Unnamed: 0
int64 0
5k
| title
stringlengths 9
210
| abstract
stringlengths 164
1.92k
|
---|---|---|
3,000 | Weakly Supervised Representation Learning with Sparse Perturbations | The theory of representation learning aims to build methods that provably
invert the data generating process with minimal domain knowledge or any source
of supervision. Most prior approaches require strong distributional assumptions
on the latent variables and weak supervision (auxiliary information such as
timestamps) to provide provable identification guarantees. In this work, we
show that if one has weak supervision from observations generated by sparse
perturbations of the latent variables--e.g. images in a reinforcement learning
environment where actions move individual sprites--identification is achievable
under unknown continuous latent distributions. We show that if the
perturbations are applied only on mutually exclusive blocks of latents, we
identify the latents up to those blocks. We also show that if these
perturbation blocks overlap, we identify latents up to the smallest blocks
shared across perturbations. Consequently, if there are blocks that intersect
in one latent variable only, then such latents are identified up to permutation
and scaling. We propose a natural estimation procedure based on this theory and
illustrate it on low-dimensional synthetic and image-based experiments. |
3,001 | Clipped Stochastic Methods for Variational Inequalities with Heavy-Tailed Noise | Stochastic first-order methods such as Stochastic Extragradient (SEG) or
Stochastic Gradient Descent-Ascent (SGDA) for solving smooth minimax problems
and, more generally, variational inequality problems (VIP) have been gaining a
lot of attention in recent years due to the growing popularity of adversarial
formulations in machine learning. However, while high-probability convergence
bounds are known to reflect the actual behavior of stochastic methods more
accurately, most convergence results are provided in expectation. Moreover, the
only known high-probability complexity results have been derived under
restrictive sub-Gaussian (light-tailed) noise and bounded domain Assump.
[Juditsky et al., 2011]. In this work, we prove the first high-probability
complexity results with logarithmic dependence on the confidence level for
stochastic methods for solving monotone and structured non-monotone VIPs with
non-sub-Gaussian (heavy-tailed) noise and unbounded domains. In the monotone
case, our results match the best-known ones in the light-tails case [Juditsky
et al., 2011], and are novel for structured non-monotone problems such as
negative comonotone, quasi-strongly monotone, and/or star-cocoercive ones. We
achieve these results by studying SEG and SGDA with clipping. In addition, we
numerically validate that the gradient noise of many practical GAN formulations
is heavy-tailed and show that clipping improves the performance of SEG/SGDA. |
3,002 | Combining Machine Learning and Agent-Based Modeling to Study Biomedical Systems | Agent-based modeling (ABM) is a well-established paradigm for simulating
complex systems via interactions between constituent entities. Machine learning
(ML) refers to approaches whereby statistical algorithms 'learn' from data on
their own, without imposing a priori theories of system behavior. Biological
systems -- from molecules, to cells, to entire organisms -- consist of vast
numbers of entities, governed by complex webs of interactions that span many
spatiotemporal scales and exhibit nonlinearity, stochasticity and intricate
coupling between entities. The macroscopic properties and collective dynamics
of such systems are difficult to capture via continuum modelling and mean-field
formalisms. ABM takes a 'bottom-up' approach that obviates these difficulties
by enabling one to easily propose and test a set of well-defined 'rules' to be
applied to the individual entities (agents) in a system. Evaluating a system
and propagating its state over discrete time-steps effectively simulates the
system, allowing observables to be computed and system properties to be
analyzed. Because the rules that govern an ABM can be difficult to abstract and
formulate from experimental data, there is an opportunity to use ML to help
infer optimal, system-specific ABM rules. Once such rule-sets are devised, ABM
calculations can generate a wealth of data, and ML can be applied there too --
e.g., to probe statistical measures that meaningfully describe a system's
stochastic properties. As an example of synergy in the other direction (from
ABM to ML), ABM simulations can generate realistic datasets for training ML
algorithms (e.g., for regularization, to mitigate overfitting). In these ways,
one can envision various synergistic ABM$\rightleftharpoons$ML loops. This
review summarizes how ABM and ML have been integrated in contexts that span
spatial scales from the cellular to population-level scale epidemiology. |
3,003 | Machine Learning-based Lung and Colon Cancer Detection using Deep Feature Extraction and Ensemble Learning | Cancer is a fatal disease caused by a combination of genetic diseases and a
variety of biochemical abnormalities. Lung and colon cancer have emerged as two
of the leading causes of death and disability in humans. The histopathological
detection of such malignancies is usually the most important component in
determining the best course of action. Early detection of the ailment on either
front considerably decreases the likelihood of mortality. Machine learning and
deep learning techniques can be utilized to speed up such cancer detection,
allowing researchers to study a large number of patients in a much shorter
amount of time and at a lower cost. In this research work, we introduced a
hybrid ensemble feature extraction model to efficiently identify lung and colon
cancer. It integrates deep feature extraction and ensemble learning with
high-performance filtering for cancer image datasets. The model is evaluated on
histopathological (LC25000) lung and colon datasets. According to the study
findings, our hybrid model can detect lung, colon, and (lung and colon) cancer
with accuracy rates of 99.05%, 100%, and 99.30%, respectively. The study's
findings show that our proposed strategy outperforms existing models
significantly. Thus, these models could be applicable in clinics to support the
doctor in the diagnosis of cancers. |
3,004 | Incorporating Explicit Uncertainty Estimates into Deep Offline Reinforcement Learning | Most theoretically motivated work in the offline reinforcement learning
setting requires precise uncertainty estimates. This requirement restricts the
algorithms derived in that work to the tabular and linear settings where such
estimates exist. In this work, we develop a novel method for incorporating
scalable uncertainty estimates into an offline reinforcement learning algorithm
called deep-SPIBB that extends the SPIBB family of algorithms to environments
with larger state and action spaces. We use recent innovations in uncertainty
estimation from the deep learning community to get more scalable uncertainty
estimates to plug into deep-SPIBB. While these uncertainty estimates do not
allow for the same theoretical guarantees as in the tabular case, we argue that
the SPIBB mechanism for incorporating uncertainty is more robust and flexible
than pessimistic approaches that incorporate the uncertainty as a value
function penalty. We bear this out empirically, showing that deep-SPIBB
outperforms pessimism based approaches with access to the same uncertainty
estimates and performs at least on par with a variety of other strong baselines
across several environments and datasets. |
3,005 | Revisiting the General Identifiability Problem | We revisit the problem of general identifiability originally introduced in
[Lee et al., 2019] for causal inference and note that it is necessary to add
positivity assumption of observational distribution to the original definition
of the problem. We show that without such an assumption the rules of
do-calculus and consequently the proposed algorithm in [Lee et al., 2019] are
not sound. Moreover, adding the assumption will cause the completeness proof in
[Lee et al., 2019] to fail. Under positivity assumption, we present a new
algorithm that is provably both sound and complete. A nice property of this new
algorithm is that it establishes a connection between general identifiability
and classical identifiability by Pearl [1995] through decomposing the general
identifiability problem into a series of classical identifiability
sub-problems. |
3,006 | When does return-conditioned supervised learning work for offline reinforcement learning? | Several recent works have proposed a class of algorithms for the offline
reinforcement learning (RL) problem that we will refer to as return-conditioned
supervised learning (RCSL). RCSL algorithms learn the distribution of actions
conditioned on both the state and the return of the trajectory. Then they
define a policy by conditioning on achieving high return. In this paper, we
provide a rigorous study of the capabilities and limitations of RCSL, something
which is crucially missing in previous work. We find that RCSL returns the
optimal policy under a set of assumptions that are stronger than those needed
for the more traditional dynamic programming-based algorithms. We provide
specific examples of MDPs and datasets that illustrate the necessity of these
assumptions and the limits of RCSL. Finally, we present empirical evidence that
these limitations will also cause issues in practice by providing illustrative
experiments in simple point-mass environments and on datasets from the D4RL
benchmark. |
3,007 | Deep Transformer Q-Networks for Partially Observable Reinforcement Learning | Real-world reinforcement learning tasks often involve some form of partial
observability where the observations only give a partial or noisy view of the
true state of the world. Such tasks typically require some form of memory,
where the agent has access to multiple past observations, in order to perform
well. One popular way to incorporate memory is by using a recurrent neural
network to access the agent's history. However, recurrent neural networks in
reinforcement learning are often fragile and difficult to train, susceptible to
catastrophic forgetting and sometimes fail completely as a result. In this
work, we propose Deep Transformer Q-Networks (DTQN), a novel architecture
utilizing transformers and self-attention to encode an agent's history. DTQN is
designed modularly, and we compare results against several modifications to our
base model. Our experiments demonstrate the transformer can solve partially
observable tasks faster and more stably than previous recurrent approaches. |
3,008 | Practical Adversarial Multivalid Conformal Prediction | We give a simple, generic conformal prediction method for sequential
prediction that achieves target empirical coverage guarantees against
adversarially chosen data. It is computationally lightweight -- comparable to
split conformal prediction -- but does not require having a held-out validation
set, and so all data can be used for training models from which to derive a
conformal score. It gives stronger than marginal coverage guarantees in two
ways. First, it gives threshold calibrated prediction sets that have correct
empirical coverage even conditional on the threshold used to form the
prediction set from the conformal score. Second, the user can specify an
arbitrary collection of subsets of the feature space -- possibly intersecting
-- and the coverage guarantees also hold conditional on membership in each of
these subsets. We call our algorithm MVP, short for MultiValid Prediction. We
give both theory and an extensive set of empirical evaluations. |
3,009 | DocLayNet: A Large Human-Annotated Dataset for Document-Layout Analysis | Accurate document layout analysis is a key requirement for high-quality PDF
document conversion. With the recent availability of public, large ground-truth
datasets such as PubLayNet and DocBank, deep-learning models have proven to be
very effective at layout detection and segmentation. While these datasets are
of adequate size to train such models, they severely lack in layout variability
since they are sourced from scientific article repositories such as PubMed and
arXiv only. Consequently, the accuracy of the layout segmentation drops
significantly when these models are applied on more challenging and diverse
layouts. In this paper, we present \textit{DocLayNet}, a new, publicly
available, document-layout annotation dataset in COCO format. It contains 80863
manually annotated pages from diverse data sources to represent a wide
variability in layouts. For each PDF page, the layout annotations provide
labelled bounding-boxes with a choice of 11 distinct classes. DocLayNet also
provides a subset of double- and triple-annotated pages to determine the
inter-annotator agreement. In multiple experiments, we provide baseline
accuracy scores (in mAP) for a set of popular object detection models. We also
demonstrate that these models fall approximately 10\% behind the
inter-annotator agreement. Furthermore, we provide evidence that DocLayNet is
of sufficient size. Lastly, we compare models trained on PubLayNet, DocBank and
DocLayNet, showing that layout predictions of the DocLayNet-trained models are
more robust and thus the preferred choice for general-purpose document-layout
analysis. |
3,010 | Detecting the Severity of Major Depressive Disorder from Speech: A Novel HARD-Training Methodology | Major Depressive Disorder (MDD) is a common worldwide mental health issue
with high associated socioeconomic costs. The prediction and automatic
detection of MDD can, therefore, make a huge impact on society. Speech, as a
non-invasive, easy to collect signal, is a promising marker to aid the
diagnosis and assessment of MDD. In this regard, speech samples were collected
as part of the Remote Assessment of Disease and Relapse in Major Depressive
Disorder (RADAR-MDD) research programme. RADAR-MDD was an observational cohort
study in which speech and other digital biomarkers were collected from a cohort
of individuals with a history of MDD in Spain, United Kingdom and the
Netherlands. In this paper, the RADAR-MDD speech corpus was taken as an
experimental framework to test the efficacy of a Sequence-to-Sequence model
with a local attention mechanism in a two-class depression severity
classification paradigm. Additionally, a novel training method, HARD-Training,
is proposed. It is a methodology based on the selection of more ambiguous
samples for the model training, and inspired by the curriculum learning
paradigm. HARD-Training was found to consistently improve - with an average
increment of 8.6% - the performance of our classifiers for both of two speech
elicitation tasks used and each collection site of the RADAR-MDD speech corpus.
With this novel methodology, our Sequence-to-Sequence model was able to
effectively detect MDD severity regardless of language. Finally, recognising
the need for greater awareness of potential algorithmic bias, we conduct an
additional analysis of our results separately for each gender. |
3,011 | Trajectory of Mini-Batch Momentum: Batch Size Saturation and Convergence in High Dimensions | We analyze the dynamics of large batch stochastic gradient descent with
momentum (SGD+M) on the least squares problem when both the number of samples
and dimensions are large. In this setting, we show that the dynamics of SGD+M
converge to a deterministic discrete Volterra equation as dimension increases,
which we analyze. We identify a stability measurement, the implicit
conditioning ratio (ICR), which regulates the ability of SGD+M to accelerate
the algorithm. When the batch size exceeds this ICR, SGD+M converges linearly
at a rate of $\mathcal{O}(1/\sqrt{\kappa})$, matching optimal full-batch
momentum (in particular performing as well as a full-batch but with a fraction
of the size). For batch sizes smaller than the ICR, in contrast, SGD+M has
rates that scale like a multiple of the single batch SGD rate. We give explicit
choices for the learning rate and momentum parameter in terms of the Hessian
spectra that achieve this performance. |
3,012 | Learning Disentangled Representations for Counterfactual Regression via Mutual Information Minimization | Learning individual-level treatment effect is a fundamental problem in causal
inference and has received increasing attention in many areas, especially in
the user growth area which concerns many internet companies. Recently,
disentangled representation learning methods that decompose covariates into
three latent factors, including instrumental, confounding and adjustment
factors, have witnessed great success in treatment effect estimation. However,
it remains an open problem how to learn the underlying disentangled factors
precisely. Specifically, previous methods fail to obtain independent
disentangled factors, which is a necessary condition for identifying treatment
effect. In this paper, we propose Disentangled Representations for
Counterfactual Regression via Mutual Information Minimization (MIM-DRCFR),
which uses a multi-task learning framework to share information when learning
the latent factors and incorporates MI minimization learning criteria to ensure
the independence of these factors. Extensive experiments including public
benchmarks and real-world industrial user growth datasets demonstrate that our
method performs much better than state-of-the-art methods. |
3,013 | Score-Based Generative Models Detect Manifolds | Score-based generative models (SGMs) need to approximate the scores $\nabla
\log p_t$ of the intermediate distributions as well as the final distribution
$p_T$ of the forward process. The theoretical underpinnings of the effects of
these approximations are still lacking. We find precise conditions under which
SGMs are able to produce samples from an underlying (low-dimensional) data
manifold $\mathcal{M}$. This assures us that SGMs are able to generate the
"right kind of samples". For example, taking $\mathcal{M}$ to be the subset of
images of faces, we find conditions under which the SGM robustly produces an
image of a face, even though the relative frequencies of these images might not
accurately represent the true data generating distribution. Moreover, this
analysis is a first step towards understanding the generalization properties of
SGMs: Taking $\mathcal{M}$ to be the set of all training samples, our results
provide a precise description of when the SGM memorizes its training data. |
3,014 | Policy Gradient Algorithms with Monte-Carlo Tree Search for Non-Markov Decision Processes | Policy gradient (PG) is a reinforcement learning (RL) approach that optimizes
a parameterized policy model for an expected return using gradient ascent.
Given a well-parameterized policy model, such as a neural network model, with
appropriate initial parameters, the PG algorithms work well even when
environment does not have the Markov property. Otherwise, they can be trapped
on a plateau or suffer from peakiness effects. As another successful RL
approach, algorithms based on Monte-Carlo Tree Search (MCTS), which include
AlphaZero, have obtained groundbreaking results especially on the board game
playing domain. They are also suitable to be applied to non-Markov decision
processes. However, since the standard MCTS does not have the ability to learn
state representation, the size of the tree-search space can be too large to
search. In this work, we examine a mixture policy of PG and MCTS to complement
each other's difficulties and take advantage of them. We derive conditions for
asymptotic convergence with results of a two-timescale stochastic approximation
and propose an algorithm that satisfies these conditions. The effectivity of
the proposed methods is verified through numerical experiments on non-Markov
decision processes. |
3,015 | Approximate Network Motif Mining Via Graph Learning | Frequent and structurally related subgraphs, also known as network motifs,
are valuable features of many graph datasets. However, the high computational
complexity of identifying motif sets in arbitrary datasets (motif mining) has
limited their use in many real-world datasets. By automatically leveraging
statistical properties of datasets, machine learning approaches have shown
promise in several tasks with combinatorial complexity and are therefore a
promising candidate for network motif mining. In this work we seek to
facilitate the development of machine learning approaches aimed at motif
mining. We propose a formulation of the motif mining problem as a node
labelling task. In addition, we build benchmark datasets and evaluation metrics
which test the ability of models to capture different aspects of motif
discovery such as motif number, size, topology, and scarcity. Next, we propose
MotiFiesta, a first attempt at solving this problem in a fully differentiable
manner with promising results on challenging baselines. Finally, we demonstrate
through MotiFiesta that this learning setting can be applied simultaneously to
general-purpose data mining and interpretable feature extraction for graph
classification tasks. |
3,016 | Excess risk analysis for epistemic uncertainty with application to variational inference | We analyze the epistemic uncertainty (EU) of supervised learning in Bayesian
inference by focusing on the excess risk. Existing analysis is limited to the
Bayesian setting, which assumes a correct model and exact Bayesian posterior
distribution. Thus we cannot apply the existing theory to modern Bayesian
algorithms, such as variational inference. To address this, we present a novel
EU analysis in the frequentist setting, where data is generated from an unknown
distribution. We show a relation between the generalization ability and the
widely used EU measurements, such as the variance and entropy of the predictive
distribution. Then we show their convergence behaviors theoretically. Finally,
we propose new variational inference that directly controls the prediction and
EU evaluation performances based on the PAC-Bayesian theory. Numerical
experiments show that our algorithm significantly improves the EU evaluation
over the existing methods. |
3,017 | Shortest Path Networks for Graph Property Prediction | Most graph neural network models rely on a particular message passing
paradigm, where the idea is to iteratively propagate node representations of a
graph to each node in the direct neighborhood. While very prominent, this
paradigm leads to information propagation bottlenecks, as information is
repeatedly compressed at intermediary node representations, which causes loss
of information, making it practically impossible to gather meaningful signals
from distant nodes. To address this issue, we propose shortest path message
passing neural networks, where the node representations of a graph are
propagated to each node in the shortest path neighborhoods. In this setting,
nodes can directly communicate between each other even if they are not
neighbors, breaking the information bottleneck and hence leading to more
adequately learned representations. Theoretically, our framework generalizes
message passing neural networks, resulting in provably more expressive models.
Empirically, we verify the capacity of a basic model of this framework on
dedicated synthetic experiments, and on real-world graph classification and
regression benchmarks, obtaining several state-of-the-art results. |
3,018 | Introducing One Sided Margin Loss for Solving Classification Problems in Deep Networks | This paper introduces a new loss function, OSM (One-Sided Margin), to solve
maximum-margin classification problems effectively. Unlike the hinge loss, in
OSM the margin is explicitly determined with corresponding hyperparameters and
then the classification problem is solved. In experiments, we observe that
using OSM loss leads to faster training speeds and better accuracies than
binary and categorical cross-entropy in several commonly used deep models for
classification and optical character recognition problems.
OSM has consistently shown better classification accuracies over
cross-entropy and hinge losses for small to large neural networks. it has also
led to a more efficient training procedure. We achieved state-of-the-art
accuracies for small networks on several benchmark datasets of
CIFAR10(98.82\%), CIFAR100(91.56\%), Flowers(98.04\%), Stanford Cars(93.91\%)
with considerable improvements over other loss functions. Moreover, the
accuracies are rather better than cross-entropy and hinge loss for large
networks. Therefore, we strongly believe that OSM is a powerful alternative to
hinge and cross-entropy losses to train deep neural networks on classification
tasks. |
3,019 | On the Effectiveness of Knowledge Graph Embeddings: a Rule Mining Approach | We study the effectiveness of Knowledge Graph Embeddings (KGE) for knowledge
graph (KG) completion with rule mining. More specifically, we mine rules from
KGs before and after they have been completed by a KGE to compare possible
differences in the rules extracted. We apply this method to classical KGEs
approaches, in particular, TransE, DistMult and ComplEx. Our experiments
indicate that there can be huge differences between the extracted rules,
depending on the KGE approach for KG completion. In particular, after the
TransE completion, several spurious rules were extracted. |
3,020 | Graph Kernels Based on Multi-scale Graph Embeddings | Graph kernels are conventional methods for computing graph similarities.
However, most of the R-convolution graph kernels face two challenges: 1) They
cannot compare graphs at multiple different scales, and 2) they do not consider
the distributions of substructures when computing the kernel matrix. These two
challenges limit their performances. To mitigate the two challenges, we propose
a novel graph kernel called the Multi-scale Path-pattern Graph kernel (MPG), at
the heart of which is the multi-scale path-pattern node feature map. Each
element of the path-pattern node feature map is the number of occurrences of a
path-pattern around a node. A path-pattern is constructed by the concatenation
of all the node labels in a path of a truncated BFS tree rooted at each node.
Since the path-pattern node feature map can only compare graphs at local
scales, we incorporate into it the multiple different scales of the graph
structure, which are captured by the truncated BFS trees of different depth. We
use the Wasserstein distance to compute the similarity between the multi-scale
path-pattern node feature maps of two graphs, considering the distributions of
substructures. We empirically validate MPG on various benchmark graph datasets
and demonstrate that it achieves state-of-the-art performance. |
3,021 | Accelerated first-order methods for convex optimization with locally Lipschitz continuous gradient | In this paper we develop accelerated first-order methods for convex
optimization with locally Lipschitz continuous gradient (LLCG), which is beyond
the well-studied class of convex optimization with Lipschitz continuous
gradient. In particular, we first consider unconstrained convex optimization
with LLCG and propose accelerated proximal gradient (APG) methods for solving
it. The proposed APG methods are equipped with a verifiable termination
criterion and enjoy an operation complexity of ${\cal O}(\varepsilon^{-1/2}\log
\varepsilon^{-1})$ and ${\cal O}(\log \varepsilon^{-1})$ for finding an
$\varepsilon$-residual solution of an unconstrained convex and strongly convex
optimization problem, respectively. We then consider constrained convex
optimization with LLCG and propose an first-order proximal augmented Lagrangian
method for solving it by applying one of our proposed APG methods to
approximately solve a sequence of proximal augmented Lagrangian subproblems.
The resulting method is equipped with a verifiable termination criterion and
enjoys an operation complexity of ${\cal O}(\varepsilon^{-1}\log
\varepsilon^{-1})$ and ${\cal O}(\varepsilon^{-1/2}\log \varepsilon^{-1})$ for
finding an $\varepsilon$-KKT solution of a constrained convex and strongly
convex optimization problem, respectively. All the proposed methods in this
paper are parameter-free or almost parameter-free except that the knowledge on
convexity parameter is required. To the best of our knowledge, no prior studies
were conducted to investigate accelerated first-order methods with complexity
guarantees for convex optimization with LLCG. All the complexity results
obtained in this paper are entirely new. |
3,022 | Primal-dual extrapolation methods for monotone inclusions under local Lipschitz continuity with applications to variational inequality, conic constrained saddle point, and convex conic optimization problems | In this paper we consider a class of structured monotone inclusion (MI)
problems that consist of finding a zero in the sum of two monotone operators,
in which one is maximal monotone while another is locally Lipschitz continuous.
In particular, we first propose a primal-dual extrapolation (PDE) method for
solving a structured strongly MI problem by modifying the classical
forward-backward splitting method by using a point and operator extrapolation
technique, in which the parameters are adaptively updated by a backtracking
line search scheme. The proposed PDE method is almost parameter-free, equipped
with a verifiable termination criterion, and enjoys an operation complexity of
${\cal O}(\log \epsilon^{-1})$, measured by the amount of fundamental
operations consisting only of evaluations of one operator and resolvent of
another operator, for finding an $\epsilon$-residual solution of the structured
strongly MI problem. We then propose another PDE method for solving a
structured non-strongly MI problem by applying the above PDE method to
approximately solve a sequence of structured strongly MI problems. The
resulting PDE method is parameter-free, equipped with a verifiable termination
criterion, and enjoys an operation complexity of ${\cal O}(\epsilon^{-1}\log
\epsilon^{-1})$ for finding an $\epsilon$-residual solution of the structured
non-strongly MI problem. As a consequence, we apply the latter PDE method to
convex conic optimization, conic constrained saddle point, and variational
inequality problems, and obtain complexity results for finding an
$\epsilon$-KKT or $\epsilon$-residual solution of them under local Lipschitz
continuity. To the best of our knowledge, no prior studies were conducted to
investigate methods with complexity guarantees for solving the aforementioned
problems under local Lipschitz continuity. All the complexity results obtained
in this paper are entirely new. |
3,023 | A Deep Learning Network for the Classification of Intracardiac Electrograms in Atrial Tachycardia | A key technology enabling the success of catheter ablation treatment for
atrial tachycardia is activation mapping, which relies on manual local
activation time (LAT) annotation of all acquired intracardiac electrogram (EGM)
signals. This is a time-consuming and error-prone procedure, due to the
difficulty in identifying the signal activation peaks for fractionated signals.
This work presents a Deep Learning approach for the automated classification of
EGM signals into three different types: normal, abnormal, and unclassified,
which forms part of the LAT annotation pipeline, and contributes towards
bypassing the need for manual annotations of the LAT. The Deep Learning
network, the CNN-LSTM model, is a hybrid network architecture which combines
convolutional neural network (CNN) layers with long short-term memory (LSTM)
layers. 1452 EGM signals from a total of 9 patients undergoing
clinically-indicated 3D cardiac mapping were used for the training, validation
and testing of our models. From our findings, the CNN-LSTM model achieved an
accuracy of 81% for the balanced dataset. For comparison, we separately
developed a rule-based Decision Trees model which attained an accuracy of 67%
for the same balanced dataset. Our work elucidates that analysing the EGM
signals using a set of explicitly specified rules as proposed by the Decision
Trees model is not suitable as EGM signals are complex. The CNN-LSTM model, on
the other hand, has the ability to learn the complex, intrinsic features within
the signals and identify useful features to differentiate the EGM signals. |
3,024 | Transfer Language Selection for Zero-Shot Cross-Lingual Abusive Language Detection | We study the selection of transfer languages for automatic abusive language
detection. Instead of preparing a dataset for every language, we demonstrate
the effectiveness of cross-lingual transfer learning for zero-shot abusive
language detection. This way we can use existing data from higher-resource
languages to build better detection systems for low-resource languages. Our
datasets are from seven different languages from three language families. We
measure the distance between the languages using several language similarity
measures, especially by quantifying the World Atlas of Language Structures. We
show that there is a correlation between linguistic similarity and classifier
performance. This discovery allows us to choose an optimal transfer language
for zero shot abusive language detection. |
3,025 | Feature Space Particle Inference for Neural Network Ensembles | Ensembles of deep neural networks demonstrate improved performance over
single models. For enhancing the diversity of ensemble members while keeping
their performance, particle-based inference methods offer a promising approach
from a Bayesian perspective. However, the best way to apply these methods to
neural networks is still unclear: seeking samples from the weight-space
posterior suffers from inefficiency due to the over-parameterization issues,
while seeking samples directly from the function-space posterior often results
in serious underfitting. In this study, we propose optimizing particles in the
feature space where the activation of a specific intermediate layer lies to
address the above-mentioned difficulties. Our method encourages each member to
capture distinct features, which is expected to improve ensemble prediction
robustness. Extensive evaluation on real-world datasets shows that our model
significantly outperforms the gold-standard Deep Ensembles on various metrics,
including accuracy, calibration, and robustness. Code is available at
https://github.com/DensoITLab/featurePI . |
3,026 | Improving Diffusion Models for Inverse Problems using Manifold Constraints | Recently, diffusion models have been used to solve various inverse problems
in an unsupervised manner with appropriate modifications to the sampling
process. However, the current solvers, which recursively apply a reverse
diffusion step followed by a measurement consistency step, often produce
sub-optimal results. By studying the generative sampling path, here we show
that current solvers throw the sample path off the data manifold, and hence the
error accumulates. To address this, we propose an additional correction term
inspired by the manifold constraint, which can be used synergistically with the
previous solvers to make the iterations close to the manifold. The proposed
manifold constraint is straightforward to implement within a few lines of code,
yet boosts the performance by a surprisingly large margin. With extensive
experiments, we show that our method is superior to the previous methods both
theoretically and empirically, producing promising results in many applications
such as image inpainting, colorization, and sparse-view computed tomography. |
3,027 | Compound Multi-branch Feature Fusion for Real Image Restoration | Image restoration is a challenging and ill-posed problem which also has been
a long-standing issue. However, most of learning based restoration methods are
proposed to target one degradation type which means they are lack of
generalization. In this paper, we proposed a multi-branch restoration model
inspired from the Human Visual System (i.e., Retinal Ganglion Cells) which can
achieve multiple restoration tasks in a general framework. The experiments show
that the proposed multi-branch architecture, called CMFNet, has competitive
performance results on four datasets, including image dehazing, deraindrop, and
deblurring, which are very common applications for autonomous cars. The source
code and pretrained models of three restoration tasks are available at
https://github.com/FanChiMao/CMFNet. |
3,028 | Gradient flow dynamics of shallow ReLU networks for square loss and orthogonal inputs | The training of neural networks by gradient descent methods is a cornerstone
of the deep learning revolution. Yet, despite some recent progress, a complete
theory explaining its success is still missing. This article presents, for
orthogonal input vectors, a precise description of the gradient flow dynamics
of training one-hidden layer ReLU neural networks for the mean squared error at
small initialisation. In this setting, despite non-convexity, we show that the
gradient flow converges to zero loss and characterise its implicit bias towards
minimum variation norm. Furthermore, some interesting phenomena are
highlighted: a quantitative description of the initial alignment phenomenon and
a proof that the process follows a specific saddle to saddle dynamics. |
3,029 | Generating Sparse Counterfactual Explanations For Multivariate Time Series | Since neural networks play an increasingly important role in critical
sectors, explaining network predictions has become a key research topic.
Counterfactual explanations can help to understand why classifier models decide
for particular class assignments and, moreover, how the respective input
samples would have to be modified such that the class prediction changes.
Previous approaches mainly focus on image and tabular data. In this work we
propose SPARCE, a generative adversarial network (GAN) architecture that
generates SPARse Counterfactual Explanations for multivariate time series. Our
approach provides a custom sparsity layer and regularizes the counterfactual
loss function in terms of similarity, sparsity, and smoothness of trajectories.
We evaluate our approach on real-world human motion datasets as well as a
synthetic time series interpretability benchmark. Although we make
significantly sparser modifications than other approaches, we achieve
comparable or better performance on all metrics. Moreover, we demonstrate that
our approach predominantly modifies salient time steps and features, leaving
non-salient inputs untouched. |
3,030 | DPM-Solver: A Fast ODE Solver for Diffusion Probabilistic Model Sampling in Around 10 Steps | Diffusion probabilistic models (DPMs) are emerging powerful generative
models. Despite their high-quality generation performance, DPMs still suffer
from their slow sampling as they generally need hundreds or thousands of
sequential function evaluations (steps) of large neural networks to draw a
sample. Sampling from DPMs can be viewed alternatively as solving the
corresponding diffusion ordinary differential equations (ODEs). In this work,
we propose an exact formulation of the solution of diffusion ODEs. The
formulation analytically computes the linear part of the solution, rather than
leaving all terms to black-box ODE solvers as adopted in previous works. By
applying change-of-variable, the solution can be equivalently simplified to an
exponentially weighted integral of the neural network. Based on our
formulation, we propose DPM-Solver, a fast dedicated high-order solver for
diffusion ODEs with the convergence order guarantee. DPM-Solver is suitable for
both discrete-time and continuous-time DPMs without any further training.
Experimental results show that DPM-Solver can generate high-quality samples in
only 10 to 20 function evaluations on various datasets. We achieve 4.70 FID in
10 function evaluations and 2.87 FID in 20 function evaluations on the CIFAR10
dataset, and a $4\sim 16\times$ speedup compared with previous state-of-the-art
training-free samplers on various datasets. |
3,031 | KPGT: Knowledge-Guided Pre-training of Graph Transformer for Molecular Property Prediction | Designing accurate deep learning models for molecular property prediction
plays an increasingly essential role in drug and material discovery. Recently,
due to the scarcity of labeled molecules, self-supervised learning methods for
learning generalizable and transferable representations of molecular graphs
have attracted lots of attention. In this paper, we argue that there exist two
major issues hindering current self-supervised learning methods from obtaining
desired performance on molecular property prediction, that is, the ill-defined
pre-training tasks and the limited model capacity. To this end, we introduce
Knowledge-guided Pre-training of Graph Transformer (KPGT), a novel
self-supervised learning framework for molecular graph representation learning,
to alleviate the aforementioned issues and improve the performance on the
downstream molecular property prediction tasks. More specifically, we first
introduce a high-capacity model, named Line Graph Transformer (LiGhT), which
emphasizes the importance of chemical bonds and is mainly designed to model the
structural information of molecular graphs. Then, a knowledge-guided
pre-training strategy is proposed to exploit the additional knowledge of
molecules to guide the model to capture the abundant structural and semantic
information from large-scale unlabeled molecular graphs. Extensive
computational tests demonstrated that KPGT can offer superior performance over
current state-of-the-art methods on several molecular property prediction
tasks. |
3,032 | Federated Learning with a Sampling Algorithm under Isoperimetry | Federated learning uses a set of techniques to efficiently distribute the
training of a machine learning algorithm across several devices, who own the
training data. These techniques critically rely on reducing the communication
cost -- the main bottleneck -- between the devices and a central server.
Federated learning algorithms usually take an optimization approach: they are
algorithms for minimizing the training loss subject to communication (and
other) constraints. In this work, we instead take a Bayesian approach for the
training task, and propose a communication-efficient variant of the Langevin
algorithm to sample a posteriori. The latter approach is more robust and
provides more knowledge of the \textit{a posteriori} distribution than its
optimization counterpart. We analyze our algorithm without assuming that the
target distribution is strongly log-concave. Instead, we assume the weaker log
Sobolev inequality, which allows for nonconvexity. |
3,033 | Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network | Deep neural network (DNN) with dropout can be regarded as an ensemble model
consisting of lots of sub-DNNs (i.e., an ensemble sub-DNN where the sub-DNN is
the remaining part of the DNN after dropout), and through increasing the
diversity of the ensemble sub-DNN, the generalization and robustness of the DNN
can be effectively improved. In this paper, a mask-guided divergence loss
function (MDL), which consists of a cross-entropy loss term and an orthogonal
term, is proposed to increase the diversity of the ensemble sub-DNN by the
added orthogonal term. Particularly, the mask technique is introduced to assist
in generating the orthogonal term for avoiding overfitting of the diversity
learning. The theoretical analysis and extensive experiments on 4 datasets
(i.e., MNIST, FashionMNIST, CIFAR10, and CIFAR100) manifest that MDL can
improve the generalization and robustness of standard training and adversarial
training. For CIFAR10 and CIFAR100, in standard training, the maximum
improvement of accuracy is $1.38\%$ on natural data, $30.97\%$ on FGSM (i.e.,
Fast Gradient Sign Method) attack, $38.18\%$ on PGD (i.e., Projected Gradient
Descent) attack. While in adversarial training, the maximum improvement is
$1.68\%$ on natural data, $4.03\%$ on FGSM attack and $2.65\%$ on PGD attack. |
3,034 | A Local Optima Network Analysis of the Feedforward Neural Architecture Space | This study investigates the use of local optima network (LON) analysis, a
derivative of the fitness landscape of candidate solutions, to characterise and
visualise the neural architecture space. The search space of feedforward neural
network architectures with up to three layers, each with up to 10 neurons, is
fully enumerated by evaluating trained model performance on a selection of data
sets. Extracted LONs, while heterogeneous across data sets, all exhibit simple
global structures, with single global funnels in all cases but one. These
results yield early indication that LONs may provide a viable paradigm by which
to analyse and optimise neural architectures. |
3,035 | Conversation Group Detection With Spatio-Temporal Context | In this work, we propose an approach for detecting conversation groups in
social scenarios like cocktail parties and networking events, from overhead
camera recordings. We posit the detection of conversation groups as a learning
problem that could benefit from leveraging the spatial context of the
surroundings, and the inherent temporal context in interpersonal dynamics which
is reflected in the temporal dynamics in human behavior signals, an aspect that
has not been addressed in recent prior works. This motivates our approach which
consists of a dynamic LSTM-based deep learning model that predicts continuous
pairwise affinity values indicating how likely two people are in the same
conversation group. These affinity values are also continuous in time, since
relationships and group membership do not occur instantaneously, even though
the ground truths of group membership are binary. Using the predicted affinity
values, we apply a graph clustering method based on Dominant Set extraction to
identify the conversation groups. We benchmark the proposed method against
established methods on multiple social interaction datasets. Our results showed
that the proposed method improves group detection performance in data that has
more temporal granularity in conversation group labels. Additionally, we
provide an analysis in the predicted affinity values in relation to the
conversation group detection. Finally, we demonstrate the usability of the
predicted affinity values in a forecasting framework to predict group
membership for a given forecast horizon. |
3,036 | Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline | Deep learning technologies have become the backbone for the development of
computer vision. With further explorations, deep neural networks have been
found vulnerable to well-designed adversarial attacks. Most of the vision
devices are equipped with image signal processing (ISP) pipeline to implement
RAW-to-RGB transformations and embedded into data preprocessing module for
efficient image processing. Actually, ISP pipeline can introduce adversarial
behaviors to post-capture images while data preprocessing may destroy attack
patterns. However, none of the existing adversarial attacks takes into account
the impacts of both ISP pipeline and data preprocessing. In this paper, we
develop an image-scaling attack targeting on ISP pipeline, where the crafted
adversarial RAW can be transformed into attack image that presents entirely
different appearance once being scaled to a specific-size image. We first
consider the gradient-available ISP pipeline, i.e., the gradient information
can be directly used in the generation process of adversarial RAW to launch the
attack. To make the adversarial attack more applicable, we further consider the
gradient-unavailable ISP pipeline, in which a proxy model that well learns the
RAW-to-RGB transformations is proposed as the gradient oracles. Extensive
experiments show that the proposed adversarial attacks can craft adversarial
RAW data against the target ISP pipelines with high attack rates. |
3,037 | Leveraging Systematic Knowledge of 2D Transformations | The existing deep learning models suffer from out-of-distribution (o.o.d.)
performance drop in computer vision tasks. In comparison, humans have a
remarkable ability to interpret images, even if the scenes in the images are
rare, thanks to the systematicity of acquired knowledge. This work focuses on
1) the acquisition of systematic knowledge of 2D transformations, and 2)
architectural components that can leverage the learned knowledge in image
classification tasks in an o.o.d. setting. With a new training methodology
based on synthetic datasets that are constructed under the causal framework,
the deep neural networks acquire knowledge from semantically different domains
(e.g. even from noise), and exhibit certain level of systematicity in parameter
estimation experiments. Based on this, a novel architecture is devised
consisting of a classifier, an estimator and an identifier (abbreviated as
"CED"). By emulating the "hypothesis-verification" process in human visual
perception, CED improves the classification accuracy significantly on test sets
under covariate shift. |
3,038 | Watch Out for the Safety-Threatening Actors: Proactively Mitigating Safety Hazards | Despite the successful demonstration of autonomous vehicles (AVs), such as
self-driving cars, ensuring AV safety remains a challenging task. Although some
actors influence an AV's driving decisions more than others, current approaches
pay equal attention to each actor on the road. An actor's influence on the AV's
decision can be characterized in terms of its ability to decrease the number of
safe navigational choices for the AV. In this work, we propose a safety threat
indicator (STI) using counterfactual reasoning to estimate the importance of
each actor on the road with respect to its influence on the AV's safety. We use
this indicator to (i) characterize the existing real-world datasets to identify
rare hazardous scenarios as well as the poor performance of existing
controllers in such scenarios; and (ii) design an RL based safety mitigation
controller to proactively mitigate the safety hazards those actors pose to the
AV. Our approach reduces the accident rate for the state-of-the-art AV agent(s)
in rare hazardous scenarios by more than 70%. |
3,039 | Coordinated Double Machine Learning | Double machine learning is a statistical method for leveraging complex
black-box models to construct approximately unbiased treatment effect estimates
given observational data with high-dimensional covariates, under the assumption
of a partially linear model. The idea is to first fit on a subset of the
samples two non-linear predictive models, one for the continuous outcome of
interest and one for the observed treatment, and then to estimate a linear
coefficient for the treatment using the remaining samples through a simple
orthogonalized regression. While this methodology is flexible and can
accommodate arbitrary predictive models, typically trained independently of one
another, this paper argues that a carefully coordinated learning algorithm for
deep neural networks may reduce the estimation bias. The improved empirical
performance of the proposed method is demonstrated through numerical
experiments on both simulated and real data. |
3,040 | Prediction of Maneuvering Status for Aerial Vehicles using Supervised Learning Methods | Aerial Vehicles follow a guided approach based on Latitude, Longitude and
Altitude. This information can be used for calculating the status of
maneuvering for the aerial vehicles along the line of trajectory. This is a
binary classification problem and Machine Learning can be leveraged for solving
such problem. In this paper we present a methodology for deriving maneuvering
status and its prediction using Linear, Distance Metric, Discriminant Analysis
and Boosting Ensemble supervised learning methods. We provide various metrics
along the line in the results section that give condensed comparison of the
appropriate algorithm for prediction of the maneuvering status. |
3,041 | Nearly Optimal Best-of-Both-Worlds Algorithms for Online Learning with Feedback Graphs | This study considers online learning with general directed feedback graphs.
For this problem, we present best-of-both-worlds algorithms that achieve nearly
tight regret bounds for adversarial environments as well as poly-logarithmic
regret bounds for stochastic environments. As Alon et al. [2015] have shown,
tight regret bounds depend on the structure of the feedback graph:
\textit{strongly observable} graphs yield minimax regret of $\tilde{\Theta}(
\alpha^{1/2} T^{1/2} )$, while \textit{weakly observable} graphs induce minimax
regret of $\tilde{\Theta}( \delta^{1/3} T^{2/3} )$, where $\alpha$ and
$\delta$, respectively, represent the independence number of the graph and the
domination number of a certain portion of the graph. Our proposed algorithm for
strongly observable graphs has a regret bound of $\tilde{O}( \alpha^{1/2}
T^{1/2} ) $ for adversarial environments, as well as of $ {O} ( \frac{\alpha
(\ln T)^3 }{\Delta_{\min}} ) $ for stochastic environments, where
$\Delta_{\min}$ expresses the minimum suboptimality gap. This result resolves
an open question raised by Erez and Koren [2021]. We also provide an algorithm
for weakly observable graphs that achieves a regret bound of $\tilde{O}(
\delta^{1/3}T^{2/3} )$ for adversarial environments and poly-logarithmic regret
for stochastic environments. The proposed algorithms are based on the
follow-the-perturbed-leader approach combined with newly designed update rules
for learning rates. |
3,042 | Resource Allocation for Compression-aided Federated Learning with High Distortion Rate | Recently, a considerable amount of works have been made to tackle the
communication burden in federated learning (FL) (e.g., model quantization, data
sparsification, and model compression). However, the existing methods, that
boost the communication efficiency in FL, result in a considerable trade-off
between communication efficiency and global convergence rate. We formulate an
optimization problem for compression-aided FL, which captures the relationship
between the distortion rate, number of participating IoT devices, and
convergence rate. Following that, the objective function is to minimize the
total transmission time for FL convergence. Because the problem is non-convex,
we propose to decompose it into sub-problems. Based on the property of a FL
model, we first determine the number of IoT devices participating in the FL
process. Then, the communication between IoT devices and the server is
optimized by efficiently allocating wireless resources based on a coalition
game. Our theoretical analysis shows that, by actively controlling the number
of participating IoT devices, we can avoid the training divergence of
compression-aided FL while maintaining the communication efficiency. |
3,043 | Dynamic Structure Estimation from Bandit Feedback | This work present novel method for structure estimation of an underlying
dynamical system. We tackle problems of estimating dynamic structure from
bandit feedback contaminated by sub-Gaussian noise. In particular, we focus on
periodically behaved discrete dynamical system in the Euclidean space, and
carefully identify certain obtainable subset of full information of the
periodic structure. We then derive a sample complexity bound for periodic
structure estimation. Technically, asymptotic results for exponential sums are
adopted to effectively average out the noise effects while preventing the
information to be estimated from vanishing. For linear systems, the use of the
Weyl sum further allows us to extract eigenstructures. Our theoretical claims
are experimentally validated on simulations of toy examples, including Cellular
Automata. |
3,044 | Self-Consistency of the Fokker-Planck Equation | The Fokker-Planck equation (FPE) is the partial differential equation that
governs the density evolution of the It\^o process and is of great importance
to the literature of statistical physics and machine learning. The FPE can be
regarded as a continuity equation where the change of the density is completely
determined by a time varying velocity field. Importantly, this velocity field
also depends on the current density function. As a result, the ground-truth
velocity field can be shown to be the solution of a fixed-point equation, a
property that we call self-consistency. In this paper, we exploit this concept
to design a potential function of the hypothesis velocity fields, and prove
that, if such a function diminishes to zero during the training procedure, the
trajectory of the densities generated by the hypothesis velocity fields
converges to the solution of the FPE in the Wasserstein-2 sense. The proposed
potential function is amenable to neural-network based parameterization as the
stochastic gradient with respect to the parameter can be efficiently computed.
Once a parameterized model, such as Neural Ordinary Differential Equation is
trained, we can generate the entire trajectory to the FPE. |
3,045 | RACA: Relation-Aware Credit Assignment for Ad-Hoc Cooperation in Multi-Agent Deep Reinforcement Learning | In recent years, reinforcement learning has faced several challenges in the
multi-agent domain, such as the credit assignment issue. Value function
factorization emerges as a promising way to handle the credit assignment issue
under the centralized training with decentralized execution (CTDE) paradigm.
However, existing value function factorization methods cannot deal with ad-hoc
cooperation, that is, adapting to new configurations of teammates at test time.
Specifically, these methods do not explicitly utilize the relationship between
agents and cannot adapt to different sizes of inputs. To address these
limitations, we propose a novel method, called Relation-Aware Credit Assignment
(RACA), which achieves zero-shot generalization in ad-hoc cooperation
scenarios. RACA takes advantage of a graph-based relation encoder to encode the
topological structure between agents. Furthermore, RACA utilizes an
attention-based observation abstraction mechanism that can generalize to an
arbitrary number of teammates with a fixed number of parameters. Experiments
demonstrate that our method outperforms baseline methods on the StarCraftII
micromanagement benchmark and ad-hoc cooperation scenarios. |
3,046 | Bayesian Inference of Stochastic Dynamical Networks | Network inference has been extensively studied in several fields, such as
systems biology and social sciences. Learning network topology and internal
dynamics is essential to understand mechanisms of complex systems. In
particular, sparse topologies and stable dynamics are fundamental features of
many real-world continuous-time (CT) networks. Given that usually only a
partial set of nodes are able to observe, in this paper, we consider linear CT
systems to depict networks since they can model unmeasured nodes via transfer
functions. Additionally, measurements tend to be noisy and with low and varying
sampling frequencies. For this reason, we consider CT models since
discrete-time approximations often require fine-grained measurements and
uniform sampling steps. The developed method applies dynamical structure
functions (DSFs) derived from linear stochastic differential equations (SDEs)
to describe networks of measured nodes. A numerical sampling method,
preconditioned Crank-Nicolson (pCN), is used to refine coarse-grained
trajectories to improve inference accuracy. The convergence property of the
developed method is robust to the dimension of data sources. Monte Carlo
simulations indicate that the developed method outperforms state-of-the-art
methods including group sparse Bayesian learning (GSBL), BINGO, kernel-based
methods, dynGENIE3, GENIE3, and ARNI. The simulations include random and ring
networks, and a synthetic biological network. These are challenging networks,
suggesting that the developed method can be applied under a wide range of
contexts, such as gene regulatory networks, social networks, and communication
systems. |
3,047 | Masked Bayesian Neural Networks : Computation and Optimality | As data size and computing power increase, the architectures of deep neural
networks (DNNs) have been getting more complex and huge, and thus there is a
growing need to simplify such complex and huge DNNs. In this paper, we propose
a novel sparse Bayesian neural network (BNN) which searches a good DNN with an
appropriate complexity. We employ the masking variables at each node which can
turn off some nodes according to the posterior distribution to yield a nodewise
sparse DNN. We devise a prior distribution such that the posterior distribution
has theoretical optimalities (i.e. minimax optimality and adaptiveness), and
develop an efficient MCMC algorithm. By analyzing several benchmark datasets,
we illustrate that the proposed BNN performs well compared to other existing
methods in the sense that it discovers well condensed DNN architectures with
similar prediction accuracy and uncertainty quantification compared to large
DNNs. |
3,048 | Dynamic MRI using Learned Transform-based Deep Tensor Low-Rank Network (DTLR-Net) | While low-rank matrix prior has been exploited in dynamic MR image
reconstruction and has obtained satisfying performance, low-rank tensors models
have recently emerged as powerful alternative representations for
three-dimensional dynamic MR datasets. In this paper, we introduce a
model-based deep learning network by learning the tensor low-rank prior of the
cardiac dynamic MR images. Instead of representing the dynamic dataset as a
low-rank tensor directly, we propose a learned transformation operator to
exploit the tensor low-rank property in a transform domain. In particular, by
generalizing the t-SVD tensor decomposition into a unitary transformed t-SVD,
we define a transformed tensor nuclear norm (TTNN) to enforce the tensor
low-rankness. The dynamic MRI reconstruction problem is thus formulated using a
TTNN regularized optimization problem. An iterative algorithm based on ADMM
used to minimize the cost is unrolled into a deep network, where the transform
is learned using convolutional neural networks (CNNs) to promote the
reconstruction quality in the feature domain. Experimental results on cardiac
cine MRI reconstruction demonstrate that the proposed framework is able to
provide improved recovery results compared with the state-of-the-art
algorithms. |
3,049 | Faster Rates of Convergence to Stationary Points in Differentially Private Optimization | We study the problem of approximating stationary points of Lipschitz and
smooth functions under $(\varepsilon,\delta)$-differential privacy (DP) in both
the finite-sum and stochastic settings. A point $\widehat{w}$ is called an
$\alpha$-stationary point of a function $F:\mathbb{R}^d\rightarrow\mathbb{R}$
if $\|\nabla F(\widehat{w})\|\leq \alpha$. We provide a new efficient algorithm
that finds an
$\tilde{O}\big(\big[\frac{\sqrt{d}}{n\varepsilon}\big]^{2/3}\big)$-stationary
point in the finite-sum setting, where $n$ is the number of samples. This
improves on the previous best rate of
$\tilde{O}\big(\big[\frac{\sqrt{d}}{n\varepsilon}\big]^{1/2}\big)$. We also
give a new construction that improves over the existing rates in the stochastic
optimization setting, where the goal is to find approximate stationary points
of the population risk. Our construction finds a
$\tilde{O}\big(\frac{1}{n^{1/3}} +
\big[\frac{\sqrt{d}}{n\varepsilon}\big]^{1/2}\big)$-stationary point of the
population risk in time linear in $n$. Furthermore, under the additional
assumption of convexity, we completely characterize the sample complexity of
finding stationary points of the population risk (up to polylog factors) and
show that the optimal rate on population stationarity is $\tilde
\Theta\big(\frac{1}{\sqrt{n}}+\frac{\sqrt{d}}{n\varepsilon}\big)$. Finally, we
show that our methods can be used to provide dimension-independent rates of
$O\big(\frac{1}{\sqrt{n}}+\min\big(\big[\frac{\sqrt{rank}}{n\varepsilon}\big]^{2/3},\frac{1}{(n\varepsilon)^{2/5}}\big)\big)$
on population stationarity for Generalized Linear Models (GLM), where $rank$ is
the rank of the design matrix, which improves upon the previous best known
rate. |
3,050 | Hyperspherical Consistency Regularization | Recent advances in contrastive learning have enlightened diverse applications
across various semi-supervised fields. Jointly training supervised learning and
unsupervised learning with a shared feature encoder becomes a common scheme.
Though it benefits from taking advantage of both feature-dependent information
from self-supervised learning and label-dependent information from supervised
learning, this scheme remains suffering from bias of the classifier. In this
work, we systematically explore the relationship between self-supervised
learning and supervised learning, and study how self-supervised learning helps
robust data-efficient deep learning. We propose hyperspherical consistency
regularization (HCR), a simple yet effective plug-and-play method, to
regularize the classifier using feature-dependent information and thus avoid
bias from labels. Specifically, HCR first projects logits from the classifier
and feature projections from the projection head on the respective hypersphere,
then it enforces data points on hyperspheres to have similar structures by
minimizing binary cross entropy of pairwise distances' similarity metrics.
Extensive experiments on semi-supervised and weakly-supervised learning
demonstrate the effectiveness of our method, by showing superior performance
with HCR. |
3,051 | DepthShrinker: A New Compression Paradigm Towards Boosting Real-Hardware Efficiency of Compact Neural Networks | Efficient deep neural network (DNN) models equipped with compact operators
(e.g., depthwise convolutions) have shown great potential in reducing DNNs'
theoretical complexity (e.g., the total number of weights/operations) while
maintaining a decent model accuracy. However, existing efficient DNNs are still
limited in fulfilling their promise in boosting real-hardware efficiency, due
to their commonly adopted compact operators' low hardware utilization. In this
work, we open up a new compression paradigm for developing real-hardware
efficient DNNs, leading to boosted hardware efficiency while maintaining model
accuracy. Interestingly, we observe that while some DNN layers' activation
functions help DNNs' training optimization and achievable accuracy, they can be
properly removed after training without compromising the model accuracy.
Inspired by this observation, we propose a framework dubbed DepthShrinker,
which develops hardware-friendly compact networks via shrinking the basic
building blocks of existing efficient DNNs that feature irregular computation
patterns into dense ones with much improved hardware utilization and thus
real-hardware efficiency. Excitingly, our DepthShrinker framework delivers
hardware-friendly compact networks that outperform both state-of-the-art
efficient DNNs and compression techniques, e.g., a 3.06% higher accuracy and
1.53$\times$ throughput on Tesla V100 over SOTA channel-wise pruning method
MetaPruning. Our codes are available at:
https://github.com/facebookresearch/DepthShrinker. |
3,052 | Robustness Evaluation and Adversarial Training of an Instance Segmentation Model | To evaluate the robustness of non-classifier models, we propose probabilistic
local equivalence, based on the notion of randomized smoothing, as a way to
quantitatively evaluate the robustness of an arbitrary function. In addition,
to understand the effect of adversarial training on non-classifiers and to
investigate the level of robustness that can be obtained without degrading
performance on the training distribution, we apply Fast is Better than Free
adversarial training together with the TRADES robust loss to the training of an
instance segmentation network. In this direction, we were able to achieve a
symmetric best dice score of 0.85 on the TuSimple lane detection challenge,
outperforming the standardly-trained network's score of 0.82. Additionally, we
were able to obtain an F-measure of 0.49 on manipulated inputs, in contrast to
the standardly-trained network's score of 0. We show that probabilisitic local
equivalence is able to successfully distinguish between standardly-trained and
adversarially-trained models, providing another view of the improved robustness
of the adversarially-trained models. |
3,053 | Finite-Time Analysis of Entropy-Regularized Neural Natural Actor-Critic Algorithm | Natural actor-critic (NAC) and its variants, equipped with the representation
power of neural networks, have demonstrated impressive empirical success in
solving Markov decision problems with large state spaces. In this paper, we
present a finite-time analysis of NAC with neural network approximation, and
identify the roles of neural networks, regularization and optimization
techniques (e.g., gradient clipping and averaging) to achieve provably good
performance in terms of sample complexity, iteration complexity and
overparametrization bounds for the actor and the critic. In particular, we
prove that (i) entropy regularization and averaging ensure stability by
providing sufficient exploration to avoid near-deterministic and strictly
suboptimal policies and (ii) regularization leads to sharp sample complexity
and network width bounds in the regularized MDPs, yielding a favorable
bias-variance tradeoff in policy optimization. In the process, we identify the
importance of uniform approximation power of the actor neural network to
achieve global optimality in policy optimization due to distributional shift. |
3,054 | A Survey of Detection Methods for Die Attachment and Wire Bonding Defects in Integrated Circuit Manufacturing | Defect detection plays a vital role in the manufacturing process of
integrated circuits (ICs). Die attachment and wire bonding are two steps of the
manufacturing process that determine the power and signal transmission quality
and dependability in an IC. This paper presents a survey or literature review
of the methods used for detecting these defects based on different sensing
modalities used including optical, radiological, acoustical, and infrared
thermography. A discussion of the detection methods used is provided in this
survey. Both conventional and deep learning approaches for detecting die
attachment and wire bonding defects are considered along with challenges and
future research directions. |
3,055 | Fast Benchmarking of Accuracy vs. Training Time with Cyclic Learning Rates | Benchmarking the tradeoff between neural network accuracy and training time
is computationally expensive. Here we show how a multiplicative cyclic learning
rate schedule can be used to construct a tradeoff curve in a single training
run. We generate cyclic tradeoff curves for combinations of training methods
such as Blurpool, Channels Last, Label Smoothing and MixUp, and highlight how
these cyclic tradeoff curves can be used to evaluate the effects of algorithmic
choices on network training efficiency. |
3,056 | Dynamic Cardiac MRI Reconstruction Using Combined Tensor Nuclear Norm and Casorati Matrix Nuclear Norm Regularizations | Low-rank tensor models have been applied in accelerating dynamic magnetic
resonance imaging (dMRI). Recently, a new tensor nuclear norm based on t-SVD
has been proposed and applied to tensor completion. Inspired by the different
properties of the tensor nuclear norm (TNN) and the Casorati matrix nuclear
norm (MNN), we introduce a combined TNN and Casorati MNN regularizations
framework to reconstruct dMRI, which we term as TMNN. The proposed method
simultaneously exploits the spatial structure and the temporal correlation of
the dynamic MR data. The optimization problem can be efficiently solved by the
alternating direction method of multipliers (ADMM). In order to further improve
the computational efficiency, we develop a fast algorithm under the Cartesian
sampling scenario. Numerical experiments based on cardiac cine MRI and
perfusion MRI data demonstrate the performance improvement over the traditional
Casorati nuclear norm regularization method. |
3,057 | Progressive Purification for Instance-Dependent Partial Label Learning | Partial label learning (PLL) aims to train multi-class classifiers from
instances with partial labels (PLs)-a PL for an instance is a set of candidate
labels where a fixed but unknown candidate is the true label. In the last few
years, the instance-independent generation process of PLs has been extensively
studied, on the basis of which many practical and theoretical advances have
been made in PLL, whereas relatively less attention has been paid to the
practical setting of instance-dependent PLs, namely, the PL depends not only on
the true label but the instance itself. In this paper, we propose a
theoretically grounded and practically effective approach called PrOgressive
Purification (POP) for instance-dependent PLL: in each epoch, POP updates the
learning model while purifying each PL for the next epoch of the model training
by progressively moving out false candidate labels. Theoretically, we prove
that POP enlarges the region appropriately fast where the model is reliable,
and eventually approximates the Bayes optimal classifier with mild assumptions;
technically, POP is flexible with arbitrary losses and compatible with deep
networks, so that the previous advanced PLL losses can be embedded in it and
the performance is often significantly improved. |
3,058 | BayesFormer: Transformer with Uncertainty Estimation | Transformer has become ubiquitous due to its dominant performance in various
NLP and image processing tasks. However, it lacks understanding of how to
generate mathematically grounded uncertainty estimates for transformer
architectures. Models equipped with such uncertainty estimates can typically
improve predictive performance, make networks robust, avoid over-fitting and
used as acquisition function in active learning. In this paper, we introduce
BayesFormer, a Transformer model with dropouts designed by Bayesian theory. We
proposed a new theoretical framework to extend the approximate variational
inference-based dropout to Transformer-based architectures. Through extensive
experiments, we validate the proposed architecture in four paradigms and show
improvements across the board: language modeling and classification,
long-sequence understanding, machine translation and acquisition function for
active learning. |
3,059 | NIPQ: Noise Injection Pseudo Quantization for Automated DNN Optimization | The optimization of neural networks in terms of computation cost and memory
footprint is crucial for their practical deployment on edge devices. In this
work, we propose a novel quantization-aware training (QAT) scheme called noise
injection pseudo quantization (NIPQ). NIPQ is implemented based on pseudo
quantization noise (PQN) and has several advantages. First, both activation and
weight can be quantized based on a unified framework. Second, the
hyper-parameters of quantization (e.g., layer-wise bit-width and quantization
interval) are automatically tuned. Third, after QAT, the network has robustness
against quantization, thereby making it easier to deploy in practice. To
validate the superiority of the proposed algorithm, we provide extensive
analysis and conduct diverse experiments for various vision applications. Our
comprehensive experiments validate the outstanding performance of the proposed
algorithm in several aspects. |
3,060 | Offline Reinforcement Learning with Differential Privacy | The offline reinforcement learning (RL) problem is often motivated by the
need to learn data-driven decision policies in financial, legal and healthcare
applications. However, the learned policy could retain sensitive information of
individuals in the training data (e.g., treatment and outcome of patients),
thus susceptible to various privacy risks. We design offline RL algorithms with
differential privacy guarantees which provably prevent such risks. These
algorithms also enjoy strong instance-dependent learning bounds under both
tabular and linear Markov decision process (MDP) settings. Our theory and
simulation suggest that the privacy guarantee comes at (almost) no drop in
utility comparing to the non-private counterpart for a medium-size dataset. |
3,061 | Applied Federated Learning: Architectural Design for Robust and Efficient Learning in Privacy Aware Settings | The classical machine learning paradigm requires the aggregation of user data
in a central location where machine learning practitioners can preprocess data,
calculate features, tune models and evaluate performance. The advantage of this
approach includes leveraging high performance hardware (such as GPUs) and the
ability of machine learning practitioners to do in depth data analysis to
improve model performance. However, these advantages may come at a cost to data
privacy. User data is collected, aggregated, and stored on centralized servers
for model development. Centralization of data poses risks, including a
heightened risk of internal and external security incidents as well as
accidental data misuse. Federated learning with differential privacy is
designed to avoid the server-side centralization pitfall by bringing the ML
learning step to users' devices. Learning is done in a federated manner where
each mobile device runs a training loop on a local copy of a model. Updates
from on-device models are sent to the server via encrypted communication and
through differential privacy to improve the global model. In this paradigm,
users' personal data remains on their devices. Surprisingly, model training in
this manner comes at a fairly minimal degradation in model performance.
However, federated learning comes with many other challenges due to its
distributed nature, heterogeneous compute environments and lack of data
visibility. This paper explores those challenges and outlines an architectural
design solution we are exploring and testing to productionize federated
learning at Meta scale. |
3,062 | Learning code summarization from a small and local dataset | Foundation models (e.g., CodeBERT, GraphCodeBERT, CodeT5) work well for many
software engineering tasks. These models are pre-trained (using
self-supervision) with billions of code tokens, and then fine-tuned with
hundreds of thousands of labeled examples, typically drawn from many projects.
However, software phenomena can be very project-specific. Vocabulary, and other
phenomena vary substantially with each project. Thus, training on
project-specific data, and testing on the same project, is a promising idea.
This hypothesis has to be evaluated carefully, e.g., in a time-series setting,
to prevent training-test leakage. We compare several models and training
approaches, including same-project training, cross-project training, training a
model especially designed to be sample efficient (and thus prima facie
well-suited for learning in a limited-sample same-project setting) and a
maximalist hybrid approach, fine-tuning first on many projects in many
languages and then training on the same-project. We find that the maximalist
hybrid setting provides consistent, substantial gains over the
state-of-the-art, on many different projects in both Java and Python. |
3,063 | Indeterminacy in Latent Variable Models: Characterization and Strong Identifiability | Most modern latent variable and probabilistic generative models, such as the
variational autoencoder (VAE), have certain indeterminacies that are
unresolvable even with an infinite amount of data. Recent applications of such
models have indicated the need for strongly identifiable models, in which an
observation corresponds to a unique latent code. Progress has been made towards
reducing model indeterminacies while maintaining flexibility, most notably by
the iVAE (arXiv:1907.04809 [stat.ML]), which excludes many -- but not all --
indeterminacies. We construct a full theoretical framework for analyzing the
indeterminacies of latent variable models, and characterize them precisely in
terms of properties of the generator functions and the latent variable prior
distributions. To illustrate, we apply the framework to better understand the
structure of recent identifiability results. We then investigate how we might
specify strongly identifiable latent variable models, and construct two such
classes of models. One is a straightforward modification of iVAE; the other
uses ideas from optimal transport and leads to novel models and connections to
recent work. |
3,064 | Federated Learning under Distributed Concept Drift | Federated Learning (FL) under distributed concept drift is a largely
unexplored area. Although concept drift is itself a well-studied phenomenon, it
poses particular challenges for FL, because drifts arise staggered in time and
space (across clients). Our work is the first to explicitly study data
heterogeneity in both dimensions. We first demonstrate that prior solutions to
drift adaptation, with their single global model, are ill-suited to staggered
drifts, necessitating multi-model solutions. We identify the problem of drift
adaptation as a time-varying clustering problem, and we propose two new
clustering algorithms for reacting to drifts based on local drift detection and
hierarchical clustering. Empirical evaluation shows that our solutions achieve
significantly higher accuracy than existing baselines, and are comparable to an
idealized algorithm with oracle knowledge of the ground-truth clustering of
clients to concepts at each time step. |
3,065 | Stabilizing Q-learning with Linear Architectures for Provably Efficient Learning | The $Q$-learning algorithm is a simple and widely-used stochastic
approximation scheme for reinforcement learning, but the basic protocol can
exhibit instability in conjunction with function approximation. Such
instability can be observed even with linear function approximation. In
practice, tools such as target networks and experience replay appear to be
essential, but the individual contribution of each of these mechanisms is not
well understood theoretically. This work proposes an exploration variant of the
basic $Q$-learning protocol with linear function approximation. Our modular
analysis illustrates the role played by each algorithmic tool that we adopt: a
second order update rule, a set of target networks, and a mechanism akin to
experience replay. Together, they enable state of the art regret bounds on
linear MDPs while preserving the most prominent feature of the algorithm,
namely a space complexity independent of the number of step elapsed. We show
that the performance of the algorithm degrades very gracefully under a novel
and more permissive notion of approximation error. The algorithm also exhibits
a form of instance-dependence, in that its performance depends on the
"effective" feature dimension. |
3,066 | Sequential Bayesian Neural Subnetwork Ensembles | Deep neural network ensembles that appeal to model diversity have been used
successfully to improve predictive performance and model robustness in several
applications. Whereas, it has recently been shown that sparse subnetworks of
dense models can match the performance of their dense counterparts and increase
their robustness while effectively decreasing the model complexity. However,
most ensembling techniques require multiple parallel and costly evaluations and
have been proposed primarily with deterministic models, whereas sparsity
induction has been mostly done through ad-hoc pruning. We propose sequential
ensembling of dynamic Bayesian neural subnetworks that systematically reduce
model complexity through sparsity-inducing priors and generate diverse
ensembles in a single forward pass of the model. The ensembling strategy
consists of an exploration phase that finds high-performing regions of the
parameter space and multiple exploitation phases that effectively exploit the
compactness of the sparse model to quickly converge to different minima in the
energy landscape corresponding to high-performing subnetworks yielding diverse
ensembles. We empirically demonstrate that our proposed approach surpasses the
baselines of the dense frequentist and Bayesian ensemble models in prediction
accuracy, uncertainty estimation, and out-of-distribution (OoD) robustness on
CIFAR10, CIFAR100 datasets, and their out-of-distribution variants: CIFAR10-C,
CIFAR100-C induced by corruptions. Furthermore, we found that our approach
produced the most diverse ensembles compared to the approaches with a single
forward pass and even compared to the approaches with multiple forward passes
in some cases. |
3,067 | On the Generalization of Neural Combinatorial Optimization Heuristics | Neural Combinatorial Optimization approaches have recently leveraged the
expressiveness and flexibility of deep neural networks to learn efficient
heuristics for hard Combinatorial Optimization (CO) problems. However, most of
the current methods lack generalization: for a given CO problem, heuristics
which are trained on instances with certain characteristics underperform when
tested on instances with different characteristics. While some previous works
have focused on varying the training instances properties, we postulate that a
one-size-fit-all model is out of reach. Instead, we formalize solving a CO
problem over a given instance distribution as a separate learning task and
investigate meta-learning techniques to learn a model on a variety of tasks, in
order to optimize its capacity to adapt to new tasks. Through extensive
experiments, on two CO problems, using both synthetic and realistic instances,
we show that our proposed meta-learning approach significantly improves the
generalization of two state-of-the-art models. |
3,068 | Neural Decoding with Optimization of Node Activations | The problem of maximum likelihood decoding with a neural decoder for
error-correcting code is considered. It is shown that the neural decoder can be
improved with two novel loss terms on the node's activations. The first loss
term imposes a sparse constraint on the node's activations. Whereas, the second
loss term tried to mimic the node's activations from a teacher decoder which
has better performance. The proposed method has the same run time complexity
and model size as the neural Belief Propagation decoder, while improving the
decoding performance by up to $1.1dB$ on BCH codes. |
3,069 | Core-periphery Models for Hypergraphs | We introduce a random hypergraph model for core-periphery structure. By
leveraging our model's sufficient statistics, we develop a novel statistical
inference algorithm that is able to scale to large hypergraphs with runtime
that is practically linear wrt. the number of nodes in the graph after a
preprocessing step that is almost linear in the number of hyperedges, as well
as a scalable sampling algorithm. Our inference algorithm is capable of
learning embeddings that correspond to the reputation (rank) of a node within
the hypergraph. We also give theoretical bounds on the size of the core of
hypergraphs generated by our model. We experiment with hypergraph data that
range to $\sim 10^5$ hyperedges mined from the Microsoft Academic Graph, Stack
Exchange, and GitHub and show that our model outperforms baselines wrt.
producing good fits. |
3,070 | Binding Dancers Into Attractors | To effectively perceive and process observations in our environment, feature
binding and perspective taking are crucial cognitive abilities. Feature binding
combines observed features into one entity, called a Gestalt. Perspective
taking transfers the percept into a canonical, observer-centered frame of
reference. Here we propose a recurrent neural network model that solves both
challenges. We first train an LSTM to predict 3D motion dynamics from a
canonical perspective. We then present similar motion dynamics with novel
viewpoints and feature arrangements. Retrospective inference enables the
deduction of the canonical perspective. Combined with a robust mutual-exclusive
softmax selection scheme, random feature arrangements are reordered and
precisely bound into known Gestalt percepts. To corroborate evidence for the
architecture's cognitive validity, we examine its behavior on the silhouette
illusion, which elicits two competitive Gestalt interpretations of a rotating
dancer. Our system flexibly binds the information of the rotating figure into
the alternative attractors resolving the illusion's ambiguity and imagining the
respective depth interpretation and the corresponding direction of rotation. We
finally discuss the potential universality of the proposed mechanisms. |
3,071 | Adaptive Local Neighborhood-based Neural Networks for MR Image Reconstruction from Undersampled Data | Recent medical image reconstruction techniques focus on generating
high-quality medical images suitable for clinical use at the lowest possible
cost and with the fewest possible adverse effects on patients. Recent works
have shown significant promise for reconstructing MR images from sparsely
sampled k-space data using deep learning. In this work, we propose a technique
that rapidly estimates deep neural networks directly at reconstruction time by
fitting them on small adaptively estimated neighborhoods of a training set. In
brief, our algorithm alternates between searching for neighbors in a data set
that are similar to the test reconstruction, and training a local network on
these neighbors followed by updating the test reconstruction. Because our
reconstruction model is learned on a dataset that is structurally similar to
the image being reconstructed rather than being fit on a large, diverse
training set, it is more adaptive to new scans. It can also handle changes in
training sets and flexible scan settings, while being relatively fast. Our
approach, dubbed LONDN-MRI, was validated on the FastMRI multi-coil knee data
set using deep unrolled reconstruction networks. Reconstructions were performed
at four fold and eight fold undersampling of k-space with 1D variable-density
random phase-encode undersampling masks. Our results demonstrate that our
proposed locally-trained method produces higher-quality reconstructions
compared to models trained globally on larger datasets. |
3,072 | Assessing the trade-off between prediction accuracy and interpretability for topic modeling on energetic materials corpora | As the amount and variety of energetics research increases, machine aware
topic identification is necessary to streamline future research pipelines. The
makeup of an automatic topic identification process consists of creating
document representations and performing classification. However, the
implementation of these processes on energetics research imposes new
challenges. Energetics datasets contain many scientific terms that are
necessary to understand the context of a document but may require more complex
document representations. Secondly, the predictions from classification must be
understandable and trusted by the chemists within the pipeline. In this work,
we study the trade-off between prediction accuracy and interpretability by
implementing three document embedding methods that vary in computational
complexity. With our accuracy results, we also introduce local interpretability
model-agnostic explanations (LIME) of each prediction to provide a localized
understanding of each prediction and to validate classifier decisions with our
team of energetics experts. This study was carried out on a novel labeled
energetics dataset created and validated by our team of energetics experts. |
3,073 | A Multi-Policy Framework for Deep Learning-Based Fake News Detection | Connectivity plays an ever-increasing role in modern society, with people all
around the world having easy access to rapidly disseminated information.
However, a more interconnected society enables the spread of intentionally
false information. To mitigate the negative impacts of fake news, it is
essential to improve detection methodologies. This work introduces Multi-Policy
Statement Checker (MPSC), a framework that automates fake news detection by
using deep learning techniques to analyze a statement itself and its related
news articles, predicting whether it is seemingly credible or suspicious. The
proposed framework was evaluated using four merged datasets containing real and
fake news. Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU) and
Bidirectional Encoder Representations from Transformers (BERT) models were
trained to utilize both lexical and syntactic features, and their performance
was evaluated. The obtained results demonstrate that a multi-policy analysis
reliably identifies suspicious statements, which can be advantageous for fake
news detection. |
3,074 | On the reversibility of adversarial attacks | Adversarial attacks modify images with perturbations that change the
prediction of classifiers. These modified images, known as adversarial
examples, expose the vulnerabilities of deep neural network classifiers. In
this paper, we investigate the predictability of the mapping between the
classes predicted for original images and for their corresponding adversarial
examples. This predictability relates to the possibility of retrieving the
original predictions and hence reversing the induced misclassification. We
refer to this property as the reversibility of an adversarial attack, and
quantify reversibility as the accuracy in retrieving the original class or the
true class of an adversarial example. We present an approach that reverses the
effect of an adversarial attack on a classifier using a prior set of
classification results. We analyse the reversibility of state-of-the-art
adversarial attacks on benchmark classifiers and discuss the factors that
affect the reversibility. |
3,075 | Defense Against Gradient Leakage Attacks via Learning to Obscure Data | Federated learning is considered as an effective privacy-preserving learning
mechanism that separates the client's data and model training process. However,
federated learning is still under the risk of privacy leakage because of the
existence of attackers who deliberately conduct gradient leakage attacks to
reconstruct the client data. Recently, popular strategies such as gradient
perturbation methods and input encryption methods have been proposed to defend
against gradient leakage attacks. Nevertheless, these defenses can either
greatly sacrifice the model performance, or be evaded by more advanced attacks.
In this paper, we propose a new defense method to protect the privacy of
clients' data by learning to obscure data. Our defense method can generate
synthetic samples that are totally distinct from the original samples, but they
can also maximally preserve their predictive features and guarantee the model
performance. Furthermore, our defense strategy makes the gradient leakage
attack and its variants extremely difficult to reconstruct the client data.
Through extensive experiments, we show that our proposed defense method obtains
better privacy protection while preserving high accuracy compared with
state-of-the-art methods. |
3,076 | On Reinforcement Learning and Distribution Matching for Fine-Tuning Language Models with no Catastrophic Forgetting | The availability of large pre-trained models is changing the landscape of
Machine Learning research and practice, moving from a training-from-scratch to
a fine-tuning paradigm. While in some applications the goal is to "nudge" the
pre-trained distribution towards preferred outputs, in others it is to steer it
towards a different distribution over the sample space. Two main paradigms have
emerged to tackle this challenge: Reward Maximization (RM) and, more recently,
Distribution Matching (DM). RM applies standard Reinforcement Learning (RL)
techniques, such as Policy Gradients, to gradually increase the reward signal.
DM prescribes to first make explicit the target distribution that the model is
fine-tuned to approximate. Here we explore the theoretical connections between
the two paradigms, and show that methods such as KL-control developed for RM
can also be construed as belonging to DM. We further observe that while DM
differs from RM, it can suffer from similar training difficulties, such as high
gradient variance. We leverage connections between the two paradigms to import
the concept of baseline into DM methods. We empirically validate the benefits
of adding a baseline on an array of controllable language generation tasks such
as constraining topic, sentiment, and gender distributions in texts sampled
from a language model. We observe superior performance in terms of constraint
satisfaction, stability and sample efficiency. |
3,077 | Merlin-Arthur Classifiers: Formal Interpretability with Interactive Black Boxes | We present a new theoretical framework for making black box classifiers such
as Neural Networks interpretable, basing our work on clear assumptions and
guarantees. In our setting, which is inspired by the Merlin-Arthur protocol
from Interactive Proof Systems, two functions cooperate to achieve a
classification together: the \emph{prover} selects a small set of features as a
certificate and presents it to the \emph{classifier}. Including a second,
adversarial prover allows us to connect a game-theoretic equilibrium to
information-theoretic guarantees on the exchanged features. We define notions
of completeness and soundness that enable us to lower bound the mutual
information between features and class. To demonstrate good agreement between
theory and practice, we support our framework by providing numerical
experiments for Neural Network classifiers, explicitly calculating the mutual
information of features with respect to the class. |
3,078 | SolarGAN: Synthetic Annual Solar Irradiance Time Series on Urban Building Facades via Deep Generative Networks | Building Integrated Photovoltaics (BIPV) is a promising technology to
decarbonize urban energy systems via harnessing solar energy available on
building envelopes. While methods to assess solar irradiation, especially on
rooftops, are well established, the assessment on building facades usually
involves a higher effort due to more complex urban features and obstructions.
The drawback of existing physics-based simulation programs is that they require
significant manual modelling effort and computing time for generating time
resolved deterministic results. Yet, solar irradiation is highly intermittent
and representing its inherent uncertainty may be required for designing robust
BIPV energy systems. Targeting on these drawbacks, this paper proposes a
data-driven model based on Deep Generative Networks (DGN) to efficiently
generate high-fidelity stochastic ensembles of annual hourly solar irradiance
time series on building facades with uncompromised spatiotemporal resolution at
the urban scale. The only input required is easily obtainable, simple fisheye
images as categorical shading masks captured from 3D models. In principle, even
actual photographs of urban contexts can be utilized, given they are
semantically segmented. Our validations exemplify the high fidelity of the
generated time series when compared to the physics-based simulator. To
demonstrate the model's relevance for urban energy planning, we showcase its
potential for generative design by parametrically altering characteristic
features of the urban environment and producing corresponding time series on
building facades under different climatic contexts in real-time. |
3,079 | Positive Unlabeled Contrastive Learning | Self-supervised pretraining on unlabeled data followed by supervised
finetuning on labeled data is a popular paradigm for learning from limited
labeled examples. In this paper, we investigate and extend this paradigm to the
classical positive unlabeled (PU) setting - the weakly supervised task of
learning a binary classifier only using a few labeled positive examples and a
set of unlabeled samples. We propose a novel PU learning objective positive
unlabeled Noise Contrastive Estimation (puNCE) that leverages the available
explicit (from labeled samples) and implicit (from unlabeled samples)
supervision to learn useful representations from positive unlabeled input data.
The underlying idea is to assign each training sample an individual weight;
labeled positives are given unit weight; unlabeled samples are duplicated, one
copy is labeled positive and the other as negative with weights $\pi$ and
$(1-\pi)$ where $\pi$ denotes the class prior. Extensive experiments across
vision and natural language tasks reveal that puNCE consistently improves over
existing unsupervised and supervised contrastive baselines under limited
supervision. |
3,080 | Residual Multiplicative Filter Networks for Multiscale Reconstruction | Coordinate networks like Multiplicative Filter Networks (MFNs) and BACON
offer some control over the frequency spectrum used to represent continuous
signals such as images or 3D volumes. Yet, they are not readily applicable to
problems for which coarse-to-fine estimation is required, including various
inverse problems in which coarse-to-fine optimization plays a key role in
avoiding poor local minima. We introduce a new coordinate network architecture
and training scheme that enables coarse-to-fine optimization with fine-grained
control over the frequency support of learned reconstructions. This is achieved
with two key innovations. First, we incorporate skip connections so that
structure at one scale is preserved when fitting finer-scale structure. Second,
we propose a novel initialization scheme to provide control over the model
frequency spectrum at each stage of optimization. We demonstrate how these
modifications enable multiscale optimization for coarse-to-fine fitting to
natural images. We then evaluate our model on synthetically generated datasets
for the the problem of single-particle cryo-EM reconstruction. We learn high
resolution multiscale structures, on par with the state-of-the art. |
3,081 | A Log-Linear Time Sequential Optimal Calibration Algorithm for Quantized Isotonic L2 Regression | We study the sequential calibration of estimations in a quantized isotonic L2
regression setting. We start by showing that the optimal calibrated quantized
estimations can be acquired from the traditional isotonic L2 regression
solution. We modify the traditional PAVA algorithm to create calibrators for
both batch and sequential optimization of the quantized isotonic regression
problem. Our algorithm can update the optimal quantized monotone mapping for
the samples observed so far in linear space and logarithmic time per new
unordered sample. |
3,082 | Nest Your Adaptive Algorithm for Parameter-Agnostic Nonconvex Minimax Optimization | Adaptive algorithms like AdaGrad and AMSGrad are successful in nonconvex
optimization owing to their parameter-agnostic ability -- requiring no a priori
knowledge about problem-specific parameters nor tuning of learning rates.
However, when it comes to nonconvex minimax optimization, direct extensions of
such adaptive optimizers without proper time-scale separation may fail to work
in practice. We provide such an example proving that the simple combination of
Gradient Descent Ascent (GDA) with adaptive stepsizes can diverge if the
primal-dual stepsize ratio is not carefully chosen; hence, a fortiori, such
adaptive extensions are not parameter-agnostic. To address the issue, we
formally introduce a Nested Adaptive framework, NeAda for short, that carries
an inner loop for adaptively maximizing the dual variable with controllable
stopping criteria and an outer loop for adaptively minimizing the primal
variable. Such mechanism can be equipped with off-the-shelf adaptive optimizers
and automatically balance the progress in the primal and dual variables.
Theoretically, for nonconvex-strongly-concave minimax problems, we show that
NeAda can achieve the near-optimal $\tilde{O}(\epsilon^{-2})$ and
$\tilde{O}(\epsilon^{-4})$ gradient complexities respectively in the
deterministic and stochastic settings, without prior information on the
problem's smoothness and strong concavity parameters. To the best of our
knowledge, this is the first algorithm that simultaneously achieves
near-optimal convergence rates and parameter-agnostic adaptation in the
nonconvex minimax setting. Numerically, we further illustrate the robustness of
the NeAda family with experiments on simple test functions and a real-world
application. |
3,083 | Composition of Relational Features with an Application to Explaining Black-Box Predictors | Relational machine learning programs like those developed in Inductive Logic
Programming (ILP) offer several advantages: (1) The ability to model complex
relationships amongst data instances; (2) The use of domain-specific relations
during model construction; and (3) The models constructed are human-readable,
which is often one step closer to being human-understandable. However, these
ILP-like methods have not been able to capitalise fully on the rapid hardware,
software and algorithmic developments fuelling current developments in deep
neural networks. In this paper, we treat relational features as functions and
use the notion of generalised composition of functions to derive complex
functions from simpler ones. We formulate the notion of a set of
$\text{M}$-simple features in a mode language $\text{M}$ and identify two
composition operators ($\rho_1$ and $\rho_2$) from which all possible complex
features can be derived. We use these results to implement a form of
"explainable neural network" called Compositional Relational Machines, or CRMs,
which are labelled directed-acyclic graphs. The vertex-label for any vertex $j$
in the CRM contains a feature-function $f_j$ and a continuous activation
function $g_j$. If $j$ is a "non-input" vertex, then $f_j$ is the composition
of features associated with vertices in the direct predecessors of $j$. Our
focus is on CRMs in which input vertices (those without any direct
predecessors) all have $\text{M}$-simple features in their vertex-labels. We
provide a randomised procedure for constructing and learning such CRMs. Using a
notion of explanations based on the compositional structure of features in a
CRM, we provide empirical evidence on synthetic data of the ability to identify
appropriate explanations; and demonstrate the use of CRMs as 'explanation
machines' for black-box models that do not provide explanations for their
predictions. |
3,084 | Walk for Learning: A Random Walk Approach for Federated Learning from Heterogeneous Data | We consider the problem of a Parameter Server (PS) that wishes to learn a
model that fits data distributed on the nodes of a graph. We focus on Federated
Learning (FL) as a canonical application. One of the main challenges of FL is
the communication bottleneck between the nodes and the parameter server. A
popular solution in the literature is to allow each node to do several local
updates on the model in each iteration before sending it back to the PS. While
this mitigates the communication bottleneck, the statistical heterogeneity of
the data owned by the different nodes has proven to delay convergence and bias
the model. In this work, we study random walk (RW) learning algorithms for
tackling the communication and data heterogeneity problems. The main idea is to
leverage available direct connections among the nodes themselves, which are
typically "cheaper" than the communication to the PS. In a random walk, the
model is thought of as a "baton" that is passed from a node to one of its
neighbors after being updated in each iteration. The challenge in designing the
RW is the data heterogeneity and the uncertainty about the data distributions.
Ideally, we would want to visit more often nodes that hold more informative
data. We cast this problem as a sleeping multi-armed bandit (MAB) to design a
near-optimal node sampling strategy that achieves variance-reduced gradient
estimates and approaches sub-linearly the optimal sampling strategy. Based on
this framework, we present an adaptive random walk learning algorithm. We
provide theoretical guarantees on its convergence. Our numerical results
validate our theoretical findings and show that our algorithm outperforms
existing random walk algorithms. |
3,085 | Cascaded Video Generation for Videos In-the-Wild | Videos can be created by first outlining a global view of the scene and then
adding local details. Inspired by this idea we propose a cascaded model for
video generation which follows a coarse to fine approach. First our model
generates a low resolution video, establishing the global scene structure,
which is then refined by subsequent cascade levels operating at larger
resolutions. We train each cascade level sequentially on partial views of the
videos, which reduces the computational complexity of our model and makes it
scalable to high-resolution videos with many frames. We empirically validate
our approach on UCF101 and Kinetics-600, for which our model is competitive
with the state-of-the-art. We further demonstrate the scaling capabilities of
our model and train a three-level model on the BDD100K dataset which generates
256x256 pixels videos with 48 frames. |
3,086 | The Phenomenon of Policy Churn | We identify and study the phenomenon of policy churn, that is, the rapid
change of the greedy policy in value-based reinforcement learning. Policy churn
operates at a surprisingly rapid pace, changing the greedy action in a large
fraction of states within a handful of learning updates (in a typical deep RL
set-up such as DQN on Atari). We characterise the phenomenon empirically,
verifying that it is not limited to specific algorithm or environment
properties. A number of ablations help whittle down the plausible explanations
on why churn occurs to just a handful, all related to deep learning. Finally,
we hypothesise that policy churn is a beneficial but overlooked form of
implicit exploration that casts $\epsilon$-greedy exploration in a fresh light,
namely that $\epsilon$-noise plays a much smaller role than expected. |
3,087 | (Machine) Learning What Policies Value | When a policy prioritizes one person over another, is it because they benefit
more, or because they are preferred? This paper develops a method to uncover
the values consistent with observed allocation decisions. We use machine
learning methods to estimate how much each individual benefits from an
intervention, and then reconcile its allocation with (i) the welfare weights
assigned to different people; (ii) heterogeneous treatment effects of the
intervention; and (iii) weights on different outcomes. We demonstrate this
approach by analyzing Mexico's PROGRESA anti-poverty program. The analysis
reveals that while the program prioritized certain subgroups -- such as
indigenous households -- the fact that those groups benefited more implies that
they were in fact assigned a lower welfare weight. The PROGRESA case
illustrates how the method makes it possible to audit existing policies, and to
design future policies that better align with values. |
3,088 | Dataset Distillation using Neural Feature Regression | Dataset distillation aims to learn a small synthetic dataset that preserves
most of the information from the original dataset. Dataset distillation can be
formulated as a bi-level meta-learning problem where the outer loop optimizes
the meta-dataset and the inner loop trains a model on the distilled data.
Meta-gradient computation is one of the key challenges in this formulation, as
differentiating through the inner loop learning procedure introduces
significant computation and memory costs. In this paper, we address these
challenges using neural Feature Regression with Pooling (FRePo), achieving the
state-of-the-art performance with an order of magnitude less memory requirement
and two orders of magnitude faster training than previous methods. The proposed
algorithm is analogous to truncated backpropagation through time with a pool of
models to alleviate various types of overfitting in dataset distillation. FRePo
significantly outperforms the previous methods on CIFAR100, Tiny ImageNet, and
ImageNet-1K. Furthermore, we show that high-quality distilled data can greatly
improve various downstream applications, such as continual learning and
membership inference defense. |
3,089 | Learning to Solve PDE-constrained Inverse Problems with Graph Networks | Learned graph neural networks (GNNs) have recently been established as fast
and accurate alternatives for principled solvers in simulating the dynamics of
physical systems. In many application domains across science and engineering,
however, we are not only interested in a forward simulation but also in solving
inverse problems with constraints defined by a partial differential equation
(PDE). Here we explore GNNs to solve such PDE-constrained inverse problems.
Given a sparse set of measurements, we are interested in recovering the initial
condition or parameters of the PDE. We demonstrate that GNNs combined with
autodecoder-style priors are well-suited for these tasks, achieving more
accurate estimates of initial conditions or physical parameters than other
learned approaches when applied to the wave equation or Navier-Stokes
equations. We also demonstrate computational speedups of up to 90x using GNNs
compared to principled solvers. Project page:
https://cyanzhao42.github.io/LearnInverseProblem |
3,090 | Collaborative Learning of Distributions under Heterogeneity and Communication Constraints | In modern machine learning, users often have to collaborate to learn the
distribution of the data. Communication can be a significant bottleneck. Prior
work has studied homogeneous users -- i.e., whose data follow the same discrete
distribution -- and has provided optimal communication-efficient methods for
estimating that distribution. However, these methods rely heavily on
homogeneity, and are less applicable in the common case when users' discrete
distributions are heterogeneous. Here we consider a natural and tractable model
of heterogeneity, where users' discrete distributions only vary sparsely, on a
small number of entries. We propose a novel two-stage method named SHIFT:
First, the users collaborate by communicating with the server to learn a
central distribution; relying on methods from robust statistics. Then, the
learned central distribution is fine-tuned to estimate their respective
individual distribution. We show that SHIFT is minimax optimal in our model of
heterogeneity and under communication constraints. Further, we provide
experimental results using both synthetic data and $n$-gram frequency
estimation in the text domain, which corroborate its efficiency. |
3,091 | Split-kl and PAC-Bayes-split-kl Inequalities | We present a new concentration of measure inequality for sums of independent
bounded random variables, which we name a split-kl inequality. The inequality
combines the combinatorial power of the kl inequality with ability to exploit
low variance. While for Bernoulli random variables the kl inequality is tighter
than the Empirical Bernstein, for random variables taking values inside a
bounded interval and having low variance the Empirical Bernstein inequality is
tighter than the kl. The proposed split-kl inequality yields the best of both
worlds. We discuss an application of the split-kl inequality to bounding excess
losses. We also derive a PAC-Bayes-split-kl inequality and use a synthetic
example and several UCI datasets to compare it with the PAC-Bayes-kl, PAC-Bayes
Empirical Bernstein, PAC-Bayes Unexpected Bernstein, and PAC-Bayes Empirical
Bennett inequalities. |
3,092 | Fast and Precise: Adjusting Planning Horizon with Adaptive Subgoal Search | Complex reasoning problems contain states that vary in the computational cost
required to determine a good action plan. Taking advantage of this property, we
propose Adaptive Subgoal Search (AdaSubS), a search method that adaptively
adjusts the planning horizon. To this end, AdaSubS generates diverse sets of
subgoals at different distances. A verification mechanism is employed to filter
out unreachable subgoals swiftly and thus allowing to focus on feasible further
subgoals. In this way, AdaSubS benefits from the efficiency of planning with
longer subgoals and the fine control with the shorter ones. We show that
AdaSubS significantly surpasses hierarchical planning algorithms on three
complex reasoning tasks: Sokoban, the Rubik's Cube, and inequality proving
benchmark INT, setting new state-of-the-art on INT. |
3,093 | Snow Mountain: Dataset of Audio Recordings of The Bible in Low Resource Languages | Automatic Speech Recognition (ASR) has increasing utility in the modern
world. There are a many ASR models available for languages with large amounts
of training data like English. However, low-resource languages are poorly
represented. In response we create and release an open-licensed and formatted
dataset of audio recordings of the Bible in low-resource northern Indian
languages. We setup multiple experimental splits and train and analyze two
competitive ASR models to serve as the baseline for future research using this
data. |
3,094 | RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model | Counterfactual (CF) explanations for machine learning (ML) models are
preferred by end-users, as they explain the predictions of ML models by
providing a recourse case to individuals who are adversely impacted by
predicted outcomes. Existing CF explanation methods generate recourses under
the assumption that the underlying target ML model remains stationary over
time. However, due to commonly occurring distributional shifts in training
data, ML models constantly get updated in practice, which might render
previously generated recourses invalid and diminish end-users trust in our
algorithmic framework. To address this problem, we propose RoCourseNet, a
training framework that jointly optimizes for predictions and robust recourses
to future data shifts. We have three main contributions: (i) We propose a novel
virtual data shift (VDS) algorithm to find worst-case shifted ML models by
explicitly considering the worst-case data shift in the training dataset. (ii)
We leverage adversarial training to solve a novel tri-level optimization
problem inside RoCourseNet, which simultaneously generates predictions and
corresponding robust recourses. (iii) Finally, we evaluate RoCourseNet's
performance on three real-world datasets and show that RoCourseNet outperforms
state-of-the-art baselines by 10% in generating robust CF explanations. |
3,095 | Know Your Boundaries: The Necessity of Explicit Behavioral Cloning in Offline RL | We introduce an offline reinforcement learning (RL) algorithm that explicitly
clones a behavior policy to constrain value learning. In offline RL, it is
often important to prevent a policy from selecting unobserved actions, since
the consequence of these actions cannot be presumed without additional
information about the environment. One straightforward way to implement such a
constraint is to explicitly model a given data distribution via behavior
cloning and directly force a policy not to select uncertain actions. However,
many offline RL methods instantiate the constraint indirectly -- for example,
pessimistic value estimation -- due to a concern about errors when modeling a
potentially complex behavior policy. In this work, we argue that it is not only
viable but beneficial to explicitly model the behavior policy for offline RL
because the constraint can be realized in a stable way with the trained model.
We first suggest a theoretical framework that allows us to incorporate
behavior-cloned models into value-based offline RL methods, enjoying the
strength of both explicit behavior cloning and value learning. Then, we propose
a practical method utilizing a score-based generative model for behavior
cloning. With the proposed method, we show state-of-the-art performance on
several datasets within the D4RL and Robomimic benchmarks and achieve
competitive performance across all datasets tested. |
3,096 | Meta-SysId: A Meta-Learning Approach for Simultaneous Identification and Prediction | In this paper, we propose Meta-SysId, a meta-learning approach to model sets
of systems that have behavior governed by common but unknown laws and that
differentiate themselves by their context. Inspired by classical
modeling-and-identification approaches, Meta-SysId learns to represent the
common law through shared parameters and relies on online optimization to
compute system-specific context. Compared to optimization-based meta-learning
methods, the separation between class parameters and context variables reduces
the computational burden while allowing batch computations and a simple
training scheme. We test Meta-SysId on polynomial regression, time-series
prediction, model-based control, and real-world traffic prediction domains,
empirically finding it outperforms or is competitive with meta-learning
baselines. |
3,097 | Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data | Federated learning (FL) is a privacy-promoting framework that enables
potentially large number of clients to collaboratively train machine learning
models. In a FL system, a server coordinates the collaboration by collecting
and aggregating clients' model updates while the clients' data remains local
and private. A major challenge in federated learning arises when the local data
is heterogeneous -- the setting in which performance of the learned global
model may deteriorate significantly compared to the scenario where the data is
identically distributed across the clients. In this paper we propose FedDPMS
(Federated Differentially Private Means Sharing), an FL algorithm in which
clients deploy variational auto-encoders to augment local datasets with data
synthesized using differentially private means of latent data representations
communicated by a trusted server. Such augmentation ameliorates effects of data
heterogeneity across the clients without compromising privacy. Our experiments
on deep image classification tasks demonstrate that FedDPMS outperforms
competing state-of-the-art FL methods specifically designed for heterogeneous
data settings. |
3,098 | Why Did This Model Forecast This Future? Closed-Form Temporal Saliency Towards Causal Explanations of Probabilistic Forecasts | Forecasting tasks surrounding the dynamics of low-level human behavior are of
significance to multiple research domains. In such settings, methods for
explaining specific forecasts can enable domain experts to gain insights into
the predictive relationships between behaviors. In this work, we introduce and
address the following question: given a probabilistic forecasting model how can
we identify observed windows that the model considers salient when making its
forecasts? We build upon a general definition of information-theoretic saliency
grounded in human perception and extend it to forecasting settings by
leveraging a crucial attribute of the domain: a single observation can result
in multiple valid futures. We propose to express the saliency of an observed
window in terms of the differential entropy of the resulting predicted future
distribution. In contrast to existing methods that either require explicit
training of the saliency mechanism or access to the internal states of the
forecasting model, we obtain a closed-form solution for the saliency map for
commonly used density functions in probabilistic forecasting. We empirically
demonstrate how our framework can recover salient observed windows from head
pose features for the sample task of speaking-turn forecasting using a
synthesized conversation dataset. |
3,099 | Hopular: Modern Hopfield Networks for Tabular Data | While Deep Learning excels in structured data as encountered in vision and
natural language processing, it failed to meet its expectations on tabular
data. For tabular data, Support Vector Machines (SVMs), Random Forests, and
Gradient Boosting are the best performing techniques with Gradient Boosting in
the lead. Recently, we saw a surge of Deep Learning methods that were tailored
to tabular data but still underperform compared to Gradient Boosting on
small-sized datasets. We suggest "Hopular", a novel Deep Learning architecture
for medium- and small-sized datasets, where each layer is equipped with
continuous modern Hopfield networks. The modern Hopfield networks use stored
data to identify feature-feature, feature-target, and sample-sample
dependencies. Hopular's novelty is that every layer can directly access the
original input as well as the whole training set via stored data in the
Hopfield networks. Therefore, Hopular can step-wise update its current model
and the resulting prediction at every layer like standard iterative learning
algorithms. In experiments on small-sized tabular datasets with less than 1,000
samples, Hopular surpasses Gradient Boosting, Random Forests, SVMs, and in
particular several Deep Learning methods. In experiments on medium-sized
tabular data with about 10,000 samples, Hopular outperforms XGBoost, CatBoost,
LightGBM and a state-of-the art Deep Learning method designed for tabular data.
Thus, Hopular is a strong alternative to these methods on tabular data. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.