Unnamed: 0
int64 0
5k
| title
stringlengths 9
210
| abstract
stringlengths 164
1.92k
|
---|---|---|
1,500 | Channel-wise Mixed-precision Assignment for DNN Inference on Constrained Edge Nodes | Quantization is widely employed in both cloud and edge systems to reduce the
memory occupation, latency, and energy consumption of deep neural networks. In
particular, mixed-precision quantization, i.e., the use of different bit-widths
for different portions of the network, has been shown to provide excellent
efficiency gains with limited accuracy drops, especially with optimized
bit-width assignments determined by automated Neural Architecture Search (NAS)
tools. State-of-the-art mixed-precision works layer-wise, i.e., it uses
different bit-widths for the weights and activations tensors of each network
layer. In this work, we widen the search space, proposing a novel NAS that
selects the bit-width of each weight tensor channel independently. This gives
the tool the additional flexibility of assigning a higher precision only to the
weights associated with the most informative features. Testing on the MLPerf
Tiny benchmark suite, we obtain a rich collection of Pareto-optimal models in
the accuracy vs model size and accuracy vs energy spaces. When deployed on the
MPIC RISC-V edge processor, our networks reduce the memory and energy for
inference by up to 63% and 27% respectively compared to a layer-wise approach,
for the same accuracy. |
1,501 | SMPL: Simulated Industrial Manufacturing and Process Control Learning Environments | Traditional biological and pharmaceutical manufacturing plants are controlled
by human workers or pre-defined thresholds. Modernized factories have advanced
process control algorithms such as model predictive control (MPC). However,
there is little exploration of applying deep reinforcement learning to control
manufacturing plants. One of the reasons is the lack of high fidelity
simulations and standard APIs for benchmarking. To bridge this gap, we develop
an easy-to-use library that includes five high-fidelity simulation
environments: BeerFMTEnv, ReactorEnv, AtropineEnv, PenSimEnv and mAbEnv, which
cover a wide range of manufacturing processes. We build these environments on
published dynamics models. Furthermore, we benchmark online and offline,
model-based and model-free reinforcement learning algorithms for comparisons of
follow-up research. |
1,502 | AutoML Two-Sample Test | Two-sample tests are important in statistics and machine learning, both as
tools for scientific discovery as well as to detect distribution shifts. This
led to the development of many sophisticated test procedures going beyond the
standard supervised learning frameworks, whose usage can require specialized
knowledge about two-sample testing. We use a simple test that takes the mean
discrepancy of a witness function as the test statistic and prove that
minimizing a squared loss leads to a witness with optimal testing power. This
allows us to leverage recent advancements in AutoML. Without any user input
about the problems at hand, and using the same method for all our experiments,
our AutoML two-sample test achieves competitive performance on a diverse
distribution shift benchmark as well as on challenging two-sample testing
problems.
We provide an implementation of the AutoML two-sample test in the Python
package autotst. |
1,503 | Random projections and Kernelised Leave One Cluster Out Cross-Validation: Universal baselines and evaluation tools for supervised machine learning for materials properties | With machine learning being a popular topic in current computational
materials science literature, creating representations for compounds has become
common place. These representations are rarely compared, as evaluating their
performance - and the performance of the algorithms that they are used with -
is non-trivial. With many materials datasets containing bias and skew caused by
the research process, leave one cluster out cross validation (LOCO-CV) has been
introduced as a way of measuring the performance of an algorithm in predicting
previously unseen groups of materials. This raises the question of the impact,
and control, of the range of cluster sizes on the LOCO-CV measurement outcomes.
We present a thorough comparison between composition-based representations, and
investigate how kernel approximation functions can be used to better separate
data to enhance LOCO-CV applications.
We find that domain knowledge does not improve machine learning performance
in most tasks tested, with band gap prediction being the notable exception. We
also find that the radial basis function improves the linear separability of
chemical datasets in all 10 datasets tested and provide a framework for the
application of this function in the LOCO-CV process to improve the outcome of
LOCO-CV measurements regardless of machine learning algorithm, choice of
metric, and choice of compound representation. We recommend kernelised LOCO-CV
as a training paradigm for those looking to measure the extrapolatory power of
an algorithm on materials data. |
1,504 | Decentralized adaptive clustering of deep nets is beneficial for client collaboration | We study the problem of training personalized deep learning models in a
decentralized peer-to-peer setting, focusing on the setting where data
distributions differ between the clients and where different clients have
different local learning tasks. We study both covariate and label shift, and
our contribution is an algorithm which for each client finds beneficial
collaborations based on a similarity estimate for the local task. Our method
does not rely on hyperparameters which are hard to estimate, such as the number
of client clusters, but rather continuously adapts to the network topology
using soft cluster assignment based on a novel adaptive gossip algorithm. We
test the proposed method in various settings where data is not independent and
identically distributed among the clients. The experimental evaluation shows
that the proposed method performs better than previous state-of-the-art
algorithms for this problem setting, and handles situations well where previous
methods fail. |
1,505 | Prediction of Solar Radiation Based on Spatial and Temporal Embeddings for Solar Generation Forecast | A novel method for real-time solar generation forecast using weather data,
while exploiting both spatial and temporal structural dependencies is proposed.
The network observed over time is projected to a lower-dimensional
representation where a variety of weather measurements are used to train a
structured regression model while weather forecast is used at the inference
stage. Experiments were conducted at 288 locations in the San Antonio, TX area
on obtained from the National Solar Radiation Database. The model predicts
solar irradiance with a good accuracy (R2 0.91 for the summer, 0.85 for the
winter, and 0.89 for the global model). The best accuracy was obtained by the
Random Forest Regressor. Multiple experiments were conducted to characterize
influence of missing data and different time horizons providing evidence that
the new algorithm is robust for data missing not only completely at random but
also when the mechanism is spatial, and temporal. |
1,506 | FedNew: A Communication-Efficient and Privacy-Preserving Newton-Type Method for Federated Learning | Newton-type methods are popular in federated learning due to their fast
convergence. Still, they suffer from two main issues, namely: low communication
efficiency and low privacy due to the requirement of sending Hessian
information from clients to parameter server (PS). In this work, we introduced
a novel framework called FedNew in which there is no need to transmit Hessian
information from clients to PS, hence resolving the bottleneck to improve
communication efficiency. In addition, FedNew hides the gradient information
and results in a privacy-preserving approach compared to the existing
state-of-the-art. The core novel idea in FedNew is to introduce a two level
framework, and alternate between updating the inverse Hessian-gradient product
using only one alternating direction method of multipliers (ADMM) step and then
performing the global model update using Newton's method. Though only one ADMM
pass is used to approximate the inverse Hessian-gradient product at each
iteration, we develop a novel theoretical approach to show the converging
behavior of FedNew for convex problems. Additionally, a significant reduction
in communication overhead is achieved by utilizing stochastic quantization.
Numerical results using real datasets show the superiority of FedNew compared
to existing methods in terms of communication costs. |
1,507 | Multimodal Attention-based Deep Learning for Alzheimer's Disease Diagnosis | Alzheimer's Disease (AD) is the most common neurodegenerative disorder with
one of the most complex pathogeneses, making effective and clinically
actionable decision support difficult. The objective of this study was to
develop a novel multimodal deep learning framework to aid medical professionals
in AD diagnosis. We present a Multimodal Alzheimer's Disease Diagnosis
framework (MADDi) to accurately detect the presence of AD and mild cognitive
impairment (MCI) from imaging, genetic, and clinical data. MADDi is novel in
that we use cross-modal attention, which captures interactions between
modalities - a method not previously explored in this domain. We perform
multi-class classification, a challenging task considering the strong
similarities between MCI and AD. We compare with previous state-of-the-art
models, evaluate the importance of attention, and examine the contribution of
each modality to the model's performance. MADDi classifies MCI, AD, and
controls with 96.88% accuracy on a held-out test set. When examining the
contribution of different attention schemes, we found that the combination of
cross-modal attention with self-attention performed the best, and no attention
layers in the model performed the worst, with a 7.9% difference in F1-Scores.
Our experiments underlined the importance of structured clinical data to help
machine learning models contextualize and interpret the remaining modalities.
Extensive ablation studies showed that any multimodal mixture of input features
without access to structured clinical information suffered marked performance
losses. This study demonstrates the merit of combining multiple input
modalities via cross-modal attention to deliver highly accurate AD diagnostic
decision support. |
1,508 | Holistic Transformer: A Joint Neural Network for Trajectory Prediction and Decision-Making of Autonomous Vehicles | Trajectory prediction and behavioral decision-making are two important tasks
for autonomous vehicles that require good understanding of the environmental
context; behavioral decisions are better made by referring to the outputs of
trajectory predictions. However, most current solutions perform these two tasks
separately. Therefore, a joint neural network that combines multiple cues is
proposed and named as the holistic transformer to predict trajectories and make
behavioral decisions simultaneously. To better explore the intrinsic
relationships between cues, the network uses existing knowledge and adopts
three kinds of attention mechanisms: the sparse multi-head type for reducing
noise impact, feature selection sparse type for optimally using partial prior
knowledge, and multi-head with sigmoid activation type for optimally using
posteriori knowledge. Compared with other trajectory prediction models, the
proposed model has better comprehensive performance and good interpretability.
Perceptual noise robustness experiments demonstrate that the proposed model has
good noise robustness. Thus, simultaneous trajectory prediction and behavioral
decision-making combining multiple cues can reduce computational costs and
enhance semantic relationships between scenes and agents. |
1,509 | Truly Unordered Probabilistic Rule Sets for Multi-class Classification | Rule set learning has long been studied and has recently been frequently
revisited due to the need for interpretable models. Still, existing methods
have several shortcomings: 1) most recent methods require a binary feature
matrix as input, learning rules directly from numeric variables is
understudied; 2) existing methods impose orders among rules, either explicitly
or implicitly, which harms interpretability; and 3) currently no method exists
for learning probabilistic rule sets for multi-class target variables (there is
only a method for probabilistic rule lists).
We propose TURS, for Truly Unordered Rule Sets, which addresses these
shortcomings. We first formalise the problem of learning truly unordered rule
sets. To resolve conflicts caused by overlapping rules, i.e., instances covered
by multiple rules, we propose a novel approach that exploits the probabilistic
properties of our rule sets. We next develop a two-phase heuristic algorithm
that learns rule sets by carefully growing rules. An important innovation is
that we use a surrogate score to take the global potential of the rule set into
account when learning a local rule.
Finally, we empirically demonstrate that, compared to non-probabilistic and
(explicitly or implicitly) ordered state-of-the-art methods, our method learns
rule sets that not only have better interpretability (i.e., they are smaller
and truly unordered), but also better predictive performance. |
1,510 | Open-Sampling: Exploring Out-of-Distribution data for Re-balancing Long-tailed datasets | Deep neural networks usually perform poorly when the training dataset suffers
from extreme class imbalance. Recent studies found that directly training with
out-of-distribution data (i.e., open-set samples) in a semi-supervised manner
would harm the generalization performance. In this work, we theoretically show
that out-of-distribution data can still be leveraged to augment the minority
classes from a Bayesian perspective. Based on this motivation, we propose a
novel method called Open-sampling, which utilizes open-set noisy labels to
re-balance the class priors of the training dataset. For each open-set
instance, the label is sampled from our pre-defined distribution that is
complementary to the distribution of original class priors. We empirically show
that Open-sampling not only re-balances the class priors but also encourages
the neural network to learn separable representations. Extensive experiments
demonstrate that our proposed method significantly outperforms existing data
re-balancing methods and can boost the performance of existing state-of-the-art
methods. |
1,511 | The State of Sparse Training in Deep Reinforcement Learning | The use of sparse neural networks has seen rapid growth in recent years,
particularly in computer vision. Their appeal stems largely from the reduced
number of parameters required to train and store, as well as in an increase in
learning efficiency. Somewhat surprisingly, there have been very few efforts
exploring their use in Deep Reinforcement Learning (DRL). In this work we
perform a systematic investigation into applying a number of existing sparse
training techniques on a variety of DRL agents and environments. Our results
corroborate the findings from sparse training in the computer vision domain -
sparse networks perform better than dense networks for the same parameter count
- in the DRL domain. We provide detailed analyses on how the various components
in DRL are affected by the use of sparse networks and conclude by suggesting
promising avenues for improving the effectiveness of sparse training methods,
as well as for advancing their use in DRL. |
1,512 | Fast Simulation of Particulate Suspensions Enabled by Graph Neural Network | Predicting the dynamic behaviors of particles in suspension subject to
hydrodynamic interaction (HI) and external drive can be critical for many
applications. By harvesting advanced deep learning techniques, the present work
introduces a new framework, hydrodynamic interaction graph neural network
(HIGNN), for inferring and predicting the particles' dynamics in Stokes
suspensions. It overcomes the limitations of traditional approaches in
computational efficiency, accuracy, and/or transferability. In particular, by
uniting the data structure represented by a graph and the neural networks with
learnable parameters, the HIGNN constructs surrogate modeling for the mobility
tensor of particles which is the key to predicting the dynamics of particles
subject to HI and external forces. To account for the many-body nature of HI,
we generalize the state-of-the-art GNN by introducing higher-order connectivity
into the graph and the corresponding convolutional operation. For training the
HIGNN, we only need the data for a small number of particles in the domain of
interest, and hence the training cost can be maintained low. Once constructed,
the HIGNN permits fast predictions of the particles' velocities and is
transferable to suspensions of different numbers/concentrations of particles in
the same domain and to any external forcing. It has the ability to accurately
capture both the long-range HI and short-range lubrication effects. We
demonstrate the accuracy, efficiency, and transferability of the proposed HIGNN
framework in a variety of systems. The requirement on computing resource is
minimum: most simulations only require a desktop with one GPU; the simulations
for a large suspension of 100,000 particles call for up to 6 GPUs. |
1,513 | Spherical Sliced-Wasserstein | Many variants of the Wasserstein distance have been introduced to reduce its
original computational burden. In particular the Sliced-Wasserstein distance
(SW), which leverages one-dimensional projections for which a closed-form
solution of the Wasserstein distance is available, has received a lot of
interest. Yet, it is restricted to data living in Euclidean spaces, while the
Wasserstein distance has been studied and used recently on manifolds. We focus
more specifically on the sphere, for which we define a novel SW discrepancy,
which we call spherical Sliced-Wasserstein, making a first step towards
defining SW discrepancies on manifolds. Our construction is notably based on
closed-form solutions of the Wasserstein distance on the circle, together with
a new spherical Radon transform. Along with efficient algorithms and the
corresponding implementations, we illustrate its properties in several machine
learning use cases where spherical representations of data are at stake:
density estimation on the sphere, variational inference or hyperspherical
auto-encoders. |
1,514 | Multiple-Play Stochastic Bandits with Shareable Finite-Capacity Arms | We generalize the multiple-play multi-armed bandits (MP-MAB) problem with a
shareable arm setting, in which several plays can share the same arm.
Furthermore, each shareable arm has a finite reward capacity and a ''per-load''
reward distribution, both of which are unknown to the learner. The reward from
a shareable arm is load-dependent, which is the "per-load" reward multiplying
either the number of plays pulling the arm, or its reward capacity when the
number of plays exceeds the capacity limit. When the "per-load" reward follows
a Gaussian distribution, we prove a sample complexity lower bound of learning
the capacity from load-dependent rewards and also a regret lower bound of this
new MP-MAB problem. We devise a capacity estimator whose sample complexity
upper bound matches the lower bound in terms of reward means and capacities. We
also propose an online learning algorithm to address the problem and prove its
regret upper bound. This regret upper bound's first term is the same as regret
lower bound's, and its second and third terms also evidently correspond to
lower bound's. Extensive experiments validate our algorithm's performance and
also its gain in 5G & 4G base station selection. |
1,515 | Beyond Ridge Regression for Distribution-Free Data | In supervised batch learning, the predictive normalized maximum likelihood
(pNML) has been proposed as the min-max regret solution for the
distribution-free setting, where no distributional assumptions are made on the
data. However, the pNML is not defined for a large capacity hypothesis class as
over-parameterized linear regression. For a large class, a common approach is
to use regularization or a model prior. In the context of online prediction
where the min-max solution is the Normalized Maximum Likelihood (NML), it has
been suggested to use NML with ``luckiness'': A prior-like function is applied
to the hypothesis class, which reduces its effective size. Motivated by the
luckiness concept, for linear regression we incorporate a luckiness function
that penalizes the hypothesis proportionally to its l2 norm. This leads to the
ridge regression solution. The associated pNML with luckiness (LpNML)
prediction deviates from the ridge regression empirical risk minimizer (Ridge
ERM): When the test data reside in the subspace corresponding to the small
eigenvalues of the empirical correlation matrix of the training data, the
prediction is shifted toward 0. Our LpNML reduces the Ridge ERM error by up to
20% for the PMLB sets, and is up to 4.9% more robust in the presence of
distribution shift compared to recent leading methods for UCI sets. |
1,516 | Tensor-on-Tensor Regression: Riemannian Optimization, Over-parameterization, Statistical-computational Gap, and Their Interplay | We study the tensor-on-tensor regression, where the goal is to connect tensor
responses to tensor covariates with a low Tucker rank parameter tensor/matrix
without the prior knowledge of its intrinsic rank. We propose the Riemannian
gradient descent (RGD) and Riemannian Gauss-Newton (RGN) methods and cope with
the challenge of unknown rank by studying the effect of rank
over-parameterization. We provide the first convergence guarantee for the
general tensor-on-tensor regression by showing that RGD and RGN respectively
converge linearly and quadratically to a statistically optimal estimate in both
rank correctly-parameterized and over-parameterized settings. Our theory
reveals an intriguing phenomenon: Riemannian optimization methods naturally
adapt to over-parameterization without modifications to their implementation.
We also give the first rigorous evidence for the statistical-computational gap
in scalar-on-tensor regression under the low-degree polynomials framework. Our
theory demonstrates a ``blessing of statistical-computational gap" phenomenon:
in a wide range of scenarios in tensor-on-tensor regression for tensors of
order three or higher, the computationally required sample size matches what is
needed by moderate rank over-parameterization when considering computationally
feasible estimators, while there are no such benefits in the matrix settings.
This shows moderate rank over-parameterization is essentially ``cost-free" in
terms of sample size in tensor-on-tensor regression of order three or higher.
Finally, we conduct simulation studies to show the advantages of our proposed
methods and to corroborate our theoretical findings. |
1,517 | Federated learning with incremental clustering for heterogeneous data | Federated learning enables different parties to collaboratively build a
global model under the orchestration of a server while keeping the training
data on clients' devices. However, performance is affected when clients have
heterogeneous data. To cope with this problem, we assume that despite data
heterogeneity, there are groups of clients who have similar data distributions
that can be clustered. In previous approaches, in order to cluster clients the
server requires clients to send their parameters simultaneously. However, this
can be problematic in a context where there is a significant number of
participants that may have limited availability. To prevent such a bottleneck,
we propose FLIC (Federated Learning with Incremental Clustering), in which the
server exploits the updates sent by clients during federated training instead
of asking them to send their parameters simultaneously. Hence no additional
communications between the server and the clients are necessary other than what
classical federated learning requires. We empirically demonstrate for various
non-IID cases that our approach successfully splits clients into groups
following the same data distributions. We also identify the limitations of FLIC
by studying its capability to partition clients at the early stages of the
federated learning process efficiently. We further address attacks on models as
a form of data heterogeneity and empirically show that FLIC is a robust defense
against poisoning attacks even when the proportion of malicious clients is
higher than 50\%. |
1,518 | Near-Optimal No-Regret Learning for General Convex Games | A recent line of work has established uncoupled learning dynamics such that,
when employed by all players in a game, each player's \emph{regret} after $T$
repetitions grows polylogarithmically in $T$, an exponential improvement over
the traditional guarantees within the no-regret framework. However, so far
these results have only been limited to certain classes of games with
structured strategy spaces -- such as normal-form and extensive-form games. The
question as to whether $O(\text{polylog} T)$ regret bounds can be obtained for
general convex and compact strategy sets -- which occur in many fundamental
models in economics and multiagent systems -- while retaining efficient
strategy updates is an important question. In this paper, we answer this in the
positive by establishing the first uncoupled learning algorithm with $O(\log
T)$ per-player regret in general \emph{convex games}, that is, games with
concave utility functions supported on arbitrary convex and compact strategy
sets. Our learning dynamics are based on an instantiation of optimistic
follow-the-regularized-leader over an appropriately \emph{lifted} space using a
\emph{self-concordant regularizer} that is, peculiarly, not a barrier for the
feasible region. Further, our learning dynamics are efficiently implementable
given access to a proximal oracle for the convex strategy set, leading to
$O(\log\log T)$ per-iteration complexity; we also give extensions when access
to only a \emph{linear} optimization oracle is assumed. Finally, we adapt our
dynamics to guarantee $O(\sqrt{T})$ regret in the adversarial regime. Even in
those special cases where prior results apply, our algorithm improves over the
state-of-the-art regret bounds either in terms of the dependence on the number
of iterations or on the dimension of the strategy sets. |
1,519 | Learning Fair Representation via Distributional Contrastive Disentanglement | Learning fair representation is crucial for achieving fairness or debiasing
sensitive information. Most existing works rely on adversarial representation
learning to inject some invariance into representation. However, adversarial
learning methods are known to suffer from relatively unstable training, and
this might harm the balance between fairness and predictiveness of
representation. We propose a new approach, learning FAir Representation via
distributional CONtrastive Variational AutoEncoder (FarconVAE), which induces
the latent space to be disentangled into sensitive and nonsensitive parts. We
first construct the pair of observations with different sensitive attributes
but with the same labels. Then, FarconVAE enforces each non-sensitive latent to
be closer, while sensitive latents to be far from each other and also far from
the non-sensitive latent by contrasting their distributions. We provide a new
type of contrastive loss motivated by Gaussian and Student-t kernels for
distributional contrastive learning with theoretical analysis. Besides, we
adopt a new swap-reconstruction loss to boost the disentanglement further.
FarconVAE shows superior performance on fairness, pretrained model debiasing,
and domain generalization tasks from various modalities, including tabular,
image, and text. |
1,520 | Detecting Adversarial Examples in Batches -- a geometrical approach | Many deep learning methods have successfully solved complex tasks in computer
vision and speech recognition applications. Nonetheless, the robustness of
these models has been found to be vulnerable to perturbed inputs or adversarial
examples, which are imperceptible to the human eye, but lead the model to
erroneous output decisions. In this study, we adapt and introduce two geometric
metrics, density and coverage, and evaluate their use in detecting adversarial
samples in batches of unseen data. We empirically study these metrics using
MNIST and two real-world biomedical datasets from MedMNIST, subjected to two
different adversarial attacks. Our experiments show promising results for both
metrics to detect adversarial examples. We believe that his work can lay the
ground for further study on these metrics' use in deployed machine learning
systems to monitor for possible attacks by adversarial examples or related
pathologies such as dataset shift. |
1,521 | Generalised Policy Improvement with Geometric Policy Composition | We introduce a method for policy improvement that interpolates between the
greedy approach of value-based reinforcement learning (RL) and the full
planning approach typical of model-based RL. The new method builds on the
concept of a geometric horizon model (GHM, also known as a gamma-model), which
models the discounted state-visitation distribution of a given policy. We show
that we can evaluate any non-Markov policy that switches between a set of base
Markov policies with fixed probability by a careful composition of the base
policy GHMs, without any additional learning. We can then apply generalised
policy improvement (GPI) to collections of such non-Markov policies to obtain a
new Markov policy that will in general outperform its precursors. We provide a
thorough theoretical analysis of this approach, develop applications to
transfer and standard RL, and empirically demonstrate its effectiveness over
standard GPI on a challenging deep RL continuous control task. We also provide
an analysis of GHM training methods, proving a novel convergence result
regarding previously proposed methods and showing how to train these models
stably in deep RL settings. |
1,522 | Evaluation of Contrastive Learning with Various Code Representations for Code Clone Detection | Code clones are pairs of code snippets that implement similar functionality.
Clone detection is a fundamental branch of automatic source code comprehension,
having many applications in refactoring recommendation, plagiarism detection,
and code summarization. A particularly interesting case of clone detection is
the detection of semantic clones, i.e., code snippets that have the same
functionality but significantly differ in implementation. A promising approach
to detecting semantic clones is contrastive learning (CL), a machine learning
paradigm popular in computer vision but not yet commonly adopted for code
processing.
Our work aims to evaluate the most popular CL algorithms combined with three
source code representations on two tasks. The first task is code clone
detection, which we evaluate on the POJ-104 dataset containing implementations
of 104 algorithms. The second task is plagiarism detection. To evaluate the
models on this task, we introduce CodeTransformator, a tool for transforming
source code. We use it to create a dataset that mimics plagiarised code based
on competitive programming solutions. We trained nine models for both tasks and
compared them with six existing approaches, including traditional tools and
modern pre-trained neural models. The results of our evaluation show that
proposed models perform diversely in each task, however the performance of the
graph-based models is generally above the others. Among CL algorithms, SimCLR
and SwAV lead to better results, while Moco is the most robust approach. Our
code and trained models are available at
https://doi.org/10.5281/zenodo.6360627, https://doi.org/10.5281/zenodo.5596345. |
1,523 | Fast Finite Width Neural Tangent Kernel | The Neural Tangent Kernel (NTK), defined as $\Theta_\theta^f(x_1, x_2) =
\left[\partial f(\theta, x_1)\big/\partial \theta\right] \left[\partial
f(\theta, x_2)\big/\partial \theta\right]^T$ where $\left[\partial f(\theta,
\cdot)\big/\partial \theta\right]$ is a neural network (NN) Jacobian, has
emerged as a central object of study in deep learning. In the infinite width
limit, the NTK can sometimes be computed analytically and is useful for
understanding training and generalization of NN architectures. At finite
widths, the NTK is also used to better initialize NNs, compare the conditioning
across models, perform architecture search, and do meta-learning.
Unfortunately, the finite width NTK is notoriously expensive to compute, which
severely limits its practical utility. We perform the first in-depth analysis
of the compute and memory requirements for NTK computation in finite width
networks. Leveraging the structure of neural networks, we further propose two
novel algorithms that change the exponent of the compute and memory
requirements of the finite width NTK, dramatically improving efficiency. Our
algorithms can be applied in a black box fashion to any differentiable
function, including those implementing neural networks. We open-source our
implementations within the Neural Tangents package (arXiv:1912.02803) at
https://github.com/google/neural-tangents. |
1,524 | Evaluating the Impact of Source Code Parsers on ML4SE Models | As researchers and practitioners apply Machine Learning to increasingly more
software engineering problems, the approaches they use become more
sophisticated. A lot of modern approaches utilize internal code structure in
the form of an abstract syntax tree (AST) or its extensions: path-based
representation, complex graph combining AST with additional edges. Even though
the process of extracting ASTs from code can be done with different parsers,
the impact of choosing a parser on the final model quality remains unstudied.
Moreover, researchers often omit the exact details of extracting particular
code representations.
In this work, we evaluate two models, namely Code2Seq and TreeLSTM, in the
method name prediction task backed by eight different parsers for the Java
language. To unify the process of data preparation with different parsers, we
develop SuperParser, a multi-language parser-agnostic library based on
PathMiner. SuperParser facilitates the end-to-end creation of datasets suitable
for training and evaluation of ML models that work with structural information
from source code. Our results demonstrate that trees built by different parsers
vary in their structure and content. We then analyze how this diversity affects
the models' quality and show that the quality gap between the most and least
suitable parsers for both models turns out to be significant. Finally, we
discuss other features of the parsers that researchers and practitioners should
take into account when selecting a parser along with the impact on the models'
quality.
The code of SuperParser is publicly available at
https://doi.org/10.5281/zenodo.6366591. We also publish Java-norm, the dataset
we use to evaluate the models: https://doi.org/10.5281/zenodo.6366599. |
1,525 | Statistical and Neural Methods for Cross-lingual Entity Label Mapping in Knowledge Graphs | Knowledge bases such as Wikidata amass vast amounts of named entity
information, such as multilingual labels, which can be extremely useful for
various multilingual and cross-lingual applications. However, such labels are
not guaranteed to match across languages from an information consistency
standpoint, greatly compromising their usefulness for fields such as machine
translation. In this work, we investigate the application of word and sentence
alignment techniques coupled with a matching algorithm to align cross-lingual
entity labels extracted from Wikidata in 10 languages. Our results indicate
that mapping between Wikidata's main labels stands to be considerably improved
(up to $20$ points in F1-score) by any of the employed methods. We show how
methods relying on sentence embeddings outperform all others, even across
different scripts. We believe the application of such techniques to measure the
similarity of label pairs, coupled with a knowledge base rich in high-quality
entity labels, to be an excellent asset to machine translation. |
1,526 | Explainability's Gain is Optimality's Loss? -- How Explanations Bias Decision-making | Decisions in organizations are about evaluating alternatives and choosing the
one that would best serve organizational goals. To the extent that the
evaluation of alternatives could be formulated as a predictive task with
appropriate metrics, machine learning algorithms are increasingly being used to
improve the efficiency of the process. Explanations help to facilitate
communication between the algorithm and the human decision-maker, making it
easier for the latter to interpret and make decisions on the basis of
predictions by the former. Feature-based explanations' semantics of causal
models, however, induce leakage from the decision-maker's prior beliefs. Our
findings from a field experiment demonstrate empirically how this leads to
confirmation bias and disparate impact on the decision-maker's confidence in
the predictions. Such differences can lead to sub-optimal and biased decision
outcomes. |
1,527 | Maximum Class Separation as Inductive Bias in One Matrix | Maximizing the separation between classes constitutes a well-known inductive
bias in machine learning and a pillar of many traditional algorithms. By
default, deep networks are not equipped with this inductive bias and therefore
many alternative solutions have been proposed through differential
optimization. Current approaches tend to optimize classification and separation
jointly: aligning inputs with class vectors and separating class vectors
angularly. This paper proposes a simple alternative: encoding maximum
separation as an inductive bias in the network by adding one fixed matrix
multiplication before computing the softmax activations. The main observation
behind our approach is that separation does not require optimization but can be
solved in closed-form prior to training and plugged into a network. We outline
a recursive approach to obtain the matrix consisting of maximally separable
vectors for any number of classes, which can be added with negligible
engineering effort and computational overhead. Despite its simple nature, this
one matrix multiplication provides real impact. We show that our proposal
directly boosts classification, long-tailed recognition, out-of-distribution
detection, and open-set recognition, from CIFAR to ImageNet. We find
empirically that maximum separation works best as a fixed bias; making the
matrix learnable adds nothing to the performance. The closed-form
implementation and code to reproduce the experiments are on github. |
1,528 | Sheaf Neural Networks with Connection Laplacians | A Sheaf Neural Network (SNN) is a type of Graph Neural Network (GNN) that
operates on a sheaf, an object that equips a graph with vector spaces over its
nodes and edges and linear maps between these spaces. SNNs have been shown to
have useful theoretical properties that help tackle issues arising from
heterophily and over-smoothing. One complication intrinsic to these models is
finding a good sheaf for the task to be solved. Previous works proposed two
diametrically opposed approaches: manually constructing the sheaf based on
domain knowledge and learning the sheaf end-to-end using gradient-based
methods. However, domain knowledge is often insufficient, while learning a
sheaf could lead to overfitting and significant computational overhead. In this
work, we propose a novel way of computing sheaves drawing inspiration from
Riemannian geometry: we leverage the manifold assumption to compute
manifold-and-graph-aware orthogonal maps, which optimally align the tangent
spaces of neighbouring data points. We show that this approach achieves
promising results with less computational overhead when compared to previous
SNN models. Overall, this work provides an interesting connection between
algebraic topology and differential geometry, and we hope that it will spark
future research in this direction. |
1,529 | Towards Human-Level Bimanual Dexterous Manipulation with Reinforcement Learning | Achieving human-level dexterity is an important open problem in robotics.
However, tasks of dexterous hand manipulation, even at the baby level, are
challenging to solve through reinforcement learning (RL). The difficulty lies
in the high degrees of freedom and the required cooperation among heterogeneous
agents (e.g., joints of fingers). In this study, we propose the Bimanual
Dexterous Hands Benchmark (Bi-DexHands), a simulator that involves two
dexterous hands with tens of bimanual manipulation tasks and thousands of
target objects. Specifically, tasks in Bi-DexHands are designed to match
different levels of human motor skills according to cognitive science
literature. We built Bi-DexHands in the Issac Gym; this enables highly
efficient RL training, reaching 30,000+ FPS by only one single NVIDIA RTX 3090.
We provide a comprehensive benchmark for popular RL algorithms under different
settings; this includes Single-agent/Multi-agent RL, Offline RL, Multi-task RL,
and Meta RL. Our results show that the PPO type of on-policy algorithms can
master simple manipulation tasks that are equivalent up to 48-month human
babies (e.g., catching a flying object, opening a bottle), while multi-agent RL
can further help to master manipulations that require skilled bimanual
cooperation (e.g., lifting a pot, stacking blocks). Despite the success on each
single task, when it comes to acquiring multiple manipulation skills, existing
RL algorithms fail to work in most of the multi-task and the few-shot learning
settings, which calls for more substantial development from the RL community.
Our project is open sourced at https://github.com/PKU-MARL/DexterousHands. |
1,530 | Sparse Double Descent: Where Network Pruning Aggravates Overfitting | People usually believe that network pruning not only reduces the
computational cost of deep networks, but also prevents overfitting by
decreasing model capacity. However, our work surprisingly discovers that
network pruning sometimes even aggravates overfitting. We report an unexpected
sparse double descent phenomenon that, as we increase model sparsity via
network pruning, test performance first gets worse (due to overfitting), then
gets better (due to relieved overfitting), and gets worse at last (due to
forgetting useful information). While recent studies focused on the deep double
descent with respect to model overparameterization, they failed to recognize
that sparsity may also cause double descent. In this paper, we have three main
contributions. First, we report the novel sparse double descent phenomenon
through extensive experiments. Second, for this phenomenon, we propose a novel
learning distance interpretation that the curve of $\ell_{2}$ learning distance
of sparse models (from initialized parameters to final parameters) may
correlate with the sparse double descent curve well and reflect generalization
better than minima flatness. Third, in the context of sparse double descent, a
winning ticket in the lottery ticket hypothesis surprisingly may not always
win. |
1,531 | BITS Pilani at HinglishEval: Quality Evaluation for Code-Mixed Hinglish Text Using Transformers | Code-Mixed text data consists of sentences having words or phrases from more
than one language. Most multi-lingual communities worldwide communicate using
multiple languages, with English usually one of them. Hinglish is a Code-Mixed
text composed of Hindi and English but written in Roman script. This paper aims
to determine the factors influencing the quality of Code-Mixed text data
generated by the system. For the HinglishEval task, the proposed model uses
multi-lingual BERT to find the similarity between synthetically generated and
human-generated sentences to predict the quality of synthetically generated
Hinglish sentences. |
1,532 | Understanding Robust Overfitting of Adversarial Training and Beyond | Robust overfitting widely exists in adversarial training of deep networks.
The exact underlying reasons for this are still not completely understood.
Here, we explore the causes of robust overfitting by comparing the data
distribution of \emph{non-overfit} (weak adversary) and \emph{overfitted}
(strong adversary) adversarial training, and observe that the distribution of
the adversarial data generated by weak adversary mainly contain small-loss
data. However, the adversarial data generated by strong adversary is more
diversely distributed on the large-loss data and the small-loss data. Given
these observations, we further designed data ablation adversarial training and
identify that some small-loss data which are not worthy of the adversary
strength cause robust overfitting in the strong adversary mode. To relieve this
issue, we propose \emph{minimum loss constrained adversarial training} (MLCAT):
in a minibatch, we learn large-loss data as usual, and adopt additional
measures to increase the loss of the small-loss data. Technically, MLCAT
hinders data fitting when they become easy to learn to prevent robust
overfitting; philosophically, MLCAT reflects the spirit of turning waste into
treasure and making the best use of each adversarial data; algorithmically, we
designed two realizations of MLCAT, and extensive experiments demonstrate that
MLCAT can eliminate robust overfitting and further boost adversarial
robustness. |
1,533 | A Deep Learning Approach for the Segmentation of Electroencephalography Data in Eye Tracking Applications | The collection of eye gaze information provides a window into many critical
aspects of human cognition, health and behaviour. Additionally, many
neuroscientific studies complement the behavioural information gained from eye
tracking with the high temporal resolution and neurophysiological markers
provided by electroencephalography (EEG). One of the essential eye-tracking
software processing steps is the segmentation of the continuous data stream
into events relevant to eye-tracking applications, such as saccades, fixations,
and blinks.
Here, we introduce DETRtime, a novel framework for time-series segmentation
that creates ocular event detectors that do not require additionally recorded
eye-tracking modality and rely solely on EEG data. Our end-to-end deep
learning-based framework brings recent advances in Computer Vision to the
forefront of the times series segmentation of EEG data. DETRtime achieves
state-of-the-art performance in ocular event detection across diverse
eye-tracking experiment paradigms. In addition to that, we provide evidence
that our model generalizes well in the task of EEG sleep stage segmentation. |
1,534 | FiT: Parameter Efficient Few-shot Transfer Learning for Personalized and Federated Image Classification | Modern deep learning systems are increasingly deployed in situations such as
personalization and federated learning where it is necessary to support i)
learning on small amounts of data, and ii) communication efficient distributed
training protocols. In this work we develop FiLM Transfer (FiT) which fulfills
these requirements in the image classification setting. FiT uses an
automatically configured Naive Bayes classifier on top of a fixed backbone that
has been pretrained on large image datasets. Parameter efficient FiLM layers
are used to modulate the backbone, shaping the representation for the
downstream task. The network is trained via an episodic fine-tuning protocol.
The approach is parameter efficient which is key for enabling few-shot
learning, inexpensive model updates for personalization, and communication
efficient federated learning. We experiment with FiT on a wide range of
downstream datasets and show that it achieves better classification accuracy
than the state-of-the-art Big Transfer (BiT) algorithm at low-shot and on the
challenging VTAB-1k benchmark, with fewer than 1% of the updateable parameters.
Finally, we demonstrate the parameter efficiency of FiT in distributed low-shot
applications including model personalization and federated learning where model
update size is an important performance metric. |
1,535 | The Sensorium competition on predicting large-scale mouse primary visual cortex activity | The neural underpinning of the biological visual system is challenging to
study experimentally, in particular as the neuronal activity becomes
increasingly nonlinear with respect to visual input. Artificial neural networks
(ANNs) can serve a variety of goals for improving our understanding of this
complex system, not only serving as predictive digital twins of sensory cortex
for novel hypothesis generation in silico, but also incorporating bio-inspired
architectural motifs to progressively bridge the gap between biological and
machine vision. The mouse has recently emerged as a popular model system to
study visual information processing, but no standardized large-scale benchmark
to identify state-of-the-art models of the mouse visual system has been
established. To fill this gap, we propose the Sensorium benchmark competition.
We collected a large-scale dataset from mouse primary visual cortex containing
the responses of more than 28,000 neurons across seven mice stimulated with
thousands of natural images, together with simultaneous behavioral measurements
that include running speed, pupil dilation, and eye movements. The benchmark
challenge will rank models based on predictive performance for neuronal
responses on a held-out test set, and includes two tracks for model input
limited to either stimulus only (Sensorium) or stimulus plus behavior
(Sensorium+). We provide a starting kit to lower the barrier for entry,
including tutorials, pre-trained baseline models, and APIs with one line
commands for data loading and submission. We would like to see this as a
starting point for regular challenges and data releases, and as a standard tool
for measuring progress in large-scale neural system identification models of
the mouse visual system and beyond. |
1,536 | Boosting Factorization Machines via Saliency-Guided Mixup | Factorization machines (FMs) are widely used in recommender systems due to
their adaptability and ability to learn from sparse data. However, for the
ubiquitous non-interactive features in sparse data, existing FMs can only
estimate the parameters corresponding to these features via the inner product
of their embeddings. Undeniably, they cannot learn the direct interactions of
these features, which limits the model's expressive power. To this end, we
first present MixFM, inspired by Mixup, to generate auxiliary training data to
boost FMs. Unlike existing augmentation strategies that require labor costs and
expertise to collect additional information such as position and fields, these
extra data generated by MixFM only by the convex combination of the raw ones
without any professional knowledge support. More importantly, if the parent
samples to be mixed have non-interactive features, MixFM will establish their
direct interactions. Second, considering that MixFM may generate redundant or
even detrimental instances, we further put forward a novel Factorization
Machine powered by Saliency-guided Mixup (denoted as SMFM). Guided by the
customized saliency, SMFM can generate more informative neighbor data. Through
theoretical analysis, we prove that the proposed methods minimize the upper
bound of the generalization error, which hold a beneficial effect on enhancing
FMs. Significantly, we give the first generalization bound of FM, implying the
generalization requires more data and a smaller embedding size under the
sufficient representation capability. Finally, extensive experiments on five
datasets confirm that our approaches are superior to baselines. Besides, the
results show that "poisoning" mixed data is likewise beneficial to the FM
variants. |
1,537 | Digital Twin Data Modelling by Randomized Orthogonal Decomposition and Deep Learning | A digital twin is a surrogate model that has the main feature to mirror the
original process behavior. Associating the dynamical process with a digital
twin model of reduced complexity has the significant advantage to map the
dynamics with high accuracy and reduced costs in CPU time and hardware to
timescales over which that suffers significantly changes and so it is difficult
to explore. This paper introduces a new framework for creating efficient
digital twin models of fluid flows. We introduce a novel algorithm that
combines the advantages of Krylov based dynamic mode decomposition with proper
orthogonal decomposition and outperforms the selection of the most influential
modes. We prove that randomized orthogonal decomposition algorithm provides
several advantages over SVD empirical orthogonal decomposition methods and
mitigates the projection error formulating a multiobjective optimization
problem.We involve the state-of-the-art artificial intelligence Deep Learning
(DL) to perform a real-time adaptive calibration of the digital twin model,
with increasing fidelity. The output is a high-fidelity DIGITAL TWIN DATA MODEL
of the fluid flow dynamics, with the advantage of a reduced complexity. The new
modelling tools are investigated in the numerical simulation of three wave
phenomena with increasing complexity. We show that the outputs are consistent
with the original source data.We perform a thorough assessment of the
performance of the new digital twin data models, in terms of numerical accuracy
and computational efficiency, including a time simulation response feature
study. |
1,538 | Bridge-Tower: Building Bridges Between Encoders in Vision-Language Representation Learning | Vision-Language (VL) models with the Two-Tower architecture have dominated
visual-language representation learning in recent years. Current VL models
either use lightweight uni-modal encoders and learn to extract, align and fuse
both modalities simultaneously in a cross-modal encoder, or feed the last-layer
uni-modal features directly into the top cross-modal encoder, ignoring the
semantic information at the different levels in the deep uni-modal encoders.
Both approaches possibly restrict vision-language representation learning and
limit model performance. In this paper, we introduce multiple bridge layers
that build a connection between the top layers of uni-modal encoders and each
layer of the cross-modal encoder. This enables comprehensive bottom-up
interactions between visual and textual representations at different semantic
levels, resulting in more effective cross-modal alignment and fusion. Our
proposed Bridge-Tower, pre-trained with only $4$M images, achieves
state-of-the-art performance on various downstream vision-language tasks. On
the VQAv2 test-std set, Bridge-Tower achieves an accuracy of $78.73\%$,
outperforming the previous state-of-the-art METER model by $1.09\%$ with the
same pre-training data and almost no additional parameters and computational
cost. Notably, when further scaling the model, Bridge-Tower achieves an
accuracy of $81.15\%$, surpassing models that are pre-trained on
orders-of-magnitude larger datasets. Code is available at
https://github.com/microsoft/BridgeTower. |
1,539 | tinySNN: Towards Memory- and Energy-Efficient Spiking Neural Networks | Larger Spiking Neural Network (SNN) models are typically favorable as they
can offer higher accuracy. However, employing such models on the resource- and
energy-constrained embedded platforms is inefficient. Towards this, we present
a tinySNN framework that optimizes the memory and energy requirements of SNN
processing in both the training and inference phases, while keeping the
accuracy high. It is achieved by reducing the SNN operations, improving the
learning quality, quantizing the SNN parameters, and selecting the appropriate
SNN model. Furthermore, our tinySNN quantizes different SNN parameters (i.e.,
weights and neuron parameters) to maximize the compression while exploring
different combinations of quantization schemes, precision levels, and rounding
schemes to find the model that provides acceptable accuracy. The experimental
results demonstrate that our tinySNN significantly reduces the memory footprint
and the energy consumption of SNNs without accuracy loss as compared to the
baseline network. Therefore, our tinySNN effectively compresses the given SNN
model to achieve high accuracy in a memory- and energy-efficient manner, hence
enabling the employment of SNNs for the resource- and energy-constrained
embedded applications. |
1,540 | All Mistakes Are Not Equal: Comprehensive Hierarchy Aware Multi-label Predictions (CHAMP) | This paper considers the problem of Hierarchical Multi-Label Classification
(HMC), where (i) several labels can be present for each example, and (ii)
labels are related via a domain-specific hierarchy tree. Guided by the
intuition that all mistakes are not equal, we present Comprehensive Hierarchy
Aware Multi-label Predictions (CHAMP), a framework that penalizes a
misprediction depending on its severity as per the hierarchy tree. While there
have been works that apply such an idea to single-label classification, to the
best of our knowledge, there are limited such works for multilabel
classification focusing on the severity of mistakes. The key reason is that
there is no clear way of quantifying the severity of a misprediction a priori
in the multilabel setting. In this work, we propose a simple but effective
metric to quantify the severity of a mistake in HMC, naturally leading to
CHAMP. Extensive experiments on six public HMC datasets across modalities
(image, audio, and text) demonstrate that incorporating hierarchical
information leads to substantial gains as CHAMP improves both AUPRC (2.6%
median percentage improvement) and hierarchical metrics (2.85% median
percentage improvement), over stand-alone hierarchical or multilabel
classification methods. Compared to standard multilabel baselines, CHAMP
provides improved AUPRC in both robustness (8.87% mean percentage improvement )
and less data regimes. Further, our method provides a framework to enhance
existing multilabel classification algorithms with better mistakes (18.1% mean
percentage increment). |
1,541 | Orthonormal Expansions for Translation-Invariant Kernels | We present a general Fourier analytic technique for constructing orthonormal
basis expansions of translation-invariant kernels from orthonormal bases of
$\mathscr{L}_2(\mathbb{R})$. This allows us to derive explicit expansions on
the real line for (i) Mat\'ern kernels of all half-integer orders in terms of
associated Laguerre functions, (ii) the Cauchy kernel in terms of rational
functions, and (iii) the Gaussian kernel in terms of Hermite functions. |
1,542 | Scalable Differentially Private Clustering via Hierarchically Separated Trees | We study the private $k$-median and $k$-means clustering problem in $d$
dimensional Euclidean space. By leveraging tree embeddings, we give an
efficient and easy to implement algorithm, that is empirically competitive with
state of the art non private methods. We prove that our method computes a
solution with cost at most $O(d^{3/2}\log n)\cdot OPT + O(k d^2 \log^2 n /
\epsilon^2)$, where $\epsilon$ is the privacy guarantee. (The dimension term,
$d$, can be replaced with $O(\log k)$ using standard dimension reduction
techniques.) Although the worst-case guarantee is worse than that of state of
the art private clustering methods, the algorithm we propose is practical, runs
in near-linear, $\tilde{O}(nkd)$, time and scales to tens of millions of
points. We also show that our method is amenable to parallelization in
large-scale distributed computing environments. In particular we show that our
private algorithms can be implemented in logarithmic number of MPC rounds in
the sublinear memory regime. Finally, we complement our theoretical analysis
with an empirical evaluation demonstrating the algorithm's efficiency and
accuracy in comparison to other privacy clustering baselines. |
1,543 | Minimum Noticeable Difference based Adversarial Privacy Preserving Image Generation | Deep learning models are found to be vulnerable to adversarial examples, as
wrong predictions can be caused by small perturbation in input for deep
learning models. Most of the existing works of adversarial image generation try
to achieve attacks for most models, while few of them make efforts on
guaranteeing the perceptual quality of the adversarial examples. High quality
adversarial examples matter for many applications, especially for the privacy
preserving. In this work, we develop a framework based on the Minimum
Noticeable Difference (MND) concept to generate adversarial privacy preserving
images that have minimum perceptual difference from the clean ones but are able
to attack deep learning models. To achieve this, an adversarial loss is firstly
proposed to make the deep learning models attacked by the adversarial images
successfully. Then, a perceptual quality-preserving loss is developed by taking
the magnitude of perturbation and perturbation-caused structural and gradient
changes into account, which aims to preserve high perceptual quality for
adversarial image generation. To the best of our knowledge, this is the first
work on exploring quality-preserving adversarial image generation based on the
MND concept for privacy preserving. To evaluate its performance in terms of
perceptual quality, the deep models on image classification and face
recognition are tested with the proposed method and several anchor methods in
this work. Extensive experimental results demonstrate that the proposed MND
framework is capable of generating adversarial images with remarkably improved
performance metrics (e.g., PSNR, SSIM, and MOS) than that generated with the
anchor methods. |
1,544 | RECAPP: Crafting a More Efficient Catalyst for Convex Optimization | The accelerated proximal point algorithm (APPA), also known as "Catalyst", is
a well-established reduction from convex optimization to approximate proximal
point computation (i.e., regularized minimization). This reduction is
conceptually elegant and yields strong convergence rate guarantees. However,
these rates feature an extraneous logarithmic term arising from the need to
compute each proximal point to high accuracy. In this work, we propose a novel
Relaxed Error Criterion for Accelerated Proximal Point (RECAPP) that eliminates
the need for high accuracy subproblem solutions. We apply RECAPP to two
canonical problems: finite-sum and max-structured minimization. For finite-sum
problems, we match the best known complexity, previously obtained by
carefully-designed problem-specific algorithms. For minimizing $\max_y f(x,y)$
where $f$ is convex in $x$ and strongly-concave in $y$, we improve on the best
known (Catalyst-based) bound by a logarithmic factor. |
1,545 | The Role of Depth, Width, and Activation Complexity in the Number of Linear Regions of Neural Networks | Many feedforward neural networks generate continuous and piecewise-linear
(CPWL) mappings. Specifically, they partition the input domain into regions on
which the mapping is an affine function. The number of these so-called linear
regions offers a natural metric to characterize the expressiveness of CPWL
mappings. Although the precise determination of this quantity is often out of
reach, bounds have been proposed for specific architectures, including the
well-known ReLU and Maxout networks. In this work, we propose a more general
perspective and provide precise bounds on the maximal number of linear regions
of CPWL networks based on three sources of expressiveness: depth, width, and
activation complexity. Our estimates rely on the combinatorial structure of
convex partitions and highlight the distinctive role of depth which, on its
own, is able to exponentially increase the number of regions. We then introduce
a complementary stochastic framework to estimate the average number of linear
regions produced by a CPWL network architecture. Under reasonable assumptions,
the expected density of linear regions along any 1D path is bounded by the
product of depth, width, and a measure of activation complexity (up to a
scaling factor). This yields an identical role to the three sources of
expressiveness: no exponential growth with depth is observed anymore. |
1,546 | On Efficient Real-Time Semantic Segmentation: A Survey | Semantic segmentation is the problem of assigning a class label to every
pixel in an image, and is an important component of an autonomous vehicle
vision stack for facilitating scene understanding and object detection.
However, many of the top performing semantic segmentation models are extremely
complex and cumbersome, and as such are not suited to deployment onboard
autonomous vehicle platforms where computational resources are limited and
low-latency operation is a vital requirement. In this survey, we take a
thorough look at the works that aim to address this misalignment with more
compact and efficient models capable of deployment on low-memory embedded
systems while meeting the constraint of real-time inference. We discuss several
of the most prominent works in the field, placing them within a taxonomy based
on their major contributions, and finally we evaluate the inference speed of
the discussed models under consistent hardware and software setups that
represent a typical research environment with high-end GPU and a realistic
deployed scenario using low-memory embedded GPU hardware. Our experimental
results demonstrate that many works are capable of real-time performance on
resource-constrained hardware, while illustrating the consistent trade-off
between latency and accuracy. |
1,547 | On Integrating Prior Knowledge into Gaussian Processes for Prognostic Health Monitoring | Gaussian process regression is a powerful method for predicting states based
on given data. It has been successfully applied for probabilistic predictions
of structural systems to quantify, for example, the crack growth in mechanical
structures. Typically, predefined mean and covariance functions are employed to
construct the Gaussian process model. Then, the model is updated using current
data during operation while prior information based on previous data is
ignored. However, predefined mean and covariance functions without prior
information reduce the potential of Gaussian processes. This paper proposes a
method to improve the predictive capabilities of Gaussian processes. We
integrate prior knowledge by deriving the mean and covariance functions from
previous data. More specifically, we first approximate previous data by a
weighted sum of basis functions and then derive the mean and covariance
functions directly from the estimated weight coefficients. Basis functions may
be either estimated or derived from problem-specific governing equations to
incorporate physical information. The applicability and effectiveness of this
approach are demonstrated for fatigue crack growth, laser degradation, and
milling machine wear data. We show that well-chosen mean and covariance
functions, like those based on previous data, significantly increase look-ahead
time and accuracy. Using physical basis functions further improves accuracy. In
addition, computation effort for training is significantly reduced. |
1,548 | On the Influence of Enforcing Model Identifiability on Learning dynamics of Gaussian Mixture Models | A common way to learn and analyze statistical models is to consider
operations in the model parameter space. But what happens if we optimize in the
parameter space and there is no one-to-one mapping between the parameter space
and the underlying statistical model space? Such cases frequently occur for
hierarchical models which include statistical mixtures or stochastic neural
networks, and these models are said to be singular. Singular models reveal
several important and well-studied problems in machine learning like the
decrease in convergence speed of learning trajectories due to attractor
behaviors. In this work, we propose a relative reparameterization technique of
the parameter space, which yields a general method for extracting regular
submodels from singular models. Our method enforces model identifiability
during training and we study the learning dynamics for gradient descent and
expectation maximization for Gaussian Mixture Models (GMMs) under relative
parameterization, showing faster experimental convergence and a improved
manifold shape of the dynamics around the singularity. Extending the analysis
beyond GMMs, we furthermore analyze the Fisher information matrix under
relative reparameterization and its influence on the generalization error, and
show how the method can be applied to more complex models like deep neural
networks. |
1,549 | Accelerating numerical methods by gradient-based meta-solving | In science and engineering applications, it is often required to solve
similar computational problems repeatedly. In such cases, we can utilize the
data from previously solved problem instances to improve the efficiency of
finding subsequent solutions. This offers a unique opportunity to combine
machine learning (in particular, meta-learning) and scientific computing. To
date, a variety of such domain-specific methods have been proposed in the
literature, but a generic approach for designing these methods remains
under-explored. In this paper, we tackle this issue by formulating a general
framework to describe these problems, and propose a gradient-based algorithm to
solve them in a unified way. As an illustration of this approach, we study the
adaptive generation of parameters for iterative solvers to accelerate the
solution of differential equations. We demonstrate the performance and
versatility of our method through theoretical analysis and numerical
experiments, including applications to incompressible flow simulations and an
inverse problem of parameter estimation. |
1,550 | Automatic Correction of Human Translations | We introduce translation error correction (TEC), the task of automatically
correcting human-generated translations. Imperfections in machine translations
(MT) have long motivated systems for improving translations post-hoc with
automatic post-editing. In contrast, little attention has been devoted to the
problem of automatically correcting human translations, despite the intuition
that humans make distinct errors that machines would be well-suited to assist
with, from typos to inconsistencies in translation conventions. To investigate
this, we build and release the Aced corpus with three TEC datasets. We show
that human errors in TEC exhibit a more diverse range of errors and far fewer
translation fluency errors than the MT errors in automatic post-editing
datasets, suggesting the need for dedicated TEC models that are specialized to
correct human errors. We show that pre-training instead on synthetic errors
based on human errors improves TEC F-score by as much as 5.1 points. We
conducted a human-in-the-loop user study with nine professional translation
editors and found that the assistance of our TEC system led them to produce
significantly higher quality revised translations. |
1,551 | NAFS: A Simple yet Tough-to-beat Baseline for Graph Representation Learning | Recently, graph neural networks (GNNs) have shown prominent performance in
graph representation learning by leveraging knowledge from both graph structure
and node features. However, most of them have two major limitations. First,
GNNs can learn higher-order structural information by stacking more layers but
can not deal with large depth due to the over-smoothing issue. Second, it is
not easy to apply these methods on large graphs due to the expensive
computation cost and high memory usage. In this paper, we present node-adaptive
feature smoothing (NAFS), a simple non-parametric method that constructs node
representations without parameter learning. NAFS first extracts the features of
each node with its neighbors of different hops by feature smoothing, and then
adaptively combines the smoothed features. Besides, the constructed node
representation can further be enhanced by the ensemble of smoothed features
extracted via different smoothing strategies. We conduct experiments on four
benchmark datasets on two different application scenarios: node clustering and
link prediction. Remarkably, NAFS with feature ensemble outperforms the
state-of-the-art GNNs on these tasks and mitigates the aforementioned two
limitations of most learning-based GNN counterparts. |
1,552 | DFG-NAS: Deep and Flexible Graph Neural Architecture Search | Graph neural networks (GNNs) have been intensively applied to various
graph-based applications. Despite their success, manually designing the
well-behaved GNNs requires immense human expertise. And thus it is inefficient
to discover the potentially optimal data-specific GNN architecture. This paper
proposes DFG-NAS, a new neural architecture search (NAS) method that enables
the automatic search of very deep and flexible GNN architectures. Unlike most
existing methods that focus on micro-architectures, DFG-NAS highlights another
level of design: the search for macro-architectures on how atomic propagation
(\textbf{\texttt{P}}) and transformation (\textbf{\texttt{T}}) operations are
integrated and organized into a GNN. To this end, DFG-NAS proposes a novel
search space for \textbf{\texttt{P-T}} permutations and combinations based on
message-passing dis-aggregation, defines four custom-designed
macro-architecture mutations, and employs the evolutionary algorithm to conduct
an efficient and effective search. Empirical studies on four node
classification tasks demonstrate that DFG-NAS outperforms state-of-the-art
manual designs and NAS methods of GNNs. |
1,553 | A Flexible Diffusion Model | Diffusion (score-based) generative models have been widely used for modeling
various types of complex data, including images, audios, and point clouds.
Recently, the deep connection between forward-backward stochastic differential
equations (SDEs) and diffusion-based models has been revealed, and several new
variants of SDEs are proposed (e.g., sub-VP, critically-damped Langevin) along
this line. Despite the empirical success of the hand-crafted fixed forward
SDEs, a great quantity of proper forward SDEs remain unexplored. In this work,
we propose a general framework for parameterizing the diffusion model,
especially the spatial part of the forward SDE. An abstract formalism is
introduced with theoretical guarantees, and its connection with previous
diffusion models is leveraged. We demonstrate the theoretical advantage of our
method from an optimization perspective. Numerical experiments on synthetic
datasets, MINIST and CIFAR10 are also presented to validate the effectiveness
of our framework. |
1,554 | Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization | We focus on the problem of adversarial attacks against models on discrete
sequential data in the black-box setting where the attacker aims to craft
adversarial examples with limited query access to the victim model. Existing
black-box attacks, mostly based on greedy algorithms, find adversarial examples
using pre-computed key positions to perturb, which severely limits the search
space and might result in suboptimal solutions. To this end, we propose a
query-efficient black-box attack using Bayesian optimization, which dynamically
computes important positions using an automatic relevance determination (ARD)
categorical kernel. We introduce block decomposition and history subsampling
techniques to improve the scalability of Bayesian optimization when an input
sequence becomes long. Moreover, we develop a post-optimization algorithm that
finds adversarial examples with smaller perturbation size. Experiments on
natural language and protein classification tasks demonstrate that our method
consistently achieves higher attack success rate with significant reduction in
query count and modification rate compared to the previous state-of-the-art
methods. |
1,555 | Optimal Extragradient-Based Bilinearly-Coupled Saddle-Point Optimization | We consider the smooth convex-concave bilinearly-coupled saddle-point
problem, $\min_{\mathbf{x}}\max_{\mathbf{y}}~F(\mathbf{x}) +
H(\mathbf{x},\mathbf{y}) - G(\mathbf{y})$, where one has access to stochastic
first-order oracles for $F$, $G$ as well as the bilinear coupling function $H$.
Building upon standard stochastic extragradient analysis for variational
inequalities, we present a stochastic \emph{accelerated gradient-extragradient
(AG-EG)} descent-ascent algorithm that combines extragradient and Nesterov's
acceleration in general stochastic settings. This algorithm leverages scheduled
restarting to admit a fine-grained nonasymptotic convergence rate that matches
known lower bounds by both \citet{ibrahim2020linear} and \citet{zhang2021lower}
in their corresponding settings, plus an additional statistical error term for
bounded stochastic noise that is optimal up to a constant prefactor. This is
the first result that achieves such a relatively mature characterization of
optimality in saddle-point optimization. |
1,556 | Bootstrapped Transformer for Offline Reinforcement Learning | Offline reinforcement learning (RL) aims at learning policies from previously
collected static trajectory data without interacting with the real environment.
Recent works provide a novel perspective by viewing offline RL as a generic
sequence generation problem, adopting sequence models such as Transformer
architecture to model distributions over trajectories, and repurposing beam
search as a planning algorithm. However, the training datasets utilized in
general offline RL tasks are quite limited and often suffer from insufficient
distribution coverage, which could be harmful to training sequence generation
models yet has not drawn enough attention in the previous works. In this paper,
we propose a novel algorithm named Bootstrapped Transformer, which incorporates
the idea of bootstrapping and leverages the learned model to self-generate more
offline data to further boost the sequence model training. We conduct extensive
experiments on two offline RL benchmarks and demonstrate that our model can
largely remedy the existing offline RL training limitations and beat other
strong baseline methods. We also analyze the generated pseudo data and the
revealed characteristics may shed some light on offline RL training. The codes
are available at https://seqml.github.io/bootorl. |
1,557 | MET: Masked Encoding for Tabular Data | We consider the task of self-supervised representation learning (SSL) for
tabular data: tabular-SSL. Typical contrastive learning based SSL methods
require instance-wise data augmentations which are difficult to design for
unstructured tabular data. Existing tabular-SSL methods design such
augmentations in a relatively ad-hoc fashion and can fail to capture the
underlying data manifold. Instead of augmentations based approaches for
tabular-SSL, we propose a new reconstruction based method, called Masked
Encoding for Tabular Data (MET), that does not require augmentations. MET is
based on the popular MAE approach for vision-SSL [He et al., 2021] and uses two
key ideas: (i) since each coordinate in a tabular dataset has a distinct
meaning, we need to use separate representations for all coordinates, and (ii)
using an adversarial reconstruction loss in addition to the standard one.
Empirical results on five diverse tabular datasets show that MET achieves a new
state of the art (SOTA) on all of these datasets and improves up to 9% over
current SOTA methods. We shed more light on the working of MET via experiments
on carefully designed simple datasets. |
1,558 | Boosting Graph Structure Learning with Dummy Nodes | With the development of graph kernels and graph representation learning, many
superior methods have been proposed to handle scalability and oversmoothing
issues on graph structure learning. However, most of those strategies are
designed based on practical experience rather than theoretical analysis. In
this paper, we use a particular dummy node connecting to all existing vertices
without affecting original vertex and edge properties. We further prove that
such the dummy node can help build an efficient monomorphic edge-to-vertex
transform and an epimorphic inverse to recover the original graph back. It also
indicates that adding dummy nodes can preserve local and global structures for
better graph representation learning. We extend graph kernels and graph neural
networks with dummy nodes and conduct experiments on graph classification and
subgraph isomorphism matching tasks. Empirical results demonstrate that taking
graphs with dummy nodes as input significantly boosts graph structure learning,
and using their edge-to-vertex graphs can also achieve similar results. We also
discuss the gain of expressive power from the dummy in neural networks. |
1,559 | How You Start Matters for Generalization | Characterizing the remarkable generalization properties of over-parameterized
neural networks remains an open problem. In this paper, we promote a shift of
focus towards initialization rather than neural architecture or (stochastic)
gradient descent to explain this implicit regularization. Through a Fourier
lens, we derive a general result for the spectral bias of neural networks and
show that the generalization of neural networks is heavily tied to their
initialization. Further, we empirically solidify the developed theoretical
insights using practical, deep networks. Finally, we make a case against the
controversial flat-minima conjecture and show that Fourier analysis grants a
more reliable framework for understanding the generalization of neural
networks. |
1,560 | Thompson Sampling for Robust Transfer in Multi-Task Bandits | We study the problem of online multi-task learning where the tasks are
performed within similar but not necessarily identical multi-armed bandit
environments. In particular, we study how a learner can improve its overall
performance across multiple related tasks through robust transfer of knowledge.
While an upper confidence bound (UCB)-based algorithm has recently been shown
to achieve nearly-optimal performance guarantees in a setting where all tasks
are solved concurrently, it remains unclear whether Thompson sampling (TS)
algorithms, which have superior empirical performance in general, share similar
theoretical properties. In this work, we present a TS-type algorithm for a more
general online multi-task learning protocol, which extends the concurrent
setting. We provide its frequentist analysis and prove that it is also
nearly-optimal using a novel concentration inequality for multi-task data
aggregation at random stopping times. Finally, we evaluate the algorithm on
synthetic data and show that the TS-type algorithm enjoys superior empirical
performance in comparison with the UCB-based algorithm and a baseline algorithm
that performs TS for each individual task without transfer. |
1,561 | SOS: Score-based Oversampling for Tabular Data | Score-based generative models (SGMs) are a recent breakthrough in generating
fake images. SGMs are known to surpass other generative models, e.g.,
generative adversarial networks (GANs) and variational autoencoders (VAEs).
Being inspired by their big success, in this work, we fully customize them for
generating fake tabular data. In particular, we are interested in oversampling
minor classes since imbalanced classes frequently lead to sub-optimal training
outcomes. To our knowledge, we are the first presenting a score-based tabular
data oversampling method. Firstly, we re-design our own score network since we
have to process tabular data. Secondly, we propose two options for our
generation method: the former is equivalent to a style transfer for tabular
data and the latter uses the standard generative policy of SGMs. Lastly, we
define a fine-tuning method, which further enhances the oversampling quality.
In our experiments with 6 datasets and 10 baselines, our method outperforms
other oversampling methods in all cases. |
1,562 | NU-Wave 2: A General Neural Audio Upsampling Model for Various Sampling Rates | Conventionally, audio super-resolution models fixed the initial and the
target sampling rates, which necessitate the model to be trained for each pair
of sampling rates. We introduce NU-Wave 2, a diffusion model for neural audio
upsampling that enables the generation of 48 kHz audio signals from inputs of
various sampling rates with a single model. Based on the architecture of
NU-Wave, NU-Wave 2 uses short-time Fourier convolution (STFC) to generate
harmonics to resolve the main failure modes of NU-Wave, and incorporates
bandwidth spectral feature transform (BSFT) to condition the bandwidths of
inputs in the frequency domain. We experimentally demonstrate that NU-Wave 2
produces high-resolution audio regardless of the sampling rate of input while
requiring fewer parameters than other models. The official code and the audio
samples are available at https://mindslab-ai.github.io/nuwave2. |
1,563 | Strategic Representation | Humans have come to rely on machines for reducing excessive information to
manageable representations. But this reliance can be abused -- strategic
machines might craft representations that manipulate their users. How can a
user make good choices based on strategic representations? We formalize this as
a learning problem, and pursue algorithms for decision-making that are robust
to manipulation. In our main setting of interest, the system represents
attributes of an item to the user, who then decides whether or not to consume.
We model this interaction through the lens of strategic classification (Hardt
et al. 2016), reversed: the user, who learns, plays first; and the system,
which responds, plays second. The system must respond with representations that
reveal `nothing but the truth' but need not reveal the entire truth. Thus, the
user faces the problem of learning set functions under strategic subset
selection, which presents distinct algorithmic and statistical challenges. Our
main result is a learning algorithm that minimizes error despite strategic
representations, and our theoretical analysis sheds light on the trade-off
between learning effort and susceptibility to manipulation. |
1,564 | Large-Margin Representation Learning for Texture Classification | This paper presents a novel approach combining convolutional layers (CLs) and
large-margin metric learning for training supervised models on small datasets
for texture classification. The core of such an approach is a loss function
that computes the distances between instances of interest and support vectors.
The objective is to update the weights of CLs iteratively to learn a
representation with a large margin between classes. Each iteration results in a
large-margin discriminant model represented by support vectors based on such a
representation. The advantage of the proposed approach w.r.t. convolutional
neural networks (CNNs) is two-fold. First, it allows representation learning
with a small amount of data due to the reduced number of parameters compared to
an equivalent CNN. Second, it has a low training cost since the backpropagation
considers only support vectors. The experimental results on texture and
histopathologic image datasets have shown that the proposed approach achieves
competitive accuracy with lower computational cost and faster convergence when
compared to equivalent CNNs. |
1,565 | Reframed GES with a Neural Conditional Dependence Measure | In a nonparametric setting, the causal structure is often identifiable only
up to Markov equivalence, and for the purpose of causal inference, it is useful
to learn a graphical representation of the Markov equivalence class (MEC). In
this paper, we revisit the Greedy Equivalence Search (GES) algorithm, which is
widely cited as a score-based algorithm for learning the MEC of the underlying
causal structure. We observe that in order to make the GES algorithm consistent
in a nonparametric setting, it is not necessary to design a scoring metric that
evaluates graphs. Instead, it suffices to plug in a consistent estimator of a
measure of conditional dependence to guide the search. We therefore present a
reframing of the GES algorithm, which is more flexible than the standard
score-based version and readily lends itself to the nonparametric setting with
a general measure of conditional dependence. In addition, we propose a neural
conditional dependence (NCD) measure, which utilizes the expressive power of
deep neural networks to characterize conditional independence in a
nonparametric manner. We establish the optimality of the reframed GES algorithm
under standard assumptions and the consistency of using our NCD estimator to
decide conditional independence. Together these results justify the proposed
approach. Experimental results demonstrate the effectiveness of our method in
causal discovery, as well as the advantages of using our NCD measure over
kernel-based measures. |
1,566 | Accelerating Shapley Explanation via Contributive Cooperator Selection | Even though Shapley value provides an effective explanation for a DNN model
prediction, the computation relies on the enumeration of all possible input
feature coalitions, which leads to the exponentially growing complexity. To
address this problem, we propose a novel method SHEAR to significantly
accelerate the Shapley explanation for DNN models, where only a few coalitions
of input features are involved in the computation. The selection of the feature
coalitions follows our proposed Shapley chain rule to minimize the absolute
error from the ground-truth Shapley values, such that the computation can be
both efficient and accurate. To demonstrate the effectiveness, we
comprehensively evaluate SHEAR across multiple metrics including the absolute
error from the ground-truth Shapley value, the faithfulness of the
explanations, and running speed. The experimental results indicate SHEAR
consistently outperforms state-of-the-art baseline methods across different
evaluation metrics, which demonstrates its potentials in real-world
applications where the computational resource is limited. |
1,567 | SafeRL-Kit: Evaluating Efficient Reinforcement Learning Methods for Safe Autonomous Driving | Safe reinforcement learning (RL) has achieved significant success on
risk-sensitive tasks and shown promise in autonomous driving (AD) as well.
Considering the distinctiveness of this community, efficient and reproducible
baselines are still lacking for safe AD. In this paper, we release SafeRL-Kit
to benchmark safe RL methods for AD-oriented tasks. Concretely, SafeRL-Kit
contains several latest algorithms specific to zero-constraint-violation tasks,
including Safety Layer, Recovery RL, off-policy Lagrangian method, and Feasible
Actor-Critic. In addition to existing approaches, we propose a novel
first-order method named Exact Penalty Optimization (EPO) and sufficiently
demonstrate its capability in safe AD. All algorithms in SafeRL-Kit are
implemented (i) under the off-policy setting, which improves sample efficiency
and can better leverage past logs; (ii) with a unified learning framework,
providing off-the-shelf interfaces for researchers to incorporate their
domain-specific knowledge into fundamental safe RL methods. Conclusively, we
conduct a comparative evaluation of the above algorithms in SafeRL-Kit and shed
light on their efficacy for safe autonomous driving. The source code is
available at \href{ https://github.com/zlr20/saferl_kit}{this https URL}. |
1,568 | A Spatio-Temporal Neural Network Forecasting Approach for Emulation of Firefront Models | Computational simulations of wildfire spread typically employ empirical
rate-of-spread calculations under various conditions (such as terrain, fuel
type, weather). Small perturbations in conditions can often lead to significant
changes in fire spread (such as speed and direction), necessitating a
computationally expensive large set of simulations to quantify uncertainty.
Model emulation seeks alternative representations of physical models using
machine learning, aiming to provide more efficient and/or simplified surrogate
models. We propose a dedicated spatio-temporal neural network based framework
for model emulation, able to capture the complex behaviour of fire spread
models. The proposed approach can approximate forecasts at fine spatial and
temporal resolutions that are often challenging for neural network based
approaches. Furthermore, the proposed approach is robust even with small
training sets, due to novel data augmentation methods. Empirical experiments
show good agreement between simulated and emulated firefronts, with an average
Jaccard score of 0.76. |
1,569 | Thompson Sampling Achieves $\tilde O(\sqrt{T})$ Regret in Linear Quadratic Control | Thompson Sampling (TS) is an efficient method for decision-making under
uncertainty, where an action is sampled from a carefully prescribed
distribution which is updated based on the observed data. In this work, we
study the problem of adaptive control of stabilizable linear-quadratic
regulators (LQRs) using TS, where the system dynamics are unknown. Previous
works have established that $\tilde O(\sqrt{T})$ frequentist regret is optimal
for the adaptive control of LQRs. However, the existing methods either work
only in restrictive settings, require a priori known stabilizing controllers,
or utilize computationally intractable approaches. We propose an efficient TS
algorithm for the adaptive control of LQRs, TS-based Adaptive Control, TSAC,
that attains $\tilde O(\sqrt{T})$ regret, even for multidimensional systems,
thereby solving the open problem posed in Abeille and Lazaric (2018). TSAC does
not require a priori known stabilizing controller and achieves fast
stabilization of the underlying system by effectively exploring the environment
in the early stages. Our result hinges on developing a novel lower bound on the
probability that the TS provides an optimistic sample. By carefully prescribing
an early exploration strategy and a policy update rule, we show that TS
achieves order-optimal regret in adaptive control of multidimensional
stabilizable LQRs. We empirically demonstrate the performance and the
efficiency of TSAC in several adaptive control tasks. |
1,570 | MetaFed: Federated Learning among Federations with Cyclic Knowledge Distillation for Personalized Healthcare | Federated learning has attracted increasing attention to building models
without accessing the raw user data, especially in healthcare. In real
applications, different federations can seldom work together due to possible
reasons such as data heterogeneity and distrust/inexistence of the central
server. In this paper, we propose a novel framework called MetaFed to
facilitate trustworthy FL between different federations. MetaFed obtains a
personalized model for each federation without a central server via the
proposed Cyclic Knowledge Distillation. Specifically, MetaFed treats each
federation as a meta distribution and aggregates knowledge of each federation
in a cyclic manner. The training is split into two parts: common knowledge
accumulation and personalization. Comprehensive experiments on three benchmarks
demonstrate that MetaFed without a server achieves better accuracy compared to
state-of-the-art methods (e.g., 10%+ accuracy improvement compared to the
baseline for PAMAP2) with fewer communication costs. |
1,571 | ComENet: Towards Complete and Efficient Message Passing for 3D Molecular Graphs | Many real-world data can be modeled as 3D graphs, but learning
representations that incorporates 3D information completely and efficiently is
challenging. Existing methods either use partial 3D information, or suffer from
excessive computational cost. To incorporate 3D information completely and
efficiently, we propose a novel message passing scheme that operates within
1-hop neighborhood. Our method guarantees full completeness of 3D information
on 3D graphs by achieving global and local completeness. Notably, we propose
the important rotation angles to fulfill global completeness. Additionally, we
show that our method is orders of magnitude faster than prior methods. We
provide rigorous proof of completeness and analysis of time complexity for our
methods. As molecules are in essence quantum systems, we build the
\underline{com}plete and \underline{e}fficient graph neural network (ComENet)
by combing quantum inspired basis functions and the proposed message passing
scheme. Experimental results demonstrate the capability and efficiency of
ComENet, especially on real-world datasets that are large in both numbers and
sizes of graphs. Our code is publicly available as part of the DIG library
(\url{https://github.com/divelab/DIG}). |
1,572 | A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks | Textual backdoor attacks are a kind of practical threat to NLP systems. By
injecting a backdoor in the training phase, the adversary could control model
predictions via predefined triggers. As various attack and defense models have
been proposed, it is of great significance to perform rigorous evaluations.
However, we highlight two issues in previous backdoor learning evaluations: (1)
The differences between real-world scenarios (e.g. releasing poisoned datasets
or models) are neglected, and we argue that each scenario has its own
constraints and concerns, thus requires specific evaluation protocols; (2) The
evaluation metrics only consider whether the attacks could flip the models'
predictions on poisoned samples and retain performances on benign samples, but
ignore that poisoned samples should also be stealthy and semantic-preserving.
To address these issues, we categorize existing works into three practical
scenarios in which attackers release datasets, pre-trained models, and
fine-tuned models respectively, then discuss their unique evaluation
methodologies. On metrics, to completely evaluate poisoned samples, we use
grammar error increase and perplexity difference for stealthiness, along with
text similarity for validity. After formalizing the frameworks, we develop an
open-source toolkit OpenBackdoor to foster the implementations and evaluations
of textual backdoor learning. With this toolkit, we perform extensive
experiments to benchmark attack and defense models under the suggested
paradigm. To facilitate the underexplored defenses against poisoned datasets,
we further propose CUBE, a simple yet strong clustering-based defense baseline.
We hope that our frameworks and benchmarks could serve as the cornerstones for
future model development and evaluations. |
1,573 | TLETA: Deep Transfer Learning and Integrated Cellular Knowledge for Estimated Time of Arrival Prediction | Vehicle arrival time prediction has been studied widely. With the emergence
of IoT devices and deep learning techniques, estimated time of arrival (ETA)
has become a critical component in intelligent transportation systems. Though
many tools exist for ETA, ETA for special vehicles, such as ambulances, fire
engines, etc., is still challenging due to the limited amount of traffic data
for special vehicles. Existing works use one model for all types of vehicles,
which can lead to low accuracy. To tackle this, as the first in the field, we
propose a deep transfer learning framework TLETA for the driving time
prediction. TLETA constructs cellular spatial-temporal knowledge grids for
extracting driving patterns, combined with the road network structure embedding
to build a deep neural network for ETA. TLETA contains transferable layers to
support knowledge transfer between different categories of vehicles.
Importantly, our transfer models only train the last layers to map the
transferred knowledge, that reduces the training time significantly. The
experimental studies show that our model predicts travel time with high
accuracy and outperforms many state-of-the-art approaches. |
1,574 | What do navigation agents learn about their environment? | Today's state of the art visual navigation agents typically consist of large
deep learning models trained end to end. Such models offer little to no
interpretability about the learned skills or the actions of the agent taken in
response to its environment. While past works have explored interpreting deep
learning models, little attention has been devoted to interpreting embodied AI
systems, which often involve reasoning about the structure of the environment,
target characteristics and the outcome of one's actions. In this paper, we
introduce the Interpretability System for Embodied agEnts (iSEE) for Point Goal
and Object Goal navigation agents. We use iSEE to probe the dynamic
representations produced by these agents for the presence of information about
the agent as well as the environment. We demonstrate interesting insights about
navigation agents using iSEE, including the ability to encode reachable
locations (to avoid obstacles), visibility of the target, progress from the
initial spawn location as well as the dramatic effect on the behaviors of
agents when we mask out critical individual neurons. The code is available at:
https://github.com/allenai/iSEE |
1,575 | A Parametric Class of Approximate Gradient Updates for Policy Optimization | Approaches to policy optimization have been motivated from diverse
principles, based on how the parametric model is interpreted (e.g. value versus
policy representation) or how the learning objective is formulated, yet they
share a common goal of maximizing expected return. To better capture the
commonalities and identify key differences between policy optimization methods,
we develop a unified perspective that re-expresses the underlying updates in
terms of a limited choice of gradient form and scaling function. In particular,
we identify a parameterized space of approximate gradient updates for policy
optimization that is highly structured, yet covers both classical and recent
examples, including PPO. As a result, we obtain novel yet well motivated
updates that generalize existing algorithms in a way that can deliver benefits
both in terms of convergence speed and final result quality. An experimental
investigation demonstrates that the additional degrees of freedom provided in
the parameterized family of updates can be leveraged to obtain non-trivial
improvements both in synthetic domains and on popular deep RL benchmarks. |
1,576 | Deep reinforcement learning for fMRI prediction of Autism Spectrum Disorder | Purpose : Because functional MRI (fMRI) data sets are in general small, we
sought a data efficient approach to resting state fMRI classification of autism
spectrum disorder (ASD) versus neurotypical (NT) controls. We hypothesized that
a Deep Reinforcement Learning (DRL) classifier could learn effectively on a
small fMRI training set.
Methods : We trained a Deep Reinforcement Learning (DRL) classifier on 100
graph-label pairs from the Autism Brain Imaging Data Exchange (ABIDE) database.
For comparison, we trained a Supervised Deep Learning (SDL) classifier on the
same training set.
Results : DRL significantly outperformed SDL, with a p-value of 2.4 x
10^(-7). DRL achieved superior results for a variety of classifier performance
metrics, including an F1 score of 76, versus 67 for SDL. Whereas SDL quickly
overfit the training data, DRL learned in a progressive manner that generalised
to the separate testing set.
Conclusion : DRL can learn to classify ASD versus NT in a data efficient
manner, doing so for a small training set. Future work will involve optimizing
the neural network for data efficiency and applying the approach to other fMRI
data sets, namely for brain cancer patients. |
1,577 | Self-Supervised Contrastive Pre-Training For Time Series via Time-Frequency Consistency | Pre-training on time series poses a unique challenge due to the potential
mismatch between pre-training and target domains, such as shifts in temporal
dynamics, fast-evolving trends, and long-range and short cyclic effects, which
can lead to poor downstream performance. While domain adaptation methods can
mitigate these shifts, most methods need examples directly from the target
domain, making them suboptimal for pre-training. To address this challenge,
methods need to accommodate target domains with different temporal dynamics and
be capable of doing so without seeing any target examples during pre-training.
Relative to other modalities, in time series, we expect that time-based and
frequency-based representations of the same example are located close together
in the time-frequency space. To this end, we posit that time-frequency
consistency (TF-C) -- embedding a time-based neighborhood of a particular
example close to its frequency-based neighborhood and back -- is desirable for
pre-training. Motivated by TF-C, we define a decomposable pre-training model,
where the self-supervised signal is provided by the distance between time and
frequency components, each individually trained by contrastive estimation. We
evaluate the new method on eight datasets, including electrodiagnostic testing,
human activity recognition, mechanical fault detection, and physical status
monitoring. Experiments against eight state-of-the-art methods show that TF-C
outperforms baselines by 15.4% (F1 score) on average in one-to-one settings
(e.g., fine-tuning an EEG-pretrained model on EMG data) and by up to 8.4% (F1
score) in challenging one-to-many settings, reflecting the breadth of scenarios
that arise in real-world applications. The source code and datasets are
available at https: //anonymous.4open.science/r/TFC-pretraining-6B07. |
1,578 | TKIL: Tangent Kernel Approach for Class Balanced Incremental Learning | When learning new tasks in a sequential manner, deep neural networks tend to
forget tasks that they previously learned, a phenomenon called catastrophic
forgetting. Class incremental learning methods aim to address this problem by
keeping a memory of a few exemplars from previously learned tasks, and
distilling knowledge from them. However, existing methods struggle to balance
the performance across classes since they typically overfit the model to the
latest task. In our work, we propose to address these challenges with the
introduction of a novel methodology of Tangent Kernel for Incremental Learning
(TKIL) that achieves class-balanced performance. The approach preserves the
representations across classes and balances the accuracy for each class, and as
such achieves better overall accuracy and variance. TKIL approach is based on
Neural Tangent Kernel (NTK), which describes the convergence behavior of neural
networks as a kernel function in the limit of infinite width. In TKIL, the
gradients between feature layers are treated as the distance between the
representations of these layers and can be defined as Gradients Tangent Kernel
loss (GTK loss) such that it is minimized along with averaging weights. This
allows TKIL to automatically identify the task and to quickly adapt to it
during inference. Experiments on CIFAR-100 and ImageNet datasets with various
incremental learning settings show that these strategies allow TKIL to
outperform existing state-of-the-art methods. |
1,579 | Revisiting Self-Distillation | Knowledge distillation is the procedure of transferring "knowledge" from a
large model (the teacher) to a more compact one (the student), often being used
in the context of model compression. When both models have the same
architecture, this procedure is called self-distillation. Several works have
anecdotally shown that a self-distilled student can outperform the teacher on
held-out data. In this work, we systematically study self-distillation in a
number of settings. We first show that even with a highly accurate teacher,
self-distillation allows a student to surpass the teacher in all cases.
Secondly, we revisit existing theoretical explanations of (self) distillation
and identify contradicting examples, revealing possible drawbacks of these
explanations. Finally, we provide an alternative explanation for the dynamics
of self-distillation through the lens of loss landscape geometry. We conduct
extensive experiments to show that self-distillation leads to flatter minima,
thereby resulting in better generalization. |
1,580 | Debugging using Orthogonal Gradient Descent | In this report we consider the following problem: Given a trained model that
is partially faulty, can we correct its behaviour without having to train the
model from scratch? In other words, can we ``debug" neural networks similar to
how we address bugs in our mathematical models and standard computer code. We
base our approach on the hypothesis that debugging can be treated as a two-task
continual learning problem. In particular, we employ a modified version of a
continual learning algorithm called Orthogonal Gradient Descent (OGD) to
demonstrate, via two simple experiments on the MNIST dataset, that we can
in-fact \textit{unlearn} the undesirable behaviour while retaining the general
performance of the model, and we can additionally \textit{relearn} the
appropriate behaviour, both without having to train the model from scratch. |
1,581 | High-Speed Accurate Robot Control using Learned Forward Kinodynamics and Non-linear Least Squares Optimization | Accurate control of robots in the real world requires a control system that
is capable of taking into account the kinodynamic interactions of the robot
with its environment. At high speeds, the dependence of the movement of the
robot on these kinodynamic interactions becomes more pronounced, making
high-speed, accurate robot control a challenging problem. Previous work has
shown that learning the inverse kinodynamics (IKD) of the robot can be helpful
for high-speed robot control. However a learned inverse kinodynamic model can
only be applied to a limited class of control problems, and different control
problems require the learning of a new IKD model. In this work we present a new
formulation for accurate, high-speed robot control that makes use of a learned
forward kinodynamic (FKD) model and non-linear least squares optimization. By
nature of the formulation, this approach is extensible to a wide array of
control problems without requiring the retraining of a new model. We
demonstrate the ability of this approach to accurately control a scale
one-tenth robot car at high speeds, and show improved results over baselines. |
1,582 | Multi-Frequency Joint Community Detection and Phase Synchronization | This paper studies the joint community detection and phase synchronization
problem on the \textit{stochastic block model with relative phase}, where each
node is associated with a phase. This problem, with a variety of real-world
applications, aims to recover community memberships and associated phases
simultaneously. By studying the maximum likelihood estimation formulation, we
show that this problem exhibits a \textit{``multi-frequency''} structure. To
this end, two simple yet efficient algorithms that leverage information across
multiple frequencies are proposed. The former is a spectral method based on the
novel multi-frequency column-pivoted QR factorization, and the latter is an
iterative multi-frequency generalized power method. Numerical experiments
indicate our proposed algorithms outperform state-of-the-art algorithms, in
recovering community memberships and associated phases. |
1,583 | Classification of datasets with imputed missing values: does imputation quality matter? | Classifying samples in incomplete datasets is a common aim for machine
learning practitioners, but is non-trivial. Missing data is found in most
real-world datasets and these missing values are typically imputed using
established methods, followed by classification of the now complete, imputed,
samples. The focus of the machine learning researcher is then to optimise the
downstream classification performance. In this study, we highlight that it is
imperative to consider the quality of the imputation. We demonstrate how the
commonly used measures for assessing quality are flawed and propose a new class
of discrepancy scores which focus on how well the method recreates the overall
distribution of the data. To conclude, we highlight the compromised
interpretability of classifier models trained using poorly imputed data. |
1,584 | Backdoor Attacks on Vision Transformers | Vision Transformers (ViT) have recently demonstrated exemplary performance on
a variety of vision tasks and are being used as an alternative to CNNs. Their
design is based on a self-attention mechanism that processes images as a
sequence of patches, which is quite different compared to CNNs. Hence it is
interesting to study if ViTs are vulnerable to backdoor attacks. Backdoor
attacks happen when an attacker poisons a small part of the training data for
malicious purposes. The model performance is good on clean test images, but the
attacker can manipulate the decision of the model by showing the trigger at
test time. To the best of our knowledge, we are the first to show that ViTs are
vulnerable to backdoor attacks. We also find an intriguing difference between
ViTs and CNNs - interpretation algorithms effectively highlight the trigger on
test images for ViTs but not for CNNs. Based on this observation, we propose a
test-time image blocking defense for ViTs which reduces the attack success rate
by a large margin. Code is available here:
https://github.com/UCDvision/backdoor_transformer.git |
1,585 | Zero-Shot AutoML with Pretrained Models | Given a new dataset D and a low compute budget, how should we choose a
pre-trained model to fine-tune to D, and set the fine-tuning hyperparameters
without risking overfitting, particularly if D is small? Here, we extend
automated machine learning (AutoML) to best make these choices. Our
domain-independent meta-learning approach learns a zero-shot surrogate model
which, at test time, allows to select the right deep learning (DL) pipeline
(including the pre-trained model and fine-tuning hyperparameters) for a new
dataset D given only trivial meta-features describing D such as image
resolution or the number of classes. To train this zero-shot model, we collect
performance data for many DL pipelines on a large collection of datasets and
meta-train on this data to minimize a pairwise ranking objective. We evaluate
our approach under the strict time limit of the vision track of the ChaLearn
AutoDL challenge benchmark, clearly outperforming all challenge contenders. |
1,586 | XLCoST: A Benchmark Dataset for Cross-lingual Code Intelligence | Recent advances in machine learning have significantly improved the
understanding of source code data and achieved good performance on a number of
downstream tasks. Open source repositories like GitHub enable this process with
rich unlabeled code data. However, the lack of high quality labeled data has
largely hindered the progress of several code related tasks, such as program
translation, summarization, synthesis, and code search. This paper introduces
XLCoST, Cross-Lingual Code SnippeT dataset, a new benchmark dataset for
cross-lingual code intelligence. Our dataset contains fine-grained parallel
data from 8 languages (7 commonly used programming languages and English), and
supports 10 cross-lingual code tasks. To the best of our knowledge, it is the
largest parallel dataset for source code both in terms of size and the number
of languages. We also provide the performance of several state-of-the-art
baseline models for each task. We believe this new dataset can be a valuable
asset for the research community and facilitate the development and validation
of new methods for cross-lingual code intelligence. |
1,587 | A Robust Stacking Framework for Training Deep Graph Models with Multifaceted Node Features | Graph Neural Networks (GNNs) with numerical node features and graph structure
as inputs have demonstrated superior performance on various supervised learning
tasks with graph data. However the numerical node features utilized by GNNs are
commonly extracted from raw data which is of text or tabular
(numeric/categorical) type in most real-world applications. The best models for
such data types in most standard supervised learning settings with IID
(non-graph) data are not simple neural network layers and thus are not easily
incorporated into a GNN. Here we propose a robust stacking framework that fuses
graph-aware propagation with arbitrary models intended for IID data, which are
ensembled and stacked in multiple layers. Our layer-wise framework leverages
bagging and stacking strategies to enjoy strong generalization, in a manner
which effectively mitigates label leakage and overfitting. Across a variety of
graph datasets with tabular/text node features, our method achieves comparable
or superior performance relative to both tabular/text and graph neural network
models, as well as existing state-of-the-art hybrid strategies that combine the
two. |
1,588 | Variational Estimators of the Degree-corrected Latent Block Model for Bipartite Networks | Biclustering on bipartite graphs is an unsupervised learning task that
simultaneously clusters the two types of objects in the graph, for example,
users and movies in a movie review dataset. The latent block model (LBM) has
been proposed as a model-based tool for biclustering. Biclustering results by
the LBM are, however, usually dominated by the row and column sums of the data
matrix, i.e., degrees. We propose a degree-corrected latent block model
(DC-LBM) to accommodate degree heterogeneity in row and column clusters, which
greatly outperforms the classical LBM in the MovieLens dataset and simulated
data. We develop an efficient variational expectation-maximization algorithm by
observing that the row and column degrees maximize the objective function in
the M step given any probability assignment on the cluster labels. We prove the
label consistency of the variational estimator under the DC-LBM, which allows
the expected graph density goes to zero as long as the average expected degrees
of rows and columns go to infinity. |
1,589 | PRANC: Pseudo RAndom Networks for Compacting deep models | Communication becomes a bottleneck in various distributed Machine Learning
settings. Here, we propose a novel training framework that leads to highly
efficient communication of models between agents. In short, we train our
network to be a linear combination of many pseudo-randomly generated frozen
models. For communication, the source agent transmits only the `seed' scalar
used to generate the pseudo-random `basis' networks along with the learned
linear mixture coefficients. Our method, denoted as PRANC, learns almost
$100\times$ fewer parameters than a deep model and still performs well on
several datasets and architectures. PRANC enables 1) efficient communication of
models between agents, 2) efficient model storage, and 3) accelerated inference
by generating layer-wise weights on the fly. We test PRANC on CIFAR-10,
CIFAR-100, tinyImageNet, and ImageNet-100 with various architectures like
AlexNet, LeNet, ResNet18, ResNet20, and ResNet56 and demonstrate a massive
reduction in the number of parameters while providing satisfactory performance
on these benchmark datasets. The code is available
\href{https://github.com/UCDvision/PRANC}{https://github.com/UCDvision/PRANC} |
1,590 | Recursive Neural Programs: Variational Learning of Image Grammars and Part-Whole Hierarchies | Human vision involves parsing and representing objects and scenes using
structured representations based on part-whole hierarchies. Computer vision and
machine learning researchers have recently sought to emulate this capability
using capsule networks, reference frames and active predictive coding, but a
generative model formulation has been lacking. We introduce Recursive Neural
Programs (RNPs), which, to our knowledge, is the first neural generative model
to address the part-whole hierarchy learning problem. RNPs model images as
hierarchical trees of probabilistic sensory-motor programs that recursively
reuse learned sensory-motor primitives to model an image within different
reference frames, forming recursive image grammars. We express RNPs as
structured variational autoencoders (sVAEs) for inference and sampling, and
demonstrate parts-based parsing, sampling and one-shot transfer learning for
MNIST, Omniglot and Fashion-MNIST datasets, demonstrating the model's
expressive power. Our results show that RNPs provide an intuitive and
explainable way of composing objects and scenes, allowing rich compositionality
and intuitive interpretations of objects in terms of part-whole hierarchies. |
1,591 | TUSK: Task-Agnostic Unsupervised Keypoints | Existing unsupervised methods for keypoint learning rely heavily on the
assumption that a specific keypoint type (e.g. elbow, digit, abstract geometric
shape) appears only once in an image. This greatly limits their applicability,
as each instance must be isolated before applying the method-an issue that is
never discussed or evaluated. We thus propose a novel method to learn
Task-agnostic, UnSupervised Keypoints (TUSK) which can deal with multiple
instances. To achieve this, instead of the commonly-used strategy of detecting
multiple heatmaps, each dedicated to a specific keypoint type, we use a single
heatmap for detection, and enable unsupervised learning of keypoint types
through clustering. Specifically, we encode semantics into the keypoints by
teaching them to reconstruct images from a sparse set of keypoints and their
descriptors, where the descriptors are forced to form distinct clusters in
feature space around learned prototypes. This makes our approach amenable to a
wider range of tasks than any previous unsupervised keypoint method: we show
experiments on multiple-instance detection and classification, object
discovery, and landmark detection-all unsupervised-with performance on par with
the state of the art, while also being able to deal with multiple instances. |
1,592 | Local overlap reduction procedure for dynamic ensemble selection | Class imbalance is a characteristic known for making learning more
challenging for classification models as they may end up biased towards the
majority class. A promising approach among the ensemble-based methods in the
context of imbalance learning is Dynamic Selection (DS). DS techniques single
out a subset of the classifiers in the ensemble to label each given unknown
sample according to their estimated competence in the area surrounding the
query. Because only a small region is taken into account in the selection
scheme, the global class disproportion may have less impact over the system's
performance. However, the presence of local class overlap may severely hinder
the DS techniques' performance over imbalanced distributions as it not only
exacerbates the effects of the under-representation but also introduces
ambiguous and possibly unreliable samples to the competence estimation process.
Thus, in this work, we propose a DS technique which attempts to minimize the
effects of the local class overlap during the classifier selection procedure.
The proposed method iteratively removes from the target region the instance
perceived as the hardest to classify until a classifier is deemed competent to
label the query sample. The known samples are characterized using instance
hardness measures that quantify the local class overlap. Experimental results
show that the proposed technique can significantly outperform the baseline as
well as several other DS techniques, suggesting its suitability for dealing
with class under-representation and overlap. Furthermore, the proposed
technique still yielded competitive results when using an under-sampled, less
overlapped version of the labelled sets, specially over the problems with a
high proportion of minority class samples in overlap areas. Code available at
https://github.com/marianaasouza/lords. |
1,593 | Quantifying Feature Contributions to Overall Disparity Using Information Theory | When a machine-learning algorithm makes biased decisions, it can be helpful
to understand the sources of disparity to explain why the bias exists. Towards
this, we examine the problem of quantifying the contribution of each individual
feature to the observed disparity. If we have access to the decision-making
model, one potential approach (inspired from intervention-based approaches in
explainability literature) is to vary each individual feature (while keeping
the others fixed) and use the resulting change in disparity to quantify its
contribution. However, we may not have access to the model or be able to
test/audit its outputs for individually varying features. Furthermore, the
decision may not always be a deterministic function of the input features
(e.g., with human-in-the-loop). For these situations, we might need to explain
contributions using purely distributional (i.e., observational) techniques,
rather than interventional. We ask the question: what is the "potential"
contribution of each individual feature to the observed disparity in the
decisions when the exact decision-making mechanism is not accessible? We first
provide canonical examples (thought experiments) that help illustrate the
difference between distributional and interventional approaches to explaining
contributions, and when either is better suited. When unable to intervene on
the inputs, we quantify the "redundant" statistical dependency about the
protected attribute that is present in both the final decision and an
individual feature, by leveraging a body of work in information theory called
Partial Information Decomposition. We also perform a simple case study to show
how this technique could be applied to quantify contributions. |
1,594 | GOOD: A Graph Out-of-Distribution Benchmark | Out-of-distribution (OOD) learning deals with scenarios in which training and
test data follow different distributions. Although general OOD problems have
been intensively studied in machine learning, graph OOD is only an emerging
area of research. Currently, there lacks a systematic benchmark tailored to
graph OOD method evaluation. In this work, we aim at developing an OOD
benchmark, known as GOOD, for graphs specifically. We explicitly make
distinctions between covariate and concept shifts and design data splits that
accurately reflect different shifts. We consider both graph and node prediction
tasks as there are key differences when designing shifts. Overall, GOOD
contains 8 datasets with 14 domain selections. When combined with covariate,
concept, and no shifts, we obtain 42 different splits. We provide performance
results on 7 commonly used baseline methods with 10 random runs. This results
in 294 dataset-model combinations in total. Our results show significant
performance gaps between in-distribution and OOD settings. Our results also
shed light on different performance trends between covariate and concept shifts
by different methods. Our GOOD benchmark is a growing project and expects to
expand in both quantity and variety of resources as the area develops. The GOOD
benchmark can be accessed via
$\href{https://github.com/divelab/GOOD/}{\text{https://github.com/divelab/GOOD/}}$. |
1,595 | I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences | Machine Learning-as-a-Service (MLaaS) has become a widespread paradigm,
making even the most complex machine learning models available for clients via
e.g. a pay-per-query principle. This allows users to avoid time-consuming
processes of data collection, hyperparameter tuning, and model training.
However, by giving their customers access to the (predictions of their) models,
MLaaS providers endanger their intellectual property, such as sensitive
training data, optimised hyperparameters, or learned model parameters.
Adversaries can create a copy of the model with (almost) identical behavior
using the the prediction labels only. While many variants of this attack have
been described, only scattered defence strategies have been proposed,
addressing isolated threats. This raises the necessity for a thorough
systematisation of the field of model stealing, to arrive at a comprehensive
understanding why these attacks are successful, and how they could be
holistically defended against. We address this by categorising and comparing
model stealing attacks, assessing their performance, and exploring
corresponding defence techniques in different settings. We propose a taxonomy
for attack and defence approaches, and provide guidelines on how to select the
right attack or defence strategy based on the goal and available resources.
Finally, we analyse which defences are rendered less effective by current
attack strategies. |
1,596 | Active Fairness Auditing | The fast spreading adoption of machine learning (ML) by companies across
industries poses significant regulatory challenges. One such challenge is
scalability: how can regulatory bodies efficiently audit these ML models,
ensuring that they are fair? In this paper, we initiate the study of
query-based auditing algorithms that can estimate the demographic parity of ML
models in a query-efficient manner. We propose an optimal deterministic
algorithm, as well as a practical randomized, oracle-efficient algorithm with
comparable guarantees. Furthermore, we make inroads into understanding the
optimal query complexity of randomized active fairness estimation algorithms.
Our first exploration of active fairness estimation aims to put AI governance
on firmer theoretical foundations. |
1,597 | Empirical Bayesian Approaches for Robust Constraint-based Causal Discovery under Insufficient Data | Causal discovery is to learn cause-effect relationships among variables given
observational data and is important for many applications. Existing causal
discovery methods assume data sufficiency, which may not be the case in many
real world datasets. As a result, many existing causal discovery methods can
fail under limited data. In this work, we propose Bayesian-augmented
frequentist independence tests to improve the performance of constraint-based
causal discovery methods under insufficient data: 1) We firstly introduce a
Bayesian method to estimate mutual information (MI), based on which we propose
a robust MI based independence test; 2) Secondly, we consider the Bayesian
estimation of hypothesis likelihood and incorporate it into a well-defined
statistical test, resulting in a robust statistical testing based independence
test. We apply proposed independence tests to constraint-based causal discovery
methods and evaluate the performance on benchmark datasets with insufficient
samples. Experiments show significant performance improvement in terms of both
accuracy and efficiency over SOTA methods. |
1,598 | Understanding Decision-Time vs. Background Planning in Model-Based Reinforcement Learning | In model-based reinforcement learning, an agent can leverage a learned model
to improve its way of behaving in different ways. Two prevalent approaches are
decision-time planning and background planning. In this study, we are
interested in understanding under what conditions and in which settings one of
these two planning styles will perform better than the other in domains that
require fast responses. After viewing them through the lens of dynamic
programming, we first consider the classical instantiations of these planning
styles and provide theoretical results and hypotheses on which one will perform
better in the pure planning, planning & learning, and transfer learning
settings. We then consider the modern instantiations of these planning styles
and provide hypotheses on which one will perform better in the last two of the
considered settings. Lastly, we perform several illustrative experiments to
empirically validate both our theoretical results and hypotheses. Overall, our
findings suggest that even though decision-time planning does not perform as
well as background planning in their classical instantiations, in their modern
instantiations, it can perform on par or better than background planning in
both the planning & learning and transfer learning settings. |
1,599 | OpenSRH: optimizing brain tumor surgery using intraoperative stimulated Raman histology | Accurate intraoperative diagnosis is essential for providing safe and
effective care during brain tumor surgery. Our standard-of-care diagnostic
methods are time, resource, and labor intensive, which restricts access to
optimal surgical treatments. To address these limitations, we propose an
alternative workflow that combines stimulated Raman histology (SRH), a rapid
optical imaging method, with deep learning-based automated interpretation of
SRH images for intraoperative brain tumor diagnosis and real-time surgical
decision support. Here, we present OpenSRH, the first public dataset of
clinical SRH images from 300+ brain tumors patients and 1300+ unique whole
slide optical images. OpenSRH contains data from the most common brain tumors
diagnoses, full pathologic annotations, whole slide tumor segmentations, raw
and processed optical imaging data for end-to-end model development and
validation. We provide a framework for patch-based whole slide SRH
classification and inference using weak (i.e. patient-level) diagnostic labels.
Finally, we benchmark two computer vision tasks: multiclass histologic brain
tumor classification and patch-based contrastive representation learning. We
hope OpenSRH will facilitate the clinical translation of rapid optical imaging
and real-time ML-based surgical decision support in order to improve the
access, safety, and efficacy of cancer surgery in the era of precision
medicine. Dataset access, code, and benchmarks are available at
opensrh.mlins.org. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.