Unnamed: 0.1 int64 0 113k | Unnamed: 0 float64 0 113k ⌀ | title stringlengths 7 246 | abstract stringlengths 6 3.31k |
|---|---|---|---|
4,808 | null | i-Code: An Integrative and Composable Multimodal Learning Framework | Human intelligence is multimodal; we integrate visual, linguistic, and
acoustic signals to maintain a holistic worldview. Most current pretraining
methods, however, are limited to one or two modalities. We present i-Code, a
self-supervised pretraining framework where users may flexibly combine the
modalities of vision,... |
4,809 | null | Diverse Image Captioning with Grounded Style | Stylized image captioning as presented in prior work aims to generate
captions that reflect characteristics beyond a factual description of the scene
composition, such as sentiments. Such prior work relies on given sentiment
identifiers, which are used to express a certain global style in the caption,
e.g. positive or ... |
4,810 | null | Assessing Dataset Bias in Computer Vision | A biased dataset is a dataset that generally has attributes with an uneven
class distribution. These biases have the tendency to propagate to the models
that train on them, often leading to a poor performance in the minority class.
In this project, we will explore the extent to which various data augmentation
methods a... |
4,811 | null | Frequency Domain-Based Detection of Generated Audio | Attackers may manipulate audio with the intent of presenting falsified
reports, changing an opinion of a public figure, and winning influence and
power. The prevalence of inauthentic multimedia continues to rise, so it is
imperative to develop a set of tools that determines the legitimacy of media.
We present a method ... |
4,812 | null | Splicing Detection and Localization In Satellite Imagery Using Conditional GANs | The widespread availability of image editing tools and improvements in image
processing techniques allow image manipulation to be very easy. Oftentimes,
easy-to-use yet sophisticated image manipulation tools yields
distortions/changes imperceptible to the human observer. Distribution of forged
images can have drastic r... |
4,813 | null | Exploration of the possibility of infusing Social Media Trends into generating NFT Recommendations | Recommendations Systems have been identified to be one of the integral
elements of driving sales in e-commerce sites. The utilization of opinion
mining data extracted from trends has been attempted to improve the
recommendations that can be provided by baseline methods in this research when
user-click data is lacking o... |
4,814 | null | Synthesized Speech Detection Using Convolutional Transformer-Based Spectrogram Analysis | Synthesized speech is common today due to the prevalence of virtual
assistants, easy-to-use tools for generating and modifying speech signals, and
remote work practices. Synthesized speech can also be used for nefarious
purposes, including creating a purported speech signal and attributing it to
someone who did not spe... |
4,815 | null | Meta-Cognition. An Inverse-Inverse Reinforcement Learning Approach for Cognitive Radars | This paper considers meta-cognitive radars in an adversarial setting. A
cognitive radar optimally adapts its waveform (response) in response to
maneuvers (probes) of a possibly adversarial moving target. A meta-cognitive
radar is aware of the adversarial nature of the target and seeks to mitigate
the adversarial target... |
4,816 | null | Do More Negative Samples Necessarily Hurt in Contrastive Learning? | Recent investigations in noise contrastive estimation suggest, both
empirically as well as theoretically, that while having more "negative samples"
in the contrastive loss improves downstream classification performance
initially, beyond a threshold, it hurts downstream performance due to a
"collision-coverage" trade-of... |
4,817 | null | The ICML 2022 Expressive Vocalizations Workshop and Competition: Recognizing, Generating, and Personalizing Vocal Bursts | The ICML Expressive Vocalization (ExVo) Competition is focused on
understanding and generating vocal bursts: laughs, gasps, cries, and other
non-verbal vocalizations that are central to emotional expression and
communication. ExVo 2022, includes three competition tracks using a large-scale
dataset of 59,201 vocalizatio... |
4,818 | null | Explain and Conquer: Personalised Text-based Reviews to Achieve Transparency | There are many contexts where dyadic data is present. Social networking is a
well-known example, where transparency has grown on importance. In these
contexts, pairs of items are linked building a network where interactions play
a crucial role. Explaining why these relationships are established is core to
address trans... |
4,819 | null | Differentiable Simulation of Soft Multi-body Systems | We present a method for differentiable simulation of soft articulated bodies.
Our work enables the integration of differentiable physical dynamics into
gradient-based pipelines. We develop a top-down matrix assembly algorithm
within Projective Dynamics and derive a generalized dry friction model for soft
continuum usin... |
4,820 | null | XLTime: A Cross-Lingual Knowledge Transfer Framework for Temporal Expression Extraction | Temporal Expression Extraction (TEE) is essential for understanding time in
natural language. It has applications in Natural Language Processing (NLP)
tasks such as question answering, information retrieval, and causal inference.
To date, work in this area has mostly focused on English as there is a scarcity
of labeled... |
4,821 | null | Bézier Curve Gaussian Processes | Probabilistic models for sequential data are the basis for a variety of
applications concerned with processing timely ordered information. The
predominant approach in this domain is given by neural networks, which
incorporate either stochastic units or components. This paper proposes a new
probabilistic sequence model ... |
4,822 | null | Self-focusing virtual screening with active design space pruning | High-throughput virtual screening is an indispensable technique utilized in
the discovery of small molecules. In cases where the library of molecules is
exceedingly large, the cost of an exhaustive virtual screen may be prohibitive.
Model-guided optimization has been employed to lower these costs through
dramatic incre... |
4,823 | null | Detection of Propaganda Techniques in Visuo-Lingual Metaphor in Memes | The exponential rise of social media networks has allowed the production,
distribution, and consumption of data at a phenomenal rate. Moreover, the
social media revolution has brought a unique phenomenon to social media
platforms called Internet memes. Internet memes are one of the most popular
contents used on social ... |
4,824 | null | Don't sweat the small stuff, classify the rest: Sample Shielding to protect text classifiers against adversarial attacks | Deep learning (DL) is being used extensively for text classification.
However, researchers have demonstrated the vulnerability of such classifiers to
adversarial attacks. Attackers modify the text in a way which misleads the
classifier while keeping the original meaning close to intact. State-of-the-art
(SOTA) attack a... |
4,825 | null | MemSE: Fast MSE Prediction for Noisy Memristor-Based DNN Accelerators | Memristors enable the computation of matrix-vector multiplications (MVM) in
memory and, therefore, show great potential in highly increasing the energy
efficiency of deep neural network (DNN) inference accelerators. However,
computations in memristors suffer from hardware non-idealities and are subject
to different sou... |
4,826 | null | On Circuit Depth Scaling For Quantum Approximate Optimization | Variational quantum algorithms are the centerpiece of modern quantum
programming. These algorithms involve training parameterized quantum circuits
using a classical co-processor, an approach adapted partly from classical
machine learning. An important subclass of these algorithms, designed for
combinatorial optimizatio... |
4,827 | null | Adversarial Training for High-Stakes Reliability | In the future, powerful AI systems may be deployed in high-stakes settings,
where a single failure could be catastrophic. One technique for improving AI
safety in high-stakes settings is adversarial training, which uses an adversary
to generate examples to train on in order to achieve better worst-case
performance.
I... |
4,828 | null | Deep Sequence Modeling for Anomalous ISP Traffic Prediction | Internet traffic in the real world is susceptible to various external and
internal factors which may abruptly change the normal traffic flow. Those
unexpected changes are considered outliers in traffic. However, deep sequence
models have been used to predict complex IP traffic, but their comparative
performance for ano... |
4,829 | null | Automatic Segmentation of Aircraft Dents in Point Clouds | Dents on the aircraft skin are frequent and may easily go undetected during
airworthiness checks, as their inspection process is tedious and extremely
subject to human factors and environmental conditions. Nowadays, 3D scanning
technologies are being proposed for more reliable, human-independent
measurements, yet the p... |
4,830 | null | Local Stochastic Bilevel Optimization with Momentum-Based Variance Reduction | Bilevel Optimization has witnessed notable progress recently with new
emerging efficient algorithms and has been applied to many machine learning
tasks such as data cleaning, few-shot learning, and neural architecture search.
However, little attention has been paid to solve the bilevel problems under
distributed settin... |
4,831 | null | Modeling and Correcting Bias in Sequential Evaluation | We consider the problem of sequential evaluation, in which an evaluator
observes candidates in a sequence and assigns scores to these candidates in an
online, irrevocable fashion. Motivated by the psychology literature that has
studied sequential bias in such settings -- namely, dependencies between the
evaluation outc... |
4,832 | null | An Empirical Study on Internet Traffic Prediction Using Statistical Rolling Model | Real-world IP network traffic is susceptible to external and internal factors
such as new internet service integration, traffic migration, internet
application, etc. Due to these factors, the actual internet traffic is
non-linear and challenging to analyze using a statistical model for future
prediction. In this paper,... |
4,833 | null | RAFT-MSF: Self-Supervised Monocular Scene Flow using Recurrent Optimizer | Learning scene flow from a monocular camera still remains a challenging task
due to its ill-posedness as well as lack of annotated data. Self-supervised
methods demonstrate learning scene flow estimation from unlabeled data, yet
their accuracy lags behind (semi-)supervised methods. In this paper, we
introduce a self-su... |
4,834 | null | Privacy Amplification via Random Participation in Federated Learning | Running a randomized algorithm on a subsampled dataset instead of the entire
dataset amplifies differential privacy guarantees. In this work, in a federated
setting, we consider random participation of the clients in addition to
subsampling their local datasets. Since such random participation of the
clients creates co... |
4,835 | null | Efficient Fine-Tuning of BERT Models on the Edge | Resource-constrained devices are increasingly the deployment targets of
machine learning applications. Static models, however, do not always suffice
for dynamic environments. On-device training of models allows for quick
adaptability to new scenarios. With the increasing size of deep neural
networks, as noted with the ... |
4,836 | null | BiOcularGAN: Bimodal Synthesis and Annotation of Ocular Images | Current state-of-the-art segmentation techniques for ocular images are
critically dependent on large-scale annotated datasets, which are
labor-intensive to gather and often raise privacy concerns. In this paper, we
present a novel framework, called BiOcularGAN, capable of generating synthetic
large-scale datasets of ph... |
4,837 | null | Explainable multi-class anomaly detection on functional data | In this paper we describe an approach for anomaly detection and its
explainability in multivariate functional data. The anomaly detection procedure
consists of transforming the series into a vector of features and using an
Isolation forest algorithm. The explainable procedure is based on the
computation of the SHAP coe... |
4,838 | null | ExSpliNet: An interpretable and expressive spline-based neural network | In this paper we present ExSpliNet, an interpretable and expressive neural
network model. The model combines ideas of Kolmogorov neural networks,
ensembles of probabilistic trees, and multivariate B-spline representations. We
give a probabilistic interpretation of the model and show its universal
approximation properti... |
4,839 | null | Compact Neural Networks via Stacking Designed Basic Units | Unstructured pruning has the limitation of dealing with the sparse and
irregular weights. By contrast, structured pruning can help eliminate this
drawback but it requires complex criterion to determine which components to be
pruned. To this end, this paper presents a new method termed TissueNet, which
directly construc... |
4,840 | null | Meta Learning for Natural Language Processing: A Survey | Deep learning has been the mainstream technique in natural language
processing (NLP) area. However, the techniques require many labeled data and
are less generalizable across domains. Meta-learning is an arising field in
machine learning studying approaches to learn better learning algorithms.
Approaches aim at improvi... |
4,841 | null | On the uncertainty principle of neural networks | Despite the successes in many fields, it is found that neural networks are
vulnerability and difficult to be both accurate and robust (robust means that
the prediction of the trained network stays unchanged for inputs with
non-random perturbations introduced by adversarial attacks). Various empirical
and analytic studi... |
4,842 | null | A unified view on Self-Organizing Maps (SOMs) and Stochastic Neighbor Embedding (SNE) | We propose a unified view on two widely used data visualization techniques:
Self-Organizing Maps (SOMs) and Stochastic Neighbor Embedding (SNE). We show
that they can both be derived from a common mathematical framework. Leveraging
this formulation, we propose to compare SOM and SNE quantitatively on two
datasets, and ... |
4,843 | null | Subspace Diffusion Generative Models | Score-based models generate samples by mapping noise to data (and vice versa)
via a high-dimensional diffusion process. We question whether it is necessary
to run this entire process at high dimensionality and incur all the
inconveniences thereof. Instead, we restrict the diffusion via projections onto
subspaces as the... |
4,844 | null | Scalable Regularised Joint Mixture Models | In many applications, data can be heterogeneous in the sense of spanning
latent groups with different underlying distributions. When predictive models
are applied to such data the heterogeneity can affect both predictive
performance and interpretability. Building on developments at the intersection
of unsupervised lear... |
4,845 | null | Residual Graph Convolutional Recurrent Networks For Multi-step Traffic Flow Forecasting | Traffic flow forecasting is essential for traffic planning, control and
management. The main challenge of traffic forecasting tasks is accurately
capturing traffic networks' spatial and temporal correlation. Although there
are many traffic forecasting methods, most of them still have limitations in
capturing spatial an... |
4,846 | null | Revisiting Communication-Efficient Federated Learning with Balanced Global and Local Updates | In federated learning (FL), a number of devices train their local models and
upload the corresponding parameters or gradients to the base station (BS) to
update the global model while protecting their data privacy. However, due to
the limited computation and communication resources, the number of local
trainings (a.k.a... |
4,847 | null | On the Convergence of Fictitious Play: A Decomposition Approach | Fictitious play (FP) is one of the most fundamental game-theoretical learning
frameworks for computing Nash equilibrium in $n$-player games, which builds the
foundation for modern multi-agent learning algorithms. Although FP has provable
convergence guarantees on zero-sum games and potential games, many real-world
prob... |
4,848 | null | Efficient implementation of incremental proximal-point methods | Model training algorithms which observe a small portion of the training set
in each computational step are ubiquitous in practical machine learning, and
include both stochastic and online optimization methods. In the vast majority
of cases, such algorithms typically observe the training samples via the
gradients of the... |
4,849 | null | Predicting vacant parking space availability zone-wisely: a graph based spatio-temporal prediction approach | Vacant parking space (VPS) prediction is one of the key issues of intelligent
parking guidance systems. Accurately predicting VPS information plays a crucial
role in intelligent parking guidance systems, which can help drivers find
parking space quickly, reducing unnecessary waste of time and excessive
environmental po... |
4,850 | null | High-dimensional Asymptotics of Feature Learning: How One Gradient Step Improves the Representation | We study the first gradient descent step on the first-layer parameters
$\boldsymbol{W}$ in a two-layer neural network: $f(\boldsymbol{x}) =
\frac{1}{\sqrt{N}}\boldsymbol{a}^\top\sigma(\boldsymbol{W}^\top\boldsymbol{x})$,
where $\boldsymbol{W}\in\mathbb{R}^{d\times N},
\boldsymbol{a}\in\mathbb{R}^{N}$ are randomly initi... |
4,851 | null | Learning Coulomb Diamonds in Large Quantum Dot Arrays | We introduce an algorithm that is able to find the facets of Coulomb diamonds
in quantum dot arrays. We simulate these arrays using the constant-interaction
model, and rely only on one-dimensional raster scans (rays) to learn a model of
the device using regularized maximum likelihood estimation. This allows us to
deter... |
4,852 | null | Efficient and Convergent Federated Learning | Federated learning has shown its advances over the last few years but is
facing many challenges, such as how algorithms save communication resources,
how they reduce computational costs, and whether they converge. To address
these issues, this paper proposes a new federated learning algorithm (FedGiA)
that combines the... |
4,853 | null | RLFlow: Optimising Neural Network Subgraph Transformation with World Models | Training deep learning models takes an extremely long execution time and
consumes large amounts of computing resources. At the same time, recent
research proposed systems and compilers that are expected to decrease deep
learning models runtime. An effective optimisation methodology in data
processing is desirable, and ... |
4,854 | null | ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection | As the number of heterogenous IP-connected devices and traffic volume
increase, so does the potential for security breaches. The undetected
exploitation of these breaches can bring severe cybersecurity and privacy
risks. In this paper, we present a practical unsupervised anomaly-based deep
learning detection system cal... |
4,855 | null | Time Shifts to Reduce the Size of Reservoir Computers | A reservoir computer is a type of dynamical system arranged to do
computation. Typically, a reservoir computer is constructed by connecting a
large number of nonlinear nodes in a network that includes recurrent
connections. In order to achieve accurate results, the reservoir usually
contains hundreds to thousands of no... |
4,856 | null | Growing Isotropic Neural Cellular Automata | Modeling the ability of multicellular organisms to build and maintain their
bodies through local interactions between individual cells (morphogenesis) is a
long-standing challenge of developmental biology. Recently, the Neural Cellular
Automata (NCA) model was proposed as a way to find local system rules that
produce a... |
4,857 | null | Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration | Future AI applications require performance, reliability and privacy that the
existing, cloud-dependant system architectures cannot provide. In this article,
we study orchestration in the device-edge-cloud continuum, and focus on AI for
edge, that is, the AI methods used in resource orchestration. We claim that to
suppo... |
4,858 | null | A Falsificationist Account of Artificial Neural Networks | Machine learning operates at the intersection of statistics and computer
science. This raises the question as to its underlying methodology. While much
emphasis has been put on the close link between the process of learning from
data and induction, the falsificationist component of machine learning has
received minor a... |
4,859 | null | An Empirical Analysis of the Use of Real-Time Reachability for the Safety Assurance of Autonomous Vehicles | Recent advances in machine learning technologies and sensing have paved the
way for the belief that safe, accessible, and convenient autonomous vehicles
may be realized in the near future. Despite tremendous advances within this
context, fundamental challenges around safety and reliability are limiting
their arrival an... |
4,860 | null | Multimodal Detection of Unknown Objects on Roads for Autonomous Driving | Tremendous progress in deep learning over the last years has led towards a
future with autonomous vehicles on our roads. Nevertheless, the performance of
their perception systems is strongly dependent on the quality of the utilized
training data. As these usually only cover a fraction of all object classes an
autonomou... |
4,861 | null | Neural Language Taskonomy: Which NLP Tasks are the most Predictive of fMRI Brain Activity? | Several popular Transformer based language models have been found to be
successful for text-driven brain encoding. However, existing literature
leverages only pretrained text Transformer models and has not explored the
efficacy of task-specific learned Transformer representations. In this work, we
explore transfer lear... |
4,862 | null | Data Determines Distributional Robustness in Contrastive Language Image Pre-training (CLIP) | Contrastively trained image-text models such as CLIP, ALIGN, and BASIC have
demonstrated unprecedented robustness to multiple challenging natural
distribution shifts. Since these image-text models differ from previous
training approaches in several ways, an important question is what causes the
large robustness gains. ... |
4,863 | null | Smooth over-parameterized solvers for non-smooth structured optimization | Non-smooth optimization is a core ingredient of many imaging or machine
learning pipelines. Non-smoothness encodes structural constraints on the
solutions, such as sparsity, group sparsity, low-rank and sharp edges. It is
also the basis for the definition of robust loss functions and scale-free
functionals such as squa... |
4,864 | null | Deep Learning in Multimodal Remote Sensing Data Fusion: A Comprehensive Review | With the extremely rapid advances in remote sensing (RS) technology, a great
quantity of Earth observation (EO) data featuring considerable and complicated
heterogeneity is readily available nowadays, which renders researchers an
opportunity to tackle current geoscience applications in a fresh way. With the
joint utili... |
4,865 | null | Finding patterns in Knowledge Attribution for Transformers | We analyze the Knowledge Neurons framework for the attribution of factual and
relational knowledge to particular neurons in the transformer network. We use a
12-layer multi-lingual BERT model for our experiments. Our study reveals
various interesting phenomena. We observe that mostly factual knowledge can be
attributed... |
4,866 | null | TracInAD: Measuring Influence for Anomaly Detection | As with many other tasks, neural networks prove very effective for anomaly
detection purposes. However, very few deep-learning models are suited for
detecting anomalies on tabular datasets. This paper proposes a novel
methodology to flag anomalies based on TracIn, an influence measure initially
introduced for explicabi... |
4,867 | null | Understanding Urban Water Consumption using Remotely Sensed Data | Urban metabolism is an active field of research that deals with the
estimation of emissions and resource consumption from urban regions. The
analysis could be carried out through a manual surveyor by the implementation
of elegant machine learning algorithms. In this exploratory work, we estimate
the water consumption b... |
4,868 | null | Learning Label Initialization for Time-Dependent Harmonic Extension | Node classification on graphs can be formulated as the Dirichlet problem on
graphs where the signal is given at the labeled nodes, and the harmonic
extension is done on the unlabeled nodes. This paper considers a time-dependent
version of the Dirichlet problem on graphs and shows how to improve its
solution by learning... |
4,869 | null | Predicting Loose-Fitting Garment Deformations Using Bone-Driven Motion Networks | We present a learning algorithm that uses bone-driven motion networks to
predict the deformation of loose-fitting garment meshes at interactive rates.
Given a garment, we generate a simulation database and extract virtual bones
from simulated mesh sequences using skin decomposition. At runtime, we
separately compute lo... |
4,870 | null | Predicting Issue Types with seBERT | Pre-trained transformer models are the current state-of-the-art for natural
language models processing. seBERT is such a model, that was developed based on
the BERT architecture, but trained from scratch with software engineering data.
We fine-tuned this model for the NLBSE challenge for the task of issue type
predicti... |
4,871 | null | Improved Orientation Estimation and Detection with Hybrid Object Detection Networks for Automotive Radar | This paper presents novel hybrid architectures that combine grid- and
point-based processing to improve the detection performance and orientation
estimation of radar-based object detection networks. Purely grid-based
detection models operate on a bird's-eye-view (BEV) projection of the input
point cloud. These approach... |
4,872 | null | Learning Discrete Structured Variational Auto-Encoder using Natural Evolution Strategies | Discrete variational auto-encoders (VAEs) are able to represent semantic
latent spaces in generative learning. In many real-life settings, the discrete
latent space consists of high-dimensional structures, and propagating gradients
through the relevant structures often requires enumerating over an
exponentially large l... |
4,873 | null | Open vs Closed-ended questions in attitudinal surveys -- comparing, combining, and interpreting using natural language processing | To improve the traveling experience, researchers have been analyzing the role
of attitudes in travel behavior modeling. Although most researchers use
closed-ended surveys, the appropriate method to measure attitudes is debatable.
Topic Modeling could significantly reduce the time to extract information from
open-ended ... |
4,874 | null | Distilling Governing Laws and Source Input for Dynamical Systems from Videos | Distilling interpretable physical laws from videos has led to expanded
interest in the computer vision community recently thanks to the advances in
deep learning, but still remains a great challenge. This paper introduces an
end-to-end unsupervised deep learning framework to uncover the explicit
governing equations of ... |
4,875 | null | Disentangled and Side-aware Unsupervised Domain Adaptation for Cross-dataset Subjective Tinnitus Diagnosis | EEG-based tinnitus classification is a valuable tool for tinnitus diagnosis,
research, and treatments. Most current works are limited to a single dataset
where data patterns are similar. But EEG signals are highly non-stationary,
resulting in model's poor generalization to new users, sessions or datasets.
Thus, designi... |
4,876 | null | FedRN: Exploiting k-Reliable Neighbors Towards Robust Federated Learning | Robustness is becoming another important challenge of federated learning in
that the data collection process in each client is naturally accompanied by
noisy labels. However, it is far more complex and challenging owing to varying
levels of data heterogeneity and noise over clients, which exacerbates the
client-to-clie... |
4,877 | null | CANShield: Signal-based Intrusion Detection for Controller Area Networks | Modern vehicles rely on a fleet of electronic control units (ECUs) connected
through controller area network (CAN) buses for critical vehicular control.
However, with the expansion of advanced connectivity features in automobiles
and the elevated risks of internal system exposure, the CAN bus is increasingly
prone to i... |
4,878 | null | Convergence of Stochastic Approximation via Martingale and Converse Lyapunov Methods | This paper is dedicated to Prof. Eduardo Sontag on the occasion of his
seventieth birthday. In this paper, we build upon the ideas first proposed in
Gladyshev (1965) to develop a very general framework for proving the almost
sure boundedness and the convergence of stochastic approximation algorithms.
These ideas are ba... |
4,879 | null | Towards an Ensemble Regressor Model for Anomalous ISP Traffic Prediction | Prediction of network traffic behavior is significant for the effective
management of modern telecommunication networks. However, the intuitive
approach of predicting network traffic using administrative experience and
market analysis data is inadequate for an efficient forecast framework. As a
result, many different m... |
4,880 | null | Side-aware Meta-Learning for Cross-Dataset Listener Diagnosis with Subjective Tinnitus | With the development of digital technology, machine learning has paved the
way for the next generation of tinnitus diagnoses. Although machine learning
has been widely applied in EEG-based tinnitus analysis, most current models are
dataset-specific. Each dataset may be limited to a specific range of symptoms,
overall d... |
4,881 | null | From {Solution Synthesis} to {Student Attempt Synthesis} for Block-Based Visual Programming Tasks | Block-based visual programming environments are increasingly used to
introduce computing concepts to beginners. Given that programming tasks are
open-ended and conceptual, novice students often struggle when learning in
these environments. AI-driven programming tutors hold great promise in
automatically assisting strug... |
4,882 | null | Norm-Agnostic Linear Bandits | Linear bandits have a wide variety of applications including recommendation
systems yet they make one strong assumption: the algorithms must know an upper
bound $S$ on the norm of the unknown parameter $\theta^*$ that governs the
reward generation. Such an assumption forces the practitioner to guess $S$
involved in the... |
4,883 | null | Scheduling with Speed Predictions | Algorithms with predictions is a recent framework that has been used to
overcome pessimistic worst-case bounds in incomplete information settings. In
the context of scheduling, very recent work has leveraged machine-learned
predictions to design algorithms that achieve improved approximation ratios in
settings where th... |
4,884 | null | ASTROMER: A transformer-based embedding for the representation of light curves | Taking inspiration from natural language embeddings, we present ASTROMER, a
transformer-based model to create representations of light curves. ASTROMER was
trained on millions of MACHO R-band samples, and it can be easily fine-tuned to
match specific domains associated with downstream tasks. As an example, this
paper s... |
4,885 | null | Triangular Dropout: Variable Network Width without Retraining | One of the most fundamental design choices in neural networks is layer width:
it affects the capacity of what a network can learn and determines the
complexity of the solution. This latter property is often exploited when
introducing information bottlenecks, forcing a network to learn compressed
representations. Howeve... |
4,886 | null | The Limits of Word Level Differential Privacy | As the issues of privacy and trust are receiving increasing attention within
the research community, various attempts have been made to anonymize textual
data. A significant subset of these approaches incorporate differentially
private mechanisms to perturb word embeddings, thus replacing individual words
in a sentence... |
4,887 | null | One Weird Trick to Improve Your Semi-Weakly Supervised Semantic Segmentation Model | Semi-weakly supervised semantic segmentation (SWSSS) aims to train a model to
identify objects in images based on a small number of images with pixel-level
labels, and many more images with only image-level labels. Most existing SWSSS
algorithms extract pixel-level pseudo-labels from an image classifier - a very
diffic... |
4,888 | null | Retrieval-Enhanced Machine Learning | Although information access systems have long supported people in
accomplishing a wide range of tasks, we propose broadening the scope of users
of information access systems to include task-driven machines, such as machine
learning models. In this way, the core principles of indexing, representation,
retrieval, and ran... |
4,889 | null | COMET Flows: Towards Generative Modeling of Multivariate Extremes and Tail Dependence | Normalizing flows, a popular class of deep generative models, often fail to
represent extreme phenomena observed in real-world processes. In particular,
existing normalizing flow architectures struggle to model multivariate
extremes, characterized by heavy-tailed marginal distributions and asymmetric
tail dependence am... |
4,890 | null | FINETUNA: Fine-tuning Accelerated Molecular Simulations | Machine learning approaches have the potential to approximate Density
Functional Theory (DFT) for atomistic simulations in a computationally
efficient manner, which could dramatically increase the impact of computational
simulations on real-world problems. However, they are limited by their accuracy
and the cost of gen... |
4,891 | null | Leveraging Stochastic Predictions of Bayesian Neural Networks for Fluid Simulations | We investigate uncertainty estimation and multimodality via the
non-deterministic predictions of Bayesian neural networks (BNNs) in fluid
simulations. To this end, we deploy BNNs in three challenging experimental
test-cases of increasing complexity: We show that BNNs, when used as surrogate
models for steady-state flui... |
4,892 | null | An improvement to a result about graph isomorphism networks using the prime factorization theorem | The unique prime factorization theorem is used to show the existence of a
function on a countable set $\mathcal{X}$ so that the sum aggregator function
is injective on all multisets of $\mathcal{X}$ of finite size. |
4,893 | null | Streaming Inference for Infinite Non-Stationary Clustering | Learning from a continuous stream of non-stationary data in an unsupervised
manner is arguably one of the most common and most challenging settings facing
intelligent agents. Here, we attack learning under all three conditions
(unsupervised, streaming, non-stationary) in the context of clustering, also
known as mixture... |
4,894 | null | Applications of Deep Learning to the Design of Enhanced Wireless Communication Systems | Innovation in the physical layer of communication systems has traditionally
been achieved by breaking down the transceivers into sets of processing blocks,
each optimized independently based on mathematical models. Conversely, deep
learning (DL)-based systems are able to handle increasingly complex tasks for
which no t... |
4,895 | null | Multi-Task Text Classification using Graph Convolutional Networks for Large-Scale Low Resource Language | Graph Convolutional Networks (GCN) have achieved state-of-art results on
single text classification tasks like sentiment analysis, emotion detection,
etc. However, the performance is achieved by testing and reporting on
resource-rich languages like English. Applying GCN for multi-task text
classification is an unexplor... |
4,896 | null | Predicting Time-to-conversion for Dementia of Alzheimer's Type using Multi-modal Deep Survival Analysis | Dementia of Alzheimer's Type (DAT) is a complex disorder influenced by
numerous factors, but it is unclear how each factor contributes to disease
progression. An in-depth examination of these factors may yield an accurate
estimate of time-to-conversion to DAT for patients at various disease stages.
We used 401 subjects... |
4,897 | null | Performance Weighting for Robust Federated Learning Against Corrupted Sources | Federated Learning has emerged as a dominant computational paradigm for
distributed machine learning. Its unique data privacy properties allow us to
collaboratively train models while offering participating clients certain
privacy-preserving guarantees. However, in real-world applications, a federated
environment may c... |
4,898 | null | Using Machine Learning to Evaluate Real Estate Prices Using Location Big Data | With everyone trying to enter the real estate market nowadays, knowing the
proper valuations for residential and commercial properties has become crucial.
Past researchers have been known to utilize static real estate data (e.g.
number of beds, baths, square footage) or even a combination of real estate and
demographic... |
4,899 | null | VAE-Loco: Versatile Quadruped Locomotion by Learning a Disentangled Gait Representation | Quadruped locomotion is rapidly maturing to a degree where robots now
routinely traverse a variety of unstructured terrains. However, while gaits can
be varied typically by selecting from a range of pre-computed styles, current
planners are unable to vary key gait parameters continuously while the robot is
in motion. T... |
4,900 | null | Reproducing Kernels and New Approaches in Compositional Data Analysis | Compositional data, such as human gut microbiomes, consist of non-negative
variables whose only the relative values to other variables are available.
Analyzing compositional data such as human gut microbiomes needs a careful
treatment of the geometry of the data. A common geometrical understanding of
compositional data... |
4,901 | null | SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels | Deep neural networks are prone to overfitting noisy labels, resulting in poor
generalization performance. To overcome this problem, we present a simple and
effective method self-ensemble label correction (SELC) to progressively correct
noisy labels and refine the model. We look deeper into the memorization
behavior in ... |
4,902 | null | Emotion-Controllable Generalized Talking Face Generation | Despite the significant progress in recent years, very few of the AI-based
talking face generation methods attempt to render natural emotions. Moreover,
the scope of the methods is majorly limited to the characteristics of the
training dataset, hence they fail to generalize to arbitrary unseen faces. In
this paper, we ... |
4,903 | null | D-DPCC: Deep Dynamic Point Cloud Compression via 3D Motion Prediction | The non-uniformly distributed nature of the 3D dynamic point cloud (DPC)
brings significant challenges to its high-efficient inter-frame compression.
This paper proposes a novel 3D sparse convolution-based Deep Dynamic Point
Cloud Compression (D-DPCC) network to compensate and compress the DPC geometry
with 3D motion e... |
4,904 | null | Hausa Visual Genome: A Dataset for Multi-Modal English to Hausa Machine Translation | Multi-modal Machine Translation (MMT) enables the use of visual information
to enhance the quality of translations. The visual information can serve as a
valuable piece of context information to decrease the ambiguity of input
sentences. Despite the increasing popularity of such a technique, good and
sizeable datasets ... |
4,905 | null | A Deep Learning-based Integrated Framework for Quality-aware Undersampled Cine Cardiac MRI Reconstruction and Analysis | Cine cardiac magnetic resonance (CMR) imaging is considered the gold standard
for cardiac function evaluation. However, cine CMR acquisition is inherently
slow and in recent decades considerable effort has been put into accelerating
scan times without compromising image quality or the accuracy of derived
results. In th... |
4,906 | null | ComPhy: Compositional Physical Reasoning of Objects and Events from Videos | Objects' motions in nature are governed by complex interactions and their
properties. While some properties, such as shape and material, can be
identified via the object's visual appearances, others like mass and electric
charge are not directly visible. The compositionality between the visible and
hidden properties po... |
4,907 | null | Ensemble pruning via an integer programming approach with diversity constraints | Ensemble learning combines multiple classifiers in the hope of obtaining
better predictive performance. Empirical studies have shown that ensemble
pruning, that is, choosing an appropriate subset of the available classifiers,
can lead to comparable or better predictions than using all classifiers. In
this paper, we con... |
Subsets and Splits
Physics and Math Papers
Retrieves a limited set of records where the title or abstract contains words related to physics or math, providing a basic filter for relevant entries.