphs which allows a large number of graph
analysis methods to be used for opinion leader detection. Some studies have
attempted to apply graph representation learning for opinion leader detection
and achieved good results. In this paper, we propose a model-agnostic framework
that formulate the opinion leader detection problem as a ranking task of node
embeddings. A variety of methods and datasets are chosen to analyze the
performance of our framework both qualitatively and quantitatively. Based on
the analysis results, we propose a strategy that combines opinion leaders
detected by two different ranking algorithms to obtain a more comprehensive set
of opinion leaders. And we analyze the temporal changes of the opinion leaders
in one of the dynamic social networks.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 14:13:07 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Hui",
"Yunming",
""
],
[
"Buijsman",
"Luuk",
""
],
[
"Chekol",
"Mel",
""
],
[
"Wang",
"Shihan",
""
]
] | TITLE: Leveraging Graph Embeddings for Opinion Leader Detection
ABSTRACT: Nowadays, social media plays an important role in many fields, such as the
promotion of measures against major infectious diseases, merchandising, etc. In
social media, some people are known as opinion leaders due to their strong
ability to influence the opinions of others. The detection of opinion leaders
has become an important task in social network analysis. Social networks are
often represented in the form of graphs which allows a large number of graph
analysis methods to be used for opinion leader detection. Some studies have
attempted to apply graph representation learning for opinion leader detection
and achieved good results. In this paper, we propose a model-agnostic framework
that formulate the opinion leader detection problem as a ranking task of node
embeddings. A variety of methods and datasets are chosen to analyze the
performance of our framework both qualitatively and quantitatively. Based on
the analysis results, we propose a strategy that combines opinion leaders
detected by two different ranking algorithms to obtain a more comprehensive set
of opinion leaders. And we analyze the temporal changes of the opinion leaders
in one of the dynamic social networks.
| no_new_dataset | 0.711049 |
2305.08671 | Xiufeng Xu | Xiufeng Xu, Chenguang Zhu, Yi Li | CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern software systems heavily rely on external libraries developed by
third-parties to ensure efficient development. However, frequent library
upgrades can lead to compatibility issues between the libraries and their
client systems. In this paper, we introduce CompSuite, a dataset that includes
123 real-world Java client-library pairs where upgrading the library causes an
incompatibility issue in the corresponding client. Each incompatibility issue
in CompSuite is associated with a test case authored by the developers, which
can be used to reproduce the issue. The dataset also provides a command-line
interface that simplifies the execution and validation of each issue. With this
infrastructure, users can perform an inspection of any incompatibility issue
with the push of a button, or reproduce an issue step-by-step for a more
detailed investigation. We make CompSuite publicly available to promote open
science. We believe that various software analysis techniques, such as
compatibility checking, debugging, and regression test selection, can benefit
from CompSuite.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 14:26:14 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Xu",
"Xiufeng",
""
],
[
"Zhu",
"Chenguang",
""
],
[
"Li",
"Yi",
""
]
] | TITLE: CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues
ABSTRACT: Modern software systems heavily rely on external libraries developed by
third-parties to ensure efficient development. However, frequent library
upgrades can lead to compatibility issues between the libraries and their
client systems. In this paper, we introduce CompSuite, a dataset that includes
123 real-world Java client-library pairs where upgrading the library causes an
incompatibility issue in the corresponding client. Each incompatibility issue
in CompSuite is associated with a test case authored by the developers, which
can be used to reproduce the issue. The dataset also provides a command-line
interface that simplifies the execution and validation of each issue. With this
infrastructure, users can perform an inspection of any incompatibility issue
with the push of a button, or reproduce an issue step-by-step for a more
detailed investigation. We make CompSuite publicly available to promote open
science. We believe that various software analysis techniques, such as
compatibility checking, debugging, and regression test selection, can benefit
from CompSuite.
| new_dataset | 0.713594 |
2305.08676 | Ibrahim Abdelaziz | Achille Fokoue, Ibrahim Abdelaziz, Maxwell Crouse, Shajith Ikbal,
Akihiro Kishimoto, Guilherme Lima, Ndivhuwo Makondo, Radu Marinescu | An Ensemble Approach for Automated Theorem Proving Based on Efficient
Name Invariant Graph Neural Representations | Accepted to IJCAI 2023 | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using reinforcement learning for automated theorem proving has recently
received much attention. Current approaches use representations of logical
statements that often rely on the names used in these statements and, as a
result, the models are generally not transferable from one domain to another.
The size of these representations and whether to include the whole theory or
part of it are other important decisions that affect the performance of these
approaches as well as their runtime efficiency. In this paper, we present
NIAGRA; an ensemble Name InvAriant Graph RepresentAtion. NIAGRA addresses this
problem by using 1) improved Graph Neural Networks for learning name-invariant
formula representations that is tailored for their unique characteristics and
2) an efficient ensemble approach for automated theorem proving. Our
experimental evaluation shows state-of-the-art performance on multiple datasets
from different domains with improvements up to 10% compared to the best
learning-based approaches. Furthermore, transfer learning experiments show that
our approach significantly outperforms other learning-based approaches by up to
28%.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 14:32:48 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Fokoue",
"Achille",
""
],
[
"Abdelaziz",
"Ibrahim",
""
],
[
"Crouse",
"Maxwell",
""
],
[
"Ikbal",
"Shajith",
""
],
[
"Kishimoto",
"Akihiro",
""
],
[
"Lima",
"Guilherme",
""
],
[
"Makondo",
"Ndivhuwo",
""
],
[
"Marinescu",
"Radu",
""
]
] | TITLE: An Ensemble Approach for Automated Theorem Proving Based on Efficient
Name Invariant Graph Neural Representations
ABSTRACT: Using reinforcement learning for automated theorem proving has recently
received much attention. Current approaches use representations of logical
statements that often rely on the names used in these statements and, as a
result, the models are generally not transferable from one domain to another.
The size of these representations and whether to include the whole theory or
part of it are other important decisions that affect the performance of these
approaches as well as their runtime efficiency. In this paper, we present
NIAGRA; an ensemble Name InvAriant Graph RepresentAtion. NIAGRA addresses this
problem by using 1) improved Graph Neural Networks for learning name-invariant
formula representations that is tailored for their unique characteristics and
2) an efficient ensemble approach for automated theorem proving. Our
experimental evaluation shows state-of-the-art performance on multiple datasets
from different domains with improvements up to 10% compared to the best
learning-based approaches. Furthermore, transfer learning experiments show that
our approach significantly outperforms other learning-based approaches by up to
28%.
| no_new_dataset | 0.70719 |
2305.08706 | Qingkai Fang | Qingkai Fang, Yang Feng | Understanding and Bridging the Modality Gap for Speech Translation | ACL 2023 main conference | null | null | null | cs.CL cs.SD eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | How to achieve better end-to-end speech translation (ST) by leveraging (text)
machine translation (MT) data? Among various existing techniques, multi-task
learning is one of the effective ways to share knowledge between ST and MT in
which additional MT data can help to learn source-to-target mapping. However,
due to the differences between speech and text, there is always a gap between
ST and MT. In this paper, we first aim to understand this modality gap from the
target-side representation differences, and link the modality gap to another
well-known problem in neural machine translation: exposure bias. We find that
the modality gap is relatively small during training except for some difficult
cases, but keeps increasing during inference due to the cascading effect. To
address these problems, we propose the Cross-modal Regularization with
Scheduled Sampling (Cress) method. Specifically, we regularize the output
predictions of ST and MT, whose target-side contexts are derived by sampling
between ground truth words and self-generated words with a varying probability.
Furthermore, we introduce token-level adaptive training which assigns different
training weights to target tokens to handle difficult cases with large modality
gaps. Experiments and analysis show that our approach effectively bridges the
modality gap, and achieves promising results in all eight directions of the
MuST-C dataset.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 15:09:18 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Fang",
"Qingkai",
""
],
[
"Feng",
"Yang",
""
]
] | TITLE: Understanding and Bridging the Modality Gap for Speech Translation
ABSTRACT: How to achieve better end-to-end speech translation (ST) by leveraging (text)
machine translation (MT) data? Among various existing techniques, multi-task
learning is one of the effective ways to share knowledge between ST and MT in
which additional MT data can help to learn source-to-target mapping. However,
due to the differences between speech and text, there is always a gap between
ST and MT. In this paper, we first aim to understand this modality gap from the
target-side representation differences, and link the modality gap to another
well-known problem in neural machine translation: exposure bias. We find that
the modality gap is relatively small during training except for some difficult
cases, but keeps increasing during inference due to the cascading effect. To
address these problems, we propose the Cross-modal Regularization with
Scheduled Sampling (Cress) method. Specifically, we regularize the output
predictions of ST and MT, whose target-side contexts are derived by sampling
between ground truth words and self-generated words with a varying probability.
Furthermore, we introduce token-level adaptive training which assigns different
training weights to target tokens to handle difficult cases with large modality
gaps. Experiments and analysis show that our approach effectively bridges the
modality gap, and achieves promising results in all eight directions of the
MuST-C dataset.
| no_new_dataset | 0.707815 |
2305.08709 | Qingkai Fang | Qingkai Fang, Yang Feng | Back Translation for Speech-to-text Translation Without Transcripts | ACL 2023 main conference | null | null | null | cs.CL cs.SD eess.AS | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The success of end-to-end speech-to-text translation (ST) is often achieved
by utilizing source transcripts, e.g., by pre-training with automatic speech
recognition (ASR) and machine translation (MT) tasks, or by introducing
additional ASR and MT data. Unfortunately, transcripts are only sometimes
available since numerous unwritten languages exist worldwide. In this paper, we
aim to utilize large amounts of target-side monolingual data to enhance ST
without transcripts. Motivated by the remarkable success of back translation in
MT, we develop a back translation algorithm for ST (BT4ST) to synthesize pseudo
ST data from monolingual target data. To ease the challenges posed by
short-to-long generation and one-to-many mapping, we introduce self-supervised
discrete units and achieve back translation by cascading a target-to-unit model
and a unit-to-speech model. With our synthetic ST data, we achieve an average
boost of 2.3 BLEU on MuST-C En-De, En-Fr, and En-Es datasets. More experiments
show that our method is especially effective in low-resource scenarios.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 15:12:40 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Fang",
"Qingkai",
""
],
[
"Feng",
"Yang",
""
]
] | TITLE: Back Translation for Speech-to-text Translation Without Transcripts
ABSTRACT: The success of end-to-end speech-to-text translation (ST) is often achieved
by utilizing source transcripts, e.g., by pre-training with automatic speech
recognition (ASR) and machine translation (MT) tasks, or by introducing
additional ASR and MT data. Unfortunately, transcripts are only sometimes
available since numerous unwritten languages exist worldwide. In this paper, we
aim to utilize large amounts of target-side monolingual data to enhance ST
without transcripts. Motivated by the remarkable success of back translation in
MT, we develop a back translation algorithm for ST (BT4ST) to synthesize pseudo
ST data from monolingual target data. To ease the challenges posed by
short-to-long generation and one-to-many mapping, we introduce self-supervised
discrete units and achieve back translation by cascading a target-to-unit model
and a unit-to-speech model. With our synthetic ST data, we achieve an average
boost of 2.3 BLEU on MuST-C En-De, En-Fr, and En-Es datasets. More experiments
show that our method is especially effective in low-resource scenarios.
| no_new_dataset | 0.708629 |
2305.08721 | Siyun Zhou | Qijun Song and Siyun Zhou and Liwei Xu | Learning More Discriminative Local Descriptors for Few-shot Learning | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Few-shot learning for image classification comes up as a hot topic in
computer vision, which aims at fast learning from a limited number of labeled
images and generalize over the new tasks. In this paper, motivated by the idea
of Fisher Score, we propose a Discriminative Local Descriptors Attention (DLDA)
model that adaptively selects the representative local descriptors and does not
introduce any additional parameters, while most of the existing local
descriptors based methods utilize the neural networks that inevitably involve
the tedious parameter tuning. Moreover, we modify the traditional $k$-NN
classification model by adjusting the weights of the $k$ nearest neighbors
according to their distances from the query point. Experiments on four
benchmark datasets show that our method not only achieves higher accuracy
compared with the state-of-art approaches for few-shot learning, but also
possesses lower sensitivity to the choices of $k$.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 15:33:55 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Song",
"Qijun",
""
],
[
"Zhou",
"Siyun",
""
],
[
"Xu",
"Liwei",
""
]
] | TITLE: Learning More Discriminative Local Descriptors for Few-shot Learning
ABSTRACT: Few-shot learning for image classification comes up as a hot topic in
computer vision, which aims at fast learning from a limited number of labeled
images and generalize over the new tasks. In this paper, motivated by the idea
of Fisher Score, we propose a Discriminative Local Descriptors Attention (DLDA)
model that adaptively selects the representative local descriptors and does not
introduce any additional parameters, while most of the existing local
descriptors based methods utilize the neural networks that inevitably involve
the tedious parameter tuning. Moreover, we modify the traditional $k$-NN
classification model by adjusting the weights of the $k$ nearest neighbors
according to their distances from the query point. Experiments on four
benchmark datasets show that our method not only achieves higher accuracy
compared with the state-of-art approaches for few-shot learning, but also
possesses lower sensitivity to the choices of $k$.
| no_new_dataset | 0.710666 |
2305.08733 | Rafael Orozco | Rafael Orozco, Ali Siahkoohi, Mathias Louboutin, Felix J. Herrmann | Refining Amortized Posterior Approximations using Gradient-Based Summary
Statistics | null | null | null | null | cs.LG physics.data-an | http://creativecommons.org/licenses/by/4.0/ | We present an iterative framework to improve the amortized approximations of
posterior distributions in the context of Bayesian inverse problems, which is
inspired by loop-unrolled gradient descent methods and is theoretically
grounded in maximally informative summary statistics. Amortized variational
inference is restricted by the expressive power of the chosen variational
distribution and the availability of training data in the form of joint data
and parameter samples, which often lead to approximation errors such as the
amortization gap. To address this issue, we propose an iterative framework that
refines the current amortized posterior approximation at each step. Our
approach involves alternating between two steps: (1) constructing a training
dataset consisting of pairs of summarized data residuals and parameters, where
the summarized data residual is generated using a gradient-based summary
statistic, and (2) training a conditional generative model -- a normalizing
flow in our examples -- on this dataset to obtain a probabilistic update of the
unknown parameter. This procedure leads to iterative refinement of the
amortized posterior approximations without the need for extra training data. We
validate our method in a controlled setting by applying it to a stylized
problem, and observe improved posterior approximations with each iteration.
Additionally, we showcase the capability of our method in tackling
realistically sized problems by applying it to transcranial ultrasound, a
high-dimensional, nonlinear inverse problem governed by wave physics, and
observe enhanced posterior quality through better image reconstruction with the
posterior mean.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 15:47:19 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Orozco",
"Rafael",
""
],
[
"Siahkoohi",
"Ali",
""
],
[
"Louboutin",
"Mathias",
""
],
[
"Herrmann",
"Felix J.",
""
]
] | TITLE: Refining Amortized Posterior Approximations using Gradient-Based Summary
Statistics
ABSTRACT: We present an iterative framework to improve the amortized approximations of
posterior distributions in the context of Bayesian inverse problems, which is
inspired by loop-unrolled gradient descent methods and is theoretically
grounded in maximally informative summary statistics. Amortized variational
inference is restricted by the expressive power of the chosen variational
distribution and the availability of training data in the form of joint data
and parameter samples, which often lead to approximation errors such as the
amortization gap. To address this issue, we propose an iterative framework that
refines the current amortized posterior approximation at each step. Our
approach involves alternating between two steps: (1) constructing a training
dataset consisting of pairs of summarized data residuals and parameters, where
the summarized data residual is generated using a gradient-based summary
statistic, and (2) training a conditional generative model -- a normalizing
flow in our examples -- on this dataset to obtain a probabilistic update of the
unknown parameter. This procedure leads to iterative refinement of the
amortized posterior approximations without the need for extra training data. We
validate our method in a controlled setting by applying it to a stylized
problem, and observe improved posterior approximations with each iteration.
Additionally, we showcase the capability of our method in tackling
realistically sized problems by applying it to transcranial ultrasound, a
high-dimensional, nonlinear inverse problem governed by wave physics, and
observe enhanced posterior quality through better image reconstruction with the
posterior mean.
| no_new_dataset | 0.707859 |
2305.08744 | Huajian Fang | Huajian Fang, Dennis Becker, Stefan Wermter and Timo Gerkmann | Integrating Uncertainty into Neural Network-based Speech Enhancement | Accepted version | IEEE/ACM Transactions on Audio, Speech, and Language Processing,
vol. 31, pp. 1587-1600, 2023 | 10.1109/TASLP.2023.3265202 | null | eess.AS cs.LG cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Supervised masking approaches in the time-frequency domain aim to employ deep
neural networks to estimate a multiplicative mask to extract clean speech. This
leads to a single estimate for each input without any guarantees or measures of
reliability. In this paper, we study the benefits of modeling uncertainty in
clean speech estimation. Prediction uncertainty is typically categorized into
aleatoric uncertainty and epistemic uncertainty. The former refers to inherent
randomness in data, while the latter describes uncertainty in the model
parameters. In this work, we propose a framework to jointly model aleatoric and
epistemic uncertainties in neural network-based speech enhancement. The
proposed approach captures aleatoric uncertainty by estimating the statistical
moments of the speech posterior distribution and explicitly incorporates the
uncertainty estimate to further improve clean speech estimation. For epistemic
uncertainty, we investigate two Bayesian deep learning approaches: Monte Carlo
dropout and Deep ensembles to quantify the uncertainty of the neural network
parameters. Our analyses show that the proposed framework promotes capturing
practical and reliable uncertainty, while combining different sources of
uncertainties yields more reliable predictive uncertainty estimates.
Furthermore, we demonstrate the benefits of modeling uncertainty on speech
enhancement performance by evaluating the framework on different datasets,
exhibiting notable improvement over comparable models that fail to account for
uncertainty.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 15:55:12 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Fang",
"Huajian",
""
],
[
"Becker",
"Dennis",
""
],
[
"Wermter",
"Stefan",
""
],
[
"Gerkmann",
"Timo",
""
]
] | TITLE: Integrating Uncertainty into Neural Network-based Speech Enhancement
ABSTRACT: Supervised masking approaches in the time-frequency domain aim to employ deep
neural networks to estimate a multiplicative mask to extract clean speech. This
leads to a single estimate for each input without any guarantees or measures of
reliability. In this paper, we study the benefits of modeling uncertainty in
clean speech estimation. Prediction uncertainty is typically categorized into
aleatoric uncertainty and epistemic uncertainty. The former refers to inherent
randomness in data, while the latter describes uncertainty in the model
parameters. In this work, we propose a framework to jointly model aleatoric and
epistemic uncertainties in neural network-based speech enhancement. The
proposed approach captures aleatoric uncertainty by estimating the statistical
moments of the speech posterior distribution and explicitly incorporates the
uncertainty estimate to further improve clean speech estimation. For epistemic
uncertainty, we investigate two Bayesian deep learning approaches: Monte Carlo
dropout and Deep ensembles to quantify the uncertainty of the neural network
parameters. Our analyses show that the proposed framework promotes capturing
practical and reliable uncertainty, while combining different sources of
uncertainties yields more reliable predictive uncertainty estimates.
Furthermore, we demonstrate the benefits of modeling uncertainty on speech
enhancement performance by evaluating the framework on different datasets,
exhibiting notable improvement over comparable models that fail to account for
uncertainty.
| no_new_dataset | 0.708629 |
2305.08778 | Longbing Cao | Jia Xu and Longbing Cao | Copula Variational LSTM for High-dimensional Cross-market Multivariate
Dependence Modeling | 15 pages, 7 figures | null | null | null | q-fin.ST cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address an important yet challenging problem - modeling high-dimensional
dependencies across multivariates such as financial indicators in heterogeneous
markets. In reality, a market couples and influences others over time, and the
financial variables of a market are also coupled. We make the first attempt to
integrate variational sequential neural learning with copula-based dependence
modeling to characterize both temporal observable and latent variable-based
dependence degrees and structures across non-normal multivariates. Our
variational neural network WPVC-VLSTM models variational sequential dependence
degrees and structures across multivariate time series by variational long
short-term memory networks and regular vine copula. The regular vine copula
models nonnormal and long-range distributional couplings across multiple
dynamic variables. WPVC-VLSTM is verified in terms of both technical
significance and portfolio forecasting performance. It outperforms benchmarks
including linear models, stochastic volatility models, deep neural networks,
and variational recurrent networks in cross-market portfolio forecasting.
| [
{
"version": "v1",
"created": "Tue, 9 May 2023 08:19:08 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Xu",
"Jia",
""
],
[
"Cao",
"Longbing",
""
]
] | TITLE: Copula Variational LSTM for High-dimensional Cross-market Multivariate
Dependence Modeling
ABSTRACT: We address an important yet challenging problem - modeling high-dimensional
dependencies across multivariates such as financial indicators in heterogeneous
markets. In reality, a market couples and influences others over time, and the
financial variables of a market are also coupled. We make the first attempt to
integrate variational sequential neural learning with copula-based dependence
modeling to characterize both temporal observable and latent variable-based
dependence degrees and structures across non-normal multivariates. Our
variational neural network WPVC-VLSTM models variational sequential dependence
degrees and structures across multivariate time series by variational long
short-term memory networks and regular vine copula. The regular vine copula
models nonnormal and long-range distributional couplings across multiple
dynamic variables. WPVC-VLSTM is verified in terms of both technical
significance and portfolio forecasting performance. It outperforms benchmarks
including linear models, stochastic volatility models, deep neural networks,
and variational recurrent networks in cross-market portfolio forecasting.
| no_new_dataset | 0.710848 |
2305.08779 | Matthew Korban | Matthew Korban, Peter Young, Scott T. Acton | TAA-GCN: A Temporally Aware Adaptive Graph Convolutional Network for Age
Estimation | null | Pattern Recognition 2023 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel age estimation algorithm, the Temporally-Aware
Adaptive Graph Convolutional Network (TAA-GCN). Using a new representation
based on graphs, the TAA-GCN utilizes skeletal, posture, clothing, and facial
information to enrich the feature set associated with various ages. Such a
novel graph representation has several advantages: First, reduced sensitivity
to facial expression and other appearance variances; Second, robustness to
partial occlusion and non-frontal-planar viewpoint, which is commonplace in
real-world applications such as video surveillance. The TAA-GCN employs two
novel components, (1) the Temporal Memory Module (TMM) to compute temporal
dependencies in age; (2) Adaptive Graph Convolutional Layer (AGCL) to refine
the graphs and accommodate the variance in appearance. The TAA-GCN outperforms
the state-of-the-art methods on four public benchmarks, UTKFace, MORPHII, CACD,
and FG-NET. Moreover, the TAA-GCN showed reliability in different camera
viewpoints and reduced quality images.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 16:38:55 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Korban",
"Matthew",
""
],
[
"Young",
"Peter",
""
],
[
"Acton",
"Scott T.",
""
]
] | TITLE: TAA-GCN: A Temporally Aware Adaptive Graph Convolutional Network for Age
Estimation
ABSTRACT: This paper proposes a novel age estimation algorithm, the Temporally-Aware
Adaptive Graph Convolutional Network (TAA-GCN). Using a new representation
based on graphs, the TAA-GCN utilizes skeletal, posture, clothing, and facial
information to enrich the feature set associated with various ages. Such a
novel graph representation has several advantages: First, reduced sensitivity
to facial expression and other appearance variances; Second, robustness to
partial occlusion and non-frontal-planar viewpoint, which is commonplace in
real-world applications such as video surveillance. The TAA-GCN employs two
novel components, (1) the Temporal Memory Module (TMM) to compute temporal
dependencies in age; (2) Adaptive Graph Convolutional Layer (AGCL) to refine
the graphs and accommodate the variance in appearance. The TAA-GCN outperforms
the state-of-the-art methods on four public benchmarks, UTKFace, MORPHII, CACD,
and FG-NET. Moreover, the TAA-GCN showed reliability in different camera
viewpoints and reduced quality images.
| no_new_dataset | 0.711418 |
2305.08796 | Daniel Hothem | Daniel Hothem, Jordan Hines, Karthik Nataraj, Robin Blume-Kohout, and
Timothy Proctor | Predictive Models from Quantum Computer Benchmarks | null | null | null | null | quant-ph cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Holistic benchmarks for quantum computers are essential for testing and
summarizing the performance of quantum hardware. However, holistic benchmarks
-- such as algorithmic or randomized benchmarks -- typically do not predict a
processor's performance on circuits outside the benchmark's necessarily very
limited set of test circuits. In this paper, we introduce a general framework
for building predictive models from benchmarking data using capability models.
Capability models can be fit to many kinds of benchmarking data and used for a
variety of predictive tasks. We demonstrate this flexibility with two case
studies. In the first case study, we predict circuit (i) process fidelities and
(ii) success probabilities by fitting error rates models to two kinds of
volumetric benchmarking data. Error rates models are simple, yet versatile
capability models which assign effective error rates to individual gates, or
more general circuit components. In the second case study, we construct a
capability model for predicting circuit success probabilities by applying
transfer learning to ResNet50, a neural network trained for image
classification. Our case studies use data from cloud-accessible quantum
computers and simulations of noisy quantum computers.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:00:23 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Hothem",
"Daniel",
""
],
[
"Hines",
"Jordan",
""
],
[
"Nataraj",
"Karthik",
""
],
[
"Blume-Kohout",
"Robin",
""
],
[
"Proctor",
"Timothy",
""
]
] | TITLE: Predictive Models from Quantum Computer Benchmarks
ABSTRACT: Holistic benchmarks for quantum computers are essential for testing and
summarizing the performance of quantum hardware. However, holistic benchmarks
-- such as algorithmic or randomized benchmarks -- typically do not predict a
processor's performance on circuits outside the benchmark's necessarily very
limited set of test circuits. In this paper, we introduce a general framework
for building predictive models from benchmarking data using capability models.
Capability models can be fit to many kinds of benchmarking data and used for a
variety of predictive tasks. We demonstrate this flexibility with two case
studies. In the first case study, we predict circuit (i) process fidelities and
(ii) success probabilities by fitting error rates models to two kinds of
volumetric benchmarking data. Error rates models are simple, yet versatile
capability models which assign effective error rates to individual gates, or
more general circuit components. In the second case study, we construct a
capability model for predicting circuit success probabilities by applying
transfer learning to ResNet50, a neural network trained for image
classification. Our case studies use data from cloud-accessible quantum
computers and simulations of noisy quantum computers.
| no_new_dataset | 0.711875 |
2305.08801 | Robert Underwood | Robert Underwood, Julie Bessac, David Krasowska, Jon C. Calhoun, Sheng
Di, Franck Cappello | Black-Box Statistical Prediction of Lossy Compression Ratios for
Scientific Data | 16 pages, 10 figures | null | null | null | cs.DC cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | Lossy compressors are increasingly adopted in scientific research, tackling
volumes of data from experiments or parallel numerical simulations and
facilitating data storage and movement. In contrast with the notion of entropy
in lossless compression, no theoretical or data-based quantification of lossy
compressibility exists for scientific data. Users rely on trial and error to
assess lossy compression performance. As a strong data-driven effort toward
quantifying lossy compressibility of scientific datasets, we provide a
statistical framework to predict compression ratios of lossy compressors. Our
method is a two-step framework where (i) compressor-agnostic predictors are
computed and (ii) statistical prediction models relying on these predictors are
trained on observed compression ratios. Proposed predictors exploit spatial
correlations and notions of entropy and lossyness via the quantized entropy. We
study 8+ compressors on 6 scientific datasets and achieve a median percentage
prediction error less than 12%, which is substantially smaller than that of
other methods while achieving at least a 8.8x speedup for searching for a
specific compression ratio and 7.8x speedup for determining the best compressor
out of a collection.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:06:02 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Underwood",
"Robert",
""
],
[
"Bessac",
"Julie",
""
],
[
"Krasowska",
"David",
""
],
[
"Calhoun",
"Jon C.",
""
],
[
"Di",
"Sheng",
""
],
[
"Cappello",
"Franck",
""
]
] | TITLE: Black-Box Statistical Prediction of Lossy Compression Ratios for
Scientific Data
ABSTRACT: Lossy compressors are increasingly adopted in scientific research, tackling
volumes of data from experiments or parallel numerical simulations and
facilitating data storage and movement. In contrast with the notion of entropy
in lossless compression, no theoretical or data-based quantification of lossy
compressibility exists for scientific data. Users rely on trial and error to
assess lossy compression performance. As a strong data-driven effort toward
quantifying lossy compressibility of scientific datasets, we provide a
statistical framework to predict compression ratios of lossy compressors. Our
method is a two-step framework where (i) compressor-agnostic predictors are
computed and (ii) statistical prediction models relying on these predictors are
trained on observed compression ratios. Proposed predictors exploit spatial
correlations and notions of entropy and lossyness via the quantized entropy. We
study 8+ compressors on 6 scientific datasets and achieve a median percentage
prediction error less than 12%, which is substantially smaller than that of
other methods while achieving at least a 8.8x speedup for searching for a
specific compression ratio and 7.8x speedup for determining the best compressor
out of a collection.
| no_new_dataset | 0.710478 |
2305.08810 | Yuang Wang | Yuang Wang, Xingyi He, Sida Peng, Haotong Lin, Hujun Bao, Xiaowei Zhou | AutoRecon: Automated 3D Object Discovery and Reconstruction | Accepted to CVPR 2023 (Highlight). Project page:
https://zju3dv.github.io/autorecon | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | A fully automated object reconstruction pipeline is crucial for digital
content creation. While the area of 3D reconstruction has witnessed profound
developments, the removal of background to obtain a clean object model still
relies on different forms of manual labor, such as bounding box labeling, mask
annotations, and mesh manipulations. In this paper, we propose a novel
framework named AutoRecon for the automated discovery and reconstruction of an
object from multi-view images. We demonstrate that foreground objects can be
robustly located and segmented from SfM point clouds by leveraging
self-supervised 2D vision transformer features. Then, we reconstruct decomposed
neural scene representations with dense supervision provided by the decomposed
point clouds, resulting in accurate object reconstruction and segmentation.
Experiments on the DTU, BlendedMVS and CO3D-V2 datasets demonstrate the
effectiveness and robustness of AutoRecon.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:16:46 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Wang",
"Yuang",
""
],
[
"He",
"Xingyi",
""
],
[
"Peng",
"Sida",
""
],
[
"Lin",
"Haotong",
""
],
[
"Bao",
"Hujun",
""
],
[
"Zhou",
"Xiaowei",
""
]
] | TITLE: AutoRecon: Automated 3D Object Discovery and Reconstruction
ABSTRACT: A fully automated object reconstruction pipeline is crucial for digital
content creation. While the area of 3D reconstruction has witnessed profound
developments, the removal of background to obtain a clean object model still
relies on different forms of manual labor, such as bounding box labeling, mask
annotations, and mesh manipulations. In this paper, we propose a novel
framework named AutoRecon for the automated discovery and reconstruction of an
object from multi-view images. We demonstrate that foreground objects can be
robustly located and segmented from SfM point clouds by leveraging
self-supervised 2D vision transformer features. Then, we reconstruct decomposed
neural scene representations with dense supervision provided by the decomposed
point clouds, resulting in accurate object reconstruction and segmentation.
Experiments on the DTU, BlendedMVS and CO3D-V2 datasets demonstrate the
effectiveness and robustness of AutoRecon.
| no_new_dataset | 0.70978 |
2305.08824 | Jingxia Jiang | Jingxia Jiang, Tian Ye, Jinbin Bai, Sixiang Chen, Wenhao Chai, Shi
Jun, Yun Liu and Erkang Chen | Five A$^{+}$ Network: You Only Need 9K Parameters for Underwater Image
Enhancement | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A lightweight underwater image enhancement network is of great significance
for resource-constrained platforms, but balancing model size, computational
efficiency, and enhancement performance has proven difficult for previous
approaches. In this work, we propose the Five A$^{+}$ Network (FA$^{+}$Net), a
highly efficient and lightweight real-time underwater image enhancement network
with only $\sim$ 9k parameters and $\sim$ 0.01s processing time. The
FA$^{+}$Net employs a two-stage enhancement structure. The strong prior stage
aims to decompose challenging underwater degradations into sub-problems, while
the fine-grained stage incorporates multi-branch color enhancement module and
pixel attention module to amplify the network's perception of details. To the
best of our knowledge, FA$^{+}$Net is the only network with the capability of
real-time enhancement of 1080P images. Thorough extensive experiments and
comprehensive visual comparison, we show that FA$^{+}$Net outperforms previous
approaches by obtaining state-of-the-art performance on multiple datasets while
significantly reducing both parameter count and computational complexity. The
code is open source at https://github.com/Owen718/FiveAPlus-Network.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:33:29 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Jiang",
"Jingxia",
""
],
[
"Ye",
"Tian",
""
],
[
"Bai",
"Jinbin",
""
],
[
"Chen",
"Sixiang",
""
],
[
"Chai",
"Wenhao",
""
],
[
"Jun",
"Shi",
""
],
[
"Liu",
"Yun",
""
],
[
"Chen",
"Erkang",
""
]
] | TITLE: Five A$^{+}$ Network: You Only Need 9K Parameters for Underwater Image
Enhancement
ABSTRACT: A lightweight underwater image enhancement network is of great significance
for resource-constrained platforms, but balancing model size, computational
efficiency, and enhancement performance has proven difficult for previous
approaches. In this work, we propose the Five A$^{+}$ Network (FA$^{+}$Net), a
highly efficient and lightweight real-time underwater image enhancement network
with only $\sim$ 9k parameters and $\sim$ 0.01s processing time. The
FA$^{+}$Net employs a two-stage enhancement structure. The strong prior stage
aims to decompose challenging underwater degradations into sub-problems, while
the fine-grained stage incorporates multi-branch color enhancement module and
pixel attention module to amplify the network's perception of details. To the
best of our knowledge, FA$^{+}$Net is the only network with the capability of
real-time enhancement of 1080P images. Thorough extensive experiments and
comprehensive visual comparison, we show that FA$^{+}$Net outperforms previous
approaches by obtaining state-of-the-art performance on multiple datasets while
significantly reducing both parameter count and computational complexity. The
code is open source at https://github.com/Owen718/FiveAPlus-Network.
| no_new_dataset | 0.709831 |
2305.08826 | Sheng Wang | Sheng Wang, Zixu Zhuang, Xi Ouyang, Lichi Zhang, Zheren Li, Chong Ma,
Tianming Liu, Dinggang Shen, Qian Wang | Learning Better Contrastive View from Radiologist's Gaze | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recent self-supervised contrastive learning methods greatly benefit from the
Siamese structure that aims to minimizing distances between positive pairs.
These methods usually apply random data augmentation to input images, expecting
the augmented views of the same images to be similar and positively paired.
However, random augmentation may overlook image semantic information and
degrade the quality of augmented views in contrastive learning. This issue
becomes more challenging in medical images since the abnormalities related to
diseases can be tiny, and are easy to be corrupted (e.g., being cropped out) in
the current scheme of random augmentation. In this work, we first demonstrate
that, for widely-used X-ray images, the conventional augmentation prevalent in
contrastive pre-training can affect the performance of the downstream diagnosis
or classification tasks. Then, we propose a novel augmentation method, i.e.,
FocusContrast, to learn from radiologists' gaze in diagnosis and generate
contrastive views for medical images with guidance from radiologists' visual
attention. Specifically, we track the gaze movement of radiologists and model
their visual attention when reading to diagnose X-ray images. The learned model
can predict visual attention of the radiologists given a new input image, and
further guide the attention-aware augmentation that hardly neglects the
disease-related abnormalities. As a plug-and-play and framework-agnostic
module, FocusContrast consistently improves state-of-the-art contrastive
learning methods of SimCLR, MoCo, and BYOL by 4.0~7.0% in classification
accuracy on a knee X-ray dataset.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:34:49 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Wang",
"Sheng",
""
],
[
"Zhuang",
"Zixu",
""
],
[
"Ouyang",
"Xi",
""
],
[
"Zhang",
"Lichi",
""
],
[
"Li",
"Zheren",
""
],
[
"Ma",
"Chong",
""
],
[
"Liu",
"Tianming",
""
],
[
"Shen",
"Dinggang",
""
],
[
"Wang",
"Qian",
""
]
] | TITLE: Learning Better Contrastive View from Radiologist's Gaze
ABSTRACT: Recent self-supervised contrastive learning methods greatly benefit from the
Siamese structure that aims to minimizing distances between positive pairs.
These methods usually apply random data augmentation to input images, expecting
the augmented views of the same images to be similar and positively paired.
However, random augmentation may overlook image semantic information and
degrade the quality of augmented views in contrastive learning. This issue
becomes more challenging in medical images since the abnormalities related to
diseases can be tiny, and are easy to be corrupted (e.g., being cropped out) in
the current scheme of random augmentation. In this work, we first demonstrate
that, for widely-used X-ray images, the conventional augmentation prevalent in
contrastive pre-training can affect the performance of the downstream diagnosis
or classification tasks. Then, we propose a novel augmentation method, i.e.,
FocusContrast, to learn from radiologists' gaze in diagnosis and generate
contrastive views for medical images with guidance from radiologists' visual
attention. Specifically, we track the gaze movement of radiologists and model
their visual attention when reading to diagnose X-ray images. The learned model
can predict visual attention of the radiologists given a new input image, and
further guide the attention-aware augmentation that hardly neglects the
disease-related abnormalities. As a plug-and-play and framework-agnostic
module, FocusContrast consistently improves state-of-the-art contrastive
learning methods of SimCLR, MoCo, and BYOL by 4.0~7.0% in classification
accuracy on a knee X-ray dataset.
| no_new_dataset | 0.709988 |
2305.08840 | Abhijay Ghildyal | Abhijay Ghildyal and Feng Liu | Attacking Perceptual Similarity Metrics | TMLR 2023 (Featured Certification). Code is available at
https://tinyurl.com/attackingpsm | null | null | null | cs.CV eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Perceptual similarity metrics have progressively become more correlated with
human judgments on perceptual similarity; however, despite recent advances, the
addition of an imperceptible distortion can still compromise these metrics. In
our study, we systematically examine the robustness of these metrics to
imperceptible adversarial perturbations. Following the two-alternative
forced-choice experimental design with two distorted images and one reference
image, we perturb the distorted image closer to the reference via an
adversarial attack until the metric flips its judgment. We first show that all
metrics in our study are susceptible to perturbations generated via common
adversarial attacks such as FGSM, PGD, and the One-pixel attack. Next, we
attack the widely adopted LPIPS metric using spatial-transformation-based
adversarial perturbations (stAdv) in a white-box setting to craft adversarial
examples that can effectively transfer to other similarity metrics in a
black-box setting. We also combine the spatial attack stAdv with PGD
($\ell_\infty$-bounded) attack to increase transferability and use these
adversarial examples to benchmark the robustness of both traditional and
recently developed metrics. Our benchmark provides a good starting point for
discussion and further research on the robustness of metrics to imperceptible
adversarial perturbations.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:55:04 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Ghildyal",
"Abhijay",
""
],
[
"Liu",
"Feng",
""
]
] | TITLE: Attacking Perceptual Similarity Metrics
ABSTRACT: Perceptual similarity metrics have progressively become more correlated with
human judgments on perceptual similarity; however, despite recent advances, the
addition of an imperceptible distortion can still compromise these metrics. In
our study, we systematically examine the robustness of these metrics to
imperceptible adversarial perturbations. Following the two-alternative
forced-choice experimental design with two distorted images and one reference
image, we perturb the distorted image closer to the reference via an
adversarial attack until the metric flips its judgment. We first show that all
metrics in our study are susceptible to perturbations generated via common
adversarial attacks such as FGSM, PGD, and the One-pixel attack. Next, we
attack the widely adopted LPIPS metric using spatial-transformation-based
adversarial perturbations (stAdv) in a white-box setting to craft adversarial
examples that can effectively transfer to other similarity metrics in a
black-box setting. We also combine the spatial attack stAdv with PGD
($\ell_\infty$-bounded) attack to increase transferability and use these
adversarial examples to benchmark the robustness of both traditional and
recently developed metrics. Our benchmark provides a good starting point for
discussion and further research on the robustness of metrics to imperceptible
adversarial perturbations.
| no_new_dataset | 0.708421 |
2305.08853 | Satya Almasian | Satya Almasian, Vivian Kazakova, Philip G\"oldner and Michael Gertz | CQE: A Comprehensive Quantity Extractor | 8 pages of content, 3 page of appendix | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Quantities are essential in documents to describe factual information. They
are ubiquitous in application domains such as finance, business, medicine, and
science in general. Compared to other information extraction approaches,
interestingly only a few works exist that describe methods for a proper
extraction and representation of quantities in text. In this paper, we present
such a comprehensive quantity extraction framework from text data. It
efficiently detects combinations of values and units, the behavior of a
quantity (e.g., rising or falling), and the concept a quantity is associated
with. Our framework makes use of dependency parsing and a dictionary of units,
and it provides for a proper normalization and standardization of detected
quantities. Using a novel dataset for evaluation, we show that our open source
framework outperforms other systems and -- to the best of our knowledge -- is
the first to detect concepts associated with identified quantities. The code
and data underlying our framework are available at
https://github.com/vivkaz/CQE.
| [
{
"version": "v1",
"created": "Mon, 15 May 2023 17:59:41 GMT"
}
] | 2023-05-16T00:00:00 | [
[
"Almasian",
"Satya",
""
],
[
"Kazakova",
"Vivian",
""
],
[
"Göldner",
"Philip",
""
],
[
"Gertz",
"Michael",
""
]
] | TITLE: CQE: A Comprehensive Quantity Extractor
ABSTRACT: Quantities are essential in documents to describe factual information. They
are ubiquitous in application domains such as finance, business, medicine, and
science in general. Compared to other information extraction approaches,
interestingly only a few works exist that describe methods for a proper
extraction and representation of quantities in text. In this paper, we present
such a comprehensive quantity extraction framework from text data. It
efficiently detects combinations of values and units, the behavior of a
quantity (e.g., rising or falling), and the concept a quantity is associated
with. Our framework makes use of dependency parsing and a dictionary of units,
and it provides for a proper normalization and standardization of detected
quantities. Using a novel dataset for evaluation, we show that our open source
framework outperforms other systems and -- to the best of our knowledge -- is
the first to detect concepts associated with identified quantities. The code
and data underlying our framework are available at
https://github.com/vivkaz/CQE.
| new_dataset | 0.716417 |
2011.14137 | Abdul Wahab | Abdul Wahab, Muhammad Anas Tahir, Naveed Iqbal, Faisal Shafait, Syed
Muhammad Raza Kazmi | Short-Term Load Forecasting using Bi-directional Sequential Models and
Feature Engineering for Small Datasets | 8 pages, 13 figures, 5 tables. Submitted to IEEE Transactions on
Power Systems, 2020 | null | 10.1109/ACCESS.2021.3093481 | null | cs.LG cs.IR cs.NE eess.SP | http://creativecommons.org/licenses/by/4.0/ | Electricity load forecasting enables the grid operators to optimally
implement the smart grid's most essential features such as demand response and
energy efficiency. Electricity demand profiles can vary drastically from one
region to another on diurnal, seasonal and yearly scale. Hence to devise a load
forecasting technique that can yield the best estimates on diverse datasets,
specially when the training data is limited, is a big challenge. This paper
presents a deep learning architecture for short-term load forecasting based on
bidirectional sequential models in conjunction with feature engineering that
extracts the hand-crafted derived features in order to aid the model for better
learning and predictions. In the proposed architecture, named as Deep Derived
Feature Fusion (DeepDeFF), the raw input and hand-crafted features are trained
at separate levels and then their respective outputs are combined to make the
final prediction. The efficacy of the proposed methodology is evaluated on
datasets from five countries with completely different patterns. The results
demonstrate that the proposed technique is superior to the existing state of
the art.
| [
{
"version": "v1",
"created": "Sat, 28 Nov 2020 14:11:35 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wahab",
"Abdul",
""
],
[
"Tahir",
"Muhammad Anas",
""
],
[
"Iqbal",
"Naveed",
""
],
[
"Shafait",
"Faisal",
""
],
[
"Kazmi",
"Syed Muhammad Raza",
""
]
] | TITLE: Short-Term Load Forecasting using Bi-directional Sequential Models and
Feature Engineering for Small Datasets
ABSTRACT: Electricity load forecasting enables the grid operators to optimally
implement the smart grid's most essential features such as demand response and
energy efficiency. Electricity demand profiles can vary drastically from one
region to another on diurnal, seasonal and yearly scale. Hence to devise a load
forecasting technique that can yield the best estimates on diverse datasets,
specially when the training data is limited, is a big challenge. This paper
presents a deep learning architecture for short-term load forecasting based on
bidirectional sequential models in conjunction with feature engineering that
extracts the hand-crafted derived features in order to aid the model for better
learning and predictions. In the proposed architecture, named as Deep Derived
Feature Fusion (DeepDeFF), the raw input and hand-crafted features are trained
at separate levels and then their respective outputs are combined to make the
final prediction. The efficacy of the proposed methodology is evaluated on
datasets from five countries with completely different patterns. The results
demonstrate that the proposed technique is superior to the existing state of
the art.
| no_new_dataset | 0.710616 |
2101.04639 | Carlos Busso | Sumit Jha, Mohamed F. Marzban, Tiancheng Hu, Mohamed H. Mahmoud,
Naofal Al-Dhahir, Carlos Busso | The Multimodal Driver Monitoring Database: A Naturalistic Corpus to
Study Driver Attention | 14 pages, 12 Figures, 3 tables | IEEE Transactions on Intelligent Transportation Systems, vol. 23,
no. 8, pp. 10736-10752, August 2022 | 10.1109/TITS.2021.3095462 | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | A smart vehicle should be able to monitor the actions and behaviors of the
human driver to provide critical warnings or intervene when necessary. Recent
advancements in deep learning and computer vision have shown great promise in
monitoring human behaviors and activities. While these algorithms work well in
a controlled environment, naturalistic driving conditions add new challenges
such as illumination variations, occlusions and extreme head poses. A vast
amount of in-domain data is required to train models that provide high
performance in predicting driving related tasks to effectively monitor driver
actions and behaviors. Toward building the required infrastructure, this paper
presents the multimodal driver monitoring (MDM) dataset, which was collected
with 59 subjects that were recorded performing various tasks. We use the Fi-
Cap device that continuously tracks the head movement of the driver using
fiducial markers, providing frame-based annotations to train head pose
algorithms in naturalistic driving conditions. We ask the driver to look at
predetermined gaze locations to obtain accurate correlation between the
driver's facial image and visual attention. We also collect data when the
driver performs common secondary activities such as navigation using a smart
phone and operating the in-car infotainment system. All of the driver's
activities are recorded with high definition RGB cameras and time-of-flight
depth camera. We also record the controller area network-bus (CAN-Bus),
extracting important information. These high quality recordings serve as the
ideal resource to train various efficient algorithms for monitoring the driver,
providing further advancements in the field of in-vehicle safety systems.
| [
{
"version": "v1",
"created": "Wed, 23 Dec 2020 16:37:17 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Jha",
"Sumit",
""
],
[
"Marzban",
"Mohamed F.",
""
],
[
"Hu",
"Tiancheng",
""
],
[
"Mahmoud",
"Mohamed H.",
""
],
[
"Al-Dhahir",
"Naofal",
""
],
[
"Busso",
"Carlos",
""
]
] | TITLE: The Multimodal Driver Monitoring Database: A Naturalistic Corpus to
Study Driver Attention
ABSTRACT: A smart vehicle should be able to monitor the actions and behaviors of the
human driver to provide critical warnings or intervene when necessary. Recent
advancements in deep learning and computer vision have shown great promise in
monitoring human behaviors and activities. While these algorithms work well in
a controlled environment, naturalistic driving conditions add new challenges
such as illumination variations, occlusions and extreme head poses. A vast
amount of in-domain data is required to train models that provide high
performance in predicting driving related tasks to effectively monitor driver
actions and behaviors. Toward building the required infrastructure, this paper
presents the multimodal driver monitoring (MDM) dataset, which was collected
with 59 subjects that were recorded performing various tasks. We use the Fi-
Cap device that continuously tracks the head movement of the driver using
fiducial markers, providing frame-based annotations to train head pose
algorithms in naturalistic driving conditions. We ask the driver to look at
predetermined gaze locations to obtain accurate correlation between the
driver's facial image and visual attention. We also collect data when the
driver performs common secondary activities such as navigation using a smart
phone and operating the in-car infotainment system. All of the driver's
activities are recorded with high definition RGB cameras and time-of-flight
depth camera. We also record the controller area network-bus (CAN-Bus),
extracting important information. These high quality recordings serve as the
ideal resource to train various efficient algorithms for monitoring the driver,
providing further advancements in the field of in-vehicle safety systems.
| new_dataset | 0.717204 |
2105.10996 | Sarah Ostadabbas | Shuangjun Liu, Michael Wan, and Sarah Ostadabbas | Heuristic Weakly Supervised 3D Human Pose Estimation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Monocular 3D human pose estimation from RGB images has attracted significant
attention in recent years. However, recent models depend on supervised training
with 3D pose ground truth data or known pose priors for their target domains.
3D pose data is typically collected with motion capture devices, severely
limiting their applicability. In this paper, we present a heuristic weakly
supervised 3D human pose (HW-HuP) solution to estimate 3D poses in when no
ground truth 3D pose data is available. HW-HuP learns partial pose priors from
3D human pose datasets and uses easy-to-access observations from the target
domain to estimate 3D human pose and shape in an optimization and regression
cycle. We employ depth data for weak supervision during training, but not
inference. We show that HW-HuP meaningfully improves upon state-of-the-art
models in two practical settings where 3D pose data can hardly be obtained:
human poses in bed, and infant poses in the wild. Furthermore, we show that
HW-HuP retains comparable performance to cutting-edge models on public
benchmarks, even when such models train on 3D pose data.
| [
{
"version": "v1",
"created": "Sun, 23 May 2021 18:40:29 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Jan 2022 20:58:21 GMT"
},
{
"version": "v3",
"created": "Fri, 12 May 2023 15:31:17 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Liu",
"Shuangjun",
""
],
[
"Wan",
"Michael",
""
],
[
"Ostadabbas",
"Sarah",
""
]
] | TITLE: Heuristic Weakly Supervised 3D Human Pose Estimation
ABSTRACT: Monocular 3D human pose estimation from RGB images has attracted significant
attention in recent years. However, recent models depend on supervised training
with 3D pose ground truth data or known pose priors for their target domains.
3D pose data is typically collected with motion capture devices, severely
limiting their applicability. In this paper, we present a heuristic weakly
supervised 3D human pose (HW-HuP) solution to estimate 3D poses in when no
ground truth 3D pose data is available. HW-HuP learns partial pose priors from
3D human pose datasets and uses easy-to-access observations from the target
domain to estimate 3D human pose and shape in an optimization and regression
cycle. We employ depth data for weak supervision during training, but not
inference. We show that HW-HuP meaningfully improves upon state-of-the-art
models in two practical settings where 3D pose data can hardly be obtained:
human poses in bed, and infant poses in the wild. Furthermore, we show that
HW-HuP retains comparable performance to cutting-edge models on public
benchmarks, even when such models train on 3D pose data.
| no_new_dataset | 0.710998 |
2107.00327 | Ming Zhang | Ming Zhang, Xuefei Zhe, Hong Yan | Orthonormal Product Quantization Network for Scalable Face Image
Retrieval | Published in Pattern Recognition, supplementary material can be found
in Github project page | null | null | null | cs.CV | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Existing deep quantization methods provided an efficient solution for
large-scale image retrieval. However, the significant intra-class variations
like pose, illumination, and expressions in face images, still pose a challenge
for face image retrieval. In light of this, face image retrieval requires
sufficiently powerful learning metrics, which are absent in current deep
quantization works. Moreover, to tackle the growing unseen identities in the
query stage, face image retrieval drives more demands regarding model
generalization and system scalability than general image retrieval tasks. This
paper integrates product quantization with orthonormal constraints into an
end-to-end deep learning framework to effectively retrieve face images.
Specifically, a novel scheme that uses predefined orthonormal vectors as
codewords is proposed to enhance the quantization informativeness and reduce
codewords' redundancy. A tailored loss function maximizes discriminability
among identities in each quantization subspace for both the quantized and
original features. An entropy-based regularization term is imposed to reduce
the quantization error. Experiments are conducted on four commonly-used face
datasets under both seen and unseen identities retrieval settings. Our method
outperforms all the compared deep hashing/quantization state-of-the-arts under
both settings. Results validate the effectiveness of the proposed orthonormal
codewords in improving models' standard retrieval performance and
generalization ability. Combing with further experiments on two general image
datasets, it demonstrates the broad superiority of our method for scalable
image retrieval.
| [
{
"version": "v1",
"created": "Thu, 1 Jul 2021 09:30:39 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Aug 2021 15:23:54 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Mar 2022 20:38:05 GMT"
},
{
"version": "v4",
"created": "Fri, 12 May 2023 11:56:11 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhang",
"Ming",
""
],
[
"Zhe",
"Xuefei",
""
],
[
"Yan",
"Hong",
""
]
] | TITLE: Orthonormal Product Quantization Network for Scalable Face Image
Retrieval
ABSTRACT: Existing deep quantization methods provided an efficient solution for
large-scale image retrieval. However, the significant intra-class variations
like pose, illumination, and expressions in face images, still pose a challenge
for face image retrieval. In light of this, face image retrieval requires
sufficiently powerful learning metrics, which are absent in current deep
quantization works. Moreover, to tackle the growing unseen identities in the
query stage, face image retrieval drives more demands regarding model
generalization and system scalability than general image retrieval tasks. This
paper integrates product quantization with orthonormal constraints into an
end-to-end deep learning framework to effectively retrieve face images.
Specifically, a novel scheme that uses predefined orthonormal vectors as
codewords is proposed to enhance the quantization informativeness and reduce
codewords' redundancy. A tailored loss function maximizes discriminability
among identities in each quantization subspace for both the quantized and
original features. An entropy-based regularization term is imposed to reduce
the quantization error. Experiments are conducted on four commonly-used face
datasets under both seen and unseen identities retrieval settings. Our method
outperforms all the compared deep hashing/quantization state-of-the-arts under
both settings. Results validate the effectiveness of the proposed orthonormal
codewords in improving models' standard retrieval performance and
generalization ability. Combing with further experiments on two general image
datasets, it demonstrates the broad superiority of our method for scalable
image retrieval.
| no_new_dataset | 0.709806 |
2109.08203 | David Picard | David Picard | Torch.manual_seed(3407) is all you need: On the influence of random
seeds in deep learning architectures for computer vision | fixed typos | null | null | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | In this paper I investigate the effect of random seed selection on the
accuracy when using popular deep learning architectures for computer vision. I
scan a large amount of seeds (up to $10^4$) on CIFAR 10 and I also scan fewer
seeds on Imagenet using pre-trained models to investigate large scale datasets.
The conclusions are that even if the variance is not very large, it is
surprisingly easy to find an outlier that performs much better or much worse
than the average.
| [
{
"version": "v1",
"created": "Thu, 16 Sep 2021 20:10:12 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2023 21:36:07 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Picard",
"David",
""
]
] | TITLE: Torch.manual_seed(3407) is all you need: On the influence of random
seeds in deep learning architectures for computer vision
ABSTRACT: In this paper I investigate the effect of random seed selection on the
accuracy when using popular deep learning architectures for computer vision. I
scan a large amount of seeds (up to $10^4$) on CIFAR 10 and I also scan fewer
seeds on Imagenet using pre-trained models to investigate large scale datasets.
The conclusions are that even if the variance is not very large, it is
surprisingly easy to find an outlier that performs much better or much worse
than the average.
| no_new_dataset | 0.711262 |
2110.08264 | Quanxue Gao | Wei Xia, Quanxue Gao, Ming Yang, Xinbo Gao | Self-supervised Contrastive Attributed Graph Clustering | null | IEEE Transactions on Multimedia, 2023 | 10.1109/TMM.2022.3213208 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Attributed graph clustering, which learns node representation from node
attribute and topological graph for clustering, is a fundamental but
challenging task for graph analysis. Recently, methods based on graph
contrastive learning (GCL) have obtained impressive clustering performance on
this task. Yet, we observe that existing GCL-based methods 1) fail to benefit
from imprecise clustering labels; 2) require a post-processing operation to get
clustering labels; 3) cannot solve out-of-sample (OOS) problem. To address
these issues, we propose a novel attributed graph clustering network, namely
Self-supervised Contrastive Attributed Graph Clustering (SCAGC). In SCAGC, by
leveraging inaccurate clustering labels, a self-supervised contrastive loss,
which aims to maximize the similarities of intra-cluster nodes while minimizing
the similarities of inter-cluster nodes, are designed for node representation
learning. Meanwhile, a clustering module is built to directly output clustering
labels by contrasting the representation of different clusters. Thus, for the
OOS nodes, SCAGC can directly calculate their clustering labels. Extensive
experimental results on four benchmark datasets have shown that SCAGC
consistently outperforms 11 competitive clustering methods.
| [
{
"version": "v1",
"created": "Fri, 15 Oct 2021 03:25:28 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Xia",
"Wei",
""
],
[
"Gao",
"Quanxue",
""
],
[
"Yang",
"Ming",
""
],
[
"Gao",
"Xinbo",
""
]
] | TITLE: Self-supervised Contrastive Attributed Graph Clustering
ABSTRACT: Attributed graph clustering, which learns node representation from node
attribute and topological graph for clustering, is a fundamental but
challenging task for graph analysis. Recently, methods based on graph
contrastive learning (GCL) have obtained impressive clustering performance on
this task. Yet, we observe that existing GCL-based methods 1) fail to benefit
from imprecise clustering labels; 2) require a post-processing operation to get
clustering labels; 3) cannot solve out-of-sample (OOS) problem. To address
these issues, we propose a novel attributed graph clustering network, namely
Self-supervised Contrastive Attributed Graph Clustering (SCAGC). In SCAGC, by
leveraging inaccurate clustering labels, a self-supervised contrastive loss,
which aims to maximize the similarities of intra-cluster nodes while minimizing
the similarities of inter-cluster nodes, are designed for node representation
learning. Meanwhile, a clustering module is built to directly output clustering
labels by contrasting the representation of different clusters. Thus, for the
OOS nodes, SCAGC can directly calculate their clustering labels. Extensive
experimental results on four benchmark datasets have shown that SCAGC
consistently outperforms 11 competitive clustering methods.
| no_new_dataset | 0.709466 |
2203.12814 | Zhou Yu | Zhou Yu, Zitian Jin, Jun Yu, Mingliang Xu, Hongbo Wang, Jianping Fan | Bilaterally Slimmable Transformer for Elastic and Efficient Visual
Question Answering | Accepted at IEEE Transactions on Multimedia, 2023. Code available at
https://github.com/MILVLG/bst | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Recent advances in Transformer architectures [1] have brought remarkable
improvements to visual question answering (VQA). Nevertheless,
Transformer-based VQA models are usually deep and wide to guarantee good
performance, so they can only run on powerful GPU servers and cannot run on
capacity-restricted platforms such as mobile phones. Therefore, it is desirable
to learn an elastic VQA model that supports adaptive pruning at runtime to meet
the efficiency constraints of different platforms. To this end, we present the
bilaterally slimmable Transformer (BST), a general framework that can be
seamlessly integrated into arbitrary Transformer-based VQA models to train a
single model once and obtain various slimmed submodels of different widths and
depths. To verify the effectiveness and generality of this method, we integrate
the proposed BST framework with three typical Transformer-based VQA approaches,
namely MCAN [2], UNITER [3], and CLIP-ViL [4], and conduct extensive
experiments on two commonly-used benchmark datasets. In particular, one slimmed
MCAN-BST submodel achieves comparable accuracy on VQA-v2, while being 0.38x
smaller in model size and having 0.27x fewer FLOPs than the reference MCAN
model. The smallest MCAN-BST submodel only has 9M parameters and 0.16G FLOPs
during inference, making it possible to deploy it on a mobile device with less
than 60 ms latency.
| [
{
"version": "v1",
"created": "Thu, 24 Mar 2022 02:26:04 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 15:15:16 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Yu",
"Zhou",
""
],
[
"Jin",
"Zitian",
""
],
[
"Yu",
"Jun",
""
],
[
"Xu",
"Mingliang",
""
],
[
"Wang",
"Hongbo",
""
],
[
"Fan",
"Jianping",
""
]
] | TITLE: Bilaterally Slimmable Transformer for Elastic and Efficient Visual
Question Answering
ABSTRACT: Recent advances in Transformer architectures [1] have brought remarkable
improvements to visual question answering (VQA). Nevertheless,
Transformer-based VQA models are usually deep and wide to guarantee good
performance, so they can only run on powerful GPU servers and cannot run on
capacity-restricted platforms such as mobile phones. Therefore, it is desirable
to learn an elastic VQA model that supports adaptive pruning at runtime to meet
the efficiency constraints of different platforms. To this end, we present the
bilaterally slimmable Transformer (BST), a general framework that can be
seamlessly integrated into arbitrary Transformer-based VQA models to train a
single model once and obtain various slimmed submodels of different widths and
depths. To verify the effectiveness and generality of this method, we integrate
the proposed BST framework with three typical Transformer-based VQA approaches,
namely MCAN [2], UNITER [3], and CLIP-ViL [4], and conduct extensive
experiments on two commonly-used benchmark datasets. In particular, one slimmed
MCAN-BST submodel achieves comparable accuracy on VQA-v2, while being 0.38x
smaller in model size and having 0.27x fewer FLOPs than the reference MCAN
model. The smallest MCAN-BST submodel only has 9M parameters and 0.16G FLOPs
during inference, making it possible to deploy it on a mobile device with less
than 60 ms latency.
| no_new_dataset | 0.708036 |
2204.02064 | Lingqi Zhang | Lingqi Zhang, Mohamed Wahib, Peng Chen, Jintao Meng, Xiao Wang, Toshio
Endo, Satoshi Matsuoka | PERKS: a Locality-Optimized Execution Model for Iterative Memory-bound
GPU Applications | This paper will be published in 2023 International Conference on
Supercomputing (ICS23) | null | 10.1145/3577193.3593705 | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | Iterative memory-bound solvers commonly occur in HPC codes. Typical GPU
implementations have a loop on the host side that invokes the GPU kernel as
much as time/algorithm steps there are. The termination of each kernel
implicitly acts the barrier required after advancing the solution every time
step. We propose an execution model for running memory-bound iterative GPU
kernels: PERsistent KernelS (PERKS). In this model, the time loop is moved
inside persistent kernel, and device-wide barriers are used for
synchronization. We then reduce the traffic to device memory by caching subset
of the output in each time step in the unused registers and shared memory.
PERKS can be generalized to any iterative solver: they largely independent of
the solver's implementation. We explain the design principle of PERKS and
demonstrate effectiveness of PERKS for a wide range of iterative 2D/3D stencil
benchmarks (geomean speedup of $2.12$x for 2D stencils and $1.24$x for 3D
stencils over state-of-art libraries), and a Krylov subspace conjugate gradient
solver (geomean speedup of $4.86$x in smaller SpMV datasets from SuiteSparse
and $1.43$x in larger SpMV datasets over a state-of-art library). All
PERKS-based implementations available at: https://github.com/neozhang307/PERKS.
| [
{
"version": "v1",
"created": "Tue, 5 Apr 2022 08:59:18 GMT"
},
{
"version": "v2",
"created": "Sat, 21 May 2022 05:10:32 GMT"
},
{
"version": "v3",
"created": "Mon, 1 May 2023 06:08:30 GMT"
},
{
"version": "v4",
"created": "Fri, 12 May 2023 11:16:55 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhang",
"Lingqi",
""
],
[
"Wahib",
"Mohamed",
""
],
[
"Chen",
"Peng",
""
],
[
"Meng",
"Jintao",
""
],
[
"Wang",
"Xiao",
""
],
[
"Endo",
"Toshio",
""
],
[
"Matsuoka",
"Satoshi",
""
]
] | TITLE: PERKS: a Locality-Optimized Execution Model for Iterative Memory-bound
GPU Applications
ABSTRACT: Iterative memory-bound solvers commonly occur in HPC codes. Typical GPU
implementations have a loop on the host side that invokes the GPU kernel as
much as time/algorithm steps there are. The termination of each kernel
implicitly acts the barrier required after advancing the solution every time
step. We propose an execution model for running memory-bound iterative GPU
kernels: PERsistent KernelS (PERKS). In this model, the time loop is moved
inside persistent kernel, and device-wide barriers are used for
synchronization. We then reduce the traffic to device memory by caching subset
of the output in each time step in the unused registers and shared memory.
PERKS can be generalized to any iterative solver: they largely independent of
the solver's implementation. We explain the design principle of PERKS and
demonstrate effectiveness of PERKS for a wide range of iterative 2D/3D stencil
benchmarks (geomean speedup of $2.12$x for 2D stencils and $1.24$x for 3D
stencils over state-of-art libraries), and a Krylov subspace conjugate gradient
solver (geomean speedup of $4.86$x in smaller SpMV datasets from SuiteSparse
and $1.43$x in larger SpMV datasets over a state-of-art library). All
PERKS-based implementations available at: https://github.com/neozhang307/PERKS.
| no_new_dataset | 0.711281 |
2205.00491 | Bowen Gu | Gu Bowen, Li Dong, Xu Yongjun, Li Chunguo, and Sun Sumei | Many a little Makes a Mickle: Probing Backscattering Energy Recycling
for Backscatter Communications | null | null | 10.1109/TVT.2022.3205888 | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate and analyze full-duplex-based backscatter
communications with multiple backscatter devices (BDs). Different from previous
works where only the energy from the energy source is harvested, BDs are also
allowed to harvest energy from previous BDs by recycling the backscattering
energy. Our objective is to maximize the total energy efficiency (EE) of the
system via joint time scheduling, beamforming design, and reflection
coefficient (RC) adjustment while satisfying the constraints on the total time,
the transmit energy consumption, the circuit energy consumption and the
achievable throughput for each BD by taking the causality and the non-linearity
of energy harvesting into account. To deal with this intractable non-convex
problem, we reformulate the problem by utilizing the Dinkelbach's method.
Subsequently, an alternative iterative algorithm is designed to solve it.
Simulation results show that the proposed algorithm achieves a much better EE
than the benchmark algorithms.
| [
{
"version": "v1",
"created": "Sun, 1 May 2022 15:22:32 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Sep 2022 01:22:13 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Bowen",
"Gu",
""
],
[
"Dong",
"Li",
""
],
[
"Yongjun",
"Xu",
""
],
[
"Chunguo",
"Li",
""
],
[
"Sumei",
"Sun",
""
]
] | TITLE: Many a little Makes a Mickle: Probing Backscattering Energy Recycling
for Backscatter Communications
ABSTRACT: In this paper, we investigate and analyze full-duplex-based backscatter
communications with multiple backscatter devices (BDs). Different from previous
works where only the energy from the energy source is harvested, BDs are also
allowed to harvest energy from previous BDs by recycling the backscattering
energy. Our objective is to maximize the total energy efficiency (EE) of the
system via joint time scheduling, beamforming design, and reflection
coefficient (RC) adjustment while satisfying the constraints on the total time,
the transmit energy consumption, the circuit energy consumption and the
achievable throughput for each BD by taking the causality and the non-linearity
of energy harvesting into account. To deal with this intractable non-convex
problem, we reformulate the problem by utilizing the Dinkelbach's method.
Subsequently, an alternative iterative algorithm is designed to solve it.
Simulation results show that the proposed algorithm achieves a much better EE
than the benchmark algorithms.
| no_new_dataset | 0.711469 |
2205.15958 | Carlo Michele Valensise | Carlo Michele Valensise, Matteo Cinelli, Walter Quattrociocchi | The drivers of online polarization: fitting models to data | Accepted for publication in Information Sciences | null | null | null | cs.SI cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Users online tend to join polarized groups of like-minded peers around shared
narratives, forming echo chambers. The echo chamber effect and opinion
polarization may be driven by several factors including human biases in
information consumption and personalized recommendations produced by feed
algorithms. Until now, studies have mainly used opinion dynamic models to
explore the mechanisms behind the emergence of polarization and echo chambers.
The objective was to determine the key factors contributing to these phenomena
and identify their interplay. However, the validation of model predictions with
empirical data still displays two main drawbacks: lack of systematicity and
qualitative analysis. In our work, we bridge this gap by providing a method to
numerically compare the opinion distributions obtained from simulations with
those measured on social media. To validate this procedure, we develop an
opinion dynamic model that takes into account the interplay between human and
algorithmic factors. We subject our model to empirical testing with data from
diverse social media platforms and benchmark it against two state-of-the-art
models. To further enhance our understanding of social media platforms, we
provide a synthetic description of their characteristics in terms of the
model's parameter space. This representation has the potential to facilitate
the refinement of feed algorithms, thus mitigating the detrimental effects of
extreme polarization on online discourse.
| [
{
"version": "v1",
"created": "Tue, 31 May 2022 17:00:41 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jun 2022 07:25:15 GMT"
},
{
"version": "v3",
"created": "Fri, 12 May 2023 09:01:05 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Valensise",
"Carlo Michele",
""
],
[
"Cinelli",
"Matteo",
""
],
[
"Quattrociocchi",
"Walter",
""
]
] | TITLE: The drivers of online polarization: fitting models to data
ABSTRACT: Users online tend to join polarized groups of like-minded peers around shared
narratives, forming echo chambers. The echo chamber effect and opinion
polarization may be driven by several factors including human biases in
information consumption and personalized recommendations produced by feed
algorithms. Until now, studies have mainly used opinion dynamic models to
explore the mechanisms behind the emergence of polarization and echo chambers.
The objective was to determine the key factors contributing to these phenomena
and identify their interplay. However, the validation of model predictions with
empirical data still displays two main drawbacks: lack of systematicity and
qualitative analysis. In our work, we bridge this gap by providing a method to
numerically compare the opinion distributions obtained from simulations with
those measured on social media. To validate this procedure, we develop an
opinion dynamic model that takes into account the interplay between human and
algorithmic factors. We subject our model to empirical testing with data from
diverse social media platforms and benchmark it against two state-of-the-art
models. To further enhance our understanding of social media platforms, we
provide a synthetic description of their characteristics in terms of the
model's parameter space. This representation has the potential to facilitate
the refinement of feed algorithms, thus mitigating the detrimental effects of
extreme polarization on online discourse.
| no_new_dataset | 0.709435 |
2206.05782 | Pei Liu | Pei Liu, Bo Fu, Feng Ye, Rui Yang, Bin Xu, and Luping Ji | DSCA: A Dual-Stream Network with Cross-Attention on Whole-Slide Image
Pyramids for Cancer Prognosis | 12 pages, 6 figures, 7 tables | Expert Systems with Applications, 120280 (2023) | 10.1016/j.eswa.2023.120280 | null | eess.IV cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The cancer prognosis on gigapixel Whole-Slide Images (WSIs) has always been a
challenging task. To further enhance WSI visual representations, existing
methods have explored image pyramids, instead of single-resolution images, in
WSIs. In spite of this, they still face two major problems: high computational
cost and the unnoticed semantical gap in multi-resolution feature fusion. To
tackle these problems, this paper proposes to efficiently exploit WSI pyramids
from a new perspective, the dual-stream network with cross-attention (DSCA).
Our key idea is to utilize two sub-streams to process the WSI patches with two
resolutions, where a square pooling is devised in a high-resolution stream to
significantly reduce computational costs, and a cross-attention-based method is
proposed to properly handle the fusion of dual-stream features. We validate our
DSCA on three publicly-available datasets with a total number of 3,101 WSIs
from 1,911 patients. Our experiments and ablation studies verify that (i) the
proposed DSCA could outperform existing state-of-the-art methods in cancer
prognosis, by an average C-Index improvement of around 4.6%; (ii) our DSCA
network is more efficient in computation -- it has more learnable parameters
(6.31M vs. 860.18K) but less computational costs (2.51G vs. 4.94G), compared to
a typical existing multi-resolution network. (iii) the key components of DSCA,
dual-stream and cross-attention, indeed contribute to our model's performance,
gaining an average C-Index rise of around 2.0% while maintaining a
relatively-small computational load. Our DSCA could serve as an alternative and
effective tool for WSI-based cancer prognosis.
| [
{
"version": "v1",
"created": "Sun, 12 Jun 2022 16:29:56 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Jun 2022 02:21:33 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Sep 2022 15:51:47 GMT"
},
{
"version": "v4",
"created": "Tue, 28 Mar 2023 10:44:40 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Liu",
"Pei",
""
],
[
"Fu",
"Bo",
""
],
[
"Ye",
"Feng",
""
],
[
"Yang",
"Rui",
""
],
[
"Xu",
"Bin",
""
],
[
"Ji",
"Luping",
""
]
] | TITLE: DSCA: A Dual-Stream Network with Cross-Attention on Whole-Slide Image
Pyramids for Cancer Prognosis
ABSTRACT: The cancer prognosis on gigapixel Whole-Slide Images (WSIs) has always been a
challenging task. To further enhance WSI visual representations, existing
methods have explored image pyramids, instead of single-resolution images, in
WSIs. In spite of this, they still face two major problems: high computational
cost and the unnoticed semantical gap in multi-resolution feature fusion. To
tackle these problems, this paper proposes to efficiently exploit WSI pyramids
from a new perspective, the dual-stream network with cross-attention (DSCA).
Our key idea is to utilize two sub-streams to process the WSI patches with two
resolutions, where a square pooling is devised in a high-resolution stream to
significantly reduce computational costs, and a cross-attention-based method is
proposed to properly handle the fusion of dual-stream features. We validate our
DSCA on three publicly-available datasets with a total number of 3,101 WSIs
from 1,911 patients. Our experiments and ablation studies verify that (i) the
proposed DSCA could outperform existing state-of-the-art methods in cancer
prognosis, by an average C-Index improvement of around 4.6%; (ii) our DSCA
network is more efficient in computation -- it has more learnable parameters
(6.31M vs. 860.18K) but less computational costs (2.51G vs. 4.94G), compared to
a typical existing multi-resolution network. (iii) the key components of DSCA,
dual-stream and cross-attention, indeed contribute to our model's performance,
gaining an average C-Index rise of around 2.0% while maintaining a
relatively-small computational load. Our DSCA could serve as an alternative and
effective tool for WSI-based cancer prognosis.
| no_new_dataset | 0.709252 |
2207.02578 | Liang Wang | Liang Wang, Nan Yang, Xiaolong Huang, Binxing Jiao, Linjun Yang, Daxin
Jiang, Rangan Majumder, Furu Wei | SimLM: Pre-training with Representation Bottleneck for Dense Passage
Retrieval | Accepted to ACL 2023 | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose SimLM (Similarity matching with Language Model
pre-training), a simple yet effective pre-training method for dense passage
retrieval. It employs a simple bottleneck architecture that learns to compress
the passage information into a dense vector through self-supervised
pre-training. We use a replaced language modeling objective, which is inspired
by ELECTRA, to improve the sample efficiency and reduce the mismatch of the
input distribution between pre-training and fine-tuning. SimLM only requires
access to unlabeled corpus, and is more broadly applicable when there are no
labeled data or queries. We conduct experiments on several large-scale passage
retrieval datasets, and show substantial improvements over strong baselines
under various settings. Remarkably, SimLM even outperforms multi-vector
approaches such as ColBERTv2 which incurs significantly more storage cost. Our
code and model check points are available at
https://github.com/microsoft/unilm/tree/master/simlm .
| [
{
"version": "v1",
"created": "Wed, 6 Jul 2022 10:51:33 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 10:26:03 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wang",
"Liang",
""
],
[
"Yang",
"Nan",
""
],
[
"Huang",
"Xiaolong",
""
],
[
"Jiao",
"Binxing",
""
],
[
"Yang",
"Linjun",
""
],
[
"Jiang",
"Daxin",
""
],
[
"Majumder",
"Rangan",
""
],
[
"Wei",
"Furu",
""
]
] | TITLE: SimLM: Pre-training with Representation Bottleneck for Dense Passage
Retrieval
ABSTRACT: In this paper, we propose SimLM (Similarity matching with Language Model
pre-training), a simple yet effective pre-training method for dense passage
retrieval. It employs a simple bottleneck architecture that learns to compress
the passage information into a dense vector through self-supervised
pre-training. We use a replaced language modeling objective, which is inspired
by ELECTRA, to improve the sample efficiency and reduce the mismatch of the
input distribution between pre-training and fine-tuning. SimLM only requires
access to unlabeled corpus, and is more broadly applicable when there are no
labeled data or queries. We conduct experiments on several large-scale passage
retrieval datasets, and show substantial improvements over strong baselines
under various settings. Remarkably, SimLM even outperforms multi-vector
approaches such as ColBERTv2 which incurs significantly more storage cost. Our
code and model check points are available at
https://github.com/microsoft/unilm/tree/master/simlm .
| no_new_dataset | 0.708389 |
2207.08467 | Martin Soria R{\o}vang Msc | Martin Soria R{\o}vang, Per Selnes, Bradley John MacIntosh, Inge
Rasmus Groote, Lene Paalhaugen, Sudre Carole, Tormod Fladby, Atle
Bj{\o}rnerud | Segmenting white matter hyperintensities on isotropic three-dimensional
Fluid Attenuated Inversion Recovery magnetic resonance images: Assessing deep
learning tools on norwegian imaging database | 20 Pages, 9 Figures, 2 Tables | null | null | null | eess.IV cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | Automated segmentation of white matter hyperintensities (WMHs) is an
essential step in neuroimaging analysis of Magnetic Resonance Imaging (MRI).
Fluid Attenuated Inversion Recovery (FLAIR-weighted) is an MRI contrast that is
particularly useful to visualize and quantify WMHs, a hallmark of cerebral
small vessel disease and Alzheimer's disease (AD). Clinical MRI protocols
migrate to a three-dimensional (3D) FLAIR-weighted acquisition to enable high
spatial resolution in all three voxel dimensions. The current study details the
deployment of deep learning tools to enable automated WMH segmentation and
characterization from 3D FLAIR-weighted images acquired as part of a national
AD imaging initiative.
Among 441 participants (194 male, mean age: (64.91 +/- 9.32) years) from the
DDI study, two in-house networks were trained and validated across five
national collection sites. Three models were tested on a held-out subset of the
internal data from the 441 participants and an external dataset with 29 cases
from an international collaborator. These test sets were evaluated
independently. Five established WMH performance metrics were used for
comparison against ground truth human-in-the-loop segmentation.
Results of the three networks tested, the 3D nnU-Net had the best performance
with an average dice similarity coefficient score of 0.76 +/- 0.16, performing
better than both the in-house developed 2.5D model and the SOTA Deep Bayesian
network.
With the increasing use of 3D FLAIR-weighted images in MRI protocols, our
results suggest that WMH segmentation models can be trained on 3D data and
yield WMH segmentation performance that is comparable to or better than
state-of-the-art without the need for including T1-weighted image series.
| [
{
"version": "v1",
"created": "Mon, 18 Jul 2022 09:36:44 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jul 2022 09:45:01 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Aug 2022 11:24:33 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Aug 2022 12:35:59 GMT"
},
{
"version": "v5",
"created": "Wed, 23 Nov 2022 10:58:56 GMT"
},
{
"version": "v6",
"created": "Fri, 13 Jan 2023 11:31:24 GMT"
},
{
"version": "v7",
"created": "Thu, 11 May 2023 19:16:57 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Røvang",
"Martin Soria",
""
],
[
"Selnes",
"Per",
""
],
[
"MacIntosh",
"Bradley John",
""
],
[
"Groote",
"Inge Rasmus",
""
],
[
"Paalhaugen",
"Lene",
""
],
[
"Carole",
"Sudre",
""
],
[
"Fladby",
"Tormod",
""
],
[
"Bjørnerud",
"Atle",
""
]
] | TITLE: Segmenting white matter hyperintensities on isotropic three-dimensional
Fluid Attenuated Inversion Recovery magnetic resonance images: Assessing deep
learning tools on norwegian imaging database
ABSTRACT: Automated segmentation of white matter hyperintensities (WMHs) is an
essential step in neuroimaging analysis of Magnetic Resonance Imaging (MRI).
Fluid Attenuated Inversion Recovery (FLAIR-weighted) is an MRI contrast that is
particularly useful to visualize and quantify WMHs, a hallmark of cerebral
small vessel disease and Alzheimer's disease (AD). Clinical MRI protocols
migrate to a three-dimensional (3D) FLAIR-weighted acquisition to enable high
spatial resolution in all three voxel dimensions. The current study details the
deployment of deep learning tools to enable automated WMH segmentation and
characterization from 3D FLAIR-weighted images acquired as part of a national
AD imaging initiative.
Among 441 participants (194 male, mean age: (64.91 +/- 9.32) years) from the
DDI study, two in-house networks were trained and validated across five
national collection sites. Three models were tested on a held-out subset of the
internal data from the 441 participants and an external dataset with 29 cases
from an international collaborator. These test sets were evaluated
independently. Five established WMH performance metrics were used for
comparison against ground truth human-in-the-loop segmentation.
Results of the three networks tested, the 3D nnU-Net had the best performance
with an average dice similarity coefficient score of 0.76 +/- 0.16, performing
better than both the in-house developed 2.5D model and the SOTA Deep Bayesian
network.
With the increasing use of 3D FLAIR-weighted images in MRI protocols, our
results suggest that WMH segmentation models can be trained on 3D data and
yield WMH segmentation performance that is comparable to or better than
state-of-the-art without the need for including T1-weighted image series.
| no_new_dataset | 0.712076 |
2207.09615 | Vikram V. Ramaswamy | Vikram V. Ramaswamy, Sunnie S. Y. Kim, Ruth Fong and Olga Russakovsky | Overlooked factors in concept-based explanations: Dataset choice,
concept learnability, and human capability | Published at CVPR 2023 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Concept-based interpretability methods aim to explain deep neural network
model predictions using a predefined set of semantic concepts. These methods
evaluate a trained model on a new, "probe" dataset and correlate model
predictions with the visual concepts labeled in that dataset. Despite their
popularity, they suffer from limitations that are not well-understood and
articulated by the literature. In this work, we analyze three commonly
overlooked factors in concept-based explanations. First, the choice of the
probe dataset has a profound impact on the generated explanations. Our analysis
reveals that different probe datasets may lead to very different explanations,
and suggests that the explanations are not generalizable outside the probe
dataset. Second, we find that concepts in the probe dataset are often less
salient and harder to learn than the classes they claim to explain, calling
into question the correctness of the explanations. We argue that only visually
salient concepts should be used in concept-based explanations. Finally, while
existing methods use hundreds or even thousands of concepts, our human studies
reveal a much stricter upper bound of 32 concepts or less, beyond which the
explanations are much less practically useful. We make suggestions for future
development and analysis of concept-based interpretability methods. Code for
our analysis and user interface can be found at
\url{https://github.com/princetonvisualai/OverlookedFactors}
| [
{
"version": "v1",
"created": "Wed, 20 Jul 2022 01:59:39 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 15:48:51 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Ramaswamy",
"Vikram V.",
""
],
[
"Kim",
"Sunnie S. Y.",
""
],
[
"Fong",
"Ruth",
""
],
[
"Russakovsky",
"Olga",
""
]
] | TITLE: Overlooked factors in concept-based explanations: Dataset choice,
concept learnability, and human capability
ABSTRACT: Concept-based interpretability methods aim to explain deep neural network
model predictions using a predefined set of semantic concepts. These methods
evaluate a trained model on a new, "probe" dataset and correlate model
predictions with the visual concepts labeled in that dataset. Despite their
popularity, they suffer from limitations that are not well-understood and
articulated by the literature. In this work, we analyze three commonly
overlooked factors in concept-based explanations. First, the choice of the
probe dataset has a profound impact on the generated explanations. Our analysis
reveals that different probe datasets may lead to very different explanations,
and suggests that the explanations are not generalizable outside the probe
dataset. Second, we find that concepts in the probe dataset are often less
salient and harder to learn than the classes they claim to explain, calling
into question the correctness of the explanations. We argue that only visually
salient concepts should be used in concept-based explanations. Finally, while
existing methods use hundreds or even thousands of concepts, our human studies
reveal a much stricter upper bound of 32 concepts or less, beyond which the
explanations are much less practically useful. We make suggestions for future
development and analysis of concept-based interpretability methods. Code for
our analysis and user interface can be found at
\url{https://github.com/princetonvisualai/OverlookedFactors}
| no_new_dataset | 0.700728 |
2208.07556 | Judith S\'ainz-Pardo D\'iaz | Judith S\'ainz-Pardo D\'iaz, \'Alvaro L\'opez Garc\'ia | pyCANON: A Python library to check the level of anonymity of a dataset | null | null | 10.1038/s41597-022-01894-2 | null | cs.CR cs.DB | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Openly sharing data with sensitive attributes and privacy restrictions is a
challenging task. In this document we present the implementation of pyCANON, a
Python library and command line interface (CLI) to check and assess the level
of anonymity of a dataset through some of the most common anonymization
techniques: k-anonymity, ($\alpha$,k)-anonymity, $\ell$-diversity, entropy
$\ell$-diversity, recursive (c,$\ell$)-diversity, basic $\beta$-likeness,
enhanced $\beta$-likeness, t-closeness and $\delta$-disclosure privacy. For the
case of more than one sensitive attributes, two approaches are proposed for
evaluating this techniques. The main strength of this library is to obtain a
full report of the parameters that are fulfilled for each of the techniques
mentioned above, with the unique requirement of the set of quasi-identifiers
and that of sensitive attributes. We present the methods implemented together
with the attacks they prevent, the description of the library, use examples of
the different functions, as well as the impact and the possible applications
that can be developed. Finally, some possible aspects to be incorporated in
future updates are proposed.
| [
{
"version": "v1",
"created": "Tue, 16 Aug 2022 06:06:04 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Díaz",
"Judith Sáinz-Pardo",
""
],
[
"García",
"Álvaro López",
""
]
] | TITLE: pyCANON: A Python library to check the level of anonymity of a dataset
ABSTRACT: Openly sharing data with sensitive attributes and privacy restrictions is a
challenging task. In this document we present the implementation of pyCANON, a
Python library and command line interface (CLI) to check and assess the level
of anonymity of a dataset through some of the most common anonymization
techniques: k-anonymity, ($\alpha$,k)-anonymity, $\ell$-diversity, entropy
$\ell$-diversity, recursive (c,$\ell$)-diversity, basic $\beta$-likeness,
enhanced $\beta$-likeness, t-closeness and $\delta$-disclosure privacy. For the
case of more than one sensitive attributes, two approaches are proposed for
evaluating this techniques. The main strength of this library is to obtain a
full report of the parameters that are fulfilled for each of the techniques
mentioned above, with the unique requirement of the set of quasi-identifiers
and that of sensitive attributes. We present the methods implemented together
with the attacks they prevent, the description of the library, use examples of
the different functions, as well as the impact and the possible applications
that can be developed. Finally, some possible aspects to be incorporated in
future updates are proposed.
| no_new_dataset | 0.705829 |
2209.13385 | Andoni Elola | Andoni Elola, Elisabete Aramendi, Jorge Oliveira, Francesco Renna,
Miguel T. Coimbra, Matthew A. Reyna, Reza Sameni, Gari D. Clifford, Ali
Bahrami Rad | Beyond Heart Murmur Detection: Automatic Murmur Grading from
Phonocardiogram | null | null | 10.1109/JBHI.2023.3275039 | null | q-bio.QM cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Objective: Murmurs are abnormal heart sounds, identified by experts through
cardiac auscultation. The murmur grade, a quantitative measure of the murmur
intensity, is strongly correlated with the patient's clinical condition. This
work aims to estimate each patient's murmur grade (i.e., absent, soft, loud)
from multiple auscultation location phonocardiograms (PCGs) of a large
population of pediatric patients from a low-resource rural area. Methods: The
Mel spectrogram representation of each PCG recording is given to an ensemble of
15 convolutional residual neural networks with channel-wise attention
mechanisms to classify each PCG recording. The final murmur grade for each
patient is derived based on the proposed decision rule and considering all
estimated labels for available recordings. The proposed method is
cross-validated on a dataset consisting of 3456 PCG recordings from 1007
patients using a stratified ten-fold cross-validation. Additionally, the method
was tested on a hidden test set comprised of 1538 PCG recordings from 442
patients. Results: The overall cross-validation performances for patient-level
murmur gradings are 86.3% and 81.6% in terms of the unweighted average of
sensitivities and F1-scores, respectively. The sensitivities (and F1-scores)
for absent, soft, and loud murmurs are 90.7% (93.6%), 75.8% (66.8%), and 92.3%
(84.2%), respectively. On the test set, the algorithm achieves an unweighted
average of sensitivities of 80.4% and an F1-score of 75.8%. Conclusions: This
study provides a potential approach for algorithmic pre-screening in
low-resource settings with relatively high expert screening costs.
Significance: The proposed method represents a significant step beyond
detection of murmurs, providing characterization of intensity which may provide
a enhanced classification of clinical outcomes.
| [
{
"version": "v1",
"created": "Tue, 27 Sep 2022 13:42:22 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2023 14:28:45 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Elola",
"Andoni",
""
],
[
"Aramendi",
"Elisabete",
""
],
[
"Oliveira",
"Jorge",
""
],
[
"Renna",
"Francesco",
""
],
[
"Coimbra",
"Miguel T.",
""
],
[
"Reyna",
"Matthew A.",
""
],
[
"Sameni",
"Reza",
""
],
[
"Clifford",
"Gari D.",
""
],
[
"Rad",
"Ali Bahrami",
""
]
] | TITLE: Beyond Heart Murmur Detection: Automatic Murmur Grading from
Phonocardiogram
ABSTRACT: Objective: Murmurs are abnormal heart sounds, identified by experts through
cardiac auscultation. The murmur grade, a quantitative measure of the murmur
intensity, is strongly correlated with the patient's clinical condition. This
work aims to estimate each patient's murmur grade (i.e., absent, soft, loud)
from multiple auscultation location phonocardiograms (PCGs) of a large
population of pediatric patients from a low-resource rural area. Methods: The
Mel spectrogram representation of each PCG recording is given to an ensemble of
15 convolutional residual neural networks with channel-wise attention
mechanisms to classify each PCG recording. The final murmur grade for each
patient is derived based on the proposed decision rule and considering all
estimated labels for available recordings. The proposed method is
cross-validated on a dataset consisting of 3456 PCG recordings from 1007
patients using a stratified ten-fold cross-validation. Additionally, the method
was tested on a hidden test set comprised of 1538 PCG recordings from 442
patients. Results: The overall cross-validation performances for patient-level
murmur gradings are 86.3% and 81.6% in terms of the unweighted average of
sensitivities and F1-scores, respectively. The sensitivities (and F1-scores)
for absent, soft, and loud murmurs are 90.7% (93.6%), 75.8% (66.8%), and 92.3%
(84.2%), respectively. On the test set, the algorithm achieves an unweighted
average of sensitivities of 80.4% and an F1-score of 75.8%. Conclusions: This
study provides a potential approach for algorithmic pre-screening in
low-resource settings with relatively high expert screening costs.
Significance: The proposed method represents a significant step beyond
detection of murmurs, providing characterization of intensity which may provide
a enhanced classification of clinical outcomes.
| new_dataset | 0.583619 |
2210.05905 | Junyi Jessy Li | Wei-Jen Ko, Yating Wu, Cutter Dalton, Dananjay Srinivas, Greg Durrett,
Junyi Jessy Li | Discourse Analysis via Questions and Answers: Parsing Dependency
Structures of Questions Under Discussion | Findings of ACL 2023 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Automatic discourse processing is bottlenecked by data: current discourse
formalisms pose highly demanding annotation tasks involving large taxonomies of
discourse relations, making them inaccessible to lay annotators. This work
instead adopts the linguistic framework of Questions Under Discussion (QUD) for
discourse analysis and seeks to derive QUD structures automatically. QUD views
each sentence as an answer to a question triggered in prior context; thus, we
characterize relationships between sentences as free-form questions, in
contrast to exhaustive fine-grained taxonomies. We develop the
first-of-its-kind QUD parser that derives a dependency structure of questions
over full documents, trained using a large, crowdsourced question-answering
dataset DCQA (Ko et al., 2022). Human evaluation results show that QUD
dependency parsing is possible for language models trained with this
crowdsourced, generalizable annotation scheme. We illustrate how our QUD
structure is distinct from RST trees, and demonstrate the utility of QUD
analysis in the context of document simplification. Our findings show that QUD
parsing is an appealing alternative for automatic discourse processing.
| [
{
"version": "v1",
"created": "Wed, 12 Oct 2022 03:53:12 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 15:01:16 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Ko",
"Wei-Jen",
""
],
[
"Wu",
"Yating",
""
],
[
"Dalton",
"Cutter",
""
],
[
"Srinivas",
"Dananjay",
""
],
[
"Durrett",
"Greg",
""
],
[
"Li",
"Junyi Jessy",
""
]
] | TITLE: Discourse Analysis via Questions and Answers: Parsing Dependency
Structures of Questions Under Discussion
ABSTRACT: Automatic discourse processing is bottlenecked by data: current discourse
formalisms pose highly demanding annotation tasks involving large taxonomies of
discourse relations, making them inaccessible to lay annotators. This work
instead adopts the linguistic framework of Questions Under Discussion (QUD) for
discourse analysis and seeks to derive QUD structures automatically. QUD views
each sentence as an answer to a question triggered in prior context; thus, we
characterize relationships between sentences as free-form questions, in
contrast to exhaustive fine-grained taxonomies. We develop the
first-of-its-kind QUD parser that derives a dependency structure of questions
over full documents, trained using a large, crowdsourced question-answering
dataset DCQA (Ko et al., 2022). Human evaluation results show that QUD
dependency parsing is possible for language models trained with this
crowdsourced, generalizable annotation scheme. We illustrate how our QUD
structure is distinct from RST trees, and demonstrate the utility of QUD
analysis in the context of document simplification. Our findings show that QUD
parsing is an appealing alternative for automatic discourse processing.
| no_new_dataset | 0.612541 |
2210.08252 | Siamak Layeghy | Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | DI-NIDS: Domain Invariant Network Intrusion Detection System | null | null | 10.1016/j.knosys.2023.110626 | null | cs.CR cs.LG cs.NI | http://creativecommons.org/licenses/by/4.0/ | The performance of machine learning based network intrusion detection systems
(NIDSs) severely degrades when deployed on a network with significantly
different feature distributions from the ones of the training dataset. In
various applications, such as computer vision, domain adaptation techniques
have been successful in mitigating the gap between the distributions of the
training and test data. In the case of network intrusion detection however, the
state-of-the-art domain adaptation approaches have had limited success.
According to recent studies, as well as our own results, the performance of an
NIDS considerably deteriorates when the `unseen' test dataset does not follow
the training dataset distribution. In some cases, swapping the train and test
datasets makes this even more severe. In order to enhance the generalisibility
of machine learning based network intrusion detection systems, we propose to
extract domain invariant features using adversarial domain adaptation from
multiple network domains, and then apply an unsupervised technique for
recognising abnormalities, i.e., intrusions. More specifically, we train a
domain adversarial neural network on labelled source domains, extract the
domain invariant features, and train a One-Class SVM (OSVM) model to detect
anomalies. At test time, we feedforward the unlabeled test data to the feature
extractor network to project it into a domain invariant space, and then apply
OSVM on the extracted features to achieve our final goal of detecting
intrusions. Our extensive experiments on the NIDS benchmark datasets of
NFv2-CIC-2018 and NFv2-UNSW-NB15 show that our proposed setup demonstrates
superior cross-domain performance in comparison to the previous approaches.
| [
{
"version": "v1",
"created": "Sat, 15 Oct 2022 10:26:22 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Layeghy",
"Siamak",
""
],
[
"Baktashmotlagh",
"Mahsa",
""
],
[
"Portmann",
"Marius",
""
]
] | TITLE: DI-NIDS: Domain Invariant Network Intrusion Detection System
ABSTRACT: The performance of machine learning based network intrusion detection systems
(NIDSs) severely degrades when deployed on a network with significantly
different feature distributions from the ones of the training dataset. In
various applications, such as computer vision, domain adaptation techniques
have been successful in mitigating the gap between the distributions of the
training and test data. In the case of network intrusion detection however, the
state-of-the-art domain adaptation approaches have had limited success.
According to recent studies, as well as our own results, the performance of an
NIDS considerably deteriorates when the `unseen' test dataset does not follow
the training dataset distribution. In some cases, swapping the train and test
datasets makes this even more severe. In order to enhance the generalisibility
of machine learning based network intrusion detection systems, we propose to
extract domain invariant features using adversarial domain adaptation from
multiple network domains, and then apply an unsupervised technique for
recognising abnormalities, i.e., intrusions. More specifically, we train a
domain adversarial neural network on labelled source domains, extract the
domain invariant features, and train a One-Class SVM (OSVM) model to detect
anomalies. At test time, we feedforward the unlabeled test data to the feature
extractor network to project it into a domain invariant space, and then apply
OSVM on the extracted features to achieve our final goal of detecting
intrusions. Our extensive experiments on the NIDS benchmark datasets of
NFv2-CIC-2018 and NFv2-UNSW-NB15 show that our proposed setup demonstrates
superior cross-domain performance in comparison to the previous approaches.
| no_new_dataset | 0.709447 |
2211.03044 | Yu Meng | Yu Meng, Martin Michalski, Jiaxin Huang, Yu Zhang, Tarek Abdelzaher,
Jiawei Han | Tuning Language Models as Training Data Generators for
Augmentation-Enhanced Few-Shot Learning | ICML 2023. (Code: https://github.com/yumeng5/FewGen) | null | null | null | cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent studies have revealed the intriguing few-shot learning ability of
pretrained language models (PLMs): They can quickly adapt to a new task when
fine-tuned on a small amount of labeled data formulated as prompts, without
requiring abundant task-specific annotations. Despite their promising
performance, most existing few-shot approaches that only learn from the small
training set still underperform fully supervised training by nontrivial
margins. In this work, we study few-shot learning with PLMs from a different
perspective: We first tune an autoregressive PLM on the few-shot samples and
then use it as a generator to synthesize a large amount of novel training
samples which augment the original training set. To encourage the generator to
produce label-discriminative samples, we train it via weighted maximum
likelihood where the weight of each token is automatically adjusted based on a
discriminative meta-learning objective. A classification PLM can then be
fine-tuned on both the few-shot and the synthetic samples with regularization
for better generalization and stability. Our approach FewGen achieves an
overall better result across seven classification tasks of the GLUE benchmark
than existing few-shot learning methods, improving no-augmentation methods by
5+ average points, and outperforming augmentation methods by 3+ average points.
| [
{
"version": "v1",
"created": "Sun, 6 Nov 2022 06:46:47 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 06:06:13 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Meng",
"Yu",
""
],
[
"Michalski",
"Martin",
""
],
[
"Huang",
"Jiaxin",
""
],
[
"Zhang",
"Yu",
""
],
[
"Abdelzaher",
"Tarek",
""
],
[
"Han",
"Jiawei",
""
]
] | TITLE: Tuning Language Models as Training Data Generators for
Augmentation-Enhanced Few-Shot Learning
ABSTRACT: Recent studies have revealed the intriguing few-shot learning ability of
pretrained language models (PLMs): They can quickly adapt to a new task when
fine-tuned on a small amount of labeled data formulated as prompts, without
requiring abundant task-specific annotations. Despite their promising
performance, most existing few-shot approaches that only learn from the small
training set still underperform fully supervised training by nontrivial
margins. In this work, we study few-shot learning with PLMs from a different
perspective: We first tune an autoregressive PLM on the few-shot samples and
then use it as a generator to synthesize a large amount of novel training
samples which augment the original training set. To encourage the generator to
produce label-discriminative samples, we train it via weighted maximum
likelihood where the weight of each token is automatically adjusted based on a
discriminative meta-learning objective. A classification PLM can then be
fine-tuned on both the few-shot and the synthetic samples with regularization
for better generalization and stability. Our approach FewGen achieves an
overall better result across seven classification tasks of the GLUE benchmark
than existing few-shot learning methods, improving no-augmentation methods by
5+ average points, and outperforming augmentation methods by 3+ average points.
| no_new_dataset | 0.710427 |
2211.07616 | Patrick Gildersleve | Patrick Gildersleve, Renaud Lambiotte, Taha Yasseri | Between News and History: Identifying Networked Topics of Collective
Attention on Wikipedia | null | null | null | null | cs.CY cs.SI physics.soc-ph | http://creativecommons.org/licenses/by-sa/4.0/ | The digital information landscape has introduced a new dimension to
understanding how we collectively react to new information and preserve it at
the societal level. This, together with the emergence of platforms such as
Wikipedia, has challenged traditional views on the relationship between current
events and historical accounts of events, with an ever-shrinking divide between
"news" and "history". Wikipedia's place as the Internet's primary reference
work thus poses the question of how it represents both traditional
encyclopaedic knowledge and evolving important news stories. In other words,
how is information on and attention towards current events integrated into the
existing topical structures of Wikipedia? To address this we develop a temporal
community detection approach towards topic detection that takes into account
both short term dynamics of attention as well as long term article network
structures. We apply this method to a dataset of one year of current events on
Wikipedia to identify clusters distinct from those that would be found solely
from page view time series correlations or static network structure. We are
able to resolve the topics that more strongly reflect unfolding current events
vs more established knowledge by the relative importance of collective
attention dynamics vs link structures. We also offer important developments by
identifying and describing the emergent topics on Wikipedia. This work provides
a means of distinguishing how these information and attention clusters are
related to Wikipedia's twin faces of encyclopaedic knowledge and current events
-- crucial to understanding the production and consumption of knowledge in the
digital age.
| [
{
"version": "v1",
"created": "Mon, 14 Nov 2022 18:36:21 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 17:17:54 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Gildersleve",
"Patrick",
""
],
[
"Lambiotte",
"Renaud",
""
],
[
"Yasseri",
"Taha",
""
]
] | TITLE: Between News and History: Identifying Networked Topics of Collective
Attention on Wikipedia
ABSTRACT: The digital information landscape has introduced a new dimension to
understanding how we collectively react to new information and preserve it at
the societal level. This, together with the emergence of platforms such as
Wikipedia, has challenged traditional views on the relationship between current
events and historical accounts of events, with an ever-shrinking divide between
"news" and "history". Wikipedia's place as the Internet's primary reference
work thus poses the question of how it represents both traditional
encyclopaedic knowledge and evolving important news stories. In other words,
how is information on and attention towards current events integrated into the
existing topical structures of Wikipedia? To address this we develop a temporal
community detection approach towards topic detection that takes into account
both short term dynamics of attention as well as long term article network
structures. We apply this method to a dataset of one year of current events on
Wikipedia to identify clusters distinct from those that would be found solely
from page view time series correlations or static network structure. We are
able to resolve the topics that more strongly reflect unfolding current events
vs more established knowledge by the relative importance of collective
attention dynamics vs link structures. We also offer important developments by
identifying and describing the emergent topics on Wikipedia. This work provides
a means of distinguishing how these information and attention clusters are
related to Wikipedia's twin faces of encyclopaedic knowledge and current events
-- crucial to understanding the production and consumption of knowledge in the
digital age.
| new_dataset | 0.61832 |
2212.02581 | Ekaterina Fedorova | Anna Costello, Ekaterina Fedorova, Zhijing Jin, Rada Mihalcea | Editing a Woman's Voice | null | null | null | null | econ.GN cs.DL physics.soc-ph q-fin.EC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Prior work shows that men and women speak with different levels of
confidence, though it's often assumed that these differences are innate or are
learned in early childhood. Using academic publishing as a setting, we find
that language differences across male and female authors are initially
negligible: in first drafts of academic manuscripts, men and women write with
similar levels of uncertainty. However, when we trace those early drafts to
their published versions, a substantial gender gap in linguistic uncertainty
arises. That is, women increase their use of cautionary language through the
publication process more than men. We show this increase in the linguistic
gender gap varies substantially based on editor assignment. Specifically, our
author-to-editor matched dataset allows us to estimate editor-specific fixed
effects, capturing how specific editors impact the change in linguistic
uncertainty for female authors relative to male authors (the editor's
author-gender gap). Editors' author-gender gaps vary widely, and correlate with
observable editor characteristics such as societal norms in their
country-of-origin, their work history, and the year that they obtained their
PhD. Overall, our study suggests that a woman's "voice" is partially shaped by
external forces, and it highlights the critical role of editors in shaping how
female academics communicate.
| [
{
"version": "v1",
"created": "Mon, 5 Dec 2022 20:20:43 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2023 19:30:37 GMT"
},
{
"version": "v3",
"created": "Thu, 11 May 2023 23:55:58 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Costello",
"Anna",
""
],
[
"Fedorova",
"Ekaterina",
""
],
[
"Jin",
"Zhijing",
""
],
[
"Mihalcea",
"Rada",
""
]
] | TITLE: Editing a Woman's Voice
ABSTRACT: Prior work shows that men and women speak with different levels of
confidence, though it's often assumed that these differences are innate or are
learned in early childhood. Using academic publishing as a setting, we find
that language differences across male and female authors are initially
negligible: in first drafts of academic manuscripts, men and women write with
similar levels of uncertainty. However, when we trace those early drafts to
their published versions, a substantial gender gap in linguistic uncertainty
arises. That is, women increase their use of cautionary language through the
publication process more than men. We show this increase in the linguistic
gender gap varies substantially based on editor assignment. Specifically, our
author-to-editor matched dataset allows us to estimate editor-specific fixed
effects, capturing how specific editors impact the change in linguistic
uncertainty for female authors relative to male authors (the editor's
author-gender gap). Editors' author-gender gaps vary widely, and correlate with
observable editor characteristics such as societal norms in their
country-of-origin, their work history, and the year that they obtained their
PhD. Overall, our study suggests that a woman's "voice" is partially shaped by
external forces, and it highlights the critical role of editors in shaping how
female academics communicate.
| new_dataset | 0.697042 |
2212.10011 | Jianfeng Chi | Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang | PLUE: Language Understanding Evaluation Benchmark for Privacy Policies
in English | ACL 2023. Code is released at https://github.com/JFChi/PLUE | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Privacy policies provide individuals with information about their rights and
how their personal information is handled. Natural language understanding (NLU)
technologies can support individuals and practitioners to understand better
privacy practices described in lengthy and complex documents. However, existing
efforts that use NLU technologies are limited by processing the language in a
way exclusive to a single task focusing on certain privacy practices. To this
end, we introduce the Privacy Policy Language Understanding Evaluation (PLUE)
benchmark, a multi-task benchmark for evaluating the privacy policy language
understanding across various tasks. We also collect a large corpus of privacy
policies to enable privacy policy domain-specific language model pre-training.
We evaluate several generic pre-trained language models and continue
pre-training them on the collected corpus. We demonstrate that domain-specific
continual pre-training offers performance improvements across all tasks.
| [
{
"version": "v1",
"created": "Tue, 20 Dec 2022 05:58:32 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 07:38:29 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Chi",
"Jianfeng",
""
],
[
"Ahmad",
"Wasi Uddin",
""
],
[
"Tian",
"Yuan",
""
],
[
"Chang",
"Kai-Wei",
""
]
] | TITLE: PLUE: Language Understanding Evaluation Benchmark for Privacy Policies
in English
ABSTRACT: Privacy policies provide individuals with information about their rights and
how their personal information is handled. Natural language understanding (NLU)
technologies can support individuals and practitioners to understand better
privacy practices described in lengthy and complex documents. However, existing
efforts that use NLU technologies are limited by processing the language in a
way exclusive to a single task focusing on certain privacy practices. To this
end, we introduce the Privacy Policy Language Understanding Evaluation (PLUE)
benchmark, a multi-task benchmark for evaluating the privacy policy language
understanding across various tasks. We also collect a large corpus of privacy
policies to enable privacy policy domain-specific language model pre-training.
We evaluate several generic pre-trained language models and continue
pre-training them on the collected corpus. We demonstrate that domain-specific
continual pre-training offers performance improvements across all tasks.
| new_dataset | 0.716999 |
2301.08305 | Benjamin Steel | Benjamin Steel, Sara Parker and Derek Ruths | The Invasion of Ukraine Viewed through TikTok: A Dataset | null | null | null | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | We present a dataset of video descriptions, comments, and user statistics,
from the social media platform TikTok, centred around the invasion of Ukraine
in 2022, an event that launched TikTok into the geopolitical arena. User
activity on the platform around the invasion exposed myriad political
behaviours and dynamics previously unexplored on this platform. To this end, we
provide a mass-scale language and interaction dataset for further research into
these processes. In this paper we conduct an initial investigation of language
and social interaction dynamics, alongside an evaluation of bot detection on
the platform. We have open-sourced the dataset and the library used to collect
it to the public.
| [
{
"version": "v1",
"created": "Thu, 19 Jan 2023 20:32:21 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2023 20:04:37 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Steel",
"Benjamin",
""
],
[
"Parker",
"Sara",
""
],
[
"Ruths",
"Derek",
""
]
] | TITLE: The Invasion of Ukraine Viewed through TikTok: A Dataset
ABSTRACT: We present a dataset of video descriptions, comments, and user statistics,
from the social media platform TikTok, centred around the invasion of Ukraine
in 2022, an event that launched TikTok into the geopolitical arena. User
activity on the platform around the invasion exposed myriad political
behaviours and dynamics previously unexplored on this platform. To this end, we
provide a mass-scale language and interaction dataset for further research into
these processes. In this paper we conduct an initial investigation of language
and social interaction dynamics, alongside an evaluation of bot detection on
the platform. We have open-sourced the dataset and the library used to collect
it to the public.
| new_dataset | 0.713057 |
2302.01877 | Zhixuan Liang | Zhixuan Liang, Yao Mu, Mingyu Ding, Fei Ni, Masayoshi Tomizuka, Ping
Luo | AdaptDiffuser: Diffusion Models as Adaptive Self-evolving Planners | Accepted by ICML 2023. Project page: https://adaptdiffuser.github.io | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diffusion models have demonstrated their powerful generative capability in
many tasks, with great potential to serve as a paradigm for offline
reinforcement learning. However, the quality of the diffusion model is limited
by the insufficient diversity of training data, which hinders the performance
of planning and the generalizability to new tasks. This paper introduces
AdaptDiffuser, an evolutionary planning method with diffusion that can
self-evolve to improve the diffusion model hence a better planner, not only for
seen tasks but can also adapt to unseen tasks. AdaptDiffuser enables the
generation of rich synthetic expert data for goal-conditioned tasks using
guidance from reward gradients. It then selects high-quality data via a
discriminator to finetune the diffusion model, which improves the
generalization ability to unseen tasks. Empirical experiments on two benchmark
environments and two carefully designed unseen tasks in KUKA industrial robot
arm and Maze2D environments demonstrate the effectiveness of AdaptDiffuser. For
example, AdaptDiffuser not only outperforms the previous art Diffuser by 20.8%
on Maze2D and 7.5% on MuJoCo locomotion, but also adapts better to new tasks,
e.g., KUKA pick-and-place, by 27.9% without requiring additional expert data.
More visualization results and demo videos could be found on our project page.
| [
{
"version": "v1",
"created": "Fri, 3 Feb 2023 17:28:59 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 16:23:37 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Liang",
"Zhixuan",
""
],
[
"Mu",
"Yao",
""
],
[
"Ding",
"Mingyu",
""
],
[
"Ni",
"Fei",
""
],
[
"Tomizuka",
"Masayoshi",
""
],
[
"Luo",
"Ping",
""
]
] | TITLE: AdaptDiffuser: Diffusion Models as Adaptive Self-evolving Planners
ABSTRACT: Diffusion models have demonstrated their powerful generative capability in
many tasks, with great potential to serve as a paradigm for offline
reinforcement learning. However, the quality of the diffusion model is limited
by the insufficient diversity of training data, which hinders the performance
of planning and the generalizability to new tasks. This paper introduces
AdaptDiffuser, an evolutionary planning method with diffusion that can
self-evolve to improve the diffusion model hence a better planner, not only for
seen tasks but can also adapt to unseen tasks. AdaptDiffuser enables the
generation of rich synthetic expert data for goal-conditioned tasks using
guidance from reward gradients. It then selects high-quality data via a
discriminator to finetune the diffusion model, which improves the
generalization ability to unseen tasks. Empirical experiments on two benchmark
environments and two carefully designed unseen tasks in KUKA industrial robot
arm and Maze2D environments demonstrate the effectiveness of AdaptDiffuser. For
example, AdaptDiffuser not only outperforms the previous art Diffuser by 20.8%
on Maze2D and 7.5% on MuJoCo locomotion, but also adapts better to new tasks,
e.g., KUKA pick-and-place, by 27.9% without requiring additional expert data.
More visualization results and demo videos could be found on our project page.
| no_new_dataset | 0.710478 |
2302.02947 | Dominic Masters | Dominic Masters, Josef Dean, Kerstin Klaser, Zhiyi Li, Sam
Maddrell-Mander, Adam Sanders, Hatem Helal, Deniz Beker, Andrew Fitzgibbon,
Shenyang Huang, Ladislav Ramp\'a\v{s}ek, Dominique Beaini | GPS++: Reviving the Art of Message Passing for Molecular Property
Prediction | arXiv admin note: text overlap with arXiv:2212.02229 | null | null | null | cs.LG | http://creativecommons.org/licenses/by-sa/4.0/ | We present GPS++, a hybrid Message Passing Neural Network / Graph Transformer
model for molecular property prediction. Our model integrates a well-tuned
local message passing component and biased global attention with other key
ideas from prior literature to achieve state-of-the-art results on large-scale
molecular dataset PCQM4Mv2. Through a thorough ablation study we highlight the
impact of individual components and find that nearly all of the model's
performance can be maintained without any use of global self-attention, showing
that message passing is still a competitive approach for 3D molecular property
prediction despite the recent dominance of graph transformers. We also find
that our approach is significantly more accurate than prior art when 3D
positional information is not available.
| [
{
"version": "v1",
"created": "Mon, 6 Feb 2023 17:30:22 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 15:52:18 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Masters",
"Dominic",
""
],
[
"Dean",
"Josef",
""
],
[
"Klaser",
"Kerstin",
""
],
[
"Li",
"Zhiyi",
""
],
[
"Maddrell-Mander",
"Sam",
""
],
[
"Sanders",
"Adam",
""
],
[
"Helal",
"Hatem",
""
],
[
"Beker",
"Deniz",
""
],
[
"Fitzgibbon",
"Andrew",
""
],
[
"Huang",
"Shenyang",
""
],
[
"Rampášek",
"Ladislav",
""
],
[
"Beaini",
"Dominique",
""
]
] | TITLE: GPS++: Reviving the Art of Message Passing for Molecular Property
Prediction
ABSTRACT: We present GPS++, a hybrid Message Passing Neural Network / Graph Transformer
model for molecular property prediction. Our model integrates a well-tuned
local message passing component and biased global attention with other key
ideas from prior literature to achieve state-of-the-art results on large-scale
molecular dataset PCQM4Mv2. Through a thorough ablation study we highlight the
impact of individual components and find that nearly all of the model's
performance can be maintained without any use of global self-attention, showing
that message passing is still a competitive approach for 3D molecular property
prediction despite the recent dominance of graph transformers. We also find
that our approach is significantly more accurate than prior art when 3D
positional information is not available.
| no_new_dataset | 0.709856 |
2302.06019 | Rajat Talak | Jingnan Shi and Rajat Talak and Dominic Maggio and Luca Carlone | A Correct-and-Certify Approach to Self-Supervise Object Pose Estimators
via Ensemble Self-Training | null | null | null | null | cs.CV cs.LG cs.RO | http://creativecommons.org/licenses/by/4.0/ | Real-world robotics applications demand object pose estimation methods that
work reliably across a variety of scenarios. Modern learning-based approaches
require large labeled datasets and tend to perform poorly outside the training
domain. Our first contribution is to develop a robust corrector module that
corrects pose estimates using depth information, thus enabling existing methods
to better generalize to new test domains; the corrector operates on semantic
keypoints (but is also applicable to other pose estimators) and is fully
differentiable. Our second contribution is an ensemble self-training approach
that simultaneously trains multiple pose estimators in a self-supervised
manner. Our ensemble self-training architecture uses the robust corrector to
refine the output of each pose estimator; then, it evaluates the quality of the
outputs using observable correctness certificates; finally, it uses the
observably correct outputs for further training, without requiring external
supervision. As an additional contribution, we propose small improvements to a
regression-based keypoint detection architecture, to enhance its robustness to
outliers; these improvements include a robust pooling scheme and a robust
centroid computation. Experiments on the YCBV and TLESS datasets show the
proposed ensemble self-training outperforms fully supervised baselines while
not requiring 3D annotations on real data.
| [
{
"version": "v1",
"created": "Sun, 12 Feb 2023 23:02:03 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2023 18:46:39 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Shi",
"Jingnan",
""
],
[
"Talak",
"Rajat",
""
],
[
"Maggio",
"Dominic",
""
],
[
"Carlone",
"Luca",
""
]
] | TITLE: A Correct-and-Certify Approach to Self-Supervise Object Pose Estimators
via Ensemble Self-Training
ABSTRACT: Real-world robotics applications demand object pose estimation methods that
work reliably across a variety of scenarios. Modern learning-based approaches
require large labeled datasets and tend to perform poorly outside the training
domain. Our first contribution is to develop a robust corrector module that
corrects pose estimates using depth information, thus enabling existing methods
to better generalize to new test domains; the corrector operates on semantic
keypoints (but is also applicable to other pose estimators) and is fully
differentiable. Our second contribution is an ensemble self-training approach
that simultaneously trains multiple pose estimators in a self-supervised
manner. Our ensemble self-training architecture uses the robust corrector to
refine the output of each pose estimator; then, it evaluates the quality of the
outputs using observable correctness certificates; finally, it uses the
observably correct outputs for further training, without requiring external
supervision. As an additional contribution, we propose small improvements to a
regression-based keypoint detection architecture, to enhance its robustness to
outliers; these improvements include a robust pooling scheme and a robust
centroid computation. Experiments on the YCBV and TLESS datasets show the
proposed ensemble self-training outperforms fully supervised baselines while
not requiring 3D annotations on real data.
| no_new_dataset | 0.709202 |
2302.13748 | Jiaqi Gao | Jiaqi Gao, Xinyang Jiang, Yuqing Yang, Dongsheng Li, Lili Qiu | Unsupervised Video Anomaly Detection for Stereotypical Behaviours in
Autism | null | 2023 IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP) | 10.1109/ICASSP49357.2023.10094676 | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Monitoring and analyzing stereotypical behaviours is important for early
intervention and care taking in Autism Spectrum Disorder (ASD). This paper
focuses on automatically detecting stereotypical behaviours with computer
vision techniques. Off-the-shelf methods tackle this task by supervised
classification and activity recognition techniques. However, the unbounded
types of stereotypical behaviours and the difficulty in collecting video
recordings of ASD patients largely limit the feasibility of the existing
supervised detection methods. As a result, we tackle these challenges from a
new perspective, i.e. unsupervised video anomaly detection for stereotypical
behaviours detection. The models can be trained among unlabeled videos
containing only normal behaviours and unknown types of abnormal behaviours can
be detected during inference. Correspondingly, we propose a Dual Stream deep
model for Stereotypical Behaviours Detection, DS-SBD, based on the temporal
trajectory of human poses and the repetition patterns of human actions.
Extensive experiments are conducted to verify the effectiveness of our proposed
method and suggest that it serves as a potential benchmark for future research.
| [
{
"version": "v1",
"created": "Mon, 27 Feb 2023 13:24:08 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Gao",
"Jiaqi",
""
],
[
"Jiang",
"Xinyang",
""
],
[
"Yang",
"Yuqing",
""
],
[
"Li",
"Dongsheng",
""
],
[
"Qiu",
"Lili",
""
]
] | TITLE: Unsupervised Video Anomaly Detection for Stereotypical Behaviours in
Autism
ABSTRACT: Monitoring and analyzing stereotypical behaviours is important for early
intervention and care taking in Autism Spectrum Disorder (ASD). This paper
focuses on automatically detecting stereotypical behaviours with computer
vision techniques. Off-the-shelf methods tackle this task by supervised
classification and activity recognition techniques. However, the unbounded
types of stereotypical behaviours and the difficulty in collecting video
recordings of ASD patients largely limit the feasibility of the existing
supervised detection methods. As a result, we tackle these challenges from a
new perspective, i.e. unsupervised video anomaly detection for stereotypical
behaviours detection. The models can be trained among unlabeled videos
containing only normal behaviours and unknown types of abnormal behaviours can
be detected during inference. Correspondingly, we propose a Dual Stream deep
model for Stereotypical Behaviours Detection, DS-SBD, based on the temporal
trajectory of human poses and the repetition patterns of human actions.
Extensive experiments are conducted to verify the effectiveness of our proposed
method and suggest that it serves as a potential benchmark for future research.
| no_new_dataset | 0.708824 |
2303.13221 | Shaobo Lin | Shaobo Lin, Kun Wang, Xingyu Zeng, Rui Zhao | Explore the Power of Synthetic Data on Few-shot Object Detection | null | CVPR2023 Workshop on Generative Models for Computer Vision | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Few-shot object detection (FSOD) aims to expand an object detector for novel
categories given only a few instances for training. The few training samples
restrict the performance of FSOD model. Recent text-to-image generation models
have shown promising results in generating high-quality images. How applicable
these synthetic images are for FSOD tasks remains under-explored. This work
extensively studies how synthetic images generated from state-of-the-art
text-to-image generators benefit FSOD tasks. We focus on two perspectives: (1)
How to use synthetic data for FSOD? (2) How to find representative samples from
the large-scale synthetic dataset? We design a copy-paste-based pipeline for
using synthetic data. Specifically, saliency object detection is applied to the
original generated image, and the minimum enclosing box is used for cropping
the main object based on the saliency map. After that, the cropped object is
randomly pasted on the image, which comes from the base dataset. We also study
the influence of the input text of text-to-image generator and the number of
synthetic images used. To construct a representative synthetic training
dataset, we maximize the diversity of the selected images via a sample-based
and cluster-based method. However, the severe problem of high false positives
(FP) ratio of novel categories in FSOD can not be solved by using synthetic
data. We propose integrating CLIP, a zero-shot recognition model, into the FSOD
pipeline, which can filter 90% of FP by defining a threshold for the similarity
score between the detected object and the text of the predicted category.
Extensive experiments on PASCAL VOC and MS COCO validate the effectiveness of
our method, in which performance gain is up to 21.9% compared to the few-shot
baseline.
| [
{
"version": "v1",
"created": "Thu, 23 Mar 2023 12:34:52 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 05:45:29 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Lin",
"Shaobo",
""
],
[
"Wang",
"Kun",
""
],
[
"Zeng",
"Xingyu",
""
],
[
"Zhao",
"Rui",
""
]
] | TITLE: Explore the Power of Synthetic Data on Few-shot Object Detection
ABSTRACT: Few-shot object detection (FSOD) aims to expand an object detector for novel
categories given only a few instances for training. The few training samples
restrict the performance of FSOD model. Recent text-to-image generation models
have shown promising results in generating high-quality images. How applicable
these synthetic images are for FSOD tasks remains under-explored. This work
extensively studies how synthetic images generated from state-of-the-art
text-to-image generators benefit FSOD tasks. We focus on two perspectives: (1)
How to use synthetic data for FSOD? (2) How to find representative samples from
the large-scale synthetic dataset? We design a copy-paste-based pipeline for
using synthetic data. Specifically, saliency object detection is applied to the
original generated image, and the minimum enclosing box is used for cropping
the main object based on the saliency map. After that, the cropped object is
randomly pasted on the image, which comes from the base dataset. We also study
the influence of the input text of text-to-image generator and the number of
synthetic images used. To construct a representative synthetic training
dataset, we maximize the diversity of the selected images via a sample-based
and cluster-based method. However, the severe problem of high false positives
(FP) ratio of novel categories in FSOD can not be solved by using synthetic
data. We propose integrating CLIP, a zero-shot recognition model, into the FSOD
pipeline, which can filter 90% of FP by defining a threshold for the similarity
score between the detected object and the text of the predicted category.
Extensive experiments on PASCAL VOC and MS COCO validate the effectiveness of
our method, in which performance gain is up to 21.9% compared to the few-shot
baseline.
| no_new_dataset | 0.711638 |
2303.16039 | Guanhua Zhang | Guanhua Zhang, Matteo Bortoletto, Zhiming Hu, Lei Shi, Mihai B\^ace,
Andreas Bulling | Exploring Natural Language Processing Methods for Interactive Behaviour
Modelling | Accepted by Proc. IFIP TC13 Conference on Human-Computer Interaction
(INTERACT'23) | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analysing and modelling interactive behaviour is an important topic in
human-computer interaction (HCI) and a key requirement for the development of
intelligent interactive systems. Interactive behaviour has a sequential
(actions happen one after another) and hierarchical (a sequence of actions
forms an activity driven by interaction goals) structure, which may be similar
to the structure of natural language. Designed based on such a structure,
natural language processing (NLP) methods have achieved groundbreaking success
in various downstream tasks. However, few works linked interactive behaviour
with natural language. In this paper, we explore the similarity between
interactive behaviour and natural language by applying an NLP method, byte pair
encoding (BPE), to encode mouse and keyboard behaviour. We then analyse the
vocabulary, i.e., the set of action sequences, learnt by BPE, as well as use
the vocabulary to encode the input behaviour for interactive task recognition.
An existing dataset collected in constrained lab settings and our novel
out-of-the-lab dataset were used for evaluation. Results show that this natural
language-inspired approach not only learns action sequences that reflect
specific interaction goals, but also achieves higher F1 scores on task
recognition than other methods. Our work reveals the similarity between
interactive behaviour and natural language, and presents the potential of
applying the new pack of methods that leverage insights from NLP to model
interactive behaviour in HCI.
| [
{
"version": "v1",
"created": "Tue, 28 Mar 2023 15:15:03 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2023 20:28:26 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhang",
"Guanhua",
""
],
[
"Bortoletto",
"Matteo",
""
],
[
"Hu",
"Zhiming",
""
],
[
"Shi",
"Lei",
""
],
[
"Bâce",
"Mihai",
""
],
[
"Bulling",
"Andreas",
""
]
] | TITLE: Exploring Natural Language Processing Methods for Interactive Behaviour
Modelling
ABSTRACT: Analysing and modelling interactive behaviour is an important topic in
human-computer interaction (HCI) and a key requirement for the development of
intelligent interactive systems. Interactive behaviour has a sequential
(actions happen one after another) and hierarchical (a sequence of actions
forms an activity driven by interaction goals) structure, which may be similar
to the structure of natural language. Designed based on such a structure,
natural language processing (NLP) methods have achieved groundbreaking success
in various downstream tasks. However, few works linked interactive behaviour
with natural language. In this paper, we explore the similarity between
interactive behaviour and natural language by applying an NLP method, byte pair
encoding (BPE), to encode mouse and keyboard behaviour. We then analyse the
vocabulary, i.e., the set of action sequences, learnt by BPE, as well as use
the vocabulary to encode the input behaviour for interactive task recognition.
An existing dataset collected in constrained lab settings and our novel
out-of-the-lab dataset were used for evaluation. Results show that this natural
language-inspired approach not only learns action sequences that reflect
specific interaction goals, but also achieves higher F1 scores on task
recognition than other methods. Our work reveals the similarity between
interactive behaviour and natural language, and presents the potential of
applying the new pack of methods that leverage insights from NLP to model
interactive behaviour in HCI.
| new_dataset | 0.713849 |
2304.02265 | Gustav Grund Pihlgren | Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki | Deep Perceptual Similarity is Adaptable to Ambiguous Contexts | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of image similarity is ambiguous, and images can be similar in
one context and not in another. This ambiguity motivates the creation of
metrics for specific contexts. This work explores the ability of deep
perceptual similarity (DPS) metrics to adapt to a given context. DPS metrics
use the deep features of neural networks for comparing images. These metrics
have been successful on datasets that leverage the average human perception in
limited settings. But the question remains if they could be adapted to specific
similarity contexts. No single metric can suit all similarity contexts, and
previous rule-based metrics are labor-intensive to rewrite for new contexts. On
the other hand, DPS metrics use neural networks that might be retrained for
each context. However, retraining networks takes resources and might ruin
performance on previous tasks. This work examines the adaptability of DPS
metrics by training ImageNet pretrained CNNs to measure similarity according to
given contexts. Contexts are created by randomly ranking six image distortions.
Distortions later in the ranking are considered more disruptive to similarity
when applied to an image for that context. This also gives insight into whether
the pretrained features capture different similarity contexts. The adapted
metrics are evaluated on a perceptual similarity dataset to evaluate if
adapting to a ranking affects their prior performance. The findings show that
DPS metrics can be adapted with high performance. While the adapted metrics
have difficulties with the same contexts as baselines, performance is improved
in 99% of cases. Finally, it is shown that the adaption is not significantly
detrimental to prior performance on perceptual similarity. The implementation
of this work is available online:
https://github.com/LTU-Machine-Learning/Analysis-of-Deep-Perceptual-Loss-Networks
| [
{
"version": "v1",
"created": "Wed, 5 Apr 2023 07:31:44 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 14:04:04 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Pihlgren",
"Gustav Grund",
""
],
[
"Sandin",
"Fredrik",
""
],
[
"Liwicki",
"Marcus",
""
]
] | TITLE: Deep Perceptual Similarity is Adaptable to Ambiguous Contexts
ABSTRACT: The concept of image similarity is ambiguous, and images can be similar in
one context and not in another. This ambiguity motivates the creation of
metrics for specific contexts. This work explores the ability of deep
perceptual similarity (DPS) metrics to adapt to a given context. DPS metrics
use the deep features of neural networks for comparing images. These metrics
have been successful on datasets that leverage the average human perception in
limited settings. But the question remains if they could be adapted to specific
similarity contexts. No single metric can suit all similarity contexts, and
previous rule-based metrics are labor-intensive to rewrite for new contexts. On
the other hand, DPS metrics use neural networks that might be retrained for
each context. However, retraining networks takes resources and might ruin
performance on previous tasks. This work examines the adaptability of DPS
metrics by training ImageNet pretrained CNNs to measure similarity according to
given contexts. Contexts are created by randomly ranking six image distortions.
Distortions later in the ranking are considered more disruptive to similarity
when applied to an image for that context. This also gives insight into whether
the pretrained features capture different similarity contexts. The adapted
metrics are evaluated on a perceptual similarity dataset to evaluate if
adapting to a ranking affects their prior performance. The findings show that
DPS metrics can be adapted with high performance. While the adapted metrics
have difficulties with the same contexts as baselines, performance is improved
in 99% of cases. Finally, it is shown that the adaption is not significantly
detrimental to prior performance on perceptual similarity. The implementation
of this work is available online:
https://github.com/LTU-Machine-Learning/Analysis-of-Deep-Perceptual-Loss-Networks
| no_new_dataset | 0.708648 |
2304.03714 | H\"unkar Can Tun\c{c} | H\"unkar Can Tun\c{c}, Parosh Aziz Abdulla, Soham Chakraborty,
Shankaranarayanan Krishna, Umang Mathur, Andreas Pavlogiannis | Optimal Reads-From Consistency Checking for C11-Style Memory Models | null | null | null | null | cs.PL cs.LO | http://creativecommons.org/licenses/by/4.0/ | Over the years, several memory models have been proposed to capture the
subtle concurrency semantics of C/C++.One of the most fundamental problems
associated with a memory model M is consistency checking: given an execution X,
is X consistent with M? This problem lies at the heart of numerous
applications, including specification testing and litmus tests, stateless model
checking, and dynamic analyses. As such, it has been explored extensively and
its complexity is well-understood for traditional models like SC and TSO.
However, less is known for the numerous model variants of C/C++, for which the
problem becomes challenging due to the intricacies of their concurrency
primitives. In this work we study the problem of consistency checking for
popular variants of the C11 memory model, in particular, the RC20 model, its
release-acquire (RA) fragment, the strong and weak variants of RA (SRA and
WRA), as well as the Relaxed fragment of RC20. Motivated by applications in
testing and model checking, we focus on reads-from consistency checking. The
input is an execution X specifying a set of events, their program order and
their reads-from relation, and the task is to decide the existence of a
modification order on the writes of X that makes X consistent in a memory
model. We draw a rich complexity landscape for this problem; our results
include (i)~nearly-linear-time algorithms for certain variants, which improve
over prior results, (ii)~fine-grained optimality results, as well as
(iii)~matching upper and lower bounds (NP-hardness) for other variants. To our
knowledge, this is the first work to characterize the complexity of consistency
checking for C11 memory models. We have implemented our algorithms inside the
TruSt model checker and the C11Tester testing tool. Experiments on standard
benchmarks show that our new algorithms improve consistency checking, often by
a significant margin.
| [
{
"version": "v1",
"created": "Fri, 7 Apr 2023 16:09:50 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 03:07:24 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Tunç",
"Hünkar Can",
""
],
[
"Abdulla",
"Parosh Aziz",
""
],
[
"Chakraborty",
"Soham",
""
],
[
"Krishna",
"Shankaranarayanan",
""
],
[
"Mathur",
"Umang",
""
],
[
"Pavlogiannis",
"Andreas",
""
]
] | TITLE: Optimal Reads-From Consistency Checking for C11-Style Memory Models
ABSTRACT: Over the years, several memory models have been proposed to capture the
subtle concurrency semantics of C/C++.One of the most fundamental problems
associated with a memory model M is consistency checking: given an execution X,
is X consistent with M? This problem lies at the heart of numerous
applications, including specification testing and litmus tests, stateless model
checking, and dynamic analyses. As such, it has been explored extensively and
its complexity is well-understood for traditional models like SC and TSO.
However, less is known for the numerous model variants of C/C++, for which the
problem becomes challenging due to the intricacies of their concurrency
primitives. In this work we study the problem of consistency checking for
popular variants of the C11 memory model, in particular, the RC20 model, its
release-acquire (RA) fragment, the strong and weak variants of RA (SRA and
WRA), as well as the Relaxed fragment of RC20. Motivated by applications in
testing and model checking, we focus on reads-from consistency checking. The
input is an execution X specifying a set of events, their program order and
their reads-from relation, and the task is to decide the existence of a
modification order on the writes of X that makes X consistent in a memory
model. We draw a rich complexity landscape for this problem; our results
include (i)~nearly-linear-time algorithms for certain variants, which improve
over prior results, (ii)~fine-grained optimality results, as well as
(iii)~matching upper and lower bounds (NP-hardness) for other variants. To our
knowledge, this is the first work to characterize the complexity of consistency
checking for C11 memory models. We have implemented our algorithms inside the
TruSt model checker and the C11Tester testing tool. Experiments on standard
benchmarks show that our new algorithms improve consistency checking, often by
a significant margin.
| no_new_dataset | 0.707967 |
2304.09015 | Jianhao Chen | Jianhao Chen, Junyang Ren, Wentao Ding, Yuzhong Qu | PaTeCon: A Pattern-Based Temporal Constraint Mining Method for Conflict
Detection on Knowledge Graphs | Accepted by AAAI23 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Temporal facts, the facts for characterizing events that hold in specific
time periods, are attracting rising attention in the knowledge graph (KG)
research communities. In terms of quality management, the introduction of time
restrictions brings new challenges to maintaining the temporal consistency of
KGs and detecting potential temporal conflicts. Previous studies rely on
manually enumerated temporal constraints to detect conflicts, which are
labor-intensive and may have granularity issues. We start from the common
pattern of temporal facts and constraints and propose a pattern-based temporal
constraint mining method, PaTeCon. PaTeCon uses automatically determined graph
patterns and their relevant statistical information over the given KG instead
of human experts to generate time constraints. Specifically, PaTeCon
dynamically attaches class restriction to candidate constraints according to
their measuring scores.We evaluate PaTeCon on two large-scale datasets based on
Wikidata and Freebase respectively. The experimental results show that
pattern-based automatic constraint mining is powerful in generating valuable
temporal constraints.
| [
{
"version": "v1",
"created": "Tue, 18 Apr 2023 14:28:35 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Apr 2023 13:00:26 GMT"
},
{
"version": "v3",
"created": "Fri, 12 May 2023 14:48:00 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Chen",
"Jianhao",
""
],
[
"Ren",
"Junyang",
""
],
[
"Ding",
"Wentao",
""
],
[
"Qu",
"Yuzhong",
""
]
] | TITLE: PaTeCon: A Pattern-Based Temporal Constraint Mining Method for Conflict
Detection on Knowledge Graphs
ABSTRACT: Temporal facts, the facts for characterizing events that hold in specific
time periods, are attracting rising attention in the knowledge graph (KG)
research communities. In terms of quality management, the introduction of time
restrictions brings new challenges to maintaining the temporal consistency of
KGs and detecting potential temporal conflicts. Previous studies rely on
manually enumerated temporal constraints to detect conflicts, which are
labor-intensive and may have granularity issues. We start from the common
pattern of temporal facts and constraints and propose a pattern-based temporal
constraint mining method, PaTeCon. PaTeCon uses automatically determined graph
patterns and their relevant statistical information over the given KG instead
of human experts to generate time constraints. Specifically, PaTeCon
dynamically attaches class restriction to candidate constraints according to
their measuring scores.We evaluate PaTeCon on two large-scale datasets based on
Wikidata and Freebase respectively. The experimental results show that
pattern-based automatic constraint mining is powerful in generating valuable
temporal constraints.
| no_new_dataset | 0.711067 |
2305.01139 | Jiefeng Chen | Jiefeng Chen, Jayaram Raghuram, Jihye Choi, Xi Wu, Yingyu Liang,
Somesh Jha | Stratified Adversarial Robustness with Rejection | Paper published at International Conference on Machine Learning
(ICML'23) | null | null | null | cs.LG cs.CR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, there is an emerging interest in adversarially training a
classifier with a rejection option (also known as a selective classifier) for
boosting adversarial robustness. While rejection can incur a cost in many
applications, existing studies typically associate zero cost with rejecting
perturbed inputs, which can result in the rejection of numerous
slightly-perturbed inputs that could be correctly classified. In this work, we
study adversarially-robust classification with rejection in the stratified
rejection setting, where the rejection cost is modeled by rejection loss
functions monotonically non-increasing in the perturbation magnitude. We
theoretically analyze the stratified rejection setting and propose a novel
defense method -- Adversarial Training with Consistent Prediction-based
Rejection (CPR) -- for building a robust selective classifier. Experiments on
image datasets demonstrate that the proposed method significantly outperforms
existing methods under strong adaptive attacks. For instance, on CIFAR-10, CPR
reduces the total robust loss (for different rejection losses) by at least 7.3%
under both seen and unseen attacks.
| [
{
"version": "v1",
"created": "Tue, 2 May 2023 01:04:29 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 01:00:57 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Chen",
"Jiefeng",
""
],
[
"Raghuram",
"Jayaram",
""
],
[
"Choi",
"Jihye",
""
],
[
"Wu",
"Xi",
""
],
[
"Liang",
"Yingyu",
""
],
[
"Jha",
"Somesh",
""
]
] | TITLE: Stratified Adversarial Robustness with Rejection
ABSTRACT: Recently, there is an emerging interest in adversarially training a
classifier with a rejection option (also known as a selective classifier) for
boosting adversarial robustness. While rejection can incur a cost in many
applications, existing studies typically associate zero cost with rejecting
perturbed inputs, which can result in the rejection of numerous
slightly-perturbed inputs that could be correctly classified. In this work, we
study adversarially-robust classification with rejection in the stratified
rejection setting, where the rejection cost is modeled by rejection loss
functions monotonically non-increasing in the perturbation magnitude. We
theoretically analyze the stratified rejection setting and propose a novel
defense method -- Adversarial Training with Consistent Prediction-based
Rejection (CPR) -- for building a robust selective classifier. Experiments on
image datasets demonstrate that the proposed method significantly outperforms
existing methods under strong adaptive attacks. For instance, on CIFAR-10, CPR
reduces the total robust loss (for different rejection losses) by at least 7.3%
under both seen and unseen attacks.
| no_new_dataset | 0.710025 |
2305.03232 | Kobe Knowles | Kobe Knowles, Joshua Bensemann, Diana Benavides-Prado, Vithya
Yogarajan, Michael Witbrock, Gillian Dobbie and Yang Chen | Neuromodulation Gated Transformer | 8 pages, 1 figure, 4 tables, ICLR 2023 Tiny Papers | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | We introduce a novel architecture, the Neuromodulation Gated Transformer
(NGT), which is a simple implementation of neuromodulation in transformers via
a multiplicative effect. We compare it to baselines and show that it results in
the best average performance on the SuperGLUE benchmark validation sets.
| [
{
"version": "v1",
"created": "Fri, 5 May 2023 01:23:22 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2023 21:28:30 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Knowles",
"Kobe",
""
],
[
"Bensemann",
"Joshua",
""
],
[
"Benavides-Prado",
"Diana",
""
],
[
"Yogarajan",
"Vithya",
""
],
[
"Witbrock",
"Michael",
""
],
[
"Dobbie",
"Gillian",
""
],
[
"Chen",
"Yang",
""
]
] | TITLE: Neuromodulation Gated Transformer
ABSTRACT: We introduce a novel architecture, the Neuromodulation Gated Transformer
(NGT), which is a simple implementation of neuromodulation in transformers via
a multiplicative effect. We compare it to baselines and show that it results in
the best average performance on the SuperGLUE benchmark validation sets.
| no_new_dataset | 0.713276 |
2305.05888 | Yunshan Zhong | Yunshan Zhong, Mingbao Lin, Jingjing Xie, Yuxin Zhang, Fei Chao,
Rongrong Ji | Distribution-Flexible Subset Quantization for Post-Quantizing
Super-Resolution Networks | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces Distribution-Flexible Subset Quantization (DFSQ), a
post-training quantization method for super-resolution networks. Our motivation
for developing DFSQ is based on the distinctive activation distributions of
current super-resolution models, which exhibit significant variance across
samples and channels. To address this issue, DFSQ conducts channel-wise
normalization of the activations and applies distribution-flexible subset
quantization (SQ), wherein the quantization points are selected from a
universal set consisting of multi-word additive log-scale values. To expedite
the selection of quantization points in SQ, we propose a fast quantization
points selection strategy that uses K-means clustering to select the
quantization points closest to the centroids. Compared to the common iterative
exhaustive search algorithm, our strategy avoids the enumeration of all
possible combinations in the universal set, reducing the time complexity from
exponential to linear. Consequently, the constraint of time costs on the size
of the universal set is greatly relaxed. Extensive evaluations of various
super-resolution models show that DFSQ effectively retains performance even
without fine-tuning. For example, when quantizing EDSRx2 on the Urban
benchmark, DFSQ achieves comparable performance to full-precision counterparts
on 6- and 8-bit quantization, and incurs only a 0.1 dB PSNR drop on 4-bit
quantization. Code is at \url{https://github.com/zysxmu/DFSQ}
| [
{
"version": "v1",
"created": "Wed, 10 May 2023 04:19:11 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 04:43:47 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhong",
"Yunshan",
""
],
[
"Lin",
"Mingbao",
""
],
[
"Xie",
"Jingjing",
""
],
[
"Zhang",
"Yuxin",
""
],
[
"Chao",
"Fei",
""
],
[
"Ji",
"Rongrong",
""
]
] | TITLE: Distribution-Flexible Subset Quantization for Post-Quantizing
Super-Resolution Networks
ABSTRACT: This paper introduces Distribution-Flexible Subset Quantization (DFSQ), a
post-training quantization method for super-resolution networks. Our motivation
for developing DFSQ is based on the distinctive activation distributions of
current super-resolution models, which exhibit significant variance across
samples and channels. To address this issue, DFSQ conducts channel-wise
normalization of the activations and applies distribution-flexible subset
quantization (SQ), wherein the quantization points are selected from a
universal set consisting of multi-word additive log-scale values. To expedite
the selection of quantization points in SQ, we propose a fast quantization
points selection strategy that uses K-means clustering to select the
quantization points closest to the centroids. Compared to the common iterative
exhaustive search algorithm, our strategy avoids the enumeration of all
possible combinations in the universal set, reducing the time complexity from
exponential to linear. Consequently, the constraint of time costs on the size
of the universal set is greatly relaxed. Extensive evaluations of various
super-resolution models show that DFSQ effectively retains performance even
without fine-tuning. For example, when quantizing EDSRx2 on the Urban
benchmark, DFSQ achieves comparable performance to full-precision counterparts
on 6- and 8-bit quantization, and incurs only a 0.1 dB PSNR drop on 4-bit
quantization. Code is at \url{https://github.com/zysxmu/DFSQ}
| no_new_dataset | 0.71103 |
2305.06524 | Zhihe Lu | Zhihe Lu, Zeyu Xiao, Jiawang Bai, Zhiwei Xiong, Xinchao Wang | Can SAM Boost Video Super-Resolution? | Technical Report | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primary challenge in video super-resolution (VSR) is to handle large
motions in the input frames, which makes it difficult to accurately aggregate
information from multiple frames. Existing works either adopt deformable
convolutions or estimate optical flow as a prior to establish correspondences
between frames for the effective alignment and fusion. However, they fail to
take into account the valuable semantic information that can greatly enhance
it; and flow-based methods heavily rely on the accuracy of a flow estimate
model, which may not provide precise flows given two low-resolution frames.
In this paper, we investigate a more robust and semantic-aware prior for
enhanced VSR by utilizing the Segment Anything Model (SAM), a powerful
foundational model that is less susceptible to image degradation. To use the
SAM-based prior, we propose a simple yet effective module -- SAM-guidEd
refinEment Module (SEEM), which can enhance both alignment and fusion
procedures by the utilization of semantic information. This light-weight
plug-in module is specifically designed to not only leverage the attention
mechanism for the generation of semantic-aware feature but also be easily and
seamlessly integrated into existing methods. Concretely, we apply our SEEM to
two representative methods, EDVR and BasicVSR, resulting in consistently
improved performance with minimal implementation effort, on three widely used
VSR datasets: Vimeo-90K, REDS and Vid4. More importantly, we found that the
proposed SEEM can advance the existing methods in an efficient tuning manner,
providing increased flexibility in adjusting the balance between performance
and the number of training parameters. Code will be open-source soon.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 02:02:53 GMT"
},
{
"version": "v2",
"created": "Fri, 12 May 2023 01:43:00 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Lu",
"Zhihe",
""
],
[
"Xiao",
"Zeyu",
""
],
[
"Bai",
"Jiawang",
""
],
[
"Xiong",
"Zhiwei",
""
],
[
"Wang",
"Xinchao",
""
]
] | TITLE: Can SAM Boost Video Super-Resolution?
ABSTRACT: The primary challenge in video super-resolution (VSR) is to handle large
motions in the input frames, which makes it difficult to accurately aggregate
information from multiple frames. Existing works either adopt deformable
convolutions or estimate optical flow as a prior to establish correspondences
between frames for the effective alignment and fusion. However, they fail to
take into account the valuable semantic information that can greatly enhance
it; and flow-based methods heavily rely on the accuracy of a flow estimate
model, which may not provide precise flows given two low-resolution frames.
In this paper, we investigate a more robust and semantic-aware prior for
enhanced VSR by utilizing the Segment Anything Model (SAM), a powerful
foundational model that is less susceptible to image degradation. To use the
SAM-based prior, we propose a simple yet effective module -- SAM-guidEd
refinEment Module (SEEM), which can enhance both alignment and fusion
procedures by the utilization of semantic information. This light-weight
plug-in module is specifically designed to not only leverage the attention
mechanism for the generation of semantic-aware feature but also be easily and
seamlessly integrated into existing methods. Concretely, we apply our SEEM to
two representative methods, EDVR and BasicVSR, resulting in consistently
improved performance with minimal implementation effort, on three widely used
VSR datasets: Vimeo-90K, REDS and Vid4. More importantly, we found that the
proposed SEEM can advance the existing methods in an efficient tuning manner,
providing increased flexibility in adjusting the balance between performance
and the number of training parameters. Code will be open-source soon.
| no_new_dataset | 0.709057 |
2305.07034 | Khloud Al Jallad | Ahmad Al Harere, Khloud Al Jallad | Quran Recitation Recognition using End-to-End Deep Learning | null | null | null | null | eess.AS cs.AI cs.CL cs.LG cs.SD | http://creativecommons.org/licenses/by/4.0/ | The Quran is the holy scripture of Islam, and its recitation is an important
aspect of the religion. Recognizing the recitation of the Holy Quran
automatically is a challenging task due to its unique rules that are not
applied in normal speaking speeches. A lot of research has been done in this
domain, but previous works have detected recitation errors as a classification
task or used traditional automatic speech recognition (ASR). In this paper, we
proposed a novel end-to-end deep learning model for recognizing the recitation
of the Holy Quran. The proposed model is a CNN-Bidirectional GRU encoder that
uses CTC as an objective function, and a character-based decoder which is a
beam search decoder. Moreover, all previous works were done on small private
datasets consisting of short verses and a few chapters of the Holy Quran. As a
result of using private datasets, no comparisons were done. To overcome this
issue, we used a public dataset that has recently been published (Ar-DAD) and
contains about 37 chapters that were recited by 30 reciters, with different
recitation speeds and different types of pronunciation rules. The proposed
model performance was evaluated using the most common evaluation metrics in
speech recognition, word error rate (WER), and character error rate (CER). The
results were 8.34% WER and 2.42% CER. We hope this research will be a baseline
for comparisons with future research on this public new dataset (Ar-DAD).
| [
{
"version": "v1",
"created": "Wed, 10 May 2023 18:40:01 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Harere",
"Ahmad Al",
""
],
[
"Jallad",
"Khloud Al",
""
]
] | TITLE: Quran Recitation Recognition using End-to-End Deep Learning
ABSTRACT: The Quran is the holy scripture of Islam, and its recitation is an important
aspect of the religion. Recognizing the recitation of the Holy Quran
automatically is a challenging task due to its unique rules that are not
applied in normal speaking speeches. A lot of research has been done in this
domain, but previous works have detected recitation errors as a classification
task or used traditional automatic speech recognition (ASR). In this paper, we
proposed a novel end-to-end deep learning model for recognizing the recitation
of the Holy Quran. The proposed model is a CNN-Bidirectional GRU encoder that
uses CTC as an objective function, and a character-based decoder which is a
beam search decoder. Moreover, all previous works were done on small private
datasets consisting of short verses and a few chapters of the Holy Quran. As a
result of using private datasets, no comparisons were done. To overcome this
issue, we used a public dataset that has recently been published (Ar-DAD) and
contains about 37 chapters that were recited by 30 reciters, with different
recitation speeds and different types of pronunciation rules. The proposed
model performance was evaluated using the most common evaluation metrics in
speech recognition, word error rate (WER), and character error rate (CER). The
results were 8.34% WER and 2.42% CER. We hope this research will be a baseline
for comparisons with future research on this public new dataset (Ar-DAD).
| new_dataset | 0.71781 |
2305.07038 | Francisco Jesus Martinez-Murcia | E. Delgado de las Heras, F.J. Martinez-Murcia, I.A. Ill\'an, C.
Jim\'enez-Mesa, D. Castillo-Barnes, J. Ram\'irez, and J.M. G\'orriz | Revealing Patterns of Symptomatology in Parkinson's Disease: A Latent
Space Analysis with 3D Convolutional Autoencoders | Accepted at 2023 ASPAI Conference | null | null | null | eess.IV cs.LG | http://creativecommons.org/licenses/by/4.0/ | This work proposes the use of 3D convolutional variational autoencoders
(CVAEs) to trace the changes and symptomatology produced by neurodegeneration
in Parkinson's disease (PD). In this work, we present a novel approach to
detect and quantify changes in dopamine transporter (DaT) concentration and its
spatial patterns using 3D CVAEs on Ioflupane (FPCIT) imaging. Our approach
leverages the power of deep learning to learn a low-dimensional representation
of the brain imaging data, which then is linked to different symptom categories
using regression algorithms. We demonstrate the effectiveness of our approach
on a dataset of PD patients and healthy controls, and show that general
symptomatology (UPDRS) is linked to a d-dimensional decomposition via the CVAE
with R2>0.25. Our work shows the potential of representation learning not only
in early diagnosis but in understanding neurodegeneration processes and
symptomatology.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 11:57:00 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Heras",
"E. Delgado de las",
""
],
[
"Martinez-Murcia",
"F. J.",
""
],
[
"Illán",
"I. A.",
""
],
[
"Jiménez-Mesa",
"C.",
""
],
[
"Castillo-Barnes",
"D.",
""
],
[
"Ramírez",
"J.",
""
],
[
"Górriz",
"J. M.",
""
]
] | TITLE: Revealing Patterns of Symptomatology in Parkinson's Disease: A Latent
Space Analysis with 3D Convolutional Autoencoders
ABSTRACT: This work proposes the use of 3D convolutional variational autoencoders
(CVAEs) to trace the changes and symptomatology produced by neurodegeneration
in Parkinson's disease (PD). In this work, we present a novel approach to
detect and quantify changes in dopamine transporter (DaT) concentration and its
spatial patterns using 3D CVAEs on Ioflupane (FPCIT) imaging. Our approach
leverages the power of deep learning to learn a low-dimensional representation
of the brain imaging data, which then is linked to different symptom categories
using regression algorithms. We demonstrate the effectiveness of our approach
on a dataset of PD patients and healthy controls, and show that general
symptomatology (UPDRS) is linked to a d-dimensional decomposition via the CVAE
with R2>0.25. Our work shows the potential of representation learning not only
in early diagnosis but in understanding neurodegeneration processes and
symptomatology.
| no_new_dataset | 0.70844 |
2305.07079 | Farhad Shirani Chaharsooghi | Mahshad Shariatnasab, Farhad Shirani, S. Sitharma Iyengar | The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation | null | null | null | null | cs.IT cs.CR cs.DB math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dataset obfuscation refers to techniques in which random noise is added to
the entries of a given dataset, prior to its public release, to protect against
leakage of private information. In this work, dataset obfuscation under two
objectives is considered: i) rank-preservation: to preserve the row ordering in
the obfuscated dataset induced by a given rank function, and ii) anonymity: to
protect user anonymity under fingerprinting attacks. The first objective,
rank-preservation, is of interest in applications such as the design of search
engines and recommendation systems, feature matching, and social network
analysis. Fingerprinting attacks, considered in evaluating the anonymity
objective, are privacy attacks where an attacker constructs a fingerprint of a
victim based on its observed activities, such as online web activities, and
compares this fingerprint with information extracted from a publicly released
obfuscated dataset to identify the victim. By evaluating the performance limits
of a class of obfuscation mechanisms over asymptotically large datasets, a
fundamental trade-off is quantified between rank-preservation and user
anonymity. Single-letter obfuscation mechanisms are considered, where each
entry in the dataset is perturbed by independent noise, and their fundamental
performance limits are characterized by leveraging large deviation techniques.
The optimal obfuscating test-channel, optimizing the privacy-utility tradeoff,
is characterized in the form of a convex optimization problem which can be
solved efficiently. Numerical simulations of various scenarios are provided to
verify the theoretical derivations.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 18:26:38 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Shariatnasab",
"Mahshad",
""
],
[
"Shirani",
"Farhad",
""
],
[
"Iyengar",
"S. Sitharma",
""
]
] | TITLE: The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation
ABSTRACT: Dataset obfuscation refers to techniques in which random noise is added to
the entries of a given dataset, prior to its public release, to protect against
leakage of private information. In this work, dataset obfuscation under two
objectives is considered: i) rank-preservation: to preserve the row ordering in
the obfuscated dataset induced by a given rank function, and ii) anonymity: to
protect user anonymity under fingerprinting attacks. The first objective,
rank-preservation, is of interest in applications such as the design of search
engines and recommendation systems, feature matching, and social network
analysis. Fingerprinting attacks, considered in evaluating the anonymity
objective, are privacy attacks where an attacker constructs a fingerprint of a
victim based on its observed activities, such as online web activities, and
compares this fingerprint with information extracted from a publicly released
obfuscated dataset to identify the victim. By evaluating the performance limits
of a class of obfuscation mechanisms over asymptotically large datasets, a
fundamental trade-off is quantified between rank-preservation and user
anonymity. Single-letter obfuscation mechanisms are considered, where each
entry in the dataset is perturbed by independent noise, and their fundamental
performance limits are characterized by leveraging large deviation techniques.
The optimal obfuscating test-channel, optimizing the privacy-utility tradeoff,
is characterized in the form of a convex optimization problem which can be
solved efficiently. Numerical simulations of various scenarios are provided to
verify the theoretical derivations.
| no_new_dataset | 0.705354 |
2305.07085 | Ting Wu | Ting Wu, Jingyi Liu, Rui Zheng, Qi Zhang, Tao Gui, Xuanjing Huang | Enhancing Contrastive Learning with Noise-Guided Attack: Towards
Continual Relation Extraction in the Wild | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The principle of continual relation extraction~(CRE) involves adapting to
emerging novel relations while preserving od knowledge. While current endeavors
in CRE succeed in preserving old knowledge, they tend to fail when exposed to
contaminated data streams. We assume this is attributed to their reliance on an
artificial hypothesis that the data stream has no annotation errors, which
hinders real-world applications for CRE. Considering the ubiquity of noisy
labels in real-world datasets, in this paper, we formalize a more practical
learning scenario, termed as \textit{noisy-CRE}. Building upon this challenging
setting, we develop a noise-resistant contrastive framework named as
\textbf{N}oise-guided \textbf{a}ttack in \textbf{C}ontrative
\textbf{L}earning~(NaCL) to learn incremental corrupted relations. Compared to
direct noise discarding or inaccessible noise relabeling, we present modifying
the feature space to match the given noisy labels via attacking can better
enrich contrastive representations. Extensive empirical validations highlight
that NaCL can achieve consistent performance improvements with increasing noise
rates, outperforming state-of-the-art baselines.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 18:48:18 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wu",
"Ting",
""
],
[
"Liu",
"Jingyi",
""
],
[
"Zheng",
"Rui",
""
],
[
"Zhang",
"Qi",
""
],
[
"Gui",
"Tao",
""
],
[
"Huang",
"Xuanjing",
""
]
] | TITLE: Enhancing Contrastive Learning with Noise-Guided Attack: Towards
Continual Relation Extraction in the Wild
ABSTRACT: The principle of continual relation extraction~(CRE) involves adapting to
emerging novel relations while preserving od knowledge. While current endeavors
in CRE succeed in preserving old knowledge, they tend to fail when exposed to
contaminated data streams. We assume this is attributed to their reliance on an
artificial hypothesis that the data stream has no annotation errors, which
hinders real-world applications for CRE. Considering the ubiquity of noisy
labels in real-world datasets, in this paper, we formalize a more practical
learning scenario, termed as \textit{noisy-CRE}. Building upon this challenging
setting, we develop a noise-resistant contrastive framework named as
\textbf{N}oise-guided \textbf{a}ttack in \textbf{C}ontrative
\textbf{L}earning~(NaCL) to learn incremental corrupted relations. Compared to
direct noise discarding or inaccessible noise relabeling, we present modifying
the feature space to match the given noisy labels via attacking can better
enrich contrastive representations. Extensive empirical validations highlight
that NaCL can achieve consistent performance improvements with increasing noise
rates, outperforming state-of-the-art baselines.
| no_new_dataset | 0.711224 |
2305.07119 | Bingyi Zhang | Bingyi Zhang, Sasindu Wijeratne, Rajgopal Kannan, Viktor Prasanna,
Carl Busart | Graph Neural Network for Accurate and Low-complexity SAR ATR | null | null | null | null | cs.CV cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) is the key
technique for remote sensing image recognition. The state-of-the-art works
exploit the deep convolutional neural networks (CNNs) for SAR ATR, leading to
high computation costs. These deep CNN models are unsuitable to be deployed on
resource-limited platforms. In this work, we propose a graph neural network
(GNN) model to achieve accurate and low-latency SAR ATR. We transform the input
SAR image into the graph representation. The proposed GNN model consists of a
stack of GNN layers that operates on the input graph to perform target
classification. Unlike the state-of-the-art CNNs, which need heavy convolution
operations, the proposed GNN model has low computation complexity and achieves
comparable high accuracy. The GNN-based approach enables our proposed
\emph{input pruning} strategy. By filtering out the irrelevant vertices in the
input graph, we can reduce the computation complexity. Moreover, we propose the
\emph{model pruning} strategy to sparsify the model weight matrices which
further reduces the computation complexity. We evaluate the proposed GNN model
on the MSTAR dataset and ship discrimination dataset. The evaluation results
show that the proposed GNN model achieves 99.38\% and 99.7\% classification
accuracy on the above two datasets, respectively. The proposed pruning
strategies can prune 98.6\% input vertices and 97\% weight entries with
negligible accuracy loss. Compared with the state-of-the-art CNNs, the proposed
GNN model has only 1/3000 computation cost and 1/80 model size.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 20:17:41 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhang",
"Bingyi",
""
],
[
"Wijeratne",
"Sasindu",
""
],
[
"Kannan",
"Rajgopal",
""
],
[
"Prasanna",
"Viktor",
""
],
[
"Busart",
"Carl",
""
]
] | TITLE: Graph Neural Network for Accurate and Low-complexity SAR ATR
ABSTRACT: Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) is the key
technique for remote sensing image recognition. The state-of-the-art works
exploit the deep convolutional neural networks (CNNs) for SAR ATR, leading to
high computation costs. These deep CNN models are unsuitable to be deployed on
resource-limited platforms. In this work, we propose a graph neural network
(GNN) model to achieve accurate and low-latency SAR ATR. We transform the input
SAR image into the graph representation. The proposed GNN model consists of a
stack of GNN layers that operates on the input graph to perform target
classification. Unlike the state-of-the-art CNNs, which need heavy convolution
operations, the proposed GNN model has low computation complexity and achieves
comparable high accuracy. The GNN-based approach enables our proposed
\emph{input pruning} strategy. By filtering out the irrelevant vertices in the
input graph, we can reduce the computation complexity. Moreover, we propose the
\emph{model pruning} strategy to sparsify the model weight matrices which
further reduces the computation complexity. We evaluate the proposed GNN model
on the MSTAR dataset and ship discrimination dataset. The evaluation results
show that the proposed GNN model achieves 99.38\% and 99.7\% classification
accuracy on the above two datasets, respectively. The proposed pruning
strategies can prune 98.6\% input vertices and 97\% weight entries with
negligible accuracy loss. Compared with the state-of-the-art CNNs, the proposed
GNN model has only 1/3000 computation cost and 1/80 model size.
| no_new_dataset | 0.713862 |
2305.07135 | Yeshwanth Venkatesha | Yeshwanth Venkatesha, Youngeun Kim, Hyoungseob Park, Priyadarshini
Panda | Divide-and-Conquer the NAS puzzle in Resource Constrained Federated
Learning Systems | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Federated Learning (FL) is a privacy-preserving distributed machine learning
approach geared towards applications in edge devices. However, the problem of
designing custom neural architectures in federated environments is not tackled
from the perspective of overall system efficiency. In this paper, we propose
DC-NAS -- a divide-and-conquer approach that performs supernet-based Neural
Architecture Search (NAS) in a federated system by systematically sampling the
search space. We propose a novel diversified sampling strategy that balances
exploration and exploitation of the search space by initially maximizing the
distance between the samples and progressively shrinking this distance as the
training progresses. We then perform channel pruning to reduce the training
complexity at the devices further. We show that our approach outperforms
several sampling strategies including Hadamard sampling, where the samples are
maximally separated. We evaluate our method on the CIFAR10, CIFAR100, EMNIST,
and TinyImagenet benchmarks and show a comprehensive analysis of different
aspects of federated learning such as scalability, and non-IID data. DC-NAS
achieves near iso-accuracy as compared to full-scale federated NAS with 50%
fewer resources.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 20:57:29 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Venkatesha",
"Yeshwanth",
""
],
[
"Kim",
"Youngeun",
""
],
[
"Park",
"Hyoungseob",
""
],
[
"Panda",
"Priyadarshini",
""
]
] | TITLE: Divide-and-Conquer the NAS puzzle in Resource Constrained Federated
Learning Systems
ABSTRACT: Federated Learning (FL) is a privacy-preserving distributed machine learning
approach geared towards applications in edge devices. However, the problem of
designing custom neural architectures in federated environments is not tackled
from the perspective of overall system efficiency. In this paper, we propose
DC-NAS -- a divide-and-conquer approach that performs supernet-based Neural
Architecture Search (NAS) in a federated system by systematically sampling the
search space. We propose a novel diversified sampling strategy that balances
exploration and exploitation of the search space by initially maximizing the
distance between the samples and progressively shrinking this distance as the
training progresses. We then perform channel pruning to reduce the training
complexity at the devices further. We show that our approach outperforms
several sampling strategies including Hadamard sampling, where the samples are
maximally separated. We evaluate our method on the CIFAR10, CIFAR100, EMNIST,
and TinyImagenet benchmarks and show a comprehensive analysis of different
aspects of federated learning such as scalability, and non-IID data. DC-NAS
achieves near iso-accuracy as compared to full-scale federated NAS with 50%
fewer resources.
| no_new_dataset | 0.708648 |
2305.07138 | Sepideh Neshatfar | Sepideh Neshatfar, Abram Magner, Salimeh Yasaei Sekeh | Promise and Limitations of Supervised Optimal Transport-Based Graph
Summarization via Information Theoretic Measures | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph summarization is the problem of producing smaller graph representations
of an input graph dataset, in such a way that the smaller compressed graphs
capture relevant structural information for downstream tasks. There is a recent
graph summarization method that formulates an optimal transport-based framework
that allows prior information about node, edge, and attribute importance (never
defined in that work) to be incorporated into the graph summarization process.
However, very little is known about the statistical properties of this
framework. To elucidate this question, we consider the problem of supervised
graph summarization, wherein by using information theoretic measures we seek to
preserve relevant information about a class label. To gain a theoretical
perspective on the supervised summarization problem itself, we first formulate
it in terms of maximizing the Shannon mutual information between the summarized
graph and the class label. We show an NP-hardness of approximation result for
this problem, thereby constraining what one should expect from proposed
solutions. We then propose a summarization method that incorporates mutual
information estimates between random variables associated with sample graphs
and class labels into the optimal transport compression framework. We
empirically show performance improvements over previous works in terms of
classification accuracy and time on synthetic and certain real datasets. We
also theoretically explore the limitations of the optimal transport approach
for the supervised summarization problem and we show that it fails to satisfy a
certain desirable information monotonicity property.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 21:03:34 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Neshatfar",
"Sepideh",
""
],
[
"Magner",
"Abram",
""
],
[
"Sekeh",
"Salimeh Yasaei",
""
]
] | TITLE: Promise and Limitations of Supervised Optimal Transport-Based Graph
Summarization via Information Theoretic Measures
ABSTRACT: Graph summarization is the problem of producing smaller graph representations
of an input graph dataset, in such a way that the smaller compressed graphs
capture relevant structural information for downstream tasks. There is a recent
graph summarization method that formulates an optimal transport-based framework
that allows prior information about node, edge, and attribute importance (never
defined in that work) to be incorporated into the graph summarization process.
However, very little is known about the statistical properties of this
framework. To elucidate this question, we consider the problem of supervised
graph summarization, wherein by using information theoretic measures we seek to
preserve relevant information about a class label. To gain a theoretical
perspective on the supervised summarization problem itself, we first formulate
it in terms of maximizing the Shannon mutual information between the summarized
graph and the class label. We show an NP-hardness of approximation result for
this problem, thereby constraining what one should expect from proposed
solutions. We then propose a summarization method that incorporates mutual
information estimates between random variables associated with sample graphs
and class labels into the optimal transport compression framework. We
empirically show performance improvements over previous works in terms of
classification accuracy and time on synthetic and certain real datasets. We
also theoretically explore the limitations of the optimal transport approach
for the supervised summarization problem and we show that it fails to satisfy a
certain desirable information monotonicity property.
| no_new_dataset | 0.708427 |
2305.07151 | Polina Tsvilodub | Polina Tsvilodub, Michael Franke, Robert D. Hawkins, Noah D. Goodman | Overinformative Question Answering by Humans and Machines | 7 pages, 2 figures, to appear in the Proceedings of the 45th Annual
Conference of the Cognitive Science Society (2023) | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When faced with a polar question, speakers often provide overinformative
answers going beyond a simple "yes" or "no". But what principles guide the
selection of additional information? In this paper, we provide experimental
evidence from two studies suggesting that overinformativeness in human
answering is driven by considerations of relevance to the questioner's goals
which they flexibly adjust given the functional context in which the question
is uttered. We take these human results as a strong benchmark for investigating
question-answering performance in state-of-the-art neural language models,
conducting an extensive evaluation on items from human experiments. We find
that most models fail to adjust their answering behavior in a human-like way
and tend to include irrelevant information. We show that GPT-3 is highly
sensitive to the form of the prompt and only achieves human-like answer
patterns when guided by an example and cognitively-motivated explanation.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 21:41:41 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Tsvilodub",
"Polina",
""
],
[
"Franke",
"Michael",
""
],
[
"Hawkins",
"Robert D.",
""
],
[
"Goodman",
"Noah D.",
""
]
] | TITLE: Overinformative Question Answering by Humans and Machines
ABSTRACT: When faced with a polar question, speakers often provide overinformative
answers going beyond a simple "yes" or "no". But what principles guide the
selection of additional information? In this paper, we provide experimental
evidence from two studies suggesting that overinformativeness in human
answering is driven by considerations of relevance to the questioner's goals
which they flexibly adjust given the functional context in which the question
is uttered. We take these human results as a strong benchmark for investigating
question-answering performance in state-of-the-art neural language models,
conducting an extensive evaluation on items from human experiments. We find
that most models fail to adjust their answering behavior in a human-like way
and tend to include irrelevant information. We show that GPT-3 is highly
sensitive to the form of the prompt and only achieves human-like answer
patterns when guided by an example and cognitively-motivated explanation.
| no_new_dataset | 0.709044 |
2305.07167 | Shakti Nagnath Wadekar | Shakti N. Wadekar, Eugenio Culurciello | OneCAD: One Classifier for All image Datasets using multimodal learning | 8 pages, 6 figures | null | null | null | cs.CV cs.CL cs.LG eess.IV | http://creativecommons.org/licenses/by/4.0/ | Vision-Transformers (ViTs) and Convolutional neural networks (CNNs) are
widely used Deep Neural Networks (DNNs) for classification task. These model
architectures are dependent on the number of classes in the dataset it was
trained on. Any change in number of classes leads to change (partial or full)
in the model's architecture. This work addresses the question: Is it possible
to create a number-of-class-agnostic model architecture?. This allows model's
architecture to be independent of the dataset it is trained on. This work
highlights the issues with the current architectures (ViTs and CNNs). Also,
proposes a training and inference framework OneCAD (One Classifier for All
image Datasets) to achieve close-to number-of-class-agnostic transformer model.
To best of our knowledge this is the first work to use Mask-Image-Modeling
(MIM) with multimodal learning for classification task to create a DNN model
architecture agnostic to the number of classes. Preliminary results are shown
on natural and medical image datasets. Datasets: MNIST, CIFAR10, CIFAR100 and
COVIDx. Code will soon be publicly available on github.
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 22:40:47 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wadekar",
"Shakti N.",
""
],
[
"Culurciello",
"Eugenio",
""
]
] | TITLE: OneCAD: One Classifier for All image Datasets using multimodal learning
ABSTRACT: Vision-Transformers (ViTs) and Convolutional neural networks (CNNs) are
widely used Deep Neural Networks (DNNs) for classification task. These model
architectures are dependent on the number of classes in the dataset it was
trained on. Any change in number of classes leads to change (partial or full)
in the model's architecture. This work addresses the question: Is it possible
to create a number-of-class-agnostic model architecture?. This allows model's
architecture to be independent of the dataset it is trained on. This work
highlights the issues with the current architectures (ViTs and CNNs). Also,
proposes a training and inference framework OneCAD (One Classifier for All
image Datasets) to achieve close-to number-of-class-agnostic transformer model.
To best of our knowledge this is the first work to use Mask-Image-Modeling
(MIM) with multimodal learning for classification task to create a DNN model
architecture agnostic to the number of classes. Preliminary results are shown
on natural and medical image datasets. Datasets: MNIST, CIFAR10, CIFAR100 and
COVIDx. Code will soon be publicly available on github.
| no_new_dataset | 0.711782 |
2305.07214 | Xinyu Gong | Xinyu Gong, Sreyas Mohan, Naina Dhingra, Jean-Charles Bazin, Yilei Li,
Zhangyang Wang, Rakesh Ranjan | MMG-Ego4D: Multi-Modal Generalization in Egocentric Action Recognition | Accepted to CVPR 2023 | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In this paper, we study a novel problem in egocentric action recognition,
which we term as "Multimodal Generalization" (MMG). MMG aims to study how
systems can generalize when data from certain modalities is limited or even
completely missing. We thoroughly investigate MMG in the context of standard
supervised action recognition and the more challenging few-shot setting for
learning new action categories. MMG consists of two novel scenarios, designed
to support security, and efficiency considerations in real-world applications:
(1) missing modality generalization where some modalities that were present
during the train time are missing during the inference time, and (2)
cross-modal zero-shot generalization, where the modalities present during the
inference time and the training time are disjoint. To enable this
investigation, we construct a new dataset MMG-Ego4D containing data points with
video, audio, and inertial motion sensor (IMU) modalities. Our dataset is
derived from Ego4D dataset, but processed and thoroughly re-annotated by human
experts to facilitate research in the MMG problem. We evaluate a diverse array
of models on MMG-Ego4D and propose new methods with improved generalization
ability. In particular, we introduce a new fusion module with modality dropout
training, contrastive-based alignment training, and a novel cross-modal
prototypical loss for better few-shot performance. We hope this study will
serve as a benchmark and guide future research in multimodal generalization
problems. The benchmark and code will be available at
https://github.com/facebookresearch/MMG_Ego4D.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 03:05:40 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Gong",
"Xinyu",
""
],
[
"Mohan",
"Sreyas",
""
],
[
"Dhingra",
"Naina",
""
],
[
"Bazin",
"Jean-Charles",
""
],
[
"Li",
"Yilei",
""
],
[
"Wang",
"Zhangyang",
""
],
[
"Ranjan",
"Rakesh",
""
]
] | TITLE: MMG-Ego4D: Multi-Modal Generalization in Egocentric Action Recognition
ABSTRACT: In this paper, we study a novel problem in egocentric action recognition,
which we term as "Multimodal Generalization" (MMG). MMG aims to study how
systems can generalize when data from certain modalities is limited or even
completely missing. We thoroughly investigate MMG in the context of standard
supervised action recognition and the more challenging few-shot setting for
learning new action categories. MMG consists of two novel scenarios, designed
to support security, and efficiency considerations in real-world applications:
(1) missing modality generalization where some modalities that were present
during the train time are missing during the inference time, and (2)
cross-modal zero-shot generalization, where the modalities present during the
inference time and the training time are disjoint. To enable this
investigation, we construct a new dataset MMG-Ego4D containing data points with
video, audio, and inertial motion sensor (IMU) modalities. Our dataset is
derived from Ego4D dataset, but processed and thoroughly re-annotated by human
experts to facilitate research in the MMG problem. We evaluate a diverse array
of models on MMG-Ego4D and propose new methods with improved generalization
ability. In particular, we introduce a new fusion module with modality dropout
training, contrastive-based alignment training, and a novel cross-modal
prototypical loss for better few-shot performance. We hope this study will
serve as a benchmark and guide future research in multimodal generalization
problems. The benchmark and code will be available at
https://github.com/facebookresearch/MMG_Ego4D.
| new_dataset | 0.715617 |
2305.07257 | Arman Bolatov | Aknur Karabay, Arman Bolatov, Huseyin Atakan Varol, and Mei-Yen Chan | A Central Asian Food Dataset for Personalized Dietary Interventions,
Extended Abstract | 3 pages, 2 figures, 5 tables | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Nowadays, it is common for people to take photographs of every beverage,
snack, or meal they eat and then post these photographs on social media
platforms. Leveraging these social trends, real-time food recognition and
reliable classification of these captured food images can potentially help
replace some of the tedious recording and coding of food diaries to enable
personalized dietary interventions. Although Central Asian cuisine is
culturally and historically distinct, there has been little published data on
the food and dietary habits of people in this region. To fill this gap, we aim
to create a reliable dataset of regional foods that is easily accessible to
both public consumers and researchers. To the best of our knowledge, this is
the first work on creating a Central Asian Food Dataset (CAFD). The final
dataset contains 42 food categories and over 16,000 images of national dishes
unique to this region. We achieved a classification accuracy of 88.70\% (42
classes) on the CAFD using the ResNet152 neural network model. The food
recognition models trained on the CAFD demonstrate computer vision's
effectiveness and high accuracy for dietary assessment.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 05:26:55 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Karabay",
"Aknur",
""
],
[
"Bolatov",
"Arman",
""
],
[
"Varol",
"Huseyin Atakan",
""
],
[
"Chan",
"Mei-Yen",
""
]
] | TITLE: A Central Asian Food Dataset for Personalized Dietary Interventions,
Extended Abstract
ABSTRACT: Nowadays, it is common for people to take photographs of every beverage,
snack, or meal they eat and then post these photographs on social media
platforms. Leveraging these social trends, real-time food recognition and
reliable classification of these captured food images can potentially help
replace some of the tedious recording and coding of food diaries to enable
personalized dietary interventions. Although Central Asian cuisine is
culturally and historically distinct, there has been little published data on
the food and dietary habits of people in this region. To fill this gap, we aim
to create a reliable dataset of regional foods that is easily accessible to
both public consumers and researchers. To the best of our knowledge, this is
the first work on creating a Central Asian Food Dataset (CAFD). The final
dataset contains 42 food categories and over 16,000 images of national dishes
unique to this region. We achieved a classification accuracy of 88.70\% (42
classes) on the CAFD using the ResNet152 neural network model. The food
recognition models trained on the CAFD demonstrate computer vision's
effectiveness and high accuracy for dietary assessment.
| new_dataset | 0.714416 |
2305.07266 | Yawen Yang | Yawen Yang, Xuming Hu, Fukun Ma, Shu'ang Li, Aiwei Liu, Lijie Wen,
Philip S. Yu | Gaussian Prior Reinforcement Learning for Nested Named Entity
Recognition | Accepted by ICASSP 2023 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Named Entity Recognition (NER) is a well and widely studied task in natural
language processing. Recently, the nested NER has attracted more attention
since its practicality and difficulty. Existing works for nested NER ignore the
recognition order and boundary position relation of nested entities. To address
these issues, we propose a novel seq2seq model named GPRL, which formulates the
nested NER task as an entity triplet sequence generation process. GPRL adopts
the reinforcement learning method to generate entity triplets decoupling the
entity order in gold labels and expects to learn a reasonable recognition order
of entities via trial and error. Based on statistics of boundary distance for
nested entities, GPRL designs a Gaussian prior to represent the boundary
distance distribution between nested entities and adjust the output probability
distribution of nested boundary tokens. Experiments on three nested NER
datasets demonstrate that GPRL outperforms previous nested NER models.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 05:55:34 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Yang",
"Yawen",
""
],
[
"Hu",
"Xuming",
""
],
[
"Ma",
"Fukun",
""
],
[
"Li",
"Shu'ang",
""
],
[
"Liu",
"Aiwei",
""
],
[
"Wen",
"Lijie",
""
],
[
"Yu",
"Philip S.",
""
]
] | TITLE: Gaussian Prior Reinforcement Learning for Nested Named Entity
Recognition
ABSTRACT: Named Entity Recognition (NER) is a well and widely studied task in natural
language processing. Recently, the nested NER has attracted more attention
since its practicality and difficulty. Existing works for nested NER ignore the
recognition order and boundary position relation of nested entities. To address
these issues, we propose a novel seq2seq model named GPRL, which formulates the
nested NER task as an entity triplet sequence generation process. GPRL adopts
the reinforcement learning method to generate entity triplets decoupling the
entity order in gold labels and expects to learn a reasonable recognition order
of entities via trial and error. Based on statistics of boundary distance for
nested entities, GPRL designs a Gaussian prior to represent the boundary
distance distribution between nested entities and adjust the output probability
distribution of nested boundary tokens. Experiments on three nested NER
datasets demonstrate that GPRL outperforms previous nested NER models.
| no_new_dataset | 0.710446 |
2305.07287 | Matteo Paltenghi | Dominik Huber, Matteo Paltenghi, Michael Pradel | Where to Look When Repairing Code? Comparing the Attention of Neural
Models and Developers | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neural network-based techniques for automated program repair are becoming
increasingly effective. Despite their success, little is known about why they
succeed or fail, and how their way of reasoning about the code to repair
compares to human developers. This paper presents the first in-depth study
comparing human and neural program repair. In particular, we investigate what
parts of the buggy code humans and two state of the art neural repair models
focus on. This comparison is enabled by a novel attention-tracking interface
for human code editing, based on which we gather a dataset of 98 bug fixing
sessions, and on the attention layers of neural repair models. Our results show
that the attention of the humans and both neural models often overlaps (0.35 to
0.44 correlation). At the same time, the agreement between humans and models
still leaves room for improvement, as evidenced by the higher human-human
correlation of 0.56. While the two models either focus mostly on the buggy line
or on the surrounding context, the developers adopt a hybrid approach that
evolves over time, where 36.8% of the attention is given to the buggy line and
the rest to the context. Overall, we find the humans to still be clearly more
effective at finding a correct fix, with 67.3% vs. less than 3% correctly
predicted patches. The results and data of this study are a first step into a
deeper understanding of the internal process of neural program repair, and
offer insights inspired by the behavior of human developers on how to further
improve neural repair models.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 07:23:15 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Huber",
"Dominik",
""
],
[
"Paltenghi",
"Matteo",
""
],
[
"Pradel",
"Michael",
""
]
] | TITLE: Where to Look When Repairing Code? Comparing the Attention of Neural
Models and Developers
ABSTRACT: Neural network-based techniques for automated program repair are becoming
increasingly effective. Despite their success, little is known about why they
succeed or fail, and how their way of reasoning about the code to repair
compares to human developers. This paper presents the first in-depth study
comparing human and neural program repair. In particular, we investigate what
parts of the buggy code humans and two state of the art neural repair models
focus on. This comparison is enabled by a novel attention-tracking interface
for human code editing, based on which we gather a dataset of 98 bug fixing
sessions, and on the attention layers of neural repair models. Our results show
that the attention of the humans and both neural models often overlaps (0.35 to
0.44 correlation). At the same time, the agreement between humans and models
still leaves room for improvement, as evidenced by the higher human-human
correlation of 0.56. While the two models either focus mostly on the buggy line
or on the surrounding context, the developers adopt a hybrid approach that
evolves over time, where 36.8% of the attention is given to the buggy line and
the rest to the context. Overall, we find the humans to still be clearly more
effective at finding a correct fix, with 67.3% vs. less than 3% correctly
predicted patches. The results and data of this study are a first step into a
deeper understanding of the internal process of neural program repair, and
offer insights inspired by the behavior of human developers on how to further
improve neural repair models.
| new_dataset | 0.670851 |
2305.07288 | Sunjun Kweon | Sunjun Kweon, Yeonsu Kwon, Seonhee Cho, Yohan Jo, Edward Choi | Open-WikiTable: Dataset for Open Domain Question Answering with Complex
Reasoning over Table | ACL 2023 (Findings) | null | null | null | cs.CL | http://creativecommons.org/licenses/by-sa/4.0/ | Despite recent interest in open domain question answering (ODQA) over tables,
many studies still rely on datasets that are not truly optimal for the task
with respect to utilizing structural nature of table. These datasets assume
answers reside as a single cell value and do not necessitate exploring over
multiple cells such as aggregation, comparison, and sorting. Thus, we release
Open-WikiTable, the first ODQA dataset that requires complex reasoning over
tables. Open-WikiTable is built upon WikiSQL and WikiTableQuestions to be
applicable in the open-domain setting. As each question is coupled with both
textual answers and SQL queries, Open-WikiTable opens up a wide range of
possibilities for future research, as both reader and parser methods can be
applied. The dataset and code are publicly available.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 07:24:16 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Kweon",
"Sunjun",
""
],
[
"Kwon",
"Yeonsu",
""
],
[
"Cho",
"Seonhee",
""
],
[
"Jo",
"Yohan",
""
],
[
"Choi",
"Edward",
""
]
] | TITLE: Open-WikiTable: Dataset for Open Domain Question Answering with Complex
Reasoning over Table
ABSTRACT: Despite recent interest in open domain question answering (ODQA) over tables,
many studies still rely on datasets that are not truly optimal for the task
with respect to utilizing structural nature of table. These datasets assume
answers reside as a single cell value and do not necessitate exploring over
multiple cells such as aggregation, comparison, and sorting. Thus, we release
Open-WikiTable, the first ODQA dataset that requires complex reasoning over
tables. Open-WikiTable is built upon WikiSQL and WikiTableQuestions to be
applicable in the open-domain setting. As each question is coupled with both
textual answers and SQL queries, Open-WikiTable opens up a wide range of
possibilities for future research, as both reader and parser methods can be
applied. The dataset and code are publicly available.
| new_dataset | 0.713656 |
2305.07308 | Jialiang Sun | Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen | Efficient Search of Comprehensively Robust Neural Architectures via
Multi-fidelity Evaluation | null | null | null | null | cs.CV | http://creativecommons.org/publicdomain/zero/1.0/ | Neural architecture search (NAS) has emerged as one successful technique to
find robust deep neural network (DNN) architectures. However, most existing
robustness evaluations in NAS only consider $l_{\infty}$ norm-based adversarial
noises. In order to improve the robustness of DNN models against multiple types
of noises, it is necessary to consider a comprehensive evaluation in NAS for
robust architectures. But with the increasing number of types of robustness
evaluations, it also becomes more time-consuming to find comprehensively robust
architectures. To alleviate this problem, we propose a novel efficient search
of comprehensively robust neural architectures via multi-fidelity evaluation
(ES-CRNA-ME). Specifically, we first search for comprehensively robust
architectures under multiple types of evaluations using the
weight-sharing-based NAS method, including different $l_{p}$ norm attacks,
semantic adversarial attacks, and composite adversarial attacks. In addition,
we reduce the number of robustness evaluations by the correlation analysis,
which can incorporate similar evaluations and decrease the evaluation cost.
Finally, we propose a multi-fidelity online surrogate during optimization to
further decrease the search cost. On the basis of the surrogate constructed by
low-fidelity data, the online high-fidelity data is utilized to finetune the
surrogate. Experiments on CIFAR10 and CIFAR100 datasets show the effectiveness
of our proposed method.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 08:28:58 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Sun",
"Jialiang",
""
],
[
"Yao",
"Wen",
""
],
[
"Jiang",
"Tingsong",
""
],
[
"Chen",
"Xiaoqian",
""
]
] | TITLE: Efficient Search of Comprehensively Robust Neural Architectures via
Multi-fidelity Evaluation
ABSTRACT: Neural architecture search (NAS) has emerged as one successful technique to
find robust deep neural network (DNN) architectures. However, most existing
robustness evaluations in NAS only consider $l_{\infty}$ norm-based adversarial
noises. In order to improve the robustness of DNN models against multiple types
of noises, it is necessary to consider a comprehensive evaluation in NAS for
robust architectures. But with the increasing number of types of robustness
evaluations, it also becomes more time-consuming to find comprehensively robust
architectures. To alleviate this problem, we propose a novel efficient search
of comprehensively robust neural architectures via multi-fidelity evaluation
(ES-CRNA-ME). Specifically, we first search for comprehensively robust
architectures under multiple types of evaluations using the
weight-sharing-based NAS method, including different $l_{p}$ norm attacks,
semantic adversarial attacks, and composite adversarial attacks. In addition,
we reduce the number of robustness evaluations by the correlation analysis,
which can incorporate similar evaluations and decrease the evaluation cost.
Finally, we propose a multi-fidelity online surrogate during optimization to
further decrease the search cost. On the basis of the surrogate constructed by
low-fidelity data, the online high-fidelity data is utilized to finetune the
surrogate. Experiments on CIFAR10 and CIFAR100 datasets show the effectiveness
of our proposed method.
| no_new_dataset | 0.711074 |
2305.07310 | Pengzhi Gao | Pengzhi Gao, Liwen Zhang, Zhongjun He, Hua Wu, Haifeng Wang | Improving Zero-shot Multilingual Neural Machine Translation by
Leveraging Cross-lingual Consistency Regularization | Accepted to Findings of ACL 2023 | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multilingual neural machine translation (NMT) model has a promising
capability of zero-shot translation, where it could directly translate between
language pairs unseen during training. For good transfer performance from
supervised directions to zero-shot directions, the multilingual NMT model is
expected to learn universal representations across different languages. This
paper introduces a cross-lingual consistency regularization, CrossConST, to
bridge the representation gap among different languages and boost zero-shot
translation performance. The theoretical analysis shows that CrossConST
implicitly maximizes the probability distribution for zero-shot translation,
and the experimental results on both low-resource and high-resource benchmarks
show that CrossConST consistently improves the translation performance. The
experimental analysis also proves that CrossConST could close the sentence
representation gap and better align the representation space. Given the
universality and simplicity of CrossConST, we believe it can serve as a strong
baseline for future multilingual NMT research.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 08:32:18 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Gao",
"Pengzhi",
""
],
[
"Zhang",
"Liwen",
""
],
[
"He",
"Zhongjun",
""
],
[
"Wu",
"Hua",
""
],
[
"Wang",
"Haifeng",
""
]
] | TITLE: Improving Zero-shot Multilingual Neural Machine Translation by
Leveraging Cross-lingual Consistency Regularization
ABSTRACT: The multilingual neural machine translation (NMT) model has a promising
capability of zero-shot translation, where it could directly translate between
language pairs unseen during training. For good transfer performance from
supervised directions to zero-shot directions, the multilingual NMT model is
expected to learn universal representations across different languages. This
paper introduces a cross-lingual consistency regularization, CrossConST, to
bridge the representation gap among different languages and boost zero-shot
translation performance. The theoretical analysis shows that CrossConST
implicitly maximizes the probability distribution for zero-shot translation,
and the experimental results on both low-resource and high-resource benchmarks
show that CrossConST consistently improves the translation performance. The
experimental analysis also proves that CrossConST could close the sentence
representation gap and better align the representation space. Given the
universality and simplicity of CrossConST, we believe it can serve as a strong
baseline for future multilingual NMT research.
| no_new_dataset | 0.708635 |
2305.07319 | Francesco Masillo | Francesco Masillo | Matching Statistics speed up BWT construction | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Due to the exponential growth of genomic data, constructing dedicated data
structures has become the principal bottleneck in common bioinformatics
applications. In particular, the Burrows-Wheeler Transform (BWT) is the basis
of some of the most popular self-indexes for genomic data, due to its known
favourable behaviour on repetitive data.
Some tools that exploit the intrinsic repetitiveness of biological data have
risen in popularity, due to their speed and low space consumption. We introduce
a new algorithm for computing the BWT, which takes advantage of the redundancy
of the data through a compressed version of matching statistics, the
$\textit{CMS}$ of [Lipt\'ak et al., WABI 2022]. We show that it suffices to
sort a small subset of suffixes, lowering both computation time and space. Our
result is due to a new insight which links the so-called insert-heads of
[Lipt\'ak et al., WABI 2022] to the well-known run boundaries of the BWT.
We give two implementations of our algorithm, called
$\texttt{CMS}$-$\texttt{BWT}$, both competitive in our experimental validation
on highly repetitive real-life datasets. In most cases, they outperform other
tools w.r.t. running time, trading off a higher memory footprint, which,
however, is still considerably smaller than the total size of the input data.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 08:45:56 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Masillo",
"Francesco",
""
]
] | TITLE: Matching Statistics speed up BWT construction
ABSTRACT: Due to the exponential growth of genomic data, constructing dedicated data
structures has become the principal bottleneck in common bioinformatics
applications. In particular, the Burrows-Wheeler Transform (BWT) is the basis
of some of the most popular self-indexes for genomic data, due to its known
favourable behaviour on repetitive data.
Some tools that exploit the intrinsic repetitiveness of biological data have
risen in popularity, due to their speed and low space consumption. We introduce
a new algorithm for computing the BWT, which takes advantage of the redundancy
of the data through a compressed version of matching statistics, the
$\textit{CMS}$ of [Lipt\'ak et al., WABI 2022]. We show that it suffices to
sort a small subset of suffixes, lowering both computation time and space. Our
result is due to a new insight which links the so-called insert-heads of
[Lipt\'ak et al., WABI 2022] to the well-known run boundaries of the BWT.
We give two implementations of our algorithm, called
$\texttt{CMS}$-$\texttt{BWT}$, both competitive in our experimental validation
on highly repetitive real-life datasets. In most cases, they outperform other
tools w.r.t. running time, trading off a higher memory footprint, which,
however, is still considerably smaller than the total size of the input data.
| no_new_dataset | 0.70543 |
2305.07328 | Yang Liu | Kai Cheng, Xinhua Zeng, Yang Liu, Tian Wang, Chengxin Pang, Jing Teng,
Zhaoyang Xia, and Jing Liu | Configurable Spatial-Temporal Hierarchical Analysis for Flexible Video
Anomaly Detection | submitted to IEEE TCSVT, under peer review | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Video anomaly detection (VAD) is a vital task with great practical
applications in industrial surveillance, security system, and traffic control.
Unlike previous unsupervised VAD methods that adopt a fixed structure to learn
normality without considering different detection demands, we design a
spatial-temporal hierarchical architecture (STHA) as a configurable
architecture to flexibly detect different degrees of anomaly. The comprehensive
structure of the STHA is delineated into a tripartite hierarchy, encompassing
the following tiers: the stream level, the stack level, and the block level.
Specifically, we design several auto-encoder-based blocks that possess varying
capacities for extracting normal patterns. Then, we stack blocks according to
the complexity degrees with both intra-stack and inter-stack residual links to
learn hierarchical normality gradually. Considering the multisource knowledge
of videos, we also model the spatial normality of video frames and temporal
normality of RGB difference by designing two parallel streams consisting of
stacks. Thus, STHA can provide various representation learning abilities by
expanding or contracting hierarchically to detect anomalies of different
degrees. Since the anomaly set is complicated and unbounded, our STHA can
adjust its detection ability to adapt to the human detection demands and the
complexity degree of anomaly that happened in the history of a scene. We
conduct experiments on three benchmarks and perform extensive analysis, and the
results demonstrate that our method performs comparablely to the
state-of-the-art methods. In addition, we design a toy dataset to prove that
our model can better balance the learning ability to adapt to different
detection demands.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 09:03:38 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Cheng",
"Kai",
""
],
[
"Zeng",
"Xinhua",
""
],
[
"Liu",
"Yang",
""
],
[
"Wang",
"Tian",
""
],
[
"Pang",
"Chengxin",
""
],
[
"Teng",
"Jing",
""
],
[
"Xia",
"Zhaoyang",
""
],
[
"Liu",
"Jing",
""
]
] | TITLE: Configurable Spatial-Temporal Hierarchical Analysis for Flexible Video
Anomaly Detection
ABSTRACT: Video anomaly detection (VAD) is a vital task with great practical
applications in industrial surveillance, security system, and traffic control.
Unlike previous unsupervised VAD methods that adopt a fixed structure to learn
normality without considering different detection demands, we design a
spatial-temporal hierarchical architecture (STHA) as a configurable
architecture to flexibly detect different degrees of anomaly. The comprehensive
structure of the STHA is delineated into a tripartite hierarchy, encompassing
the following tiers: the stream level, the stack level, and the block level.
Specifically, we design several auto-encoder-based blocks that possess varying
capacities for extracting normal patterns. Then, we stack blocks according to
the complexity degrees with both intra-stack and inter-stack residual links to
learn hierarchical normality gradually. Considering the multisource knowledge
of videos, we also model the spatial normality of video frames and temporal
normality of RGB difference by designing two parallel streams consisting of
stacks. Thus, STHA can provide various representation learning abilities by
expanding or contracting hierarchically to detect anomalies of different
degrees. Since the anomaly set is complicated and unbounded, our STHA can
adjust its detection ability to adapt to the human detection demands and the
complexity degree of anomaly that happened in the history of a scene. We
conduct experiments on three benchmarks and perform extensive analysis, and the
results demonstrate that our method performs comparablely to the
state-of-the-art methods. In addition, we design a toy dataset to prove that
our model can better balance the learning ability to adapt to different
detection demands.
| new_dataset | 0.608303 |
2305.07340 | Xiaoming Shi | Jie Xu, Lu Lu, Sen Yang, Bilin Liang, Xinwei Peng, Jiali Pang, Jinru
Ding, Xiaoming Shi, Lingrui Yang, Huan Song, Kang Li, Xin Sun, Shaoting Zhang | MedGPTEval: A Dataset and Benchmark to Evaluate Responses of Large
Language Models in Medicine | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | METHODS: First, a set of evaluation criteria is designed based on a
comprehensive literature review. Second, existing candidate criteria are
optimized for using a Delphi method by five experts in medicine and
engineering. Third, three clinical experts design a set of medical datasets to
interact with LLMs. Finally, benchmarking experiments are conducted on the
datasets. The responses generated by chatbots based on LLMs are recorded for
blind evaluations by five licensed medical experts. RESULTS: The obtained
evaluation criteria cover medical professional capabilities, social
comprehensive capabilities, contextual capabilities, and computational
robustness, with sixteen detailed indicators. The medical datasets include
twenty-seven medical dialogues and seven case reports in Chinese. Three
chatbots are evaluated, ChatGPT by OpenAI, ERNIE Bot by Baidu Inc., and Doctor
PuJiang (Dr. PJ) by Shanghai Artificial Intelligence Laboratory. Experimental
results show that Dr. PJ outperforms ChatGPT and ERNIE Bot in both
multiple-turn medical dialogue and case report scenarios.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 09:37:13 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Xu",
"Jie",
""
],
[
"Lu",
"Lu",
""
],
[
"Yang",
"Sen",
""
],
[
"Liang",
"Bilin",
""
],
[
"Peng",
"Xinwei",
""
],
[
"Pang",
"Jiali",
""
],
[
"Ding",
"Jinru",
""
],
[
"Shi",
"Xiaoming",
""
],
[
"Yang",
"Lingrui",
""
],
[
"Song",
"Huan",
""
],
[
"Li",
"Kang",
""
],
[
"Sun",
"Xin",
""
],
[
"Zhang",
"Shaoting",
""
]
] | TITLE: MedGPTEval: A Dataset and Benchmark to Evaluate Responses of Large
Language Models in Medicine
ABSTRACT: METHODS: First, a set of evaluation criteria is designed based on a
comprehensive literature review. Second, existing candidate criteria are
optimized for using a Delphi method by five experts in medicine and
engineering. Third, three clinical experts design a set of medical datasets to
interact with LLMs. Finally, benchmarking experiments are conducted on the
datasets. The responses generated by chatbots based on LLMs are recorded for
blind evaluations by five licensed medical experts. RESULTS: The obtained
evaluation criteria cover medical professional capabilities, social
comprehensive capabilities, contextual capabilities, and computational
robustness, with sixteen detailed indicators. The medical datasets include
twenty-seven medical dialogues and seven case reports in Chinese. Three
chatbots are evaluated, ChatGPT by OpenAI, ERNIE Bot by Baidu Inc., and Doctor
PuJiang (Dr. PJ) by Shanghai Artificial Intelligence Laboratory. Experimental
results show that Dr. PJ outperforms ChatGPT and ERNIE Bot in both
multiple-turn medical dialogue and case report scenarios.
| no_new_dataset | 0.693719 |
2305.07384 | Laura Jahn | Laura Jahn and Rasmus K. Rendsvig | Towards Detecting Inauthentic Coordination in Twitter Likes Data | null | null | null | null | cs.SI cs.CY stat.AP | http://creativecommons.org/licenses/by-sa/4.0/ | Social media feeds typically favor posts according to user engagement. The
most ubiquitous type of engagement (and the type we study) is *likes*. Users
customarily take engagement metrics such as likes as a neutral proxy for
quality and authority. This incentivizes like manipulation to influence public
opinion through *coordinated inauthentic behavior* (CIB). CIB targeted at likes
is largely unstudied as collecting suitable data about users' liking behavior
is non-trivial. This paper contributes a scripted algorithm to collect suitable
liking data from Twitter and a collected 30 day dataset of liking data from the
Danish political Twittersphere #dkpol, over which we analyze the script's
performance. Using only the binary matrix of users and the tweets they liked,
we identify large clusters of perfectly correlated users, and discuss our
findings in relation to CIB.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 11:24:26 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Jahn",
"Laura",
""
],
[
"Rendsvig",
"Rasmus K.",
""
]
] | TITLE: Towards Detecting Inauthentic Coordination in Twitter Likes Data
ABSTRACT: Social media feeds typically favor posts according to user engagement. The
most ubiquitous type of engagement (and the type we study) is *likes*. Users
customarily take engagement metrics such as likes as a neutral proxy for
quality and authority. This incentivizes like manipulation to influence public
opinion through *coordinated inauthentic behavior* (CIB). CIB targeted at likes
is largely unstudied as collecting suitable data about users' liking behavior
is non-trivial. This paper contributes a scripted algorithm to collect suitable
liking data from Twitter and a collected 30 day dataset of liking data from the
Danish political Twittersphere #dkpol, over which we analyze the script's
performance. Using only the binary matrix of users and the tweets they liked,
we identify large clusters of perfectly correlated users, and discuss our
findings in relation to CIB.
| no_new_dataset | 0.70374 |
2305.07386 | Dong Huang | Si-Guo Fang, Dong Huang, Chang-Dong Wang, Jian-Huang Lai | One-step Bipartite Graph Cut: A Normalized Formulation and Its
Application to Scalable Subspace Clustering | null | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The bipartite graph structure has shown its promising ability in facilitating
the subspace clustering and spectral clustering algorithms for large-scale
datasets. To avoid the post-processing via k-means during the bipartite graph
partitioning, the constrained Laplacian rank (CLR) is often utilized for
constraining the number of connected components (i.e., clusters) in the
bipartite graph, which, however, neglects the distribution (or normalization)
of these connected components and may lead to imbalanced or even ill clusters.
Despite the significant success of normalized cut (Ncut) in general graphs, it
remains surprisingly an open problem how to enforce a one-step normalized cut
for bipartite graphs, especially with linear-time complexity. In this paper, we
first characterize a novel one-step bipartite graph cut (OBCut) criterion with
normalized constraints, and theoretically prove its equivalence to a trace
maximization problem. Then we extend this cut criterion to a scalable subspace
clustering approach, where adaptive anchor learning, bipartite graph learning,
and one-step normalized bipartite graph partitioning are simultaneously modeled
in a unified objective function, and an alternating optimization algorithm is
further designed to solve it in linear time. Experiments on a variety of
general and large-scale datasets demonstrate the effectiveness and scalability
of our approach.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 11:27:20 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Fang",
"Si-Guo",
""
],
[
"Huang",
"Dong",
""
],
[
"Wang",
"Chang-Dong",
""
],
[
"Lai",
"Jian-Huang",
""
]
] | TITLE: One-step Bipartite Graph Cut: A Normalized Formulation and Its
Application to Scalable Subspace Clustering
ABSTRACT: The bipartite graph structure has shown its promising ability in facilitating
the subspace clustering and spectral clustering algorithms for large-scale
datasets. To avoid the post-processing via k-means during the bipartite graph
partitioning, the constrained Laplacian rank (CLR) is often utilized for
constraining the number of connected components (i.e., clusters) in the
bipartite graph, which, however, neglects the distribution (or normalization)
of these connected components and may lead to imbalanced or even ill clusters.
Despite the significant success of normalized cut (Ncut) in general graphs, it
remains surprisingly an open problem how to enforce a one-step normalized cut
for bipartite graphs, especially with linear-time complexity. In this paper, we
first characterize a novel one-step bipartite graph cut (OBCut) criterion with
normalized constraints, and theoretically prove its equivalence to a trace
maximization problem. Then we extend this cut criterion to a scalable subspace
clustering approach, where adaptive anchor learning, bipartite graph learning,
and one-step normalized bipartite graph partitioning are simultaneously modeled
in a unified objective function, and an alternating optimization algorithm is
further designed to solve it in linear time. Experiments on a variety of
general and large-scale datasets demonstrate the effectiveness and scalability
of our approach.
| no_new_dataset | 0.713082 |
2305.07390 | Lingqi Zhang | Lingqi Zhang, Mohamed Wahib, Peng Chen, Jintao Meng, Xiao Wang, Toshio
Endo, Satoshi Matsuoka | Revisiting Temporal Blocking Stencil Optimizations | This paper will be published in 2023 International Conference on
Supercomputing (ICS23) | null | 10.1145/3577193.3593716 | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | Iterative stencils are used widely across the spectrum of High Performance
Computing (HPC) applications. Many efforts have been put into optimizing
stencil GPU kernels, given the prevalence of GPU-accelerated supercomputers. To
improve the data locality, temporal blocking is an optimization that combines a
batch of time steps to process them together. Under the observation that GPUs
are evolving to resemble CPUs in some aspects, we revisit temporal blocking
optimizations for GPUs. We explore how temporal blocking schemes can be adapted
to the new features in the recent Nvidia GPUs, including large scratchpad
memory, hardware prefetching, and device-wide synchronization. We propose a
novel temporal blocking method, EBISU, which champions low device occupancy to
drive aggressive deep temporal blocking on large tiles that are executed
tile-by-tile. We compare EBISU with state-of-the-art temporal blocking
libraries: STENCILGEN and AN5D. We also compare with state-of-the-art stencil
auto-tuning tools that are equipped with temporal blocking optimizations:
ARTEMIS and DRSTENCIL. Over a wide range of stencil benchmarks, EBISU achieves
speedups up to $2.53$x and a geometric mean speedup of $1.49$x over the best
state-of-the-art performance in each stencil benchmark.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 11:32:16 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhang",
"Lingqi",
""
],
[
"Wahib",
"Mohamed",
""
],
[
"Chen",
"Peng",
""
],
[
"Meng",
"Jintao",
""
],
[
"Wang",
"Xiao",
""
],
[
"Endo",
"Toshio",
""
],
[
"Matsuoka",
"Satoshi",
""
]
] | TITLE: Revisiting Temporal Blocking Stencil Optimizations
ABSTRACT: Iterative stencils are used widely across the spectrum of High Performance
Computing (HPC) applications. Many efforts have been put into optimizing
stencil GPU kernels, given the prevalence of GPU-accelerated supercomputers. To
improve the data locality, temporal blocking is an optimization that combines a
batch of time steps to process them together. Under the observation that GPUs
are evolving to resemble CPUs in some aspects, we revisit temporal blocking
optimizations for GPUs. We explore how temporal blocking schemes can be adapted
to the new features in the recent Nvidia GPUs, including large scratchpad
memory, hardware prefetching, and device-wide synchronization. We propose a
novel temporal blocking method, EBISU, which champions low device occupancy to
drive aggressive deep temporal blocking on large tiles that are executed
tile-by-tile. We compare EBISU with state-of-the-art temporal blocking
libraries: STENCILGEN and AN5D. We also compare with state-of-the-art stencil
auto-tuning tools that are equipped with temporal blocking optimizations:
ARTEMIS and DRSTENCIL. Over a wide range of stencil benchmarks, EBISU achieves
speedups up to $2.53$x and a geometric mean speedup of $1.49$x over the best
state-of-the-art performance in each stencil benchmark.
| no_new_dataset | 0.70695 |
2305.07397 | Zhuozheng Li | Zizhang Wu, Zhuozheng Li, Zhi-Gang Fan, Yunzhe Wu, Yuanzhu Gan, Jian
Pu, Xianzhi Li | Learning Monocular Depth in Dynamic Environment via Context-aware
Temporal Attention | accepted by IJCAI 2023; 9 pages, 5 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The monocular depth estimation task has recently revealed encouraging
prospects, especially for the autonomous driving task. To tackle the ill-posed
problem of 3D geometric reasoning from 2D monocular images, multi-frame
monocular methods are developed to leverage the perspective correlation
information from sequential temporal frames. However, moving objects such as
cars and trains usually violate the static scene assumption, leading to feature
inconsistency deviation and misaligned cost values, which would mislead the
optimization algorithm. In this work, we present CTA-Depth, a Context-aware
Temporal Attention guided network for multi-frame monocular Depth estimation.
Specifically, we first apply a multi-level attention enhancement module to
integrate multi-level image features to obtain an initial depth and pose
estimation. Then the proposed CTA-Refiner is adopted to alternatively optimize
the depth and pose. During the refinement process, context-aware temporal
attention (CTA) is developed to capture the global temporal-context
correlations to maintain the feature consistency and estimation integrity of
moving objects. In particular, we propose a long-range geometry embedding (LGE)
module to produce a long-range temporal geometry prior. Our approach achieves
significant improvements over state-of-the-art approaches on three benchmark
datasets.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 11:48:32 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wu",
"Zizhang",
""
],
[
"Li",
"Zhuozheng",
""
],
[
"Fan",
"Zhi-Gang",
""
],
[
"Wu",
"Yunzhe",
""
],
[
"Gan",
"Yuanzhu",
""
],
[
"Pu",
"Jian",
""
],
[
"Li",
"Xianzhi",
""
]
] | TITLE: Learning Monocular Depth in Dynamic Environment via Context-aware
Temporal Attention
ABSTRACT: The monocular depth estimation task has recently revealed encouraging
prospects, especially for the autonomous driving task. To tackle the ill-posed
problem of 3D geometric reasoning from 2D monocular images, multi-frame
monocular methods are developed to leverage the perspective correlation
information from sequential temporal frames. However, moving objects such as
cars and trains usually violate the static scene assumption, leading to feature
inconsistency deviation and misaligned cost values, which would mislead the
optimization algorithm. In this work, we present CTA-Depth, a Context-aware
Temporal Attention guided network for multi-frame monocular Depth estimation.
Specifically, we first apply a multi-level attention enhancement module to
integrate multi-level image features to obtain an initial depth and pose
estimation. Then the proposed CTA-Refiner is adopted to alternatively optimize
the depth and pose. During the refinement process, context-aware temporal
attention (CTA) is developed to capture the global temporal-context
correlations to maintain the feature consistency and estimation integrity of
moving objects. In particular, we propose a long-range geometry embedding (LGE)
module to produce a long-range temporal geometry prior. Our approach achieves
significant improvements over state-of-the-art approaches on three benchmark
datasets.
| no_new_dataset | 0.707821 |
2305.07406 | Wai Man Si | Wai Man Si and Michael Backes and Yang Zhang and Ahmed Salem | Two-in-One: A Model Hijacking Attack Against Text Generation Models | To appear in the 32nd USENIX Security Symposium, August 2023,
Anaheim, CA, USA | null | null | null | cs.CR cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | Machine learning has progressed significantly in various applications ranging
from face recognition to text generation. However, its success has been
accompanied by different attacks. Recently a new attack has been proposed which
raises both accountability and parasitic computing risks, namely the model
hijacking attack. Nevertheless, this attack has only focused on image
classification tasks. In this work, we broaden the scope of this attack to
include text generation and classification models, hence showing its broader
applicability. More concretely, we propose a new model hijacking attack, Ditto,
that can hijack different text classification tasks into multiple generation
ones, e.g., language translation, text summarization, and language modeling. We
use a range of text benchmark datasets such as SST-2, TweetEval, AGnews, QNLI,
and IMDB to evaluate the performance of our attacks. Our results show that by
using Ditto, an adversary can successfully hijack text generation models
without jeopardizing their utility.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:13:27 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Si",
"Wai Man",
""
],
[
"Backes",
"Michael",
""
],
[
"Zhang",
"Yang",
""
],
[
"Salem",
"Ahmed",
""
]
] | TITLE: Two-in-One: A Model Hijacking Attack Against Text Generation Models
ABSTRACT: Machine learning has progressed significantly in various applications ranging
from face recognition to text generation. However, its success has been
accompanied by different attacks. Recently a new attack has been proposed which
raises both accountability and parasitic computing risks, namely the model
hijacking attack. Nevertheless, this attack has only focused on image
classification tasks. In this work, we broaden the scope of this attack to
include text generation and classification models, hence showing its broader
applicability. More concretely, we propose a new model hijacking attack, Ditto,
that can hijack different text classification tasks into multiple generation
ones, e.g., language translation, text summarization, and language modeling. We
use a range of text benchmark datasets such as SST-2, TweetEval, AGnews, QNLI,
and IMDB to evaluate the performance of our attacks. Our results show that by
using Ditto, an adversary can successfully hijack text generation models
without jeopardizing their utility.
| no_new_dataset | 0.710176 |
2305.07414 | Muhammad Sohaib Ayub | Muhammad Sohaib Ayub, Muhammad Adnan, Muhammad Yasir Shafi | Design and Development of a Java Parallel I/O Library | 10 pages | null | null | null | cs.DC | http://creativecommons.org/licenses/by/4.0/ | Parallel I/O refers to the ability of scientific programs to concurrently
read/write from/to a single file from multiple processes executing on
distributed memory platforms like compute clusters. In the HPC world, I/O
becomes a significant bottleneck for many real-world scientific applications.
In the last two decades, there has been significant research in improving the
performance of I/O operations in scientific computing for traditional languages
including C, C++, and Fortran. As a result of this, several mature and
high-performance libraries including ROMIO (implementation of MPI-IO), parallel
HDF5, Parallel I/O (PIO), and parallel netCDF are available today that provide
efficient I/O for scientific applications. However, there is very little
research done to evaluate and improve I/O performance of Java-based HPC
applications. The main hindrance in the development of efficient parallel I/O
Java libraries is the lack of a standard API (something equivalent to MPI-IO).
Some adhoc solutions have been developed and used in proprietary applications,
but there is no general-purpose solution that can be used by performance hungry
applications. As part of this project, we plan to develop a Java-based parallel
I/O API inspired by the MPI-IO bindings (MPI 2.0 standard document) for C, C++,
and Fortran. Once the Java equivalent API of MPI-IO has been developed, we will
develop a reference implementation on top of existing Java messaging libraries.
Later, we will evaluate and compare performance of our reference Java Parallel
I/O library with C/C++ counterparts using benchmarks and real-world
applications.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:33:10 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Ayub",
"Muhammad Sohaib",
""
],
[
"Adnan",
"Muhammad",
""
],
[
"Shafi",
"Muhammad Yasir",
""
]
] | TITLE: Design and Development of a Java Parallel I/O Library
ABSTRACT: Parallel I/O refers to the ability of scientific programs to concurrently
read/write from/to a single file from multiple processes executing on
distributed memory platforms like compute clusters. In the HPC world, I/O
becomes a significant bottleneck for many real-world scientific applications.
In the last two decades, there has been significant research in improving the
performance of I/O operations in scientific computing for traditional languages
including C, C++, and Fortran. As a result of this, several mature and
high-performance libraries including ROMIO (implementation of MPI-IO), parallel
HDF5, Parallel I/O (PIO), and parallel netCDF are available today that provide
efficient I/O for scientific applications. However, there is very little
research done to evaluate and improve I/O performance of Java-based HPC
applications. The main hindrance in the development of efficient parallel I/O
Java libraries is the lack of a standard API (something equivalent to MPI-IO).
Some adhoc solutions have been developed and used in proprietary applications,
but there is no general-purpose solution that can be used by performance hungry
applications. As part of this project, we plan to develop a Java-based parallel
I/O API inspired by the MPI-IO bindings (MPI 2.0 standard document) for C, C++,
and Fortran. Once the Java equivalent API of MPI-IO has been developed, we will
develop a reference implementation on top of existing Java messaging libraries.
Later, we will evaluate and compare performance of our reference Java Parallel
I/O library with C/C++ counterparts using benchmarks and real-world
applications.
| no_new_dataset | 0.703562 |
2305.07415 | Judith S\'ainz-Pardo D\'iaz | Judith S\'ainz-Pardo D\'iaz and \'Alvaro L\'opez Garc\'ia | Comparison of machine learning models applied on anonymized data with
different techniques | Accepted for publication: IEEE International Conference in Cyber
Security and Resilience 2023 (IEEE CSR) | null | null | null | cs.LG cs.CR cs.DB | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Anonymization techniques based on obfuscating the quasi-identifiers by means
of value generalization hierarchies are widely used to achieve preset levels of
privacy. To prevent different types of attacks against database privacy it is
necessary to apply several anonymization techniques beyond the classical
k-anonymity or $\ell$-diversity. However, the application of these methods is
directly connected to a reduction of their utility in prediction and decision
making tasks. In this work we study four classical machine learning methods
currently used for classification purposes in order to analyze the results as a
function of the anonymization techniques applied and the parameters selected
for each of them. The performance of these models is studied when varying the
value of k for k-anonymity and additional tools such as $\ell$-diversity,
t-closeness and $\delta$-disclosure privacy are also deployed on the well-known
adult dataset.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:34:07 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Díaz",
"Judith Sáinz-Pardo",
""
],
[
"García",
"Álvaro López",
""
]
] | TITLE: Comparison of machine learning models applied on anonymized data with
different techniques
ABSTRACT: Anonymization techniques based on obfuscating the quasi-identifiers by means
of value generalization hierarchies are widely used to achieve preset levels of
privacy. To prevent different types of attacks against database privacy it is
necessary to apply several anonymization techniques beyond the classical
k-anonymity or $\ell$-diversity. However, the application of these methods is
directly connected to a reduction of their utility in prediction and decision
making tasks. In this work we study four classical machine learning methods
currently used for classification purposes in order to analyze the results as a
function of the anonymization techniques applied and the parameters selected
for each of them. The performance of these models is studied when varying the
value of k for k-anonymity and additional tools such as $\ell$-diversity,
t-closeness and $\delta$-disclosure privacy are also deployed on the well-known
adult dataset.
| no_new_dataset | 0.709573 |
2305.07416 | Marion Neumeier | Marion Neumeier, Andreas Tollk\"uhn, Michael Botsch, Wolfgang Utschick | A Multidimensional Graph Fourier Transformation Neural Network for
Vehicle Trajectory Prediction | Accepted as a conference paper in ITSC 2022, Macau, China | null | 10.1109/ITSC55140.2022.9922419 | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work introduces the multidimensional Graph Fourier Transformation Neural
Network (GFTNN) for long-term trajectory predictions on highways. Similar to
Graph Neural Networks (GNNs), the GFTNN is a novel network architecture that
operates on graph structures. While several GNNs lack discriminative power due
to suboptimal aggregation schemes, the proposed model aggregates scenario
properties through a powerful operation: the multidimensional Graph Fourier
Transformation (GFT). The spatio-temporal vehicle interaction graph of a
scenario is converted into a spectral scenario representation using the GFT.
This beneficial representation is input to the prediction framework composed of
a neural network and a descriptive decoder. Even though the proposed GFTNN does
not include any recurrent element, it outperforms state-of-the-art models in
the task of highway trajectory prediction. For experiments and evaluation, the
publicly available datasets highD and NGSIM are used
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:36:48 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Neumeier",
"Marion",
""
],
[
"Tollkühn",
"Andreas",
""
],
[
"Botsch",
"Michael",
""
],
[
"Utschick",
"Wolfgang",
""
]
] | TITLE: A Multidimensional Graph Fourier Transformation Neural Network for
Vehicle Trajectory Prediction
ABSTRACT: This work introduces the multidimensional Graph Fourier Transformation Neural
Network (GFTNN) for long-term trajectory predictions on highways. Similar to
Graph Neural Networks (GNNs), the GFTNN is a novel network architecture that
operates on graph structures. While several GNNs lack discriminative power due
to suboptimal aggregation schemes, the proposed model aggregates scenario
properties through a powerful operation: the multidimensional Graph Fourier
Transformation (GFT). The spatio-temporal vehicle interaction graph of a
scenario is converted into a spectral scenario representation using the GFT.
This beneficial representation is input to the prediction framework composed of
a neural network and a descriptive decoder. Even though the proposed GFTNN does
not include any recurrent element, it outperforms state-of-the-art models in
the task of highway trajectory prediction. For experiments and evaluation, the
publicly available datasets highD and NGSIM are used
| no_new_dataset | 0.709372 |
2305.07419 | Kai Ouyang | Kai Ouyang, Chen Tang, Wenhao Zheng, Xiangjin Xie, Xuanji Xiao, Jian
Dong, Hai-Tao Zheng, Zhi Wang | Knowledge Soft Integration for Multimodal Recommendation | null | null | null | null | cs.IR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the main challenges in modern recommendation systems is how to
effectively utilize multimodal content to achieve more personalized
recommendations. Despite various proposed solutions, most of them overlook the
mismatch between the knowledge gained from independent feature extraction
processes and downstream recommendation tasks. Specifically, multimodal feature
extraction processes do not incorporate prior knowledge relevant to
recommendation tasks, while recommendation tasks often directly use these
multimodal features as side information. This mismatch can lead to model
fitting biases and performance degradation, which this paper refers to as the
\textit{curse of knowledge} problem. To address this issue, we propose using
knowledge soft integration to balance the utilization of multimodal features
and the curse of knowledge problem it brings about. To achieve this, we put
forward a Knowledge Soft Integration framework for the multimodal
recommendation, abbreviated as KSI, which is composed of the Structure
Efficiently Injection (SEI) module and the Semantic Soft Integration (SSI)
module. In the SEI module, we model the modality correlation between items
using Refined Graph Neural Network (RGNN), and introduce a regularization term
to reduce the redundancy of user/item representations. In the SSI module, we
design a self-supervised retrieval task to further indirectly integrate the
semantic knowledge of multimodal features, and enhance the semantic
discrimination of item representations. Extensive experiments on three
benchmark datasets demonstrate the superiority of KSI and validate the
effectiveness of its two modules.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:37:29 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Ouyang",
"Kai",
""
],
[
"Tang",
"Chen",
""
],
[
"Zheng",
"Wenhao",
""
],
[
"Xie",
"Xiangjin",
""
],
[
"Xiao",
"Xuanji",
""
],
[
"Dong",
"Jian",
""
],
[
"Zheng",
"Hai-Tao",
""
],
[
"Wang",
"Zhi",
""
]
] | TITLE: Knowledge Soft Integration for Multimodal Recommendation
ABSTRACT: One of the main challenges in modern recommendation systems is how to
effectively utilize multimodal content to achieve more personalized
recommendations. Despite various proposed solutions, most of them overlook the
mismatch between the knowledge gained from independent feature extraction
processes and downstream recommendation tasks. Specifically, multimodal feature
extraction processes do not incorporate prior knowledge relevant to
recommendation tasks, while recommendation tasks often directly use these
multimodal features as side information. This mismatch can lead to model
fitting biases and performance degradation, which this paper refers to as the
\textit{curse of knowledge} problem. To address this issue, we propose using
knowledge soft integration to balance the utilization of multimodal features
and the curse of knowledge problem it brings about. To achieve this, we put
forward a Knowledge Soft Integration framework for the multimodal
recommendation, abbreviated as KSI, which is composed of the Structure
Efficiently Injection (SEI) module and the Semantic Soft Integration (SSI)
module. In the SEI module, we model the modality correlation between items
using Refined Graph Neural Network (RGNN), and introduce a regularization term
to reduce the redundancy of user/item representations. In the SSI module, we
design a self-supervised retrieval task to further indirectly integrate the
semantic knowledge of multimodal features, and enhance the semantic
discrimination of item representations. Extensive experiments on three
benchmark datasets demonstrate the superiority of KSI and validate the
effectiveness of its two modules.
| no_new_dataset | 0.708244 |
2305.07429 | Wadii Boulila Prof. | Ayyub Alzahem, Shahid Latif, Wadii Boulila, Anis Koubaa | Unlocking the Potential of Medical Imaging with ChatGPT's Intelligent
Diagnostics | null | null | null | null | eess.IV cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Medical imaging is an essential tool for diagnosing various healthcare
diseases and conditions. However, analyzing medical images is a complex and
time-consuming task that requires expertise and experience. This article aims
to design a decision support system to assist healthcare providers and patients
in making decisions about diagnosing, treating, and managing health conditions.
The proposed architecture contains three stages: 1) data collection and
labeling, 2) model training, and 3) diagnosis report generation. The key idea
is to train a deep learning model on a medical image dataset to extract four
types of information: the type of image scan, the body part, the test image,
and the results. This information is then fed into ChatGPT to generate
automatic diagnostics. The proposed system has the potential to enhance
decision-making, reduce costs, and improve the capabilities of healthcare
providers. The efficacy of the proposed system is analyzed by conducting
extensive experiments on a large medical image dataset. The experimental
outcomes exhibited promising performance for automatic diagnosis through
medical images.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 12:52:14 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Alzahem",
"Ayyub",
""
],
[
"Latif",
"Shahid",
""
],
[
"Boulila",
"Wadii",
""
],
[
"Koubaa",
"Anis",
""
]
] | TITLE: Unlocking the Potential of Medical Imaging with ChatGPT's Intelligent
Diagnostics
ABSTRACT: Medical imaging is an essential tool for diagnosing various healthcare
diseases and conditions. However, analyzing medical images is a complex and
time-consuming task that requires expertise and experience. This article aims
to design a decision support system to assist healthcare providers and patients
in making decisions about diagnosing, treating, and managing health conditions.
The proposed architecture contains three stages: 1) data collection and
labeling, 2) model training, and 3) diagnosis report generation. The key idea
is to train a deep learning model on a medical image dataset to extract four
types of information: the type of image scan, the body part, the test image,
and the results. This information is then fed into ChatGPT to generate
automatic diagnostics. The proposed system has the potential to enhance
decision-making, reduce costs, and improve the capabilities of healthcare
providers. The efficacy of the proposed system is analyzed by conducting
extensive experiments on a large medical image dataset. The experimental
outcomes exhibited promising performance for automatic diagnosis through
medical images.
| no_new_dataset | 0.711243 |
2305.07446 | Zhe Wang | Zhe Wang, Yongxiong Wang, Jiapeng Zhang, Yiheng Tang, Zhiqun Pan | A Lightweight Domain Adversarial Neural Network Based on Knowledge
Distillation for EEG-based Cross-subject Emotion Recognition | null | null | null | null | eess.SP cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Individual differences of Electroencephalogram (EEG) could cause the domain
shift which would significantly degrade the performance of cross-subject
strategy. The domain adversarial neural networks (DANN), where the
classification loss and domain loss jointly update the parameters of feature
extractor, are adopted to deal with the domain shift. However, limited EEG data
quantity and strong individual difference are challenges for the DANN with
cumbersome feature extractor. In this work, we propose knowledge distillation
(KD) based lightweight DANN to enhance cross-subject EEG-based emotion
recognition. Specifically, the teacher model with strong context learning
ability is utilized to learn complex temporal dynamics and spatial correlations
of EEG, and robust lightweight student model is guided by the teacher model to
learn more difficult domain-invariant features. In the feature-based KD
framework, a transformer-based hierarchical temporalspatial learning model is
served as the teacher model. The student model, which is composed of Bi-LSTM
units, is a lightweight version of the teacher model. Hence, the student model
could be supervised to mimic the robust feature representations of teacher
model by leveraging complementary latent temporal features and spatial
features. In the DANN-based cross-subject emotion recognition, we combine the
obtained student model and a lightweight temporal-spatial feature interaction
module as the feature extractor. And the feature aggregation is fed to the
emotion classifier and domain classifier for domain-invariant feature learning.
To verify the effectiveness of the proposed method, we conduct the
subject-independent experiments on the public dataset DEAP with arousal and
valence classification. The outstanding performance and t-SNE visualization of
latent features verify the advantage and effectiveness of the proposed method.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 13:05:12 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Wang",
"Zhe",
""
],
[
"Wang",
"Yongxiong",
""
],
[
"Zhang",
"Jiapeng",
""
],
[
"Tang",
"Yiheng",
""
],
[
"Pan",
"Zhiqun",
""
]
] | TITLE: A Lightweight Domain Adversarial Neural Network Based on Knowledge
Distillation for EEG-based Cross-subject Emotion Recognition
ABSTRACT: Individual differences of Electroencephalogram (EEG) could cause the domain
shift which would significantly degrade the performance of cross-subject
strategy. The domain adversarial neural networks (DANN), where the
classification loss and domain loss jointly update the parameters of feature
extractor, are adopted to deal with the domain shift. However, limited EEG data
quantity and strong individual difference are challenges for the DANN with
cumbersome feature extractor. In this work, we propose knowledge distillation
(KD) based lightweight DANN to enhance cross-subject EEG-based emotion
recognition. Specifically, the teacher model with strong context learning
ability is utilized to learn complex temporal dynamics and spatial correlations
of EEG, and robust lightweight student model is guided by the teacher model to
learn more difficult domain-invariant features. In the feature-based KD
framework, a transformer-based hierarchical temporalspatial learning model is
served as the teacher model. The student model, which is composed of Bi-LSTM
units, is a lightweight version of the teacher model. Hence, the student model
could be supervised to mimic the robust feature representations of teacher
model by leveraging complementary latent temporal features and spatial
features. In the DANN-based cross-subject emotion recognition, we combine the
obtained student model and a lightweight temporal-spatial feature interaction
module as the feature extractor. And the feature aggregation is fed to the
emotion classifier and domain classifier for domain-invariant feature learning.
To verify the effectiveness of the proposed method, we conduct the
subject-independent experiments on the public dataset DEAP with arousal and
valence classification. The outstanding performance and t-SNE visualization of
latent features verify the advantage and effectiveness of the proposed method.
| no_new_dataset | 0.711982 |
2305.07447 | Qiuqiang Kong | Qiuqiang Kong, Ke Chen, Haohe Liu, Xingjian Du, Taylor
Berg-Kirkpatrick, Shlomo Dubnov, Mark D. Plumbley | Universal Source Separation with Weakly Labelled Data | null | null | null | null | cs.SD eess.AS | http://creativecommons.org/licenses/by/4.0/ | Universal source separation (USS) is a fundamental research task for
computational auditory scene analysis, which aims to separate mono recordings
into individual source tracks. There are three potential challenges awaiting
the solution to the audio source separation task. First, previous audio source
separation systems mainly focus on separating one or a limited number of
specific sources. There is a lack of research on building a unified system that
can separate arbitrary sources via a single model. Second, most previous
systems require clean source data to train a separator, while clean source data
are scarce. Third, there is a lack of USS system that can automatically detect
and separate active sound classes in a hierarchical level. To use large-scale
weakly labeled/unlabeled audio data for audio source separation, we propose a
universal audio source separation framework containing: 1) an audio tagging
model trained on weakly labeled data as a query net; and 2) a conditional
source separation model that takes query net outputs as conditions to separate
arbitrary sound sources. We investigate various query nets, source separation
models, and training strategies and propose a hierarchical USS strategy to
automatically detect and separate sound classes from the AudioSet ontology. By
solely leveraging the weakly labelled AudioSet, our USS system is successful in
separating a wide variety of sound classes, including sound event separation,
music source separation, and speech enhancement. The USS system achieves an
average signal-to-distortion ratio improvement (SDRi) of 5.57 dB over 527 sound
classes of AudioSet; 10.57 dB on the DCASE 2018 Task 2 dataset; 8.12 dB on the
MUSDB18 dataset; an SDRi of 7.28 dB on the Slakh2100 dataset; and an SSNR of
9.00 dB on the voicebank-demand dataset. We release the source code at
https://github.com/bytedance/uss
| [
{
"version": "v1",
"created": "Thu, 11 May 2023 16:41:55 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Kong",
"Qiuqiang",
""
],
[
"Chen",
"Ke",
""
],
[
"Liu",
"Haohe",
""
],
[
"Du",
"Xingjian",
""
],
[
"Berg-Kirkpatrick",
"Taylor",
""
],
[
"Dubnov",
"Shlomo",
""
],
[
"Plumbley",
"Mark D.",
""
]
] | TITLE: Universal Source Separation with Weakly Labelled Data
ABSTRACT: Universal source separation (USS) is a fundamental research task for
computational auditory scene analysis, which aims to separate mono recordings
into individual source tracks. There are three potential challenges awaiting
the solution to the audio source separation task. First, previous audio source
separation systems mainly focus on separating one or a limited number of
specific sources. There is a lack of research on building a unified system that
can separate arbitrary sources via a single model. Second, most previous
systems require clean source data to train a separator, while clean source data
are scarce. Third, there is a lack of USS system that can automatically detect
and separate active sound classes in a hierarchical level. To use large-scale
weakly labeled/unlabeled audio data for audio source separation, we propose a
universal audio source separation framework containing: 1) an audio tagging
model trained on weakly labeled data as a query net; and 2) a conditional
source separation model that takes query net outputs as conditions to separate
arbitrary sound sources. We investigate various query nets, source separation
models, and training strategies and propose a hierarchical USS strategy to
automatically detect and separate sound classes from the AudioSet ontology. By
solely leveraging the weakly labelled AudioSet, our USS system is successful in
separating a wide variety of sound classes, including sound event separation,
music source separation, and speech enhancement. The USS system achieves an
average signal-to-distortion ratio improvement (SDRi) of 5.57 dB over 527 sound
classes of AudioSet; 10.57 dB on the DCASE 2018 Task 2 dataset; 8.12 dB on the
MUSDB18 dataset; an SDRi of 7.28 dB on the Slakh2100 dataset; and an SSNR of
9.00 dB on the voicebank-demand dataset. We release the source code at
https://github.com/bytedance/uss
| no_new_dataset | 0.709573 |
2305.07468 | Krishanu Das Baksi | Krishanu Das Baksi, Vatsala Pokhrel, Kuntal Kumar Bhusan, Sharmila
Mande | BactInt: A domain driven transfer learning approach and a corpus for
extracting inter-bacterial interactions from biomedical text | null | null | null | null | cs.IR cs.AI cs.CL cs.LG q-bio.QM | http://creativecommons.org/licenses/by/4.0/ | The community of different types of microbes present in a biological niche
plays a very important role in functioning of the system. The crosstalk or
interactions among the different microbes contributes to the building blocks of
such microbial community structures. Evidence reported in biomedical text
serves as a reliable source for predicting such interactions. However, going
through the vast and ever-increasing volume of biomedical literature is an
intimidating and time consuming process. This necessitates development of
automated methods capable of accurately extracting bacterial relations reported
in biomedical literature. In this paper, we introduce a method for automated
extraction of microbial interactions (specifically between bacteria) from
biomedical literature along with ways of using transfer learning to improve its
accuracy. We also describe a pipeline using which relations among specific
bacteria groups can be mined. Additionally, we introduce the first publicly
available dataset which can be used to develop bacterial interaction extraction
methods.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2023 06:14:25 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Baksi",
"Krishanu Das",
""
],
[
"Pokhrel",
"Vatsala",
""
],
[
"Bhusan",
"Kuntal Kumar",
""
],
[
"Mande",
"Sharmila",
""
]
] | TITLE: BactInt: A domain driven transfer learning approach and a corpus for
extracting inter-bacterial interactions from biomedical text
ABSTRACT: The community of different types of microbes present in a biological niche
plays a very important role in functioning of the system. The crosstalk or
interactions among the different microbes contributes to the building blocks of
such microbial community structures. Evidence reported in biomedical text
serves as a reliable source for predicting such interactions. However, going
through the vast and ever-increasing volume of biomedical literature is an
intimidating and time consuming process. This necessitates development of
automated methods capable of accurately extracting bacterial relations reported
in biomedical literature. In this paper, we introduce a method for automated
extraction of microbial interactions (specifically between bacteria) from
biomedical literature along with ways of using transfer learning to improve its
accuracy. We also describe a pipeline using which relations among specific
bacteria groups can be mined. Additionally, we introduce the first publicly
available dataset which can be used to develop bacterial interaction extraction
methods.
| new_dataset | 0.713843 |
2305.07477 | Iain Mackie | Iain Mackie, Shubham Chatterjee, Jeffrey Dalton | Generative and Pseudo-Relevant Feedback for Sparse, Dense and Learned
Sparse Retrieval | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Pseudo-relevance feedback (PRF) is a classical approach to address lexical
mismatch by enriching the query using first-pass retrieval. Moreover, recent
work on generative-relevance feedback (GRF) shows that query expansion models
using text generated from large language models can improve sparse retrieval
without depending on first-pass retrieval effectiveness. This work extends GRF
to dense and learned sparse retrieval paradigms with experiments over six
standard document ranking benchmarks. We find that GRF improves over comparable
PRF techniques by around 10% on both precision and recall-oriented measures.
Nonetheless, query analysis shows that GRF and PRF have contrasting benefits,
with GRF providing external context not present in first-pass retrieval,
whereas PRF grounds the query to the information contained within the target
corpus. Thus, we propose combining generative and pseudo-relevance feedback
ranking signals to achieve the benefits of both feedback classes, which
significantly increases recall over PRF methods on 95% of experiments.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 13:46:17 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Mackie",
"Iain",
""
],
[
"Chatterjee",
"Shubham",
""
],
[
"Dalton",
"Jeffrey",
""
]
] | TITLE: Generative and Pseudo-Relevant Feedback for Sparse, Dense and Learned
Sparse Retrieval
ABSTRACT: Pseudo-relevance feedback (PRF) is a classical approach to address lexical
mismatch by enriching the query using first-pass retrieval. Moreover, recent
work on generative-relevance feedback (GRF) shows that query expansion models
using text generated from large language models can improve sparse retrieval
without depending on first-pass retrieval effectiveness. This work extends GRF
to dense and learned sparse retrieval paradigms with experiments over six
standard document ranking benchmarks. We find that GRF improves over comparable
PRF techniques by around 10% on both precision and recall-oriented measures.
Nonetheless, query analysis shows that GRF and PRF have contrasting benefits,
with GRF providing external context not present in first-pass retrieval,
whereas PRF grounds the query to the information contained within the target
corpus. Thus, we propose combining generative and pseudo-relevance feedback
ranking signals to achieve the benefits of both feedback classes, which
significantly increases recall over PRF methods on 95% of experiments.
| no_new_dataset | 0.710823 |
2305.07495 | Myung-Cheol Roh | Myung-cheol Roh, Pyoung-gang Lim, and Jongju Shin | Gallery Sampling for Robust and Fast Face Identification | null | null | null | null | cs.CV cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deep learning methods have been achieved brilliant results in face
recognition. One of the important tasks to improve the performance is to
collect and label images as many as possible. However, labeling identities and
checking qualities of large image data are difficult task and mistakes cannot
be avoided in processing large data. Previous works have been trying to deal
with the problem only in training domain, however it can cause much serious
problem if the mistakes are in gallery data of face identification. We proposed
gallery data sampling methods which are robust to outliers including wrong
labeled, low quality, and less-informative images and reduce searching time.
The proposed sampling-by-pruning and sampling-by-generating methods
significantly improved face identification performance on our 5.4M web image
dataset of celebrities. The proposed method achieved 0.0975 in terms of FNIR at
FPIR=0.01, while conventional method showed 0.3891. The average number of
feature vectors for each individual gallery was reduced to 17.1 from 115.9 and
it can provide much faster search. We also made experiments on public datasets
and our method achieved 0.1314 and 0.0668 FNIRs at FPIR=0.01 on the
CASIA-WebFace and MS1MV2, while the convectional method did 0.5446, and 0.1327,
respectively.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 14:10:36 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Roh",
"Myung-cheol",
""
],
[
"Lim",
"Pyoung-gang",
""
],
[
"Shin",
"Jongju",
""
]
] | TITLE: Gallery Sampling for Robust and Fast Face Identification
ABSTRACT: Deep learning methods have been achieved brilliant results in face
recognition. One of the important tasks to improve the performance is to
collect and label images as many as possible. However, labeling identities and
checking qualities of large image data are difficult task and mistakes cannot
be avoided in processing large data. Previous works have been trying to deal
with the problem only in training domain, however it can cause much serious
problem if the mistakes are in gallery data of face identification. We proposed
gallery data sampling methods which are robust to outliers including wrong
labeled, low quality, and less-informative images and reduce searching time.
The proposed sampling-by-pruning and sampling-by-generating methods
significantly improved face identification performance on our 5.4M web image
dataset of celebrities. The proposed method achieved 0.0975 in terms of FNIR at
FPIR=0.01, while conventional method showed 0.3891. The average number of
feature vectors for each individual gallery was reduced to 17.1 from 115.9 and
it can provide much faster search. We also made experiments on public datasets
and our method achieved 0.1314 and 0.0668 FNIRs at FPIR=0.01 on the
CASIA-WebFace and MS1MV2, while the convectional method did 0.5446, and 0.1327,
respectively.
| no_new_dataset | 0.708975 |
2305.07497 | Weitao Zhou | Weitao Zhou, Zhong Cao, Nanshan Deng, Xiaoyu Liu, Kun Jiang, Diange
Yang | Dynamically Conservative Self-Driving Planner for Long-Tail Cases | null | null | null | null | cs.RO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Self-driving vehicles (SDVs) are becoming reality but still suffer from
"long-tail" challenges during natural driving: the SDVs will continually
encounter rare, safety-critical cases that may not be included in the dataset
they were trained. Some safety-assurance planners solve this problem by being
conservative in all possible cases, which may significantly affect driving
mobility. To this end, this work proposes a method to automatically adjust the
conservative level according to each case's "long-tail" rate, named dynamically
conservative planner (DCP). We first define the "long-tail" rate as an SDV's
confidence to pass a driving case. The rate indicates the probability of
safe-critical events and is estimated using the statistics bootstrapped method
with historical data. Then, a reinforcement learning-based planner is designed
to contain candidate policies with different conservative levels. The final
policy is optimized based on the estimated "long-tail" rate. In this way, the
DCP is designed to automatically adjust to be more conservative in
low-confidence "long-tail" cases while keeping efficient otherwise. The DCP is
evaluated in the CARLA simulator using driving cases with "long-tail"
distributed training data. The results show that the DCP can accurately
estimate the "long-tail" rate to identify potential risks. Based on the rate,
the DCP automatically avoids potential collisions in "long-tail" cases using
conservative decisions while not affecting the average velocity in other
typical cases. Thus, the DCP is safer and more efficient than the baselines
with fixed conservative levels, e.g., an always conservative planner. This work
provides a technique to guarantee SDV's performance in unexpected driving cases
without resorting to a global conservative setting, which contributes to
solving the "long-tail" problem practically.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 14:11:06 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Zhou",
"Weitao",
""
],
[
"Cao",
"Zhong",
""
],
[
"Deng",
"Nanshan",
""
],
[
"Liu",
"Xiaoyu",
""
],
[
"Jiang",
"Kun",
""
],
[
"Yang",
"Diange",
""
]
] | TITLE: Dynamically Conservative Self-Driving Planner for Long-Tail Cases
ABSTRACT: Self-driving vehicles (SDVs) are becoming reality but still suffer from
"long-tail" challenges during natural driving: the SDVs will continually
encounter rare, safety-critical cases that may not be included in the dataset
they were trained. Some safety-assurance planners solve this problem by being
conservative in all possible cases, which may significantly affect driving
mobility. To this end, this work proposes a method to automatically adjust the
conservative level according to each case's "long-tail" rate, named dynamically
conservative planner (DCP). We first define the "long-tail" rate as an SDV's
confidence to pass a driving case. The rate indicates the probability of
safe-critical events and is estimated using the statistics bootstrapped method
with historical data. Then, a reinforcement learning-based planner is designed
to contain candidate policies with different conservative levels. The final
policy is optimized based on the estimated "long-tail" rate. In this way, the
DCP is designed to automatically adjust to be more conservative in
low-confidence "long-tail" cases while keeping efficient otherwise. The DCP is
evaluated in the CARLA simulator using driving cases with "long-tail"
distributed training data. The results show that the DCP can accurately
estimate the "long-tail" rate to identify potential risks. Based on the rate,
the DCP automatically avoids potential collisions in "long-tail" cases using
conservative decisions while not affecting the average velocity in other
typical cases. Thus, the DCP is safer and more efficient than the baselines
with fixed conservative levels, e.g., an always conservative planner. This work
provides a technique to guarantee SDV's performance in unexpected driving cases
without resorting to a global conservative setting, which contributes to
solving the "long-tail" problem practically.
| no_new_dataset | 0.706197 |
2305.07521 | Bo Jiang | Bo Jiang, Fei Xu, Ziyan Zhang, Jin Tang and Feiping Nie | AGFormer: Efficient Graph Representation with Anchor-Graph Transformer | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To alleviate the local receptive issue of GCN, Transformers have been
exploited to capture the long range dependences of nodes for graph data
representation and learning. However, existing graph Transformers generally
employ regular self-attention module for all node-to-node message passing which
needs to learn the affinities/relationships between all node's pairs, leading
to high computational cost issue. Also, they are usually sensitive to graph
noises. To overcome this issue, we propose a novel graph Transformer
architecture, termed Anchor Graph Transformer (AGFormer), by leveraging an
anchor graph model. To be specific, AGFormer first obtains some representative
anchors and then converts node-to-node message passing into anchor-to-anchor
and anchor-to-node message passing process. Thus, AGFormer performs much more
efficiently and also robustly than regular node-to-node Transformers. Extensive
experiments on several benchmark datasets demonstrate the effectiveness and
benefits of proposed AGFormer.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 14:35:42 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Jiang",
"Bo",
""
],
[
"Xu",
"Fei",
""
],
[
"Zhang",
"Ziyan",
""
],
[
"Tang",
"Jin",
""
],
[
"Nie",
"Feiping",
""
]
] | TITLE: AGFormer: Efficient Graph Representation with Anchor-Graph Transformer
ABSTRACT: To alleviate the local receptive issue of GCN, Transformers have been
exploited to capture the long range dependences of nodes for graph data
representation and learning. However, existing graph Transformers generally
employ regular self-attention module for all node-to-node message passing which
needs to learn the affinities/relationships between all node's pairs, leading
to high computational cost issue. Also, they are usually sensitive to graph
noises. To overcome this issue, we propose a novel graph Transformer
architecture, termed Anchor Graph Transformer (AGFormer), by leveraging an
anchor graph model. To be specific, AGFormer first obtains some representative
anchors and then converts node-to-node message passing into anchor-to-anchor
and anchor-to-node message passing process. Thus, AGFormer performs much more
efficiently and also robustly than regular node-to-node Transformers. Extensive
experiments on several benchmark datasets demonstrate the effectiveness and
benefits of proposed AGFormer.
| no_new_dataset | 0.710409 |
2305.07528 | Aboli Marathe | Aboli Marathe, Deva Ramanan, Rahee Walambe, Ketan Kotecha | WEDGE: A multi-weather autonomous driving dataset built from generative
vision-language models | Accepted in Vision Datasets Understanding at CVPR 2023 | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The open road poses many challenges to autonomous perception, including poor
visibility from extreme weather conditions. Models trained on good-weather
datasets frequently fail at detection in these out-of-distribution settings. To
aid adversarial robustness in perception, we introduce WEDGE (WEather images by
DALL-E GEneration): a synthetic dataset generated with a vision-language
generative model via prompting. WEDGE consists of 3360 images in 16 extreme
weather conditions manually annotated with 16513 bounding boxes, supporting
research in the tasks of weather classification and 2D object detection. We
have analyzed WEDGE from research standpoints, verifying its effectiveness for
extreme-weather autonomous perception. We establish baseline performance for
classification and detection with 53.87% test accuracy and 45.41 mAP. Most
importantly, WEDGE can be used to fine-tune state-of-the-art detectors,
improving SOTA performance on real-world weather benchmarks (such as DAWN) by
4.48 AP for well-generated classes like trucks. WEDGE has been collected under
OpenAI's terms of use and is released for public use under the CC BY-NC-SA 4.0
license. The repository for this work and dataset is available at
https://infernolia.github.io/WEDGE.
| [
{
"version": "v1",
"created": "Fri, 12 May 2023 14:42:47 GMT"
}
] | 2023-05-15T00:00:00 | [
[
"Marathe",
"Aboli",
""
],
[
"Ramanan",
"Deva",
""
],
[
"Walambe",
"Rahee",
""
],
[
"Kotecha",
"Ketan",
""
]
] | TITLE: WEDGE: A multi-weather autonomous driving dataset built from generative
vision-language models
ABSTRACT: The open road poses many challenges to autonomous perception, including poor
visibility from extreme weather conditions. Models trained on good-weather
datasets frequently fail at detection in these out-of-distribution settings. To
aid adversarial robustness in perception, we introduce WEDGE (WEather images by
DALL-E GEneration): a synthetic dataset generated with a vision-language
generative model via prompting. WEDGE consists of 3360 images in 16 extreme
weather conditions manually annotated with 16513 bounding boxes, supporting
research in the tasks of weather classification and 2D object detection. We
have analyzed WEDGE from research standpoints, verifying its effectiveness for
extreme-weather autonomous perception. We establish baseline performance for
classification and detection with 53.87% test accuracy and 45.41 mAP. Most
importantly, WEDGE can be used to fine-tune state-of-the-art detectors,
improving SOTA performance on real-world weather benchmarks (such as DAWN) by
4.48 AP for well-generated classes like trucks. WEDGE has been collected under
OpenAI's terms of use and is released for public use under the CC BY-NC-SA 4.0
license. The repository for this work and dataset is available at
https://infernolia.github.io/WEDGE.
| new_dataset | 0.717958 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.