Unnamed: 0
int64 0
5k
| title
stringlengths 9
210
| abstract
stringlengths 164
1.92k
|
---|---|---|
1,400 | On the Role of Generalization in Transferability of Adversarial Examples | Black-box adversarial attacks designing adversarial examples for unseen
neural networks (NNs) have received great attention over the past years. While
several successful black-box attack schemes have been proposed in the
literature, the underlying factors driving the transferability of black-box
adversarial examples still lack a thorough understanding. In this paper, we aim
to demonstrate the role of the generalization properties of the substitute
classifier used for generating adversarial examples in the transferability of
the attack scheme to unobserved NN classifiers. To do this, we apply the
max-min adversarial example game framework and show the importance of the
generalization properties of the substitute NN in the success of the black-box
attack scheme in application to different NN classifiers. We prove theoretical
generalization bounds on the difference between the attack transferability
rates on training and test samples. Our bounds suggest that a substitute NN
with better generalization behavior could result in more transferable
adversarial examples. In addition, we show that standard operator norm-based
regularization methods could improve the transferability of the designed
adversarial examples. We support our theoretical results by performing several
numerical experiments showing the role of the substitute network's
generalization in generating transferable adversarial examples. Our empirical
results indicate the power of Lipschitz regularization methods in improving the
transferability of adversarial examples. |
1,401 | Model-Agnostic Few-Shot Open-Set Recognition | We tackle the Few-Shot Open-Set Recognition (FSOSR) problem, i.e. classifying
instances among a set of classes for which we only have few labeled samples,
while simultaneously detecting instances that do not belong to any known class.
Departing from existing literature, we focus on developing model-agnostic
inference methods that can be plugged into any existing model, regardless of
its architecture or its training procedure. Through evaluating the embedding's
quality of a variety of models, we quantify the intrinsic difficulty of
model-agnostic FSOSR. Furthermore, a fair empirical evaluation suggests that
the naive combination of a kNN detector and a prototypical classifier ranks
before specialized or complex methods in the inductive setting of FSOSR. These
observations motivated us to resort to transduction, as a popular and practical
relaxation of standard few-shot learning problems. We introduce an Open Set
Transductive Information Maximization method OSTIM, which hallucinates an
outlier prototype while maximizing the mutual information between extracted
features and assignments. Through extensive experiments spanning 5 datasets, we
show that OSTIM surpasses both inductive and existing transductive methods in
detecting open-set instances while competing with the strongest transductive
methods in classifying closed-set instances. We further show that OSTIM's model
agnosticity allows it to successfully leverage the strong expressive abilities
of the latest architectures and training strategies without any hyperparameter
modification, a promising sign that architectural advances to come will
continue to positively impact OSTIM's performances. |
1,402 | Bioinspired random projections for robust, sparse classification | Inspired by the use of random projections in biological sensing systems, we
present a new algorithm for processing data in classification problems. This is
based on observations of the human brain and the fruit fly's olfactory system
and involves randomly projecting data into a space of greatly increased
dimension before applying a cap operation to truncate the smaller entries. This
leads to an algorithm that achieves a sparse representation with minimal loss
in classification accuracy and is also more robust in the sense that
classification accuracy is improved when noise is added to the data. This is
demonstrated with numerical experiments, which supplement theoretical results
demonstrating that the resulting signal transform is continuous and invertible,
in an appropriate sense. |
1,403 | An Invertible Graph Diffusion Neural Network for Source Localization | Localizing the source of graph diffusion phenomena, such as misinformation
propagation, is an important yet extremely challenging task. Existing source
localization models typically are heavily dependent on the hand-crafted rules.
Unfortunately, a large portion of the graph diffusion process for many
applications is still unknown to human beings so it is important to have
expressive models for learning such underlying rules automatically. This paper
aims to establish a generic framework of invertible graph diffusion models for
source localization on graphs, namely Invertible Validity-aware Graph Diffusion
(IVGD), to handle major challenges including 1) Difficulty to leverage
knowledge in graph diffusion models for modeling their inverse processes in an
end-to-end fashion, 2) Difficulty to ensure the validity of the inferred
sources, and 3) Efficiency and scalability in source inference. Specifically,
first, to inversely infer sources of graph diffusion, we propose a graph
residual scenario to make existing graph diffusion models invertible with
theoretical guarantees; second, we develop a novel error compensation mechanism
that learns to offset the errors of the inferred sources. Finally, to ensure
the validity of the inferred sources, a new set of validity-aware layers have
been devised to project inferred sources to feasible regions by flexibly
encoding constraints with unrolled optimization techniques. A linearization
technique is proposed to strengthen the efficiency of our proposed layers. The
convergence of the proposed IVGD is proven theoretically. Extensive experiments
on nine real-world datasets demonstrate that our proposed IVGD outperforms
state-of-the-art comparison methods significantly. We have released our code at
https://github.com/xianggebenben/IVGD. |
1,404 | Multi-Modality Image Inpainting using Generative Adversarial Networks | Deep learning techniques, especially Generative Adversarial Networks (GANs)
have significantly improved image inpainting and image-to-image translation
tasks over the past few years. To the best of our knowledge, the problem of
combining the image inpainting task with the multi-modality image-to-image
translation remains intact. In this paper, we propose a model to address this
problem. The model will be evaluated on combined night-to-day image translation
and inpainting, along with promising qualitative and quantitative results. |
1,405 | EST: Evaluating Scientific Thinking in Artificial Agents | Theoretical ideas and empirical research have shown us a seemingly surprising
result: children, even very young toddlers, demonstrate learning and thinking
in a strikingly similar manner to scientific reasoning in formal research.
Encountering a novel phenomenon, children make hypotheses against data, conduct
causal inference from observation, test their theory via experimentation, and
correct the proposition if inconsistency arises. Rounds of such processes
continue until the underlying mechanism is found. Towards building machines
that can learn and think like people, one natural question for us to ask is:
whether the intelligence we achieve today manages to perform such a scientific
thinking process, and if any, at what level. In this work, we devise the EST
environment for evaluating the scientific thinking ability in artificial
agents. Motivated by the stream of research on causal discovery, we build our
interactive EST environment based on Blicket detection. Specifically, in each
episode of EST, an agent is presented with novel observations and asked to
figure out all objects' Blicketness. At each time step, the agent proposes new
experiments to validate its hypothesis and updates its current belief. By
evaluating Reinforcement Learning (RL) agents on both a symbolic and visual
version of this task, we notice clear failure of today's learning methods in
reaching a level of intelligence comparable to humans. Such inefficacy of
learning in scientific thinking calls for future research in building humanlike
intelligence. |
1,406 | AI-based computer-aided diagnostic system of chest digital tomography synthesis: Demonstrating comparative advantage with X-ray-based AI systems | Compared with chest X-ray (CXR) imaging, which is a single image projected
from the front of the patient, chest digital tomosynthesis (CDTS) imaging can
be more advantageous for lung lesion detection because it acquires multiple
images projected from multiple angles of the patient. Various clinical
comparative analysis and verification studies have been reported to demonstrate
this, but there were no artificial intelligence (AI)-based comparative analysis
studies. Existing AI-based computer-aided detection (CAD) systems for lung
lesion diagnosis have been developed mainly based on CXR images; however,
CAD-based on CDTS, which uses multi-angle images of patients in various
directions, has not been proposed and verified for its usefulness compared to
CXR-based counterparts. This study develops/tests a CDTS-based AI CAD system to
detect lung lesions to demonstrate performance improvements compared to
CXR-based AI CAD. We used multiple projection images as input for the
CDTS-based AI model and a single-projection image as input for the CXR-based AI
model to fairly compare and evaluate the performance between models. The
proposed CDTS-based AI CAD system yielded sensitivities of 0.782 and 0.785 and
accuracies of 0.895 and 0.837 for the performance of detecting tuberculosis and
pneumonia, respectively, against normal subjects. These results show higher
performance than sensitivities of 0.728 and 0.698 and accuracies of 0.874 and
0.826 for detecting tuberculosis and pneumonia through the CXR-based AI CAD,
which only uses a single projection image in the frontal direction. We found
that CDTS-based AI CAD improved the sensitivity of tuberculosis and pneumonia
by 5.4% and 8.7% respectively, compared to CXR-based AI CAD without loss of
accuracy. Therefore, we comparatively prove that CDTS-based AI CAD technology
can improve performance more than CXR, enhancing the clinical applicability of
CDTS. |
1,407 | 3D unsupervised anomaly detection and localization through virtual multi-view projection and reconstruction: Clinical validation on low-dose chest computed tomography | Computer-aided diagnosis for low-dose computed tomography (CT) based on deep
learning has recently attracted attention as a first-line automatic testing
tool because of its high accuracy and low radiation exposure. However, existing
methods rely on supervised learning, imposing an additional burden to doctors
for collecting disease data or annotating spatial labels for network training,
consequently hindering their implementation. We propose a method based on a
deep neural network for computer-aided diagnosis called virtual multi-view
projection and reconstruction for unsupervised anomaly detection. Presumably,
this is the first method that only requires data from healthy patients for
training to identify three-dimensional (3D) regions containing any anomalies.
The method has three key components. Unlike existing computer-aided diagnosis
tools that use conventional CT slices as the network input, our method 1)
improves the recognition of 3D lung structures by virtually projecting an
extracted 3D lung region to obtain two-dimensional (2D) images from diverse
views to serve as network inputs, 2) accommodates the input diversity gain for
accurate anomaly detection, and 3) achieves 3D anomaly/disease localization
through a novel 3D map restoration method using multiple 2D anomaly maps. The
proposed method based on unsupervised learning improves the patient-level
anomaly detection by 10% (area under the curve, 0.959) compared with a gold
standard based on supervised learning (area under the curve, 0.848), and it
localizes the anomaly region with 93% accuracy, demonstrating its high
performance. |
1,408 | EEML: Ensemble Embedded Meta-learning | To accelerate learning process with few samples, meta-learning resorts to
prior knowledge from previous tasks. However, the inconsistent task
distribution and heterogeneity is hard to be handled through a global sharing
model initialization. In this paper, based on gradient-based meta-learning, we
propose an ensemble embedded meta-learning algorithm (EEML) that explicitly
utilizes multi-model-ensemble to organize prior knowledge into diverse specific
experts. We rely on a task embedding cluster mechanism to deliver diverse tasks
to matching experts in training process and instruct how experts collaborate in
test phase. As a result, the multi experts can focus on their own area of
expertise and cooperate in upcoming task to solve the task heterogeneity. The
experimental results show that the proposed method outperforms recent
state-of-the-arts easily in few-shot learning problem, which validates the
importance of differentiation and cooperation. |
1,409 | Efficient Aggregated Kernel Tests using Incomplete $U$-statistics | We propose a series of computationally efficient, nonparametric tests for the
two-sample, independence and goodness-of-fit problems, using the Maximum Mean
Discrepancy (MMD), Hilbert Schmidt Independence Criterion (HSIC), and Kernel
Stein Discrepancy (KSD), respectively. Our test statistics are incomplete
$U$-statistics, with a computational cost that interpolates between linear time
in the number of samples, and quadratic time, as associated with classical
$U$-statistic tests. The three proposed tests aggregate over several kernel
bandwidths to detect departures from the null on various scales: we call the
resulting tests MMDAggInc, HSICAggInc and KSDAggInc. For the test thresholds,
we derive a quantile bound for wild bootstrapped incomplete $U$- statistics,
which is of independent interest. We derive uniform separation rates for
MMDAggInc and HSICAggInc, and quantify exactly the trade-off between
computational efficiency and the attainable rates: this result is novel for
tests based on incomplete $U$-statistics, to our knowledge. We further show
that in the quadratic-time case, the wild bootstrap incurs no penalty to test
power over more widespread permutation-based approaches, since both attain the
same minimax optimal rates (which in turn match the rates that use oracle
quantiles). We support our claims with numerical experiments on the trade-off
between computational efficiency and test power. In the three testing
frameworks, we observe that our proposed linear-time aggregated tests obtain
higher power than current state-of-the-art linear-time kernel tests. |
1,410 | Multi-Modality Image Super-Resolution using Generative Adversarial Networks | Over the past few years deep learning-based techniques such as Generative
Adversarial Networks (GANs) have significantly improved solutions to image
super-resolution and image-to-image translation problems. In this paper, we
propose a solution to the joint problem of image super-resolution and
multi-modality image-to-image translation. The problem can be stated as the
recovery of a high-resolution image in a modality, given a low-resolution
observation of the same image in an alternative modality. Our paper offers two
models to address this problem and will be evaluated on the recovery of
high-resolution day images given low-resolution night images of the same scene.
Promising qualitative and quantitative results will be presented for each
model. |
1,411 | Causal Inference with Treatment Measurement Error: A Nonparametric Instrumental Variable Approach | We propose a kernel-based nonparametric estimator for the causal effect when
the cause is corrupted by error. We do so by generalizing estimation in the
instrumental variable setting. Despite significant work on regression with
measurement error, additionally handling unobserved confounding in the
continuous setting is non-trivial: we have seen little prior work. As a
by-product of our investigation, we clarify a connection between mean
embeddings and characteristic functions, and how learning one simultaneously
allows one to learn the other. This opens the way for kernel method research to
leverage existing results in characteristic function estimation. Finally, we
empirically show that our proposed method, MEKIV, improves over baselines and
is robust under changes in the strength of measurement error and to the type of
error distributions. |
1,412 | PHN: Parallel heterogeneous network with soft gating for CTR prediction | The Click-though Rate (CTR) prediction task is a basic task in recommendation
system. Most of the previous researches of CTR models built based on Wide \&
deep structure and gradually evolved into parallel structures with different
modules. However, the simple accumulation of parallel structures can lead to
higher structural complexity and longer training time. Based on the Sigmoid
activation function of output layer, the linear addition activation value of
parallel structures in the training process is easy to make the samples fall
into the weak gradient interval, resulting in the phenomenon of weak gradient,
and reducing the effectiveness of training. To this end, this paper proposes a
Parallel Heterogeneous Network (PHN) model, which constructs a network with
parallel structure through three different interaction analysis methods, and
uses Soft Selection Gating (SSG) to feature heterogeneous data with different
structure. Finally, residual link with trainable parameters are used in the
network to mitigate the influence of weak gradient phenomenon. Furthermore, we
demonstrate the effectiveness of PHN in a large number of comparative
experiments, and visualize the performance of the model in training process and
structure. |
1,413 | Coin Flipping Neural Networks | We show that neural networks with access to randomness can outperform
deterministic networks by using amplification. We call such networks
Coin-Flipping Neural Networks, or CFNNs. We show that a CFNN can approximate
the indicator of a $d$-dimensional ball to arbitrary accuracy with only 2
layers and $\mathcal{O}(1)$ neurons, where a 2-layer deterministic network was
shown to require $\Omega(e^d)$ neurons, an exponential improvement
(arXiv:1610.09887). We prove a highly non-trivial result, that for almost any
classification problem, there exists a trivially simple network that solves it
given a sufficiently powerful generator for the network's weights. Combining
these results we conjecture that for most classification problems, there is a
CFNN which solves them with higher accuracy or fewer neurons than any
deterministic network. Finally, we verify our proofs experimentally using novel
CFNN architectures on CIFAR10 and CIFAR100, reaching an improvement of 9.25\%
from the baseline. |
1,414 | NAS-Bench-Graph: Benchmarking Graph Neural Architecture Search | Graph neural architecture search (GraphNAS) has recently aroused considerable
attention in both academia and industry. However, two key challenges seriously
hinder the further research of GraphNAS. First, since there is no consensus for
the experimental setting, the empirical results in different research papers
are often not comparable and even not reproducible, leading to unfair
comparisons. Secondly, GraphNAS often needs extensive computations, which makes
it highly inefficient and inaccessible to researchers without access to
large-scale computation. To solve these challenges, we propose NAS-Bench-Graph,
a tailored benchmark that supports unified, reproducible, and efficient
evaluations for GraphNAS. Specifically, we construct a unified, expressive yet
compact search space, covering 26,206 unique graph neural network (GNN)
architectures and propose a principled evaluation protocol. To avoid
unnecessary repetitive training, we have trained and evaluated all of these
architectures on nine representative graph datasets, recording detailed metrics
including train, validation, and test performance in each epoch, the latency,
the number of parameters, etc. Based on our proposed benchmark, the performance
of GNN architectures can be directly obtained by a look-up table without any
further computation, which enables fair, fully reproducible, and efficient
comparisons. To demonstrate its usage, we make in-depth analyses of our
proposed NAS-Bench-Graph, revealing several interesting findings for GraphNAS.
We also showcase how the benchmark can be easily compatible with GraphNAS open
libraries such as AutoGL and NNI. To the best of our knowledge, our work is the
first benchmark for graph neural architecture search. |
1,415 | Thompson Sampling for (Combinatorial) Pure Exploration | Existing methods of combinatorial pure exploration mainly focus on the UCB
approach. To make the algorithm efficient, they usually use the sum of upper
confidence bounds within arm set $S$ to represent the upper confidence bound of
$S$, which can be much larger than the tight upper confidence bound of $S$ and
leads to a much higher complexity than necessary, since the empirical means of
different arms in $S$ are independent. To deal with this challenge, we explore
the idea of Thompson Sampling (TS) that uses independent random samples instead
of the upper confidence bounds, and design the first TS-based algorithm
TS-Explore for (combinatorial) pure exploration. In TS-Explore, the sum of
independent random samples within arm set $S$ will not exceed the tight upper
confidence bound of $S$ with high probability. Hence it solves the above
challenge, and achieves a lower complexity upper bound than existing efficient
UCB-based algorithms in general combinatorial pure exploration. As for pure
exploration of classic multi-armed bandit, we show that TS-Explore achieves an
asymptotically optimal complexity upper bound. |
1,416 | Piecewise Linear Neural Networks and Deep Learning | As a powerful modelling method, PieceWise Linear Neural Networks (PWLNNs)
have proven successful in various fields, most recently in deep learning. To
apply PWLNN methods, both the representation and the learning have long been
studied. In 1977, the canonical representation pioneered the works of shallow
PWLNNs learned by incremental designs, but the applications to large-scale data
were prohibited. In 2010, the Rectified Linear Unit (ReLU) advocated the
prevalence of PWLNNs in deep learning. Ever since, PWLNNs have been
successfully applied to extensive tasks and achieved advantageous performances.
In this Primer, we systematically introduce the methodology of PWLNNs by
grouping the works into shallow and deep networks. Firstly, different PWLNN
representation models are constructed with elaborated examples. With PWLNNs,
the evolution of learning algorithms for data is presented and fundamental
theoretical analysis follows up for in-depth understandings. Then,
representative applications are introduced together with discussions and
outlooks. |
1,417 | Beyond Real-world Benchmark Datasets: An Empirical Study of Node Classification with GNNs | Graph Neural Networks (GNNs) have achieved great success on a node
classification task. Despite the broad interest in developing and evaluating
GNNs, they have been assessed with limited benchmark datasets. As a result, the
existing evaluation of GNNs lacks fine-grained analysis from various
characteristics of graphs. Motivated by this, we conduct extensive experiments
with a synthetic graph generator that can generate graphs having controlled
characteristics for fine-grained analysis. Our empirical studies clarify the
strengths and weaknesses of GNNs from four major characteristics of real-world
graphs with class labels of nodes, i.e., 1) class size distributions (balanced
vs. imbalanced), 2) edge connection proportions between classes (homophilic vs.
heterophilic), 3) attribute values (biased vs. random), and 4) graph sizes
(small vs. large). In addition, to foster future research on GNNs, we publicly
release our codebase that allows users to evaluate various GNNs with various
graphs. We hope this work offers interesting insights for future research. |
1,418 | Certified Graph Unlearning | Graph-structured data is ubiquitous in practice and often processed using
graph neural networks (GNNs). With the adoption of recent laws ensuring the
``right to be forgotten'', the problem of graph data removal has become of
significant importance. To address the problem, we introduce the first known
framework for \emph{certified graph unlearning} of GNNs. In contrast to
standard machine unlearning, new analytical and heuristic unlearning challenges
arise when dealing with complex graph data. First, three different types of
unlearning requests need to be considered, including node feature, edge and
node unlearning. Second, to establish provable performance guarantees, one
needs to address challenges associated with feature mixing during propagation.
The underlying analysis is illustrated on the example of simple graph
convolutions (SGC) and their generalized PageRank (GPR) extensions, thereby
laying the theoretical foundation for certified unlearning of GNNs. Our
empirical studies on six benchmark datasets demonstrate excellent
performance-complexity trade-offs when compared to complete retraining methods
and approaches that do not leverage graph information. For example, when
unlearning $20\%$ of the nodes on the Cora dataset, our approach suffers only a
$0.1\%$ loss in test accuracy while offering a $4$-fold speed-up compared to
complete retraining. Our scheme also outperforms unlearning methods that do not
leverage graph information with a $12\%$ increase in test accuracy for a
comparable time complexity. |
1,419 | Provable Generalization of Overparameterized Meta-learning Trained with SGD | Despite the superior empirical success of deep meta-learning, theoretical
understanding of overparameterized meta-learning is still limited. This paper
studies the generalization of a widely used meta-learning approach,
Model-Agnostic Meta-Learning (MAML), which aims to find a good initialization
for fast adaptation to new tasks. Under a mixed linear regression model, we
analyze the generalization properties of MAML trained with SGD in the
overparameterized regime. We provide both upper and lower bounds for the excess
risk of MAML, which captures how SGD dynamics affect these generalization
bounds. With such sharp characterizations, we further explore how various
learning parameters impact the generalization capability of overparameterized
MAML, including explicitly identifying typical data and task distributions that
can achieve diminishing generalization error with overparameterization, and
characterizing the impact of adaptation learning rate on both excess risk and
the early stopping time. Our theoretical findings are further validated by
experiments. |
1,420 | Replacing Labeled Real-image Datasets with Auto-generated Contours | In the present work, we show that the performance of formula-driven
supervised learning (FDSL) can match or even exceed that of ImageNet-21k
without the use of real images, human-, and self-supervision during the
pre-training of Vision Transformers (ViTs). For example, ViT-Base pre-trained
on ImageNet-21k shows 81.8% top-1 accuracy when fine-tuned on ImageNet-1k and
FDSL shows 82.7% top-1 accuracy when pre-trained under the same conditions
(number of images, hyperparameters, and number of epochs). Images generated by
formulas avoid the privacy/copyright issues, labeling cost and errors, and
biases that real images suffer from, and thus have tremendous potential for
pre-training general models. To understand the performance of the synthetic
images, we tested two hypotheses, namely (i) object contours are what matter in
FDSL datasets and (ii) increased number of parameters to create labels affects
performance improvement in FDSL pre-training. To test the former hypothesis, we
constructed a dataset that consisted of simple object contour combinations. We
found that this dataset can match the performance of fractals. For the latter
hypothesis, we found that increasing the difficulty of the pre-training task
generally leads to better fine-tuning accuracy. |
1,421 | Tackling Spoofing-Aware Speaker Verification with Multi-Model Fusion | Recent years have witnessed the extraordinary development of automatic
speaker verification (ASV). However, previous works show that state-of-the-art
ASV models are seriously vulnerable to voice spoofing attacks, and the recently
proposed high-performance spoofing countermeasure (CM) models only focus solely
on the standalone anti-spoofing tasks, and ignore the subsequent speaker
verification process. How to integrate the CM and ASV together remains an open
question. A spoofing aware speaker verification (SASV) challenge has recently
taken place with the argument that better performance can be delivered when
both CM and ASV subsystems are optimized jointly. Under the challenge's
scenario, the integrated systems proposed by the participants are required to
reject both impostor speakers and spoofing attacks from target speakers, which
intuitively and effectively matches the expectation of a reliable,
spoofing-robust ASV system. This work focuses on fusion-based SASV solutions
and proposes a multi-model fusion framework to leverage the power of multiple
state-of-the-art ASV and CM models. The proposed framework vastly improves the
SASV-EER from 8.75% to 1.17\%, which is 86% relative improvement compared to
the best baseline system in the SASV challenge. |
1,422 | Deep Inverse Reinforcement Learning for Route Choice Modeling | Route choice modeling, i.e., the process of estimating the likely path that
individuals follow during their journeys, is a fundamental task in
transportation planning and demand forecasting. Classical methods generally
adopt the discrete choice model (DCM) framework with linear utility functions
and high-level route characteristics. While several recent studies have started
to explore the applicability of deep learning for travel choice modeling, they
are all path-based with relatively simple model architectures and cannot take
advantage of detailed link-level features. Existing link-based models, while
theoretically promising, are generally not as scalable or flexible enough to
account for the destination characteristics. To address these issues, this
study proposes a general deep inverse reinforcement learning (IRL) framework
for link-based route choice modeling, which is capable of incorporating
high-dimensional features and capturing complex relationships. Specifically, we
adapt an adversarial IRL model to the route choice problem for efficient
estimation of destination-dependent reward and policy functions. Experiment
results based on taxi GPS data from Shanghai, China validate the improved
performance of the proposed model over conventional DCMs and other imitation
learning baselines, even for destinations unseen in the training data. We also
demonstrate the model interpretability using explainable AI techniques. The
proposed methodology provides a new direction for future development of route
choice models. It is general and should be adaptable to other route choice
problems across different modes and networks. |
1,423 | Nonparametric Multi-shape Modeling with Uncertainty Quantification | The modeling and uncertainty quantification of closed curves is an important
problem in the field of shape analysis, and can have significant ramifications
for subsequent statistical tasks. Many of these tasks involve collections of
closed curves, which often exhibit structural similarities at multiple levels.
Modeling multiple closed curves in a way that efficiently incorporates such
between-curve dependence remains a challenging problem. In this work, we
propose and investigate a multiple-output (a.k.a. multi-output),
multi-dimensional Gaussian process modeling framework. We illustrate the
proposed methodological advances, and demonstrate the utility of meaningful
uncertainty quantification, on several curve and shape-related tasks. This
model-based approach not only addresses the problem of inference on closed
curves (and their shapes) with kernel constructions, but also opens doors to
nonparametric modeling of multi-level dependence for functional objects in
general. |
1,424 | Pursuit of a Discriminative Representation for Multiple Subspaces via Sequential Games | We consider the problem of learning discriminative representations for data
in a high-dimensional space with distribution supported on or around multiple
low-dimensional linear subspaces. That is, we wish to compute a linear
injective map of the data such that the features lie on multiple orthogonal
subspaces. Instead of treating this learning problem using multiple PCAs, we
cast it as a sequential game using the closed-loop transcription (CTRL)
framework recently proposed for learning discriminative and generative
representations for general low-dimensional submanifolds. We prove that the
equilibrium solutions to the game indeed give correct representations. Our
approach unifies classical methods of learning subspaces with modern deep
learning practice, by showing that subspace learning problems may be provably
solved using the modern toolkit of representation learning. In addition, our
work provides the first theoretical justification for the CTRL framework, in
the important case of linear subspaces. We support our theoretical findings
with compelling empirical evidence. We also generalize the sequential game
formulation to more general representation learning problems. Our code,
including methods for easy reproduction of experimental results, is publically
available on GitHub. |
1,425 | NISPA: Neuro-Inspired Stability-Plasticity Adaptation for Continual Learning in Sparse Networks | The goal of continual learning (CL) is to learn different tasks over time.
The main desiderata associated with CL are to maintain performance on older
tasks, leverage the latter to improve learning of future tasks, and to
introduce minimal overhead in the training process (for instance, to not
require a growing model or retraining). We propose the Neuro-Inspired
Stability-Plasticity Adaptation (NISPA) architecture that addresses these
desiderata through a sparse neural network with fixed density. NISPA forms
stable paths to preserve learned knowledge from older tasks. Also, NISPA uses
connection rewiring to create new plastic paths that reuse existing knowledge
on novel tasks. Our extensive evaluation on EMNIST, FashionMNIST, CIFAR10, and
CIFAR100 datasets shows that NISPA significantly outperforms representative
state-of-the-art continual learning baselines, and it uses up to ten times
fewer learnable parameters compared to baselines. We also make the case that
sparsity is an essential ingredient for continual learning. The NISPA code is
available at https://github.com/BurakGurbuz97/NISPA. |
1,426 | Bear the Query in Mind: Visual Grounding with Query-conditioned Convolution | Visual grounding is a task that aims to locate a target object according to a
natural language expression. As a multi-modal task, feature interaction between
textual and visual inputs is vital. However, previous solutions mainly handle
each modality independently before fusing them together, which does not take
full advantage of relevant textual information while extracting visual
features. To better leverage the textual-visual relationship in visual
grounding, we propose a Query-conditioned Convolution Module (QCM) that
extracts query-aware visual features by incorporating query information into
the generation of convolutional kernels. With our proposed QCM, the downstream
fusion module receives visual features that are more discriminative and focused
on the desired object described in the expression, leading to more accurate
predictions. Extensive experiments on three popular visual grounding datasets
demonstrate that our method achieves state-of-the-art performance. In addition,
the query-aware visual features are informative enough to achieve comparable
performance to the latest methods when directly used for prediction without
further multi-modal fusion. |
1,427 | Pre-training Enhanced Spatial-temporal Graph Neural Network for Multivariate Time Series Forecasting | Multivariate Time Series (MTS) forecasting plays a vital role in a wide range
of applications. Recently, Spatial-Temporal Graph Neural Networks (STGNNs) have
become increasingly popular MTS forecasting methods. STGNNs jointly model the
spatial and temporal patterns of MTS through graph neural networks and
sequential models, significantly improving the prediction accuracy. But limited
by model complexity, most STGNNs only consider short-term historical MTS data,
such as data over the past one hour. However, the patterns of time series and
the dependencies between them (i.e., the temporal and spatial patterns) need to
be analyzed based on long-term historical MTS data. To address this issue, we
propose a novel framework, in which STGNN is Enhanced by a scalable time series
Pre-training model (STEP). Specifically, we design a pre-training model to
efficiently learn temporal patterns from very long-term history time series
(e.g., the past two weeks) and generate segment-level representations. These
representations provide contextual information for short-term time series input
to STGNNs and facilitate modeling dependencies between time series. Experiments
on three public real-world datasets demonstrate that our framework is capable
of significantly enhancing downstream STGNNs, and our pre-training model aptly
captures temporal patterns. |
1,428 | Decoupled Dynamic Spatial-Temporal Graph Neural Network for Traffic Forecasting | We all depend on mobility, and vehicular transportation affects the daily
lives of most of us. Thus, the ability to forecast the state of traffic in a
road network is an important functionality and a challenging task. Traffic data
is often obtained from sensors deployed in a road network. Recent proposals on
spatial-temporal graph neural networks have achieved great progress at modeling
complex spatial-temporal correlations in traffic data, by modeling traffic data
as a diffusion process. However, intuitively, traffic data encompasses two
different kinds of hidden time series signals, namely the diffusion signals and
inherent signals. Unfortunately, nearly all previous works coarsely consider
traffic signals entirely as the outcome of the diffusion, while neglecting the
inherent signals, which impacts model performance negatively. To improve
modeling performance, we propose a novel Decoupled Spatial-Temporal Framework
(DSTF) that separates the diffusion and inherent traffic information in a
data-driven manner, which encompasses a unique estimation gate and a residual
decomposition mechanism. The separated signals can be handled subsequently by
the diffusion and inherent modules separately. Further, we propose an
instantiation of DSTF, Decoupled Dynamic Spatial-Temporal Graph Neural Network
(D2STGNN), that captures spatial-temporal correlations and also features a
dynamic graph learning module that targets the learning of the dynamic
characteristics of traffic networks. Extensive experiments with four real-world
traffic datasets demonstrate that the framework is capable of advancing the
state-of-the-art. |
1,429 | Fast and Provable Tensor Robust Principal Component Analysis via Scaled Gradient Descent | An increasing number of data science and machine learning problems rely on
computation with tensors, which better capture the multi-way relationships and
interactions of data than matrices. When tapping into this critical advantage,
a key challenge is to develop computationally efficient and provably correct
algorithms for extracting useful information from tensor data that are
simultaneously robust to corruptions and ill-conditioning. This paper tackles
tensor robust principal component analysis (RPCA), which aims to recover a
low-rank tensor from its observations contaminated by sparse corruptions, under
the Tucker decomposition. To minimize the computation and memory footprints, we
propose to directly recover the low-dimensional tensor factors -- starting from
a tailored spectral initialization -- via scaled gradient descent (ScaledGD),
coupled with an iteration-varying thresholding operation to adaptively remove
the impact of corruptions. Theoretically, we establish that the proposed
algorithm converges linearly to the true low-rank tensor at a constant rate
that is independent with its condition number, as long as the level of
corruptions is not too large. Empirically, we demonstrate that the proposed
algorithm achieves better and more scalable performance than state-of-the-art
matrix and tensor RPCA algorithms through synthetic experiments and real-world
applications. |
1,430 | Tree-Guided Rare Feature Selection and Logic Aggregation with Electronic Health Records Data | Statistical learning with a large number of rare binary features is commonly
encountered in analyzing electronic health records (EHR) data, especially in
the modeling of disease onset with prior medical diagnoses and procedures.
Dealing with the resulting highly sparse and large-scale binary feature matrix
is notoriously challenging as conventional methods may suffer from a lack of
power in testing and inconsistency in model fitting while machine learning
methods may suffer from the inability of producing interpretable results or
clinically-meaningful risk factors. To improve EHR-based modeling and utilize
the natural hierarchical structure of disease classification, we propose a
tree-guided feature selection and logic aggregation approach for large-scale
regression with rare binary features, in which dimension reduction is achieved
through not only a sparsity pursuit but also an aggregation promoter with the
logic operator of ``or''. We convert the combinatorial problem into a convex
linearly-constrained regularized estimation, which enables scalable computation
with theoretical guarantees. In a suicide risk study with EHR data, our
approach is able to select and aggregate prior mental health diagnoses as
guided by the diagnosis hierarchy of the International Classification of
Diseases. By balancing the rarity and specificity of the EHR diagnosis records,
our strategy improves both prediction and model interpretation. We identify
important higher-level categories and subcategories of mental health conditions
and simultaneously determine the level of specificity needed for each of them
in predicting suicide risk. |
1,431 | Score-Guided Intermediate Layer Optimization: Fast Langevin Mixing for Inverse Problems | We prove fast mixing and characterize the stationary distribution of the
Langevin Algorithm for inverting random weighted DNN generators. This result
extends the work of Hand and Voroninski from efficient inversion to efficient
posterior sampling. In practice, to allow for increased expressivity, we
propose to do posterior sampling in the latent space of a pre-trained
generative model. To achieve that, we train a score-based model in the latent
space of a StyleGAN-2 and we use it to solve inverse problems. Our framework,
Score-Guided Intermediate Layer Optimization (SGILO), extends prior work by
replacing the sparsity regularization with a generative prior in the
intermediate layer. Experimentally, we obtain significant improvements over the
previous state-of-the-art, especially in the low measurement regime. |
1,432 | The Consistency of Adversarial Training for Binary Classification | Robustness to adversarial perturbations is of paramount concern in modern
machine learning. One of the state-of-the-art methods for training robust
classifiers is adversarial training, which involves minimizing a supremum-based
surrogate risk. The statistical consistency of surrogate risks is well
understood in the context of standard machine learning, but not in the
adversarial setting. In this paper, we characterize which supremum-based
surrogates are consistent for distributions absolutely continuous with respect
to Lebesgue measure in binary classification. Furthermore, we obtain
quantitative bounds relating adversarial surrogate risks to the adversarial
classification risk. Lastly, we discuss implications for the $\cH$-consistency
of adversarial training. |
1,433 | Existence and Minimax Theorems for Adversarial Surrogate Risks in Binary Classification | Adversarial training is one of the most popular methods for training methods
robust to adversarial attacks, however, it is not well-understood from a
theoretical perspective. We prove and existence, regularity, and minimax
theorems for adversarial surrogate risks. Our results explain some empirical
observations on adversarial robustness from prior work and suggest new
directions in algorithm development. Furthermore, our results extend previously
known existence and minimax theorems for the adversarial classification risk to
surrogate risks. |
1,434 | Fully Privacy-Preserving Federated Representation Learning via Secure Embedding Aggregation | We consider a federated representation learning framework, where with the
assistance of a central server, a group of $N$ distributed clients train
collaboratively over their private data, for the representations (or
embeddings) of a set of entities (e.g., users in a social network). Under this
framework, for the key step of aggregating local embeddings trained at the
clients in a private manner, we develop a secure embedding aggregation protocol
named SecEA, which provides information-theoretical privacy guarantees for the
set of entities and the corresponding embeddings at each client
$simultaneously$, against a curious server and up to $T < N/2$ colluding
clients. As the first step of SecEA, the federated learning system performs a
private entity union, for each client to learn all the entities in the system
without knowing which entities belong to which clients. In each aggregation
round, the local embeddings are secretly shared among the clients using
Lagrange interpolation, and then each client constructs coded queries to
retrieve the aggregated embeddings for the intended entities. We perform
comprehensive experiments on various representation learning tasks to evaluate
the utility and efficiency of SecEA, and empirically demonstrate that compared
with embedding aggregation protocols without (or with weaker) privacy
guarantees, SecEA incurs negligible performance loss (within 5%); and the
additional computation latency of SecEA diminishes for training deeper models
on larger datasets. |
1,435 | Fair Generalized Linear Models with a Convex Penalty | Despite recent advances in algorithmic fairness, methodologies for achieving
fairness with generalized linear models (GLMs) have yet to be explored in
general, despite GLMs being widely used in practice. In this paper we introduce
two fairness criteria for GLMs based on equalizing expected outcomes or
log-likelihoods. We prove that for GLMs both criteria can be achieved via a
convex penalty term based solely on the linear components of the GLM, thus
permitting efficient optimization. We also derive theoretical properties for
the resulting fair GLM estimator. To empirically demonstrate the efficacy of
the proposed fair GLM, we compare it with other well-known fair prediction
methods on an extensive set of benchmark datasets for binary classification and
regression. In addition, we demonstrate that the fair GLM can generate fair
predictions for a range of response variables, other than binary and continuous
outcomes. |
1,436 | Comment on Transferability and Input Transformation with Additive Noise | Adversarial attacks have verified the existence of the vulnerability of
neural networks. By adding small perturbations to a benign example, adversarial
attacks successfully generate adversarial examples that lead misclassification
of deep learning models. More importantly, an adversarial example generated
from a specific model can also deceive other models without modification. We
call this phenomenon ``transferability". Here, we analyze the relationship
between transferability and input transformation with additive noise by
mathematically proving that the modified optimization can produce more
transferable adversarial examples. |
1,437 | Weakly Supervised Classification of Vital Sign Alerts as Real or Artifact | A significant proportion of clinical physiologic monitoring alarms are false.
This often leads to alarm fatigue in clinical personnel, inevitably
compromising patient safety. To combat this issue, researchers have attempted
to build Machine Learning (ML) models capable of accurately adjudicating Vital
Sign (VS) alerts raised at the bedside of hemodynamically monitored patients as
real or artifact. Previous studies have utilized supervised ML techniques that
require substantial amounts of hand-labeled data. However, manually harvesting
such data can be costly, time-consuming, and mundane, and is a key factor
limiting the widespread adoption of ML in healthcare (HC). Instead, we explore
the use of multiple, individually imperfect heuristics to automatically assign
probabilistic labels to unlabeled training data using weak supervision. Our
weakly supervised models perform competitively with traditional supervised
techniques and require less involvement from domain experts, demonstrating
their use as efficient and practical alternatives to supervised learning in HC
applications of ML. |
1,438 | Adversarial Robustness is at Odds with Lazy Training | Recent works show that random neural networks are vulnerable against
adversarial attacks [Daniely and Schacham, 2020] and that such attacks can be
easily found using a single step of gradient descent [Bubeck et al., 2021]. In
this work, we take it one step further and show that a single gradient step can
find adversarial examples for networks trained in the so-called lazy regime.
This regime is interesting because even though the neural network weights
remain close to the initialization, there exist networks with small
generalization error, which can be found efficiently using first-order methods.
Our work challenges the model of the lazy regime, the dominant regime in which
neural networks are provably efficiently learnable. We show that the networks
trained in this regime, even though they enjoy good theoretical computational
guarantees, remain vulnerable to adversarial examples. To the best of our
knowledge, this is the first work to prove that such well-generalizable neural
networks are still vulnerable to adversarial attacks. |
1,439 | Analysis & Computational Complexity Reduction of Monocular and Stereo Depth Estimation Techniques | Accurate depth estimation with lowest compute and energy cost is a crucial
requirement for unmanned and battery operated autonomous systems. Robotic
applications require real time depth estimation for navigation and decision
making under rapidly changing 3D surroundings. A high accuracy algorithm may
provide the best depth estimation but may consume tremendous compute and energy
resources. A general trade-off is to choose less accurate methods for initial
depth estimate and a more accurate yet compute intensive method when needed.
Previous work has shown this trade-off can be improved by developing a
state-of-the-art method (AnyNet) to improve stereo depth estimation.
We studied both the monocular and stereo vision depth estimation methods and
investigated methods to reduce computational complexity of these methods. This
was our baseline. Consequently, our experiments show reduction of monocular
depth estimation model size by ~75% reduces accuracy by less than 2% (SSIM
metric). Our experiments with the novel stereo vision method (AnyNet) show that
accuracy of depth estimation does not degrade more than 3% (three pixel error
metric) in spite of reduction in model size by ~20%. We have shown that smaller
models can indeed perform competitively. |
1,440 | Demystifying the Base and Novel Performances for Few-shot Class-incremental Learning | Few-shot class-incremental learning (FSCIL) has addressed challenging
real-world scenarios where unseen novel classes continually arrive with few
samples. In these scenarios, it is required to develop a model that recognizes
the novel classes without forgetting prior knowledge. In other words, FSCIL
aims to maintain the base performance and improve the novel performance
simultaneously. However, there is little study to investigate the two
performances separately. In this paper, we first decompose the entire model
into four types of parameters and demonstrate that the tendency of the two
performances varies greatly with the updated parameters when the novel classes
appear. Based on the analysis, we propose a simple method for FSCIL, coined as
NoNPC, which uses normalized prototype classifiers without further training for
incremental novel classes. It is shown that our straightforward method has
comparable performance with the sophisticated state-of-the-art algorithms. |
1,441 | Rotated Digit Recognition by Variational Autoencoders with Fixed Output Distributions | This paper demonstrates that a simple modification of the variational
autoencoder (VAE) formalism enables the method to identify and classify rotated
and distorted digits. In particular, the conventional objective (cost) function
employed during the training process of a VAE both quantifies the agreement
between the input and output data records and ensures that the latent space
representation of the input data record is statistically generated with an
appropriate mean and standard deviation. After training, simulated data
realizations are generated by decoding appropriate latent space points. Since,
however, standard VAE:s trained on randomly rotated MNIST digits cannot
reliably distinguish between different digit classes since the rotated input
data is effectively compared to a similarly rotated output data record. In
contrast, an alternative implementation in which the objective function
compares the output associated with each rotated digit to a corresponding fixed
unreferenced reference digit is shown here to discriminate accurately among the
rotated digits in latent space even when the dimension of the latent space is 2
or 3. |
1,442 | CLiMB: A Continual Learning Benchmark for Vision-and-Language Tasks | Current state-of-the-art vision-and-language models are evaluated on tasks
either individually or in a multi-task setting, overlooking the challenges of
continually learning (CL) tasks as they arrive. Existing CL benchmarks have
facilitated research on task adaptation and mitigating "catastrophic
forgetting", but are limited to vision-only and language-only tasks. We present
CLiMB, a benchmark to study the challenge of learning multimodal tasks in a CL
setting, and to systematically evaluate how upstream continual learning can
rapidly generalize to new multimodal and unimodal tasks. CLiMB includes
implementations of several CL algorithms and a modified Vision-Language
Transformer (ViLT) model that can be deployed on both multimodal and unimodal
tasks. We find that common CL methods can help mitigate forgetting during
multimodal task learning, but do not enable cross-task knowledge transfer. We
envision that CLiMB will facilitate research on a new class of CL algorithms
for this challenging multimodal setting. |
1,443 | NASTAR: Noise Adaptive Speech Enhancement with Target-Conditional Resampling | For deep learning-based speech enhancement (SE) systems, the training-test
acoustic mismatch can cause notable performance degradation. To address the
mismatch issue, numerous noise adaptation strategies have been derived. In this
paper, we propose a novel method, called noise adaptive speech enhancement with
target-conditional resampling (NASTAR), which reduces mismatches with only one
sample (one-shot) of noisy speech in the target environment. NASTAR uses a
feedback mechanism to simulate adaptive training data via a noise extractor and
a retrieval model. The noise extractor estimates the target noise from the
noisy speech, called pseudo-noise. The noise retrieval model retrieves relevant
noise samples from a pool of noise signals according to the noisy speech,
called relevant-cohort. The pseudo-noise and the relevant-cohort set are
jointly sampled and mixed with the source speech corpus to prepare simulated
training data for noise adaptation. Experimental results show that NASTAR can
effectively use one noisy speech sample to adapt an SE model to a target
condition. Moreover, both the noise extractor and the noise retrieval model
contribute to model adaptation. To our best knowledge, NASTAR is the first work
to perform one-shot noise adaptation through noise extraction and retrieval. |
1,444 | ScePT: Scene-consistent, Policy-based Trajectory Predictions for Planning | Trajectory prediction is a critical functionality of autonomous systems that
share environments with uncontrolled agents, one prominent example being
self-driving vehicles. Currently, most prediction methods do not enforce scene
consistency, i.e., there are a substantial amount of self-collisions between
predicted trajectories of different agents in the scene. Moreover, many
approaches generate individual trajectory predictions per agent instead of
joint trajectory predictions of the whole scene, which makes downstream
planning difficult. In this work, we present ScePT, a policy planning-based
trajectory prediction model that generates accurate, scene-consistent
trajectory predictions suitable for autonomous system motion planning. It
explicitly enforces scene consistency and learns an agent interaction policy
that can be used for conditional prediction. Experiments on multiple real-world
pedestrians and autonomous vehicle datasets show that ScePT} matches current
state-of-the-art prediction accuracy with significantly improved scene
consistency. We also demonstrate ScePT's ability to work with a downstream
contingency planner. |
1,445 | Learning the parameters of a differential equation from its trajectory via the adjoint equation | The paper contributes to strengthening the relation between machine learning
and the theory of differential equations. In this context, the inverse problem
of fitting the parameters, and the initial condition of a differential equation
to some measurements constitutes a key issue. The paper explores an abstraction
that can be used to construct a family of loss functions with the aim of
fitting the solution of an initial value problem to a set of discrete or
continuous measurements. It is shown, that an extension of the adjoint equation
can be used to derive the gradient of the loss function as a continuous
analogue of backpropagation in machine learning. Numerical evidence is
presented that under reasonably controlled circumstances the gradients obtained
this way can be used in a gradient descent to fit the solution of an initial
value problem to a set of continuous noisy measurements, and a set of discrete
noisy measurements that are recorded at uncertain times. |
1,446 | Beyond Rewards: a Hierarchical Perspective on Offline Multiagent Behavioral Analysis | Each year, expert-level performance is attained in increasingly-complex
multiagent domains, notable examples including Go, Poker, and StarCraft II.
This rapid progression is accompanied by a commensurate need to better
understand how such agents attain this performance, to enable their safe
deployment, identify limitations, and reveal potential means of improving them.
In this paper we take a step back from performance-focused multiagent learning,
and instead turn our attention towards agent behavior analysis. We introduce a
model-agnostic method for discovery of behavior clusters in multiagent domains,
using variational inference to learn a hierarchy of behaviors at the joint and
local agent levels. Our framework makes no assumption about agents' underlying
learning algorithms, does not require access to their latent states or models,
and can be trained using entirely offline observational data. We illustrate the
effectiveness of our method for enabling the coupled understanding of behaviors
at the joint and local agent level, detection of behavior changepoints
throughout training, discovery of core behavioral concepts (e.g., those that
facilitate higher returns), and demonstrate the approach's scalability to a
high-dimensional multiagent MuJoCo control domain. |
1,447 | Riemannian CUR Decompositions for Robust Principal Component Analysis | Robust Principal Component Analysis (PCA) has received massive attention in
recent years. It aims to recover a low-rank matrix and a sparse matrix from
their sum. This paper proposes a novel nonconvex Robust PCA algorithm, coined
Riemannian CUR (RieCUR), which utilizes the ideas of Riemannian optimization
and robust CUR decompositions. This algorithm has the same computational
complexity as Iterated Robust CUR, which is currently state-of-the-art, but is
more robust to outliers. RieCUR is also able to tolerate a significant amount
of outliers, and is comparable to Accelerated Alternating Projections, which
has high outlier tolerance but worse computational complexity than the proposed
method. Thus, the proposed algorithm achieves state-of-the-art performance on
Robust PCA both in terms of computational complexity and outlier tolerance. |
1,448 | Accelerating Machine Learning Training Time for Limit Order Book Prediction | Financial firms are interested in simulation to discover whether a given
algorithm involving financial machine learning will operate profitably. While
many versions of this type of algorithm have been published recently by
researchers, the focus herein is on a particular machine learning training
project due to the explainable nature and the availability of high frequency
market data. For this task, hardware acceleration is expected to speed up the
time required for the financial machine learning researcher to obtain the
results. As the majority of the time can be spent in classifier training, there
is interest in faster training steps. A published Limit Order Book algorithm
for predicting stock market direction is our subject, and the machine learning
training process can be time-intensive especially when considering the
iterative nature of model development. To remedy this, we deploy Graphical
Processing Units (GPUs) produced by NVIDIA available in the data center where
the computer architecture is geared to parallel high-speed arithmetic
operations. In the studied configuration, this leads to significantly faster
training time allowing more efficient and extensive model development. |
1,449 | Energy reconstruction for large liquid scintillator detectors with machine learning techniques: aggregated features approach | Large scale detectors consisting of a liquid scintillator (LS) target
surrounded by an array of photo-multiplier tubes (PMT) are widely used in
modern neutrino experiments: Borexino, KamLAND, Daya Bay, Double Chooz, RENO,
and upcoming JUNO with its satellite detector TAO. Such apparatuses are able to
measure neutrino energy, which can be derived from the amount of light and its
spatial and temporal distribution over PMT-channels. However, achieving a fine
energy resolution in large scale detectors is challenging. In this work, we
present machine learning methods for energy reconstruction in JUNO, the most
advanced detector of its type. We focus on positron events in the energy range
of 0-10 MeV which corresponds to the main signal in JUNO $-$ neutrinos
originated from nuclear reactor cores and detected via an inverse beta-decay
channel. We consider Boosted Decision Trees and Fully Connected Deep Neural
Network trained on aggregated features, calculated using information collected
by PMTs. We describe the details of our feature engineering procedure and show
that machine learning models can provide energy resolution $\sigma = 3\%$ at 1
MeV using subsets of engineered features. The dataset for model training and
testing is generated by the Monte Carlo method with the official JUNO software.
Consideration of calibration sources for evaluation of the reconstruction
algorithms performance on real data is also presented. |
1,450 | Validation of Vector Data using Oblique Images | Oblique images are aerial photographs taken at oblique angles to the earth's
surface. Projections of vector and other geospatial data in these images depend
on camera parameters, positions of the geospatial entities, surface terrain,
occlusions, and visibility. This paper presents a robust and scalable algorithm
to detect inconsistencies in vector data using oblique images. The algorithm
uses image descriptors to encode the local appearance of a geospatial entity in
images. These image descriptors combine color, pixel-intensity gradients,
texture, and steerable filter responses. A Support Vector Machine classifier is
trained to detect image descriptors that are not consistent with underlying
vector data, digital elevation maps, building models, and camera parameters. In
this paper, we train the classifier on visible road segments and non-road data.
Thereafter, the trained classifier detects inconsistencies in vectors, which
include both occluded and misaligned road segments. The consistent road
segments validate our vector, DEM, and 3-D model data for those areas while
inconsistent segments point out errors. We further show that a search for
descriptors that are consistent with visible road segments in the neighborhood
of a misaligned road yields the desired road alignment that is consistent with
pixels in the image. |
1,451 | AnyMorph: Learning Transferable Polices By Inferring Agent Morphology | The prototypical approach to reinforcement learning involves training
policies tailored to a particular agent from scratch for every new morphology.
Recent work aims to eliminate the re-training of policies by investigating
whether a morphology-agnostic policy, trained on a diverse set of agents with
similar task objectives, can be transferred to new agents with unseen
morphologies without re-training. This is a challenging problem that required
previous approaches to use hand-designed descriptions of the new agent's
morphology. Instead of hand-designing this description, we propose a
data-driven method that learns a representation of morphology directly from the
reinforcement learning objective. Ours is the first reinforcement learning
algorithm that can train a policy to generalize to new agent morphologies
without requiring a description of the agent's morphology in advance. We
evaluate our approach on the standard benchmark for agent-agnostic control, and
improve over the current state of the art in zero-shot generalization to new
agents. Importantly, our method attains good performance without an explicit
description of morphology. |
1,452 | Stop Overcomplicating Selective Classification: Use Max-Logit | We tackle the problem of Selective Classification where the goal is to
achieve the best performance on the desired coverages of the dataset. Recent
state-of-the-art selective methods come with architectural changes either via
introducing a separate selection head or an extra abstention logit. In this
paper, we present surprising results for Selective Classification by confirming
that the superior performance of state-of-the-art methods is owed to training a
more generalizable classifier; however, their selection mechanism is
suboptimal. We argue that the selection mechanism should be rooted in the
objective function instead of a separately calculated score. Accordingly, in
this paper, we motivate an alternative selection strategy that is based on the
cross entropy loss for the classification settings, namely, max of the logits.
Our proposed selection strategy achieves better results by a significant
margin, consistently, across all coverages and all datasets, without any
additional computation. Finally, inspired by our superior selection mechanism,
we propose to further regularize the objective function with
entropy-minimization. Our proposed max-logit selection with the modified loss
function achieves new state-of-the-art results for Selective Classification. |
1,453 | Binary Early-Exit Network for Adaptive Inference on Low-Resource Devices | Deep neural networks have significantly improved performance on a range of
tasks with the increasing demand for computational resources, leaving
deployment on low-resource devices (with limited memory and battery power)
infeasible. Binary neural networks (BNNs) tackle the issue to an extent with
extreme compression and speed-up gains compared to real-valued models. We
propose a simple but effective method to accelerate inference through unifying
BNNs with an early-exiting strategy. Our approach allows simple instances to
exit early based on a decision threshold and utilizes output layers added to
different intermediate layers to avoid executing the entire binary model. We
extensively evaluate our method on three audio classification tasks and across
four BNNs architectures. Our method demonstrates favorable quality-efficiency
trade-offs while being controllable with an entropy-based threshold specified
by the system user. It also results in better speed-ups (latency less than 6ms)
with a single model based on existing BNN architectures without retraining for
different efficiency levels. It also provides a straightforward way to estimate
sample difficulty and better understanding of uncertainty around certain
classes within the dataset. |
1,454 | Landscape Learning for Neural Network Inversion | Many machine learning methods operate by inverting a neural network at
inference time, which has become a popular technique for solving inverse
problems in computer vision, robotics, and graphics. However, these methods
often involve gradient descent through a highly non-convex loss landscape,
causing the optimization process to be unstable and slow. We introduce a method
that learns a loss landscape where gradient descent is efficient, bringing
massive improvement and acceleration to the inversion process. We demonstrate
this advantage on a number of methods for both generative and discriminative
tasks, including GAN inversion, adversarial defense, and 3D human pose
reconstruction. |
1,455 | Designing MacPherson Suspension Architectures using Bayesian Optimization | Engineering design is traditionally performed by hand: an expert makes design
proposals based on past experience, and these proposals are then tested for
compliance with certain target specifications. Testing for compliance is
performed first by computer simulation using what is called a discipline model.
Such a model can be implemented by a finite element analysis, multibody systems
approach, etc. Designs passing this simulation are then considered for physical
prototyping. The overall process may take months, and is a significant cost in
practice. We have developed a Bayesian optimization system for partially
automating this process by directly optimizing compliance with the target
specification with respect to the design parameters. The proposed method is a
general framework for computing a generalized inverse of a high-dimensional
non-linear function that does not require e.g. gradient information, which is
often unavailable from discipline models. We furthermore develop a two-tier
convergence criterion based on (i) convergence to a solution optimally
satisfying all specified design criteria, or (ii) convergence to a minimum-norm
solution. We demonstrate the proposed approach on a vehicle chassis design
problem motivated by an industry setting using a state-of-the-art commercial
discipline model. We show that the proposed approach is general, scalable, and
efficient, and that the novel convergence criteria can be implemented
straightforwardly based on existing concepts and subroutines in popular
Bayesian optimization software packages. |
1,456 | Conditional Permutation Invariant Flows | We present a novel, conditional generative probabilistic model of set-valued
data with a tractable log density. This model is a continuous normalizing flow
governed by permutation equivariant dynamics. These dynamics are driven by a
learnable per-set-element term and pairwise interactions, both parametrized by
deep neural networks. We illustrate the utility of this model via applications
including (1) complex traffic scene generation conditioned on visually
specified map information, and (2) object bounding box generation conditioned
directly on images. We train our model by maximizing the expected likelihood of
labeled conditional data under our flow, with the aid of a penalty that ensures
the dynamics are smooth and hence efficiently solvable. Our method
significantly outperforms non-permutation invariant baselines in terms of log
likelihood and domain-specific metrics (offroad, collision, and combined
infractions), yielding realistic samples that are difficult to distinguish from
real data. |
1,457 | Path-Gradient Estimators for Continuous Normalizing Flows | Recent work has established a path-gradient estimator for simple variational
Gaussian distributions and has argued that the path-gradient is particularly
beneficial in the regime in which the variational distribution approaches the
exact target distribution. In many applications, this regime can however not be
reached by a simple Gaussian variational distribution. In this work, we
overcome this crucial limitation by proposing a path-gradient estimator for the
considerably more expressive variational family of continuous normalizing
flows. We outline an efficient algorithm to calculate this estimator and
establish its superior performance empirically. |
1,458 | Diffusion models as plug-and-play priors | We consider the problem of inferring high-dimensional data $\mathbf{x}$ in a
model that consists of a prior $p(\mathbf{x})$ and an auxiliary constraint
$c(\mathbf{x},\mathbf{y})$. In this paper, the prior is an independently
trained denoising diffusion generative model. The auxiliary constraint is
expected to have a differentiable form, but can come from diverse sources. The
possibility of such inference turns diffusion models into plug-and-play
modules, thereby allowing a range of potential applications in adapting models
to new domains and tasks, such as conditional generation or image segmentation.
The structure of diffusion models allows us to perform approximate inference by
iterating differentiation through the fixed denoising network enriched with
different amounts of noise at each step. Considering many noised versions of
$\mathbf{x}$ in evaluation of its fitness is a novel search mechanism that may
lead to new algorithms for solving combinatorial optimization problems. |
1,459 | LIMO: Latent Inceptionism for Targeted Molecule Generation | Generation of drug-like molecules with high binding affinity to target
proteins remains a difficult and resource-intensive task in drug discovery.
Existing approaches primarily employ reinforcement learning, Markov sampling,
or deep generative models guided by Gaussian processes, which can be
prohibitively slow when generating molecules with high binding affinity
calculated by computationally-expensive physics-based methods. We present
Latent Inceptionism on Molecules (LIMO), which significantly accelerates
molecule generation with an inceptionism-like technique. LIMO employs a
variational autoencoder-generated latent space and property prediction by two
neural networks in sequence to enable faster gradient-based
reverse-optimization of molecular properties. Comprehensive experiments show
that LIMO performs competitively on benchmark tasks and markedly outperforms
state-of-the-art techniques on the novel task of generating drug-like compounds
with high binding affinity, reaching nanomolar range against two protein
targets. We corroborate these docking-based results with more accurate
molecular dynamics-based calculations of absolute binding free energy and show
that one of our generated drug-like compounds has a predicted $K_D$ (a measure
of binding affinity) of $6 \cdot 10^{-14}$ M against the human estrogen
receptor, well beyond the affinities of typical early-stage drug candidates and
most FDA-approved drugs to their respective targets. Code is available at
https://github.com/Rose-STL-Lab/LIMO. |
1,460 | Towards Efficient Active Learning of PDFA | We propose a new active learning algorithm for PDFA based on three main
aspects: a congruence over states which takes into account next-symbol
probability distributions, a quantization that copes with differences in
distributions, and an efficient tree-based data structure. Experiments showed
significant performance gains with respect to reference implementations. |
1,461 | Cluster Generation via Deep Energy-Based Model | We present a new approach for the generation of stable structures of
nanoclusters using deep learning methods. Our method consists in constructing
an artificial potential energy surface, with local minima corresponding to the
most stable structures and which is much smoother than "real" potential in the
intermediate regions of the configuration space. To build the surface, graph
convolutional networks are used. The method can extrapolates the potential
surface to cases of structures with larger number of atoms than was used in
training. Thus, having a sufficient number of low-energy structures in the
training set, the method allows to generate new candidates for the ground-state
structures, including ones with larger number of atoms. We applied the approach
to silica clusters $(SiO_2)_n$ and for the first time found the stable
structures with n=28...51. The method is universal and does not depend on the
atomic composition and number of atoms. |
1,462 | A review of machine learning concepts and methods for addressing challenges in probabilistic hydrological post-processing and forecasting | Probabilistic forecasting is receiving growing attention nowadays in a
variety of applied fields, including hydrology. Several machine learning
concepts and methods are notably relevant to formalizing and optimizing
probabilistic forecasting implementations by addressing the relevant
challenges. Nonetheless, practically-oriented reviews focusing on such concepts
and methods are currently missing from the probabilistic hydrological
forecasting literature. This absence holds despite the pronounced
intensification in the research efforts for benefitting from machine learning
in this same literature, and despite the substantial relevant progress that has
recently emerged, especially in the field of probabilistic hydrological
post-processing, which traditionally provides the hydrologists with
probabilistic hydrological forecasting implementations. Herein, we aim to fill
this specific gap. In our review, we emphasize key ideas and information that
can lead to effective popularizations of the studied concepts and methods, as
such an emphasis can support successful future implementations and further
scientific developments in the field. In the same forward-looking direction, we
identify open research questions and propose ideas to be explored in the
future. |
1,463 | Robust Group Synchronization via Quadratic Programming | We propose a novel quadratic programming formulation for estimating the
corruption levels in group synchronization, and use these estimates to solve
this problem. Our objective function exploits the cycle consistency of the
group and we thus refer to our method as detection and estimation of structural
consistency (DESC). This general framework can be extended to other algebraic
and geometric structures. Our formulation has the following advantages: it can
tolerate corruption as high as the information-theoretic bound, it does not
require a good initialization for the estimates of group elements, it has a
simple interpretation, and under some mild conditions the global minimum of our
objective function exactly recovers the corruption levels. We demonstrate the
competitive accuracy of our approach on both synthetic and real data
experiments of rotation averaging. |
1,464 | StaDRe and StaDRo: Reliability and Robustness Estimation of ML-based Forecasting using Statistical Distance Measures | Reliability estimation of Machine Learning (ML) models is becoming a crucial
subject. This is particularly the case when such \mbox{models} are deployed in
safety-critical applications, as the decisions based on model predictions can
result in hazardous situations. In this regard, recent research has proposed
methods to achieve safe, \mbox{dependable}, and reliable ML systems. One such
method consists of detecting and analyzing distributional shift, and then
measuring how such systems respond to these shifts. This was proposed in
earlier work in SafeML. This work focuses on the use of SafeML for time series
data, and on reliability and robustness estimation of ML-forecasting methods
using statistical distance measures. To this end, distance measures based on
the Empirical Cumulative Distribution Function (ECDF) proposed in SafeML are
explored to measure Statistical-Distance Dissimilarity (SDD) across time
series. We then propose SDD-based Reliability Estimate (StaDRe) and SDD-based
Robustness (StaDRo) measures. With the help of a clustering technique, the
similarity between the statistical properties of data seen during training and
the forecasts is identified. The proposed method is capable of providing a link
between dataset SDD and Key Performance Indicators (KPIs) of the ML models. |
1,465 | Multi-scale Super-resolution Magnetic Resonance Spectroscopic Imaging with Adjustable Sharpness | Magnetic Resonance Spectroscopic Imaging (MRSI) is a valuable tool for
studying metabolic activities in the human body, but the current applications
are limited to low spatial resolutions. The existing deep learning-based MRSI
super-resolution methods require training a separate network for each upscaling
factor, which is time-consuming and memory inefficient. We tackle this
multi-scale super-resolution problem using a Filter Scaling strategy that
modulates the convolution filters based on the upscaling factor, such that a
single network can be used for various upscaling factors. Observing that each
metabolite has distinct spatial characteristics, we also modulate the network
based on the specific metabolite. Furthermore, our network is conditioned on
the weight of adversarial loss so that the perceptual sharpness of the
super-resolved metabolic maps can be adjusted within a single network. We
incorporate these network conditionings using a novel Multi-Conditional Module.
The experiments were carried out on a 1H-MRSI dataset from 15 high-grade glioma
patients. Results indicate that the proposed network achieves the best
performance among several multi-scale super-resolution methods and can provide
super-resolved metabolic maps with adjustable sharpness. |
1,466 | ck-means, a novel unsupervised learning method that combines fuzzy and crispy clustering methods to extract intersecting data | Clustering data is a popular feature in the field of unsupervised machine
learning. Most algorithms aim to find the best method to extract consistent
clusters of data, but very few of them intend to cluster data that share the
same intersections between two features or more. This paper proposes a method
to do so. The main idea of this novel method is to generate fuzzy clusters of
data using a Fuzzy C-Means (FCM) algorithm. The second part involves applying a
filter that selects a range of minimum and maximum membership values,
emphasizing the border data. A {\mu} parameter defines the amplitude of this
range. It finally applies a k-means algorithm using the membership values
generated by the FCM. Naturally, the data having similar membership values will
regroup in a new crispy cluster. The algorithm is also able to find the optimal
number of clusters for the FCM and the k-means algorithm, according to the
consistency of the clusters given by the Silhouette Index (SI). The result is a
list of data and clusters that regroup data sharing the same intersection,
intersecting two features or more. ck-means allows extracting the very similar
data that does not naturally fall in the same cluster but at the intersection
of two clusters or more. The algorithm also always finds itself the optimal
number of clusters. |
1,467 | Explainable Global Error Weighted on Feature Importance: The xGEWFI metric to evaluate the error of data imputation and data augmentation | Evaluating the performance of an algorithm is crucial. Evaluating the
performance of data imputation and data augmentation can be similar since both
generated data can be compared with an original distribution. Although, the
typical evaluation metrics have the same flaw: They calculate the feature's
error and the global error on the generated data without weighting the error
with the feature importance. The result can be good if all of the feature's
importance is similar. However, in most cases, the importance of the features
is imbalanced, and it can induce an important bias on the features and global
errors. This paper proposes a novel metric named "Explainable Global Error
Weighted on Feature Importance"(xGEWFI). This new metric is tested in a whole
preprocessing method that 1. detects the outliers and replaces them with a null
value. 2. imputes the data missing, and 3. augments the data. At the end of the
process, the xGEWFI error is calculated. The distribution error between the
original and generated data is calculated using a Kolmogorov-Smirnov test (KS
test) for each feature. Those results are multiplied by the importance of the
respective features, calculated using a Random Forest (RF) algorithm. The
metric result is expressed in an explainable format, aiming for an ethical AI. |
1,468 | DPDR: A novel machine learning method for the Decision Process for Dimensionality Reduction | This paper discusses the critical decision process of extracting or selecting
the features in a supervised learning context. It is often confusing to find a
suitable method to reduce dimensionality. There are pros and cons to deciding
between a feature selection and feature extraction according to the data's
nature and the user's preferences. Indeed, the user may want to emphasize the
results toward integrity or interpretability and a specific data resolution.
This paper proposes a new method to choose the best dimensionality reduction
method in a supervised learning context. It also helps to drop or reconstruct
the features until a target resolution is reached. This target resolution can
be user-defined, or it can be automatically defined by the method. The method
applies a regression or a classification, evaluates the results, and gives a
diagnosis about the best dimensionality reduction process in this specific
supervised learning context. The main algorithms used are the Random Forest
algorithms (RF), the Principal Component Analysis (PCA) algorithm, and the
multilayer perceptron (MLP) neural network algorithm. Six use cases are
presented, and every one is based on some well-known technique to generate
synthetic data. This research discusses each choice that can be made in the
process, aiming to clarify the issues about the entire decision process of
selecting or extracting the features. |
1,469 | Shallow and Deep Nonparametric Convolutions for Gaussian Processes | A key challenge in the practical application of Gaussian processes (GPs) is
selecting a proper covariance function. The moving average, or process
convolutions, construction of GPs allows some additional flexibility, but still
requires choosing a proper smoothing kernel, which is non-trivial. Previous
approaches have built covariance functions by using GP priors over the
smoothing kernel, and by extension the covariance, as a way to bypass the need
to specify it in advance. However, such models have been limited in several
ways: they are restricted to single dimensional inputs, e.g. time; they only
allow modelling of single outputs and they do not scale to large datasets since
inference is not straightforward. In this paper, we introduce a nonparametric
process convolution formulation for GPs that alleviates these weaknesses by
using a functional sampling approach based on Matheron's rule to perform fast
sampling using interdomain inducing variables. Furthermore, we propose a
composition of these nonparametric convolutions that serves as an alternative
to classic deep GP models, and allows the covariance functions of the
intermediate layers to be inferred from the data. We test the performance of
our model on benchmarks for single output GPs, multiple output GPs and deep GPs
and find that in many cases our approach can provide improvements over standard
GP models. |
1,470 | Random Forest of Epidemiological Models for Influenza Forecasting | Forecasting the hospitalizations caused by the Influenza virus is vital for
public health planning so that hospitals can be better prepared for an influx
of patients. Many forecasting methods have been used in real-time during the
Influenza seasons and submitted to the CDC for public communication. The
forecasting models range from mechanistic models, and auto-regression models to
machine learning models. We hypothesize that we can improve forecasting by
using multiple mechanistic models to produce potential trajectories and use
machine learning to learn how to combine those trajectories into an improved
forecast. We propose a Tree Ensemble model design that utilizes the individual
predictors of our baseline model SIkJalpha to improve its performance. Each
predictor is generated by changing a set of hyper-parameters. We compare our
prospective forecasts deployed for the FluSight challenge (2022) to all the
other submitted approaches. Our approach is fully automated and does not
require any manual tuning. We demonstrate that our Random Forest-based approach
is able to improve upon the forecasts of the individual predictors in terms of
mean absolute error, coverage, and weighted interval score. Our method
outperforms all other models in terms of the mean absolute error and the
weighted interval score based on the mean across all weekly submissions in the
current season (2022). Explainability of the Random Forest (through analysis of
the trees) enables us to gain insights into how it improves upon the individual
predictors. |
1,471 | Actionable Guidance for High-Consequence AI Risk Management: Towards Standards Addressing AI Catastrophic Risks | Artificial intelligence (AI) systems can provide many beneficial capabilities
but also risks of adverse events. Some AI systems could present risks of events
with very high or catastrophic consequences at societal scale. The US National
Institute of Standards and Technology (NIST) is developing the NIST Artificial
Intelligence Risk Management Framework (AI RMF) as voluntary guidance on AI
risk assessment and management for AI developers and others. For addressing
risks of events with catastrophic consequences, NIST indicated a need to
translate from high level principles to actionable risk management guidance.
In this document, we provide detailed actionable-guidance recommendations
focused on identifying and managing risks of events with very high or
catastrophic consequences, intended as a risk management practices resource for
NIST for AI RMF version 1.0 (scheduled for release in early 2023), or for AI
RMF users, or for other AI risk management guidance and standards as
appropriate. We also provide our methodology for our recommendations.
We provide actionable-guidance recommendations for AI RMF 1.0 on: identifying
risks from potential unintended uses and misuses of AI systems; including
catastrophic-risk factors within the scope of risk assessments and impact
assessments; identifying and mitigating human rights harms; and reporting
information on AI risk factors including catastrophic-risk factors.
In addition, we provide recommendations on additional issues for a roadmap
for later versions of the AI RMF or supplementary publications. These include:
providing an AI RMF Profile with supplementary guidance for cutting-edge
increasingly multi-purpose or general-purpose AI.
We aim for this work to be a concrete risk-management practices contribution,
and to stimulate constructive dialogue on how to address catastrophic risks and
associated issues in AI standards. |
1,472 | Transformer Neural Networks Attending to Both Sequence and Structure for Protein Prediction Tasks | The increasing number of protein sequences decoded from genomes is opening up
new avenues of research on linking protein sequence to function with
transformer neural networks. Recent research has shown that the number of known
protein sequences supports learning useful, task-agnostic sequence
representations via transformers. In this paper, we posit that learning joint
sequence-structure representations yields better representations for
function-related prediction tasks. We propose a transformer neural network that
attends to both sequence and tertiary structure. We show that such joint
representations are more powerful than sequence-based representations only, and
they yield better performance on superfamily membership across various metrics. |
1,473 | Design of Multi-model Linear Inferential Sensors with SVM-based Switching Logic | We study the problem of data-based design of multi-model linear inferential
(soft) sensors. The multi-model linear inferential sensors promise increased
prediction accuracy yet simplicity of the model structure and training. The
standard approach to the multi-model inferential sensor design consists in
three separate steps: 1) data labeling (establishing training subsets for
individual models), 2) data classification (creating a switching logic for the
models), and 3) training of individual models. There are two main issues with
this concept: a) as steps 2) & 3) are separate, discontinuities can occur when
switching between the models; b) as steps 1) & 3) are separate, data labelling
disregards the quality of the resulting model. Our contribution aims at both
the mentioned problems, where, for the problem a), we introduce a novel
SVM-based model training coupled with switching logic identification and, for
the problem b), we propose a direct optimization of data labelling. We
illustrate the proposed methodology and its benefits on an example from the
chemical engineering domain. |
1,474 | Intra-Instance VICReg: Bag of Self-Supervised Image Patch Embedding | Recently, self-supervised learning (SSL) has achieved tremendous empirical
advancements in learning image representation. However, our understanding and
knowledge of the representation are still limited. This work shows that the
success of the SOTA siamese-network-based SSL approaches is primarily based on
learning a representation of image patches. Particularly, we show that when we
learn a representation only for fixed-scale image patches and aggregate
different patch representations linearly for an image (instance), it can
achieve on par or even better results than the baseline methods on several
benchmarks. Further, we show that the patch representation aggregation can also
improve various SOTA baseline methods by a large margin. We also establish a
formal connection between the SSL objective and the image patches co-occurrence
statistics modeling, which supplements the prevailing invariance perspective.
By visualizing the nearest neighbors of different image patches in the
embedding space and projection space, we show that while the projection has
more invariance, the embedding space tends to preserve more equivariance and
locality. Finally, we propose a hypothesis for the future direction based on
the discovery of this work. |
1,475 | The Impact of Variable Ordering on Bayesian Network Structure Learning | Causal Bayesian Networks provide an important tool for reasoning under
uncertainty with potential application to many complex causal systems.
Structure learning algorithms that can tell us something about the causal
structure of these systems are becoming increasingly important. In the
literature, the validity of these algorithms is often tested for sensitivity
over varying sample sizes, hyper-parameters, and occasionally objective
functions. In this paper, we show that the order in which the variables are
read from data can have much greater impact on the accuracy of the algorithm
than these factors. Because the variable ordering is arbitrary, any significant
effect it has on learnt graph accuracy is concerning, and this raises questions
about the validity of the results produced by algorithms that are sensitive to,
but have not been assessed against, different variable orderings. |
1,476 | Photoelectric Factor Prediction Using Automated Learning and Uncertainty Quantification | The photoelectric factor (PEF) is an important well logging tool to
distinguish between different types of reservoir rocks because PEF measurement
is sensitive to elements with high atomic number. Furthermore, the ratio of
rock minerals could be determined by combining PEF log with other well logs.
However, PEF log could be missing in some cases such as in old well logs and
wells drilled with barite-based mud. Therefore, developing models for
estimating missing PEF log is essential in those circumstances. In this work,
we developed various machine learning models to predict PEF values using the
following well logs as inputs: bulk density (RHOB), neutron porosity (NPHI),
gamma ray (GR), compressional and shear velocity.
The predictions of PEF values using adaptive-network-fuzzy inference system
(ANFIS) and artificial neural network (ANN) models have errors of about 16% and
14% average absolute percentage error (AAPE) in the testing dataset,
respectively. Thus, a different approach was proposed that is based on the
concept of automated machine learning. It works by automatically searching for
the optimal model type and optimizes its hyperparameters for the dataset under
investigation. This approach selected a Gaussian process regression (GPR) model
for accurate estimation of PEF values. The developed GPR model decreases the
AAPE of the predicted PEF values in the testing dataset to about 10% AAPE. This
error could be further decreased to about 2% by modeling the potential noise in
the measurements using the GPR model. |
1,477 | Score-based Generative Models for Calorimeter Shower Simulation | Score-based generative models are a new class of generative algorithms that
have been shown to produce realistic images even in high dimensional spaces,
currently surpassing other state-of-the-art models for different benchmark
categories and applications. In this work we introduce CaloScore, a score-based
generative model for collider physics applied to calorimeter shower generation.
Three different diffusion models are investigated using the Fast Calorimeter
Simulation Challenge 2022 dataset. CaloScore is the first application of a
score-based generative model in collider physics and is able to produce
high-fidelity calorimeter images for all datasets, providing an alternative
paradigm for calorimeter shower simulation. |
1,478 | Learning a Single Neuron with Adversarial Label Noise via Gradient Descent | We study the fundamental problem of learning a single neuron, i.e., a
function of the form $\mathbf{x}\mapsto\sigma(\mathbf{w}\cdot\mathbf{x})$ for
monotone activations $\sigma:\mathbb{R}\mapsto\mathbb{R}$, with respect to the
$L_2^2$-loss in the presence of adversarial label noise. Specifically, we are
given labeled examples from a distribution $D$ on $(\mathbf{x},
y)\in\mathbb{R}^d \times \mathbb{R}$ such that there exists
$\mathbf{w}^\ast\in\mathbb{R}^d$ achieving $F(\mathbf{w}^\ast)=\epsilon$, where
$F(\mathbf{w})=\mathbf{E}_{(\mathbf{x},y)\sim D}[(\sigma(\mathbf{w}\cdot
\mathbf{x})-y)^2]$. The goal of the learner is to output a hypothesis vector
$\mathbf{w}$ such that $F(\mathbb{w})=C\, \epsilon$ with high probability,
where $C>1$ is a universal constant. As our main contribution, we give
efficient constant-factor approximate learners for a broad class of
distributions (including log-concave distributions) and activation functions.
Concretely, for the class of isotropic log-concave distributions, we obtain the
following important corollaries:
For the logistic activation, we obtain the first polynomial-time constant
factor approximation (even under the Gaussian distribution). Our algorithm has
sample complexity $\widetilde{O}(d/\epsilon)$, which is tight within
polylogarithmic factors.
For the ReLU activation, we give an efficient algorithm with sample
complexity $\tilde{O}(d\, \polylog(1/\epsilon))$. Prior to our work, the best
known constant-factor approximate learner had sample complexity
$\tilde{\Omega}(d/\epsilon)$.
In both of these settings, our algorithms are simple, performing
gradient-descent on the (regularized) $L_2^2$-loss. The correctness of our
algorithms relies on novel structural results that we establish, showing that
(essentially all) stationary points of the underlying non-convex loss are
approximately optimal. |
1,479 | The Open Catalyst 2022 (OC22) Dataset and Challenges for Oxide Electrocatalysis | Computational catalysis and machine learning communities have made
considerable progress in developing machine learning models for catalyst
discovery and design. Yet, a general machine learning potential that spans the
chemical space of catalysis is still out of reach. A significant hurdle is
obtaining access to training data across a wide range of materials. One
important class of materials where data is lacking are oxides, which inhibits
models from studying the Oxygen Evolution Reaction and oxide electrocatalysis
more generally. To address this we developed the Open Catalyst 2022(OC22)
dataset, consisting of 62,521 Density Functional Theory (DFT) relaxations
(~9,884,504 single point calculations) across a range of oxide materials,
coverages, and adsorbates (*H, *O, *N, *C, *OOH, *OH, *OH2, *O2, *CO). We
define generalized tasks to predict the total system energy that are applicable
across catalysis, develop baseline performance of several graph neural networks
(SchNet, DimeNet++, ForceNet, SpinConv, PaiNN, GemNet-dT, GemNet-OC), and
provide pre-defined dataset splits to establish clear benchmarks for future
efforts. For all tasks, we study whether combining datasets leads to better
results, even if they contain different materials or adsorbates. Specifically,
we jointly train models on Open Catalyst 2020 (OC20) Dataset and OC22, or
fine-tune pretrained OC20 models on OC22. In the most general task, GemNet-OC
sees a ~32% improvement in energy predictions through fine-tuning and a ~9%
improvement in force predictions via joint training. Surprisingly, joint
training on both the OC20 and much smaller OC22 datasets also improves total
energy predictions on OC20 by ~19%. The dataset and baseline models are open
sourced, and a public leaderboard will follow to encourage continued community
developments on the total energy tasks and data. |
1,480 | SYMBA: Symbolic Computation of Squared Amplitudes in High Energy Physics with Machine Learning | The cross section is one of the most important physical quantities in
high-energy physics and the most time consuming to compute. While machine
learning has proven to be highly successful in numerical calculations in
high-energy physics, analytical calculations using machine learning are still
in their infancy. In this work, we use a sequence-to-sequence transformer model
to compute a key element of the cross section calculation, namely, the squared
amplitude of an interaction. We show that a transformer model is able to
predict correctly 89.0% and 99.4% of squared amplitudes of QCD and QED
processes, respectively. We discuss the performance of the current model, its
limitations and possible future directions for this work. |
1,481 | Approximate Equivariance SO(3) Needlet Convolution | This paper develops a rotation-invariant needlet convolution for rotation
group SO(3) to distill multiscale information of spherical signals. The
spherical needlet transform is generalized from $\mathbb{S}^2$ onto the SO(3)
group, which decomposes a spherical signal to approximate and detailed spectral
coefficients by a set of tight framelet operators. The spherical signal during
the decomposition and reconstruction achieves rotation invariance. Based on
needlet transforms, we form a Needlet approximate Equivariance Spherical CNN
(NES) with multiple SO(3) needlet convolutional layers. The network establishes
a powerful tool to extract geometric-invariant features of spherical signals.
The model allows sufficient network scalability with multi-resolution
representation. A robust signal embedding is learned with wavelet shrinkage
activation function, which filters out redundant high-pass representation while
maintaining approximate rotation invariance. The NES achieves state-of-the-art
performance for quantum chemistry regression and Cosmic Microwave Background
(CMB) delensing reconstruction, which shows great potential for solving
scientific challenges with high-resolution and multi-scale spherical signal
representation. |
1,482 | Adapting the Linearised Laplace Model Evidence for Modern Deep Learning | The linearised Laplace method for estimating model uncertainty has received
renewed attention in the Bayesian deep learning community. The method provides
reliable error bars and admits a closed-form expression for the model evidence,
allowing for scalable selection of model hyperparameters. In this work, we
examine the assumptions behind this method, particularly in conjunction with
model selection. We show that these interact poorly with some now-standard
tools of deep learning--stochastic approximation methods and normalisation
layers--and make recommendations for how to better adapt this classic method to
the modern setting. We provide theoretical support for our recommendations and
validate them empirically on MLPs, classic CNNs, residual networks with and
without normalisation layers, generative autoencoders and transformers. |
1,483 | Popular decision tree algorithms are provably noise tolerant | Using the framework of boosting, we prove that all impurity-based decision
tree learning algorithms, including the classic ID3, C4.5, and CART, are highly
noise tolerant. Our guarantees hold under the strongest noise model of nasty
noise, and we provide near-matching upper and lower bounds on the allowable
noise rate. We further show that these algorithms, which are simple and have
long been central to everyday machine learning, enjoy provable guarantees in
the noisy setting that are unmatched by existing algorithms in the theoretical
literature on decision tree learning. Taken together, our results add to an
ongoing line of research that seeks to place the empirical success of these
practical decision tree algorithms on firm theoretical footing. |
1,484 | Scaling multi-species occupancy models to large citizen science datasets | Citizen science datasets can be very large and promise to improve species
distribution modelling, but detection is imperfect, risking bias when fitting
models. In particular, observers may not detect species that are actually
present. Occupancy models can estimate and correct for this observation
process, and multi-species occupancy models exploit similarities in the
observation process, which can improve estimates for rare species. However, the
computational methods currently used to fit these models do not scale to large
datasets. We develop approximate Bayesian inference methods and use graphics
processing units (GPUs) to scale multi-species occupancy models to very large
citizen science data. We fit multi-species occupancy models to one month of
data from the eBird project consisting of 186,811 checklist records comprising
430 bird species. We evaluate the predictions on a spatially separated test set
of 59,338 records, comparing two different inference methods -- Markov chain
Monte Carlo (MCMC) and variational inference (VI) -- to occupancy models fitted
to each species separately using maximum likelihood. We fitted models to the
entire dataset using VI, and up to 32,000 records with MCMC. VI fitted to the
entire dataset performed best, outperforming single-species models on both AUC
(90.4% compared to 88.7%) and on log likelihood (-0.080 compared to -0.085). We
also evaluate how well range maps predicted by the model agree with expert
maps. We find that modelling the detection process greatly improves agreement
and that the resulting maps agree as closely with expert maps as ones estimated
using high quality survey data. Our results demonstrate that multi-species
occupancy models are a compelling approach to model large citizen science
datasets, and that, once the observation process is taken into account, they
can model species distributions accurately. |
1,485 | Representational Multiplicity Should Be Exposed, Not Eliminated | It is prevalent and well-observed, but poorly understood, that two machine
learning models with similar performance during training can have very
different real-world performance characteristics. This implies elusive
differences in the internals of the models, manifesting as representational
multiplicity (RM). We introduce a conceptual and experimental setup for
analyzing RM and show that certain training methods systematically result in
greater RM than others, measured by activation similarity via singular vector
canonical correlation analysis (SVCCA). We further correlate it with predictive
multiplicity measured by the variance in i.i.d. and out-of-distribution test
set predictions, in four common image data sets. We call for systematic
measurement and maximal exposure, not elimination, of RM in models. Qualitative
tools such as our confabulator analysis can facilitate understanding and
communication of RM effects to stakeholders. |
1,486 | RetrievalGuard: Provably Robust 1-Nearest Neighbor Image Retrieval | Recent research works have shown that image retrieval models are vulnerable
to adversarial attacks, where slightly modified test inputs could lead to
problematic retrieval results. In this paper, we aim to design a provably
robust image retrieval model which keeps the most important evaluation metric
Recall@1 invariant to adversarial perturbation. We propose the first 1-nearest
neighbor (NN) image retrieval algorithm, RetrievalGuard, which is provably
robust against adversarial perturbations within an $\ell_2$ ball of calculable
radius. The challenge is to design a provably robust algorithm that takes into
consideration the 1-NN search and the high-dimensional nature of the embedding
space. Algorithmically, given a base retrieval model and a query sample, we
build a smoothed retrieval model by carefully analyzing the 1-NN search
procedure in the high-dimensional embedding space. We show that the smoothed
retrieval model has bounded Lipschitz constant and thus the retrieval score is
invariant to $\ell_2$ adversarial perturbations. Experiments on image retrieval
tasks validate the robustness of our RetrievalGuard method. |
1,487 | Lossy Compression with Gaussian Diffusion | We describe a novel lossy compression approach called DiffC which is based on
unconditional diffusion generative models. Unlike modern compression schemes
which rely on transform coding and quantization to restrict the transmitted
information, DiffC relies on the efficient communication of pixels corrupted by
Gaussian noise. We implement a proof of concept and find that it works
surprisingly well despite the lack of an encoder transform, outperforming the
state-of-the-art generative compression method HiFiC on ImageNet 64x64. DiffC
only uses a single model to encode and denoise corrupted pixels at arbitrary
bitrates. The approach further provides support for progressive coding, that
is, decoding from partial bit streams. We perform a rate-distortion analysis to
gain a deeper understanding of its performance, providing analytical results
for multivariate Gaussian data as well as initial results for general
distributions. Furthermore, we show that a flow-based reconstruction achieves a
3 dB gain over ancestral sampling at high bitrates. |
1,488 | Fast Population-Based Reinforcement Learning on a Single Machine | Training populations of agents has demonstrated great promise in
Reinforcement Learning for stabilizing training, improving exploration and
asymptotic performance, and generating a diverse set of solutions. However,
population-based training is often not considered by practitioners as it is
perceived to be either prohibitively slow (when implemented sequentially), or
computationally expensive (if agents are trained in parallel on independent
accelerators). In this work, we compare implementations and revisit previous
studies to show that the judicious use of compilation and vectorization allows
population-based training to be performed on a single machine with one
accelerator with minimal overhead compared to training a single agent. We also
show that, when provided with a few accelerators, our protocols extend to large
population sizes for applications such as hyperparameter tuning. We hope that
this work and the public release of our code will encourage practitioners to
use population-based learning more frequently for their research and
applications. |
1,489 | Incorporating intratumoral heterogeneity into weakly-supervised deep learning models via variance pooling | Supervised learning tasks such as cancer survival prediction from gigapixel
whole slide images (WSIs) are a critical challenge in computational pathology
that requires modeling complex features of the tumor microenvironment. These
learning tasks are often solved with deep multi-instance learning (MIL) models
that do not explicitly capture intratumoral heterogeneity. We develop a novel
variance pooling architecture that enables a MIL model to incorporate
intratumoral heterogeneity into its predictions. Two interpretability tools
based on representative patches are illustrated to probe the biological signals
captured by these models. An empirical study with 4,479 gigapixel WSIs from the
Cancer Genome Atlas shows that adding variance pooling onto MIL frameworks
improves survival prediction performance for five cancer types. |
1,490 | CtrlFormer: Learning Transferable State Representation for Visual Control via Transformer | Transformer has achieved great successes in learning vision and language
representation, which is general across various downstream tasks. In visual
control, learning transferable state representation that can transfer between
different control tasks is important to reduce the training sample size.
However, porting Transformer to sample-efficient visual control remains a
challenging and unsolved problem. To this end, we propose a novel Control
Transformer (CtrlFormer), possessing many appealing benefits that prior arts do
not have. Firstly, CtrlFormer jointly learns self-attention mechanisms between
visual tokens and policy tokens among different control tasks, where multitask
representation can be learned and transferred without catastrophic forgetting.
Secondly, we carefully design a contrastive reinforcement learning paradigm to
train CtrlFormer, enabling it to achieve high sample efficiency, which is
important in control problems. For example, in the DMControl benchmark, unlike
recent advanced methods that failed by producing a zero score in the "Cartpole"
task after transfer learning with 100k samples, CtrlFormer can achieve a
state-of-the-art score with only 100k samples while maintaining the performance
of previous tasks. The code and models are released in our project homepage. |
1,491 | Improving Generalization of Metric Learning via Listwise Self-distillation | Most deep metric learning (DML) methods employ a strategy that forces all
positive samples to be close in the embedding space while keeping them away
from negative ones. However, such a strategy ignores the internal relationships
of positive (negative) samples and often leads to overfitting, especially in
the presence of hard samples and mislabeled samples. In this work, we propose a
simple yet effective regularization, namely Listwise Self-Distillation (LSD),
which progressively distills a model's own knowledge to adaptively assign a
more appropriate distance target to each sample pair in a batch. LSD encourages
smoother embeddings and information mining within positive (negative) samples
as a way to mitigate overfitting and thus improve generalization. Our LSD can
be directly integrated into general DML frameworks. Extensive experiments show
that LSD consistently boosts the performance of various metric learning methods
on multiple datasets. |
1,492 | Mirror Descent with Relative Smoothness in Measure Spaces, with application to Sinkhorn and EM | Many problems in machine learning can be formulated as optimizing a convex
functional over a space of measures. This paper studies the convergence of the
mirror descent algorithm in this infinite-dimensional setting. Defining Bregman
divergences through directional derivatives, we derive the convergence of the
scheme for relatively smooth and strongly convex pairs of functionals. Applying
our result to joint distributions and the Kullback--Leibler (KL) divergence, we
show that Sinkhorn's primal iterations for entropic optimal transport in the
continuous setting correspond to a mirror descent, and we obtain a new proof of
its (sub)linear convergence. We also show that Expectation Maximization (EM)
can always formally be written as a mirror descent, and, when optimizing on the
latent distribution while fixing the mixtures, we derive sublinear rates of
convergence. |
1,493 | How robust are pre-trained models to distribution shift? | The vulnerability of machine learning models to spurious correlations has
mostly been discussed in the context of supervised learning (SL). However,
there is a lack of insight on how spurious correlations affect the performance
of popular self-supervised learning (SSL) and auto-encoder based models (AE).
In this work, we shed light on this by evaluating the performance of these
models on both real world and synthetic distribution shift datasets. Following
observations that the linear head itself can be susceptible to spurious
correlations, we develop a novel evaluation scheme with the linear head trained
on out-of-distribution (OOD) data, to isolate the performance of the
pre-trained models from a potential bias of the linear head used for
evaluation. With this new methodology, we show that SSL models are consistently
more robust to distribution shifts and thus better at OOD generalisation than
AE and SL models. |
1,494 | Fast Lossless Neural Compression with Integer-Only Discrete Flows | By applying entropy codecs with learned data distributions, neural
compressors have significantly outperformed traditional codecs in terms of
compression ratio. However, the high inference latency of neural networks
hinders the deployment of neural compressors in practical applications. In this
work, we propose Integer-only Discrete Flows (IODF), an efficient neural
compressor with integer-only arithmetic. Our work is built upon integer
discrete flows, which consists of invertible transformations between discrete
random variables. We propose efficient invertible transformations with
integer-only arithmetic based on 8-bit quantization. Our invertible
transformation is equipped with learnable binary gates to remove redundant
filters during inference. We deploy IODF with TensorRT on GPUs, achieving 10x
inference speedup compared to the fastest existing neural compressors, while
retaining the high compression rates on ImageNet32 and ImageNet64. |
1,495 | Plotly-Resampler: Effective Visual Analytics for Large Time Series | Visual analytics is arguably the most important step in getting acquainted
with your data. This is especially the case for time series, as this data type
is hard to describe and cannot be fully understood when using for example
summary statistics. To realize effective time series visualization, four
requirements have to be met; a tool should be (1) interactive, (2) scalable to
millions of data points, (3) integrable in conventional data science
environments, and (4) highly configurable. We observe that open source Python
visualization toolkits empower data scientists in most visual analytics tasks,
but lack the combination of scalability and interactivity to realize effective
time series visualization. As a means to facilitate these requirements, we
created Plotly-Resampler, an open source Python library. Plotly-Resampler is an
add-on for Plotly's Python bindings, enhancing line chart scalability on top of
an interactive toolkit by aggregating the underlying data depending on the
current graph view. Plotly-Resampler is built to be snappy, as the reactivity
of a tool qualitatively affects how analysts visually explore and analyze data.
A benchmark task highlights how our toolkit scales better than alternatives in
terms of number of samples and time series. Additionally, Plotly-Resampler's
flexible data aggregation functionality paves the path towards researching
novel aggregation techniques. Plotly-Resampler's integrability, together with
its configurability, convenience, and high scalability, allows to effectively
analyze high-frequency data in your day-to-day Python environment. |
1,496 | Generalized Frank-Wolfe Algorithm for Bilevel Optimization | In this paper, we study a class of bilevel optimization problems, also known
as simple bilevel optimization, where we minimize a smooth objective function
over the optimal solution set of another convex constrained optimization
problem. Several iterative methods have been developed for tackling this class
of problems. Alas, their convergence guarantees are not satisfactory as they
are either asymptotic for the upper-level objective, or the convergence rates
are slow and sub-optimal. To address this issue, in this paper, we introduce a
generalization of the Frank-Wolfe (FW) method to solve the considered problem.
The main idea of our method is to locally approximate the solution set of the
lower-level problem via a cutting plane, and then run a FW-type update to
decrease the upper-level objective. When the upper-level objective is convex,
we show that our method requires
${\mathcal{O}}(\max\{1/\epsilon_f,1/\epsilon_g\})$ iterations to find a
solution that is $\epsilon_f$-optimal for the upper-level objective and
$\epsilon_g$-optimal for the lower-level objective. Moreover, when the
upper-level objective is non-convex, our method requires
${\mathcal{O}}(\max\{1/\epsilon_f^2,1/(\epsilon_f\epsilon_g)\})$ iterations to
find an $(\epsilon_f,\epsilon_g)$-optimal solution. We further prove stronger
convergence guarantees under the H\"olderian error bound assumption on the
lower-level problem. To the best of our knowledge, our method achieves the
best-known iteration complexity for the considered bilevel problem. We also
present numerical experiments to showcase the superior performance of our
method compared with state-of-the-art methods. |
1,497 | A Survey on Computational Intelligence-based Transfer Learning | The goal of transfer learning (TL) is providing a framework for exploiting
acquired knowledge from source to target data. Transfer learning approaches
compared to traditional machine learning approaches are capable of modeling
better data patterns from the current domain. However, vanilla TL needs
performance improvements by using computational intelligence-based TL. This
paper studies computational intelligence-based transfer learning techniques and
categorizes them into neural network-based, evolutionary algorithm-based, swarm
intelligence-based and fuzzy logic-based transfer learning. |
1,498 | Avoid Overfitting User Specific Information in Federated Keyword Spotting | Keyword spotting (KWS) aims to discriminate a specific wake-up word from
other signals precisely and efficiently for different users. Recent works
utilize various deep networks to train KWS models with all users' speech data
centralized without considering data privacy. Federated KWS (FedKWS) could
serve as a solution without directly sharing users' data. However, the small
amount of data, different user habits, and various accents could lead to fatal
problems, e.g., overfitting or weight divergence. Hence, we propose several
strategies to encourage the model not to overfit user-specific information in
FedKWS. Specifically, we first propose an adversarial learning strategy, which
updates the downloaded global model against an overfitted local model and
explicitly encourages the global model to capture user-invariant information.
Furthermore, we propose an adaptive local training strategy, letting clients
with more training data and more uniform class distributions undertake more
local update steps. Equivalently, this strategy could weaken the negative
impacts of those users whose data is less qualified. Our proposed FedKWS-UI
could explicitly and implicitly learn user-invariant information in FedKWS.
Abundant experimental results on federated Google Speech Commands verify the
effectiveness of FedKWS-UI. |
1,499 | MineDojo: Building Open-Ended Embodied Agents with Internet-Scale Knowledge | Autonomous agents have made great strides in specialist domains like Atari
games and Go. However, they typically learn tabula rasa in isolated
environments with limited and manually conceived objectives, thus failing to
generalize across a wide spectrum of tasks and capabilities. Inspired by how
humans continually learn and adapt in the open world, we advocate a trinity of
ingredients for building generalist agents: 1) an environment that supports a
multitude of tasks and goals, 2) a large-scale database of multimodal
knowledge, and 3) a flexible and scalable agent architecture. We introduce
MineDojo, a new framework built on the popular Minecraft game that features a
simulation suite with thousands of diverse open-ended tasks and an
internet-scale knowledge base with Minecraft videos, tutorials, wiki pages, and
forum discussions. Using MineDojo's data, we propose a novel agent learning
algorithm that leverages large pre-trained video-language models as a learned
reward function. Our agent is able to solve a variety of open-ended tasks
specified in free-form language without any manually designed dense shaping
reward. We open-source the simulation suite and knowledge bases
(https://minedojo.org) to promote research towards the goal of generally
capable embodied agents. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.